Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2024 04:02
Static task
static1
General
-
Target
504f86acec82be7ee36410b7f2c9aec444b2bb183ca3ac41ee02390defef66caN.exe
-
Size
6.0MB
-
MD5
ed6698a5b76010f200c8ccb8a38ff380
-
SHA1
639770c57e4a93d6f65519e257a6636c9bb3d4f2
-
SHA256
504f86acec82be7ee36410b7f2c9aec444b2bb183ca3ac41ee02390defef66ca
-
SHA512
1685e5c6d0364608d0d84946072487f32be75ef130ec64fb0c97a9167d358df5702f4dda7a3a698ab4ed60c1c88680f3807da4707c53cfd3706f15db2a2c7bef
-
SSDEEP
98304:fM5lAG+nj6tal+h2QwCOPv823glra6c36ez/POvqBfC6TWlBXzQ+2qutGdOVl7:XGbtwDzs23gFa6c3DzPOOq6TWlRQ+2LD
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Extracted
amadey
5.04
4bee07
http://185.215.113.209
-
strings_key
191655f008adc880f91bfc85bc56db54
-
url_paths
/Fru7Nk9/index.php
Extracted
lumma
https://navygenerayk.store/api
Signatures
-
Amadey family
-
Lumma family
-
Processes:
8bcc282f6d.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 8bcc282f6d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 8bcc282f6d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 8bcc282f6d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 8bcc282f6d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 8bcc282f6d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 8bcc282f6d.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
Processes:
skotes.exe1u82N5.exeskotes.exe2a8757.exebf94938317.exe8bcc282f6d.exe3t18l.exe2e9a1461b1.exe1d9970e157.exeskotes.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1u82N5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2a8757.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ bf94938317.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8bcc282f6d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3t18l.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2e9a1461b1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1d9970e157.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Blocklisted process makes network request 2 IoCs
Processes:
rundll32.exerundll32.exeflow pid process 85 6832 rundll32.exe 144 5688 rundll32.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
Processes:
chrome.exechrome.exechrome.exechrome.exepid process 5868 chrome.exe 6112 chrome.exe 5328 chrome.exe 5836 chrome.exe -
Checks BIOS information in registry 2 TTPs 20 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
2a8757.exe1d9970e157.exe1u82N5.exe2e9a1461b1.exe8bcc282f6d.exeskotes.exeskotes.exeskotes.exebf94938317.exe3t18l.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2a8757.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1d9970e157.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1d9970e157.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1u82N5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2e9a1461b1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2e9a1461b1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8bcc282f6d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1u82N5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion bf94938317.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8bcc282f6d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2a8757.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3t18l.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3t18l.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion bf94938317.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
1u82N5.exe3t18l.exeskotes.exe2e9a1461b1.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 1u82N5.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 3t18l.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 2e9a1461b1.exe -
Executes dropped EXE 15 IoCs
Processes:
k2N37.exeK9r48.exe1u82N5.exeskotes.exe2a8757.exe3t18l.exe4d625l.exe2e9a1461b1.exebf94938317.exe1d9970e157.exe8bcc282f6d.exeskotes.exeservice123.exeskotes.exeservice123.exepid process 3732 k2N37.exe 2132 K9r48.exe 3000 1u82N5.exe 2688 skotes.exe 4884 2a8757.exe 3656 3t18l.exe 3564 4d625l.exe 2784 2e9a1461b1.exe 5872 bf94938317.exe 6136 1d9970e157.exe 6436 8bcc282f6d.exe 1796 skotes.exe 4416 service123.exe 5236 skotes.exe 5680 service123.exe -
Identifies Wine through registry keys 2 TTPs 10 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
3t18l.exebf94938317.exe1d9970e157.exe8bcc282f6d.exe1u82N5.exe2a8757.exe2e9a1461b1.exeskotes.exeskotes.exeskotes.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 3t18l.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine bf94938317.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 1d9970e157.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 8bcc282f6d.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 1u82N5.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 2a8757.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 2e9a1461b1.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe -
Loads dropped DLL 5 IoCs
Processes:
3t18l.exerundll32.exerundll32.exeservice123.exeservice123.exepid process 3656 3t18l.exe 6832 rundll32.exe 5688 rundll32.exe 4416 service123.exe 5680 service123.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Processes:
8bcc282f6d.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 8bcc282f6d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 8bcc282f6d.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
k2N37.exeK9r48.exeskotes.exe504f86acec82be7ee36410b7f2c9aec444b2bb183ca3ac41ee02390defef66caN.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" k2N37.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" K9r48.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clip.dll = "rundll32 C:\\Users\\Admin\\AppData\\Local\\Temp\\1005203011\\clip.dll, Main" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clip64.dll = "rundll32 C:\\Users\\Admin\\AppData\\Local\\Temp\\1005204011\\clip64.dll, Main" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bf94938317.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1005217001\\bf94938317.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\1d9970e157.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1005218001\\1d9970e157.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\8bcc282f6d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1005220001\\8bcc282f6d.exe" skotes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 504f86acec82be7ee36410b7f2c9aec444b2bb183ca3ac41ee02390defef66caN.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4d625l.exe autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
Processes:
1u82N5.exeskotes.exe2a8757.exe3t18l.exe2e9a1461b1.exebf94938317.exe1d9970e157.exe8bcc282f6d.exeskotes.exeskotes.exepid process 3000 1u82N5.exe 2688 skotes.exe 4884 2a8757.exe 3656 3t18l.exe 2784 2e9a1461b1.exe 5872 bf94938317.exe 6136 1d9970e157.exe 6436 8bcc282f6d.exe 1796 skotes.exe 5236 skotes.exe -
Drops file in Windows directory 1 IoCs
Processes:
1u82N5.exedescription ioc process File created C:\Windows\Tasks\skotes.job 1u82N5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4448 2784 WerFault.exe 2e9a1461b1.exe -
System Location Discovery: System Language Discovery 1 TTPs 23 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
8bcc282f6d.exeschtasks.exetimeout.exetaskkill.exetaskkill.exerundll32.exebf94938317.exe1d9970e157.exeK9r48.exe2a8757.execmd.exe2e9a1461b1.exetaskkill.exeservice123.exeskotes.exe3t18l.exetaskkill.exe4d625l.exetaskkill.exerundll32.exe504f86acec82be7ee36410b7f2c9aec444b2bb183ca3ac41ee02390defef66caN.exek2N37.exe1u82N5.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8bcc282f6d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bf94938317.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1d9970e157.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language K9r48.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a8757.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2e9a1461b1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3t18l.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4d625l.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 504f86acec82be7ee36410b7f2c9aec444b2bb183ca3ac41ee02390defef66caN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k2N37.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1u82N5.exe -
Checks processor information in registry 2 TTPs 12 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exefirefox.exe2e9a1461b1.exe3t18l.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2e9a1461b1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 2e9a1461b1.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3t18l.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3t18l.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 2212 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 5 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 960 taskkill.exe 2996 taskkill.exe 420 taskkill.exe 4388 taskkill.exe 3184 taskkill.exe -
Modifies registry class 1 IoCs
Processes:
firefox.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 31 IoCs
Processes:
1u82N5.exeskotes.exe2a8757.exe3t18l.exe4d625l.exe2e9a1461b1.exebf94938317.exe1d9970e157.exe8bcc282f6d.exeskotes.exechrome.exeskotes.exepid process 3000 1u82N5.exe 3000 1u82N5.exe 2688 skotes.exe 2688 skotes.exe 4884 2a8757.exe 4884 2a8757.exe 3656 3t18l.exe 3656 3t18l.exe 3656 3t18l.exe 3656 3t18l.exe 3564 4d625l.exe 3564 4d625l.exe 2784 2e9a1461b1.exe 2784 2e9a1461b1.exe 3564 4d625l.exe 3564 4d625l.exe 5872 bf94938317.exe 5872 bf94938317.exe 6136 1d9970e157.exe 6136 1d9970e157.exe 6436 8bcc282f6d.exe 6436 8bcc282f6d.exe 6436 8bcc282f6d.exe 6436 8bcc282f6d.exe 6436 8bcc282f6d.exe 1796 skotes.exe 1796 skotes.exe 5328 chrome.exe 5328 chrome.exe 5236 skotes.exe 5236 skotes.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 5328 chrome.exe 5328 chrome.exe 5328 chrome.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exefirefox.exe8bcc282f6d.exechrome.exedescription pid process Token: SeDebugPrivilege 420 taskkill.exe Token: SeDebugPrivilege 4388 taskkill.exe Token: SeDebugPrivilege 3184 taskkill.exe Token: SeDebugPrivilege 960 taskkill.exe Token: SeDebugPrivilege 2996 taskkill.exe Token: SeDebugPrivilege 4948 firefox.exe Token: SeDebugPrivilege 4948 firefox.exe Token: SeDebugPrivilege 6436 8bcc282f6d.exe Token: SeShutdownPrivilege 5328 chrome.exe Token: SeCreatePagefilePrivilege 5328 chrome.exe Token: SeShutdownPrivilege 5328 chrome.exe Token: SeCreatePagefilePrivilege 5328 chrome.exe -
Suspicious use of FindShellTrayWindow 59 IoCs
Processes:
1u82N5.exe4d625l.exefirefox.exechrome.exepid process 3000 1u82N5.exe 3564 4d625l.exe 3564 4d625l.exe 3564 4d625l.exe 3564 4d625l.exe 3564 4d625l.exe 3564 4d625l.exe 3564 4d625l.exe 3564 4d625l.exe 4948 firefox.exe 4948 firefox.exe 4948 firefox.exe 4948 firefox.exe 4948 firefox.exe 4948 firefox.exe 4948 firefox.exe 4948 firefox.exe 4948 firefox.exe 4948 firefox.exe 4948 firefox.exe 4948 firefox.exe 4948 firefox.exe 4948 firefox.exe 4948 firefox.exe 4948 firefox.exe 4948 firefox.exe 4948 firefox.exe 4948 firefox.exe 4948 firefox.exe 4948 firefox.exe 3564 4d625l.exe 3564 4d625l.exe 3564 4d625l.exe 5328 chrome.exe 5328 chrome.exe 5328 chrome.exe 5328 chrome.exe 5328 chrome.exe 5328 chrome.exe 5328 chrome.exe 5328 chrome.exe 5328 chrome.exe 5328 chrome.exe 5328 chrome.exe 5328 chrome.exe 5328 chrome.exe 5328 chrome.exe 5328 chrome.exe 5328 chrome.exe 5328 chrome.exe 5328 chrome.exe 5328 chrome.exe 5328 chrome.exe 5328 chrome.exe 5328 chrome.exe 5328 chrome.exe 5328 chrome.exe 5328 chrome.exe 5328 chrome.exe -
Suspicious use of SendNotifyMessage 31 IoCs
Processes:
4d625l.exefirefox.exepid process 3564 4d625l.exe 3564 4d625l.exe 3564 4d625l.exe 3564 4d625l.exe 3564 4d625l.exe 3564 4d625l.exe 3564 4d625l.exe 3564 4d625l.exe 4948 firefox.exe 4948 firefox.exe 4948 firefox.exe 4948 firefox.exe 4948 firefox.exe 4948 firefox.exe 4948 firefox.exe 4948 firefox.exe 4948 firefox.exe 4948 firefox.exe 4948 firefox.exe 4948 firefox.exe 4948 firefox.exe 4948 firefox.exe 4948 firefox.exe 4948 firefox.exe 4948 firefox.exe 4948 firefox.exe 4948 firefox.exe 4948 firefox.exe 3564 4d625l.exe 3564 4d625l.exe 3564 4d625l.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
firefox.exepid process 4948 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
504f86acec82be7ee36410b7f2c9aec444b2bb183ca3ac41ee02390defef66caN.exek2N37.exeK9r48.exe1u82N5.exe3t18l.execmd.exe4d625l.exeskotes.exefirefox.exefirefox.exedescription pid process target process PID 3012 wrote to memory of 3732 3012 504f86acec82be7ee36410b7f2c9aec444b2bb183ca3ac41ee02390defef66caN.exe k2N37.exe PID 3012 wrote to memory of 3732 3012 504f86acec82be7ee36410b7f2c9aec444b2bb183ca3ac41ee02390defef66caN.exe k2N37.exe PID 3012 wrote to memory of 3732 3012 504f86acec82be7ee36410b7f2c9aec444b2bb183ca3ac41ee02390defef66caN.exe k2N37.exe PID 3732 wrote to memory of 2132 3732 k2N37.exe K9r48.exe PID 3732 wrote to memory of 2132 3732 k2N37.exe K9r48.exe PID 3732 wrote to memory of 2132 3732 k2N37.exe K9r48.exe PID 2132 wrote to memory of 3000 2132 K9r48.exe 1u82N5.exe PID 2132 wrote to memory of 3000 2132 K9r48.exe 1u82N5.exe PID 2132 wrote to memory of 3000 2132 K9r48.exe 1u82N5.exe PID 3000 wrote to memory of 2688 3000 1u82N5.exe skotes.exe PID 3000 wrote to memory of 2688 3000 1u82N5.exe skotes.exe PID 3000 wrote to memory of 2688 3000 1u82N5.exe skotes.exe PID 2132 wrote to memory of 4884 2132 K9r48.exe 2a8757.exe PID 2132 wrote to memory of 4884 2132 K9r48.exe 2a8757.exe PID 2132 wrote to memory of 4884 2132 K9r48.exe 2a8757.exe PID 3732 wrote to memory of 3656 3732 k2N37.exe 3t18l.exe PID 3732 wrote to memory of 3656 3732 k2N37.exe 3t18l.exe PID 3732 wrote to memory of 3656 3732 k2N37.exe 3t18l.exe PID 3656 wrote to memory of 4860 3656 3t18l.exe cmd.exe PID 3656 wrote to memory of 4860 3656 3t18l.exe cmd.exe PID 3656 wrote to memory of 4860 3656 3t18l.exe cmd.exe PID 3012 wrote to memory of 3564 3012 504f86acec82be7ee36410b7f2c9aec444b2bb183ca3ac41ee02390defef66caN.exe 4d625l.exe PID 3012 wrote to memory of 3564 3012 504f86acec82be7ee36410b7f2c9aec444b2bb183ca3ac41ee02390defef66caN.exe 4d625l.exe PID 3012 wrote to memory of 3564 3012 504f86acec82be7ee36410b7f2c9aec444b2bb183ca3ac41ee02390defef66caN.exe 4d625l.exe PID 4860 wrote to memory of 2212 4860 cmd.exe timeout.exe PID 4860 wrote to memory of 2212 4860 cmd.exe timeout.exe PID 4860 wrote to memory of 2212 4860 cmd.exe timeout.exe PID 3564 wrote to memory of 420 3564 4d625l.exe taskkill.exe PID 3564 wrote to memory of 420 3564 4d625l.exe taskkill.exe PID 3564 wrote to memory of 420 3564 4d625l.exe taskkill.exe PID 3564 wrote to memory of 4388 3564 4d625l.exe taskkill.exe PID 3564 wrote to memory of 4388 3564 4d625l.exe taskkill.exe PID 3564 wrote to memory of 4388 3564 4d625l.exe taskkill.exe PID 2688 wrote to memory of 2784 2688 skotes.exe 2e9a1461b1.exe PID 2688 wrote to memory of 2784 2688 skotes.exe 2e9a1461b1.exe PID 2688 wrote to memory of 2784 2688 skotes.exe 2e9a1461b1.exe PID 3564 wrote to memory of 3184 3564 4d625l.exe taskkill.exe PID 3564 wrote to memory of 3184 3564 4d625l.exe taskkill.exe PID 3564 wrote to memory of 3184 3564 4d625l.exe taskkill.exe PID 3564 wrote to memory of 960 3564 4d625l.exe taskkill.exe PID 3564 wrote to memory of 960 3564 4d625l.exe taskkill.exe PID 3564 wrote to memory of 960 3564 4d625l.exe taskkill.exe PID 3564 wrote to memory of 2996 3564 4d625l.exe taskkill.exe PID 3564 wrote to memory of 2996 3564 4d625l.exe taskkill.exe PID 3564 wrote to memory of 2996 3564 4d625l.exe taskkill.exe PID 3564 wrote to memory of 3652 3564 4d625l.exe firefox.exe PID 3564 wrote to memory of 3652 3564 4d625l.exe firefox.exe PID 3652 wrote to memory of 4948 3652 firefox.exe firefox.exe PID 3652 wrote to memory of 4948 3652 firefox.exe firefox.exe PID 3652 wrote to memory of 4948 3652 firefox.exe firefox.exe PID 3652 wrote to memory of 4948 3652 firefox.exe firefox.exe PID 3652 wrote to memory of 4948 3652 firefox.exe firefox.exe PID 3652 wrote to memory of 4948 3652 firefox.exe firefox.exe PID 3652 wrote to memory of 4948 3652 firefox.exe firefox.exe PID 3652 wrote to memory of 4948 3652 firefox.exe firefox.exe PID 3652 wrote to memory of 4948 3652 firefox.exe firefox.exe PID 3652 wrote to memory of 4948 3652 firefox.exe firefox.exe PID 3652 wrote to memory of 4948 3652 firefox.exe firefox.exe PID 4948 wrote to memory of 5056 4948 firefox.exe firefox.exe PID 4948 wrote to memory of 5056 4948 firefox.exe firefox.exe PID 4948 wrote to memory of 5056 4948 firefox.exe firefox.exe PID 4948 wrote to memory of 5056 4948 firefox.exe firefox.exe PID 4948 wrote to memory of 5056 4948 firefox.exe firefox.exe PID 4948 wrote to memory of 5056 4948 firefox.exe firefox.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\504f86acec82be7ee36410b7f2c9aec444b2bb183ca3ac41ee02390defef66caN.exe"C:\Users\Admin\AppData\Local\Temp\504f86acec82be7ee36410b7f2c9aec444b2bb183ca3ac41ee02390defef66caN.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\k2N37.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\k2N37.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\K9r48.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\K9r48.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1u82N5.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1u82N5.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\1005094001\2e9a1461b1.exe"C:\Users\Admin\AppData\Local\Temp\1005094001\2e9a1461b1.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2784 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"7⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5328 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x160,0x164,0x168,0x13c,0x16c,0x7ffb3b94cc40,0x7ffb3b94cc4c,0x7ffb3b94cc588⤵PID:2592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1884,i,14548639221594447103,454035903154981507,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1880 /prefetch:28⤵PID:6508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2068,i,14548639221594447103,454035903154981507,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1968 /prefetch:38⤵PID:6516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2268,i,14548639221594447103,454035903154981507,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2456 /prefetch:88⤵PID:3136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3188,i,14548639221594447103,454035903154981507,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3200 /prefetch:18⤵
- Uses browser remote debugging
PID:5836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3300,i,14548639221594447103,454035903154981507,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3452 /prefetch:18⤵
- Uses browser remote debugging
PID:5868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4296,i,14548639221594447103,454035903154981507,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3172 /prefetch:18⤵
- Uses browser remote debugging
PID:6112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4696,i,14548639221594447103,454035903154981507,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4740 /prefetch:88⤵PID:6148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4800,i,14548639221594447103,454035903154981507,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4812 /prefetch:88⤵PID:6192
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4416
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:6720
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2784 -s 9487⤵
- Program crash
PID:4448
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Local\Temp\1005203011\clip.dll, Main6⤵
- Blocklisted process makes network request
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:6832
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Local\Temp\1005204011\clip64.dll, Main6⤵
- Blocklisted process makes network request
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5688
-
-
C:\Users\Admin\AppData\Local\Temp\1005217001\bf94938317.exe"C:\Users\Admin\AppData\Local\Temp\1005217001\bf94938317.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5872
-
-
C:\Users\Admin\AppData\Local\Temp\1005218001\1d9970e157.exe"C:\Users\Admin\AppData\Local\Temp\1005218001\1d9970e157.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:6136
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"6⤵PID:6340
-
-
C:\Users\Admin\AppData\Local\Temp\1005220001\8bcc282f6d.exe"C:\Users\Admin\AppData\Local\Temp\1005220001\8bcc282f6d.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6436
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2a8757.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2a8757.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4884
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3t18l.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3t18l.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3t18l.exe" & del "C:\ProgramData\*.dll"" & exit4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Windows\SysWOW64\timeout.exetimeout /t 55⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2212
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4d625l.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4d625l.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:420
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4388
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3184
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:960
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2996
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking3⤵
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking4⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2020 -parentBuildID 20240401114208 -prefsHandle 1956 -prefMapHandle 1948 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8f97c1ab-6195-48a3-ab7c-830f5840affe} 4948 "\\.\pipe\gecko-crash-server-pipe.4948" gpu5⤵PID:5056
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2456 -parentBuildID 20240401114208 -prefsHandle 2432 -prefMapHandle 2416 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {abf1ae05-38eb-41df-abd6-59dfa9c0851c} 4948 "\\.\pipe\gecko-crash-server-pipe.4948" socket5⤵PID:3852
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3088 -childID 1 -isForBrowser -prefsHandle 3244 -prefMapHandle 2952 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 948 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {774905e3-f577-467d-b4d1-defeb0467c67} 4948 "\\.\pipe\gecko-crash-server-pipe.4948" tab5⤵PID:3988
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3600 -childID 2 -isForBrowser -prefsHandle 3580 -prefMapHandle 2700 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 948 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fc48cc25-7b3e-40cf-9d3e-e60fe9368bfc} 4948 "\\.\pipe\gecko-crash-server-pipe.4948" tab5⤵PID:804
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4552 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4428 -prefMapHandle 4468 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f7d44e2e-930c-41b9-8c72-3c7ab83eb9cd} 4948 "\\.\pipe\gecko-crash-server-pipe.4948" utility5⤵
- Checks processor information in registry
PID:6692
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5740 -childID 3 -isForBrowser -prefsHandle 5728 -prefMapHandle 5732 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 948 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fc71a94c-91f3-4ca4-92a0-ed7f66161c1a} 4948 "\\.\pipe\gecko-crash-server-pipe.4948" tab5⤵PID:5380
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5792 -childID 4 -isForBrowser -prefsHandle 5872 -prefMapHandle 5868 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 948 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {799f9f78-b2a7-43a5-b65b-1057e0a26f02} 4948 "\\.\pipe\gecko-crash-server-pipe.4948" tab5⤵PID:5392
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6068 -childID 5 -isForBrowser -prefsHandle 5988 -prefMapHandle 5996 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 948 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {47f68072-d6e7-48ce-9924-95a65b59b9c5} 4948 "\\.\pipe\gecko-crash-server-pipe.4948" tab5⤵PID:5412
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1796
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:5984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2784 -ip 27841⤵PID:6728
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5236
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5680
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
676KB
MD5eda18948a989176f4eebb175ce806255
SHA1ff22a3d5f5fb705137f233c36622c79eab995897
SHA25681a4f37c5495800b7cc46aea6535d9180dadb5c151db6f1fd1968d1cd8c1eeb4
SHA512160ed9990c37a4753fc0f5111c94414568654afbedc05308308197df2a99594f2d5d8fe511fd2279543a869ed20248e603d88a0b9b8fb119e8e6131b0c52ff85
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\activity-stream.discovery_stream.json
Filesize25KB
MD58091cbe73bc1e700176e4226704bacb9
SHA1aef595d2b10e1a09bba851d71f22eaca225c3485
SHA256a670c008fe213de31b71170c35c6ec8ff3a4b99c19171d0cd433581686ba7afe
SHA51216ea16848d0e2e24c3becf8c57699b580ba55aade1b4e2e17b1ebbc266b81e71d591f12f9b2d4801dd99b478cc219b4739da4de51be59e67c5085510179fbbe4
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\cache2\entries\D500AD994A7515157BB2A6ADD5B18B754E4D2F99
Filesize13KB
MD57cc55402942a58d7850abf2e53b91182
SHA1cfb7294bf1abcb91fa4f2e16e0d434521fbcb3d4
SHA256ae85b1973b2c6fc7a2ef4a49e860988fa742adc396fbe6605d32dbd1232222b6
SHA512ba169f5fc1511742e970ca1e0a2735fd24ca68418fb292641c2ab1e86a8a07fad411611c3902bdc76b6cff4277c8322869c197a1c6873da8f605d2fa615ebe2b
-
Filesize
4.2MB
MD57391642526bf8b664f23312c4a8468ea
SHA11d3f259dab15505cbd90c4c08a95d16ed3148da9
SHA2560d3141560ca1e293597d20822fce393602a54a8f7035691bf54de0d37f05ad57
SHA5120ccc0f02925ea156b54f751b2d20a9dea4fdf6dfce8d2fd9efadfb29af7c12bef8bee8976c2550a492f26dbcc7728e680462e6831025489047c674e3749bc256
-
Filesize
124KB
MD50d3418372c854ee228b78e16ea7059be
SHA1c0a29d4e74d39308a50f4fd21d0cca1f98cb02c1
SHA256885bf0b3b12b77ef3f953fbb48def1b45079faa2a4d574ee16afdbafa1de3ac7
SHA512e30dced307e04ae664367a998cd1ba36349e99e363f70897b5d90c898de2c69c393182c3afba63a74956b5e6f49f0635468e88ed31dd1e3c86c21e987ddd2c19
-
Filesize
3.1MB
MD5ae39ef9a549cc7feb4940602f7f9af7c
SHA1e21be4946cf27c0233b6b6f5b3eed263d57c2409
SHA2569b5a19b5881182e956feb0acb69f8fa8dc79cad29296359694e8cf458148d2ab
SHA512c34b5ba05881724c1f7499e8e9248700d1b931e1560a9462fa1b26d3ccccb7a5222b92e6410c86b230753dedd9619bc4751a6bcc9888bfa770e4032165644730
-
Filesize
1.7MB
MD538f7509d769058697f81ef17cfbe8c87
SHA138e2634c714fccf57ea1d5b27188f2c77f86e2db
SHA256daf5ec940fde5a1df665a7240a0e27d3c39da5b62d4d1935579158fa2a095b00
SHA51206e70d5f8cb7bb447a8d6a0e961186cf2928a06cbbdc0ac5a4e5845e896f8e104752bc64ee089bd7cef6be20dc1c3f655fa07beeb0b81cc47e606bb47cd5bf9f
-
Filesize
2.7MB
MD5954cc441db8729cb9f76fda40fe5b13a
SHA1137d1f5fd4778c4bd49d98f63428a985485bcfaa
SHA256c2494f884675bda9996b5a1a777c345e73392eb6c0d0ed2eccaaaea0514a912d
SHA5128a64d8b047e83c364b50c7e1935efacc782beaf033917210ebda1db9c9679b3aa992c3b0bcbc38da93e374d708b0d4409a81bdd4bc43d8a1ccaec392035703f1
-
Filesize
898KB
MD5bfff0711dc710a768efb377ec52d8675
SHA1cdae3316ae15804e7c9f3b5df4633cdba705e358
SHA256349f42274af7381354ebcfe56b2a9b5603bece7ed39c62b40cba761f62c2cc73
SHA5127bcfa71b2a38b5b58afb4ceb042ed81d28134f02129635814e3c7ef717f88dbfcf47d61bca7cf03ce50b0be51e889d8e0b9089afb7710e7e011ba581c9329a93
-
Filesize
5.5MB
MD50372a123854297e31819ebb75dcbc937
SHA1e1bd5ab7480e19373ebb3cfb4e8be17944233b74
SHA256780ac9a949443dee3126b6131ff38ae6adec11d31756cc4bf3cb4e5ac5ff42e9
SHA512cba7076b2a69168b893cd511d3d0f6984deec30601f5433a1f8698ea936282862d021fe6f5e97dcf5c927ab2cede9c40abad7ecf0c852a6303fc417e80128b51
-
Filesize
2.0MB
MD5419b00e8e66411cb60175e8d8b41d92d
SHA125380d5b02809bc7d24beca859fd9ef1cc5441d4
SHA256ee65744917796f7b801c5680c7e94e96674954e1fce7bfffcfb033fd63330b18
SHA512774332a144fd9890e364b48192b7dd0f3e8c61121fe680ea74ed981afba43c8869dfc504d54992c5351592e5408bee44e6a97ddbf151abf6caf7028f44ff637b
-
Filesize
3.4MB
MD5b97b0d42cef76914fe4320eccb930149
SHA1a84d2031dc628b5353a47330be88a98bc441f7e8
SHA25690778a3e7a5fdd5ed27b4910863e7013895ff4ed83d8012709b67bd96a0603fe
SHA5128a4dc388b9b8e42142c68d90c238e4241e29f23d7418675e31d17ec6c39b6da957bb4f1b69508e9fb70fee8503a476b0749d787f36f779d14bfa09de33813953
-
Filesize
3.1MB
MD5c0eb69c029d2b0e48a7a5338fc4e4fc1
SHA1473e4b3cb7abfba1589ac422d5282145773867b9
SHA2563f5a0e5921dd0df6d005556a63b4d711ff1301846d570b6d6a094b3a2b71bcf2
SHA512671cfde8d99a8ab4a4516eaa803af07a00e3465df9c568c76c9a59286bfd7892305567290c4a31003d939fa65d0d244e875d2c61a6fda926cdc62b413908ce75
-
Filesize
3.0MB
MD53ac7ecc0a4a6ed2dc30890cd47a5c030
SHA10c2234c4a1bdec6ce59b700a956a6833a6712289
SHA2564fbb4d263c460c3fddf3341d79f5bf842e851c555e3637a2859b744b6078d6cb
SHA5123c9f1e6935e3d3f1af26449f5c2b34931790c417d9ae28d559ba67f595cc813d1f44cc566166b24035af4fb6a7644552c776e1c8b0b355fbe1124e16da89cc6b
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin
Filesize6KB
MD587c3bc80fc37dbc6a105497ffb966b12
SHA1224d4393ba6def9fb2c7d18519fe19cf77423e13
SHA2563de4de84ab7904508effe26ab7c1070b38131aac3982f21102e911b2d468c0fe
SHA512da8624a4a20c27f17a9ac05e627641af32376d6de07a50194f1f37c0f7646c7d8a474a02be00276288b501d0550cc03477b91de61d81f3a91c8c5e3cc36b8073
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin
Filesize10KB
MD5a0cfafdef5f3fddd6c4338c3f26d137a
SHA18481fa845876560ca7422a789bedc719f5ed59f5
SHA2564be9cd379f7f2b056e855d87a03b58dac70cb0ff6a87d7ef8e70d573548d002e
SHA512fabdafdd55ab6bbcd0cbdfea7c127ee5583921fd9f5aa74d8d458fa1a4721990d2569cc9aad88576d135ec9253babe42fe551a53fb462d9a6d85d72ab36ee317
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.bin
Filesize23KB
MD5e082d07689d520915cb342502ba75bd3
SHA14cc065c2802ab239e8961bb06d84d3edf160c4d9
SHA256c2c04a4887af75bb136b37aebf8bcf489e3767b4ba0039c598f69d56b27eb365
SHA5125f8d2ba722fa13f277a0a5860574797e978273c442a3e2e638802e4dd7a1241dc0a90779b82e73baf83a6dcd394a607ab622e941d893bbfb96f75fc0ff463c1e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.bin
Filesize5KB
MD509fc67eb3e6a6830e7192ff88c2165a8
SHA1ee0ca19c6fcbf336c4333f62fe04dfe089d359e8
SHA256086f63c8a3f8dca0a8cdbde4f11bc7e40e24d0dff154989e9fb774f631ce8030
SHA5129a667b4cf34e34fa7a8a5d7020e6e4a09ba9ca230414a19f7b5f2e98de07a4d0a726b86c705d2d9bc8d3c3ee5f65d60ac385e698ae47a9ba44b36497c0dc8fd5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.bin
Filesize15KB
MD5ae6c128eb4f46ccc721569888baa377e
SHA1d3afd3f516ffbc3b219eaab9fc9c7dd608a66e08
SHA256a0aed814a3fa6cfb3355be00b7f1f14abf605c4f06618473faa64e1db1f4c345
SHA512a44d91c3dc5d95bcff515f8cd4d17da8c4f85002d54e92d96c4ea4c74ed8b14c9f99a428cdf556a5b24845271ec14c5c34ec8b2ed3393e2d7f87ff156b3cf3f0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.bin
Filesize6KB
MD5c89c4b59f02f22b4ba08dc814b0df5cd
SHA120c4090b107c80b0f92618b35dac5dde2dda1bc9
SHA256d6bc4ca3b35d31b043f961883b5d6daf4224fcac5077014574c8df5d55aec5b5
SHA512efa876d16196db845f16977d886376634e069f5978f4f5ef5cb83b65621ffc7bcc38966f281c8e2ebb1724412913a7f3c2b55ab4db6e2922abaf4fa9f304019c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD556ff461eb63087a493d05b6fe561fa4f
SHA123956a386882f61b6d1fb7aac0d76e3654db4953
SHA25659c15441fdc1690a846a5f727bbc513c748c600410732ad36c88139653e9840c
SHA512ac918ea3da5123fb97275d5280bd7a82a11ae181152d4440db0c3fd2e7bcb3db0c0496c4415dbfdcf3bd25960b0442f5430f039d654870efd4e8b6391a093faa
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5ea39820072c6e41b66a236ad4c95d6e4
SHA1746e27b57f653b56d1d81aed8bda9e6aa67b5fa2
SHA2565f6743d3d10d8679eccc2ae08407f9e525b66e0e3f79cb0db5ca1f5725fbeecb
SHA512eb9bc893cc81e943657dca518bfb21303262de9365ddc7b2a7d9618b38ba62c23f9999de5e203f76a50c21b091fbf1624829cedbf46e213c387953768e4d7173
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5037cd3e51fa9a172b4427c4a39bc6778
SHA1b3a30b5a2c5735abb52f07643886e8dfc17c3510
SHA2566d5cbf44e49e938ce484884a9f5716367f5652292b5fa229b5957c96e6ed1434
SHA5125213ea5a7576e1e23233108425641b4b77146d77607745d34bb62326add8b39202112d8df2ee95a1ea485592a2622c3f804460991356cf1d6cf26ab38b7a1507
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD52a01b376753cb811c7ea4db221a45b39
SHA1a2478d35f4e5f048d2f9cc2ca5f79fc67aa9aa0e
SHA256aaf139d6a8aa801f7aab7fb49e2dc83022584084e49abebe5e82bbbe60ca3cc1
SHA51205c5302d52c25e0eba4c575338587d2ccbb6fa6405060135ae7d996d9e7dfef1ac638086c45372c66003e6ab1d5d12ed56caa553dbaa3b96ac97bf6bcdb730d5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5df9451c7d377d0e6510d0213bf307fac
SHA19bd035a0e26fd716d5378deac73f237a6cb990a1
SHA256fce3ec269f1aa7a242398b353817f2372bdc565d5347017560a0640251ed80bc
SHA512775438c6f3ccd9657c27adfcdc148e229e0a5e90fb2e6a986709393a88de9e6397999873e107b4db822dff30ed8844f98d72a794317a94fb8940f805f661532f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD57d2607a080aef67a54c8f656b77942c9
SHA17951ef29fb5bd3ff27a6940b9ac1fa69babbf85c
SHA25667208ae51f7c95d00baeef9d57c393c4ae3573b0833a5c080385de1b1782b331
SHA512b0f33ead02ee0d7637bebd8b3dbeebc130c7a11a9cb044a46a4b2dab2e72b1200c206c162386b5a23a889eeb2f4f28dafb0eba7db1f76249106ebb0df274c4a6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\22f28d98-8273-44f3-8652-acca25cb362d
Filesize29KB
MD5e65f2c38806226cf113ac90b393364b3
SHA1210214ddf2e1ae7735c38cbd83693b7bc91bd8ff
SHA256a64070b9d1ff04b91659982c0ec37dca2352ec3bae5128d2394b4fb502a6e7c0
SHA512f812208f7fd5442085b514e1ab3ec8270f21702f9a34793222d6d89c0b1cc2aba2c3b98add2d29651ce3532e2178f241a08a66859ac9ced9514ada9b9962e768
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\acaf66f3-4406-4c49-9fb8-2e43c8ab55ad
Filesize982B
MD52dadd3bce4c2d3ededf2167af523a14d
SHA1d210cb737a64c18602ad3be1b69e0317014aff06
SHA2562904cb4c0209b21f036f424d4947849f460875c97382cdb5c123e073f7ed2d04
SHA512130f13f4122c5960d9ef0975380b8240c51cda863367baa1293aa9a1f633169f571a18bc21927076f877c7d7678d2fcc625cca6f6c3995f1fee9abc96105a37c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\d22f2e18-3e77-45fd-994a-6fe6b38aff76
Filesize671B
MD5481edc16c58ae45fce2e9e4554595c09
SHA117577cd683c404dbf1bc28fc9125501c6473b5ff
SHA2568542c653d5219fef8aacefe10d1b5dbae1d76f8aebb3598e904dc9714feebb6b
SHA5121043f91184dc80e0808f923d919a3dba86fcd5b6c012fa0a6df9e855333e310b9dbff0c2b90d2e803b01091834088052ef27af5eb2e40c59477af4f35955b0c5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD58df51f4da2fadc751c84c7654e45aaf5
SHA15df22c5e3e076c2f43d936f0f197ecd9ca0af563
SHA2569e91cbf8d8a91df4479cfff3c077393dc104bcb464d7ce3125ab328fcd230e62
SHA5123342c66546953c167b387c8032580b5683c2a93047d9ab5636fdd618b54623de526f2cb59de38ab1477e4e27b014e1e53408a3b087982ec94a1d32922ff3e63c
-
Filesize
15KB
MD5d1311fb6e84909c1fa8df232f6cd53b4
SHA17fcc279552c0c433486ddcc89680e10fa022debe
SHA256c56a45751c1ac8933332c3ef78483b4a3678551978e701cefd008609040c0604
SHA51260f7b2c8821d1f7472a15cc9d791a71fcd7154752975dc505c28da86ddf550712d7741a74198e55a834bbc4922e6c98c6b8186762dd68927561c49bb895ec96a
-
Filesize
11KB
MD58ffc1b7791b4906e3ee2989020b281c5
SHA15ba6746b4a955047be25090005e00a6f7979adab
SHA2568c3149aff0f31520850b70fb0b741d09f74e210168d8fbdd7f7265d534197870
SHA512200dff64014cd085a1b269f84b3676afd203858b40b52f3aa8effa36a2eb327ea6ea0e67541417fe696e23374933912f5623cff7ccb0bc70e939bd185bf0b198
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize920KB
MD509e262144ab7289a8eff2f0daf5a7ebf
SHA1089198a60149913b0687e12e353593c0707d759f
SHA256dcbb43c50f973caf3e9e4a295056d77cbb9b04aaf1ea6eb367fab859af7d7dfe
SHA512e230c3bf3f307b19b5ac5dee3d73df656ed63d3bcdcb95d2cea7965a080a63ae29021602ad7b3c02a37e789f7e75c0bde3f51277501db942c842ec8a390ab2ca
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e