Analysis
-
max time kernel
149s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 22:07
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240729-en
General
-
Target
file.exe
-
Size
1.8MB
-
MD5
efa562638c762ca57f68c4e25e85718b
-
SHA1
0ae937ac0181e5510953395bd57c04e89f8001f4
-
SHA256
7a2be1766fe207a4736269f982b6708c9392ae418683298ef6544d0ddb85596a
-
SHA512
9086ded9ac09a4eb556294495e8035ef1dc1757b2ebfcbda50a5b721a7fd9e3e19db56e1892cb5466e09e11f458c551babca8efcc41ac3a0c320b65f3125f23e
-
SSDEEP
49152:5W91Z2uLsFeB979bEYiVtk8g/Tn7KFPcV316PW:0H20P97+YQb67KxwF
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Processes:
401b944e01.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 401b944e01.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 401b944e01.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 401b944e01.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 401b944e01.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 401b944e01.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 401b944e01.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
Processes:
skotes.exefile.exe7e1c5fd43d.exe3df54d5c05.exe401b944e01.exeac6fdfa9fc.exeskotes.exeLumma111.exeskotes.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7e1c5fd43d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3df54d5c05.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 401b944e01.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ac6fdfa9fc.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Lumma111.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
Processes:
chrome.exechrome.exechrome.exechrome.exepid process 17252 chrome.exe 18340 chrome.exe 18348 chrome.exe 11816 chrome.exe -
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule C:\Program Files (x86)\ABC S5 Proxy\abcs5.dll acprotect -
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Lumma111.exeskotes.exeac6fdfa9fc.exeskotes.exe7e1c5fd43d.exe3df54d5c05.exe401b944e01.exefile.exeskotes.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Lumma111.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ac6fdfa9fc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Lumma111.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7e1c5fd43d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3df54d5c05.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 401b944e01.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7e1c5fd43d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3df54d5c05.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ac6fdfa9fc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 401b944e01.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
file.exeskotes.exeproxy146.tmpac6fdfa9fc.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation file.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation proxy146.tmp Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation ac6fdfa9fc.exe -
Drops startup file 1 IoCs
Processes:
AbcProxy.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ABC S5 Proxy.lnk AbcProxy.exe -
Executes dropped EXE 13 IoCs
Processes:
skotes.exeLumma111.exeskotes.exeproxy146.exeproxy146.tmp7e1c5fd43d.exe3df54d5c05.exe769a609553.exe401b944e01.exeAbcProxy.exeac6fdfa9fc.exeskotes.exeservice123.exepid process 2348 skotes.exe 2184 Lumma111.exe 3952 skotes.exe 4164 proxy146.exe 4528 proxy146.tmp 5096 7e1c5fd43d.exe 1776 3df54d5c05.exe 5072 769a609553.exe 1312 401b944e01.exe 740 AbcProxy.exe 4480 ac6fdfa9fc.exe 5736 skotes.exe 10224 service123.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
3df54d5c05.exeskotes.exefile.exeskotes.exeLumma111.exeskotes.exe7e1c5fd43d.exe401b944e01.exeac6fdfa9fc.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 3df54d5c05.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine file.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine Lumma111.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 7e1c5fd43d.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 401b944e01.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine ac6fdfa9fc.exe -
Loads dropped DLL 47 IoCs
Processes:
AbcProxy.exeservice123.exepid process 740 AbcProxy.exe 740 AbcProxy.exe 740 AbcProxy.exe 740 AbcProxy.exe 740 AbcProxy.exe 740 AbcProxy.exe 740 AbcProxy.exe 740 AbcProxy.exe 740 AbcProxy.exe 740 AbcProxy.exe 740 AbcProxy.exe 740 AbcProxy.exe 740 AbcProxy.exe 740 AbcProxy.exe 740 AbcProxy.exe 740 AbcProxy.exe 740 AbcProxy.exe 740 AbcProxy.exe 740 AbcProxy.exe 740 AbcProxy.exe 740 AbcProxy.exe 740 AbcProxy.exe 740 AbcProxy.exe 740 AbcProxy.exe 740 AbcProxy.exe 740 AbcProxy.exe 740 AbcProxy.exe 740 AbcProxy.exe 740 AbcProxy.exe 740 AbcProxy.exe 740 AbcProxy.exe 740 AbcProxy.exe 740 AbcProxy.exe 740 AbcProxy.exe 740 AbcProxy.exe 740 AbcProxy.exe 740 AbcProxy.exe 740 AbcProxy.exe 740 AbcProxy.exe 740 AbcProxy.exe 740 AbcProxy.exe 740 AbcProxy.exe 740 AbcProxy.exe 740 AbcProxy.exe 740 AbcProxy.exe 740 AbcProxy.exe 10224 service123.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
401b944e01.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 401b944e01.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 401b944e01.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
skotes.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\3df54d5c05.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007765001\\3df54d5c05.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\769a609553.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007766001\\769a609553.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\401b944e01.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007767001\\401b944e01.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\7e1c5fd43d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007764001\\7e1c5fd43d.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\1007766001\769a609553.exe autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
Processes:
file.exeskotes.exeLumma111.exeskotes.exe7e1c5fd43d.exe3df54d5c05.exe401b944e01.exeac6fdfa9fc.exeskotes.exepid process 1904 file.exe 2348 skotes.exe 2184 Lumma111.exe 3952 skotes.exe 5096 7e1c5fd43d.exe 1776 3df54d5c05.exe 1312 401b944e01.exe 4480 ac6fdfa9fc.exe 5736 skotes.exe -
Processes:
resource yara_rule behavioral2/memory/740-3106-0x000000006E8F0000-0x000000006F375000-memory.dmp upx C:\Program Files (x86)\ABC S5 Proxy\abcs5.dll upx behavioral2/memory/740-9796-0x000000006E8F0000-0x000000006F375000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
Processes:
proxy146.tmpdescription ioc process File created C:\Program Files (x86)\ABC S5 Proxy\abcdriver\is-29SBK.tmp proxy146.tmp File created C:\Program Files (x86)\ABC S5 Proxy\country_image\is-9UN8G.tmp proxy146.tmp File created C:\Program Files (x86)\ABC S5 Proxy\QtGraphicalEffects\is-8O6RH.tmp proxy146.tmp File created C:\Program Files (x86)\ABC S5 Proxy\QtGraphicalEffects\is-FL7NI.tmp proxy146.tmp File created C:\Program Files (x86)\ABC S5 Proxy\QtGraphicalEffects\is-6LK50.tmp proxy146.tmp File created C:\Program Files (x86)\ABC S5 Proxy\QtQuick\Controls\Styles\Base\is-J02C4.tmp proxy146.tmp File created C:\Program Files (x86)\ABC S5 Proxy\QtQuick\Controls.2\Universal\is-NU4VF.tmp proxy146.tmp File created C:\Program Files (x86)\ABC S5 Proxy\QtQuick\Controls.2\Universal\is-RMUED.tmp proxy146.tmp File created C:\Program Files (x86)\ABC S5 Proxy\is-LCS4T.tmp proxy146.tmp File created C:\Program Files (x86)\ABC S5 Proxy\Qt\labs\settings\is-O3595.tmp proxy146.tmp File created C:\Program Files (x86)\ABC S5 Proxy\QtQuick\Controls\Styles\Base\is-KL58A.tmp proxy146.tmp File created C:\Program Files (x86)\ABC S5 Proxy\QtQuick\Controls\Styles\Base\images\is-H9T9H.tmp proxy146.tmp File created C:\Program Files (x86)\ABC S5 Proxy\QtQuick\Controls.2\is-OKB3I.tmp proxy146.tmp File created C:\Program Files (x86)\ABC S5 Proxy\QtQuick\Controls.2\Material\is-0L5T8.tmp proxy146.tmp File created C:\Program Files (x86)\ABC S5 Proxy\QtQuick\Extras\is-BAB48.tmp proxy146.tmp File created C:\Program Files (x86)\ABC S5 Proxy\is-SK6JL.tmp proxy146.tmp File created C:\Program Files (x86)\ABC S5 Proxy\is-1L92M.tmp proxy146.tmp File created C:\Program Files (x86)\ABC S5 Proxy\QtQuick\Controls.2\is-QB2KV.tmp proxy146.tmp File created C:\Program Files (x86)\ABC S5 Proxy\QtQuick\Controls.2\Universal\is-ENLS6.tmp proxy146.tmp File opened for modification C:\Program Files (x86)\ABC S5 Proxy\imageformats\qjpeg.dll proxy146.tmp File created C:\Program Files (x86)\ABC S5 Proxy\country_image\is-509KI.tmp proxy146.tmp File created C:\Program Files (x86)\ABC S5 Proxy\QtGraphicalEffects\is-5ULOT.tmp proxy146.tmp File created C:\Program Files (x86)\ABC S5 Proxy\QtQuick\Controls\Private\is-25SK8.tmp proxy146.tmp File created C:\Program Files (x86)\ABC S5 Proxy\QtQuick\Controls.2\Universal\is-7MOIU.tmp proxy146.tmp File opened for modification C:\Program Files (x86)\ABC S5 Proxy\api-ms-win-core-shlwapi-obsolete-l1-1-0.dll proxy146.tmp File created C:\Program Files (x86)\ABC S5 Proxy\country_image\is-14T84.tmp proxy146.tmp File created C:\Program Files (x86)\ABC S5 Proxy\QtGraphicalEffects\is-5E04B.tmp proxy146.tmp File created C:\Program Files (x86)\ABC S5 Proxy\QtQuick\Controls.2\Universal\is-EAR2T.tmp proxy146.tmp File created C:\Program Files (x86)\ABC S5 Proxy\QtQuick\Controls.2\Universal\is-BRN9C.tmp proxy146.tmp File created C:\Program Files (x86)\ABC S5 Proxy\QtQuick\Controls\Styles\Base\is-IN8IB.tmp proxy146.tmp File created C:\Program Files (x86)\ABC S5 Proxy\QtQuick\Controls\Styles\Flat\is-S8UVS.tmp proxy146.tmp File opened for modification C:\Program Files (x86)\ABC S5 Proxy\api-ms-win-core-interlocked-l1-1-0.dll proxy146.tmp File opened for modification C:\Program Files (x86)\ABC S5 Proxy\api-ms-win-core-io-l1-1-1.dll proxy146.tmp File opened for modification C:\Program Files (x86)\ABC S5 Proxy\api-ms-win-core-synch-l1-1-0.dll proxy146.tmp File created C:\Program Files (x86)\ABC S5 Proxy\country_image\is-H4LIE.tmp proxy146.tmp File created C:\Program Files (x86)\ABC S5 Proxy\QtQuick\Controls\is-FFE36.tmp proxy146.tmp File created C:\Program Files (x86)\ABC S5 Proxy\QtQuick\Controls\Private\is-GMRO5.tmp proxy146.tmp File created C:\Program Files (x86)\ABC S5 Proxy\QtQuick\Controls.2\Universal\is-CRMGT.tmp proxy146.tmp File created C:\Program Files (x86)\ABC S5 Proxy\QtQuick\Extras\is-HHUS7.tmp proxy146.tmp File opened for modification C:\Program Files (x86)\ABC S5 Proxy\api-ms-win-core-errorhandling-l1-1-1.dll proxy146.tmp File opened for modification C:\Program Files (x86)\ABC S5 Proxy\Qt5QuickControls2.dll proxy146.tmp File created C:\Program Files (x86)\ABC S5 Proxy\QtQuick\Controls.2\is-LLGK5.tmp proxy146.tmp File created C:\Program Files (x86)\ABC S5 Proxy\QtQuick\Controls.2\Universal\is-7PV8Q.tmp proxy146.tmp File created C:\Program Files (x86)\ABC S5 Proxy\QtQuick\Controls.2\Universal\is-EKQ9C.tmp proxy146.tmp File created C:\Program Files (x86)\ABC S5 Proxy\is-ADN4Q.tmp proxy146.tmp File created C:\Program Files (x86)\ABC S5 Proxy\abcdriver\is-H92B2.tmp proxy146.tmp File created C:\Program Files (x86)\ABC S5 Proxy\country_image\is-V458V.tmp proxy146.tmp File created C:\Program Files (x86)\ABC S5 Proxy\country_image\is-C8FHP.tmp proxy146.tmp File created C:\Program Files (x86)\ABC S5 Proxy\QtQuick\Dialogs\qml\is-LPVVA.tmp proxy146.tmp File opened for modification C:\Program Files (x86)\ABC S5 Proxy\audio\qtaudio_windows.dll proxy146.tmp File created C:\Program Files (x86)\ABC S5 Proxy\country_image\is-3SGHQ.tmp proxy146.tmp File created C:\Program Files (x86)\ABC S5 Proxy\QtGraphicalEffects\is-P58IE.tmp proxy146.tmp File created C:\Program Files (x86)\ABC S5 Proxy\QtGraphicalEffects\private\is-84EBV.tmp proxy146.tmp File created C:\Program Files (x86)\ABC S5 Proxy\country_image\is-C13O8.tmp proxy146.tmp File created C:\Program Files (x86)\ABC S5 Proxy\QtQuick\Controls\Styles\Base\is-C390G.tmp proxy146.tmp File created C:\Program Files (x86)\ABC S5 Proxy\QtQuick\Controls\Styles\Base\is-SPTTH.tmp proxy146.tmp File created C:\Program Files (x86)\ABC S5 Proxy\QtQuick\Controls\Styles\Base\images\is-NF9RB.tmp proxy146.tmp File created C:\Program Files (x86)\ABC S5 Proxy\QtQuick\Extras\is-Q2DAH.tmp proxy146.tmp File created C:\Program Files (x86)\ABC S5 Proxy\is-NEFDA.tmp proxy146.tmp File created C:\Program Files (x86)\ABC S5 Proxy\country_image\is-T3D5V.tmp proxy146.tmp File created C:\Program Files (x86)\ABC S5 Proxy\QtQuick\Controls\Styles\Desktop\is-8Q3JI.tmp proxy146.tmp File created C:\Program Files (x86)\ABC S5 Proxy\QtWinExtras\is-UE05U.tmp proxy146.tmp File created C:\Program Files (x86)\ABC S5 Proxy\is-MRR8G.tmp proxy146.tmp File created C:\Program Files (x86)\ABC S5 Proxy\country_image\is-64JG9.tmp proxy146.tmp -
Drops file in Windows directory 1 IoCs
Processes:
file.exedescription ioc process File created C:\Windows\Tasks\skotes.job file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 8832 4480 WerFault.exe ac6fdfa9fc.exe -
System Location Discovery: System Language Discovery 1 TTPs 30 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
7e1c5fd43d.exetaskkill.exeservice123.exeschtasks.exe3df54d5c05.exe769a609553.exetaskkill.exeac6fdfa9fc.execmd.exeLumma111.exeproxy146.tmptaskkill.exe401b944e01.exewmic.exeskotes.execmd.exetaskkill.exetaskkill.execmd.exetaskkill.exetaskkill.exetaskkill.exeAbcProxy.exefile.execmd.exetaskkill.exetaskkill.exeproxy146.execmd.exetzutil.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7e1c5fd43d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3df54d5c05.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 769a609553.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ac6fdfa9fc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lumma111.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language proxy146.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 401b944e01.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AbcProxy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language proxy146.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tzutil.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exefirefox.exeac6fdfa9fc.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ac6fdfa9fc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ac6fdfa9fc.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Kills process with taskkill 10 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 448 taskkill.exe 2924 taskkill.exe 2244 taskkill.exe 4228 taskkill.exe 2116 taskkill.exe 4568 taskkill.exe 3136 taskkill.exe 3952 taskkill.exe 5136 taskkill.exe 5208 taskkill.exe -
Modifies registry class 1 IoCs
Processes:
firefox.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings firefox.exe -
Processes:
AbcProxy.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 AbcProxy.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 AbcProxy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 AbcProxy.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 0f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b0601050507030853000000010000004300000030413022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0620000000100000020000000d7a7a0fb5d7e2731d771e9484ebcdef71d5f0c3e0a2948782bc83ee0ea699ef40b000000010000001c0000005300650063007400690067006f002000280041004100410029000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e349200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e AbcProxy.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 AbcProxy.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
AbcProxy.exepid process 740 AbcProxy.exe -
Suspicious behavior: EnumeratesProcesses 33 IoCs
Processes:
file.exeskotes.exeLumma111.exeskotes.exe7e1c5fd43d.exe3df54d5c05.exe769a609553.exe401b944e01.exeproxy146.tmpac6fdfa9fc.exeAbcProxy.exechrome.exeskotes.exepid process 1904 file.exe 1904 file.exe 2348 skotes.exe 2348 skotes.exe 2184 Lumma111.exe 2184 Lumma111.exe 3952 skotes.exe 3952 skotes.exe 5096 7e1c5fd43d.exe 5096 7e1c5fd43d.exe 1776 3df54d5c05.exe 1776 3df54d5c05.exe 5072 769a609553.exe 5072 769a609553.exe 5072 769a609553.exe 5072 769a609553.exe 1312 401b944e01.exe 1312 401b944e01.exe 4528 proxy146.tmp 4528 proxy146.tmp 1312 401b944e01.exe 1312 401b944e01.exe 1312 401b944e01.exe 4480 ac6fdfa9fc.exe 4480 ac6fdfa9fc.exe 740 AbcProxy.exe 740 AbcProxy.exe 740 AbcProxy.exe 740 AbcProxy.exe 17252 chrome.exe 17252 chrome.exe 5736 skotes.exe 5736 skotes.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 17252 chrome.exe 17252 chrome.exe 17252 chrome.exe -
Suspicious use of AdjustPrivilegeToken 57 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exefirefox.exe401b944e01.exewmic.exetaskkill.exetaskkill.exechrome.exedescription pid process Token: SeDebugPrivilege 2116 taskkill.exe Token: SeDebugPrivilege 448 taskkill.exe Token: SeDebugPrivilege 2924 taskkill.exe Token: SeDebugPrivilege 4568 taskkill.exe Token: SeDebugPrivilege 2244 taskkill.exe Token: SeDebugPrivilege 4228 taskkill.exe Token: SeDebugPrivilege 3136 taskkill.exe Token: SeDebugPrivilege 3952 taskkill.exe Token: SeDebugPrivilege 840 firefox.exe Token: SeDebugPrivilege 840 firefox.exe Token: SeDebugPrivilege 1312 401b944e01.exe Token: SeIncreaseQuotaPrivilege 4344 wmic.exe Token: SeSecurityPrivilege 4344 wmic.exe Token: SeTakeOwnershipPrivilege 4344 wmic.exe Token: SeLoadDriverPrivilege 4344 wmic.exe Token: SeSystemProfilePrivilege 4344 wmic.exe Token: SeSystemtimePrivilege 4344 wmic.exe Token: SeProfSingleProcessPrivilege 4344 wmic.exe Token: SeIncBasePriorityPrivilege 4344 wmic.exe Token: SeCreatePagefilePrivilege 4344 wmic.exe Token: SeBackupPrivilege 4344 wmic.exe Token: SeRestorePrivilege 4344 wmic.exe Token: SeShutdownPrivilege 4344 wmic.exe Token: SeDebugPrivilege 4344 wmic.exe Token: SeSystemEnvironmentPrivilege 4344 wmic.exe Token: SeRemoteShutdownPrivilege 4344 wmic.exe Token: SeUndockPrivilege 4344 wmic.exe Token: SeManageVolumePrivilege 4344 wmic.exe Token: 33 4344 wmic.exe Token: 34 4344 wmic.exe Token: 35 4344 wmic.exe Token: 36 4344 wmic.exe Token: SeIncreaseQuotaPrivilege 4344 wmic.exe Token: SeSecurityPrivilege 4344 wmic.exe Token: SeTakeOwnershipPrivilege 4344 wmic.exe Token: SeLoadDriverPrivilege 4344 wmic.exe Token: SeSystemProfilePrivilege 4344 wmic.exe Token: SeSystemtimePrivilege 4344 wmic.exe Token: SeProfSingleProcessPrivilege 4344 wmic.exe Token: SeIncBasePriorityPrivilege 4344 wmic.exe Token: SeCreatePagefilePrivilege 4344 wmic.exe Token: SeBackupPrivilege 4344 wmic.exe Token: SeRestorePrivilege 4344 wmic.exe Token: SeShutdownPrivilege 4344 wmic.exe Token: SeDebugPrivilege 4344 wmic.exe Token: SeSystemEnvironmentPrivilege 4344 wmic.exe Token: SeRemoteShutdownPrivilege 4344 wmic.exe Token: SeUndockPrivilege 4344 wmic.exe Token: SeManageVolumePrivilege 4344 wmic.exe Token: 33 4344 wmic.exe Token: 34 4344 wmic.exe Token: 35 4344 wmic.exe Token: 36 4344 wmic.exe Token: SeDebugPrivilege 5136 taskkill.exe Token: SeDebugPrivilege 5208 taskkill.exe Token: SeShutdownPrivilege 17252 chrome.exe Token: SeCreatePagefilePrivilege 17252 chrome.exe -
Suspicious use of FindShellTrayWindow 61 IoCs
Processes:
file.exe769a609553.exefirefox.exeproxy146.tmpAbcProxy.exechrome.exepid process 1904 file.exe 5072 769a609553.exe 5072 769a609553.exe 5072 769a609553.exe 5072 769a609553.exe 5072 769a609553.exe 5072 769a609553.exe 5072 769a609553.exe 840 firefox.exe 840 firefox.exe 840 firefox.exe 840 firefox.exe 840 firefox.exe 840 firefox.exe 840 firefox.exe 840 firefox.exe 840 firefox.exe 840 firefox.exe 840 firefox.exe 840 firefox.exe 840 firefox.exe 840 firefox.exe 840 firefox.exe 840 firefox.exe 840 firefox.exe 840 firefox.exe 840 firefox.exe 840 firefox.exe 840 firefox.exe 5072 769a609553.exe 5072 769a609553.exe 5072 769a609553.exe 4528 proxy146.tmp 740 AbcProxy.exe 740 AbcProxy.exe 17252 chrome.exe 17252 chrome.exe 17252 chrome.exe 17252 chrome.exe 17252 chrome.exe 17252 chrome.exe 17252 chrome.exe 17252 chrome.exe 17252 chrome.exe 17252 chrome.exe 17252 chrome.exe 17252 chrome.exe 17252 chrome.exe 17252 chrome.exe 17252 chrome.exe 17252 chrome.exe 17252 chrome.exe 17252 chrome.exe 17252 chrome.exe 17252 chrome.exe 17252 chrome.exe 17252 chrome.exe 17252 chrome.exe 17252 chrome.exe 17252 chrome.exe 17252 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
Processes:
769a609553.exefirefox.exeAbcProxy.exepid process 5072 769a609553.exe 5072 769a609553.exe 5072 769a609553.exe 5072 769a609553.exe 5072 769a609553.exe 5072 769a609553.exe 5072 769a609553.exe 840 firefox.exe 840 firefox.exe 840 firefox.exe 840 firefox.exe 840 firefox.exe 840 firefox.exe 840 firefox.exe 840 firefox.exe 840 firefox.exe 840 firefox.exe 840 firefox.exe 840 firefox.exe 840 firefox.exe 840 firefox.exe 840 firefox.exe 840 firefox.exe 840 firefox.exe 840 firefox.exe 840 firefox.exe 840 firefox.exe 5072 769a609553.exe 5072 769a609553.exe 5072 769a609553.exe 740 AbcProxy.exe 740 AbcProxy.exe -
Suspicious use of SetWindowsHookEx 28 IoCs
Processes:
firefox.exeAbcProxy.exepid process 840 firefox.exe 740 AbcProxy.exe 740 AbcProxy.exe 740 AbcProxy.exe 740 AbcProxy.exe 740 AbcProxy.exe 740 AbcProxy.exe 740 AbcProxy.exe 740 AbcProxy.exe 740 AbcProxy.exe 740 AbcProxy.exe 740 AbcProxy.exe 740 AbcProxy.exe 740 AbcProxy.exe 740 AbcProxy.exe 740 AbcProxy.exe 740 AbcProxy.exe 740 AbcProxy.exe 740 AbcProxy.exe 740 AbcProxy.exe 740 AbcProxy.exe 740 AbcProxy.exe 740 AbcProxy.exe 740 AbcProxy.exe 740 AbcProxy.exe 740 AbcProxy.exe 740 AbcProxy.exe 740 AbcProxy.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
file.exeskotes.exeproxy146.exeproxy146.tmpcmd.execmd.execmd.exe769a609553.exefirefox.exedescription pid process target process PID 1904 wrote to memory of 2348 1904 file.exe skotes.exe PID 1904 wrote to memory of 2348 1904 file.exe skotes.exe PID 1904 wrote to memory of 2348 1904 file.exe skotes.exe PID 2348 wrote to memory of 2184 2348 skotes.exe Lumma111.exe PID 2348 wrote to memory of 2184 2348 skotes.exe Lumma111.exe PID 2348 wrote to memory of 2184 2348 skotes.exe Lumma111.exe PID 2348 wrote to memory of 4164 2348 skotes.exe proxy146.exe PID 2348 wrote to memory of 4164 2348 skotes.exe proxy146.exe PID 2348 wrote to memory of 4164 2348 skotes.exe proxy146.exe PID 4164 wrote to memory of 4528 4164 proxy146.exe proxy146.tmp PID 4164 wrote to memory of 4528 4164 proxy146.exe proxy146.tmp PID 4164 wrote to memory of 4528 4164 proxy146.exe proxy146.tmp PID 4528 wrote to memory of 4064 4528 proxy146.tmp cmd.exe PID 4528 wrote to memory of 4064 4528 proxy146.tmp cmd.exe PID 4528 wrote to memory of 4064 4528 proxy146.tmp cmd.exe PID 4528 wrote to memory of 4456 4528 proxy146.tmp cmd.exe PID 4528 wrote to memory of 4456 4528 proxy146.tmp cmd.exe PID 4528 wrote to memory of 4456 4528 proxy146.tmp cmd.exe PID 4528 wrote to memory of 2768 4528 proxy146.tmp cmd.exe PID 4528 wrote to memory of 2768 4528 proxy146.tmp cmd.exe PID 4528 wrote to memory of 2768 4528 proxy146.tmp cmd.exe PID 4064 wrote to memory of 2116 4064 cmd.exe taskkill.exe PID 4064 wrote to memory of 2116 4064 cmd.exe taskkill.exe PID 4064 wrote to memory of 2116 4064 cmd.exe taskkill.exe PID 4456 wrote to memory of 448 4456 cmd.exe taskkill.exe PID 4456 wrote to memory of 448 4456 cmd.exe taskkill.exe PID 4456 wrote to memory of 448 4456 cmd.exe taskkill.exe PID 2768 wrote to memory of 2924 2768 cmd.exe taskkill.exe PID 2768 wrote to memory of 2924 2768 cmd.exe taskkill.exe PID 2768 wrote to memory of 2924 2768 cmd.exe taskkill.exe PID 2348 wrote to memory of 5096 2348 skotes.exe 7e1c5fd43d.exe PID 2348 wrote to memory of 5096 2348 skotes.exe 7e1c5fd43d.exe PID 2348 wrote to memory of 5096 2348 skotes.exe 7e1c5fd43d.exe PID 2348 wrote to memory of 1776 2348 skotes.exe 3df54d5c05.exe PID 2348 wrote to memory of 1776 2348 skotes.exe 3df54d5c05.exe PID 2348 wrote to memory of 1776 2348 skotes.exe 3df54d5c05.exe PID 2348 wrote to memory of 5072 2348 skotes.exe 769a609553.exe PID 2348 wrote to memory of 5072 2348 skotes.exe 769a609553.exe PID 2348 wrote to memory of 5072 2348 skotes.exe 769a609553.exe PID 5072 wrote to memory of 4568 5072 769a609553.exe taskkill.exe PID 5072 wrote to memory of 4568 5072 769a609553.exe taskkill.exe PID 5072 wrote to memory of 4568 5072 769a609553.exe taskkill.exe PID 5072 wrote to memory of 2244 5072 769a609553.exe taskkill.exe PID 5072 wrote to memory of 2244 5072 769a609553.exe taskkill.exe PID 5072 wrote to memory of 2244 5072 769a609553.exe taskkill.exe PID 5072 wrote to memory of 4228 5072 769a609553.exe taskkill.exe PID 5072 wrote to memory of 4228 5072 769a609553.exe taskkill.exe PID 5072 wrote to memory of 4228 5072 769a609553.exe taskkill.exe PID 5072 wrote to memory of 3136 5072 769a609553.exe taskkill.exe PID 5072 wrote to memory of 3136 5072 769a609553.exe taskkill.exe PID 5072 wrote to memory of 3136 5072 769a609553.exe taskkill.exe PID 5072 wrote to memory of 3952 5072 769a609553.exe taskkill.exe PID 5072 wrote to memory of 3952 5072 769a609553.exe taskkill.exe PID 5072 wrote to memory of 3952 5072 769a609553.exe taskkill.exe PID 5072 wrote to memory of 1668 5072 769a609553.exe firefox.exe PID 5072 wrote to memory of 1668 5072 769a609553.exe firefox.exe PID 1668 wrote to memory of 840 1668 firefox.exe firefox.exe PID 1668 wrote to memory of 840 1668 firefox.exe firefox.exe PID 1668 wrote to memory of 840 1668 firefox.exe firefox.exe PID 1668 wrote to memory of 840 1668 firefox.exe firefox.exe PID 1668 wrote to memory of 840 1668 firefox.exe firefox.exe PID 1668 wrote to memory of 840 1668 firefox.exe firefox.exe PID 1668 wrote to memory of 840 1668 firefox.exe firefox.exe PID 1668 wrote to memory of 840 1668 firefox.exe firefox.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\1007744001\Lumma111.exe"C:\Users\Admin\AppData\Local\Temp\1007744001\Lumma111.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2184
-
-
C:\Users\Admin\AppData\Local\Temp\1007759001\proxy146.exe"C:\Users\Admin\AppData\Local\Temp\1007759001\proxy146.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4164 -
C:\Users\Admin\AppData\Local\Temp\is-0A5GI.tmp\proxy146.tmp"C:\Users\Admin\AppData\Local\Temp\is-0A5GI.tmp\proxy146.tmp" /SL5="$701E4,24120883,730624,C:\Users\Admin\AppData\Local\Temp\1007759001\proxy146.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c taskkill /f /t /im AbcLocalProxy.exe5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /t /im AbcLocalProxy.exe6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2116
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c taskkill /f /t /im AbcProxy.exe5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /t /im AbcProxy.exe6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:448
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c taskkill /f /t /im ABCdrivert.exe5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /t /im ABCdrivert.exe6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2924
-
-
-
C:\Program Files (x86)\ABC S5 Proxy\AbcProxy.exe"C:\Program Files (x86)\ABC S5 Proxy\AbcProxy.exe"5⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:740 -
C:\Windows\SysWOW64\Wbem\wmic.exewmic csproduct get UUID6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4344
-
-
C:\Windows\SysWOW64\tzutil.exetzutil /g6⤵
- System Location Discovery: System Language Discovery
PID:4720
-
-
C:\Windows\SysWOW64\cmd.execmd /c "taskkill /f /t /im nsqclient.exe"6⤵
- System Location Discovery: System Language Discovery
PID:3944 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /t /im nsqclient.exe7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5136
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c "taskkill /f /t /im ABCdrivert.exe"6⤵
- System Location Discovery: System Language Discovery
PID:5168 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /t /im ABCdrivert.exe7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5208
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007764001\7e1c5fd43d.exe"C:\Users\Admin\AppData\Local\Temp\1007764001\7e1c5fd43d.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5096
-
-
C:\Users\Admin\AppData\Local\Temp\1007765001\3df54d5c05.exe"C:\Users\Admin\AppData\Local\Temp\1007765001\3df54d5c05.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1776
-
-
C:\Users\Admin\AppData\Local\Temp\1007766001\769a609553.exe"C:\Users\Admin\AppData\Local\Temp\1007766001\769a609553.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4568
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2244
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4228
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3136
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3952
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:840 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1996 -parentBuildID 20240401114208 -prefsHandle 1912 -prefMapHandle 1904 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9a4ed9c1-02c8-4e74-aee9-1c0e9cdd466a} 840 "\\.\pipe\gecko-crash-server-pipe.840" gpu6⤵PID:1524
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2420 -parentBuildID 20240401114208 -prefsHandle 2412 -prefMapHandle 2400 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6c42d960-f80d-42c8-b307-f59347023059} 840 "\\.\pipe\gecko-crash-server-pipe.840" socket6⤵PID:4856
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2992 -childID 1 -isForBrowser -prefsHandle 2984 -prefMapHandle 2980 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c4eb6e48-29a4-4a79-a02d-0ea66bcc54ce} 840 "\\.\pipe\gecko-crash-server-pipe.840" tab6⤵PID:4712
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3668 -childID 2 -isForBrowser -prefsHandle 3660 -prefMapHandle 2788 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cf382d0d-050d-4e9f-9811-d57588b28163} 840 "\\.\pipe\gecko-crash-server-pipe.840" tab6⤵PID:2984
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4140 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4168 -prefMapHandle 4164 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2a8bbfea-0589-4d82-a068-cc93228426dc} 840 "\\.\pipe\gecko-crash-server-pipe.840" utility6⤵
- Checks processor information in registry
PID:1868
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5556 -childID 3 -isForBrowser -prefsHandle 5080 -prefMapHandle 5436 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {95ec8020-2664-4735-861a-d99563fb746b} 840 "\\.\pipe\gecko-crash-server-pipe.840" tab6⤵PID:1160
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5664 -childID 4 -isForBrowser -prefsHandle 5672 -prefMapHandle 5676 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5c8e1a2f-4a84-44c5-8886-738babed0498} 840 "\\.\pipe\gecko-crash-server-pipe.840" tab6⤵PID:4936
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5856 -childID 5 -isForBrowser -prefsHandle 5864 -prefMapHandle 5868 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7ea4e70e-a361-4d6e-a6ae-621d2aeed377} 840 "\\.\pipe\gecko-crash-server-pipe.840" tab6⤵PID:1776
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007767001\401b944e01.exe"C:\Users\Admin\AppData\Local\Temp\1007767001\401b944e01.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1312
-
-
C:\Users\Admin\AppData\Local\Temp\1007768001\ac6fdfa9fc.exe"C:\Users\Admin\AppData\Local\Temp\1007768001\ac6fdfa9fc.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4480 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:17252 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xf8,0x108,0x7ffe0a1ecc40,0x7ffe0a1ecc4c,0x7ffe0a1ecc585⤵PID:17280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2356,i,13946018447310582841,3115126603018571691,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2352 /prefetch:25⤵PID:11972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1864,i,13946018447310582841,3115126603018571691,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2460 /prefetch:35⤵PID:11980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=1972,i,13946018447310582841,3115126603018571691,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2564 /prefetch:85⤵PID:11988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3168,i,13946018447310582841,3115126603018571691,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3184 /prefetch:15⤵
- Uses browser remote debugging
PID:18348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3208,i,13946018447310582841,3115126603018571691,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3236 /prefetch:15⤵
- Uses browser remote debugging
PID:18340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4256,i,13946018447310582841,3115126603018571691,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4512 /prefetch:15⤵
- Uses browser remote debugging
PID:11816
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:10224
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:10360
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4480 -s 15004⤵
- Program crash
PID:8832
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3952
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:18184
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4480 -ip 44801⤵PID:9736
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD5cb6b20c8b928f8cf429ed6db7d997a2d
SHA1579d35f87853c68d946544a09ed5f49a714b844a
SHA2561b8658d590c5518f03530d16616e01cfaf6ca75db35e53b8ea5447f93cdcb25d
SHA5126734fa844d16a3e519bd4b7477f2904088a195dadd9477caabf7bcc1effcebaae7a0c6f2e5322456525c85efaff070d11727c9b0c967d1276a16688c97b5fbb1
-
Filesize
4.6MB
MD57a97bfe411691baecb264c16f4ae24df
SHA1648ba0d9abf2ff0dbca37f5615090a7f481268ae
SHA25623fcd971ba4f32e5ffb60e3603bb145f7094fef360392caabc42d95b5d418f8e
SHA512c7501a5049f830ef88e2b46eff59588eb4e8239d1e96ee585513adef1f15506d870960b2667ae816032734bef0d55ce034b601b2e1f7e7181c1f4c18d2622c45
-
Filesize
4.7MB
MD5057e7d316770a407977569461a69f5d9
SHA16babc7d9a428cf2bc977875f4df0d0db303063d6
SHA256e6005d3498d0e500b2b666554040309df20a5eebc941909ec3ef3fd1e3ac8f62
SHA512d8bbb2918cfae5745326295c627f244e47b31bf1f1282dccd8b49ef06dc657cd8cadfdf02de9f5a68be86a797a2182df41fec73db7a141c479d999259e4dfe07
-
Filesize
944KB
MD58a6687a0612280bde7ed3e2b81a69230
SHA1203652a125e8b646269befa31fc1905906ca5244
SHA256c406b7bc74107fb8419da7e2a8c67e47a331d5a54baca94257bade86ce061e24
SHA512f72b3a1b55c7236a1ef448c4a3e2326a51441b75e699972ae2d614a1c47c7a185419aabb36c8f787b32ed021eee1142bd52e18733a4c4ed2a64c4b76f188baea
-
Filesize
2.6MB
MD5bbb5685caf04f702c53ff9eaa23b6b2f
SHA19400b05f6f3be0dfb80a8b3ca34c1bd04e24e8b0
SHA2563534d375b64359b83b3bc86cbdd5d380de160cddb7e31dfd4a0316c68b9d01e1
SHA51283fe80d36b8cea368227c590a2b859d4a9ca1bb350bcfcff871ff8d002f329ef868b403c8f2d7812bcc763abcc4edef2826ada178166c4285b91ffd0a0472546
-
Filesize
2.7MB
MD5e6f97c3e22dc643fceeb94b7a1d76780
SHA1872767b11cd26589bf01378244af6511cf08c781
SHA2564bc969d51032bb1ca597945b97d0673367e2a0e887989c1d60b3347373802d66
SHA51244f71d339de28877befb79149702c9cfabf0e7a40e334d71422e57fe2218582a35d6946e9f8e229963b320cab12bcfebe70741102ae9c8cdd29ebf52483e15b5
-
Filesize
4.3MB
MD5fa4826e180cee08c46990bea2cb430a5
SHA14a43dd9f699a8ec38a5b3104bc7eac8ee4c51da7
SHA256173299de94585b38e872ce40fdaa84b42617b9766812d9772ec954832a197dc7
SHA512685a6e314025804290a0c6cf214eb4f80c93344fc353767e8bc8363df4bf09e8fb91dfb012cfdd93017b34006ca95adb92b762ea511df5a299780550c9bdd2d7
-
Filesize
2.5MB
MD53e4dcb78db1eb39a042e75c0fb76d2b5
SHA170f1166323460efe3ade4776c6d5e64691891fc9
SHA256107ab954c4918ee5bcfb14d15db5429aa6a0baa49ef7fb92088e954eab310923
SHA512bf651ab05632d0984f888cfab33945b85087aa47edc74e1afa8f004f1525c9d4874b957deb698cd37fa855d8cef3df18da09c4cec7b6988402f960dd6885e8f5
-
Filesize
3.3MB
MD53abbef60d6f743595af468112e1ef78d
SHA1ade8dfdd89b1edf17ed5256a4203eac69368f408
SHA2563d99ddfe3f88324c6c7998035152d5b1d8d930056bfb4f4922f4305f0db5d31d
SHA5124f62de243ac2b58712aa70c3ccb4d1b5baa7f960bdbe7123903c44cfd76396fe6aef9d8496bd9db64117ee33e31c37d22caa56d3c50705a92d2ca2b150e1315b
-
Filesize
165B
MD5d20b505cf559d40f9dac295310f069b7
SHA174f2b146beaa46d7eed44996382d3009f076524c
SHA256a9ca85d6e86d1434129426848d64e2a9f088997a6883affd25d423bddfe13159
SHA512751f27c61e845e5c31024cfeff427540d345dd857d9e168d0877da3ce976c75b8975c79cf697ac8ef9212bf44f4d98b51bceb35220d9e469269270cf4104847d
-
Filesize
134B
MD521752b0300e0dbe7f1e56609c05b4ada
SHA1e57499ef36ce4c4ee64349a4d65a022921254853
SHA2561e4e867b417a9e4ae5b74b9bc5a388f85eba09c18203dffa082a9a0ddf7dc265
SHA512d7f58120bd5888479a804eb671d9fb1b8d2f34a9bbc7f286144eec3fef196b9f06311f051ef753f4907faec3b77962f597910ca933d0a87bca79d08e38444df4
-
Filesize
36KB
MD59db47e8a17bb81d9e1bac8a7898c213a
SHA11e3fb0f4e6d994810b5563d3edbb505a29081fc6
SHA256c319a46a33d0633fbf17106b4c7efd0b482f7fc2674cb1c7b1e7e23bbe7db559
SHA512e29b525fe9bde94e7f0567fb8a2f4a57949b3ef127cc7214c19e383e626231afe1005194fb259fd4067e5df2928cc481d1b5e6c04b0b2ac0ba812466cafb503d
-
Filesize
31KB
MD5b2e570e7c101ca65abe47369ab296a58
SHA10c8ffa0d9837eb01457fc86ae7b675921de0ea84
SHA2567146267928eb0ce744004d4d21e5c5488c2b5fda1b3a5bf42a713a523be6581c
SHA512aa50d966f1bdad5ddc207891c14083b82a43fafeba1b46e80106833ef728f839bd0b311b03ef069a83965f05fea91cbc60822d1d3db7ba36e9ae174a3f8d9fed
-
Filesize
38KB
MD587c3183dc060a321d04010bca342f167
SHA1c876fd48062ed0236ba7b59002ce9725ef528e6d
SHA256e6fc328f7d07f1951653774f3ddeab297520165c959ecff3f962ec54c5f6946c
SHA512f98cd7466d8da1d887b9a396e196142ee3945f1b9df21e0e07745e5f5c7d8c66791ff9285dfc619f9c9be297b9fe514dbb9b4ec2df1a730cd0f5f87df39471c8
-
Filesize
32KB
MD514e6d10b04a69383ad728b4af9830ce7
SHA159f0fa09c93eb7208ee85edaadadd2dd9eee3532
SHA256924d3aff5e71966bbd8a44f250c5b850af4e053838614bc72dd9a5c1e0da63b2
SHA5124f2a91f9be9dcb01fa231d30830910863f85979d8f754105a77fcf4469123c11ba7c5ae3c6e51e9d6157b54f97c09752e5b9fe754e3a98d2bd536672fd1df157
-
Filesize
243KB
MD5802d7bd91866042592f6b1f4472f5874
SHA1ceea247abff51b1cf37906f74ff439b71158bc78
SHA2567fac52d892fae66d26e2d5d8bb78fd1dc2d4fbf7c43952d8427fa4b25df3959c
SHA5123c0cb3f5d19920b7db68672da178a8e02c0220cd6700d8edd810e138700694282af860e3a05d1ee8d064e4b2bdf2fae17dc7c0935c7555530171f189db1c7c41
-
Filesize
18KB
MD50ad33810db62d0f00a696da26787d954
SHA12019c7eb764d52fcbdbd74b006295ce24b59ed5a
SHA2562c203f68fefa827c042190ccb026988329caab397ba6e22349b64b7a9783d028
SHA512fdbe09d68d40b9a9c50af55719aa501f96fdfcb726126910edec424a6b0ce5d52d3cc0ace1fa539e68caea0f364b5d9b075c0c8ee0f4f179ea835b58ef1b183f
-
Filesize
1.9MB
MD51bf5adea485edf6270b3e7eef7e191d2
SHA132e219281386ef896d0e3413895cc8f97a364a00
SHA2561b94474cc5ff5636abceffa3a8df682e7f88eee8498dc5d4ea1c6db502b5c680
SHA5126744312a7dde6874db3ead5437a9b1e11c99891275344bd96eaa299144a5087bcc3fb21ee283c1a40f54e8d4f9f23a90a3657d7d712737b6beaeed728aa5c426
-
Filesize
2.1MB
MD59c8b228d392411aeec50905c2d80cf5d
SHA154a8d6ec44a8e11a3e232ad63b006b5c1394d6b2
SHA2562c125702a00050b7175befb29e58749c8b63e33d51e6093ac04175c303084a83
SHA512b993b094174f5564ae4e0f3c333c61ad2d57857761c60273c0d0681845e457ffa7df8bcb61f0c8dcccd12ba702457c610f742879abd339780bc5de805ddc1f69
-
Filesize
117KB
MD5043b39434829ce93637b1801d57b2082
SHA1297b5f72104130e17d92789adbbcfab8fe700a82
SHA2564d2e2d408d399d066b0aaef2047f7a33515c13c589832de0d9f1ba87a530c394
SHA512eee912b21d31c54bf913d11028f1637a041809bbe4cd6a5ca28c664f72b397d67d03230ba652a06b86916aea7e7ff5999a5b26cc14c067ab1652ab82f565edcf
-
Filesize
77KB
MD51f4411c1f66c9cdf96ca9d7f9caf52d9
SHA1ea04be653df7335483c7c8f46367d75d4ad9224e
SHA256b5fe4d6408ef2baabdd168f4c7250900606468e9aeb24c71e0c833d3d715ae65
SHA5128b95d0533773c5424733862cf60ed0f0d2ed5c7016b602a71dc4ce4a90ef0946de605f46c94fb0f6c3135447f60a00d3476e8b91a61e079885aa764bc1407b8a
-
Filesize
436KB
MD53e992e3412b8067cd215b52e6f906b1a
SHA14aaff9d969d558d355954131b88b1c250aed5d15
SHA256c3838cb309a101ca41064358ac65010610064f12aa3d341ea15c4b95e8d525c6
SHA512b2c92e710c65cfa2ca4a1fd7da9bfee521e450a63ac9070a8524c2f3abfb9ebf06b6567d650c7c69e2ec2066057b61ee4f1bf39ef6ff66e483c1b445883834f9
-
Filesize
1.1MB
MD5574904cdc536c98bc39db80da7e7020f
SHA1eaaa45bd16461c7347311d5091d67e5dc5f58dfa
SHA256c238ef4544fe9e20ab28486f0eff4f950169ca8c824166c66da06e28f94f67b8
SHA5127dd4aeb10ba5c38622ce575180ec3f188b57bd61b342f5d0826eac88c5b543bb41f7e6c5335797f7f02fee5a8bf9c3bd26c597117484f84fea0121ece295dc92
-
Filesize
451KB
MD54f6c3a3d796010f3f451ff9c2a71fbe1
SHA112c55d5b51e0125e1fe13fd834d9ba370580acee
SHA2569587a5260090e72dae77a9bd9296e5f7810b656443b08ff5bc61b11b7b53ffaa
SHA5127cf4c7661897150e680790e79b367b34cb3b708fd1894653ab13c5180b07914e85535b3c6ca75ac212519073b24fc12ab0fbcac24991918733bef5edbe22aad9
-
Filesize
80KB
MD595e17fbff059ac1e157437d618c7fdd9
SHA12b8d1e9bfbab2c8e47f8d4b3786218ba03365148
SHA256cf37047208765bdbf63db7d637213cec9df427283977beb99afed87efdd67df5
SHA512bacf10230e52d49ca37833a822436b84f728b3bbc468be83fec5225797e2a55b33f793314ec768ff69efa668bc0a542ed8f8552d60dd544ed09726f2a3f461bc
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\activity-stream.discovery_stream.json
Filesize19KB
MD5900287bb24da197c692812e5aea12ccf
SHA1c124f119b799bf78b35d6cd2ed87ad8a2375120a
SHA256054a1f98bfd7cc15d506d1ffa7f2fe9ee85ea526e37c79d5abf9778f86bd58f3
SHA5129043901a3a486c1483ef91fcdfe80551011271019b170a3a42af4579b5254e70e1c7ae30edeb62a4e89d39c52776b080fa2ddb775609ee988a8fc8b91fbbb11c
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD5f3cd89e5be5f45920472b61e402eb98e
SHA1351d7305fcf729936814d5623e716c35a5f3977c
SHA2565fb272aeb6e825747df98584f2868f3cd95258143e1fed3686e2cdca64683221
SHA5121f2fbc54521078242022c2be52494dbb1398bcb5833d9b624b02edc588ea1a12d6b0838687451d346d87842fa5c441247818cb5da198fd9adeb94cadb1e42206
-
Filesize
1.8MB
MD590e700a3800b87f46cbbc37be3724fd5
SHA125e3645bca71b87dbec92b55e5648452ffca782a
SHA2568cc02598acded7f8221865d08145297a9fc8162d626883fc9a72998c4a7f0da3
SHA512f06adebcc7d454a31ff36a3c2e8eedfc0086a638c7ec0fea6c0b41035ee03c2e329f3cef0e001939cab243fcfaae07a634f7839dd0fbb31942a793439df4ea8d
-
Filesize
23.7MB
MD5b1523d2f5929296a5170a4d6c9db93c8
SHA1173d2d8935d7df09c9f0e9a3976de3c6ab612106
SHA256ba9b1f4cc2c7f4aeda7a1280bbc901671f4ec3edaa17f1db676e17651e9bff5f
SHA51276525815982ce5229bf97734b5f9cd2726aa63bdfa85efcd271baf37053d9a5345557e344e1126678a5e3b48e2bfefc2663332f05448aad9fca93416db476329
-
Filesize
1.7MB
MD5cc8dcf3e767a8db4a1d83477a56f3a41
SHA1fd977dab1381e66ba3b51dd868ed2f24189320d3
SHA2563d838bd7ad9e40d963817b2d6d2d9e7551adc7b4a84de5c845eab9bc3bfdada4
SHA512555211bf976129a2b8225953c75596adb9c844836e6a23aeb0ecc38efe9e30f2546425ec26a99ba2f3c8f975b2dc6b17dd08d5351e29063c21c7f87780e7421a
-
Filesize
1.7MB
MD561acee13f680dd57a06b13d1cc04cfcc
SHA111415b4452ac82299c47e10e981e8728a57d891e
SHA2565d7b7a5d6a3c291e33347301f3b116a375f9709a3f4ea5c3ec35eacaae59ca1d
SHA512b4458be1c6bbb29c8d2853bce7fed4237f2c8151314cff0a94587e435a8783b5c34e29a0cb6efb7979fcb2ce8f62930dc2d79abe55c6c126f56f8f328355ef11
-
Filesize
901KB
MD501bdee3ffe8a27a28f9a4e7b47d33107
SHA1e8765685835f0f94f1a5fd41d4cfd19dd7f3fccd
SHA2565d82a1c503f5ebd5dee7a4ea635f95f4727b0c11c47ef2a959812a08e073284b
SHA512016d25f091f02d7dbed99f605f28c665a98696bfe99c4adfa0777c64d4e0238f40ebb18d9dc1f7229f56e103cd0846f307af1226467828d12089c8f3fd309cf6
-
Filesize
2.6MB
MD54eaf57719a7966e309e186bf63a8f6cc
SHA12aabbcec70113e272872957c7858683d05dbd5ab
SHA2560b6d2c28e5c14e954b58dcbe0ff777de0312abfaf5f463a55fb9fc0f631dc3b0
SHA5129a6c3c9cd8c863ea13fbe163e5601cddb7aa813e0165e4e95f3aa6791a5562ca406198b64818a07852b0412ce798fef910c7ad026ce73d359f75539225fc01c1
-
Filesize
4.2MB
MD59bf8ddd37402d4bc65fde73dd731efaf
SHA1306546d9db5efa9c4f6f45cea6864470070ef1d2
SHA25627d7a74aa353a79ad0e8de90f591165248c92a914d7a7cf447267599f9181b49
SHA512155ddba3acfd9295014302a138cf9a8708c763687e99d391d684b978773130c5190e50a427713ca49300e285fabd8c2fdf3c670c0c7fe7f0525c0669a62bf923
-
Filesize
1.8MB
MD5efa562638c762ca57f68c4e25e85718b
SHA10ae937ac0181e5510953395bd57c04e89f8001f4
SHA2567a2be1766fe207a4736269f982b6708c9392ae418683298ef6544d0ddb85596a
SHA5129086ded9ac09a4eb556294495e8035ef1dc1757b2ebfcbda50a5b721a7fd9e3e19db56e1892cb5466e09e11f458c551babca8efcc41ac3a0c320b65f3125f23e
-
Filesize
2.4MB
MD52e94d9c63e7d92f840e6bceb63c907bf
SHA10960a6f51eff1341ef81694f11349ee25a4c1598
SHA2566c2d94ec4716f98a604866c5f98c322f81021b756d8cbb60a96d5e3ba44a79b0
SHA5124e7378e1a5d2e3daa673e6e6eec9866534399a9e6e2afc81bb46cdacf5d929914c4fd50020cc35b54643f951251ddadb25f9b619c083375aeb96548fcacc979f
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin
Filesize6KB
MD55fc2e6149f40a39d882ffddcef5fedb4
SHA1d788ea29848e8c5bc65da71441824dad77f21715
SHA256b7674bfb162e909be79391ba3129870bd763ee17fbf39cd206723d61da2b289d
SHA51273273d81847f441c99296eb7e3a4475937b7a6aa5b90e899902fbc84890b05f32e9fe9bafe6ba3a2d974379875327aa4d000ffc126c40587b9fe4dd65e9e19ed
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin
Filesize8KB
MD5cc10d0481dde7b6711b0b39c78aec768
SHA1f67a5ea06fc764e0f88aafe8070712240d2fda8d
SHA25694a7d54ea01b6257f122c302830da76611a5de0bdcbd534bfb8516707fe26893
SHA512c02d0e247a6374c76dc2b7e715ad36fd096e2783c84d7153b7ab347966f02daa5b76ba676ca0a0bb4fd26bd06cc9870b21cdeb3fd214b38a8048975982d224e9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5fbcf30fec802a7cd207adb3e2048d636
SHA1aff72321c012a4f22b71bd121b8df3fa9c0c951e
SHA2566061ae75b267430451ea126fbef72d48bf9ac547f1e3f703cb58a4644488ddd5
SHA51286c9e74a5571f1dfb8de3c52929344feca8d00f150ca608562d43424a34c7888250686c074a11f421c1f73d6d6b4338cc3241bafe3eaae2cefb656c357630ea5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5ad2f2d46fc71a6f948eef8019eab836e
SHA1d0a7956381d2e91b164617e048480d847d32c68d
SHA256b428a107e9fe837811819dad51ca4d1e47f528a4dd1b36dca7b997ad121021ac
SHA512e9b7937ce6fdb5af901fd2d096526cf392f98a5012feaa37ca119c578c1321dec5f1dcdf70eb759d5ebe86ceea52c2bf0a80650fed97e247f73466dcb2381d5f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\1a879968-d834-40a6-8377-d9dc79ea629e
Filesize982B
MD5cf5250dbd19cfda84b49a20459eb53fc
SHA1a681066f94b7e0087358d6dc228ed08a38e0ceaf
SHA256091869d55ef3b60ddc58065322e8402dc6f56f206921edba985a22e8bfbabc34
SHA51264b5435f2545633ce07623100921eaad06f06e3ff857b853a52a8df91713326e6d326ea3ad589640683d48532ceed5779275d8f1ad4145cb5586a834adfd62c1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\34bc9948-6dde-4f65-8e9a-afec7d72215d
Filesize26KB
MD548083303c91af6141ebd10086270f861
SHA1ea09d3e5bec919df7ccf87ae7a1fbae48aa7b8c0
SHA25629c88f3fc538dde29223db252b8eaea70e31940899dac152e8f7a55b782df85e
SHA512ddb6a5d71d395671bf7d86af3f5b7a520de7abac822431dcfee115fddb204ad87b69ad0be84f7edd2cccfce350e9b84804d5f1d093cfd73915c43c7754187c3e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\d28c5d2e-24b8-43ab-875d-b05161f3a3f8
Filesize671B
MD52b6a76919b3e4d4bd7f2060898bbc208
SHA163381d22ad4f1d99a4d538d5db9805da27ebb4ff
SHA2562319b03d45ea3e505f589076873448369887e3c64e2fd0f7e9d0e67d1f281bfd
SHA51290bcf5ee5fcf3fd0756aeaf0c1f5311a8a90150b3a3e8d1d1542d535133d6079b4cca908ddbcba47a1184dd9eb7ec891fd5a631e00504190901ba624e24f1bdd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD502c509da0c9fe05c030e99beb815bd27
SHA113cd7da023699e7a68f82d40c06df566ac600416
SHA256ebef9bb79dccecf68ff219cc8487921b0cd74a5d19cc6e1291c42582461dda90
SHA512e96e9843df3b978b9acc29ac1ff6cd17fc94689910a45fb5a4d06c4423af8b089972147abdd0c688fb4f6a1d9f60261fce9ffbdd91202926e3fc34338ed63f3f
-
Filesize
10KB
MD55a3f033cf0d8d17781550bbd7bd42fdc
SHA12aaedded64992d317e48c9f5b220d4a41d58304f
SHA2566c105543191bff728cbe3704c571528078b5d19376c8f5dd585871d4bade090c
SHA512b20b947ac3d3aedd74a75bb57c33f990c022fa26f4a117e88095d31978b405fba9a3df62680625c4db556c4ab06eeec59fb96c010ad08ef0f17803c7de2670a4
-
Filesize
10KB
MD56a4df5ed3defc9cbe140c3e5e0c4c01d
SHA144824907aa9f53edfe0f188fde42094762b22057
SHA25628048b31cd3722957e0a1efebe03b38ff0cfe07acc9e58942d208716bac9ac29
SHA512ecc008c69663dbdb52d2bed330579cf69b271920f4b2924d30d4ac3bce53d8f9aca5905b0f5578364a1853e43fff39ed47e6a14bf66c0bb42ae4acd7c8bdc8aa
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize1.3MB
MD51f15d6896fe217d60f7e51918b70a459
SHA106954b9968b30110697902764815b81dc7de268b
SHA256cd32ece49fb9271eaa714560fa3d6eb995c0d3c238d95f9719dd3a30eb6e9d3a
SHA512af0c4104bc8490cc22d83cdce83b6579c48fa3c0dbde3ed05d2ace2c3e98b02d394f51ced95885b0daea8ad759cf5230499d4875db396b3ae8b2c28c9e2373ef
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize1.7MB
MD5652feadd554ade389f08660eab3b01a6
SHA1b6f7cca3011242e5ae324341c697861bf093b10e
SHA256b5abb0c93d6158c1e8a8175d3f0c97a818f8352667687eda8a0e9df2e447dfd6
SHA512a954a81375ba76dbab3bc5b34c674d977bdd801dc5eccdeabeec7bc5afbf2de9e3a73898385059aeff6aca92574fc4ea871aa878f06845e09e1e165a30d0da7a