Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2024 13:42
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240729-en
General
-
Target
file.exe
-
Size
1.7MB
-
MD5
bc7e15f0d547a97f33b7084eb8bb6e35
-
SHA1
83ee297f1a2f1651c6596c5349614ea27e4643d5
-
SHA256
bee50744a16bd59e87b06e58043e3efd7bd2d3fb31f25e4481a9ea498e181194
-
SHA512
e02e938300749d0c12b14a7b58c7cbd5bb0ab24680313bdcce95aef40403dcebfd10e1ce9f27088e6540fb21e5df70e09b296eeca832e165c74f4cf72b08b1ae
-
SSDEEP
49152:LNBT0HaEo1FfN7IBTXRFIYx8XmRET4aQV8pfk:5BTtRFeTBFI0JXdIfk
Malware Config
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Signatures
-
Amadey family
-
Cryptbot family
-
Detects CryptBot payload 1 IoCs
CryptBot is a C++ stealer distributed widely in bundle with other software.
resource yara_rule behavioral2/memory/4804-639-0x0000000069CC0000-0x000000006A71B000-memory.dmp family_cryptbot_v3 -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection cdb63dffd6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" cdb63dffd6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" cdb63dffd6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" cdb63dffd6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" cdb63dffd6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" cdb63dffd6.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ DocumentsAEHIECAFCG.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ cdb63dffd6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2d4347eddc.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7dfa4fbeeb.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b51a67b608.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 13 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 1840 msedge.exe 3932 msedge.exe 5936 chrome.exe 4024 chrome.exe 2524 chrome.exe 4380 chrome.exe 3000 msedge.exe 3008 chrome.exe 532 chrome.exe 4912 chrome.exe 4116 msedge.exe 4768 msedge.exe 2516 chrome.exe -
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2d4347eddc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b51a67b608.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b51a67b608.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cdb63dffd6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion DocumentsAEHIECAFCG.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion DocumentsAEHIECAFCG.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7dfa4fbeeb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7dfa4fbeeb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2d4347eddc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cdb63dffd6.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation file.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation DocumentsAEHIECAFCG.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 7dfa4fbeeb.exe -
Executes dropped EXE 11 IoCs
pid Process 764 DocumentsAEHIECAFCG.exe 4304 skotes.exe 4804 7dfa4fbeeb.exe 3808 b51a67b608.exe 1972 2d4347eddc.exe 4640 14c43ad4fb.exe 5764 cdb63dffd6.exe 5192 skotes.exe 5624 service123.exe 5728 skotes.exe 5476 service123.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 7dfa4fbeeb.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 2d4347eddc.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine file.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine b51a67b608.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine cdb63dffd6.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine DocumentsAEHIECAFCG.exe -
Loads dropped DLL 4 IoCs
pid Process 640 file.exe 640 file.exe 5624 service123.exe 5476 service123.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features cdb63dffd6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" cdb63dffd6.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2d4347eddc.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008204001\\2d4347eddc.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\14c43ad4fb.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008205001\\14c43ad4fb.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cdb63dffd6.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008206001\\cdb63dffd6.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b51a67b608.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008203001\\b51a67b608.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000023c7d-215.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 640 file.exe 764 DocumentsAEHIECAFCG.exe 4304 skotes.exe 4804 7dfa4fbeeb.exe 3808 b51a67b608.exe 1972 2d4347eddc.exe 5764 cdb63dffd6.exe 5192 skotes.exe 5728 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job DocumentsAEHIECAFCG.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3844 4804 WerFault.exe 118 -
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b51a67b608.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7dfa4fbeeb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DocumentsAEHIECAFCG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cdb63dffd6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2d4347eddc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 14c43ad4fb.exe -
Checks processor information in registry 2 TTPs 15 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 7dfa4fbeeb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 7dfa4fbeeb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString file.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe -
Enumerates system info in registry 2 TTPs 11 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe -
Kills process with taskkill 5 IoCs
pid Process 752 taskkill.exe 3696 taskkill.exe 1372 taskkill.exe 556 taskkill.exe 1040 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133767565345410597" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3452 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 49 IoCs
pid Process 640 file.exe 640 file.exe 640 file.exe 640 file.exe 640 file.exe 640 file.exe 4024 chrome.exe 4024 chrome.exe 640 file.exe 640 file.exe 640 file.exe 640 file.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 440 msedge.exe 440 msedge.exe 3000 msedge.exe 3000 msedge.exe 640 file.exe 640 file.exe 640 file.exe 640 file.exe 764 DocumentsAEHIECAFCG.exe 764 DocumentsAEHIECAFCG.exe 4304 skotes.exe 4304 skotes.exe 4804 7dfa4fbeeb.exe 4804 7dfa4fbeeb.exe 3808 b51a67b608.exe 3808 b51a67b608.exe 1972 2d4347eddc.exe 1972 2d4347eddc.exe 4640 14c43ad4fb.exe 4640 14c43ad4fb.exe 5764 cdb63dffd6.exe 5764 cdb63dffd6.exe 4640 14c43ad4fb.exe 4640 14c43ad4fb.exe 5764 cdb63dffd6.exe 5764 cdb63dffd6.exe 5764 cdb63dffd6.exe 5192 skotes.exe 5192 skotes.exe 5936 chrome.exe 5936 chrome.exe 5728 skotes.exe 5728 skotes.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 5936 chrome.exe 5936 chrome.exe 5936 chrome.exe -
Suspicious use of AdjustPrivilegeToken 26 IoCs
description pid Process Token: SeShutdownPrivilege 4024 chrome.exe Token: SeCreatePagefilePrivilege 4024 chrome.exe Token: SeShutdownPrivilege 4024 chrome.exe Token: SeCreatePagefilePrivilege 4024 chrome.exe Token: SeShutdownPrivilege 4024 chrome.exe Token: SeCreatePagefilePrivilege 4024 chrome.exe Token: SeShutdownPrivilege 4024 chrome.exe Token: SeCreatePagefilePrivilege 4024 chrome.exe Token: SeShutdownPrivilege 4024 chrome.exe Token: SeCreatePagefilePrivilege 4024 chrome.exe Token: SeShutdownPrivilege 4024 chrome.exe Token: SeCreatePagefilePrivilege 4024 chrome.exe Token: SeShutdownPrivilege 4024 chrome.exe Token: SeCreatePagefilePrivilege 4024 chrome.exe Token: SeDebugPrivilege 752 taskkill.exe Token: SeDebugPrivilege 3696 taskkill.exe Token: SeDebugPrivilege 1372 taskkill.exe Token: SeDebugPrivilege 556 taskkill.exe Token: SeDebugPrivilege 1040 taskkill.exe Token: SeDebugPrivilege 3196 firefox.exe Token: SeDebugPrivilege 3196 firefox.exe Token: SeDebugPrivilege 5764 cdb63dffd6.exe Token: SeShutdownPrivilege 5936 chrome.exe Token: SeCreatePagefilePrivilege 5936 chrome.exe Token: SeShutdownPrivilege 5936 chrome.exe Token: SeCreatePagefilePrivilege 5936 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 764 DocumentsAEHIECAFCG.exe 4640 14c43ad4fb.exe 4640 14c43ad4fb.exe 4640 14c43ad4fb.exe 4640 14c43ad4fb.exe 4640 14c43ad4fb.exe 4640 14c43ad4fb.exe 3196 firefox.exe 3196 firefox.exe 3196 firefox.exe 3196 firefox.exe 3196 firefox.exe 3196 firefox.exe -
Suspicious use of SendNotifyMessage 30 IoCs
pid Process 4640 14c43ad4fb.exe 4640 14c43ad4fb.exe 4640 14c43ad4fb.exe 4640 14c43ad4fb.exe 4640 14c43ad4fb.exe 4640 14c43ad4fb.exe 3196 firefox.exe 3196 firefox.exe 3196 firefox.exe 3196 firefox.exe 3196 firefox.exe 3196 firefox.exe 3196 firefox.exe 3196 firefox.exe 3196 firefox.exe 3196 firefox.exe 3196 firefox.exe 3196 firefox.exe 3196 firefox.exe 3196 firefox.exe 3196 firefox.exe 3196 firefox.exe 3196 firefox.exe 3196 firefox.exe 3196 firefox.exe 3196 firefox.exe 4640 14c43ad4fb.exe 4640 14c43ad4fb.exe 4640 14c43ad4fb.exe 4640 14c43ad4fb.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3196 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 640 wrote to memory of 4024 640 file.exe 82 PID 640 wrote to memory of 4024 640 file.exe 82 PID 4024 wrote to memory of 4100 4024 chrome.exe 83 PID 4024 wrote to memory of 4100 4024 chrome.exe 83 PID 4024 wrote to memory of 2760 4024 chrome.exe 84 PID 4024 wrote to memory of 2760 4024 chrome.exe 84 PID 4024 wrote to memory of 2760 4024 chrome.exe 84 PID 4024 wrote to memory of 2760 4024 chrome.exe 84 PID 4024 wrote to memory of 2760 4024 chrome.exe 84 PID 4024 wrote to memory of 2760 4024 chrome.exe 84 PID 4024 wrote to memory of 2760 4024 chrome.exe 84 PID 4024 wrote to memory of 2760 4024 chrome.exe 84 PID 4024 wrote to memory of 2760 4024 chrome.exe 84 PID 4024 wrote to memory of 2760 4024 chrome.exe 84 PID 4024 wrote to memory of 2760 4024 chrome.exe 84 PID 4024 wrote to memory of 2760 4024 chrome.exe 84 PID 4024 wrote to memory of 2760 4024 chrome.exe 84 PID 4024 wrote to memory of 2760 4024 chrome.exe 84 PID 4024 wrote to memory of 2760 4024 chrome.exe 84 PID 4024 wrote to memory of 2760 4024 chrome.exe 84 PID 4024 wrote to memory of 2760 4024 chrome.exe 84 PID 4024 wrote to memory of 2760 4024 chrome.exe 84 PID 4024 wrote to memory of 2760 4024 chrome.exe 84 PID 4024 wrote to memory of 2760 4024 chrome.exe 84 PID 4024 wrote to memory of 2760 4024 chrome.exe 84 PID 4024 wrote to memory of 2760 4024 chrome.exe 84 PID 4024 wrote to memory of 2760 4024 chrome.exe 84 PID 4024 wrote to memory of 2760 4024 chrome.exe 84 PID 4024 wrote to memory of 2760 4024 chrome.exe 84 PID 4024 wrote to memory of 2760 4024 chrome.exe 84 PID 4024 wrote to memory of 2760 4024 chrome.exe 84 PID 4024 wrote to memory of 2760 4024 chrome.exe 84 PID 4024 wrote to memory of 2760 4024 chrome.exe 84 PID 4024 wrote to memory of 2760 4024 chrome.exe 84 PID 4024 wrote to memory of 1340 4024 chrome.exe 85 PID 4024 wrote to memory of 1340 4024 chrome.exe 85 PID 4024 wrote to memory of 224 4024 chrome.exe 86 PID 4024 wrote to memory of 224 4024 chrome.exe 86 PID 4024 wrote to memory of 224 4024 chrome.exe 86 PID 4024 wrote to memory of 224 4024 chrome.exe 86 PID 4024 wrote to memory of 224 4024 chrome.exe 86 PID 4024 wrote to memory of 224 4024 chrome.exe 86 PID 4024 wrote to memory of 224 4024 chrome.exe 86 PID 4024 wrote to memory of 224 4024 chrome.exe 86 PID 4024 wrote to memory of 224 4024 chrome.exe 86 PID 4024 wrote to memory of 224 4024 chrome.exe 86 PID 4024 wrote to memory of 224 4024 chrome.exe 86 PID 4024 wrote to memory of 224 4024 chrome.exe 86 PID 4024 wrote to memory of 224 4024 chrome.exe 86 PID 4024 wrote to memory of 224 4024 chrome.exe 86 PID 4024 wrote to memory of 224 4024 chrome.exe 86 PID 4024 wrote to memory of 224 4024 chrome.exe 86 PID 4024 wrote to memory of 224 4024 chrome.exe 86 PID 4024 wrote to memory of 224 4024 chrome.exe 86 PID 4024 wrote to memory of 224 4024 chrome.exe 86 PID 4024 wrote to memory of 224 4024 chrome.exe 86 PID 4024 wrote to memory of 224 4024 chrome.exe 86 PID 4024 wrote to memory of 224 4024 chrome.exe 86 PID 4024 wrote to memory of 224 4024 chrome.exe 86 PID 4024 wrote to memory of 224 4024 chrome.exe 86 PID 4024 wrote to memory of 224 4024 chrome.exe 86 PID 4024 wrote to memory of 224 4024 chrome.exe 86 PID 4024 wrote to memory of 224 4024 chrome.exe 86 PID 4024 wrote to memory of 224 4024 chrome.exe 86 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory="Default"2⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffc0272cc40,0x7ffc0272cc4c,0x7ffc0272cc583⤵PID:4100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1908,i,9168386881206120553,10542150947226176863,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1900 /prefetch:23⤵PID:2760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2128,i,9168386881206120553,10542150947226176863,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2164 /prefetch:33⤵PID:1340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2220,i,9168386881206120553,10542150947226176863,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2432 /prefetch:83⤵PID:224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3196,i,9168386881206120553,10542150947226176863,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3216 /prefetch:13⤵
- Uses browser remote debugging
PID:4380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3224,i,9168386881206120553,10542150947226176863,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3256 /prefetch:13⤵
- Uses browser remote debugging
PID:2524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4508,i,9168386881206120553,10542150947226176863,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4468 /prefetch:13⤵
- Uses browser remote debugging
PID:4912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4752,i,9168386881206120553,10542150947226176863,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4748 /prefetch:83⤵PID:3064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4796,i,9168386881206120553,10542150947226176863,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4472 /prefetch:83⤵PID:2092
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"2⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:3000 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc026946f8,0x7ffc02694708,0x7ffc026947183⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:3348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,2272036480775152740,1349650180954662063,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:23⤵PID:2884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,2272036480775152740,1349650180954662063,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,2272036480775152740,1349650180954662063,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:83⤵PID:3772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2088,2272036480775152740,1349650180954662063,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:13⤵
- Uses browser remote debugging
PID:4116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2088,2272036480775152740,1349650180954662063,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:13⤵
- Uses browser remote debugging
PID:1840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2088,2272036480775152740,1349650180954662063,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4800 /prefetch:13⤵
- Uses browser remote debugging
PID:3932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2088,2272036480775152740,1349650180954662063,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4072 /prefetch:13⤵
- Uses browser remote debugging
PID:4768
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\DocumentsAEHIECAFCG.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1616 -
C:\Users\Admin\DocumentsAEHIECAFCG.exe"C:\Users\Admin\DocumentsAEHIECAFCG.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:764 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4304 -
C:\Users\Admin\AppData\Local\Temp\1008198001\7dfa4fbeeb.exe"C:\Users\Admin\AppData\Local\Temp\1008198001\7dfa4fbeeb.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4804 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"6⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
PID:5936 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffc02b3cc40,0x7ffc02b3cc4c,0x7ffc02b3cc587⤵PID:5804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2064,i,9131768791166518974,345866374139142455,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2060 /prefetch:27⤵PID:860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1912,i,9131768791166518974,345866374139142455,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2188 /prefetch:37⤵PID:5160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2308,i,9131768791166518974,345866374139142455,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2324 /prefetch:87⤵PID:888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3204,i,9131768791166518974,345866374139142455,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3224 /prefetch:17⤵
- Uses browser remote debugging
PID:3008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3228,i,9131768791166518974,345866374139142455,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3384 /prefetch:17⤵
- Uses browser remote debugging
PID:2516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4600,i,9131768791166518974,345866374139142455,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4624 /prefetch:17⤵
- Uses browser remote debugging
PID:532
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5624
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3452
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4804 -s 12806⤵
- Program crash
PID:3844
-
-
-
C:\Users\Admin\AppData\Local\Temp\1008203001\b51a67b608.exe"C:\Users\Admin\AppData\Local\Temp\1008203001\b51a67b608.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3808
-
-
C:\Users\Admin\AppData\Local\Temp\1008204001\2d4347eddc.exe"C:\Users\Admin\AppData\Local\Temp\1008204001\2d4347eddc.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1972
-
-
C:\Users\Admin\AppData\Local\Temp\1008205001\14c43ad4fb.exe"C:\Users\Admin\AppData\Local\Temp\1008205001\14c43ad4fb.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4640 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:752
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3696
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1372
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:556
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1040
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking6⤵PID:3836
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking7⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3196 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2000 -parentBuildID 20240401114208 -prefsHandle 1928 -prefMapHandle 1888 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9d699fe8-c4a3-4fa1-9f82-ebb4ba02a89a} 3196 "\\.\pipe\gecko-crash-server-pipe.3196" gpu8⤵PID:5020
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2436 -parentBuildID 20240401114208 -prefsHandle 2344 -prefMapHandle 2384 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {219a9494-dca9-4f61-9927-ccac148e6adf} 3196 "\\.\pipe\gecko-crash-server-pipe.3196" socket8⤵PID:5008
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3504 -childID 1 -isForBrowser -prefsHandle 3524 -prefMapHandle 3244 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a6983c57-806f-421c-9cfa-04d8bd54e81b} 3196 "\\.\pipe\gecko-crash-server-pipe.3196" tab8⤵PID:3992
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3736 -childID 2 -isForBrowser -prefsHandle 3348 -prefMapHandle 2768 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {111f6e05-baf9-4621-b286-409a188f4a45} 3196 "\\.\pipe\gecko-crash-server-pipe.3196" tab8⤵PID:1616
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4660 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4536 -prefMapHandle 4648 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d37b00d8-9e90-4674-bda5-049f76449b59} 3196 "\\.\pipe\gecko-crash-server-pipe.3196" utility8⤵
- Checks processor information in registry
PID:5148
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5588 -childID 3 -isForBrowser -prefsHandle 5472 -prefMapHandle 5504 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {187bb1b4-69ad-49c2-b91a-b3ad9e4c7eb6} 3196 "\\.\pipe\gecko-crash-server-pipe.3196" tab8⤵PID:1332
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5764 -childID 4 -isForBrowser -prefsHandle 5692 -prefMapHandle 5472 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5b34475f-e963-4a35-a26f-6e5de1daaee0} 3196 "\\.\pipe\gecko-crash-server-pipe.3196" tab8⤵PID:2936
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5756 -childID 5 -isForBrowser -prefsHandle 5676 -prefMapHandle 5684 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4eb5f123-c082-4246-a666-04653bffbf7b} 3196 "\\.\pipe\gecko-crash-server-pipe.3196" tab8⤵PID:884
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1008206001\cdb63dffd6.exe"C:\Users\Admin\AppData\Local\Temp\1008206001\cdb63dffd6.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5764
-
-
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4304
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4480
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5192
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:5300
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4804 -ip 48041⤵PID:5236
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5728
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5476
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
40B
MD5db9149f34c6cfa44d2668a52f26b5b7f
SHA1f8cd86ce3eed8a75ff72c1e96e815a9031856ae7
SHA256632789cdfa972eec9efe17d8e2981c0298cf6bd5a7e5dad3cbdcf7bb30f2e47f
SHA512169b56304747417e0afe6263dd16415d3a64fff1b5318cd4a919005abe49ca213537e85a2f2d2291ea9dc9a48ea31c001e8e09e24f25304ae3c2cfefad715ce9
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\22d76f61-3bfe-4041-b7fa-f9ab15b4a656.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
649B
MD5c396dc4abb6af1fc54aab3bcf01b2e25
SHA18aba42263f028f4d10f37e3cbc146563fb5771b5
SHA25678f18814e9bba1db7e5bf907a23c4fcd6b1d2474fba13e517e71056bdbd70f4d
SHA512f01076fa857cbf03543f0c400546927e2f9d6197f34b53e2f0fc2e9fc72f96a5e6d5a6e173b58eb79b0cba9fe70996e2360b26e5eb81ad9826b3f4900f382884
-
Filesize
44KB
MD55047d93a52234cc1bc98bcf863edcc85
SHA1fe981737917135bc11f39c1449eaea1d536efb36
SHA2566feda5ae67cc570b2c589f02ce3bd83c03f92e22121926a1948da6dd4e4a6426
SHA5129f05a8d9534f242baa088ab720513e46ac40e86fb7ee0cd841d84494c86e07f77d9b0a0e91ebe57365f171828fb050d74236fc2b67dd98d437d64ecdebcc05a2
-
Filesize
264KB
MD5641f0dcd5ae61b475421d07cf1e862c9
SHA1530303bc18b27031a58ffa6ce5f78a1bbc9aaf53
SHA256ed8f67c8293193aeadd078087bcdd15a752b3e09d87aaf003b65859e863517a6
SHA5121d3a7a9fe2d80f5dc8c4b7ac89be53cc145d3da9798bd4ff4c90b8da1a6cc4829108f724de69ce781142a228936fff0eed546faf382d8e9bcdf0fefc9d2fb867
-
Filesize
4.0MB
MD5dfe345d54053698f1bc89db6b084e177
SHA138454c136ff5d8007234be9deb8ccb3540f330ff
SHA256e59c8b31391aaa0bea19cebd1cf93b70c50120f4cd1fd31110060e77e4d11d05
SHA512b01bfe288bbc49354ab4dacc1095cc793d7aa1b2868ce10c80ba85e7e9c444d2557070d6f9ee33d38a28611f1fe44ceb2784b72db68ec773166582507c4dd269
-
Filesize
317B
MD5100e6aed620cf4fe5b731f8d905bce5b
SHA14b9573ae0999c267d8f56b646a6b12abdaaf8d23
SHA2569461d58b65670d40990c502d4323d219004ff551a3aa795da8a7ca0e7c4a8562
SHA512d0d2580160e60c220d21f3ebe6dd9bc0226717f886f4c88d2968618173d8697b8c7db3bfda661856078cd6e9df343fb8274619806d87bb9ee5d0149c3143b125
-
Filesize
44KB
MD5097676b246d791984ff48539c9e36c2e
SHA187bd5896cca46affc3bba5cc2ac6cf642b01555a
SHA256bc8be9975bb62ad38ddd98cca0692937b58f4f08ed451c7c5fa4ee196bdffc1c
SHA512646ae8731a308e53dc1c7179de19874ce81327446113579131f31f1fbe05beab3a6c3796809c19de59ee903e2ce2ebd8f3dc390aadae82f966a7d76ab96cc26b
-
Filesize
264KB
MD57e0cf75feae4f5509efe015639335906
SHA180c8d897a054ed802cc5a791a583730da9c96c39
SHA256eb64d880f7e037a385358b75bb28e6b1e40aec549c2d492ea4d8dcdd3fc377f6
SHA51298bc4cca4fa8a0437408b3143aec3bebffe757bd3171f6703ade232e1d85aee5b1de60f8002b360c1ce8441d38732ea34e1ab002c29ed12294d86e5a6fcbe120
-
Filesize
1.0MB
MD54e2e997da0ae227057e074c67afdb7fa
SHA10a0b4db63b5a84f0bbbd8b0d472e665be69697cb
SHA256e8fca9c48d54e3405ad60c23ca5eaf2f15fb9a1d59b3936f178fcfac70a967e4
SHA512cb721fb2c0a687fdf89041d9baac042e45991bdd57b1093968e16ba5230741f027c358c8e9f45bab4bf16461fd9145dfacf596e418f4cfda60694af4237ced3f
-
Filesize
4.0MB
MD5c73ceb946a84dd65c7571e065361ff89
SHA10188249b60156917726cece1be3ed2c5157841c4
SHA2565ac5fb30df32a601b6b949cb1a86f869a07ee8b35df9d4cf2a2187681e699483
SHA512f67fc989f0af95783654b6258b8061ec4eb69abb9065db26731eb76e735e6914ffd25b6ebbf4e018fc6899dbaa711af689e62fae4cac97d75d913f2047c2ced4
-
Filesize
329B
MD59cb4aa0e02fe48fe6cc25c2d92ed0248
SHA1ed9a228667933b03d0ee0dd72a45aa062961d898
SHA256ae04398c56dabee079747e97cab1ab7742f0bcb96555c8205e8d93d287769f5e
SHA512cb7f8db29c1b28cb4e26d6b9ebe87053915f9449a2c561fff9004ee7d8e20153f1d11dfc5a42878cd335292f593ead572b3cc4be8ed398f38d724bb0182de5fd
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
333B
MD585c3d79340f5f24f169e93a5f50bfb5a
SHA1a666e5eea9fa0ae3c121fbcb395ca462b6ccabb0
SHA256fc4cec86c1f7a91c5edbaac3ed460452faf2dac7011620390fe66a0ffe6c8943
SHA512757d92e3042267f0d58ac5690097eb03963d8b5d9f6a3e37cf7ed23e4e736d5202472fddcde377537303986f3bf9fb811fa46519ef68f34d54652b8383f68e41
-
Filesize
289B
MD5541c42f1c98b3e1b011d22eba854e707
SHA1db30188de1f22e3077e7044be1386a5d0ecaed9d
SHA2560768e811c51ac61a8e573ac6b53f89dbb1d89eb2fcf62536a9a5f730329c584b
SHA51247828c1b40deb8d37d6ff4fc8f7673fbb59b40e07f54f0fa4121b91941160134c251e20f7f28f7ee5185f3c8aee2b7e95a1bef573bc64c68912016accbe90604
-
Filesize
317B
MD5c5965779a767e4e08b0c47beef407d37
SHA133e5b01a42f977a349535413818efa93f2e59a25
SHA256108aa71614e588bf551036d445e114f8684c74cdeedd534dbf12467248d6e872
SHA5125397207b2697bc79d5c37db0f7fda1b3fe285c5573d6f3d33d3846e5505e378af17eb6dc9ab47ce6ff61a4ab43e08869b494d6054471445c17f794c05a8ba06d
-
Filesize
345B
MD5bcea54c169dd235b33b89dc7579b3ebb
SHA1898fd804091733416342cadd8b769f1b868183d3
SHA256710394718058b5730b4b719b89b7f1ea50c6021e97d1d78af214209034fe3cc6
SHA512d05f76b75a8b04ce1a42dedbe48ab22d390d9287b31665b2179d2c3a1ee1234197edc4dd8c4f77af3d34b82d566c1365b73d27726504e6bda41d8f53705ff315
-
Filesize
321B
MD53ae50c4198625a13f9bc53f5737579e7
SHA12dbe8f3c14e08e7431710b46480211f704efce7e
SHA25656deca6d88c018c7c268065e47e25187723c9bead4fac013c8dfd946842a1756
SHA51283a96381f39298f344add4cc753ec028fecfd92f5941b2e0c406f97b331b11e96d0b0a3d2fc4f3cbcc192a2fd3059df9e3c399928b2e21bf97e5767551e9b583
-
Filesize
8KB
MD5474d274bc5d06449b74343ff94e99b92
SHA1a045d2c67c90a26cbee9bb84ac8ab9e436dd1139
SHA25688c2420566b850c7451ac75150ff1254ae63ac206b3a1d8686de5714dd4ad901
SHA51250bb003caecb9c0bae571c25a7d04ea080b13192a9e2d77cc1915cc19952ef0b1727af89c95d2e501035c982c060987847f97a820d84dacf3372428e0c62074a
-
Filesize
18KB
MD5b97f0bd7d98a062127921792aadaa614
SHA1da7c99e4a626dba617820a2fb273d14aa6e93197
SHA256b271c1fdfaf13393c1bfe4379becf8aaa4a810d48e3df66590619f7ee2e66afa
SHA512f3a72116395ff0bf4132ffd2a5d5bfb8e58b95457132c43cbe2f977c791c0af318840a10cf0100eb1a3cae1ec316fc44a653f787db69c25b37e63d957d339737
-
Filesize
317B
MD5d5207411339960b92b29d9bc59445ea5
SHA1cd22d56f6d498791f62240d3ed2f16c5186df04f
SHA25670ea53ff463524d248d51aa5efe3f6b927d2f15d510c371862d21d11ab72019d
SHA512adc9e86cf0c0d14bb797c41fb049e07b289eb1f00982c08ca4c81965e7b2d2345beb937eaa0b39d39c0fc11234f4a7f2d853096852ea414028e3bcc17201f1d0
-
Filesize
1KB
MD528dff999a2420fd76a20d4c07e2ebeed
SHA12005e4d76587f1c6c1b98ac62687a616564532b0
SHA2569f998c2de9744ee258b1b34a59ebede01ce742ccdeb1c980576900303062027f
SHA51275ebffd7085b883a5e1f0dabc379b6d7ae6d75098826d7002b558785da1e81b0842b505de18918d12d57837f76fbf078875f4b8bcfb8e0ecc962cfb7da28be1c
-
Filesize
335B
MD5ef808d2b5e560ea6f788ffdb06f4af1d
SHA1f40eb15384e85f10ea7e63a3e137e278e8b3c614
SHA256d31793e9bbfa1988539fd502de56c6da62a1c00d2868233f87993e5a1a055d09
SHA51298fc5746ad473ac20cbe632c51b4aee7c0687e7bb508b689eb54bbdb51adecf6f0a0423c1ac5e4e3fd97d9f1bfe9aef7c2b9ae2b15a865214dc940ecb106db1e
-
Filesize
44KB
MD528e2669f92884ab84693d884077eed15
SHA1c85c1b3f71103149bbdf50da3bcd58ce43ee5a06
SHA2566a62ab8d1c8d8c73129ff3394b6c621a36b1f2f35fc0c0be8598a42315c6ce50
SHA5126148a5b2ebd742aafbecd7f37c02910e18b84bf7d242c5b0462695cb192c228d614d647d30a9ff4835308b0b7685db38e5bdb6f19aeafd53070bd1f4eccd0972
-
Filesize
264KB
MD5032f291491773ef726c1823d015846a1
SHA1a6715ad464c6577a2e3891be9f99b7a5e93865ae
SHA256e0ae20457244f6f5718f00d8b5cd6f58cfb5bcc842bf2cd3c67f7be5479c1de7
SHA5123c586cf2c48523b10471d05cc99642106151b1b71def6b15498f7c9718480e206af0cadb083cfd211d09617a36c81ea02d835471ffadf94f455d19ec46f88a31
-
Filesize
4.0MB
MD5755aebd35ed6d7b087ffffa978f6c677
SHA1b6cca1dd22034b59defef639c74783efcc530cef
SHA256db631dbaba233658ef2cc73aa12fb624781310f8f006dac23b51c3cdfd58988d
SHA5122b9e0d98e5af0daf29c92c58be48896e96e3dc2e63def553ae75108646c41458068ca2b91b463bcf7bdbef6163f58e5899c0e80d95891a7a24a8a19e0aff1ed7
-
Filesize
14B
MD5ef48733031b712ca7027624fff3ab208
SHA1da4f3812e6afc4b90d2185f4709dfbb6b47714fa
SHA256c9ce8dbbe51a4131073db3d6ceef1e11eaca6308ad88a86125f221102d2cee99
SHA512ce3a5a429e3796977a8019f47806b8c0671b597ead642fcbfbe3144e2b8112d35a9f2250896b7f215d237d0d19c5966caf3fe674165a6d50e14cb2b88c892029
-
Filesize
86B
MD5961e3604f228b0d10541ebf921500c86
SHA16e00570d9f78d9cfebe67d4da5efe546543949a7
SHA256f7b24f2eb3d5eb0550527490395d2f61c3d2fe74bb9cb345197dad81b58b5fed
SHA512535f930afd2ef50282715c7e48859cc2d7b354ff4e6c156b94d5a2815f589b33189ffedfcaf4456525283e993087f9f560d84cfcf497d189ab8101510a09c472
-
Filesize
152B
MD5a0486d6f8406d852dd805b66ff467692
SHA177ba1f63142e86b21c951b808f4bc5d8ed89b571
SHA256c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be
SHA512065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a
-
Filesize
152B
MD5dc058ebc0f8181946a312f0be99ed79c
SHA10c6f376ed8f2d4c275336048c7c9ef9edf18bff0
SHA256378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a
SHA51236e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa
-
Filesize
5KB
MD5d9bdda5b95f98f68b414c6408690bd4c
SHA1fe626676bcfd40969a504de5cc93d4fa4e674e80
SHA2562c8af5add042942af7ce8062a97abe53eadc6ff24bb85f5eeccb52dfbe6424c8
SHA512ee8127e552f767a84b196ef93623cd21eab804d07b3f77ccd79d8a94976313588a2eb430f1a5f385fd77ee5da0984f212648e42de485373c8927accddfbe95e8
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\activity-stream.discovery_stream.json
Filesize20KB
MD53e08aa4def7a9b753c9fe77081c7fbf9
SHA1a1d8dc4bf1848aa722a34e7ddd8d74801209bafe
SHA256c85a456760d7332d747c7bc26c8d784ca3eda1614b589ceee793e785e9b40418
SHA512ffd8f0af6f1b081763bc11eb7a4defccbd936b2e6a66ef0f1104c6ad4888b83c7b72007e062d4c78c7a3f76e75f2bcf97328b3a05e44262a8f382a1f20c5eb0b
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD59704fe6b1591d983a466f43cf14ae62c
SHA16f2447ddd3b85add23d2e34e7e27f0a9ea130e82
SHA2564c27ac962a95a831e965cd9d02c83e579f97b2b80dd8d0eccb813db97193ad08
SHA512c31b6128741fc75da14dbcc314d7c6992b8cc8e1a4095ec7c985f1ae013716ace14b21e6d9326fc5304ddc636f097ca80aaf8a0dccd72c60899cafe84634a7b2
-
Filesize
4.2MB
MD5b759516b5ee0d73ed0870c1be43fb479
SHA134533e5ca737f48d55c73ba5cb939f39089c04c2
SHA25691180f943fef39f7177bbd1c1d8cf225fe93c0264dee172ebc7c96e69592373f
SHA512e911a8ca629d58942da1b2f8a85552b7f65814e071fb3105049e61eeef75fe4b545adbd95e01d58510b48f2abe83a630d438c8ea95abfd0e1866de330f27bc26
-
Filesize
1.8MB
MD5a86f2c1f9149bb3b144a8bb9dae81fe1
SHA1d92e5093e65fe71cab7d620358b61e682563e5a3
SHA2565c0f9637fb888a34dfde5a50476a9ec70abdd40d0aa54c1f0d7580f66abb0f20
SHA512efa9c4a74330435932459e45c01ae51136fa2a27d6d8e69b8f6a6737088c14853f1de056ab7d52ade5e3e601367a29c6e63b3abef0cc7b5f1a98cbaa82900945
-
Filesize
1.7MB
MD5bc7e15f0d547a97f33b7084eb8bb6e35
SHA183ee297f1a2f1651c6596c5349614ea27e4643d5
SHA256bee50744a16bd59e87b06e58043e3efd7bd2d3fb31f25e4481a9ea498e181194
SHA512e02e938300749d0c12b14a7b58c7cbd5bb0ab24680313bdcce95aef40403dcebfd10e1ce9f27088e6540fb21e5df70e09b296eeca832e165c74f4cf72b08b1ae
-
Filesize
901KB
MD5b0895a0731c64e8b38c574eb8309b613
SHA13ea5cf134fe2eeac85d6e0d270e020e0d70673af
SHA256b98202d8039c3e44098b3d63a000bd426afa2d01ad5365b4c4a36ee936f97bba
SHA512980d03ffc4763b4c4b2941a66ef43f0f5dbb11dcb55eae172d0e2074af41504a718d849c3d696fcfaf0b3c74c62c59dc661394349f02f78e365fd073c0632dd8
-
Filesize
2.7MB
MD551dad23c32335b9cf2517bd6d2b8602e
SHA10262f39a2b1562fa0eaf497490a712eed240fcb1
SHA256aa4b16bcda60809267bffc7edbfd75d29ba563d9f341cc57994d2676ada69156
SHA512bb2e9854819b47cf2360fba54f40bba9b883cdc04adf4d4f4ede0cca0cb40191d86c2ef56605b035101d2424a9ad2b0952ca80a6b5bc5d0ecbb7a910e1cbca72
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\AlternateServices.bin
Filesize6KB
MD52f2c4d09c334d06a4e09707ce4ef25d1
SHA12f9fd1811df478a9ca9463bf109957447f4c532b
SHA2569d7f4c05cfab92db3e83f5d5bff52779bf2ced4f82b52c693d9dc6b30098d16b
SHA512248fb1860f96daaf6f823971ef1d9d686b348e040a68208b2f38949691a61acf51d56e903fe4f7d00626d6131eae567b7f9e2655c84d0c48a5f573dc894092f6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\AlternateServices.bin
Filesize8KB
MD52829aa4fb87b439a94eaa0e3e9a974c1
SHA1b02f81046d6c9dcbca5128c0905c4a92dabe0ef7
SHA256ec0dde937a17719201ecfa5a90b55d760202e096bb123cf70c85fe9a2531c5de
SHA51265cefad65d934a381243f6252363d5d734d44ced29ffd3cac1305417e23cd0a4ea4d5e218be1e5f6545427d8cbfa2dabf4b2a97951e0e4fead3a528203e11eb9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5fc7f0b81c0091e8ce02a22b8554e3d36
SHA1db5eebb4a8038295295d6eeca2b94511442f2757
SHA256d206291f012fce7818ac08f057255f566d5723ac7a9f6a425bd7e8cfaed73f5c
SHA51203242a9ead8008a24b79bdd804274e27e5c8deb0899be810fdc9c0f6fc647a7017bd559ca2707a5f5749739b50cdec37ae50b890de89cdbe45a1ecbc55a6b453
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD56c4d71efebf6e3a4731d6bafcb004280
SHA1ce3aa2ee03679f154d9e0a1abf768f37fc06b53f
SHA2569df3b4d564cd38784b72513e334bc7fba66dcefa90c0824ac0d274d2c5df3885
SHA512fa1341fabded19e01a9b03e83090af9038c20d566e5c8eafe6c604f33ef2a934b4fb3c7528ca2f5d25e363aeae5559164c75cda342ae9b927f6f6a5e9c82ce11
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5a2a46e458b182e5c058b9c86d765d593
SHA17bdf25780fdf473a8abd01c06930ca7dc00ab448
SHA256a964089302d7428c65d80146f58199bd938ff9ec350cdbd99082265c9b7d7673
SHA512c94c967f2462ddc9ea73f541a356b5089b7c4aae97477a3754ed27497758b611c554665bb4baa03eca04068e032ea4b13f716515c40d9f96eb2417f329585e45
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\17b2c1f0-817e-4211-90d6-e2cd5b5e160d
Filesize25KB
MD5c3d975b400aae9596c9a185b101c5671
SHA12d94436d33f602c5f1dc6dc5b012dfb1b90ddb68
SHA2564bbab16002b80f0fe9833d27ec512cc2951066033005496c9c13f1f5ff8e920c
SHA512c74707cb8ffdb3570622e6976861eb56569af5e859215b49aadd66ba8a99994be6e0f582a6dfff5dd4fae9358dcc6eb34aa45fafd6e9f97be07d50aa9dfca298
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\2019b38a-1c0a-411b-8ab0-975a40cf1e5a
Filesize671B
MD54bde1d950cb1578e4f9fb2f2db88428f
SHA127bee5bd9240d79740ec0a841c708192e21a1e5d
SHA256492759e3a6966442b77e9acb6c223fd0e7b118aecc00a686c22a8b2ff0902dc4
SHA5124d6e36a2018fdbc9fd68b2c6f7afd98b5e7b10852c6483dce6b9e6c9a31a2078583b12e6b95209075e226c1cba83e299fd34c7b779b5da73b5af9708f495d4f2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\e3068f09-29bc-4f8a-874d-32a979a6f9e8
Filesize982B
MD5f6b57c618e98bf65e92450595d7de4cf
SHA13795757328701cf84810ceba050298c0d2d78689
SHA2566b3515bf3fd767ef10b7ba18b5c23f4ec40e1c5095253964fa3fab07dd42d9ed
SHA512ed43312fb0c1a3d65f6c03f1cbee6b5a66ad6ad2a8ef3de2e916f66681ebec1e0ce93946cc583d68872608a03715e63067f24ee413c479dcc3a6927e13f277ac
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD5a1fb60a2b501242cc6d725afe4ac99db
SHA1b6e166387147cf88842a18ad48faa1766f919379
SHA256034b251ac3736e8c1ec4f9d33bf6d3966970c8bc3030b942cb8366fc3cb8d7a2
SHA5125e353de11cb23faebb4d9b1ff4532f552c5d7c2efafe0941e248841b15a4338c6264ccb826f8c8f2b06c2688ea854a0ee13d3990e7eda00a86e38ee85f10498a
-
Filesize
11KB
MD5d07daee34eebfac46281038e167e8f65
SHA119d660e9f344ce17b5a4bfbbfc0e186bd8b60571
SHA256355eb9a75353217ef0aa61be2a9dda8883cbf305b8fb2db1757197a9db824c67
SHA512ff36bf55b2dd877b110affb8087a917b128822fee57b127b8c3cfbb3844735f8e94e17bf8241b753b56b97480dcc859d030271d3154706654944562d9371e248
-
Filesize
11KB
MD5f280d8912690b5189b154a960da2242f
SHA1e9542f48dbbe569795d6ce5e2793b4bc2b7bcc92
SHA256391312d3931a37f8c3214598ff12125d37a2eed755bb83ac672e973e86612612
SHA51260730cbc133950c60f92435f7b2f02fe9808ff7a5ffb0eb81056ef250c7d7f4e80a385abe38ad01a30e73854e776a504735df6526a4ee05d1d00da0e35f2d9ef
-
Filesize
10KB
MD52e00c4c63aaeedbca09e5e84f0b06bab
SHA14b624fd49d1b755da75fcd87c52b4fcb59b5e80d
SHA2564662405c126e441f913a1c9369262487d4bc5f8d721fb88e087c6599c74eeeca
SHA512283bf2c11d278742037a23a863e8a2059b3a410352ab1ce48bdbfa1fc3fa05eedf0a2519a5063f37a9b40968e33b0d819a66d45bb354019ca01e2a18af1b0e12
-
Filesize
1.8MB
MD51daa3a0aa5ed7e06b400a47309ba5003
SHA18d475fd4be28ee701dbe5e2fe489fe9e9b3e826d
SHA256c3d0427b8bc9d084ac65b881ec50f55be52650f60850ac05010ccc8d56e3d1cb
SHA512bc671cd250579413e693d2a61c2873a776a7c39125addd78b7a39a268c508fb638cd7c552faabd3ac9a53baf4b97086173af09264dd68e2f5a7516b55a3f2ed8