Analysis
-
max time kernel
115s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26/11/2024, 02:24
Static task
static1
Behavioral task
behavioral1
Sample
53d7efedb4eee78a085bd4b342d0ff2e634b347c157c94136249da2d80d16339.exe
Resource
win10v2004-20241007-en
General
-
Target
53d7efedb4eee78a085bd4b342d0ff2e634b347c157c94136249da2d80d16339.exe
-
Size
7.0MB
-
MD5
a4f7cf40bea1997a7b4152002c8a94ca
-
SHA1
2020e0745a1391634d244897aa19695463ae95ed
-
SHA256
53d7efedb4eee78a085bd4b342d0ff2e634b347c157c94136249da2d80d16339
-
SHA512
20ee98200b7229ab52ce73a0a8533ff6916f968e89871c7684b8eba584daf1231de99e11b24b02f2d4ccd8dfb79ecdc63c32a2afe297bf9c6411611a93f75be5
-
SSDEEP
196608:dx+tUjc1eQJq/AfpeYnuPTR3ATVL8nebhyyBiL:dx+CjcVRRu7aTVLB9AL
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Detect Poverty Stealer Payload 1 IoCs
resource yara_rule behavioral1/files/0x0007000000023cc4-113.dat family_povertystealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4s240q.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4s240q.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4s240q.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" aba95b8a1a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" aba95b8a1a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" aba95b8a1a.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4s240q.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4s240q.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4s240q.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" aba95b8a1a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" aba95b8a1a.exe -
Poverty Stealer
Poverty Stealer is a crypto and infostealer written in C++.
-
Povertystealer family
-
Stealc family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
description pid Process procid_target PID 3868 created 3444 3868 Zefoysm.exe 56 PID 5188 created 2728 5188 AddInProcess32.exe 49 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3N57R.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4s240q.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2T2388.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 763517461e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c1d4ed0262.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ aba95b8a1a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1U33Q3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3a64b4c2c3.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 2220 chrome.exe 5836 chrome.exe 5812 chrome.exe 6008 chrome.exe -
Checks BIOS information in registry 2 TTPs 22 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2T2388.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2T2388.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3N57R.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c1d4ed0262.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion aba95b8a1a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1U33Q3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3N57R.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4s240q.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 763517461e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1U33Q3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3a64b4c2c3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3a64b4c2c3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 763517461e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c1d4ed0262.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion aba95b8a1a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4s240q.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 1U33Q3.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 3a64b4c2c3.exe -
Executes dropped EXE 21 IoCs
pid Process 1268 P7X41.exe 4964 d0m76.exe 4516 1U33Q3.exe 4344 skotes.exe 4532 2T2388.exe 3292 3N57R.exe 4080 4s240q.exe 4572 x4lburt.exe 3396 computerlead.exe 3868 Zefoysm.exe 2220 1Shasou.exe 4436 Zefoysm.exe 5520 3a64b4c2c3.exe 5352 763517461e.exe 5540 c1d4ed0262.exe 6024 6aeb272798.exe 4644 aba95b8a1a.exe 5916 skotes.exe 2192 service123.exe 1984 skotes.exe 3428 service123.exe -
Identifies Wine through registry keys 2 TTPs 11 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 3N57R.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 4s240q.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 3a64b4c2c3.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine aba95b8a1a.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 1U33Q3.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 2T2388.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine c1d4ed0262.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 763517461e.exe -
Loads dropped DLL 2 IoCs
pid Process 2192 service123.exe 3428 service123.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4s240q.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4s240q.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" aba95b8a1a.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\6aeb272798.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009182001\\6aeb272798.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\aba95b8a1a.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009183001\\aba95b8a1a.exe" skotes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 53d7efedb4eee78a085bd4b342d0ff2e634b347c157c94136249da2d80d16339.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" P7X41.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" d0m76.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x4lburt.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\763517461e.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009180001\\763517461e.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\c1d4ed0262.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009181001\\c1d4ed0262.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0007000000023cd3-1374.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
pid Process 4516 1U33Q3.exe 4344 skotes.exe 4532 2T2388.exe 3292 3N57R.exe 4080 4s240q.exe 5520 3a64b4c2c3.exe 5352 763517461e.exe 5540 c1d4ed0262.exe 4644 aba95b8a1a.exe 5916 skotes.exe 1984 skotes.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3868 set thread context of 4436 3868 Zefoysm.exe 106 PID 3396 set thread context of 5188 3396 computerlead.exe 138 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1U33Q3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 5356 5188 WerFault.exe 138 5440 5520 WerFault.exe 107 -
System Location Discovery: System Language Discovery 1 TTPs 26 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language P7X41.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 763517461e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6aeb272798.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fontdrvhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 53d7efedb4eee78a085bd4b342d0ff2e634b347c157c94136249da2d80d16339.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language computerlead.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3N57R.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3a64b4c2c3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Zefoysm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1U33Q3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2T2388.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4s240q.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1Shasou.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Zefoysm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c1d4ed0262.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d0m76.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aba95b8a1a.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3a64b4c2c3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3a64b4c2c3.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Kills process with taskkill 5 IoCs
pid Process 5032 taskkill.exe 2144 taskkill.exe 5132 taskkill.exe 6060 taskkill.exe 6128 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1688 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4516 1U33Q3.exe 4516 1U33Q3.exe 4344 skotes.exe 4344 skotes.exe 4532 2T2388.exe 4532 2T2388.exe 3292 3N57R.exe 3292 3N57R.exe 4080 4s240q.exe 4080 4s240q.exe 3396 computerlead.exe 3396 computerlead.exe 3396 computerlead.exe 4080 4s240q.exe 4080 4s240q.exe 3868 Zefoysm.exe 3868 Zefoysm.exe 5520 3a64b4c2c3.exe 5520 3a64b4c2c3.exe 5352 763517461e.exe 5352 763517461e.exe 4436 Zefoysm.exe 4436 Zefoysm.exe 4436 Zefoysm.exe 4436 Zefoysm.exe 4436 Zefoysm.exe 4436 Zefoysm.exe 5540 c1d4ed0262.exe 5540 c1d4ed0262.exe 6024 6aeb272798.exe 6024 6aeb272798.exe 4644 aba95b8a1a.exe 4644 aba95b8a1a.exe 4436 Zefoysm.exe 4436 Zefoysm.exe 4436 Zefoysm.exe 4436 Zefoysm.exe 4436 Zefoysm.exe 4436 Zefoysm.exe 6024 6aeb272798.exe 6024 6aeb272798.exe 4644 aba95b8a1a.exe 4644 aba95b8a1a.exe 4644 aba95b8a1a.exe 5916 skotes.exe 5916 skotes.exe 4436 Zefoysm.exe 4436 Zefoysm.exe 4436 Zefoysm.exe 4436 Zefoysm.exe 4436 Zefoysm.exe 4436 Zefoysm.exe 2220 chrome.exe 2220 chrome.exe 5188 AddInProcess32.exe 5188 AddInProcess32.exe 5188 AddInProcess32.exe 5188 AddInProcess32.exe 6040 fontdrvhost.exe 6040 fontdrvhost.exe 6040 fontdrvhost.exe 6040 fontdrvhost.exe 1984 skotes.exe 1984 skotes.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeDebugPrivilege 3396 computerlead.exe Token: SeDebugPrivilege 4080 4s240q.exe Token: SeDebugPrivilege 3868 Zefoysm.exe Token: SeDebugPrivilege 3868 Zefoysm.exe Token: SeDebugPrivilege 5132 taskkill.exe Token: SeDebugPrivilege 6060 taskkill.exe Token: SeDebugPrivilege 6128 taskkill.exe Token: SeDebugPrivilege 5032 taskkill.exe Token: SeDebugPrivilege 2144 taskkill.exe Token: SeDebugPrivilege 4928 firefox.exe Token: SeDebugPrivilege 4928 firefox.exe Token: SeDebugPrivilege 4644 aba95b8a1a.exe Token: SeShutdownPrivilege 2220 chrome.exe Token: SeCreatePagefilePrivilege 2220 chrome.exe -
Suspicious use of FindShellTrayWindow 59 IoCs
pid Process 4516 1U33Q3.exe 6024 6aeb272798.exe 6024 6aeb272798.exe 6024 6aeb272798.exe 6024 6aeb272798.exe 6024 6aeb272798.exe 6024 6aeb272798.exe 6024 6aeb272798.exe 6024 6aeb272798.exe 4928 firefox.exe 4928 firefox.exe 4928 firefox.exe 4928 firefox.exe 4928 firefox.exe 4928 firefox.exe 4928 firefox.exe 4928 firefox.exe 4928 firefox.exe 4928 firefox.exe 4928 firefox.exe 4928 firefox.exe 4928 firefox.exe 4928 firefox.exe 4928 firefox.exe 4928 firefox.exe 4928 firefox.exe 4928 firefox.exe 4928 firefox.exe 4928 firefox.exe 4928 firefox.exe 6024 6aeb272798.exe 6024 6aeb272798.exe 6024 6aeb272798.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 6024 6aeb272798.exe 6024 6aeb272798.exe 6024 6aeb272798.exe 6024 6aeb272798.exe 6024 6aeb272798.exe 6024 6aeb272798.exe 6024 6aeb272798.exe 6024 6aeb272798.exe 4928 firefox.exe 4928 firefox.exe 4928 firefox.exe 4928 firefox.exe 4928 firefox.exe 4928 firefox.exe 4928 firefox.exe 4928 firefox.exe 4928 firefox.exe 4928 firefox.exe 4928 firefox.exe 4928 firefox.exe 4928 firefox.exe 4928 firefox.exe 4928 firefox.exe 4928 firefox.exe 4928 firefox.exe 4928 firefox.exe 4928 firefox.exe 4928 firefox.exe 6024 6aeb272798.exe 6024 6aeb272798.exe 6024 6aeb272798.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4928 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4600 wrote to memory of 1268 4600 53d7efedb4eee78a085bd4b342d0ff2e634b347c157c94136249da2d80d16339.exe 83 PID 4600 wrote to memory of 1268 4600 53d7efedb4eee78a085bd4b342d0ff2e634b347c157c94136249da2d80d16339.exe 83 PID 4600 wrote to memory of 1268 4600 53d7efedb4eee78a085bd4b342d0ff2e634b347c157c94136249da2d80d16339.exe 83 PID 1268 wrote to memory of 4964 1268 P7X41.exe 84 PID 1268 wrote to memory of 4964 1268 P7X41.exe 84 PID 1268 wrote to memory of 4964 1268 P7X41.exe 84 PID 4964 wrote to memory of 4516 4964 d0m76.exe 85 PID 4964 wrote to memory of 4516 4964 d0m76.exe 85 PID 4964 wrote to memory of 4516 4964 d0m76.exe 85 PID 4516 wrote to memory of 4344 4516 1U33Q3.exe 86 PID 4516 wrote to memory of 4344 4516 1U33Q3.exe 86 PID 4516 wrote to memory of 4344 4516 1U33Q3.exe 86 PID 4964 wrote to memory of 4532 4964 d0m76.exe 87 PID 4964 wrote to memory of 4532 4964 d0m76.exe 87 PID 4964 wrote to memory of 4532 4964 d0m76.exe 87 PID 1268 wrote to memory of 3292 1268 P7X41.exe 94 PID 1268 wrote to memory of 3292 1268 P7X41.exe 94 PID 1268 wrote to memory of 3292 1268 P7X41.exe 94 PID 4600 wrote to memory of 4080 4600 53d7efedb4eee78a085bd4b342d0ff2e634b347c157c94136249da2d80d16339.exe 97 PID 4600 wrote to memory of 4080 4600 53d7efedb4eee78a085bd4b342d0ff2e634b347c157c94136249da2d80d16339.exe 97 PID 4600 wrote to memory of 4080 4600 53d7efedb4eee78a085bd4b342d0ff2e634b347c157c94136249da2d80d16339.exe 97 PID 4344 wrote to memory of 4572 4344 skotes.exe 98 PID 4344 wrote to memory of 4572 4344 skotes.exe 98 PID 4572 wrote to memory of 3396 4572 x4lburt.exe 99 PID 4572 wrote to memory of 3396 4572 x4lburt.exe 99 PID 4572 wrote to memory of 3396 4572 x4lburt.exe 99 PID 4344 wrote to memory of 3868 4344 skotes.exe 103 PID 4344 wrote to memory of 3868 4344 skotes.exe 103 PID 4344 wrote to memory of 3868 4344 skotes.exe 103 PID 4344 wrote to memory of 2220 4344 skotes.exe 105 PID 4344 wrote to memory of 2220 4344 skotes.exe 105 PID 4344 wrote to memory of 2220 4344 skotes.exe 105 PID 3868 wrote to memory of 4436 3868 Zefoysm.exe 106 PID 3868 wrote to memory of 4436 3868 Zefoysm.exe 106 PID 3868 wrote to memory of 4436 3868 Zefoysm.exe 106 PID 3868 wrote to memory of 4436 3868 Zefoysm.exe 106 PID 3868 wrote to memory of 4436 3868 Zefoysm.exe 106 PID 3868 wrote to memory of 4436 3868 Zefoysm.exe 106 PID 4344 wrote to memory of 5520 4344 skotes.exe 107 PID 4344 wrote to memory of 5520 4344 skotes.exe 107 PID 4344 wrote to memory of 5520 4344 skotes.exe 107 PID 4344 wrote to memory of 5352 4344 skotes.exe 108 PID 4344 wrote to memory of 5352 4344 skotes.exe 108 PID 4344 wrote to memory of 5352 4344 skotes.exe 108 PID 4344 wrote to memory of 5540 4344 skotes.exe 112 PID 4344 wrote to memory of 5540 4344 skotes.exe 112 PID 4344 wrote to memory of 5540 4344 skotes.exe 112 PID 4344 wrote to memory of 6024 4344 skotes.exe 113 PID 4344 wrote to memory of 6024 4344 skotes.exe 113 PID 4344 wrote to memory of 6024 4344 skotes.exe 113 PID 6024 wrote to memory of 5132 6024 6aeb272798.exe 114 PID 6024 wrote to memory of 5132 6024 6aeb272798.exe 114 PID 6024 wrote to memory of 5132 6024 6aeb272798.exe 114 PID 6024 wrote to memory of 6060 6024 6aeb272798.exe 117 PID 6024 wrote to memory of 6060 6024 6aeb272798.exe 117 PID 6024 wrote to memory of 6060 6024 6aeb272798.exe 117 PID 6024 wrote to memory of 6128 6024 6aeb272798.exe 119 PID 6024 wrote to memory of 6128 6024 6aeb272798.exe 119 PID 6024 wrote to memory of 6128 6024 6aeb272798.exe 119 PID 6024 wrote to memory of 5032 6024 6aeb272798.exe 121 PID 6024 wrote to memory of 5032 6024 6aeb272798.exe 121 PID 6024 wrote to memory of 5032 6024 6aeb272798.exe 121 PID 6024 wrote to memory of 2144 6024 6aeb272798.exe 123 PID 6024 wrote to memory of 2144 6024 6aeb272798.exe 123 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2728
-
C:\Windows\SysWOW64\fontdrvhost.exe"C:\Windows\System32\fontdrvhost.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:6040
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3444
-
C:\Users\Admin\AppData\Local\Temp\53d7efedb4eee78a085bd4b342d0ff2e634b347c157c94136249da2d80d16339.exe"C:\Users\Admin\AppData\Local\Temp\53d7efedb4eee78a085bd4b342d0ff2e634b347c157c94136249da2d80d16339.exe"2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\P7X41.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\P7X41.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d0m76.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d0m76.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1U33Q3.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1U33Q3.exe5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Users\Admin\AppData\Local\Temp\1009118001\x4lburt.exe"C:\Users\Admin\AppData\Local\Temp\1009118001\x4lburt.exe"7⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\computerlead.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\computerlead.exe8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3396 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"9⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5188 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5188 -s 59210⤵
- Program crash
PID:5356
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009146001\Zefoysm.exe"C:\Users\Admin\AppData\Local\Temp\1009146001\Zefoysm.exe"7⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3868
-
-
C:\Users\Admin\AppData\Local\Temp\1009157001\1Shasou.exe"C:\Users\Admin\AppData\Local\Temp\1009157001\1Shasou.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2220
-
-
C:\Users\Admin\AppData\Local\Temp\1009175001\3a64b4c2c3.exe"C:\Users\Admin\AppData\Local\Temp\1009175001\3a64b4c2c3.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:5520 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"8⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2220 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x160,0x164,0x168,0x13c,0x16c,0x7ffcd19ecc40,0x7ffcd19ecc4c,0x7ffcd19ecc589⤵PID:5592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1932,i,2225787700509468929,612601491269355879,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1928 /prefetch:29⤵PID:5580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2060,i,2225787700509468929,612601491269355879,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2512 /prefetch:39⤵PID:6684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2132,i,2225787700509468929,612601491269355879,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2620 /prefetch:89⤵PID:5692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3116,i,2225787700509468929,612601491269355879,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3176 /prefetch:19⤵
- Uses browser remote debugging
PID:5812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3140,i,2225787700509468929,612601491269355879,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3212 /prefetch:19⤵
- Uses browser remote debugging
PID:5836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4512,i,2225787700509468929,612601491269355879,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4528 /prefetch:19⤵
- Uses browser remote debugging
PID:6008
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2192
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f8⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1688
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5520 -s 13808⤵
- Program crash
PID:5440
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009180001\763517461e.exe"C:\Users\Admin\AppData\Local\Temp\1009180001\763517461e.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5352
-
-
C:\Users\Admin\AppData\Local\Temp\1009181001\c1d4ed0262.exe"C:\Users\Admin\AppData\Local\Temp\1009181001\c1d4ed0262.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5540
-
-
C:\Users\Admin\AppData\Local\Temp\1009182001\6aeb272798.exe"C:\Users\Admin\AppData\Local\Temp\1009182001\6aeb272798.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:6024 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T8⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5132
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T8⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6060
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T8⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6128
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T8⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5032
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T8⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2144
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking8⤵PID:3524
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking9⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4928 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2076 -parentBuildID 20240401114208 -prefsHandle 2012 -prefMapHandle 1964 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a0324346-3381-40a6-b962-e07c00229ea6} 4928 "\\.\pipe\gecko-crash-server-pipe.4928" gpu10⤵PID:4468
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2520 -parentBuildID 20240401114208 -prefsHandle 2488 -prefMapHandle 2484 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ce7ea43e-c7bd-4cce-98ab-cfbdb78dfc5f} 4928 "\\.\pipe\gecko-crash-server-pipe.4928" socket10⤵PID:2948
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3244 -childID 1 -isForBrowser -prefsHandle 3192 -prefMapHandle 3160 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1200 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a3cc0967-4f3c-4ece-b88f-1aaf6698ad4a} 4928 "\\.\pipe\gecko-crash-server-pipe.4928" tab10⤵PID:880
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3288 -childID 2 -isForBrowser -prefsHandle 3952 -prefMapHandle 3948 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1200 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0c86c9ae-e391-4c94-8345-e7d606a04dba} 4928 "\\.\pipe\gecko-crash-server-pipe.4928" tab10⤵PID:3464
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4556 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4516 -prefMapHandle 4528 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fef181e4-deae-4d46-9ab5-2f0454714478} 4928 "\\.\pipe\gecko-crash-server-pipe.4928" utility10⤵
- Checks processor information in registry
PID:2188
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1288 -childID 3 -isForBrowser -prefsHandle 5048 -prefMapHandle 5044 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1200 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f968a707-7919-42ea-90b5-0dede80f274d} 4928 "\\.\pipe\gecko-crash-server-pipe.4928" tab10⤵PID:6764
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5308 -childID 4 -isForBrowser -prefsHandle 5300 -prefMapHandle 5296 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1200 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c68f627d-49cd-4ec0-b875-42972d584431} 4928 "\\.\pipe\gecko-crash-server-pipe.4928" tab10⤵PID:6784
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5536 -childID 5 -isForBrowser -prefsHandle 5456 -prefMapHandle 5464 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1200 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0212ba41-0a37-4ce7-9be1-cbbbed55fc18} 4928 "\\.\pipe\gecko-crash-server-pipe.4928" tab10⤵PID:6800
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009183001\aba95b8a1a.exe"C:\Users\Admin\AppData\Local\Temp\1009183001\aba95b8a1a.exe"7⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4644
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2T2388.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2T2388.exe5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4532
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3N57R.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3N57R.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3292
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4s240q.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4s240q.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4080
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009146001\Zefoysm.exe"C:\Users\Admin\AppData\Local\Temp\1009146001\Zefoysm.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4436
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5916
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:336
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 5188 -ip 51881⤵PID:4984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 5520 -ip 55201⤵PID:6420
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1984
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3428
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\g9per00b.default-release\activity-stream.discovery_stream.json
Filesize27KB
MD566ae1f7842bcb77eaec775e9d7cd9fff
SHA1c6cc40d8fdd302c7846757083432b87664077320
SHA2563164a80c50503aa302d1a077276fc0fc2e85e85d7ea5f465d9d37eeb97789474
SHA5125d895cfd597a6419e7614e85794902a1789af822dcb8b22fbe4ecff7fe47bc9aed6ef4c230092d96f9f01ce261fac7c77e593642ccad97b0e142a95ba4813fe9
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\g9per00b.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD57dffc759f5c0b43a01c72dd444ec5061
SHA16350d93cd225769ff16795e77164a557ab334de8
SHA2568c4411008dee1b0b83e63a622369962171801784b58a917f5cfb527987f20bf3
SHA512b948976c6f60355c9f9719b867e7c10fa32cdf0bc9032904efdc83d5d687f4042f7669d8cfed48d7dc336d4d688e713ebac3b8f31d28a5ac6719f5a6c9616e61
-
Filesize
932KB
MD596a7b754ca8e8f35ae9e2b88b9f25658
SHA1ed24a27a726b87c1d5bf1da60527e5801603bb8e
SHA25621d262741b3661b4bf1569f744dc5b5e6119cfa4f0748b9c0fa240f75442cc50
SHA512facb2e44f5a506349710e9b2d29f6664357d057444a6bd994cf3901dee7bea471247b47496cc4480f1ad2fac4b1867117072ea7a0bfa83d55ced4e00dda96745
-
Filesize
211KB
MD5ebbaf388ef32ae0785459ea0e57f0b68
SHA12604c1636a3479667df404117fa3b57d1ac8849f
SHA256dca6babd2e9709e4f2f56946626b7919a84b09a8d4679f34a985eabb255aba20
SHA512d787214d90bb99be76fe4ede63ca50487b80c0da7c190faa4120b845cea42e631e1b59989d7b4fb07f2eb83ca7187890d40a36a07cc40236e76d1d1806aba4e7
-
Filesize
29KB
MD5d0038532ae6cec64be83bc19d0b8f695
SHA117a23380f80068d15ebc014cb2b1748bb45fb5c1
SHA256b412dd132cb21a0d4d7bb622c6fe49f9e6c5c934201815d570db774ac80194f5
SHA512af269471f7093445fb05bc6d6d185f9e48d0666674a3de50c4217757d3fdf39b067668bf2ca37eac91d5cb203c3ce3d4d634661e470d84d12c80c332344503ea
-
Filesize
4.2MB
MD50681851640b935b4a9425e967cac0370
SHA17331dc9b49c56fbd7d2e750d5b181515257619a0
SHA25649961a2d21872034f17208c7367930061eed9d68a33f1859553808e3afdc3fb5
SHA5120ab754dc8dcf2b07bb89d1cb033a9ea0c931396c11f454bc8e77b211cb90b4623df6558e02a01969947126f006639afaba90f98c17a97f1f39638b7c605ffdfc
-
Filesize
1.8MB
MD5bce9e8eabe97a082a42366988424ae91
SHA145faa483f9c702fcf34b4fd566f18c8f499b7564
SHA2566896d4a208e14bdc55e9eea19b8444e342cfb2d9959cc93f65b3d5fee398c304
SHA512beb3e1a742f943fffa70137ede65034f3e1ccdae51afe0fdc3c787e8e3a54bd698bff6fef7093addb643b82ecde0f39aaca4a081c7811ebb5afdd7a47f4d936e
-
Filesize
1.7MB
MD515cecda155f7ea9681dbf0d4be3aa332
SHA1ed967bd084181726638f727bb9dfb6ceca95b277
SHA2568924897ed59d73e2c78cb532368cba7598f5e28898c9afcdca3ae39470ca2228
SHA512a611c5d983365bafcf4f14640f9945db97e447d3f68f8ab81b8138a30462929a61bf67fa3a3b25e076e17837bb67bc79833b784dd524df1bba4724729c63fb4d
-
Filesize
901KB
MD50346dcf691aa02ade7e7b6a3f2b68189
SHA131aa5bb397a78494c2072348206f876c7ccac680
SHA25665b467397c90cb4b99cf0cb22ea90378edc09760e551e336a30bb90cbb29fcd5
SHA5120e736ac2847a50921b27b2c72c1480652e2d193fbfed6c3e9c8b5f49bfbb1bbce47632ed1f19748b3a6fb23f0a207b808bf2fa02762ef3677839a79b62a5164c
-
Filesize
2.7MB
MD53af71a7071ed32f127e3e1ca65ee7aaf
SHA148cb2d7dfc6dc74cd5a4dd9c3a0bc749ce435290
SHA2562a1533a08074560e0794b8f9ac5887a3420338ba64a4528e237fada458824717
SHA512890e733ed036757cb1489c6575b4f5e34f0a1a4b1544260288bef36e82ff027096da6ab0addf49084ebbf687ca8ac97b747c4e5fdfce2a6a7615dc7368890cdf
-
Filesize
2.7MB
MD572c14b3785a58d2193792d24910b48ca
SHA1c3a14fe31913d26ab7c565c71a7d7dc99e8936b0
SHA2564198f3f3a8b80b86d7f66bcfaf98e6c42caedbdb31eb2ae21c0f3340195b70c5
SHA512ed479cb7ca48b02d8af3dddb29942028a9f9b0f395cf49431603383b592eb0b1ceca22821d728ee07e48a9371a71729b3509ed188f655ebd557e1d3c576ac739
-
Filesize
5.5MB
MD55471df20b39c91950338b2af5514f6e8
SHA146d57f7100377574524bd030a8b8c0f8265dbf9a
SHA256a83140c455493a69404a62fe56d0cfa248801ddca2f088315d07bf12d64a2d41
SHA5125df2fb127ad2453bf00f917780caf434331c90fe4fae7232888130d78ed7d08791f1d2dbcd70d5abb62943a4bda232babeea2340eb287797c186c74b559369c0
-
Filesize
1.7MB
MD54b517665a74a84df87d5360aa6560efb
SHA18e2981eaf255f7e1cc90da8b494148281769bcb4
SHA256462b590df7f786de4cb422be74146d935f45d47008a25fe26979f3737f3dd972
SHA51298bd7c367a1c98eb8bacc975f5cd1a9302d68f6661af529f173fa9f2433ab773aed7c9a6fc8b41b654fffd3514443ec1804b86b747baf9b0d9381ce7d6b388ee
-
Filesize
1.1MB
MD52354e800eefc681a7d60f3b6b28acfd9
SHA110b6a3d9d2283b5f98c9924fa1fca6da79edb720
SHA256d3c21f6c3892f0c444ffb4b06f962caddf68d2c3938bbd399a3056db255007e3
SHA5120395737b77891d8cf7761266c2b3d594deb8e742bd5f12f15f58b2c161c242356b953ebf8cd1f41924a917b2c1332bd2e05ef275efd2419a6134a60729195354
-
Filesize
3.7MB
MD55df2791f053f6c8a67afcd85c2fd527d
SHA1fab7ae3180a7dbccd2fe046861c10bc104475244
SHA256a19e2e99e4c9c84f975630e7c33989fad5a3862ad7017d2f228fbceed7f50cd6
SHA512c7c221c662fa993bf52979f53108af72d8a627a74971959aeee7635bc9ceabf66a98ae613ecc16a76399503cd708c6a49d32ae7c5cc8ae5a10788ae07b36b359
-
Filesize
1.8MB
MD5ebe6de9be122d27057536193303f1f89
SHA1199b00d481006678f3a2db4902910a883be2f275
SHA256bace923f8be90bf0f398e9310d52723265e250651cb36115bc233ca3300160a6
SHA512c10afdf10124390958160a5fc5b2ac7eeaa3ed4705a8b4bba89aa1ac17128fa8979cf9081b1997a9d8a03ed6c2c756878da9a8b96162c84b1f3b52eab55ee5d8
-
Filesize
1.8MB
MD5da6f4dd65914c67347f3db2234602578
SHA1c83a4f830eb6cfc28569dc04ed990394af7edcc7
SHA25618910cb7826a44f2521c58dc2a4db4340b6b3fbc555e9dda6072436f543bdb41
SHA512b15d4421000f84c81f0a7e25ad60375b646c66a9d2de96f9318a361bf028c9b60d4652c1c21dce136a95acd8b5430498465506f718140e271a4c7fcbf0e0f1ca
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\AlternateServices.bin
Filesize8KB
MD5591dbe4cc9d93c26ea1e8c63f5e1f0c8
SHA1d002610ea60b89988b0116c4fba998672804bd80
SHA25696a5d2254e144f6d2a334970969b63a0472db3659aa9304da17860ca72a8441e
SHA5124320fdcd4bbc47225d9207609227a769a4dd92483b3b45f30accff92a49bda332a2b81cf0dd0f579ac87ecce597d10a6c68f8303553c26b49a574aa3e6f6dfa5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.bin
Filesize23KB
MD5edbfcb244fc0a949a73d81d297774b8a
SHA1d5e0849c1c3b237cc3466484643dba865acf9a06
SHA2564a71ed1b163d1f3a8823f6ead8754613f8b454578b4e94eba6c25faa56ba4ea3
SHA512d06af130caaf274046a65eb6e22044d9d1ac41b3be7cf80779e61f1f3946190862af61c40e3be80249178caac321d2c06a12ef1ea364a8d657324960550aa7d7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.bin
Filesize25KB
MD58eee7172fdc41e29f38d5390574776f4
SHA1cad5ba1f1f4b2ef6076a0b20a21594f1a270fa17
SHA2563d9d9b45d2e77424a8bf126e16222aa5277f4689a7748872935571c9dd3f96a1
SHA5122fd42b58746431dc42e468468724dd36de820639d9588d874dcd0ddb632c20c2b102897fef743ad32ada679efecfb822092f3d5c2f244f5c71217ed7ce9eeba7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.bin
Filesize25KB
MD5fc926c6a64e18214b4ba4c26c027c34e
SHA1927f396b721efdffd9bb4b894b81d029792d98e1
SHA256950ee7190e2cd5e2d664bffb43d6a89ac322db20cd601a14a1e414209884b743
SHA5120afe3c4c7b04740851f71a838ea0796d03a0003ffb6a4b10f3d5898ebc4d53e7cf7e2fa867fd2d0fdcd46a71cef5c9d777fbee4eb18ffc5ff472e57899b705fb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD561ac263a30fd5152de918b7f78b76152
SHA1f66638f385c6698b2625409a4247d4ef3eaab962
SHA25659ade72e9557829758fec511b180bfcabc95fcbea432dac78f4db9da17b0179b
SHA51222b20940db579ecbf13df7926a5a8bf70ca451ad6f962650aa3056ad6ff1b7efe3fd3e6e34087e7032647b57b30c124b042aa86f2e242a1c8607bc9747229baf
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD592fe85d3e09297fedcfe7bc444f472ef
SHA11f89c23d56daf34ad66b76a10a0409296c67496e
SHA256a94343bba3cdc74c401adb126100c69dc6894bb23d47571aa11adc4fd13f2324
SHA5128e3619f844d92e5c04231de26edb20ac3d9c0b60b8cf60c4ddec4f9bf2a7651b9cbfcd876d0cf4b470abc9603a6f9b5b79bde29845540da5ed43b1568ae707ab
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD598d3ca6d6f032389d28b72a9de1287d7
SHA1360187c5f690180bda355bfcf1a52f338787e138
SHA25655d5d8c43e6a42f2016dd2cbec03c7278a397f9b479dae9a558bae8b3191af1b
SHA512f15c777a642d604c29893043497ccc3361545b47cd2dbb820e3e937936e2cc9baea8603686ab38e9bb1b65223b29cc4b84cc477545a2609459be65df95267119
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD561e0322605740259ee365e21f7c9de62
SHA1750613d0c4ca75e145b3a95c914684093488e336
SHA256dcb0249650174875d1d92e23221a61a8cb30c8fe8f1d37b42bd4f291911bc81f
SHA51280984e6f35e15e247bda9982b2277285bc8aecb202e07bbf5f515ab6a3b5d4dcf429992ef8972718cf27b8763ad0372c6e4f2afe6710b890caa6818c86f734bb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD55255ca4e9120367517d593f40eb67f03
SHA14bec147e07c34ec5a1bcd273b13f20ee8d6255a6
SHA256ce0540a76e31475b1eff739e0ebc607c8d19b26a5b3f4c22bcf94d398f9c3626
SHA512f3ac41c7a1fa64a9b41dcae0c59b15e3ff6d9117542babaa76717b81a55ecb569d37b0173647da8a8bf6d47052ddfdb8b934c2e313f3be18c17316bc10d93578
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\pending_pings\ceaa5a0e-b878-40f1-b500-025e0e598791
Filesize659B
MD546ce40fb3cafe49d26769a63d321958e
SHA122d91192154ea42cf5cb26ff82277cfbdb490d45
SHA256396e2eb019b62e547b98b0221bfcaec1459d9a212708bf5c1385665a0d4f7f84
SHA512ce51e32fc4e0f92a75e388631ded20d69a3a7b1f4a4331c52c355a40e4638a8605e1749d82558f3ded69c7823583400c47f8980e2232d179452504d11eba98d1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\pending_pings\e9791f45-2f90-4b6d-baab-2355e47ed747
Filesize982B
MD5e731dad8d0c712d6d29f62279e5f397a
SHA12ba950986a96329045313994626c0b7baf74d51e
SHA256c01dcaa84ad16799b264a4a49bd60ff77d6cc6b0d40c2e77a22debb81ed7f50b
SHA512281a7c9afde787d99fa94b2f50691ed01c5cfa3b4b61096d0c2b1188102384251798e33757cac1b50fe5db96ba987d1d2d6e27878a585843369e25931bb323ad
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD5b85c3f8f2839b8daed6b9296b2832e07
SHA19b7bab45ce54286b80d11aa12ad80f04c83822f4
SHA2566d1d470f872a8d03b09c54cca7bce9d874e58ee2047c4a9406036e9ca06cc774
SHA512d2ddd0463d164e6f298aee3cb870cb071f70dce014ba6ab0f1ee219eefc35dee44bf09af3f49bf89ea8a9b14126b24df9003eb08350abb933b09edefd7707a3c
-
Filesize
10KB
MD597804631bbce9cd7f06670d7c0c7bd84
SHA1c992e311760a4a3b505d873e8a17e2befede7317
SHA256850d9de2b64ec45da8da22a7991d213b273aadbf5c08e240816d10e4a5d0ee2f
SHA5122b02bf70a81dfec4574e20fa2b44699550b7a55c24830bef61d854668e9195b34e20a23ef2122ff8d9123c19cf31d0d5e31841d84fe009b6149003d621b6d791
-
Filesize
11KB
MD5241d5479410fde0b4b5858957feefefb
SHA14b4fa6f09054a122e211ebac9e6053cf9719613b
SHA2560f8ec5b9df6819f87afe77cc6e7d2c95f272446f3e6ac257b72f4409121fb726
SHA512e7212016adcb278568565c56b04773e37745dd470ae69875aed7c38a789afd2f9bf125a09814181fecf857245e90bfc0d29fd8f030111b78e68391a6ab2dccd8
-
Filesize
15KB
MD5edb8722bbeb7c1544e66c98ed4a545d1
SHA11e80e73a8d1e28b59aa09976662e1347ef4d2055
SHA256560027a1cdc9e8ee8f2e39d3adfce80367339bee7ecfa536aeab637aa891ba05
SHA5120b85cefbff8f11b000290bcab16ea9cca7af473c70e7395145865646d60b854937290a58641f6356753ea9275259084de83aa5c78bc63ee756f7fdb464f16b55
-
Filesize
10KB
MD5971463565ed063ac7cfd7fb80ddec6e2
SHA1ed6d4f484cd6cac324a58a276825345a8e84002b
SHA256d3f891d415b779be64568319914c23439aeb07bac905472c706fe050c958adfb
SHA5124eac54f5a0efc458844dd3b44b47e263bea4a212be523cef8e52d302063783128f486cfc00e38f6e5a17c60822fe54704ee49c05169942146eb13cb3537b9b35