Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2024 06:00
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20241010-en
General
-
Target
file.exe
-
Size
1.7MB
-
MD5
44a6bbd45d4e2be66b406d0819a6992e
-
SHA1
085d044b3221ce5a6181402c0bcaca7da354ce3e
-
SHA256
1613092a5e1a1e7914fe3af91ebf66605167dff128c17696205c9a26b099ed51
-
SHA512
de248d0826c1c308ccdc287b3ca411440dd706d387e162374294d3e8879f65d4b8e48992d1d431fed08eb50a1eb083c4afc7f66ae3c57315e5f6c7ae24f4e9b8
-
SSDEEP
24576:j82S2PqA4ZPdLoBZKWPoxR3dYoEWx4RM5iA5H/aH8xYp2RKR8SOOdknT0fQgA/o:j8TeqAA+vXPeEe5HZaR2SOkkT4QgAA
Malware Config
Extracted
stealc
drum
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 928c5e3211.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 928c5e3211.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 928c5e3211.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 928c5e3211.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 928c5e3211.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 928c5e3211.exe -
Stealc family
-
Enumerates VirtualBox registry keys 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF 07fdbf1a2e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF 43dc58d31e.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 07fdbf1a2e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e5598f40a9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ HDGCAAFBFB.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 43dc58d31e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 571aaff6a1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7875f1d893.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 928c5e3211.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 9 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 5112 chrome.exe 2608 chrome.exe 3496 msedge.exe 1688 msedge.exe 932 chrome.exe 4476 chrome.exe 4660 msedge.exe 468 msedge.exe 4200 msedge.exe -
Checks BIOS information in registry 2 TTPs 22 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion HDGCAAFBFB.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7875f1d893.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7875f1d893.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 928c5e3211.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 07fdbf1a2e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e5598f40a9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 571aaff6a1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion HDGCAAFBFB.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 07fdbf1a2e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e5598f40a9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 43dc58d31e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 571aaff6a1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 43dc58d31e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 928c5e3211.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation file.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation HDGCAAFBFB.exe -
Executes dropped EXE 11 IoCs
pid Process 1912 HDGCAAFBFB.exe 2344 skotes.exe 836 07fdbf1a2e.exe 4088 e5598f40a9.exe 4476 43dc58d31e.exe 2012 571aaff6a1.exe 208 7875f1d893.exe 4016 skotes.exe 3668 bfbd632f8e.exe 1300 928c5e3211.exe 3164 skotes.exe -
Identifies Wine through registry keys 2 TTPs 11 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine file.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 07fdbf1a2e.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 43dc58d31e.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 571aaff6a1.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 7875f1d893.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 928c5e3211.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine HDGCAAFBFB.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine e5598f40a9.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe -
Loads dropped DLL 2 IoCs
pid Process 404 file.exe 404 file.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 928c5e3211.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 928c5e3211.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\571aaff6a1.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010152001\\571aaff6a1.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\7875f1d893.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010153001\\7875f1d893.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bfbd632f8e.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010154001\\bfbd632f8e.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\928c5e3211.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010155001\\928c5e3211.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0008000000023c10-267.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
pid Process 404 file.exe 1912 HDGCAAFBFB.exe 2344 skotes.exe 836 07fdbf1a2e.exe 4088 e5598f40a9.exe 4476 43dc58d31e.exe 2012 571aaff6a1.exe 208 7875f1d893.exe 4016 skotes.exe 1300 928c5e3211.exe 3164 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job HDGCAAFBFB.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5584 4088 WerFault.exe 119 -
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7875f1d893.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bfbd632f8e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 07fdbf1a2e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 43dc58d31e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HDGCAAFBFB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 928c5e3211.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e5598f40a9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 571aaff6a1.exe -
Checks processor information in registry 2 TTPs 13 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 file.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Enumerates system info in registry 2 TTPs 8 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Kills process with taskkill 5 IoCs
pid Process 864 taskkill.exe 4668 taskkill.exe 3352 taskkill.exe 4352 taskkill.exe 4056 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133773336133229395" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 404 file.exe 404 file.exe 404 file.exe 404 file.exe 404 file.exe 404 file.exe 932 chrome.exe 932 chrome.exe 404 file.exe 404 file.exe 404 file.exe 404 file.exe 2800 msedge.exe 2800 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 3496 msedge.exe 3496 msedge.exe 404 file.exe 404 file.exe 404 file.exe 404 file.exe 1912 HDGCAAFBFB.exe 1912 HDGCAAFBFB.exe 2344 skotes.exe 2344 skotes.exe 836 07fdbf1a2e.exe 836 07fdbf1a2e.exe 836 07fdbf1a2e.exe 836 07fdbf1a2e.exe 836 07fdbf1a2e.exe 836 07fdbf1a2e.exe 836 07fdbf1a2e.exe 836 07fdbf1a2e.exe 836 07fdbf1a2e.exe 836 07fdbf1a2e.exe 4088 e5598f40a9.exe 4088 e5598f40a9.exe 4476 43dc58d31e.exe 4476 43dc58d31e.exe 4476 43dc58d31e.exe 4476 43dc58d31e.exe 4476 43dc58d31e.exe 4476 43dc58d31e.exe 4476 43dc58d31e.exe 4476 43dc58d31e.exe 4476 43dc58d31e.exe 4476 43dc58d31e.exe 2012 571aaff6a1.exe 2012 571aaff6a1.exe 208 7875f1d893.exe 208 7875f1d893.exe 4016 skotes.exe 4016 skotes.exe 3668 bfbd632f8e.exe 3668 bfbd632f8e.exe 3668 bfbd632f8e.exe 3668 bfbd632f8e.exe 1300 928c5e3211.exe 1300 928c5e3211.exe 1300 928c5e3211.exe 1300 928c5e3211.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 932 chrome.exe 932 chrome.exe 932 chrome.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeShutdownPrivilege 932 chrome.exe Token: SeCreatePagefilePrivilege 932 chrome.exe Token: SeShutdownPrivilege 932 chrome.exe Token: SeCreatePagefilePrivilege 932 chrome.exe Token: SeShutdownPrivilege 932 chrome.exe Token: SeCreatePagefilePrivilege 932 chrome.exe Token: SeShutdownPrivilege 932 chrome.exe Token: SeCreatePagefilePrivilege 932 chrome.exe Token: SeShutdownPrivilege 932 chrome.exe Token: SeCreatePagefilePrivilege 932 chrome.exe Token: SeShutdownPrivilege 932 chrome.exe Token: SeCreatePagefilePrivilege 932 chrome.exe Token: SeShutdownPrivilege 932 chrome.exe Token: SeCreatePagefilePrivilege 932 chrome.exe Token: SeDebugPrivilege 864 taskkill.exe Token: SeDebugPrivilege 4668 taskkill.exe Token: SeDebugPrivilege 3352 taskkill.exe Token: SeDebugPrivilege 4352 taskkill.exe Token: SeDebugPrivilege 4056 taskkill.exe Token: SeDebugPrivilege 1752 firefox.exe Token: SeDebugPrivilege 1752 firefox.exe Token: SeDebugPrivilege 1300 928c5e3211.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 932 chrome.exe 932 chrome.exe 932 chrome.exe 932 chrome.exe 932 chrome.exe 932 chrome.exe 932 chrome.exe 932 chrome.exe 932 chrome.exe 932 chrome.exe 932 chrome.exe 932 chrome.exe 932 chrome.exe 932 chrome.exe 932 chrome.exe 932 chrome.exe 932 chrome.exe 932 chrome.exe 932 chrome.exe 932 chrome.exe 932 chrome.exe 932 chrome.exe 932 chrome.exe 932 chrome.exe 932 chrome.exe 932 chrome.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 1912 HDGCAAFBFB.exe 3668 bfbd632f8e.exe 3668 bfbd632f8e.exe 3668 bfbd632f8e.exe 3668 bfbd632f8e.exe 3668 bfbd632f8e.exe 3668 bfbd632f8e.exe 3668 bfbd632f8e.exe 1752 firefox.exe 1752 firefox.exe 1752 firefox.exe 1752 firefox.exe 1752 firefox.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 3668 bfbd632f8e.exe 3668 bfbd632f8e.exe 3668 bfbd632f8e.exe 3668 bfbd632f8e.exe 3668 bfbd632f8e.exe 3668 bfbd632f8e.exe 3668 bfbd632f8e.exe 1752 firefox.exe 1752 firefox.exe 1752 firefox.exe 1752 firefox.exe 1752 firefox.exe 1752 firefox.exe 1752 firefox.exe 1752 firefox.exe 1752 firefox.exe 1752 firefox.exe 1752 firefox.exe 1752 firefox.exe 1752 firefox.exe 1752 firefox.exe 1752 firefox.exe 1752 firefox.exe 1752 firefox.exe 1752 firefox.exe 1752 firefox.exe 1752 firefox.exe 3668 bfbd632f8e.exe 3668 bfbd632f8e.exe 3668 bfbd632f8e.exe 3668 bfbd632f8e.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1752 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 404 wrote to memory of 932 404 file.exe 84 PID 404 wrote to memory of 932 404 file.exe 84 PID 932 wrote to memory of 1496 932 chrome.exe 85 PID 932 wrote to memory of 1496 932 chrome.exe 85 PID 932 wrote to memory of 3064 932 chrome.exe 86 PID 932 wrote to memory of 3064 932 chrome.exe 86 PID 932 wrote to memory of 3064 932 chrome.exe 86 PID 932 wrote to memory of 3064 932 chrome.exe 86 PID 932 wrote to memory of 3064 932 chrome.exe 86 PID 932 wrote to memory of 3064 932 chrome.exe 86 PID 932 wrote to memory of 3064 932 chrome.exe 86 PID 932 wrote to memory of 3064 932 chrome.exe 86 PID 932 wrote to memory of 3064 932 chrome.exe 86 PID 932 wrote to memory of 3064 932 chrome.exe 86 PID 932 wrote to memory of 3064 932 chrome.exe 86 PID 932 wrote to memory of 3064 932 chrome.exe 86 PID 932 wrote to memory of 3064 932 chrome.exe 86 PID 932 wrote to memory of 3064 932 chrome.exe 86 PID 932 wrote to memory of 3064 932 chrome.exe 86 PID 932 wrote to memory of 3064 932 chrome.exe 86 PID 932 wrote to memory of 3064 932 chrome.exe 86 PID 932 wrote to memory of 3064 932 chrome.exe 86 PID 932 wrote to memory of 3064 932 chrome.exe 86 PID 932 wrote to memory of 3064 932 chrome.exe 86 PID 932 wrote to memory of 3064 932 chrome.exe 86 PID 932 wrote to memory of 3064 932 chrome.exe 86 PID 932 wrote to memory of 3064 932 chrome.exe 86 PID 932 wrote to memory of 3064 932 chrome.exe 86 PID 932 wrote to memory of 3064 932 chrome.exe 86 PID 932 wrote to memory of 3064 932 chrome.exe 86 PID 932 wrote to memory of 3064 932 chrome.exe 86 PID 932 wrote to memory of 3064 932 chrome.exe 86 PID 932 wrote to memory of 3064 932 chrome.exe 86 PID 932 wrote to memory of 3064 932 chrome.exe 86 PID 932 wrote to memory of 1088 932 chrome.exe 87 PID 932 wrote to memory of 1088 932 chrome.exe 87 PID 932 wrote to memory of 4248 932 chrome.exe 88 PID 932 wrote to memory of 4248 932 chrome.exe 88 PID 932 wrote to memory of 4248 932 chrome.exe 88 PID 932 wrote to memory of 4248 932 chrome.exe 88 PID 932 wrote to memory of 4248 932 chrome.exe 88 PID 932 wrote to memory of 4248 932 chrome.exe 88 PID 932 wrote to memory of 4248 932 chrome.exe 88 PID 932 wrote to memory of 4248 932 chrome.exe 88 PID 932 wrote to memory of 4248 932 chrome.exe 88 PID 932 wrote to memory of 4248 932 chrome.exe 88 PID 932 wrote to memory of 4248 932 chrome.exe 88 PID 932 wrote to memory of 4248 932 chrome.exe 88 PID 932 wrote to memory of 4248 932 chrome.exe 88 PID 932 wrote to memory of 4248 932 chrome.exe 88 PID 932 wrote to memory of 4248 932 chrome.exe 88 PID 932 wrote to memory of 4248 932 chrome.exe 88 PID 932 wrote to memory of 4248 932 chrome.exe 88 PID 932 wrote to memory of 4248 932 chrome.exe 88 PID 932 wrote to memory of 4248 932 chrome.exe 88 PID 932 wrote to memory of 4248 932 chrome.exe 88 PID 932 wrote to memory of 4248 932 chrome.exe 88 PID 932 wrote to memory of 4248 932 chrome.exe 88 PID 932 wrote to memory of 4248 932 chrome.exe 88 PID 932 wrote to memory of 4248 932 chrome.exe 88 PID 932 wrote to memory of 4248 932 chrome.exe 88 PID 932 wrote to memory of 4248 932 chrome.exe 88 PID 932 wrote to memory of 4248 932 chrome.exe 88 PID 932 wrote to memory of 4248 932 chrome.exe 88 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""2⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffed080cc40,0x7ffed080cc4c,0x7ffed080cc583⤵PID:1496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1936,i,1852306351371781927,1893531287755107445,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1932 /prefetch:23⤵PID:3064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1864,i,1852306351371781927,1893531287755107445,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2088 /prefetch:33⤵PID:1088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2240,i,1852306351371781927,1893531287755107445,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2248 /prefetch:83⤵PID:4248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3152,i,1852306351371781927,1893531287755107445,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3212 /prefetch:13⤵
- Uses browser remote debugging
PID:4476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3164,i,1852306351371781927,1893531287755107445,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3252 /prefetch:13⤵
- Uses browser remote debugging
PID:5112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4372,i,1852306351371781927,1893531287755107445,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4508 /prefetch:13⤵
- Uses browser remote debugging
PID:2608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4844,i,1852306351371781927,1893531287755107445,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4232 /prefetch:83⤵PID:3656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4936,i,1852306351371781927,1893531287755107445,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4940 /prefetch:83⤵PID:3672
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"2⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:3496 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffed08146f8,0x7ffed0814708,0x7ffed08147183⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:1848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,5944115767046961315,2058753919124204953,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:23⤵PID:3096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,5944115767046961315,2058753919124204953,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,5944115767046961315,2058753919124204953,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2784 /prefetch:83⤵PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2056,5944115767046961315,2058753919124204953,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:13⤵
- Uses browser remote debugging
PID:468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2056,5944115767046961315,2058753919124204953,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3412 /prefetch:13⤵
- Uses browser remote debugging
PID:4660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2056,5944115767046961315,2058753919124204953,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2256 /prefetch:13⤵
- Uses browser remote debugging
PID:1688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2056,5944115767046961315,2058753919124204953,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4844 /prefetch:13⤵
- Uses browser remote debugging
PID:4200
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\Documents\HDGCAAFBFB.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3536 -
C:\Users\Admin\Documents\HDGCAAFBFB.exe"C:\Users\Admin\Documents\HDGCAAFBFB.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\1010149001\07fdbf1a2e.exe"C:\Users\Admin\AppData\Local\Temp\1010149001\07fdbf1a2e.exe"5⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:836
-
-
C:\Users\Admin\AppData\Local\Temp\1010150001\e5598f40a9.exe"C:\Users\Admin\AppData\Local\Temp\1010150001\e5598f40a9.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4088 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4088 -s 14726⤵
- Program crash
PID:5584
-
-
-
C:\Users\Admin\AppData\Local\Temp\1010151001\43dc58d31e.exe"C:\Users\Admin\AppData\Local\Temp\1010151001\43dc58d31e.exe"5⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4476
-
-
C:\Users\Admin\AppData\Local\Temp\1010152001\571aaff6a1.exe"C:\Users\Admin\AppData\Local\Temp\1010152001\571aaff6a1.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2012
-
-
C:\Users\Admin\AppData\Local\Temp\1010153001\7875f1d893.exe"C:\Users\Admin\AppData\Local\Temp\1010153001\7875f1d893.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:208
-
-
C:\Users\Admin\AppData\Local\Temp\1010154001\bfbd632f8e.exe"C:\Users\Admin\AppData\Local\Temp\1010154001\bfbd632f8e.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3668 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:864
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4668
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3352
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4352
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4056
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking6⤵PID:4796
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking7⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1752 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2020 -parentBuildID 20240401114208 -prefsHandle 1948 -prefMapHandle 1940 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {79fcbfd0-a038-4aa1-b2ee-0216ad8c3a1c} 1752 "\\.\pipe\gecko-crash-server-pipe.1752" gpu8⤵PID:3340
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2464 -parentBuildID 20240401114208 -prefsHandle 2444 -prefMapHandle 2440 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {28334434-aeeb-43cf-8c98-aa57fcfa95ff} 1752 "\\.\pipe\gecko-crash-server-pipe.1752" socket8⤵PID:556
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3036 -childID 1 -isForBrowser -prefsHandle 3080 -prefMapHandle 3180 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1200 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c45a1853-ed79-47d6-aeb4-b97549c4613d} 1752 "\\.\pipe\gecko-crash-server-pipe.1752" tab8⤵PID:2496
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2792 -childID 2 -isForBrowser -prefsHandle 3904 -prefMapHandle 3900 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1200 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7e93b839-cc26-4283-b6c3-e55f60dca5ce} 1752 "\\.\pipe\gecko-crash-server-pipe.1752" tab8⤵PID:4956
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4756 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4812 -prefMapHandle 4808 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b494b88e-71f1-4ab3-ad8a-855fab7aa264} 1752 "\\.\pipe\gecko-crash-server-pipe.1752" utility8⤵
- Checks processor information in registry
PID:5628
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5284 -childID 3 -isForBrowser -prefsHandle 5252 -prefMapHandle 4536 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1200 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6ad3dbe6-88fb-467b-b061-72dbdbc939d2} 1752 "\\.\pipe\gecko-crash-server-pipe.1752" tab8⤵PID:5940
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5396 -childID 4 -isForBrowser -prefsHandle 5440 -prefMapHandle 5448 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1200 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {13d33c17-9dc7-42ea-9d33-0c698aa9d19e} 1752 "\\.\pipe\gecko-crash-server-pipe.1752" tab8⤵PID:5952
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5632 -childID 5 -isForBrowser -prefsHandle 5640 -prefMapHandle 5648 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1200 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ed4a8dec-53dd-4c6f-91a1-fe3335deacb3} 1752 "\\.\pipe\gecko-crash-server-pipe.1752" tab8⤵PID:5964
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1010155001\928c5e3211.exe"C:\Users\Admin\AppData\Local\Temp\1010155001\928c5e3211.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1300
-
-
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:832
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3992
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4016
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4088 -ip 40881⤵PID:5544
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3164
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
649B
MD5426c4ac1800adffec886def90c41d970
SHA1a9cec3d92c357c51b06c8792179abc3cbb6ebd48
SHA256fdc2cfeb2c673b0641f3b7a9f3bc068c33f87760e0e6f5807ebddc117d57edd3
SHA512d75787666f6c85e52035a52dda72dd283c1b49102c50ff6f7a0f9af2c6d96915b23a53152e4996ddfb8828bc1106b3fbfca2bbce673dabe8acc971eab34d8383
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
152B
MD5ba6ef346187b40694d493da98d5da979
SHA1643c15bec043f8673943885199bb06cd1652ee37
SHA256d86eec91f295dfda8ed1c5fa99de426f2fe359282c7ebf67e3a40be739475d73
SHA5122e6cc97330be8868d4b9c53be7e12c558f6eb1ac2c4080a611ba6c43561d0c5bb4791b8a11a8c2371599f0ba73ed1d9a7a2ea6dee2ae6a080f1912e0cb1f656c
-
Filesize
152B
MD5b8880802fc2bb880a7a869faa01315b0
SHA151d1a3fa2c272f094515675d82150bfce08ee8d3
SHA256467b8cd4aacac66557712f9843023dcedefcc26efc746f3e44157bc8dac73812
SHA512e1c6dba2579357ba70de58968b167d2c529534d24bff70568144270c48ac18a48ee2af2d58d78ae741e5a36958fa78a57955bd2456f1df00b781fc1002e123d2
-
Filesize
5KB
MD5003a0faaf3fc74d823edd4bb23b56271
SHA101a59193ab7a6120caf980b6886ae3d3af3b2fab
SHA256a3c6246a7391231250818c3f653908fae686698f8c4a77b28b98e49d42dc17ca
SHA512d5ed5a8f7800469ca2555fd01e17070ff4505b461b7682b61013c762092931d6114ce869cac362b750df843d2d43babf9898022a78616569d09dcb84ef6d8dfd
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\activity-stream.discovery_stream.json
Filesize25KB
MD56e8f7d964d109c6d4c14e09383972c0c
SHA150b4d0481a579c49640b74d1c58aefcbfeb0e697
SHA25614abdac39d24f5e9492de99c170c50519fd30f2d11088d243cfaa4e2dc14cc62
SHA5126ac6c995b9692e603be1a813e01cfeaec3b85ee8523019876f9ed9e9c7e6c99f414097a1aaa04894626b7f73c3ce98fdc98783ae3d229d6994c20219f931ca26
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD569e73623431216db9a1c7e0cceff93e8
SHA1f4617b9fde7d096de6038ea7dbc2451d94bb5cfe
SHA256cf251f72735e9ca57e5dcbc44a1ae346704d733cf993b9afb81fdbf17f52c11c
SHA512b05a854d88396aab597c07374588a83fff93a7f496aa7dd1c3a5e05db49975c5d401cc7681809e4732bce8d2c96d7d86e60d242208ef1d995e9ea4f68becca27
-
Filesize
4.2MB
MD54d561978d210ac76f16d12ae4433fb65
SHA1c2a8f7d2bfe66baada29c899cfeb15e585b31741
SHA256338fb803312de3dc3a1fb1dd4bc5e626758d3db5de51aa5455d9734d62c817db
SHA512054d558beb7ff91747ecea2a51ff3815520f3fbef0302d40aff63e271a3a65c0d5648383c634af1b1a82c2c1687cb2e07c6df2d9fa90b3374e33f7da253f270f
-
Filesize
1.9MB
MD527fe8931f28d9eee4d064e9f0b40ad86
SHA1d69b65a01ce308f68d9826e9d14058ebbb2d54d7
SHA2568cc79dc1775bd6cf9a5b5f9378801b3e53cdb3080e0d650fcb1a920c81282d2a
SHA5121c099d690f970bf7ece4dd849525eec25dfd17bea7c376da40683dbb48a7aa06d4921101e77b6149a08d658834ab508a2c7523e37f191e1d7f631734fc8d7711
-
Filesize
4.2MB
MD51fa09837a9c73b1753421e89c6ecb108
SHA18834c37a4eb18f9f9678d1b0894e39c3819ae254
SHA25611fb76a096e745932a0f91b28aa2a2d4539ba51903883fbcd3a4e277130fdb4f
SHA512761439520d8e948a05c7e8cc6bfa3c85151faa6bdd655fcc89bbf434dcfd4de4d0445cca3a8cdbab178322f27fe2407be120c4aedb74b230a89c60bc25f4a00c
-
Filesize
1.8MB
MD5fddf7cbbabe1f0929dd9aff594a594c4
SHA1dd73fbcf33fb9ca9ff754d226c787b6d3603632c
SHA256453ba9ddf17309fad0d50d2886c4eaab89ee5c0eb0139074b2ae7c4fa61b8060
SHA5121567cf8929f4e88de8db986b688b791e2f5a7aefd95eac1b20191a805a175849bc54678f9a217ab450a1e9c80c1862316bf22ca78a2d17340ffb9a79a7376e72
-
Filesize
1.7MB
MD544a6bbd45d4e2be66b406d0819a6992e
SHA1085d044b3221ce5a6181402c0bcaca7da354ce3e
SHA2561613092a5e1a1e7914fe3af91ebf66605167dff128c17696205c9a26b099ed51
SHA512de248d0826c1c308ccdc287b3ca411440dd706d387e162374294d3e8879f65d4b8e48992d1d431fed08eb50a1eb083c4afc7f66ae3c57315e5f6c7ae24f4e9b8
-
Filesize
902KB
MD5d989cc3c388c5ed2e535825c81306952
SHA1486a17d756d4f28ab0d391b7841a103b2e75cd87
SHA256fe2beb7b0aeeb518a6180513add57449f2c9a0fd372c5262e84df982af506800
SHA5126d6919253b22c44890a91988eb1da4d65aba7d82fec2bf1af5c35be3de4941074593c4ac86d3e9bf1c009bf0afbb875fc9d4f181f6e5fd73e04994ff76ebb820
-
Filesize
2.6MB
MD5ffa0403fb0e3761de3bccc940257acac
SHA1033557fd4df335cf4c4fbfa18c6052e0c8e671cb
SHA2562764022cbb89e3e062ad1f10a826bc7c6c603a6f9a0a86adf904ac9af26ea924
SHA51214bb7e640da77beca46fd0e0b36361ad87ce50907c1c90aaffd95213ea1c4365e06d78293a7f7e47f6124cce7ad66de8f70a40719c0a7d07ed11a3cee7ab446c
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin
Filesize7KB
MD5be3d1cc0c665e84a3c599a82595437bf
SHA15ca69cc39748285b1caeb470e3c1b2ec2dff36e7
SHA25638ae6635f278a764a01af7fe16023171c15168930b656d7312e0ebc7d7a1cb94
SHA5123bea5e3638276f56a1504c37c3c9faa2b871530afd3b7997c2176870f1674faddac8a54d97ac665d69a98f117543a5aac9d2fac5be65488cec244f06e8c3e81f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin
Filesize13KB
MD5de0992a35bdad66cca1d43cae69eaf3e
SHA14fd57a8c66afd96523d78c23a6ae3d92a21a052c
SHA2563cc4599de877fab94d9dcd9ae4cd8c87996cdc1ac3d4da36243498ddc5838451
SHA51272a32ea1d338d554082f944e1526fb2c5eda6c5f76a3ecad9728759829837a90f86a8a70a759fce5c83eac2ef0a02614b00cb5e11cb465b905e4429e1c572cd8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5e6968c99683e5821575c4dfb1027e8f9
SHA11efecae0e70698b7235a8cc1b1f392e59bf39914
SHA25652b6c32b32b0c5b1386e07d8476e6cded500af3496c6e418ba6104c44ed2f00b
SHA5124ed75fafb3ccddab0f6a50e1cc244a24c189227455ff8e4fff2907da4b670b9d5d7b1acb9e810ef3e919cb7cb6d90fa83df6b27389fedbccdf9b0ef84f0bb5fe
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5d8479782f91e8d30462fcf1e587047c4
SHA1ca9336b19d83bfcd2e22cd31ef0fbe7d5bffe0b1
SHA25655597d290f344b0dd92edb99c0dd701785ab64a320ffb23fa7f0555ebec28176
SHA512a49df03fc1356a416a8cda74f34634e6c67b033b62ef806bbea55d892abaec4552daafe6dbd5f2f88a67aff06ddb20900ac00146e752abf5dfc473ffb0240d98
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5da56f2a2880de64fcde75b9bbdbfe732
SHA13894926a0e87e3913b991f0ebabba0115df14e70
SHA2568bdf11380a0e76e9bee8102eacc014463b44e8f0bea614a9f572fa782890e36f
SHA51218b1b3ad7dae5e5a3b168d556ce4fe29520fe37489baacda545c90d93a21d0de8f26dc123733c754482a61f31d360277d4e34a0976082132617a5f7db81afb25
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD54f2b670f32cfc39aaeb55237be3c4973
SHA18269cd88a1ed5e77d14863625663c2988c258801
SHA2561cf26cf8ee4d4041fe33789f0dc268aa6bd880a6786b7bfdc73954c72e844161
SHA5128999b140c23394691afffaaf62565d964cea705a67da5f7d6d4899abbfd78d00b0475c0e89ddb4293670a0c69469eb4e90db3617d35fb0a7f8e81615663c61cb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\6a3c5169-91a4-40a6-a7d9-c8d6d435064b
Filesize27KB
MD52f981c2ecce577d9e8a53c50d41439de
SHA18f74e4e1da52de6665396d1fa9600dcfd9c1fac2
SHA2569f1a7b24f98dd7b32e8d5d99397e0a686d2d0912d3d4f5a256c192abfcaa4e60
SHA5129c09947e002d33de83fb12529854ea0f539c9752a0f237f3877b9c221ebd7fefb507fe178f2cdf77789a657716b9dbb831d4c987e0210003c1c395684f33c144
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\89b8a213-e2fb-4bbb-b26c-721f78d4143b
Filesize982B
MD5271b50b8b5f43a58881446a9f3cc54ce
SHA1829046e777fcf8e5744855966f79844592b8b2de
SHA256b3f705156429c37d1d4dd29288d0590cf8b4f29acd9928f4c105c73492ab7f0d
SHA51279adb988505ac476e5c2b344b8551f967c1c20c1e39023b40a94f801a7386613a7ea13d9b3ca0d95171f1f1a83d974c43ac0e6c45bf8cdcb190bcbbe029967bf
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\9f65d40a-4abe-4de8-821c-6273993d267c
Filesize671B
MD50d69e850fc4cadc34b92219faf6ebf30
SHA11d58639ec183b65da3226a45e178f6dcf66a288b
SHA256b758def26d9714af11f815162c0ce99648d206a68149dab454d6ed03c820237b
SHA512b0b47f864d256bfed1eec6ee97ab16e53aa3e4c0a04dd1b7106669e7f57b947473bef8052d93db489b3902d040ce32e470beb6e0f0de4cfbaf325c3383d705b3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD509c95cca89366a07fef436f1013e17ac
SHA192d346dd67a6be3ff3a252640e79683451a1962d
SHA25626ce2d465704ea12b7699e4c4da1abf7fb5a79c8488e31dc03f5503a523bc02b
SHA512fc6cc5f44652d437d53c75aaf5c70f467e29d1d3c6901459fc448d4dd5116a7c54cb62bfb89c8c0e204928a85ac60adc817c743d3c1e2ad53355735f5acebd23
-
Filesize
10KB
MD5fd4fbe011484a1842b7684420c2cb7e0
SHA1213ce92a2241140ec399565af947676a1d42c43b
SHA256f537900a2377dd40574d62fdf82a27a8287feccaef4985e96c7609346fa2f4e9
SHA512f03faeeb73e3d7c54676120164e067c918b0cbc14299a58105a9fb72ddf6ab78a83b7161d73d7df24c5fd97620fa3c42f19d4b730d16d297b2fa6033d7976c6d
-
Filesize
15KB
MD5e4135ca7a7870b3c2c293e1598356a82
SHA1a556017c5b4cd2d0c52b1e31c8f5fe79fc5db465
SHA256f0b2ba4ff0c74fec17cb4c9efb264bc5aac56c81d9c3e7db0a04cc37a4a23fe1
SHA512ce6e219846693482b418ea40e63fc52fe43345babc6f7e8269303351fceab46d3151d7721d7b4983a7e45304c110262ffd3a2cf379cc154dd7cb5fb3b9893723
-
Filesize
10KB
MD57127984db466b327a8d41435e2ddd05b
SHA116c62b63745ce18864cc7409f35e5e538b001011
SHA256a0fc82772dbe6c493ea0bc48522b0b6ef96de99b6ec18774039006cb309311c0
SHA512ca2f473b44903e516ac0ef64204885b0e632742fa736320a7321c02afe52e19f628bb0b805e906e6b19f1a39daf5539ae8a9211761931d2c211932cb44199b5a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize768KB
MD53604145913631c27ca82b94176c265f6
SHA1ae050fb75b4957ccf14a8a9bc4ec0a50be318c61
SHA256d50d1ed227184a9a7485b790cbe098ead0ef767df6f61d05a9e65d28bf7c5127
SHA512e3ba2bb539547525f3b83ea950b0d54d949862646d845de12b57d9d62a6de8854af954cca7d1c61c85dbea69a88c5b98212b5732a40679869b225a2b71e93b2e
-
Filesize
1.8MB
MD5f1a1d46218a4f33f691b3a25c7b48826
SHA13118c6fe0cd673a3b73c1914cb81c81025e05657
SHA25647f8c213093e4f3c3dcaf04d8d1989bb885fe4eb0467bb2b306fb8c8db4e6f36
SHA51274f7ae853a50986442e3de931424d8a5f45adc0888fb566bb0b13789d4d70927f870e0a8fc7cc82ec01a476c388e388d679590d5d9abc640705a0952367c616b