Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-11-2024 01:39
Static task
static1
General
-
Target
9c3748b52a29c68ce473bc92557f57d67c9a67d7f140bb959e91619b7626d26f.exe
-
Size
6.0MB
-
MD5
0ff741b5513934d69be524236e1c2594
-
SHA1
e677e9230456e8dd2664a412741a79c1216e25c1
-
SHA256
9c3748b52a29c68ce473bc92557f57d67c9a67d7f140bb959e91619b7626d26f
-
SHA512
bcc5e46301f6f3f0d736b48de6e4ffe01b952149d0343382cbc3de747e74bc68e5915e32897a4a9193dcdc120a350286d9f741f0385fe522031e2f2f7051f5b6
-
SSDEEP
196608:9PtIrFVXknIPYh1+qPmOUuU6x0qIZAD2:1OKzNPmIU8TX2
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Extracted
lumma
https://navygenerayk.store/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 3ad8b374fa.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 3ad8b374fa.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 3ad8b374fa.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 3ad8b374fa.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 3ad8b374fa.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 3ad8b374fa.exe -
Stealc family
-
Xmrig family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1v95d4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 87b079f524.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c618a6f11c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3ad8b374fa.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2Z7570.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3o40b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
XMRig Miner payload 9 IoCs
resource yara_rule behavioral1/memory/456-4780-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/456-4784-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/456-4785-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/456-4786-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/456-4783-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/456-4782-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/456-4779-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/456-4804-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/456-4805-0x0000000140000000-0x0000000140848000-memory.dmp xmrig -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 5644 powershell.exe 6584 powershell.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 24 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2Z7570.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rfopgxavqojn.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3ad8b374fa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3ad8b374fa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3o40b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion chrone.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion chrone.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c618a6f11c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1v95d4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1v95d4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 87b079f524.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2Z7570.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3o40b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 87b079f524.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c618a6f11c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rfopgxavqojn.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 1v95d4.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 17 IoCs
pid Process 2848 z7k43.exe 3832 Y4D59.exe 4088 1v95d4.exe 4452 skotes.exe 4996 2Z7570.exe 3764 3o40b.exe 3932 4m978A.exe 4436 crypted.exe 2264 crypted.exe 3116 skotes.exe 6748 skotes.exe 4304 chrone.exe 3464 87b079f524.exe 5172 c618a6f11c.exe 5628 3ad8b374fa.exe 3692 rfopgxavqojn.exe 5460 skotes.exe -
Identifies Wine through registry keys 2 TTPs 10 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 87b079f524.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine c618a6f11c.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 1v95d4.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 2Z7570.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 3o40b.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 3ad8b374fa.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 3ad8b374fa.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 3ad8b374fa.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z7k43.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Y4D59.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\87b079f524.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1004964001\\87b079f524.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\c618a6f11c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1004965001\\c618a6f11c.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\3ad8b374fa.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1004967001\\3ad8b374fa.exe" skotes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9c3748b52a29c68ce473bc92557f57d67c9a67d7f140bb959e91619b7626d26f.exe -
Power Settings 1 TTPs 8 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 6124 powercfg.exe 4312 powercfg.exe 6108 powercfg.exe 2612 powercfg.exe 4408 powercfg.exe 6876 powercfg.exe 7064 powercfg.exe 6096 powercfg.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0008000000023c4f-47.dat autoit_exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\system32\MRT.exe chrone.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\system32\MRT.exe rfopgxavqojn.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
pid Process 4088 1v95d4.exe 4452 skotes.exe 4996 2Z7570.exe 3764 3o40b.exe 3116 skotes.exe 6748 skotes.exe 3464 87b079f524.exe 5172 c618a6f11c.exe 5628 3ad8b374fa.exe 5460 skotes.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4436 set thread context of 2264 4436 crypted.exe 112 PID 3692 set thread context of 6732 3692 rfopgxavqojn.exe 196 PID 3692 set thread context of 456 3692 rfopgxavqojn.exe 199 -
resource yara_rule behavioral1/memory/456-4774-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/456-4777-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/456-4780-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/456-4784-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/456-4785-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/456-4786-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/456-4783-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/456-4782-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/456-4779-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/456-4778-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/456-4773-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/456-4772-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/456-4804-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/456-4805-0x0000000140000000-0x0000000140848000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1v95d4.exe -
Launches sc.exe 14 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3676 sc.exe 5836 sc.exe 5968 sc.exe 6324 sc.exe 6744 sc.exe 6936 sc.exe 5924 sc.exe 6076 sc.exe 2900 sc.exe 6804 sc.exe 6748 sc.exe 5892 sc.exe 6348 sc.exe 6280 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4384 4436 WerFault.exe 104 -
System Location Discovery: System Language Discovery 1 TTPs 18 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language crypted.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9c3748b52a29c68ce473bc92557f57d67c9a67d7f140bb959e91619b7626d26f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Y4D59.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2Z7570.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 87b079f524.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language z7k43.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3o40b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language crypted.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3ad8b374fa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1v95d4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4m978A.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c618a6f11c.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 3084 taskkill.exe 1032 taskkill.exe 2056 taskkill.exe 1576 taskkill.exe 3996 taskkill.exe -
Modifies data under HKEY_USERS 50 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates notepad.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs notepad.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs notepad.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\ROOT notepad.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4088 1v95d4.exe 4088 1v95d4.exe 4452 skotes.exe 4452 skotes.exe 4996 2Z7570.exe 4996 2Z7570.exe 3764 3o40b.exe 3764 3o40b.exe 3932 4m978A.exe 3932 4m978A.exe 3116 skotes.exe 3116 skotes.exe 3932 4m978A.exe 3932 4m978A.exe 6748 skotes.exe 6748 skotes.exe 3464 87b079f524.exe 3464 87b079f524.exe 5172 c618a6f11c.exe 5172 c618a6f11c.exe 5628 3ad8b374fa.exe 5628 3ad8b374fa.exe 4304 chrone.exe 5644 powershell.exe 5644 powershell.exe 5644 powershell.exe 4304 chrone.exe 4304 chrone.exe 4304 chrone.exe 4304 chrone.exe 4304 chrone.exe 4304 chrone.exe 4304 chrone.exe 4304 chrone.exe 4304 chrone.exe 4304 chrone.exe 4304 chrone.exe 4304 chrone.exe 4304 chrone.exe 4304 chrone.exe 3692 rfopgxavqojn.exe 6584 powershell.exe 6584 powershell.exe 6584 powershell.exe 5628 3ad8b374fa.exe 5628 3ad8b374fa.exe 5628 3ad8b374fa.exe 3692 rfopgxavqojn.exe 3692 rfopgxavqojn.exe 3692 rfopgxavqojn.exe 3692 rfopgxavqojn.exe 3692 rfopgxavqojn.exe 3692 rfopgxavqojn.exe 3692 rfopgxavqojn.exe 3692 rfopgxavqojn.exe 3692 rfopgxavqojn.exe 3692 rfopgxavqojn.exe 3692 rfopgxavqojn.exe 3692 rfopgxavqojn.exe 456 notepad.exe 456 notepad.exe 456 notepad.exe 456 notepad.exe 456 notepad.exe -
Suspicious use of AdjustPrivilegeToken 32 IoCs
description pid Process Token: SeDebugPrivilege 1576 taskkill.exe Token: SeDebugPrivilege 3996 taskkill.exe Token: SeDebugPrivilege 3084 taskkill.exe Token: SeDebugPrivilege 1032 taskkill.exe Token: SeDebugPrivilege 2056 taskkill.exe Token: SeDebugPrivilege 1200 firefox.exe Token: SeDebugPrivilege 1200 firefox.exe Token: SeDebugPrivilege 5644 powershell.exe Token: SeDebugPrivilege 4304 chrone.exe Token: SeShutdownPrivilege 6124 powercfg.exe Token: SeCreatePagefilePrivilege 6124 powercfg.exe Token: SeShutdownPrivilege 6096 powercfg.exe Token: SeCreatePagefilePrivilege 6096 powercfg.exe Token: SeShutdownPrivilege 6108 powercfg.exe Token: SeCreatePagefilePrivilege 6108 powercfg.exe Token: SeShutdownPrivilege 4312 powercfg.exe Token: SeCreatePagefilePrivilege 4312 powercfg.exe Token: SeDebugPrivilege 6584 powershell.exe Token: SeDebugPrivilege 5628 3ad8b374fa.exe Token: SeDebugPrivilege 3692 rfopgxavqojn.exe Token: SeShutdownPrivilege 7064 powercfg.exe Token: SeCreatePagefilePrivilege 7064 powercfg.exe Token: SeShutdownPrivilege 2612 powercfg.exe Token: SeCreatePagefilePrivilege 2612 powercfg.exe Token: SeShutdownPrivilege 4408 powercfg.exe Token: SeCreatePagefilePrivilege 4408 powercfg.exe Token: SeLockMemoryPrivilege 456 notepad.exe Token: SeShutdownPrivilege 6876 powercfg.exe Token: SeCreatePagefilePrivilege 6876 powercfg.exe Token: SeDebugPrivilege 1200 firefox.exe Token: SeDebugPrivilege 1200 firefox.exe Token: SeDebugPrivilege 1200 firefox.exe -
Suspicious use of FindShellTrayWindow 32 IoCs
pid Process 4088 1v95d4.exe 3932 4m978A.exe 3932 4m978A.exe 3932 4m978A.exe 3932 4m978A.exe 3932 4m978A.exe 3932 4m978A.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 3932 4m978A.exe 3932 4m978A.exe 3932 4m978A.exe 3932 4m978A.exe -
Suspicious use of SendNotifyMessage 30 IoCs
pid Process 3932 4m978A.exe 3932 4m978A.exe 3932 4m978A.exe 3932 4m978A.exe 3932 4m978A.exe 3932 4m978A.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 3932 4m978A.exe 3932 4m978A.exe 3932 4m978A.exe 3932 4m978A.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1200 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3312 wrote to memory of 2848 3312 9c3748b52a29c68ce473bc92557f57d67c9a67d7f140bb959e91619b7626d26f.exe 85 PID 3312 wrote to memory of 2848 3312 9c3748b52a29c68ce473bc92557f57d67c9a67d7f140bb959e91619b7626d26f.exe 85 PID 3312 wrote to memory of 2848 3312 9c3748b52a29c68ce473bc92557f57d67c9a67d7f140bb959e91619b7626d26f.exe 85 PID 2848 wrote to memory of 3832 2848 z7k43.exe 87 PID 2848 wrote to memory of 3832 2848 z7k43.exe 87 PID 2848 wrote to memory of 3832 2848 z7k43.exe 87 PID 3832 wrote to memory of 4088 3832 Y4D59.exe 88 PID 3832 wrote to memory of 4088 3832 Y4D59.exe 88 PID 3832 wrote to memory of 4088 3832 Y4D59.exe 88 PID 4088 wrote to memory of 4452 4088 1v95d4.exe 89 PID 4088 wrote to memory of 4452 4088 1v95d4.exe 89 PID 4088 wrote to memory of 4452 4088 1v95d4.exe 89 PID 3832 wrote to memory of 4996 3832 Y4D59.exe 90 PID 3832 wrote to memory of 4996 3832 Y4D59.exe 90 PID 3832 wrote to memory of 4996 3832 Y4D59.exe 90 PID 2848 wrote to memory of 3764 2848 z7k43.exe 96 PID 2848 wrote to memory of 3764 2848 z7k43.exe 96 PID 2848 wrote to memory of 3764 2848 z7k43.exe 96 PID 3312 wrote to memory of 3932 3312 9c3748b52a29c68ce473bc92557f57d67c9a67d7f140bb959e91619b7626d26f.exe 99 PID 3312 wrote to memory of 3932 3312 9c3748b52a29c68ce473bc92557f57d67c9a67d7f140bb959e91619b7626d26f.exe 99 PID 3312 wrote to memory of 3932 3312 9c3748b52a29c68ce473bc92557f57d67c9a67d7f140bb959e91619b7626d26f.exe 99 PID 3932 wrote to memory of 1576 3932 4m978A.exe 100 PID 3932 wrote to memory of 1576 3932 4m978A.exe 100 PID 3932 wrote to memory of 1576 3932 4m978A.exe 100 PID 4452 wrote to memory of 4436 4452 skotes.exe 104 PID 4452 wrote to memory of 4436 4452 skotes.exe 104 PID 4452 wrote to memory of 4436 4452 skotes.exe 104 PID 3932 wrote to memory of 3996 3932 4m978A.exe 106 PID 3932 wrote to memory of 3996 3932 4m978A.exe 106 PID 3932 wrote to memory of 3996 3932 4m978A.exe 106 PID 3932 wrote to memory of 3084 3932 4m978A.exe 108 PID 3932 wrote to memory of 3084 3932 4m978A.exe 108 PID 3932 wrote to memory of 3084 3932 4m978A.exe 108 PID 3932 wrote to memory of 1032 3932 4m978A.exe 110 PID 3932 wrote to memory of 1032 3932 4m978A.exe 110 PID 3932 wrote to memory of 1032 3932 4m978A.exe 110 PID 4436 wrote to memory of 2264 4436 crypted.exe 112 PID 4436 wrote to memory of 2264 4436 crypted.exe 112 PID 4436 wrote to memory of 2264 4436 crypted.exe 112 PID 4436 wrote to memory of 2264 4436 crypted.exe 112 PID 4436 wrote to memory of 2264 4436 crypted.exe 112 PID 4436 wrote to memory of 2264 4436 crypted.exe 112 PID 4436 wrote to memory of 2264 4436 crypted.exe 112 PID 4436 wrote to memory of 2264 4436 crypted.exe 112 PID 4436 wrote to memory of 2264 4436 crypted.exe 112 PID 3932 wrote to memory of 2056 3932 4m978A.exe 116 PID 3932 wrote to memory of 2056 3932 4m978A.exe 116 PID 3932 wrote to memory of 2056 3932 4m978A.exe 116 PID 3932 wrote to memory of 3444 3932 4m978A.exe 129 PID 3932 wrote to memory of 3444 3932 4m978A.exe 129 PID 3444 wrote to memory of 1200 3444 firefox.exe 120 PID 3444 wrote to memory of 1200 3444 firefox.exe 120 PID 3444 wrote to memory of 1200 3444 firefox.exe 120 PID 3444 wrote to memory of 1200 3444 firefox.exe 120 PID 3444 wrote to memory of 1200 3444 firefox.exe 120 PID 3444 wrote to memory of 1200 3444 firefox.exe 120 PID 3444 wrote to memory of 1200 3444 firefox.exe 120 PID 3444 wrote to memory of 1200 3444 firefox.exe 120 PID 3444 wrote to memory of 1200 3444 firefox.exe 120 PID 3444 wrote to memory of 1200 3444 firefox.exe 120 PID 3444 wrote to memory of 1200 3444 firefox.exe 120 PID 1200 wrote to memory of 2412 1200 firefox.exe 121 PID 1200 wrote to memory of 2412 1200 firefox.exe 121 PID 1200 wrote to memory of 2412 1200 firefox.exe 121 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\9c3748b52a29c68ce473bc92557f57d67c9a67d7f140bb959e91619b7626d26f.exe"C:\Users\Admin\AppData\Local\Temp\9c3748b52a29c68ce473bc92557f57d67c9a67d7f140bb959e91619b7626d26f.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3312 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7k43.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7k43.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Y4D59.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Y4D59.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1v95d4.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1v95d4.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\1004884001\crypted.exe"C:\Users\Admin\AppData\Local\Temp\1004884001\crypted.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Users\Admin\AppData\Local\Temp\1004884001\crypted.exe"C:\Users\Admin\AppData\Local\Temp\1004884001\crypted.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2264
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4436 -s 5727⤵
- Program crash
PID:4384
-
-
-
C:\Users\Admin\AppData\Local\Temp\1004943001\chrone.exe"C:\Users\Admin\AppData\Local\Temp\1004943001\chrone.exe"6⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4304 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5644
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart7⤵PID:4464
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart8⤵PID:5904
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc7⤵
- Launches sc.exe
PID:5836
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc7⤵
- Launches sc.exe
PID:5892
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv7⤵
- Launches sc.exe
PID:5924
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits7⤵
- Launches sc.exe
PID:5968
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc7⤵
- Launches sc.exe
PID:6076
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 07⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:6096
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 07⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:6108
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 07⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:4312
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 07⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:6124
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "GDRQRNRG"7⤵
- Launches sc.exe
PID:2900
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "GDRQRNRG" binpath= "C:\ProgramData\xrvqzpvhzdcy\rfopgxavqojn.exe" start= "auto"7⤵
- Launches sc.exe
PID:6280
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog7⤵
- Launches sc.exe
PID:6324
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "GDRQRNRG"7⤵
- Launches sc.exe
PID:6348
-
-
-
C:\Users\Admin\AppData\Local\Temp\1004964001\87b079f524.exe"C:\Users\Admin\AppData\Local\Temp\1004964001\87b079f524.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3464
-
-
C:\Users\Admin\AppData\Local\Temp\1004965001\c618a6f11c.exe"C:\Users\Admin\AppData\Local\Temp\1004965001\c618a6f11c.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5172
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"6⤵PID:5552
-
-
C:\Users\Admin\AppData\Local\Temp\1004967001\3ad8b374fa.exe"C:\Users\Admin\AppData\Local\Temp\1004967001\3ad8b374fa.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5628
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2Z7570.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2Z7570.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4996
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3o40b.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3o40b.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3764
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4m978A.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4m978A.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1576
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3996
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3084
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1032
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2056
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking3⤵
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking4⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2064 -parentBuildID 20240401114208 -prefsHandle 1988 -prefMapHandle 1980 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {23691ee4-1e70-420c-8b6c-e983c98ed458} 1200 "\\.\pipe\gecko-crash-server-pipe.1200" gpu5⤵PID:2412
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2504 -parentBuildID 20240401114208 -prefsHandle 2496 -prefMapHandle 2492 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cfd7f1ba-2bca-4d44-b1cd-1cb1f3778377} 1200 "\\.\pipe\gecko-crash-server-pipe.1200" socket5⤵PID:5020
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3092 -childID 1 -isForBrowser -prefsHandle 3364 -prefMapHandle 3408 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 944 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {07f40f10-0826-4a30-8d58-bf657a24e072} 1200 "\\.\pipe\gecko-crash-server-pipe.1200" tab5⤵PID:3256
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3980 -childID 2 -isForBrowser -prefsHandle 3548 -prefMapHandle 2788 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 944 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {75f3347d-e3cc-4479-b9be-1d2241e71631} 1200 "\\.\pipe\gecko-crash-server-pipe.1200" tab5⤵PID:4712
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4440 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4364 -prefMapHandle 4356 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f44d3543-ada2-4670-ac58-9b82c7b0f70e} 1200 "\\.\pipe\gecko-crash-server-pipe.1200" utility5⤵
- Checks processor information in registry
PID:5212
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4332 -childID 3 -isForBrowser -prefsHandle 5640 -prefMapHandle 5636 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 944 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f5ee6c31-8dfe-4fcb-9da9-45276fad6d34} 1200 "\\.\pipe\gecko-crash-server-pipe.1200" tab5⤵PID:5232
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5804 -childID 4 -isForBrowser -prefsHandle 5612 -prefMapHandle 5512 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 944 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3035931c-9580-4dcc-a234-da0c47f6234f} 1200 "\\.\pipe\gecko-crash-server-pipe.1200" tab5⤵PID:5260
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6012 -childID 5 -isForBrowser -prefsHandle 5932 -prefMapHandle 5936 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 944 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c2c8c6e2-edc8-4ebf-aa92-1f2a1c6392e6} 1200 "\\.\pipe\gecko-crash-server-pipe.1200" tab5⤵PID:5268
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4436 -ip 44361⤵PID:4512
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3116
-
C:\Windows\System32\mousocoreworker.exeC:\Windows\System32\mousocoreworker.exe -Embedding1⤵PID:3444
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6748
-
C:\ProgramData\xrvqzpvhzdcy\rfopgxavqojn.exeC:\ProgramData\xrvqzpvhzdcy\rfopgxavqojn.exe1⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3692 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6584
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵PID:2124
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart3⤵PID:6872
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc2⤵
- Launches sc.exe
PID:3676
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc2⤵
- Launches sc.exe
PID:6744
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv2⤵
- Launches sc.exe
PID:6804
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits2⤵
- Launches sc.exe
PID:6936
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc2⤵
- Launches sc.exe
PID:6748
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:2612
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:7064
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:6876
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:4408
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:6732
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:456
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5460
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Power Settings
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Defense Evasion
Impair Defenses
3Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\activity-stream.discovery_stream.json
Filesize24KB
MD5ab6902e1f221277a8743df12ccfaa4f1
SHA1e9a2a1fbeceaf1e38b00175edcc5238452b50ab9
SHA256996d60fc71ac99c030d0b6b02284e05311839b20763d642b2dd1df4e745231a6
SHA512676d61c92c8240c600482c00c7847f0d801fb11e02d4e839d63154f361a33ab767a634b56f144696970ee20c64e8ac4d3d0bce4ac5c3172ecc54aa43006170db
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\cache2\entries\D500AD994A7515157BB2A6ADD5B18B754E4D2F99
Filesize13KB
MD59395c9977024305388d120501ef6ec19
SHA1c45c67bc4da0ef8f8e5929d96519b36bddc1e853
SHA25665542d098699539dd1ab0b34dfe5f4122e78fe3cbf9f98581f26e1abb4fd2577
SHA5124ee5d97bb84e49b55cbaaf270021defeb22d76752d439b7a6f740821770931eac95d83c2ee15f0a3376e578797a44bb82b23b4ad5dd7257b1d5101511a108ed5
-
Filesize
1.2MB
MD5e1d09be68de1be491cdb2870bfc90854
SHA16db8265a53f1a9e9d0c4aa8f98ade1db4eea9109
SHA2566b2c384e64992914ec049762e153d4592c7dc2511b8cc079843c4d8195210c23
SHA51210e609c166adfe9aebb5c62f57896fc194d5272f5b82c2cd8f3719444074bd0064e7969a559633b4d7b000b5196812ea38c913bf970cfd4c33567116d8295692
-
Filesize
6.9MB
MD5ce3a6f4d1ebe823841187d30e9f143ab
SHA17316c51c0539724130226dd5cdc968b67415e225
SHA25698d0e67d779ed43bcac753a9af22326e0024390d703c7c4e6601917ce6ff96bc
SHA512cfdddc6575138fb500d8e7e4ca379091d96864e4bf60fbcc357a0275b68f67210757204b86c983465959dd115e1b3944d22f410fec3f7232f2b6bda187df171a
-
Filesize
3.0MB
MD5bb610f3b68a61a23e8d71c8fad693f38
SHA1b077edd1521904673b7dd7f01d45e7aa3cbce4fb
SHA2561ad85e7a7ae029b5d4003420b6912a51fcefc95f6b7f64fabc2783e10286857a
SHA5129353f34e693fc2bbcf7da5ce3f9d3382262786ccaf763a00b3a874949f6e17beca912a61f144dc0fb6e7a2794e53721d3631c84b5a4afccfd679cb0974d9c914
-
Filesize
2.1MB
MD5f058a72e4dbe19f8b8ffb8785c2820d2
SHA1440c44260ad8564a776ec1292adc4577906009fe
SHA2566a443c0ac67ec4aff6acb6319cfc04d68bf0f861ac0424dec70a6bb8a27975cb
SHA512bb2068d16c5f8a02aa2df1d51b491fb48de7a47cf74bb69e1ea20feb5b33f529d8e2d0b36844fa6ce961aa3c6337c057af7533153209cf26b4db6b7cd30d23ea
-
Filesize
2.7MB
MD5af8f97d988c3efd72eda117bca4927e2
SHA1e22e4c6f96febbb91c6c9de022772ada9129b7f6
SHA2562395e140ced018d325aceb6c0c0bdc7ce7fe960424276d995855a2d7a8272667
SHA5124685898b8a6074fbaad2154a9f041f750e9c167daf66ebcfacc6f2b1b60d803e813f76a9b2bbae943c65d1aae75a449bb6ebc73c5080b7592e394aea837266bb
-
Filesize
898KB
MD59ea0842588c153999f1a95c1a6e887f2
SHA10fd29248d1e77bcba44643e5f5021b11ff5c1d01
SHA25641ec0499a24fa3682af7130da2d2e7cd68f2cd9ff709ce5d7f4f15513c52b326
SHA512ffa79ea616a4cb978828739cf167249c74b78e02b8dbc69b3a865e1473b1dde7b8facd32af5c838ca76f1d79d28ba1816bea24f6c727a567346d73303acfb0b6
-
Filesize
5.6MB
MD53807da7be828f830f937bd4b16d83af9
SHA1260acaa78f699039a7ec6c1e37740c25312c6498
SHA2567bf099795939dd20fe31cf152b99d6fc45164a51ca33d051988c688da0faa90a
SHA5121f0e771c9cbb58452ef959d00f3d32ed528c30aa9ee9c754b3362d6d07fd49b9306f1535536c2b7b733fd0b0c1f27be2bb2d242d197f9d28c83c7f11a21aae02
-
Filesize
2.0MB
MD511d426c888db116423f5b98a68f128e7
SHA1b1130e91da13796704eed24164d53b537d5abe09
SHA256086d33d97dacb90e333a023aae5df67812e44c25fb1492775936ed12a8245e43
SHA51237d2ce2eb090af5c21b3c72b1e0ad72aad527cc7ac6f5d6f0bc5c0e46390c90923378b69c25ff4137deba52819f552cfe82d851eea6fa4e2007fe5320b0a45d2
-
Filesize
3.5MB
MD5664c0236cb71a216b2fb1f3955315c63
SHA1cc43a22e0dcb9114fd66f33ed18922b7c759498f
SHA25624adf41e8001977af7d55918af61637469cdf4339d42f4ea974112e750ebe242
SHA512da553c130613f2e6319e86a2f5a1ff9639b05f1c6ecb5a06278413dad1b0f32b7e2076708c3b8081d0c853cc6bb449b52a522f21045221a08e4eba79075860fe
-
Filesize
3.1MB
MD545992c73523a4739a3cd6749f3d3f632
SHA1ae7d540cddafc301f19a6306d40f13aac56b6173
SHA2567bc09569d86014729ebcfc4442b27288f40417c926d12598971647a0d8a42e6c
SHA51266ebcec5889001c3a6ca5a3cf0501fc989a0108a507734d0370945cab714b088ecfc94c4a4b0800830c048a9271a6e65cedb0569ce691a073c153438d96b27f6
-
Filesize
3.1MB
MD5e17e79621707b33deebbb062396a7cb5
SHA18f525636a1320a50c51312de1981d53d9e545599
SHA256ef85019d3696285f9a0d5c9b4c4134a68713b6294cb77a9dc41e0223ea7bede9
SHA5125150c7af1b0565d2b975e550d080db0e8253a1847a0ac0aeadc11d091c02b128941caeb5b6b1bd9d60a878165b1aab7b38a37dd7f07ca2e9aecb0b90c519d9b0
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\AlternateServices.bin
Filesize18KB
MD594b47b2f75270f1d0d1aa0b30abc268d
SHA194940bc61f520406527e31746f998f0b110d6f6d
SHA25697b194e1580c577444df68e1251ae7a44b31b7ebcaf7a99d268b9779a1394440
SHA51269f7f82e1282fb460f8436c4963e2c6749cbb22420c4e6ee7b8e4905654e77b902c23ddd5a22bf7fbc81402fad7bc3e6e4fd5b3d05da891627bf5f44f016434e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\AlternateServices.bin
Filesize6KB
MD586ac8efe5a6bbe09e65bb8bb4d048cce
SHA187aa0527caec67932fcfc16a727a8c7094a34edb
SHA25649fb541eff7268ebef5efe9e2b064c2029744a7d2e549383a8b59773170450af
SHA5128623e64872b29df089d2a941f649b744327056ee55f1247df466a4bc8fbd623f82cae3a1abcc09eb09fb94566a37caa8b71cc4c99af33497436cf2c19c14f41b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\AlternateServices.bin
Filesize13KB
MD544c5dd5a2ef7c3a257a85fc1e2dfe5a9
SHA163fa09adff73d7f28dd6e93c07c1fc0248268021
SHA2562fd1ed3271fb1e643d51aa08ffceb629ef324eed192501822c42da8cea9d5bb0
SHA512cacf866eddab50f9a7bc3c8e9fd9d327c627ec7d4d590021be57651baabd2010dd1e4e19e5b64d60990637091f178f0aad1646fc27f2b7ccf34169958ba23f4a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.bin
Filesize23KB
MD578f4b873b2a36dd2e0514f3ffb7b66e2
SHA11feec208b04b03f52205eb927815368ba0fe06e7
SHA256d0073b3561cc1af7b76f95a47fb9e4a31e714fa0523835dd6275071caa6f3c31
SHA51268a587d908cc585de9b6fbe3e85454a32a4e12fb7844f076217a8c52609777b75227c0234cd72cd51ba7c5b40ef481b17f0f0a45c5f6e349156cbb52c9d92123
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.bin
Filesize22KB
MD5407feced7e47bf6662588c1828f08a9d
SHA17ff7eecbb85ea57231f0b4f765da0c5fd0cd5c78
SHA256fe2acecc15175b405d582f57fc740f320979a5972e9d930458aa5b27183b50b8
SHA512b35243b46ad22451a867d91927f862688f1a5af33746f4da362517d19666885af310a7ef9673a32134ea6ab2188395c3d75dc3035adc55fa9303b90fdc7241a6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.bin
Filesize24KB
MD5483350837df4c81388673d98631d516e
SHA19ca3e9235f647a63b57a1e74eaa141cfc23994b7
SHA256b4778ee754a1077f8897c5747f27f5b9348d6b541c79784c4fa277e0f68c0ad4
SHA5127f4263f673f81065fbb9d5013d6c54512135a44704ed4aec3b6abafee5438f53c97d12e17837f61c6499a0dd2111c43fea10726075d499daf4a04d117e4433a4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.bin
Filesize25KB
MD575203889337d89c0c42ca4ba30489d60
SHA1be60c629ee17f2aa5217f7a3e3398d1f1082d7b0
SHA256238b603b5cdad3b43d0a271ef28a565df6d3f6cce2200c99a36b462991c4baea
SHA5127a6f37fb35bf4dd8db695c5c9ddce91983239c9a3b20a09515fff0f8088740688b1a7310b97b53b6cd9ac8a4f06c8f61214ebba8111cdf0ac07812d1f08724f5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD51f4abfcdde2a6daf3d6960e70be19ca5
SHA1a4904cab402cacfc1ffb1db9c821ef12fdf16055
SHA2561d37c53e4b336eeb15a908d016ee99985893cbd6f5794788dd1ffd7b9fb173d8
SHA51242d440cee04c7d2778238420975771b44c7c5c20064b8ccbd50207bf06344c496b85d5825f68b3289c087af89488ae0d6b5eabb6616a043c039ae1707013bcb2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD502e5370860ee296353fb6817ec1407d0
SHA1fe7e43696b663f1a10501a026e44b5f4ade799ef
SHA256a3513237ca3be7b67e6bf891c2592e6a60110a1eb0a676e0017c33d641033a49
SHA512e176628728f37a91a2b539b85a26237943a9884682eaadb09c17eb4ee74e8f0e5c09da5cb596029b5a24e8d93ada88d0ca6f90ff63c4c8c1bed6c5b6d5da5d0d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize23KB
MD59dd55beea73cb35829eec0d598438332
SHA1cd056bd7cf120874c4f4644d67d896b3ce860866
SHA256246036a0c60cef7ba85f86c7f2e0ed11662fd8ec9ce918105e7ba75502143c9d
SHA512d728016a162e7fc900d54e37b3d1a898fedde1711f3358b997362298766b652b808a2eb2b385f2642c66491c53967ae99da3869ab8e776eef83e9151208825e9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize23KB
MD59cc56c7d0b6da5912f58d30cfc168b25
SHA12e57e3a2103b2921a3237b3d1f1c282ce45f7e45
SHA2564a470cdff22559f9b58e78f0f7ad67dc5b740f38168be6b7c8becc2069f3b6d1
SHA512b0609a7470e9776b5fe6095bae3825bebfd247c90b655f1377876406df66b7f3fc1bdf0db7a47b9005c5e079cd282c766302f452a47271c434d07318cdf02729
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD57ce16bde7122c6a5ca2bd77182cb7021
SHA1864c9562574d2eb02454e295dd0e75bb6e9a0c5e
SHA2566964dd9d2f1b8434a7c6c726548feece78ca7d97b53374a3225d2d1b4529022e
SHA5126172b74348df7e1668530cb704626db9da05c9bf3530e29e9754324d1b5a24ee22a8a3937cf2d6f18fe49b877c62ce50dc3b4d00de9c6501045e9d4fa4daca1e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD53cac2537cc7d0798613f82eece79cc76
SHA11eb4e6b8d0b5dd9c9f27bda55eac84ac6b4ed275
SHA256597dea3e1bcb5c084dd3cebc819d8e7bd2fc3df6b4cbd050c583dd965939f9fc
SHA512c3d0191cb5d5edecd00903990df12fa7e6045702b95470b23cdf5f21736bdb61c90dc02b7c6361787c14ee46170bab7dc7f9d3b523e55e654ae3d6d82ad26f38
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\a6fef9f4-feb9-411b-bc94-d26a4ba35ac4
Filesize659B
MD5032eeb12d0441c67adcdffd045cd4d30
SHA17b4d44b704888d21625799a0a63f5b6f1c3e9b2b
SHA256ef52039607c4144a5adca252f24dd853bf19db7ce1654b9aa07a0eee3da36a55
SHA5127df578e2f9021688c3ec179e89ee901c3afe50bc214e05e8fbaa14567c05f7feeb1476d085bc25995669a0bac65e54d7e0a3e2166f164f3926c3a750eac0ee9d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\b3c7114f-0ea5-4637-b31d-76d5085da583
Filesize982B
MD50be2ca89191fb3abd2824d3b100bf1f3
SHA105d9104008353ecec70f29d4fe0703c1f1e93f8a
SHA256444f41e8bdac915e5224d53e1dcf51a81bbe0099713bd65192b771d3759a1623
SHA5124eb72db573d4a50e0e4cbf1c7cb9b7ef3fa7763f66a6c3b42b240621f5e6e9d839b705fa5523e5a6f97254c5b6cdd13b25adb2eaa161568f573072c81abd8bc9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD5ac537b824fc6d19c66015c17191f7c2e
SHA1a84e708df5cdbc993efcc378041eea35970d7be1
SHA25611d3bf028e25417f496f63aec632488e044d5994b15158770cf3a36c77112354
SHA51213830f3d9bccb570fadde0ceb3daa1562957f6a132904e32ae4b5bcf09c2870c84883b8a014a3abaa22eb56cf60db6443e5e7629e1c77f87a681504084b616c8
-
Filesize
15KB
MD5c39a7c192d4d8ea85eaf211fe3e90592
SHA10bd321426c5c14e393916664e2339c62642aa95d
SHA25661520e5f95bc09324087190aa87943c8456aa50628a0928353297675a227bee6
SHA512bc09a02d612e615b33e738b7ec7209ac0eb00d0adf400db64e855e366dc23914bacba1d9f12bf045447a6b215a40fe8af1c45e54d71dcaaaecbc041a0970fd29
-
Filesize
10KB
MD51044ba2163cb7cd4626d9f8d42ba2fc0
SHA122782e4f5acd7b8e262a6b210f27136ec122e3cc
SHA256fa1ce16d3a93c12d781bbcd7016f72244fefaae95cc665d56c21844185ae5035
SHA512da72aeb5cae266d47b4c68ce2f31893bcaac9a7add47f08e6f46bc0f3ad90212110433fe59861d062104304acfc77cd1e70db0364a262d36d72b39e579d67195
-
Filesize
10KB
MD519cca982c2d2207bdb943ccc459b6881
SHA15b3da824b3e89fe7f1fa4a8aa898ad96666e5879
SHA2565b62bac41839bfefa0bacc99691ea58a8bf11cb27191c730482b1696256521dc
SHA5126b8c1b54a50bdaa6ce0705df6809baf90953bd69d6d2002893b490499b04757a6d3dfc458bfc3606929139c0032dff2ccf03303e96480265bda92607948efa71