Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2024 03:01
Static task
static1
Behavioral task
behavioral1
Sample
0128acee92388482eee4ef5c15eb4eb2d943ddd55d5c0d8e8fee4121dbeb75ce.exe
Resource
win10v2004-20241007-en
General
-
Target
0128acee92388482eee4ef5c15eb4eb2d943ddd55d5c0d8e8fee4121dbeb75ce.exe
-
Size
7.1MB
-
MD5
05c7e7195dbaac2ea5a9134ed18f2a24
-
SHA1
dd21fd691c40d85c73690713902b780a7ac4a454
-
SHA256
0128acee92388482eee4ef5c15eb4eb2d943ddd55d5c0d8e8fee4121dbeb75ce
-
SHA512
73164a2a866517427ba090232e5ad6bbf24bfad35d97c39ee347e7c9e015ac845fc465a52cdaf6f9cedcfd752cf42fa7ce97c1ab6636b6c692b7ec08b480be71
-
SSDEEP
196608:eAD2Vl1Y/dcCPR9AE0VLtBw4xh9Wv+Ig7A:eES1Y6wvULzw4r9Lj
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Detect Poverty Stealer Payload 1 IoCs
Processes:
resource yara_rule behavioral1/files/0x0007000000023cd3-115.dat family_povertystealer -
Processes:
4d921l.exe05f16a455c.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4d921l.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 05f16a455c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 05f16a455c.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4d921l.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4d921l.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4d921l.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 05f16a455c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 05f16a455c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4d921l.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4d921l.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 05f16a455c.exe -
Poverty Stealer
Poverty Stealer is a crypto and infostealer written in C++.
-
Povertystealer family
-
Stealc family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
Processes:
Zefoysm.exeAddInProcess32.exedescription pid Process procid_target PID 4112 created 3436 4112 Zefoysm.exe 56 PID 5324 created 2652 5324 AddInProcess32.exe 44 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 12 IoCs
Processes:
1W47n3.exeskotes.exe2T6257.exeskotes.exe65304f4c96.exeskotes.exeskotes.exe3h78O.exe4d921l.exe28f1e32343.exe816cc41016.exe05f16a455c.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1W47n3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2T6257.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 65304f4c96.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3h78O.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4d921l.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 28f1e32343.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 816cc41016.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 05f16a455c.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
Processes:
chrome.exechrome.exechrome.exechrome.exepid Process 5488 chrome.exe 4192 chrome.exe 5316 chrome.exe 7040 chrome.exe -
Checks BIOS information in registry 2 TTPs 24 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
skotes.exe1W47n3.exeskotes.exe3h78O.exe4d921l.exeskotes.exe816cc41016.exe2T6257.exe28f1e32343.exe65304f4c96.exe05f16a455c.exeskotes.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1W47n3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3h78O.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4d921l.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 816cc41016.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2T6257.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3h78O.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4d921l.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 28f1e32343.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 65304f4c96.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 05f16a455c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1W47n3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 28f1e32343.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 05f16a455c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2T6257.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 65304f4c96.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 816cc41016.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
1W47n3.exeskotes.exe28f1e32343.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 1W47n3.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 28f1e32343.exe -
Executes dropped EXE 22 IoCs
Processes:
v7P08.exeo5u43.exe1W47n3.exeskotes.exe2T6257.exe3h78O.exe4d921l.exex4lburt.execomputerlead.exeZefoysm.exe1Shasou.exeZefoysm.exeskotes.exe28f1e32343.exe65304f4c96.exe816cc41016.exe52fc7ab26d.exe05f16a455c.exeskotes.exeservice123.exeskotes.exeservice123.exepid Process 904 v7P08.exe 3584 o5u43.exe 2948 1W47n3.exe 3940 skotes.exe 3396 2T6257.exe 4912 3h78O.exe 2872 4d921l.exe 2096 x4lburt.exe 736 computerlead.exe 4112 Zefoysm.exe 2860 1Shasou.exe 2192 Zefoysm.exe 4552 skotes.exe 2832 28f1e32343.exe 4732 65304f4c96.exe 3648 816cc41016.exe 3992 52fc7ab26d.exe 6572 05f16a455c.exe 6428 skotes.exe 3580 service123.exe 6952 skotes.exe 5100 service123.exe -
Identifies Wine through registry keys 2 TTPs 12 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
4d921l.exeskotes.exe1W47n3.exe2T6257.exeskotes.exe28f1e32343.exe65304f4c96.exe816cc41016.exe05f16a455c.exeskotes.exeskotes.exe3h78O.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 4d921l.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 1W47n3.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 2T6257.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 28f1e32343.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 65304f4c96.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 816cc41016.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 05f16a455c.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 3h78O.exe -
Loads dropped DLL 2 IoCs
Processes:
service123.exeservice123.exepid Process 3580 service123.exe 5100 service123.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
4d921l.exe05f16a455c.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4d921l.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4d921l.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 05f16a455c.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
o5u43.exex4lburt.exeskotes.exe0128acee92388482eee4ef5c15eb4eb2d943ddd55d5c0d8e8fee4121dbeb75ce.exev7P08.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" o5u43.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x4lburt.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\65304f4c96.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009185001\\65304f4c96.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\816cc41016.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009186001\\816cc41016.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\52fc7ab26d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009187001\\52fc7ab26d.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\05f16a455c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009188001\\05f16a455c.exe" skotes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0128acee92388482eee4ef5c15eb4eb2d943ddd55d5c0d8e8fee4121dbeb75ce.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v7P08.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral1/files/0x0007000000023ce0-1379.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
Processes:
1W47n3.exeskotes.exe2T6257.exe3h78O.exe4d921l.exeskotes.exe28f1e32343.exe65304f4c96.exe816cc41016.exe05f16a455c.exeskotes.exeskotes.exepid Process 2948 1W47n3.exe 3940 skotes.exe 3396 2T6257.exe 4912 3h78O.exe 2872 4d921l.exe 4552 skotes.exe 2832 28f1e32343.exe 4732 65304f4c96.exe 3648 816cc41016.exe 6572 05f16a455c.exe 6428 skotes.exe 6952 skotes.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
Zefoysm.execomputerlead.exedescription pid Process procid_target PID 4112 set thread context of 2192 4112 Zefoysm.exe 109 PID 736 set thread context of 5324 736 computerlead.exe 142 -
Drops file in Windows directory 1 IoCs
Processes:
1W47n3.exedescription ioc Process File created C:\Windows\Tasks\skotes.job 1W47n3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target Process procid_target 5684 5324 WerFault.exe 142 6308 2832 WerFault.exe 111 -
System Location Discovery: System Language Discovery 1 TTPs 26 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
skotes.exe3h78O.exeZefoysm.exe65304f4c96.exe52fc7ab26d.exetaskkill.exev7P08.exe1W47n3.exe05f16a455c.exefontdrvhost.exeZefoysm.exe816cc41016.exetaskkill.exeschtasks.exe0128acee92388482eee4ef5c15eb4eb2d943ddd55d5c0d8e8fee4121dbeb75ce.exe4d921l.exeo5u43.exetaskkill.exe1Shasou.exe28f1e32343.exetaskkill.exetaskkill.exeAddInProcess32.exeservice123.exe2T6257.execomputerlead.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3h78O.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Zefoysm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65304f4c96.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 52fc7ab26d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v7P08.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1W47n3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 05f16a455c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fontdrvhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Zefoysm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 816cc41016.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0128acee92388482eee4ef5c15eb4eb2d943ddd55d5c0d8e8fee4121dbeb75ce.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4d921l.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language o5u43.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1Shasou.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 28f1e32343.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2T6257.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language computerlead.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
28f1e32343.exefirefox.exefirefox.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 28f1e32343.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 28f1e32343.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 5 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid Process 3808 taskkill.exe 4192 taskkill.exe 3872 taskkill.exe 4864 taskkill.exe 1044 taskkill.exe -
Modifies registry class 1 IoCs
Processes:
firefox.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
1W47n3.exeskotes.exe2T6257.exe3h78O.exe4d921l.execomputerlead.exeZefoysm.exeskotes.exe28f1e32343.exe65304f4c96.exeZefoysm.exe816cc41016.exe52fc7ab26d.exe05f16a455c.exechrome.exeskotes.exeAddInProcess32.exefontdrvhost.exepid Process 2948 1W47n3.exe 2948 1W47n3.exe 3940 skotes.exe 3940 skotes.exe 3396 2T6257.exe 3396 2T6257.exe 4912 3h78O.exe 4912 3h78O.exe 2872 4d921l.exe 2872 4d921l.exe 736 computerlead.exe 736 computerlead.exe 736 computerlead.exe 2872 4d921l.exe 2872 4d921l.exe 4112 Zefoysm.exe 4112 Zefoysm.exe 4552 skotes.exe 4552 skotes.exe 2832 28f1e32343.exe 2832 28f1e32343.exe 4732 65304f4c96.exe 4732 65304f4c96.exe 2192 Zefoysm.exe 2192 Zefoysm.exe 2192 Zefoysm.exe 2192 Zefoysm.exe 2192 Zefoysm.exe 2192 Zefoysm.exe 3648 816cc41016.exe 3648 816cc41016.exe 3992 52fc7ab26d.exe 3992 52fc7ab26d.exe 2192 Zefoysm.exe 2192 Zefoysm.exe 2192 Zefoysm.exe 2192 Zefoysm.exe 2192 Zefoysm.exe 2192 Zefoysm.exe 6572 05f16a455c.exe 6572 05f16a455c.exe 3992 52fc7ab26d.exe 3992 52fc7ab26d.exe 6572 05f16a455c.exe 6572 05f16a455c.exe 6572 05f16a455c.exe 2192 Zefoysm.exe 2192 Zefoysm.exe 2192 Zefoysm.exe 2192 Zefoysm.exe 2192 Zefoysm.exe 2192 Zefoysm.exe 4192 chrome.exe 4192 chrome.exe 6428 skotes.exe 6428 skotes.exe 5324 AddInProcess32.exe 5324 AddInProcess32.exe 5324 AddInProcess32.exe 5324 AddInProcess32.exe 7124 fontdrvhost.exe 7124 fontdrvhost.exe 7124 fontdrvhost.exe 7124 fontdrvhost.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid Process 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
Processes:
computerlead.exe4d921l.exeZefoysm.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exefirefox.exe05f16a455c.exechrome.exedescription pid Process Token: SeDebugPrivilege 736 computerlead.exe Token: SeDebugPrivilege 2872 4d921l.exe Token: SeDebugPrivilege 4112 Zefoysm.exe Token: SeDebugPrivilege 4112 Zefoysm.exe Token: SeDebugPrivilege 1044 taskkill.exe Token: SeDebugPrivilege 3808 taskkill.exe Token: SeDebugPrivilege 4192 taskkill.exe Token: SeDebugPrivilege 3872 taskkill.exe Token: SeDebugPrivilege 4864 taskkill.exe Token: SeDebugPrivilege 1200 firefox.exe Token: SeDebugPrivilege 1200 firefox.exe Token: SeDebugPrivilege 6572 05f16a455c.exe Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe -
Suspicious use of FindShellTrayWindow 58 IoCs
Processes:
1W47n3.exe52fc7ab26d.exefirefox.exechrome.exepid Process 2948 1W47n3.exe 3992 52fc7ab26d.exe 3992 52fc7ab26d.exe 3992 52fc7ab26d.exe 3992 52fc7ab26d.exe 3992 52fc7ab26d.exe 3992 52fc7ab26d.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 3992 52fc7ab26d.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 3992 52fc7ab26d.exe 3992 52fc7ab26d.exe 3992 52fc7ab26d.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe -
Suspicious use of SendNotifyMessage 30 IoCs
Processes:
52fc7ab26d.exefirefox.exepid Process 3992 52fc7ab26d.exe 3992 52fc7ab26d.exe 3992 52fc7ab26d.exe 3992 52fc7ab26d.exe 3992 52fc7ab26d.exe 3992 52fc7ab26d.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 3992 52fc7ab26d.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 3992 52fc7ab26d.exe 3992 52fc7ab26d.exe 3992 52fc7ab26d.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
firefox.exepid Process 1200 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
0128acee92388482eee4ef5c15eb4eb2d943ddd55d5c0d8e8fee4121dbeb75ce.exev7P08.exeo5u43.exe1W47n3.exeskotes.exex4lburt.exeZefoysm.exe52fc7ab26d.exedescription pid Process procid_target PID 4600 wrote to memory of 904 4600 0128acee92388482eee4ef5c15eb4eb2d943ddd55d5c0d8e8fee4121dbeb75ce.exe 83 PID 4600 wrote to memory of 904 4600 0128acee92388482eee4ef5c15eb4eb2d943ddd55d5c0d8e8fee4121dbeb75ce.exe 83 PID 4600 wrote to memory of 904 4600 0128acee92388482eee4ef5c15eb4eb2d943ddd55d5c0d8e8fee4121dbeb75ce.exe 83 PID 904 wrote to memory of 3584 904 v7P08.exe 84 PID 904 wrote to memory of 3584 904 v7P08.exe 84 PID 904 wrote to memory of 3584 904 v7P08.exe 84 PID 3584 wrote to memory of 2948 3584 o5u43.exe 85 PID 3584 wrote to memory of 2948 3584 o5u43.exe 85 PID 3584 wrote to memory of 2948 3584 o5u43.exe 85 PID 2948 wrote to memory of 3940 2948 1W47n3.exe 86 PID 2948 wrote to memory of 3940 2948 1W47n3.exe 86 PID 2948 wrote to memory of 3940 2948 1W47n3.exe 86 PID 3584 wrote to memory of 3396 3584 o5u43.exe 87 PID 3584 wrote to memory of 3396 3584 o5u43.exe 87 PID 3584 wrote to memory of 3396 3584 o5u43.exe 87 PID 904 wrote to memory of 4912 904 v7P08.exe 95 PID 904 wrote to memory of 4912 904 v7P08.exe 95 PID 904 wrote to memory of 4912 904 v7P08.exe 95 PID 4600 wrote to memory of 2872 4600 0128acee92388482eee4ef5c15eb4eb2d943ddd55d5c0d8e8fee4121dbeb75ce.exe 98 PID 4600 wrote to memory of 2872 4600 0128acee92388482eee4ef5c15eb4eb2d943ddd55d5c0d8e8fee4121dbeb75ce.exe 98 PID 4600 wrote to memory of 2872 4600 0128acee92388482eee4ef5c15eb4eb2d943ddd55d5c0d8e8fee4121dbeb75ce.exe 98 PID 3940 wrote to memory of 2096 3940 skotes.exe 99 PID 3940 wrote to memory of 2096 3940 skotes.exe 99 PID 2096 wrote to memory of 736 2096 x4lburt.exe 100 PID 2096 wrote to memory of 736 2096 x4lburt.exe 100 PID 2096 wrote to memory of 736 2096 x4lburt.exe 100 PID 3940 wrote to memory of 4112 3940 skotes.exe 106 PID 3940 wrote to memory of 4112 3940 skotes.exe 106 PID 3940 wrote to memory of 4112 3940 skotes.exe 106 PID 3940 wrote to memory of 2860 3940 skotes.exe 108 PID 3940 wrote to memory of 2860 3940 skotes.exe 108 PID 3940 wrote to memory of 2860 3940 skotes.exe 108 PID 4112 wrote to memory of 2192 4112 Zefoysm.exe 109 PID 4112 wrote to memory of 2192 4112 Zefoysm.exe 109 PID 4112 wrote to memory of 2192 4112 Zefoysm.exe 109 PID 4112 wrote to memory of 2192 4112 Zefoysm.exe 109 PID 4112 wrote to memory of 2192 4112 Zefoysm.exe 109 PID 4112 wrote to memory of 2192 4112 Zefoysm.exe 109 PID 3940 wrote to memory of 2832 3940 skotes.exe 111 PID 3940 wrote to memory of 2832 3940 skotes.exe 111 PID 3940 wrote to memory of 2832 3940 skotes.exe 111 PID 3940 wrote to memory of 4732 3940 skotes.exe 112 PID 3940 wrote to memory of 4732 3940 skotes.exe 112 PID 3940 wrote to memory of 4732 3940 skotes.exe 112 PID 3940 wrote to memory of 3648 3940 skotes.exe 114 PID 3940 wrote to memory of 3648 3940 skotes.exe 114 PID 3940 wrote to memory of 3648 3940 skotes.exe 114 PID 3940 wrote to memory of 3992 3940 skotes.exe 117 PID 3940 wrote to memory of 3992 3940 skotes.exe 117 PID 3940 wrote to memory of 3992 3940 skotes.exe 117 PID 3992 wrote to memory of 1044 3992 52fc7ab26d.exe 118 PID 3992 wrote to memory of 1044 3992 52fc7ab26d.exe 118 PID 3992 wrote to memory of 1044 3992 52fc7ab26d.exe 118 PID 3992 wrote to memory of 3808 3992 52fc7ab26d.exe 121 PID 3992 wrote to memory of 3808 3992 52fc7ab26d.exe 121 PID 3992 wrote to memory of 3808 3992 52fc7ab26d.exe 121 PID 3992 wrote to memory of 4192 3992 52fc7ab26d.exe 123 PID 3992 wrote to memory of 4192 3992 52fc7ab26d.exe 123 PID 3992 wrote to memory of 4192 3992 52fc7ab26d.exe 123 PID 3992 wrote to memory of 3872 3992 52fc7ab26d.exe 125 PID 3992 wrote to memory of 3872 3992 52fc7ab26d.exe 125 PID 3992 wrote to memory of 3872 3992 52fc7ab26d.exe 125 PID 3992 wrote to memory of 4864 3992 52fc7ab26d.exe 127 PID 3992 wrote to memory of 4864 3992 52fc7ab26d.exe 127 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2652
-
C:\Windows\SysWOW64\fontdrvhost.exe"C:\Windows\System32\fontdrvhost.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:7124
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3436
-
C:\Users\Admin\AppData\Local\Temp\0128acee92388482eee4ef5c15eb4eb2d943ddd55d5c0d8e8fee4121dbeb75ce.exe"C:\Users\Admin\AppData\Local\Temp\0128acee92388482eee4ef5c15eb4eb2d943ddd55d5c0d8e8fee4121dbeb75ce.exe"2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7P08.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7P08.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\o5u43.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\o5u43.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1W47n3.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1W47n3.exe5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3940 -
C:\Users\Admin\AppData\Local\Temp\1009118001\x4lburt.exe"C:\Users\Admin\AppData\Local\Temp\1009118001\x4lburt.exe"7⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\computerlead.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\computerlead.exe8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:736 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"9⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5324 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5324 -s 62810⤵
- Program crash
PID:5684
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009146001\Zefoysm.exe"C:\Users\Admin\AppData\Local\Temp\1009146001\Zefoysm.exe"7⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4112
-
-
C:\Users\Admin\AppData\Local\Temp\1009157001\1Shasou.exe"C:\Users\Admin\AppData\Local\Temp\1009157001\1Shasou.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2860
-
-
C:\Users\Admin\AppData\Local\Temp\1009184001\28f1e32343.exe"C:\Users\Admin\AppData\Local\Temp\1009184001\28f1e32343.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2832 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"8⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4192 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x160,0x164,0x168,0x13c,0x16c,0x7ffb63dccc40,0x7ffb63dccc4c,0x7ffb63dccc589⤵PID:1872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1872,i,286835747441720586,8228389465198071106,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1868 /prefetch:29⤵PID:3628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2072,i,286835747441720586,8228389465198071106,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2120 /prefetch:39⤵PID:228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2272,i,286835747441720586,8228389465198071106,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2284 /prefetch:89⤵PID:2696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3196,i,286835747441720586,8228389465198071106,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3216 /prefetch:19⤵
- Uses browser remote debugging
PID:5316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3336,i,286835747441720586,8228389465198071106,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3324 /prefetch:19⤵
- Uses browser remote debugging
PID:7040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4568,i,286835747441720586,8228389465198071106,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4572 /prefetch:19⤵
- Uses browser remote debugging
PID:5488
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3580
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f8⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:6252
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2832 -s 13928⤵
- Program crash
PID:6308
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009185001\65304f4c96.exe"C:\Users\Admin\AppData\Local\Temp\1009185001\65304f4c96.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4732
-
-
C:\Users\Admin\AppData\Local\Temp\1009186001\816cc41016.exe"C:\Users\Admin\AppData\Local\Temp\1009186001\816cc41016.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3648
-
-
C:\Users\Admin\AppData\Local\Temp\1009187001\52fc7ab26d.exe"C:\Users\Admin\AppData\Local\Temp\1009187001\52fc7ab26d.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T8⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1044
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T8⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3808
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T8⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4192
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T8⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3872
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T8⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4864
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking8⤵PID:3228
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking9⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1200 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1928 -parentBuildID 20240401114208 -prefsHandle 1964 -prefMapHandle 1956 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {56448250-8bd9-416d-89ba-aab775423a11} 1200 "\\.\pipe\gecko-crash-server-pipe.1200" gpu10⤵PID:4348
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2476 -parentBuildID 20240401114208 -prefsHandle 2468 -prefMapHandle 2456 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c9680b22-0639-4153-892a-12a9a327bc01} 1200 "\\.\pipe\gecko-crash-server-pipe.1200" socket10⤵PID:3576
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3196 -childID 1 -isForBrowser -prefsHandle 3200 -prefMapHandle 3212 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1228 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {045c9a8a-acf1-471f-b90b-265fd165e9b9} 1200 "\\.\pipe\gecko-crash-server-pipe.1200" tab10⤵PID:4924
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1324 -childID 2 -isForBrowser -prefsHandle 4140 -prefMapHandle 3888 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1228 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {775f9d9f-f18a-4783-aa9f-829075b5ea65} 1200 "\\.\pipe\gecko-crash-server-pipe.1200" tab10⤵PID:1528
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4640 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4760 -prefMapHandle 4756 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4e6f7019-371b-4d72-8567-fab32c88d500} 1200 "\\.\pipe\gecko-crash-server-pipe.1200" utility10⤵
- Checks processor information in registry
PID:5272
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5264 -childID 3 -isForBrowser -prefsHandle 5192 -prefMapHandle 5204 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1228 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e44f564a-90a5-44c2-b7d7-a507d90d855c} 1200 "\\.\pipe\gecko-crash-server-pipe.1200" tab10⤵PID:6748
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5512 -childID 4 -isForBrowser -prefsHandle 5524 -prefMapHandle 5484 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1228 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {21ca6417-a967-49a7-b490-081fd0ecb230} 1200 "\\.\pipe\gecko-crash-server-pipe.1200" tab10⤵PID:6768
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5272 -childID 5 -isForBrowser -prefsHandle 5396 -prefMapHandle 5472 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1228 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5a3fb536-8229-4761-959d-ccf5cd67d3ff} 1200 "\\.\pipe\gecko-crash-server-pipe.1200" tab10⤵PID:6928
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009188001\05f16a455c.exe"C:\Users\Admin\AppData\Local\Temp\1009188001\05f16a455c.exe"7⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6572
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2T6257.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2T6257.exe5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3396
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3h78O.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3h78O.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4912
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4d921l.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4d921l.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2872
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009146001\Zefoysm.exe"C:\Users\Admin\AppData\Local\Temp\1009146001\Zefoysm.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2192
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4552
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4520
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 5324 -ip 53241⤵PID:5548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 2832 -ip 28321⤵PID:3628
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6952
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5100
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lhmx4teg.default-release\activity-stream.discovery_stream.json.tmp
Filesize27KB
MD522c23a0dca4a78b92ac1f8ec3d824fbd
SHA1ca183296549548c9ab4928fc44a223104cdb77bd
SHA256ef2f49e8084376da03a9580e1d197617a098f1382980108b6696d32737729783
SHA512a93190a6b0ebe4b31bf17f23af05b34137c78c224732a02f13147b85ff71760c287bbf42acfc2cf081df3b7f5115e223729400b56783dce7f475ba4be5812d42
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lhmx4teg.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD53cfa1987d2a6b555993bbb1d13c82e1d
SHA19e3746f162a1743fb776482fe088f895fad0d0bc
SHA256f9911af25aed2c854d14c98926a83e6e3ef3c8c78ff9331fb7a5c8300305fe9f
SHA512d7e5a78fe85c425aeae185d4cb996b8a7c813a68ecc6d5060ad7cd569b01d57ceed6fccb2b63babca6844b8bf1b1cdc5fb6c1db6aa1d9e69aff8afec6840e5e8
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lhmx4teg.default-release\cache2\entries\F8CBD54DDA10F4286A41EC6A537240712D6C2308
Filesize9KB
MD5063793133c8b67d1f873b870074de19e
SHA1503fe4d4f877d0df1f404a19269533c19ae98a65
SHA25618e3c81fcf604495408143e3c19a9192d4bbe1fd2eda3cd53ea7a8b242a7fa17
SHA51288562d4f722c34404d42a17ddde0dbe0becb93da2c52e05587072c07a075d3687c6bd45b8a6bb041e3272d6a9ba8482f8a82097b062404d275c00dec07d00025
-
Filesize
932KB
MD596a7b754ca8e8f35ae9e2b88b9f25658
SHA1ed24a27a726b87c1d5bf1da60527e5801603bb8e
SHA25621d262741b3661b4bf1569f744dc5b5e6119cfa4f0748b9c0fa240f75442cc50
SHA512facb2e44f5a506349710e9b2d29f6664357d057444a6bd994cf3901dee7bea471247b47496cc4480f1ad2fac4b1867117072ea7a0bfa83d55ced4e00dda96745
-
Filesize
211KB
MD5ebbaf388ef32ae0785459ea0e57f0b68
SHA12604c1636a3479667df404117fa3b57d1ac8849f
SHA256dca6babd2e9709e4f2f56946626b7919a84b09a8d4679f34a985eabb255aba20
SHA512d787214d90bb99be76fe4ede63ca50487b80c0da7c190faa4120b845cea42e631e1b59989d7b4fb07f2eb83ca7187890d40a36a07cc40236e76d1d1806aba4e7
-
Filesize
29KB
MD5d0038532ae6cec64be83bc19d0b8f695
SHA117a23380f80068d15ebc014cb2b1748bb45fb5c1
SHA256b412dd132cb21a0d4d7bb622c6fe49f9e6c5c934201815d570db774ac80194f5
SHA512af269471f7093445fb05bc6d6d185f9e48d0666674a3de50c4217757d3fdf39b067668bf2ca37eac91d5cb203c3ce3d4d634661e470d84d12c80c332344503ea
-
Filesize
4.2MB
MD50681851640b935b4a9425e967cac0370
SHA17331dc9b49c56fbd7d2e750d5b181515257619a0
SHA25649961a2d21872034f17208c7367930061eed9d68a33f1859553808e3afdc3fb5
SHA5120ab754dc8dcf2b07bb89d1cb033a9ea0c931396c11f454bc8e77b211cb90b4623df6558e02a01969947126f006639afaba90f98c17a97f1f39638b7c605ffdfc
-
Filesize
900KB
MD59fb4e0bb119c4d11df5d85d5e6ae59e2
SHA16b9c74ccd77c7608f51bc73414542fa598aa969f
SHA256171a0fc521c16921300ebce67d0cef9acaeeea8e6f151610ca5f5015b1fe92da
SHA51238f3ef4f38534036a6714830bfb0516e5a0bf17f0c178ffa46646861fdac3efe5ae59bceb3617a8ba71f872ca11e8aa516d066c3e23eb970099bf74afe33e092
-
Filesize
2.7MB
MD5ff4097a40d0d37512378cf195110f686
SHA13d1155fb8e8e9b7523386c17b861e9e317fdcbfb
SHA2567677a92e1ca020c6be89ef67309db3770899b692f312e7b955168596dedd9e47
SHA512ac99b642130760d2dbd1492437418c225e486e1b8af11febcfeb587003d0ce66cbae4bf78fe30405c04cb4b2fe93ccdb439d64edf0e014ccb5b372adb3b2fe58
-
Filesize
5.5MB
MD5795d9c40e685c3b6f8641239447fc998
SHA1ea93914be5e9a597e0e19659e9f7d3d837d59d58
SHA256d8649f5ccbc85ea304ec61ba13b6f8274e4271ac3e59849a2026d6c8a6c64720
SHA512fe311d16e4dca1c9733ce0c75fa3f8a5e26ab140ccb4081f60d95737cf92f800decb0de73fea25691662443d55f868f45b47daeb4fb535b54d344636f287e63a
-
Filesize
1.7MB
MD5ed7c5463807aadb8f9a29da98de85541
SHA18bbf942e682157725b804fa8eb872e8926fdf27f
SHA2562d819fe3a7fd77aa5e76d170914b0721ad7b71c3694fb93b86420f3103c05aaa
SHA5121e52886cbbd8c7442c83b7be062f350e1d8f55098e3ed3495252d3adca56fa233d237005278762e32da21914b76e971f825ddf6d7b029f9d9d16383ac32483ce
-
Filesize
1.1MB
MD52354e800eefc681a7d60f3b6b28acfd9
SHA110b6a3d9d2283b5f98c9924fa1fca6da79edb720
SHA256d3c21f6c3892f0c444ffb4b06f962caddf68d2c3938bbd399a3056db255007e3
SHA5120395737b77891d8cf7761266c2b3d594deb8e742bd5f12f15f58b2c161c242356b953ebf8cd1f41924a917b2c1332bd2e05ef275efd2419a6134a60729195354
-
Filesize
3.7MB
MD57e2fd8ce59e7d62b1ec9cd96c706f68a
SHA1047dc782414d441faccb85e01b000f7bafa5f424
SHA2564c249182f10837666a354e2516d50681a3d4f8e74c100fca98d33f70e85c5cc3
SHA5122383ad1078047681bc3cf07713c59347a62942dfc3d2e145801327cde902b62b31af6ffc87259925a21d7f2b73f4a43404bd9486fa1941e555417289c4a3bfe1
-
Filesize
1.8MB
MD543b480566333c8bef7d574be4f19c982
SHA112c6de1951ba03cef3303be5013d8b8a32bc2072
SHA2560ca07c7d504a96196b0b91ca59a5133f4fc5f122f9986f2cfa2599cdc60ae74b
SHA5120dc02fa1c712a227b6e82787bbd52ad6a7247b8bd58e89318c99a8570d617a38444d52553a2bee394e25ade98088111259e1ec3e0fbb720158dff63c88b98d93
-
Filesize
1.8MB
MD5d3898add2004689239baf9b29bad208c
SHA11ef5c797efed6085774c5feaf73578e940d5d5a4
SHA256f2192a397429bd4c7e5c13b3832627265eda3774239ca19f66be38911c6612ca
SHA5121c4ee0e00dcfe7a070efc1e687af2b436e019447dd4252d8c0cd2de2448baf9506995af74798f6ff52c44838ff5052a1d83567ce4f3fd07c7659b683aad1f76c
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\AlternateServices.bin
Filesize6KB
MD587769b3807f23806f31f8666322092e0
SHA16119f7fee3197035e1c05dfaba1482bb4b9acc76
SHA256640322cd27a8e237b81a3807cfe1876073912d2f68e8b40f012142b0c8506686
SHA51299d73d572b2135a8cf1e6c25ed4a745ec35adc2cc043d55b2ab13f4c99f2d8e0470d90ec4f2660c7755853bc3bb43b013b38f3e94a5356cc27e5ee6c058257ac
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\AlternateServices.bin
Filesize8KB
MD539c3e4cb2f20dff139be73c1af44c1bb
SHA1b4c721e6a633cfca6781b5fc3aaa30837d573901
SHA256224f3c1510144cdbadfe50ff5034f6747dba17ee2d18d9e4160ce225091b30f3
SHA5127cbc5fe02af401c9223564e27d08d53fb45ed6eb548470ed8f2686f5bed246b1382700113aac12de237e292f066e33de86f65e28ca6c2db545b98c07926afdba
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\AlternateServices.bin
Filesize12KB
MD51e89a2201f755ed00839fdd7ca3ad7c9
SHA12beef80cec1a8797b790d8ef5a768b938ee49d09
SHA2562213f5f2b2733c9ee3dbaa490b188f1991d0f3a66d16198fcdedbb5723461907
SHA5123e8efb1198705d23e905abd7e3ed1254271a8ffe3c73695d938f49f3a48fc2d39effee70c6baa56610ec54a5b74043b10666d38e6e64897790de92de06bdeba0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.bin
Filesize23KB
MD5a03d60c1932660bdfc56be944cbe2718
SHA1e48b8f0b0221c0773460fdd11fe30a4b5829f1f6
SHA2563c103051785bed40e691adff27cbecc46ac0e8e915affcfb20c1b21acb98ba5f
SHA512a0f9bcd4e39b4f0387216b1d7698f46aaba9462423ceb62cac5c4470c5f4f5d2bfbf53a88cef684ad763160fd2eb46b5cf8ee20709828166d404ca14728f98fa
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.bin
Filesize22KB
MD5071d934443fd7517cec7d6ea308ea9b6
SHA1355cfebaf91812c3a3937605b64000ec880504e8
SHA256f5f28813742d7d3c5ac9108e7d83b4ca6d6e13a77a67017a60c1743dad6aa5ec
SHA512530c2576c9ca93c56eb314614aa4f81227eb025e14aba90eeaadde524882559d7979e8b4263944957626a341dc5d010fbcaf9eeca88809fbe5d92f9575870561
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.bin
Filesize24KB
MD5f8a6cfe2172dde532be37645873ba267
SHA1ab78a6d29a3b803b86e0b7cd96055bb39e829e4f
SHA256862c082502bed059c777701e29db8ffe74587a6307d4777d13da8049e83d11c7
SHA5121af7554394397dfcfec91809d96547c541d1410aba9004f5f5e3cfbae19a7b8ad78470ba8c068145d576aa4a1f55919facb1e9e3790300837d91175398797129
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp
Filesize21KB
MD5d397c812ed645d75a563493775a9b096
SHA192fa8412e9ed079196226622dc9722e3e17d3a35
SHA256caa24643fd754d9bf7ac19e09cfced6c23c2080bafb9fc40a400dec4278a80ec
SHA51293a8bf4e97cc447c3e1dbd143a55106da3fa5fb4fdd34facbd35cd8d8fb80d930f6b1baa5b4cea9d32aeb7fca8e9d61f2e0175be2777ab78941a77290f1dd144
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD570a4f22f725a9b393b396ea5e443ed2e
SHA1968f2c69b0fae31c3d876fb5f7d913fb47a698c0
SHA256ebbf0d46ade20811883f5d84beec721b068e27a8a9cc1dc0297c676547a49fa2
SHA512026486f4e8203064c56c9417fc459689ec8eb09c8ac8c3e0ad2f9c7ab64d15d1dd6c5d2cdc93ec9fed97eef0852306258befcbb34d6d40a439e8908e4dff3a80
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD5097618d29a3bd1f8c4f5c284a3315fff
SHA16bf7f1543813d998f3eea98435c747640265b728
SHA2561726d70c5808536e48759a278975f2fb7410653c1d73a62361d11bfc9724383d
SHA5120996405403515e81eb1598121f1dd61920453c71bd14efe819e6897f294a9178c574a751c152b658c2dd42f939909387b608dd7cd87f24e6a1238a50508157d1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD5bbd14721c033230cded955ba43225eac
SHA1cc655c249e3c51c51b42b3230b24743e75c60762
SHA256cab73d8656e7f9805bf8398df4c213587573a5f3aafabdfc96873d4b026edb53
SHA51258d84e41c21b6120c33256cc781adc2f263a6bceccdaf2b8972e1ff9e8b049e49e805bddc21c4e3be1df66d1b9ae5764ba0ccd61bf36d36b430cd6e914112aa4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\pending_pings\07bf4484-130f-4265-8657-9420d5b0e856
Filesize659B
MD5d478dcb8afce0f317c3399118ae4de6d
SHA1731fe4538db9248c2e5aeb8a13d79f6077b548e0
SHA2561564cd9f0e7619876b26089988aad401a10570fb88fc827e0e2a992e5852401e
SHA51202aa4cb953db0da462e8ee002c27f013b1977596eecfb11a76930715c0a069a564b641dfc1c61bc4ee82717882668b72d02f7b64f38ef72b4ac9e0b5dc0e6940
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\pending_pings\ff98f3dc-ef1d-4c4c-90e8-5b572edcd6f0
Filesize982B
MD5ae549e2712f3f8de9f722cc2d5a52928
SHA10dcc582608e99c0e5cc7c62bcfb0aeb1d48918f0
SHA256e4fd07be78767a3ea71c28189964138d72174c8250a598199b87630ef94060c9
SHA5129b5c64552570cb04c10cb19ad72036cf5a34128dd2aa26f9e12456da63c37a22da3b4c182a58ca0f32a30c458e92c8a7711a12bbc572c400913d62b8a9eecf0f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD58ddb5f712dbe6eeda8d9984bdebd1ad1
SHA1cead0f5121527d781a26b2cf58366d7e306175f7
SHA25603c10b6e09402e41d79f69509cf40c1ec964746379b8ea30ecabbc61ff4d0ce9
SHA512add5d7868bf17e0e0633602166a03867684b73575fbac8324391b3ee895af1330bb69bdc5924d29f3b216eee0efee0496d3549c434db4587a3cc06b0cee87fb6
-
Filesize
11KB
MD559a48647fbc923b796286802a93eb511
SHA14f63af59012ba4522eb6ae5a9c69b6dd23d9f904
SHA2566c79c341d8a4b2fc23ec034cef35f6aecea5144cc2ff81705eb74e9557df58d9
SHA5127567c994131e2737898f1e36e7e8e083c8eff7fd6288423240ab12d8cb980fc2f92fc88c4453f7cb4b5cbf743a3c956108a8b0f72f76aaf70178a17fcf65baad
-
Filesize
15KB
MD52284e812596dda723eb80bdb65df42d2
SHA1e648a5849500d77115a846f7a15bf522fb06cb0f
SHA2565612053a4489d9ac4e648e753cbd9beaaa2dfd8bc1fd5827deaeb393dbe3e593
SHA51259d1e32549ddd35130404b8437ad939deb46dec62e19f40c2696890ba926dba7ef48d3171c1f279c565620c6a2dac27696f10dabd89694681a3ef7b0a1d46bd3
-
Filesize
11KB
MD5626fb097125434a3db231b9b1cc0cdc0
SHA198077788728532a27d5ea90365298605429dc58f
SHA256823db88013016129dbdd750c42a2b3910db0ec42bb97ec64502a62f4d9715dd2
SHA51221f11276418f3f3d5c91841d2f844d1b64d21cccbdfac0c431e8273d1849a96b7b0779fdb6d6704b7a24e0c62c94d611ddf78afb4a963510b2a1c039b7571d47
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e