Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28/11/2024, 12:38
Static task
static1
General
-
Target
2df513e280f0f7db763e4c3a2c13e984240991e565f06972feabbbdd4b6901dd.exe
-
Size
7.1MB
-
MD5
40df460f6b8f9bd43677d5205612e43c
-
SHA1
88f398954b15732bf03fb31d81b74876fef4164c
-
SHA256
2df513e280f0f7db763e4c3a2c13e984240991e565f06972feabbbdd4b6901dd
-
SHA512
96f301985eeb5a8d9511343ba8c306b551c4cb9f75ffd98cb8259d60fe98f91216dc93701903f81755dbd3dbcf63f6251086d310c8fadd58939bcf2da35451f0
-
SSDEEP
98304:rqvOLVHbyr6dilKumH9YR4506seVhF5O2l7bQ8hK1o6cm48KV92Ajhm8KokVDmZn:+vO9ymI0tU40rG/4M701rbjVm2
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://preside-comforter.sbs
https://savvy-steereo.sbs
https://copper-replace.sbs
https://record-envyp.sbs
https://slam-whipp.sbs
https://wrench-creter.sbs
https://looky-marked.sbs
https://plastic-mitten.sbs
https://hallowed-noisy.sbs
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4x526k.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" fd7ce4a852.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" fd7ce4a852.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" fd7ce4a852.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" fd7ce4a852.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" fd7ce4a852.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4x526k.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4x526k.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4x526k.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4x526k.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4x526k.exe -
Stealc family
-
Enumerates VirtualBox registry keys 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF 6451cb07ee.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF 09f2fe6dc7.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 14 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1c58u4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2Z9297.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4x526k.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ da2b6b55d7.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5b5f932772.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3v46K.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e0d8809da3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6451cb07ee.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 09f2fe6dc7.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ fd7ce4a852.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 28 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6451cb07ee.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 09f2fe6dc7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2Z9297.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3v46K.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e0d8809da3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5b5f932772.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5b5f932772.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion fd7ce4a852.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4x526k.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion da2b6b55d7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion da2b6b55d7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6451cb07ee.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1c58u4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3v46K.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e0d8809da3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1c58u4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4x526k.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion fd7ce4a852.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2Z9297.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 09f2fe6dc7.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 1c58u4.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation MarkText.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation MarkText.exe -
Executes dropped EXE 23 IoCs
pid Process 4924 d7P91.exe 2204 X9f77.exe 1736 1c58u4.exe 2564 skotes.exe 1140 2Z9297.exe 4180 3v46K.exe 972 4x526k.exe 4448 da2b6b55d7.exe 4768 skotes.exe 3104 skotes.exe 1060 marktext-setup.exe 3684 6451cb07ee.exe 1976 09f2fe6dc7.exe 3648 e0d8809da3.exe 5096 skotes.exe 3768 5b5f932772.exe 1588 f80becfccf.exe 3176 MarkText.exe 2896 MarkText.exe 4784 MarkText.exe 2108 MarkText.exe 4552 MarkText.exe 4644 fd7ce4a852.exe -
Identifies Wine through registry keys 2 TTPs 14 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 09f2fe6dc7.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 1c58u4.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 2Z9297.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 3v46K.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 4x526k.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 5b5f932772.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine da2b6b55d7.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 6451cb07ee.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine e0d8809da3.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine fd7ce4a852.exe -
Loads dropped DLL 23 IoCs
pid Process 1060 marktext-setup.exe 1060 marktext-setup.exe 1060 marktext-setup.exe 1060 marktext-setup.exe 1060 marktext-setup.exe 1060 marktext-setup.exe 1060 marktext-setup.exe 1060 marktext-setup.exe 1060 marktext-setup.exe 1060 marktext-setup.exe 3176 MarkText.exe 3176 MarkText.exe 3176 MarkText.exe 2896 MarkText.exe 3176 MarkText.exe 4784 MarkText.exe 4784 MarkText.exe 4784 MarkText.exe 4784 MarkText.exe 2108 MarkText.exe 4552 MarkText.exe 4552 MarkText.exe 4552 MarkText.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4x526k.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4x526k.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" fd7ce4a852.exe -
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\f80becfccf.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009892001\\f80becfccf.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fd7ce4a852.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009893001\\fd7ce4a852.exe" skotes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2df513e280f0f7db763e4c3a2c13e984240991e565f06972feabbbdd4b6901dd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" d7P91.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" X9f77.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e0d8809da3.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009890001\\e0d8809da3.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5b5f932772.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009891001\\5b5f932772.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000c0000000226f6-481.dat autoit_exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 2972 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 14 IoCs
pid Process 1736 1c58u4.exe 2564 skotes.exe 1140 2Z9297.exe 4180 3v46K.exe 972 4x526k.exe 4448 da2b6b55d7.exe 4768 skotes.exe 3104 skotes.exe 3684 6451cb07ee.exe 1976 09f2fe6dc7.exe 3648 e0d8809da3.exe 5096 skotes.exe 3768 5b5f932772.exe 4644 fd7ce4a852.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1c58u4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1204 4448 WerFault.exe 98 -
System Location Discovery: System Language Discovery 1 TTPs 24 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d7P91.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3v46K.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 09f2fe6dc7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fd7ce4a852.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2df513e280f0f7db763e4c3a2c13e984240991e565f06972feabbbdd4b6901dd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language X9f77.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5b5f932772.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1c58u4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2Z9297.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4x526k.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da2b6b55d7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language marktext-setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6451cb07ee.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e0d8809da3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f80becfccf.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 3640 taskkill.exe 4540 taskkill.exe 3988 taskkill.exe 4688 taskkill.exe 756 taskkill.exe -
Modifies registry class 29 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Markdown\shell\open marktext-setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Markdown\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Programs\\MarkText\\MarkText.exe \"%1\"" marktext-setup.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\.mmd marktext-setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\.mmd\ = "Markdown" marktext-setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\.mdown\Markdown_backup marktext-setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\.mdown\ = "Markdown" marktext-setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\.mdtxt\ = "Markdown" marktext-setup.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\.mdtext marktext-setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\.md\Markdown_backup marktext-setup.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\.mdtxt marktext-setup.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings firefox.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Markdown\ = "Markdown document" marktext-setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Markdown\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Programs\\MarkText\\resources\\md.ico" marktext-setup.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Markdown\shell marktext-setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\.markdown\Markdown_backup marktext-setup.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\.mdown marktext-setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\.mdtext\Markdown_backup marktext-setup.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\.md marktext-setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Markdown\shell\ = "open" marktext-setup.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\.markdown marktext-setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\.md\ = "Markdown" marktext-setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\.mmd\Markdown_backup marktext-setup.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Markdown\DefaultIcon marktext-setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Markdown\shell\open\ = "Open with MarkText" marktext-setup.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Markdown marktext-setup.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Markdown\shell\open\command marktext-setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\.markdown\ = "Markdown" marktext-setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\.mdtxt\Markdown_backup marktext-setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\.mdtext\ = "Markdown" marktext-setup.exe -
Suspicious behavior: EnumeratesProcesses 61 IoCs
pid Process 1736 1c58u4.exe 1736 1c58u4.exe 2564 skotes.exe 2564 skotes.exe 1140 2Z9297.exe 1140 2Z9297.exe 4180 3v46K.exe 4180 3v46K.exe 972 4x526k.exe 972 4x526k.exe 972 4x526k.exe 972 4x526k.exe 4448 da2b6b55d7.exe 4448 da2b6b55d7.exe 4768 skotes.exe 4768 skotes.exe 3104 skotes.exe 3104 skotes.exe 3684 6451cb07ee.exe 3684 6451cb07ee.exe 3684 6451cb07ee.exe 3684 6451cb07ee.exe 3684 6451cb07ee.exe 3684 6451cb07ee.exe 3684 6451cb07ee.exe 3684 6451cb07ee.exe 3684 6451cb07ee.exe 3684 6451cb07ee.exe 1060 marktext-setup.exe 1060 marktext-setup.exe 2972 tasklist.exe 2972 tasklist.exe 1976 09f2fe6dc7.exe 1976 09f2fe6dc7.exe 1976 09f2fe6dc7.exe 1976 09f2fe6dc7.exe 1976 09f2fe6dc7.exe 1976 09f2fe6dc7.exe 1976 09f2fe6dc7.exe 1976 09f2fe6dc7.exe 1976 09f2fe6dc7.exe 1976 09f2fe6dc7.exe 3648 e0d8809da3.exe 3648 e0d8809da3.exe 5096 skotes.exe 5096 skotes.exe 3768 5b5f932772.exe 3768 5b5f932772.exe 1588 f80becfccf.exe 1588 f80becfccf.exe 2108 MarkText.exe 2108 MarkText.exe 4552 MarkText.exe 4552 MarkText.exe 4644 fd7ce4a852.exe 4644 fd7ce4a852.exe 1588 f80becfccf.exe 1588 f80becfccf.exe 4644 fd7ce4a852.exe 4644 fd7ce4a852.exe 4644 fd7ce4a852.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 972 4x526k.exe Token: SeDebugPrivilege 2972 tasklist.exe Token: SeSecurityPrivilege 1060 marktext-setup.exe Token: SeDebugPrivilege 756 taskkill.exe Token: SeDebugPrivilege 3640 taskkill.exe Token: SeDebugPrivilege 4540 taskkill.exe Token: SeDebugPrivilege 3988 taskkill.exe Token: SeDebugPrivilege 4688 taskkill.exe Token: SeDebugPrivilege 2100 firefox.exe Token: SeDebugPrivilege 2100 firefox.exe Token: SeDebugPrivilege 4644 fd7ce4a852.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 1736 1c58u4.exe 1588 f80becfccf.exe 1588 f80becfccf.exe 1588 f80becfccf.exe 1588 f80becfccf.exe 1588 f80becfccf.exe 1588 f80becfccf.exe 1588 f80becfccf.exe 1588 f80becfccf.exe 2100 firefox.exe 2100 firefox.exe 2100 firefox.exe 2100 firefox.exe 2100 firefox.exe 2100 firefox.exe 2100 firefox.exe 2100 firefox.exe 2100 firefox.exe 2100 firefox.exe 2100 firefox.exe 2100 firefox.exe 2100 firefox.exe 2100 firefox.exe 2100 firefox.exe 2100 firefox.exe 2100 firefox.exe 2100 firefox.exe 2100 firefox.exe 2100 firefox.exe 2100 firefox.exe 1588 f80becfccf.exe 1588 f80becfccf.exe 1588 f80becfccf.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 1588 f80becfccf.exe 1588 f80becfccf.exe 1588 f80becfccf.exe 1588 f80becfccf.exe 1588 f80becfccf.exe 1588 f80becfccf.exe 1588 f80becfccf.exe 1588 f80becfccf.exe 2100 firefox.exe 2100 firefox.exe 2100 firefox.exe 2100 firefox.exe 2100 firefox.exe 2100 firefox.exe 2100 firefox.exe 2100 firefox.exe 2100 firefox.exe 2100 firefox.exe 2100 firefox.exe 2100 firefox.exe 2100 firefox.exe 2100 firefox.exe 2100 firefox.exe 2100 firefox.exe 2100 firefox.exe 2100 firefox.exe 2100 firefox.exe 2100 firefox.exe 1588 f80becfccf.exe 1588 f80becfccf.exe 1588 f80becfccf.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2100 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4412 wrote to memory of 4924 4412 2df513e280f0f7db763e4c3a2c13e984240991e565f06972feabbbdd4b6901dd.exe 83 PID 4412 wrote to memory of 4924 4412 2df513e280f0f7db763e4c3a2c13e984240991e565f06972feabbbdd4b6901dd.exe 83 PID 4412 wrote to memory of 4924 4412 2df513e280f0f7db763e4c3a2c13e984240991e565f06972feabbbdd4b6901dd.exe 83 PID 4924 wrote to memory of 2204 4924 d7P91.exe 84 PID 4924 wrote to memory of 2204 4924 d7P91.exe 84 PID 4924 wrote to memory of 2204 4924 d7P91.exe 84 PID 2204 wrote to memory of 1736 2204 X9f77.exe 85 PID 2204 wrote to memory of 1736 2204 X9f77.exe 85 PID 2204 wrote to memory of 1736 2204 X9f77.exe 85 PID 1736 wrote to memory of 2564 1736 1c58u4.exe 86 PID 1736 wrote to memory of 2564 1736 1c58u4.exe 86 PID 1736 wrote to memory of 2564 1736 1c58u4.exe 86 PID 2204 wrote to memory of 1140 2204 X9f77.exe 87 PID 2204 wrote to memory of 1140 2204 X9f77.exe 87 PID 2204 wrote to memory of 1140 2204 X9f77.exe 87 PID 4924 wrote to memory of 4180 4924 d7P91.exe 94 PID 4924 wrote to memory of 4180 4924 d7P91.exe 94 PID 4924 wrote to memory of 4180 4924 d7P91.exe 94 PID 4412 wrote to memory of 972 4412 2df513e280f0f7db763e4c3a2c13e984240991e565f06972feabbbdd4b6901dd.exe 95 PID 4412 wrote to memory of 972 4412 2df513e280f0f7db763e4c3a2c13e984240991e565f06972feabbbdd4b6901dd.exe 95 PID 4412 wrote to memory of 972 4412 2df513e280f0f7db763e4c3a2c13e984240991e565f06972feabbbdd4b6901dd.exe 95 PID 2564 wrote to memory of 4448 2564 skotes.exe 98 PID 2564 wrote to memory of 4448 2564 skotes.exe 98 PID 2564 wrote to memory of 4448 2564 skotes.exe 98 PID 2564 wrote to memory of 1060 2564 skotes.exe 115 PID 2564 wrote to memory of 1060 2564 skotes.exe 115 PID 2564 wrote to memory of 1060 2564 skotes.exe 115 PID 2564 wrote to memory of 3684 2564 skotes.exe 116 PID 2564 wrote to memory of 3684 2564 skotes.exe 116 PID 2564 wrote to memory of 3684 2564 skotes.exe 116 PID 1060 wrote to memory of 2580 1060 marktext-setup.exe 117 PID 1060 wrote to memory of 2580 1060 marktext-setup.exe 117 PID 1060 wrote to memory of 2580 1060 marktext-setup.exe 117 PID 2580 wrote to memory of 2972 2580 cmd.exe 119 PID 2580 wrote to memory of 2972 2580 cmd.exe 119 PID 2580 wrote to memory of 2972 2580 cmd.exe 119 PID 2580 wrote to memory of 2352 2580 cmd.exe 120 PID 2580 wrote to memory of 2352 2580 cmd.exe 120 PID 2580 wrote to memory of 2352 2580 cmd.exe 120 PID 2564 wrote to memory of 1976 2564 skotes.exe 123 PID 2564 wrote to memory of 1976 2564 skotes.exe 123 PID 2564 wrote to memory of 1976 2564 skotes.exe 123 PID 2564 wrote to memory of 3648 2564 skotes.exe 124 PID 2564 wrote to memory of 3648 2564 skotes.exe 124 PID 2564 wrote to memory of 3648 2564 skotes.exe 124 PID 2564 wrote to memory of 3768 2564 skotes.exe 128 PID 2564 wrote to memory of 3768 2564 skotes.exe 128 PID 2564 wrote to memory of 3768 2564 skotes.exe 128 PID 2564 wrote to memory of 1588 2564 skotes.exe 129 PID 2564 wrote to memory of 1588 2564 skotes.exe 129 PID 2564 wrote to memory of 1588 2564 skotes.exe 129 PID 1588 wrote to memory of 756 1588 f80becfccf.exe 130 PID 1588 wrote to memory of 756 1588 f80becfccf.exe 130 PID 1588 wrote to memory of 756 1588 f80becfccf.exe 130 PID 3176 wrote to memory of 2896 3176 MarkText.exe 135 PID 3176 wrote to memory of 2896 3176 MarkText.exe 135 PID 1588 wrote to memory of 3640 1588 f80becfccf.exe 136 PID 1588 wrote to memory of 3640 1588 f80becfccf.exe 136 PID 1588 wrote to memory of 3640 1588 f80becfccf.exe 136 PID 3176 wrote to memory of 4784 3176 MarkText.exe 138 PID 3176 wrote to memory of 4784 3176 MarkText.exe 138 PID 3176 wrote to memory of 4784 3176 MarkText.exe 138 PID 3176 wrote to memory of 4784 3176 MarkText.exe 138 PID 3176 wrote to memory of 4784 3176 MarkText.exe 138 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2df513e280f0f7db763e4c3a2c13e984240991e565f06972feabbbdd4b6901dd.exe"C:\Users\Admin\AppData\Local\Temp\2df513e280f0f7db763e4c3a2c13e984240991e565f06972feabbbdd4b6901dd.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d7P91.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d7P91.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\X9f77.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\X9f77.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1c58u4.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1c58u4.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Users\Admin\AppData\Local\Temp\1009881001\da2b6b55d7.exe"C:\Users\Admin\AppData\Local\Temp\1009881001\da2b6b55d7.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4448 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4448 -s 16727⤵
- Program crash
PID:1204
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009882001\marktext-setup.exe"C:\Users\Admin\AppData\Local\Temp\1009882001\marktext-setup.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Windows\SysWOW64\cmd.execmd /c tasklist /FI "USERNAME eq %USERNAME%" /FI "IMAGENAME eq MarkText.exe" | find "MarkText.exe"7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\tasklist.exetasklist /FI "USERNAME eq Admin" /FI "IMAGENAME eq MarkText.exe"8⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2972
-
-
C:\Windows\SysWOW64\find.exefind "MarkText.exe"8⤵
- System Location Discovery: System Language Discovery
PID:2352
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009884001\6451cb07ee.exe"C:\Users\Admin\AppData\Local\Temp\1009884001\6451cb07ee.exe"6⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3684
-
-
C:\Users\Admin\AppData\Local\Temp\1009889001\09f2fe6dc7.exe"C:\Users\Admin\AppData\Local\Temp\1009889001\09f2fe6dc7.exe"6⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1976
-
-
C:\Users\Admin\AppData\Local\Temp\1009890001\e0d8809da3.exe"C:\Users\Admin\AppData\Local\Temp\1009890001\e0d8809da3.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3648
-
-
C:\Users\Admin\AppData\Local\Temp\1009891001\5b5f932772.exe"C:\Users\Admin\AppData\Local\Temp\1009891001\5b5f932772.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3768
-
-
C:\Users\Admin\AppData\Local\Temp\1009892001\f80becfccf.exe"C:\Users\Admin\AppData\Local\Temp\1009892001\f80becfccf.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:756
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3640
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4540
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3988
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4688
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵PID:4456
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2100 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1964 -parentBuildID 20240401114208 -prefsHandle 1880 -prefMapHandle 1872 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e692c449-bf57-4c01-9514-4103837e23dd} 2100 "\\.\pipe\gecko-crash-server-pipe.2100" gpu9⤵PID:5020
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2444 -parentBuildID 20240401114208 -prefsHandle 2436 -prefMapHandle 2432 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9269fcc3-677f-49b8-8eeb-0928aa9ad92c} 2100 "\\.\pipe\gecko-crash-server-pipe.2100" socket9⤵PID:5080
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1348 -childID 1 -isForBrowser -prefsHandle 3164 -prefMapHandle 2832 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1344 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {74584b0d-3741-4eb1-a43d-e9c33eb41bbd} 2100 "\\.\pipe\gecko-crash-server-pipe.2100" tab9⤵PID:4720
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4164 -childID 2 -isForBrowser -prefsHandle 4156 -prefMapHandle 4152 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1344 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {38f00165-83c3-4f4e-824b-8f3b62de069c} 2100 "\\.\pipe\gecko-crash-server-pipe.2100" tab9⤵PID:840
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4912 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4904 -prefMapHandle 4900 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {aa8dbf69-f029-4555-869d-029dc6c6251e} 2100 "\\.\pipe\gecko-crash-server-pipe.2100" utility9⤵
- Checks processor information in registry
PID:6816
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5608 -childID 3 -isForBrowser -prefsHandle 5496 -prefMapHandle 5652 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1344 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e2e4a531-edb2-4d34-a1c8-cf7553b721d2} 2100 "\\.\pipe\gecko-crash-server-pipe.2100" tab9⤵PID:5796
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5312 -childID 4 -isForBrowser -prefsHandle 5044 -prefMapHandle 5472 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1344 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2029b3f6-76e2-408e-b905-4ccc319a366c} 2100 "\\.\pipe\gecko-crash-server-pipe.2100" tab9⤵PID:5840
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6060 -childID 5 -isForBrowser -prefsHandle 6052 -prefMapHandle 6048 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1344 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c5aa352f-62f0-4b58-afab-9d9d4b741de5} 2100 "\\.\pipe\gecko-crash-server-pipe.2100" tab9⤵PID:5852
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009893001\fd7ce4a852.exe"C:\Users\Admin\AppData\Local\Temp\1009893001\fd7ce4a852.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4644
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2Z9297.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2Z9297.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1140
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3v46K.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3v46K.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4180
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4x526k.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4x526k.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:972
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4768
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4448 -ip 44481⤵PID:4868
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3104
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5096
-
C:\Users\Admin\AppData\Local\Programs\MarkText\MarkText.exe"C:\Users\Admin\AppData\Local\Programs\MarkText\MarkText.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3176 -
C:\Users\Admin\AppData\Local\Programs\MarkText\MarkText.exeC:\Users\Admin\AppData\Local\Programs\MarkText\MarkText.exe --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Roaming\marktext /prefetch:7 --no-rate-limit --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Roaming\marktext\Crashpad --url=http://0.0.0.0/ --annotation=_companyName=marktext --annotation=_productName=marktext --annotation=_version=0.17.1 --annotation=prod=Electron --annotation=ver=15.4.0 --initial-client-data=0x468,0x470,0x474,0x444,0x478,0x7ff717ce4730,0x7ff717ce4740,0x7ff717ce47502⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2896
-
-
C:\Users\Admin\AppData\Local\Programs\MarkText\MarkText.exe"C:\Users\Admin\AppData\Local\Programs\MarkText\MarkText.exe" --type=gpu-process --field-trial-handle=1704,12302096962988457440,8946573156822526280,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --user-data-dir="C:\Users\Admin\AppData\Roaming\marktext" --gpu-preferences=UAAAAAAAAADgAAAIAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1720 /prefetch:22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4784
-
-
C:\Users\Admin\AppData\Local\Programs\MarkText\MarkText.exe"C:\Users\Admin\AppData\Local\Programs\MarkText\MarkText.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1704,12302096962988457440,8946573156822526280,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\marktext" --mojo-platform-channel-handle=2184 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2108
-
-
C:\Users\Admin\AppData\Local\Programs\MarkText\MarkText.exe"C:\Users\Admin\AppData\Local\Programs\MarkText\MarkText.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\marktext" --app-user-model-id=electron.app.MarkText --app-path="C:\Users\Admin\AppData\Local\Programs\MarkText\resources\app.asar" --no-sandbox --no-zygote --field-trial-handle=1704,12302096962988457440,8946573156822526280,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2612 /prefetch:12⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:4552
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1632
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ws2kncw.default-release\activity-stream.discovery_stream.json
Filesize19KB
MD54b675f54e9c749f9a374eb83e4278b01
SHA1d5329a4f2ae3116af3b8a2352798b1eb5a1e5008
SHA2560496f4c4dfb716e86a9e646bd9ac14fa848d23b9deaeeb5137b2be53c8061808
SHA512b28696b04e48b319655f2f81cd744413fd1e3cf1ee85a80b8fc4f44d2e1eab276f92b6c5d45267a5d745aa933e78bf51b6cf467ee7448af363668cc805550ed8
-
Filesize
138KB
MD50fd0a948532d8c353c7227ae69ed7800
SHA1c6679bfb70a212b6bc570cbdf3685946f8f9464c
SHA25669a3916ed3a28cd5467b32474a3da1c639d059abbe78525a3466aa8b24c722bf
SHA5120ee0d16ed2afd7ebd405dbe372c58fd3a38bb2074abc384f2c534545e62dfe26986b16df1266c5807a373e296fe810554c480b5175218192ffacd6942e3e2b27
-
Filesize
202KB
MD51014a2ee8ee705c5a1a56cda9a8e72ee
SHA15492561fb293955f30e95a5f3413a14bca512c30
SHA256ed8afe63f5fc494fd00727e665f7f281600b09b4f4690fa15053a252754e9d57
SHA512ac414855c2c1d6f17a898418a76cce49ad025d24c90c30e71ad966e0fd6b7286acf456e9f5a6636fd16368bc1a0e8b90031e9df439b3c7cd5e1e18b24a32c508
-
Filesize
2.6MB
MD55ea2d76397b15c93389259dac0662b71
SHA1da812692d8982ef45b31480c9eac0990bd4c3631
SHA256e097e446a3295659d56828fbb3b566114d374956563ef0bc2ba204289bb39988
SHA512cee60c1a5044fc8b03ff5cc402ddc70d9ab3c0bd894ad99da629aeecc6b1a7d3708b500103d31c72332d1e4c6535c30d7140096d311189bbc7392941d6eaac18
-
Filesize
9.7MB
MD5224ba45e00bbbb237b34f0facbb550bf
SHA11b0f81da88149d9c610a8edf55f8f12a87ca67de
SHA2568dee674ccd2387c14f01b746779c104e383d57b36c2bdc8e419c470a3d5ffadc
SHA512c04d271288dd2eff89d91e31829586706eba95ffbab0b75c2d202a4037e66a4e2205e8a37ecf15116302c51239b1826064ed4670a3346439470b260aba0ea784
-
Filesize
95KB
MD5214e2b52108bbde227209a00664d30a5
SHA1e2ac97090a3935c8aa7aa466e87b67216284b150
SHA2561673652b703771ef352123869e86130c9cb7c027987753313b4c555a52992bab
SHA5129029402daea1cbe0790f9d53adc6940c1e483930cf24b3a130a42d6f2682f7c2d6833f2cd52f2417009c3655fed6a648b42659729af3c745eaa6c5e8e2b5bb9e
-
Filesize
5.6MB
MD5f616d69f6e582582930d06c5c18f0f70
SHA1fde8e2653f2a5317492105bcabeb3565faaf74de
SHA256bba807d7822c4317fd097da4a442b4206cb940d077cc127c42c1e29cf72fa855
SHA512492e678860f240a62094f696a5e50f408f881c903fce655e18ac6450e3b88befde56778c7ffd20f22561fef07671f6c2f7463ffdd8a17fa2c82e072aee736016
-
C:\Users\Admin\AppData\Local\Programs\MarkText\resources\app.asar.unpacked\node_modules\ced\build\Release\ced.node
Filesize955KB
MD552e4b307a01a0be4f68182e1122b495e
SHA156d8be9b55a5fd3dd6c2c50a70970528be1bee74
SHA2564e689695898af1fbec34f9a178743485be6d76fa98a5b9e3124112e828a30f73
SHA512e6eb94ed438b9f2b878f7047694f2da8c93af824825e941e5ca51360d2bd6ce31aa15231cf30429e2b5877f201b3f74b62cee67b74a190ec6541bf72cfc095cf
-
C:\Users\Admin\AppData\Local\Programs\MarkText\resources\app.asar.unpacked\node_modules\keytar\build\Release\keytar.node
Filesize693KB
MD5776a06934bbc0b9bdee1081b9b813c47
SHA1769717f3e8a991ac721546d5e2f736af344ee6fb
SHA2569445e7925fcff2eb4e92a7447e6be984cd2834a50ab9629a24d0754c45577b7b
SHA512d2de52758de3ff7453c5af941ec4c3062bab8e3e06aeadb939816cd49ad046cf8d5c3fd30c8a8286a1825ae3df8ef4b650d9819c914d778a10ff2e43b931c906
-
C:\Users\Admin\AppData\Local\Programs\MarkText\resources\app.asar.unpacked\node_modules\native-keymap\build\Release\keymapping.node
Filesize667KB
MD5c3bc5d9493a2727c5f8045f49a75c43a
SHA1df56e8eabb8919d8d7c3ece3f677f7ecb68d635d
SHA256c7700b16136096b88d6c75c5a5466cf303d9bc62be6550abba383b9bfe14d04b
SHA51294a007269d1d7c897282998dd795c6400052d36a66f7d1af235604e7893966d0f606af5cf9e720511dd8b3a1f3a9827f5c812d5e5365d41de9588fb24468d8b2
-
Filesize
102KB
MD52fcb7d6381c2e83b1b5aced2def8ba44
SHA184256dfdb7578a26325ba09dffbd94850b4f8367
SHA256afdb3e0adb95c8c256ce49dbb7d4b01818fa00cd7464cec8ccecf0a7cc6b5d4d
SHA5122efe31a0f68e350e82f7d819e4cf42623e9d77ef9d60a0a9c681e1118ed4e94182506d32ab4dd49d39a839466bd2ec0c6b6d088176763672fd1c9f3b43dca532
-
Filesize
160KB
MD589f5b9dc2c1eccfce7c3681b8066125f
SHA1273175d93ae554da7f63a6475426a6515d0c8cd1
SHA2567f148fb442066d6904f774ec588e667d82f237523cf62c10fbb4240d30d2de91
SHA512469a87f53b5815c5d091cc87e3845e56fe45115efba4c48efc28064283e966f9e106103038f1c13650da43e64fa6b89fd0535338ae5b4f102e75160998fd1d61
-
Filesize
1.9MB
MD5b2d9e9b305c92045dfdf886cf0287182
SHA1f983caca99ef85aae37d6fa602bab335f99c91dc
SHA256ae564d1f04bda2b085436a00ff9a1a210360748e313994297cb4718b11e9bf92
SHA512cdfc38b48f730a258381a83a9eaaa9bee38dbce95ac97fe60d0ded1419b288dba9f779796af4342d6fced67f7cd6b01568fa4e4f6f4115ee8351d84ad0bcae13
-
Filesize
4.3MB
MD52ba6fe9428da32103bb44c955939208d
SHA1145b071306f5ad32a9385ff9f89bae6a1ec968e9
SHA2561d64908fcbd9560615576da2b9b41ce76fafb939a0f04f559301a1946db4e936
SHA512044e8a36a5e03c9c406a4b3f2fdcd3057412875e1ebd4456aeb257bf622570826c665206d0ac5468ee6bf5b5642910a3c41a08cfdd7fc9c711561d31322854f0
-
Filesize
4.2MB
MD50b55af827f58acea8620d659bd36e403
SHA1b4003822554e2fe1692c70015008117e568fee63
SHA2562079c5692d574fe0be41b7493a7dd3b455d2ab439ea7f0becc49c6584261e396
SHA512580b484dd3828a932966668d797c5931c2b7cee6695008e853cdd657f43da867ba25ee2ac43b1193750a3028c09c875e75cbb8c1b6866994ebb8a06508d7ac95
-
Filesize
1.8MB
MD5d1675a39609d5cd41c268e70711c7ee5
SHA11c2ce4df65dd63ea4f9974ff4f211865f622636f
SHA25674e0ddd212fdca922fdf9a3221d849201216b6155e23fb0ff0ffb14d23082fd8
SHA5128bd077e975ec9e75f908017cfbe7d9b97d65a2ec6627ca88c3d95856200b9c938a423b82461ed7a501031553290f54c8837b0114594e5b26fa758c86c55f2de6
-
Filesize
1.7MB
MD545a44e016967a33a277601951d2b5e0d
SHA1b8597c8004c973d34b1c3a72d93525b53ae28f9e
SHA256549d3d44e4c8d9d5af2df736001d57a5794e0ef9428ae90fe54a574739356435
SHA5127a9fdd3988ad301076e3bfe1a995d0359f29cf3377b59d7e3a0738cf2207066e0a9784eb113e13c7e3d2e50f97381bbc1ae84d4f1c8d355ff509067a7eb8766e
-
Filesize
900KB
MD5e95da9c734f70679a829c932bcc05884
SHA15e4b62499d9210732679c2d2c0c861f95d6c57b4
SHA256cf8d0ac7e1d03c2bcbee68404434c91f160e5b429ef870fdc1a8b26d9ba1cc96
SHA51253722efca75ba3447d74b2858c35b695ef4c585d3261814ced98702e7eef950b9d6889a22514af2d2ecb6c5b612fcc42e73da3b2ac49571a19d5cb2406229968
-
Filesize
2.6MB
MD52b03b480ec8647afe04d151fcb12ee99
SHA1a1c3a8992aefbdc1b98275419e2971cdf306ecbb
SHA2561641d8934363108f30946bdd68dbed807afa8a16c11b0908857ac6ae7015313e
SHA5120d4ff2dbdef1192b1b536453ef9cb1a7d65769b05064d2f9ec3a159185bc370f3e12d238b1240e344c51f2f5e19899a4cb40110733469e5c1e94658f60566856
-
Filesize
2.7MB
MD5fe6b345ced53686b16f87f834af9eb17
SHA14d70ba2e5f890c6b3e5b723c3de82fa14fb0b13a
SHA256172a34ccd02e38fc58a929884c68c1b51e9d995901cc6128538a04792a7d06ae
SHA51263f38c5e6b0a84cfe9818e5bab77452b7b485b699d55d7e15b29fdcabd3d60ea00845f77318440b1c9b6daa6edd4103cb10bd21887d0029239b81ea680fe150f
-
Filesize
5.5MB
MD5102d6abfebb1bce647e8cc6869061feb
SHA18c593bb304cbe83bad7bc9e964f2d524f6f70617
SHA256293d3027a3e112bf0f2d8f270ce6d668349c97595c4bca5ea800a1be5b625957
SHA512789be7787611f504d1e8b126f2ed9c38dc4e6416c971cf704cfee71a87f4ac02a6bdc5f239656da893eaf702486b3d6426901a392fd002d073d995599e4fe9eb
-
Filesize
1.7MB
MD5eff725edfb37ab797a338efab7f09c76
SHA19a1d9acc84b66da5111b21dd37b27d4d3d505a8e
SHA256f5310d2651b5565f1bdf48d30b6ed328e4e831914e03945a0981a4b990b12ade
SHA51245fc7cc9de1a00303b9c33f1df57940cedd77e849937a3c11a6888b968b66af259662551b9c5433747a84e5b6eb0cefd6acd5385ef13b2bbf2854c934fafbb3d
-
Filesize
3.7MB
MD588fefb9aebb96ec822e07ed2c4987004
SHA1b2aea74b9bcd7c6401cb25003894f377f5175816
SHA2563144a0bef23db5cc5efe30ee83522f8f9e3dc7d2d83bcdc4d38db08fc5b34ab7
SHA5127d18d4c404f68d7933882c676471e9e49e09dbf7a58bdb030e3efcfca861dac76950677cc2320baab5056281c95931f66ca245908b7dccd6a68b005d7ec00a26
-
Filesize
1.8MB
MD5a93b02d857db3b12c32bd765b83825ab
SHA1137f12047a081e6581e1d1a83c939d98514c3ff3
SHA256553620b236b58004ed19556a8e380ea9c17f542d16986f0c88e9e7efc64670fa
SHA512aab2bfd4090c77b87784d0110f5ee2dd24554fada9bdf9c2e8e08ff01a9025f5d8a7dfa2d4b89bf35cb037c162292a04f1084b87727b1bd201a9b5ab1b367bcd
-
Filesize
1.8MB
MD5d4aadd87af5fd4945bcbc76ff3d44e06
SHA155022b47287c2adef01bf8a5de17d320e3a507df
SHA256d9afff60a7ef435234176904e6490409c99acd991a9cafe856f59b7e2064b486
SHA512a89a6d0667d78e02b40f6e20868e7142a1c0866121daf22c1a686264b263b1467e1b4d377266d8a701ea93433fa0cda36307b0eba452e4c5a66c7a76ccdf7984
-
Filesize
100KB
MD5c6a6e03f77c313b267498515488c5740
SHA13d49fc2784b9450962ed6b82b46e9c3c957d7c15
SHA256b72e9013a6204e9f01076dc38dabbf30870d44dfc66962adbf73619d4331601e
SHA5129870c5879f7b72836805088079ad5bbafcb59fc3d9127f2160d4ec3d6e88d3cc8ebe5a9f5d20a4720fe6407c1336ef10f33b2b9621bc587e930d4cbacf337803
-
Filesize
12KB
MD50d7ad4f45dc6f5aa87f606d0331c6901
SHA148df0911f0484cbe2a8cdd5362140b63c41ee457
SHA2563eb38ae99653a7dbc724132ee240f6e5c4af4bfe7c01d31d23faf373f9f2eaca
SHA512c07de7308cb54205e8bd703001a7fe4fd7796c9ac1b4bb330c77c872bf712b093645f40b80ce7127531fe6746a5b66e18ea073ab6a644934abed9bb64126fea9
-
Filesize
14KB
MD5adb29e6b186daa765dc750128649b63d
SHA1160cbdc4cb0ac2c142d361df138c537aa7e708c9
SHA2562f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08
SHA512b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada
-
Filesize
3KB
MD51cc7c37b7e0c8cd8bf04b6cc283e1e56
SHA10b9519763be6625bd5abce175dcc59c96d100d4c
SHA2569be85b986ea66a6997dde658abe82b3147ed2a1a3dcb784bb5176f41d22815a6
SHA5127acf7f8e68aa6066b59ca9f2ae2e67997e6b347bc08eb788d2a119b3295c844b5b9606757168e8d2fbd61c2cda367bf80e9e48c9a52c28d5a7a00464bfd2048f
-
Filesize
9KB
MD5466179e1c8ee8a1ff5e4427dbb6c4a01
SHA1eb607467009074278e4bd50c7eab400e95ae48f7
SHA2561e40211af65923c2f4fd02ce021458a7745d28e2f383835e3015e96575632172
SHA5127508a29c722d45297bfb090c8eb49bd1560ef7d4b35413f16a8aed62d3b1030a93d001a09de98c2b9fea9acf062dc99a7278786f4ece222e7436b261d14ca817
-
Filesize
6KB
MD5ec0504e6b8a11d5aad43b296beeb84b2
SHA191b5ce085130c8c7194d66b2439ec9e1c206497c
SHA2565d9ceb1ce5f35aea5f9e5a0c0edeeec04dfefe0c77890c80c70e98209b58b962
SHA5123f918f1b47e8a919cbe51eb17dc30acc8cfc18e743a1bae5b787d0db7d26038dc1210be98bf5ba3be8d6ed896dbbd7ac3d13e66454a98b2a38c7e69dad30bb57
-
Filesize
424KB
MD580e44ce4895304c6a3a831310fbf8cd0
SHA136bd49ae21c460be5753a904b4501f1abca53508
SHA256b393f05e8ff919ef071181050e1873c9a776e1a0ae8329aefff7007d0cadf592
SHA512c8ba7b1f9113ead23e993e74a48c4427ae3562c1f6d9910b2bbe6806c9107cf7d94bc7d204613e4743d0cd869e00dafd4fb54aad1e8adb69c553f3b9e5bc64df
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin
Filesize8KB
MD54b93a69805dd20c1852c05d37d27baed
SHA11e42649f8a0a316d9e58aca392c5c74fefcd8c08
SHA2564c17fa9ffae0921bd715e9c8712dea1559f6acc180e8a649abe1ed52037d18f7
SHA5122948668e1d0b52ad954efbfc15f4db3c9fccb4909623566ff4c826b4e7ded827fdaa5326bddc943b0df52d4087e65e0f322b78616030ce56726192985867acda
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin
Filesize12KB
MD51a7da26a7708fba6224d287834d73f46
SHA1f066097240e9436c5ced49a0fe54498746bf7f93
SHA2569e00cfeaf4d792c7cdf4a4f0059912cb1e3dbf14fbc7a9e0b719c22b1af9213e
SHA512c0c930e6f77b2d485ab7fc1ee80c784ae4b9880b73c96b3bd4c6b831ce68ae3e75f0635d2dc881e9be7104c8aed4e2f1562abe6cbdd4557022e47e50bc07d37e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin
Filesize6KB
MD59b35a3fe774639256dd25a393431cc47
SHA156b7bfe2aadb20c4ac55644658a89dda8aaa32e4
SHA2563c97765f80be88a9076c9c0794ec8fd208249ee883e0561f8b8885cf13a20b6e
SHA5129f2cdb08d8d438f76b9ef7e3f87f4b2604f400eb05f5183978cdbdf3ca144cb125d16aea03399810464de3afc73f2426790d3aa4759b8914db44e01227329ce8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.bin
Filesize23KB
MD5a98fcd29f35206adff9325c41b634575
SHA1e1af09cb810e36387cdcf949e2cfdbb0bee0cfdf
SHA2566344d54b2fd7fc2a84eed7f1cf6eb280a557ffea6b6c80a02c99d3b511225cc1
SHA512b0bed7bc71d662fefd9d6065ea5d440d771350a70748430895c2e992427fe44708309ea543c0fbf52700e17039be353223bc078f7fd56e0996c0ec38b6d442d0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.bin
Filesize5KB
MD5ae220b2051fa949d27f7f2562218c700
SHA149987d885d38ed15e8ebd9629e5f2eb81b711a2b
SHA256452b2789a6d1a11e22eb48e98e5af63c476985b9459abda8d08a43b36b011a24
SHA512ff2bb8abea4e50475a83411395cbc9f3e73baa737b29419d84327ef3df756f7765007ece2a5403ca951613852222c6f90715ba2e293f0cf748234f4cce97bf42
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5d9eb15cf205eec3c05ff20d420d2b560
SHA161f21f9fe53568fa01b8ece9d3ff34c6074e9e56
SHA256a50bfc9cbe2b65e93dac277d04971c80f4b89e7b1ed0d98442a3c91fab255f95
SHA5124e050083c64c441af6de160b1b60007abf0f8c932c248897d1e8571862c9a09d2415c5f1c2313da35c169aac00c3f461a580360720ec4d6659c20ea51109c270
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD516488a58ecafe108d87911e51d54b18f
SHA16adafa62fed5654144257582fad0fc97e89f34eb
SHA256dbe795c772f4283f78098986f476ea754141911c609c80ec41bfdd15edbd66b3
SHA512b5f66bc05eb1a9fc54cbf746dd9d696651686f779b7f4dfdac21b355f734f64cd27b8f1b5e8464ed39ba6f729a50507638f8063e96221cc47979a97330ae96a9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\351bf7eb-97da-4b1b-9e00-8966f5170dab
Filesize982B
MD5eedca65f88daa91ad531f49847d216f9
SHA1b9afbe4d45e2f079d9603dfeacd6cc37354ddeb5
SHA2563755611ba1c58fd737cfc7a2e4f0a72abdbda720c21e10b82bde94f05ed6d381
SHA512e6c5a5454bb7706108d1c1e678037ee582815776de2a36296667da493caf4ad5e22826ab359cfe071033030d4b8e9f32169b7f44b19127ac63b5b693b839fb37
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\472ba98b-2e03-4652-8b95-9276c822e114
Filesize671B
MD5fea248bb1a23cf8c9108b8637f8132fd
SHA1f01a09c140718525f9f28c6801acbbfceb66eb62
SHA256d3cde1f181a7bcea4193518db71ce9f7d29482ae0f242bf87205572142c172b1
SHA512a0432bc8e92f52ffa36e12a3e32808402bbf0fc4544ea37467dd7a4295d29ea604bc8f06c3c35bd20b60bb6fbe7202d5048e8af59b2b5107a7ce2264f6568025
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\5b538e28-6ace-4be3-a6d4-ac8d937ddc93
Filesize26KB
MD534358bfc499ed728efb9874d46b94fc6
SHA132f96676961365b337761347659133bc3abf8b6c
SHA256507d24188a0e31927873fa4fc604b71d615a2273d679d93ec1e6d5028c17afad
SHA5124319357c3f5c2c4c545d4049669c07046ac6e089af3a098595a8227d3286741b86003bba50f8bfc9c1cdd234317b974d1e8434ae3c481dec5fbe8384537c661b
-
Filesize
10KB
MD5570ea7aab417cd4d5d901f67dc04c9ab
SHA13c6f59a82f110e07b89170ac4664f9096e92c2fd
SHA2563dff565819a9f80a79c48224c046b36e4416ad72162cb4b0d1a28008e155fa91
SHA512fd8190883ffde941d1a3488db4036337b750f8e519898adf4032cc66b990031837bfcd5c23557195f162ac7ac22c7964d4c092bdbb9b8ccece72fc2f58723e3f
-
Filesize
10KB
MD5cbb85f0e7a88b2e0108eefa691bdfeba
SHA14c4f9b8496e0d54f37742175839df5b51883fbf1
SHA25635963c3bcdcac15a5aacae52487a280096c5ac36f43175a18411ee03072141bd
SHA5123cd10e59a6e249fd2fb5aeb9a6efa67c4ae2e783ca9e27be88c823880f829c0157652fe628ec40cb322118bf438f4924cf1ba859f00c5b7656ed3054aeb47aab
-
Filesize
40B
MD5c5251eeb607c03294894d3883babf9f1
SHA1c835eaf264fbd8912e5e98728a135ab4c5c0a691
SHA256c1c392073d4fb42caea355497b54237c3d22985fe466da72526d6c4f16e2d429
SHA5122b9493b63074c9f7856163f2984c75615cbade6e5ae5e9555f6054c94ea9a6609762fb5b654e68b7ab1d34d9689e61145f03bdfc54e93c0a1a7ec1596bb8009e
-
Filesize
313B
MD54f43f528f170e1b5f0e5aee16279267a
SHA19a93d4836fa94776c47dae1c1d195a45f6828a9d
SHA256a1576aec7f47d7e3b2176117e8d0d91769582d95f1d26af2765d160a50ed2cc4
SHA512d1a19e0f24be8e8eb26927a9314c8e9aa848c2c46ea3d6d982ba8c5c8044f2747fc8a5d66b4723dde97ba2790bfd8455bf56505d1e836cb1374c2048c820174c
-
Filesize
1KB
MD5f80b68e5edad00533d1e792055d48f59
SHA1d1808a570c4647495637562bcfbfd600c5aec804
SHA256b47e450b379ff4c2837719c5f64cd388528334af1a938f097b0fbed084a690cd
SHA5120689c20f1ebb332e6927b31edc060617d5d2e9870b7b9ba17a9ce5e9d79316bf54843935b0112537c840e311306b6c92472e1eb38e4114af680622056f730550
-
Filesize
1KB
MD52c46fd1375a55c1cbf8587b8faf9beea
SHA178e0defdd59467848892b167c2a061475bb780d1
SHA256b47e968c6ceda86f6c544d04d87faf074064457efae079ad04e367de32e019a9
SHA512dc9d22369d5938ab2bca26d83d4e159e65c2c4b114e0f88cce51f3f8efc2307bca8fe9570ed497de9a558cd41c195c7fb72cf2ad139555e90b7cb20d5bb5c3c1