Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-12-2024 23:46
Static task
static1
Behavioral task
behavioral1
Sample
763b24905d097aee3844268d4825c726b1218eae5ff7ea971bb1275301811096.exe
Resource
win7-20240903-en
General
-
Target
763b24905d097aee3844268d4825c726b1218eae5ff7ea971bb1275301811096.exe
-
Size
1.8MB
-
MD5
880d50b201c9a9c42ad4dc0d4eece5a3
-
SHA1
3e71ad87d7184de4b6f1892d06bd74bb89b1f305
-
SHA256
763b24905d097aee3844268d4825c726b1218eae5ff7ea971bb1275301811096
-
SHA512
16cee76e2cb07814363b5c5e8fdbb27f84654d6ab04fda94c1a57b0ba7ce3f2cc9819276193b39dd19572417d016cdafb54013785558dc69bb28cf2df984a068
-
SSDEEP
24576:AiozOM/ROuY6v535CcLbAjjUFoJ0FQuvvBnRPwroDKSVpvhBgdHSqapQsFSWWNfc:EZROuPvznHAfX06uBRfhhSdIn9+fzwB
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
https://ratiomun.cyou/api
https://atten-supporse.biz/api
Extracted
xworm
185.196.8.239:7000
-
Install_directory
%Userprofile%
-
install_file
WindowsUpdaterConf.exe
-
telegram
https://api.telegram.org/bot8070077125:AAEdRIyp1anHye9Y0jcV8uNF6U4mmijN8Pk/sendMessage?chat_id=1818813749
Extracted
stealc
drum
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
gcleaner
92.63.197.221
45.91.200.135
Extracted
lumma
https://se-blurry.biz/api
https://zinc-sneark.biz/api
https://dwell-exclaim.biz/api
https://formy-spill.biz/api
https://covery-mover.biz/api
https://dare-curbys.biz/api
https://print-vexer.biz/api
https://atten-supporse.biz/api
Signatures
-
Amadey family
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/1404-37335-0x0000000000080000-0x000000000009A000-memory.dmp family_xworm -
Gcleaner family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 99c8e6323f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 99c8e6323f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 99c8e6323f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 99c8e6323f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 99c8e6323f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 99c8e6323f.exe -
Stealc family
-
Xworm family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ BhD8htX.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5c703508dc.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d5d006a6f3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 99c8e6323f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dc4bf8d62f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 763b24905d097aee3844268d4825c726b1218eae5ff7ea971bb1275301811096.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4268 powershell.exe 4724 powershell.exe 2840 powershell.exe 1072 powershell.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion BhD8htX.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion BhD8htX.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dc4bf8d62f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5c703508dc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d5d006a6f3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 99c8e6323f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 763b24905d097aee3844268d4825c726b1218eae5ff7ea971bb1275301811096.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5c703508dc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d5d006a6f3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 763b24905d097aee3844268d4825c726b1218eae5ff7ea971bb1275301811096.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 99c8e6323f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dc4bf8d62f.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WindowsUpdaterConf.lnk wL3EGdM.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WindowsUpdaterConf.lnk wL3EGdM.exe -
Executes dropped EXE 13 IoCs
pid Process 2444 skotes.exe 2796 BhD8htX.exe 2872 i1A5m12.exe 1624 i1A5m12.tmp 2284 rafencoder.exe 1948 wL3EGdM.exe 2032 5c703508dc.exe 1404 wL3EGdM.exe 3124 d5d006a6f3.exe 3700 729cde9ec8.exe 3792 99c8e6323f.exe 4852 dc4bf8d62f.exe 4316 WindowsUpdaterConf.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Wine 5c703508dc.exe Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Wine d5d006a6f3.exe Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Wine 99c8e6323f.exe Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Wine dc4bf8d62f.exe Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Wine 763b24905d097aee3844268d4825c726b1218eae5ff7ea971bb1275301811096.exe Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Wine BhD8htX.exe -
Loads dropped DLL 21 IoCs
pid Process 1580 763b24905d097aee3844268d4825c726b1218eae5ff7ea971bb1275301811096.exe 1580 763b24905d097aee3844268d4825c726b1218eae5ff7ea971bb1275301811096.exe 2444 skotes.exe 2444 skotes.exe 2444 skotes.exe 2872 i1A5m12.exe 1624 i1A5m12.tmp 1624 i1A5m12.tmp 1624 i1A5m12.tmp 1624 i1A5m12.tmp 2284 rafencoder.exe 2444 skotes.exe 2444 skotes.exe 1948 wL3EGdM.exe 2444 skotes.exe 2444 skotes.exe 2444 skotes.exe 2444 skotes.exe 1404 wL3EGdM.exe 2444 skotes.exe 2444 skotes.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 99c8e6323f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 99c8e6323f.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsUpdaterConf = "C:\\Users\\Admin\\WindowsUpdaterConf.exe" wL3EGdM.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\5c703508dc.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1012543001\\5c703508dc.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\666999666 = "C:\\Users\\Admin\\AppData\\Local\\wL3EGdM.exe" wL3EGdM.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\d5d006a6f3.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1012544001\\d5d006a6f3.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\729cde9ec8.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1012545001\\729cde9ec8.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\99c8e6323f.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1012546001\\99c8e6323f.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 38 ip-api.com -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0006000000016df8-37368.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 1580 763b24905d097aee3844268d4825c726b1218eae5ff7ea971bb1275301811096.exe 2444 skotes.exe 2796 BhD8htX.exe 2032 5c703508dc.exe 3124 d5d006a6f3.exe 3792 99c8e6323f.exe 4852 dc4bf8d62f.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1948 set thread context of 1404 1948 wL3EGdM.exe 42 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 763b24905d097aee3844268d4825c726b1218eae5ff7ea971bb1275301811096.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 35 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WindowsUpdaterConf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5c703508dc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 729cde9ec8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BhD8htX.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language i1A5m12.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wL3EGdM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 729cde9ec8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 729cde9ec8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 99c8e6323f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dc4bf8d62f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language i1A5m12.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rafencoder.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d5d006a6f3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wL3EGdM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 763b24905d097aee3844268d4825c726b1218eae5ff7ea971bb1275301811096.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks processor information in registry 2 TTPs 12 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2264 timeout.exe -
Kills process with taskkill 10 IoCs
pid Process 4528 taskkill.exe 4644 taskkill.exe 3824 taskkill.exe 4116 taskkill.exe 4376 taskkill.exe 1660 taskkill.exe 4360 taskkill.exe 4480 taskkill.exe 4216 taskkill.exe 4504 taskkill.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_Classes\Local Settings firefox.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 5c703508dc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 BhD8htX.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 BhD8htX.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 190000000100000010000000ba4f3972e7aed9dccdc210db59da13c90300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc251d00000001000000100000008f76b981d528ad4770088245e2031b630b0000000100000012000000440069006700690043006500720074000000140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc35300000001000000230000003021301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703080f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a82000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a BhD8htX.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 5c703508dc.exe -
Runs net.exe
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3404 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1580 763b24905d097aee3844268d4825c726b1218eae5ff7ea971bb1275301811096.exe 2444 skotes.exe 2796 BhD8htX.exe 1624 i1A5m12.tmp 1624 i1A5m12.tmp 1948 wL3EGdM.exe 1948 wL3EGdM.exe 1948 wL3EGdM.exe 1948 wL3EGdM.exe 1948 wL3EGdM.exe 1948 wL3EGdM.exe 1948 wL3EGdM.exe 1948 wL3EGdM.exe 1948 wL3EGdM.exe 1948 wL3EGdM.exe 1948 wL3EGdM.exe 1948 wL3EGdM.exe 1948 wL3EGdM.exe 1948 wL3EGdM.exe 1948 wL3EGdM.exe 1948 wL3EGdM.exe 1948 wL3EGdM.exe 1948 wL3EGdM.exe 1948 wL3EGdM.exe 1948 wL3EGdM.exe 1948 wL3EGdM.exe 1948 wL3EGdM.exe 1948 wL3EGdM.exe 1948 wL3EGdM.exe 1948 wL3EGdM.exe 1948 wL3EGdM.exe 1948 wL3EGdM.exe 1948 wL3EGdM.exe 1948 wL3EGdM.exe 1948 wL3EGdM.exe 1948 wL3EGdM.exe 1948 wL3EGdM.exe 1948 wL3EGdM.exe 1948 wL3EGdM.exe 1948 wL3EGdM.exe 1948 wL3EGdM.exe 1948 wL3EGdM.exe 1948 wL3EGdM.exe 1948 wL3EGdM.exe 1948 wL3EGdM.exe 1948 wL3EGdM.exe 1948 wL3EGdM.exe 1948 wL3EGdM.exe 1948 wL3EGdM.exe 1948 wL3EGdM.exe 1948 wL3EGdM.exe 1948 wL3EGdM.exe 1948 wL3EGdM.exe 1948 wL3EGdM.exe 1948 wL3EGdM.exe 1948 wL3EGdM.exe 1948 wL3EGdM.exe 1948 wL3EGdM.exe 1948 wL3EGdM.exe 1948 wL3EGdM.exe 1948 wL3EGdM.exe 1948 wL3EGdM.exe 1948 wL3EGdM.exe 1948 wL3EGdM.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 1948 wL3EGdM.exe Token: SeDebugPrivilege 1404 wL3EGdM.exe Token: SeDebugPrivilege 3824 taskkill.exe Token: SeDebugPrivilege 4116 taskkill.exe Token: SeDebugPrivilege 4216 taskkill.exe Token: SeDebugPrivilege 4376 taskkill.exe Token: SeDebugPrivilege 4504 taskkill.exe Token: SeDebugPrivilege 4268 powershell.exe Token: SeDebugPrivilege 4724 powershell.exe Token: SeDebugPrivilege 2840 powershell.exe Token: SeDebugPrivilege 1072 powershell.exe Token: SeDebugPrivilege 3792 99c8e6323f.exe Token: SeDebugPrivilege 1404 wL3EGdM.exe Token: SeDebugPrivilege 4652 firefox.exe Token: SeDebugPrivilege 4652 firefox.exe Token: SeDebugPrivilege 1660 taskkill.exe Token: SeDebugPrivilege 4360 taskkill.exe Token: SeDebugPrivilege 4480 taskkill.exe Token: SeDebugPrivilege 4528 taskkill.exe Token: SeDebugPrivilege 4644 taskkill.exe Token: SeDebugPrivilege 3248 firefox.exe Token: SeDebugPrivilege 3248 firefox.exe Token: SeDebugPrivilege 4316 WindowsUpdaterConf.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 1580 763b24905d097aee3844268d4825c726b1218eae5ff7ea971bb1275301811096.exe 1624 i1A5m12.tmp 3700 729cde9ec8.exe 3700 729cde9ec8.exe 3700 729cde9ec8.exe 3700 729cde9ec8.exe 3700 729cde9ec8.exe 3700 729cde9ec8.exe 3700 729cde9ec8.exe 3700 729cde9ec8.exe 3700 729cde9ec8.exe 3700 729cde9ec8.exe 3700 729cde9ec8.exe 4652 firefox.exe 4652 firefox.exe 4652 firefox.exe 4652 firefox.exe 3700 729cde9ec8.exe 3700 729cde9ec8.exe 3700 729cde9ec8.exe 3700 729cde9ec8.exe 3700 729cde9ec8.exe 3700 729cde9ec8.exe 3700 729cde9ec8.exe 3700 729cde9ec8.exe 3700 729cde9ec8.exe 3700 729cde9ec8.exe 3248 firefox.exe 3248 firefox.exe 3248 firefox.exe 3248 firefox.exe 3700 729cde9ec8.exe 3700 729cde9ec8.exe 3700 729cde9ec8.exe 3700 729cde9ec8.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 3700 729cde9ec8.exe 3700 729cde9ec8.exe 3700 729cde9ec8.exe 3700 729cde9ec8.exe 3700 729cde9ec8.exe 3700 729cde9ec8.exe 3700 729cde9ec8.exe 3700 729cde9ec8.exe 3700 729cde9ec8.exe 3700 729cde9ec8.exe 3700 729cde9ec8.exe 4652 firefox.exe 4652 firefox.exe 4652 firefox.exe 3700 729cde9ec8.exe 3700 729cde9ec8.exe 3700 729cde9ec8.exe 3700 729cde9ec8.exe 3700 729cde9ec8.exe 3700 729cde9ec8.exe 3700 729cde9ec8.exe 3700 729cde9ec8.exe 3700 729cde9ec8.exe 3700 729cde9ec8.exe 3248 firefox.exe 3248 firefox.exe 3248 firefox.exe 3700 729cde9ec8.exe 3700 729cde9ec8.exe 3700 729cde9ec8.exe 3700 729cde9ec8.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1404 wL3EGdM.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1580 wrote to memory of 2444 1580 763b24905d097aee3844268d4825c726b1218eae5ff7ea971bb1275301811096.exe 28 PID 1580 wrote to memory of 2444 1580 763b24905d097aee3844268d4825c726b1218eae5ff7ea971bb1275301811096.exe 28 PID 1580 wrote to memory of 2444 1580 763b24905d097aee3844268d4825c726b1218eae5ff7ea971bb1275301811096.exe 28 PID 1580 wrote to memory of 2444 1580 763b24905d097aee3844268d4825c726b1218eae5ff7ea971bb1275301811096.exe 28 PID 2444 wrote to memory of 2796 2444 skotes.exe 30 PID 2444 wrote to memory of 2796 2444 skotes.exe 30 PID 2444 wrote to memory of 2796 2444 skotes.exe 30 PID 2444 wrote to memory of 2796 2444 skotes.exe 30 PID 2444 wrote to memory of 2872 2444 skotes.exe 31 PID 2444 wrote to memory of 2872 2444 skotes.exe 31 PID 2444 wrote to memory of 2872 2444 skotes.exe 31 PID 2444 wrote to memory of 2872 2444 skotes.exe 31 PID 2444 wrote to memory of 2872 2444 skotes.exe 31 PID 2444 wrote to memory of 2872 2444 skotes.exe 31 PID 2444 wrote to memory of 2872 2444 skotes.exe 31 PID 2872 wrote to memory of 1624 2872 i1A5m12.exe 32 PID 2872 wrote to memory of 1624 2872 i1A5m12.exe 32 PID 2872 wrote to memory of 1624 2872 i1A5m12.exe 32 PID 2872 wrote to memory of 1624 2872 i1A5m12.exe 32 PID 2872 wrote to memory of 1624 2872 i1A5m12.exe 32 PID 2872 wrote to memory of 1624 2872 i1A5m12.exe 32 PID 2872 wrote to memory of 1624 2872 i1A5m12.exe 32 PID 1624 wrote to memory of 1264 1624 i1A5m12.tmp 33 PID 1624 wrote to memory of 1264 1624 i1A5m12.tmp 33 PID 1624 wrote to memory of 1264 1624 i1A5m12.tmp 33 PID 1624 wrote to memory of 1264 1624 i1A5m12.tmp 33 PID 1624 wrote to memory of 2284 1624 i1A5m12.tmp 34 PID 1624 wrote to memory of 2284 1624 i1A5m12.tmp 34 PID 1624 wrote to memory of 2284 1624 i1A5m12.tmp 34 PID 1624 wrote to memory of 2284 1624 i1A5m12.tmp 34 PID 1264 wrote to memory of 2196 1264 net.exe 36 PID 1264 wrote to memory of 2196 1264 net.exe 36 PID 1264 wrote to memory of 2196 1264 net.exe 36 PID 1264 wrote to memory of 2196 1264 net.exe 36 PID 2444 wrote to memory of 1948 2444 skotes.exe 37 PID 2444 wrote to memory of 1948 2444 skotes.exe 37 PID 2444 wrote to memory of 1948 2444 skotes.exe 37 PID 2444 wrote to memory of 1948 2444 skotes.exe 37 PID 2444 wrote to memory of 2032 2444 skotes.exe 41 PID 2444 wrote to memory of 2032 2444 skotes.exe 41 PID 2444 wrote to memory of 2032 2444 skotes.exe 41 PID 2444 wrote to memory of 2032 2444 skotes.exe 41 PID 1948 wrote to memory of 1404 1948 wL3EGdM.exe 42 PID 1948 wrote to memory of 1404 1948 wL3EGdM.exe 42 PID 1948 wrote to memory of 1404 1948 wL3EGdM.exe 42 PID 1948 wrote to memory of 1404 1948 wL3EGdM.exe 42 PID 1948 wrote to memory of 1404 1948 wL3EGdM.exe 42 PID 1948 wrote to memory of 1404 1948 wL3EGdM.exe 42 PID 1948 wrote to memory of 1404 1948 wL3EGdM.exe 42 PID 1948 wrote to memory of 1404 1948 wL3EGdM.exe 42 PID 1948 wrote to memory of 1404 1948 wL3EGdM.exe 42 PID 1948 wrote to memory of 3024 1948 wL3EGdM.exe 43 PID 1948 wrote to memory of 3024 1948 wL3EGdM.exe 43 PID 1948 wrote to memory of 3024 1948 wL3EGdM.exe 43 PID 1948 wrote to memory of 3024 1948 wL3EGdM.exe 43 PID 3024 wrote to memory of 2264 3024 cmd.exe 45 PID 3024 wrote to memory of 2264 3024 cmd.exe 45 PID 3024 wrote to memory of 2264 3024 cmd.exe 45 PID 3024 wrote to memory of 2264 3024 cmd.exe 45 PID 2444 wrote to memory of 3124 2444 skotes.exe 46 PID 2444 wrote to memory of 3124 2444 skotes.exe 46 PID 2444 wrote to memory of 3124 2444 skotes.exe 46 PID 2444 wrote to memory of 3124 2444 skotes.exe 46 PID 2444 wrote to memory of 3700 2444 skotes.exe 47 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\763b24905d097aee3844268d4825c726b1218eae5ff7ea971bb1275301811096.exe"C:\Users\Admin\AppData\Local\Temp\763b24905d097aee3844268d4825c726b1218eae5ff7ea971bb1275301811096.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\1012056001\BhD8htX.exe"C:\Users\Admin\AppData\Local\Temp\1012056001\BhD8htX.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:2796
-
-
C:\Users\Admin\AppData\Local\Temp\1012382001\i1A5m12.exe"C:\Users\Admin\AppData\Local\Temp\1012382001\i1A5m12.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\is-JTUCM.tmp\i1A5m12.tmp"C:\Users\Admin\AppData\Local\Temp\is-JTUCM.tmp\i1A5m12.tmp" /SL5="$A014E,3291517,54272,C:\Users\Admin\AppData\Local\Temp\1012382001\i1A5m12.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" pause raf_encoder_12525⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 pause raf_encoder_12526⤵
- System Location Discovery: System Language Discovery
PID:2196
-
-
-
C:\Users\Admin\AppData\Local\RAF Encoder 1.0.1.55\rafencoder.exe"C:\Users\Admin\AppData\Local\RAF Encoder 1.0.1.55\rafencoder.exe" -i5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2284
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1012475001\wL3EGdM.exe"C:\Users\Admin\AppData\Local\Temp\1012475001\wL3EGdM.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\1012475001\wL3EGdM.exe"C:\Users\Admin\AppData\Local\Temp\1012475001\wL3EGdM.exe"4⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1404 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\1012475001\wL3EGdM.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4268
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'wL3EGdM.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4724
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\WindowsUpdaterConf.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2840
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'WindowsUpdaterConf.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1072
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "WindowsUpdaterConf" /tr "C:\Users\Admin\WindowsUpdaterConf.exe"5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3404
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c timeout /t 1 && DEL /f wL3EGdM.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\timeout.exetimeout /t 15⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2264
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1012543001\5c703508dc.exe"C:\Users\Admin\AppData\Local\Temp\1012543001\5c703508dc.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
PID:2032
-
-
C:\Users\Admin\AppData\Local\Temp\1012544001\d5d006a6f3.exe"C:\Users\Admin\AppData\Local\Temp\1012544001\d5d006a6f3.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3124
-
-
C:\Users\Admin\AppData\Local\Temp\1012545001\729cde9ec8.exe"C:\Users\Admin\AppData\Local\Temp\1012545001\729cde9ec8.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3700 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3824
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4116
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4216
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4376
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4504
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:4624
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4652 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4652.0.349509288\1929659985" -parentBuildID 20221007134813 -prefsHandle 1232 -prefMapHandle 1224 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d7d3372c-58f4-43bf-bf28-ec3245bcce31} 4652 "\\.\pipe\gecko-crash-server-pipe.4652" 1308 10adb958 gpu6⤵PID:2184
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4652.1.825392529\1772531664" -parentBuildID 20221007134813 -prefsHandle 1516 -prefMapHandle 1512 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {97eb1cd9-88d1-45a2-a99d-be8fe3c4adfe} 4652 "\\.\pipe\gecko-crash-server-pipe.4652" 1528 f5ef758 socket6⤵PID:844
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4652.2.1568550960\936536854" -childID 1 -isForBrowser -prefsHandle 2108 -prefMapHandle 2104 -prefsLen 21811 -prefMapSize 233444 -jsInitHandle 632 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {46f81c2b-af3f-4c7d-af90-e12396ce9dd8} 4652 "\\.\pipe\gecko-crash-server-pipe.4652" 2120 1a7c3058 tab6⤵PID:3420
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4652.3.1708425591\325765003" -childID 2 -isForBrowser -prefsHandle 2956 -prefMapHandle 2952 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 632 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {91abb853-1477-48c4-9e28-c6c327698d8b} 4652 "\\.\pipe\gecko-crash-server-pipe.4652" 2980 1b99f658 tab6⤵PID:4040
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4652.4.1269107932\2073020251" -childID 3 -isForBrowser -prefsHandle 3604 -prefMapHandle 3628 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 632 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d7206088-89e1-4ae5-845f-5bd45962b186} 4652 "\\.\pipe\gecko-crash-server-pipe.4652" 3608 1a929058 tab6⤵PID:5048
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4652.5.394869159\1212608696" -childID 4 -isForBrowser -prefsHandle 3740 -prefMapHandle 3744 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 632 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c3f4f309-d09e-43fa-969a-e0449783f41b} 4652 "\\.\pipe\gecko-crash-server-pipe.4652" 3728 1a92ab58 tab6⤵PID:5068
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4652.6.1014501320\1084134004" -childID 5 -isForBrowser -prefsHandle 3904 -prefMapHandle 3908 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 632 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {00284bcf-f151-44b9-84ee-2e8c51e84f38} 4652 "\\.\pipe\gecko-crash-server-pipe.4652" 3892 1be3f258 tab6⤵PID:5076
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1660
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4360
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4480
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4528
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4644
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:3092
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3248 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3248.0.59995968\2118497478" -parentBuildID 20221007134813 -prefsHandle 1196 -prefMapHandle 1176 -prefsLen 20904 -prefMapSize 233496 -appDir "C:\Program Files\Mozilla Firefox\browser" - {952c7104-23e3-4089-859c-a060a753e4f5} 3248 "\\.\pipe\gecko-crash-server-pipe.3248" 1308 13df9558 gpu6⤵PID:1860
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3248.1.6884948\435872348" -parentBuildID 20221007134813 -prefsHandle 1460 -prefMapHandle 1456 -prefsLen 21765 -prefMapSize 233496 -appDir "C:\Program Files\Mozilla Firefox\browser" - {2181e757-ab4d-48b6-bb64-ff891916c0e0} 3248 "\\.\pipe\gecko-crash-server-pipe.3248" 1488 41ddc58 socket6⤵PID:2784
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3248.2.2144690180\1799258282" -childID 1 -isForBrowser -prefsHandle 1972 -prefMapHandle 2056 -prefsLen 21803 -prefMapSize 233496 -jsInitHandle 596 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {0fe97a8a-e72a-4935-b6a0-2790656c5f8f} 3248 "\\.\pipe\gecko-crash-server-pipe.3248" 968 1a4bc558 tab6⤵PID:4736
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3248.3.849084737\1720205958" -childID 2 -isForBrowser -prefsHandle 2820 -prefMapHandle 2816 -prefsLen 26216 -prefMapSize 233496 -jsInitHandle 596 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {14aa34e8-8bcb-4c81-834a-2a9a740b5067} 3248 "\\.\pipe\gecko-crash-server-pipe.3248" 2832 e63358 tab6⤵PID:5032
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3248.4.728557705\981758269" -childID 3 -isForBrowser -prefsHandle 3624 -prefMapHandle 3596 -prefsLen 26275 -prefMapSize 233496 -jsInitHandle 596 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d8552c67-9338-4a9a-b9ea-3f7c7b4933bc} 3248 "\\.\pipe\gecko-crash-server-pipe.3248" 3612 19c1c358 tab6⤵PID:1440
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3248.5.393395748\882799854" -childID 4 -isForBrowser -prefsHandle 3704 -prefMapHandle 3708 -prefsLen 26275 -prefMapSize 233496 -jsInitHandle 596 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c96e2abf-d6a0-48d8-a282-74a6d579f05c} 3248 "\\.\pipe\gecko-crash-server-pipe.3248" 3692 1a695358 tab6⤵PID:1664
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3248.6.571481192\622378421" -childID 5 -isForBrowser -prefsHandle 3876 -prefMapHandle 3880 -prefsLen 26275 -prefMapSize 233496 -jsInitHandle 596 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {f23f07e8-6ca0-4c08-b4d5-903547b84a48} 3248 "\\.\pipe\gecko-crash-server-pipe.3248" 3864 21113b58 tab6⤵PID:4112
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1012546001\99c8e6323f.exe"C:\Users\Admin\AppData\Local\Temp\1012546001\99c8e6323f.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3792
-
-
C:\Users\Admin\AppData\Local\Temp\1012547001\dc4bf8d62f.exe"C:\Users\Admin\AppData\Local\Temp\1012547001\dc4bf8d62f.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:4852
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {0A09CED0-711D-4EDB-AB3D-08772CAEFDF6} S-1-5-21-3063565911-2056067323-3330884624-1000:KHBTHJFA\Admin:Interactive:[1]1⤵PID:4136
-
C:\Users\Admin\WindowsUpdaterConf.exeC:\Users\Admin\WindowsUpdaterConf.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4316
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bhg31lui.default-release\activity-stream.discovery_stream.json.tmp
Filesize27KB
MD5a06fd563192aa690f937b71beb6a1d58
SHA13af79e93722dbb1dc7c48c5d585a85cc8fa0326d
SHA25690a7c1dad43c7d6a2a28d5d2dbfa7865d87a212770305c678b1d7cf66413e9a2
SHA512c036eb632f4e63220da95710591f236bd7c25ad696be798648024a06c7565c57c80d27798ae39a6e419d074fd10a52ba0419feabbc676accfacbfc253a29d41d
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bhg31lui.default-release\cache2\entries\6D89348819C8881868053197CA0754F36784BF5F
Filesize14KB
MD53432242a0780d0ada8818c4e00891ef0
SHA1c86c60395d3b9e830b72c01a4f117463a145b436
SHA2568ef106ba955cb8d8e2006585d0ee853b6d0ed2b5654df6f1e0355f499f29e626
SHA51223ef42a35efb5bef6d5ad819fa391e31c97e27dcce863e044e3f91aa061bf2e0eb8ddd6beb8eca758bac409e3fb2c53096b15926d3bcf24dd5739031825cf7c2
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bhg31lui.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
630KB
MD5e477a96c8f2b18d6b5c27bde49c990bf
SHA1e980c9bf41330d1e5bd04556db4646a0210f7409
SHA25616574f51785b0e2fc29c2c61477eb47bb39f714829999511dc8952b43ab17660
SHA512335a86268e7c0e568b1c30981ec644e6cd332e66f96d2551b58a82515316693c1859d87b4f4b7310cf1ac386cee671580fdd999c3bcb23acf2c2282c01c8798c
-
Filesize
1.7MB
MD5ff4cf493ac5f7663d1cfc243e6646eb7
SHA1ff7184eae695580f1e86fac340925c7f01f4de6d
SHA25672a99a945b705fc1c8fa59c3db6810be2aadeaecc34f954f5ab314574002d748
SHA5121eef407d5bfa8b94bb98cb0a64e7c73cb94176507fa924642c6cf21192965ba8856390214379fddf192b88e19377768ead94fb4d393831e47ca230b6b168f14b
-
Filesize
3.4MB
MD53a16d0e4e4522073da3c8a5a9f9e790b
SHA17a42a21a348d2e49c67b426d333a5c354ed2c83e
SHA256ccc4dd64df98c26da462a17a8df9f927d02e202d88ada8cfba92b7bbeb954c3e
SHA5121213c3e077b660afa65133f0b5943bd866f02d736284791dc99ae4d30c6ed7705eb55999cb4a3be1cc0a394111904154bc72a2d0f1fdc453893ecf9a4a25b99a
-
Filesize
3.3MB
MD57823e902900881094372948957825fe1
SHA1297a663f3b64fb9863164d10ac698bef03dd3a0f
SHA25692d36e5fb3fdbf10ad10c7880c40013c2e21b8a49e20720137d2b4851681233f
SHA51260d4ea35cfec5154cfa3cb767de7c839ca8b3987b27599ea218ec1c47f1d111a59f193cd3cfd1266ae384434ae653f1e0a297f7222a2592e529b2b4404dd6238
-
Filesize
612B
MD5e3eb0a1df437f3f97a64aca5952c8ea0
SHA17dd71afcfb14e105e80b0c0d7fce370a28a41f0a
SHA25638ffd4972ae513a0c79a8be4573403edcd709f0f572105362b08ff50cf6de521
SHA51243573b0cbaac6e2e1646e6217d2d10c40ad10b9db1f4492d6740545e793c891b5e39283a082896c0392b88eb319dfa9392421b1c89c094c9ce9f31b53d37ebaf
-
Filesize
1.8MB
MD514553b3e4f83021e14520e0f62f95a24
SHA135f37fc3ed8d53920b96b8485e741097cfcd05ba
SHA256d31671f91056db4b63277269b84841872b047643116fce88f5952393daa22691
SHA5129f1a23fa7632155407bdbe9eb2a21708b241906d817c9eaa8cfef2ca65acf67135d8b8e7249b580f67685ccec9b487b65ff1c48378af6418bc7976393dbfdc90
-
Filesize
4.9MB
MD5ebe3d112a464bca87d0600558998c287
SHA1e24f303f33d3d4bd2afc5bc0392de5f14e4bd72a
SHA25608c78546997ccfbffb833a115f8888ad128e5c4d43bddd9e01e2105132ef0824
SHA512fcfd10bd5c930ec50bfa011752db8a28526994712ecb3b905d2d892099df69dcc90ff881669f5b323b99ae9a19061cb5c8abb86b18fc31012d9b91b653c24bed
-
Filesize
948KB
MD59e7ce696dfdb127b028a0610a441047d
SHA179a7805f957617896fd16ec5d1db102d9809f667
SHA256bcb1df1e3ce692f4e284bf91f1873696933a5f2ffd87ac966b719e492b43d1eb
SHA512b226a736eee638e1ef2dc4dfdb6193b23756b525d665209efc6094ba119ddff3004844b8439034e67d79ded9ddff82369edf6d735f72a0e916763dedfa6d1c0a
-
Filesize
2.6MB
MD510f89bc59dd3ebb89c8437a590abbb97
SHA1cb65670a5597fe2bca2423648b7e8325eedbe112
SHA256252af078fcf7992ce1afa0449ffa8591725bf9c46219b19d85369fdc657c8b00
SHA51260d3cedf0b29d9dfdf0eb030ffa817fb102f72bbe6cc5e105d17cd9ddd355c3e9e4374f10bef70919d033f83b3eb1f311bf868bc922633ba8482a9776c84db5d
-
Filesize
1.9MB
MD589109257f23f068de9f04a3c59df2b15
SHA103ea7063a9d7b54bcdea8f11a990e668d9346121
SHA25674567ee5c75fd4a34c44dc8c75e9f4ea1dcf3c60d6d3fff4e8d8526460e49b10
SHA512b3203b1dbbb28a8f0e69e067c9b48e6a930e05046674f3b7f82a76b4b2ff0f8535150ed46dddbe8421fe4ced283f9edf76e2d15f54c454d43771f4e350655f48
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
689KB
MD5e672d5907f1ce471d9784df64d8a306b
SHA16d094cae150d72b587c5480c15127d7059e16932
SHA2569f9250be71bd6254790a9630990f4560d53995db3d8737b7f49986e3551283e5
SHA5129cf10e997d8d99e6eb2f6ccac00ab365f63e03d96c2e2354fdf67683b85553a60cd9542cfb21cbea468c6a2bda454cde71937c0d21c4b738451b5e2c30690c39
-
Filesize
442KB
MD585430baed3398695717b0263807cf97c
SHA1fffbee923cea216f50fce5d54219a188a5100f41
SHA256a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA51206511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1
-
Filesize
8.0MB
MD5a01c5ecd6108350ae23d2cddf0e77c17
SHA1c6ac28a2cd979f1f9a75d56271821d5ff665e2b6
SHA256345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42
SHA512b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD55818e6a6ae5ef1410797df1c5bca1b5b
SHA10bcf35d0e2a6d7d734271a4b963a4d46b3b88f28
SHA2563d24357c87bfb06c4dd12443794b67debc1d29e43bf4f87d1a083044c1d6b489
SHA512f5df9fc23fddb4116f018877f13ad48cbfbba5da2d479dc83291246f13a9b4a370c326ab4fcea57143069895abbc16038805953c111361c10586ae1e0c104ebf
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhg31lui.default-release\addonStartup.json.lz4
Filesize5KB
MD535860b7440797fdf92b6b343858fae39
SHA162c24f43eedf6e71b226f0159dbbfeecc152f47f
SHA256fa8d0fffa1b53a2ef40a65da9e28fe04dd91f053f4784f542714e60b4290f498
SHA5125ae3d1a8279ae0fdf7954c3cf2279ea9c525e36547c4ed92049f741be6bd46bfef82b40763c7d01e0620dcf356fc9fc45b12be4dce319d4d9b354f6fa15d1a69
-
Filesize
224KB
MD5ecbcbcad492a28e508923c883cf54743
SHA10e8eddb6bd4a2c7af91af96c22bd9c3dcfb8057f
SHA256343cb0db84d9b2c3a9be8996a6ea6e10f17bccf616d9041bedaf5e36ef760d29
SHA51286d367bbde177d634b062dfc1002d6d056ccaf1acc8f6989b502f4409ec351a94b2f3314e430f75fa363d82e935a9c96507131f10b7bf263e872db4cc6b7db9f
-
Filesize
192KB
MD5a060d3f3a17058f1f833235653ebb5e9
SHA198ff18b2f405521a3060e10732fb3d7959487cdc
SHA256e9be3a8d63bb8208d8a5c70c5f880f6b52ba12874059e15f9be3eca11e62feb9
SHA512de547d2e2b5631721ddb03d2bf53510e03a2f2dccc9a7eb93481f328d67834d57d7baef6c6ff20015b160ff7b3d0582cc755c621d1bb0d9d270e563faa4977f2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhg31lui.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD564d55f584da5ccce31b2e5eb46e18338
SHA17f5e1687da72893a474f42efd6b626f9dd1cad01
SHA25665deefdff29c5d72f2ea6947d5c98f46baba854f21f921356862afeaff87645f
SHA5126c14636d15310637de69e3ed80d186e3c8725e3852a4e38a0376c488559584009c617842c37c8f1b7ea745fa0737f9b394d9799dda3cc2fd042b5a6a61e578b7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhg31lui.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD5c41333387e303bba2bdb303f2c9d33be
SHA142704c42b98c362c436bf9750848d63dd580914f
SHA256ffe20b077153baa25327f0d3008be7f9466a366a2ce3a58ec38c9bb8d00424d6
SHA51222c356d95c4ca9e3ece4cc6e6e9ef4672eb77d0d8793cfb4f316afac021a9da248691836bd0467f7989e3e3f136c1b0beabbfea79077cdd2a63b6ee25720a865
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhg31lui.default-release\datareporting\glean\pending_pings\65306131-6080-4794-8ed9-bab32983052a
Filesize656B
MD5df7f4a547666a66f8193af34fe3d3c10
SHA11b101b0a35af15372128cf6c811e0bfc02cc1f11
SHA25646b131a1875a11a62775082f97d66572dc36553d4ed94345a179a2866db825e3
SHA512b9a1e7e917b1e4087791b2d707522ebfd89862cdc751a8d2d81911faccf41da8e1585cf6177e8441d8ba2f739da10cd65fe8b17010cd5eedb0f56ebf70438ddd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhg31lui.default-release\datareporting\glean\pending_pings\bf0ea54c-a9d5-4f62-b6fe-6efed6f89fe1
Filesize593B
MD5682963ac4fbb3112fc7e9067c347b0d5
SHA190b2b4ba9a19036cc209f34ab9f19142cec6a467
SHA25623535de6a3786a4d9dbb9b6a283398846f6ee8c32a7230eb9fd9c3933d777ae8
SHA5120a15071831f32d10131826115cb7f6ca31cd208660ee622aa618e7bba862cb8036e35bba3472b5aef9570199930304b0f49d5edc1ce79e8eb7a91f7eb8705485
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhg31lui.default-release\datareporting\glean\pending_pings\bfff909d-71e7-4259-b592-41671478fcbc
Filesize745B
MD58bf9690e2bfbeeb74510dacb2fe96c37
SHA14781f3f9f45b562b08ee131648d39597f9fa7c9c
SHA256a94a758d5f4e07cd2ed65f94c179af056be248d951776a4c76b8b1b18435fe32
SHA5129b6637f6fe2a7cd673203c6a41fa5d73d33cb170dd01d597fb1170def20e568e233d7a6950ba6b0da56ad19d35c9f4ca6a63c2337aa21a93864b8e7dc8fdc0cd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhg31lui.default-release\datareporting\glean\pending_pings\e9b5da5b-cfde-43ec-995a-0adf9edd7cbc
Filesize11KB
MD52c66861b5ca46c709ade54bafd8bb657
SHA1bfa97ca04985eb6c979ccf130f4d2a3c4b91d213
SHA2565d9aac105e13575c62f80d14bf85aaeea409e35bdcf9f26c1bd91ee8b11648ac
SHA512338df2fa3cd656ddc4ddd85bacf05e2c620dc680c13b3fd9e79323c844eaa1929087540d32fdb9e648a758b0aa05d551c1e7cac8e1b163443bcda2859a7662fd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhg31lui.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll
Filesize997KB
MD5fe3355639648c417e8307c6d051e3e37
SHA1f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA2561ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA5128f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhg31lui.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info
Filesize116B
MD53d33cdc0b3d281e67dd52e14435dd04f
SHA14db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhg31lui.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhg31lui.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json
Filesize372B
MD58be33af717bb1b67fbd61c3f4b807e9e
SHA17cf17656d174d951957ff36810e874a134dd49e0
SHA256e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd
SHA5126125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhg31lui.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll
Filesize11.8MB
MD533bf7b0439480effb9fb212efce87b13
SHA1cee50f2745edc6dc291887b6075ca64d716f495a
SHA2568ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e
SHA512d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhg31lui.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhg31lui.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig
Filesize1KB
MD5937326fead5fd401f6cca9118bd9ade9
SHA14526a57d4ae14ed29b37632c72aef3c408189d91
SHA25668a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81
SHA512b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2
-
Filesize
96KB
MD58ad0c68ab1c1aafa6deeda6b9cefdf9b
SHA18439c4ebcf03666307a7c765defe292a63cd7ebf
SHA256386f1dc20962ed558028aa7cd5db4ce75c40288f99998f3559c263e0a1a2c9d0
SHA5123f62cbda6303f03e03b054dfeaaacb00126c60e4b40a6b433c10c6711782b4c10a7868c7c30e08f629921d240ce9ae2ed9755b6647210f81ed7ee8fd10e1a867
-
Filesize
2.1MB
MD56c869d747be8e16a2d6d85e01d3ba85e
SHA1f85c417bc4b3e0ad935847e6a645adad7d5fa018
SHA25649e5e621ab0509d0c7ec6412824ad964ddb951d9c5d87fa652e488a0a5796d5e
SHA512e22b6d9bcb6e1523c7780b878ed9bd43ba90e3bcf049545e1425325eb5fc9b64ff88cb05e836e68f70f4c22b8caa8d1395f8bfca94f9f4b6d1175e3c5d117473
-
Filesize
6KB
MD51e47cf67a8673534b57c91c641d719eb
SHA1b9e159f36d793c2a28082731952a6331ba83cc81
SHA256c912897d107af803bc5c5df4d86d4a6af589ebde6588509c9a71dffa5c0607e8
SHA512b498f534833a088450d7667ab9bcd8d0b4ab6faca3cc92c7660904d0866f147ccccbeedf9a6f59d805f5c70528ba8886cb5dccdd917c88cb61cf8fc44141d836
-
Filesize
7KB
MD527775846e2a2ed37a18342ff40070af3
SHA10994adcbd7704970496b51d617c3814c877bb06b
SHA256db5d68cea5da316cd49b316fd22971199b8306b2041eb2412827a101e7bb0f13
SHA512a6c1f0a566e3f07cee1736cf1ecac89f494db88a0108c7c78f791a73b3b4900833852f9ae75b663ac9cacb7d765f42a92b4896fbb291dde1e4e074a52e1d1d9b
-
Filesize
7KB
MD57e54021335cbba124b85298e9665bb0d
SHA1b7627dafbe6dabaf3df65c586efffab6f45c736c
SHA256f6b0655d8622aadcc4772b45755face2bbfd4e64c80ce21c9f79cf4816d79c62
SHA512a69d5ce01e1282095194a13e29c4577edb8cb10ce60f603a042b57d45557e92c3536d65bfc691535b8f5782afa03207960e3190c09a79944204376356499b0c6
-
Filesize
6KB
MD5190d4fec2752816f0b407a6318ebe1da
SHA17ace00dc347f77c66969c9896ea25452d5ccc63b
SHA256f9f89ed6746a0175af4cb6d7a4ee2d8384ed5c15e5cc985dbbf7dcfda252826d
SHA5129ac97fce878fe31fa3b88429efdb9646ff8b5fc0ae8d5d90be987383df9c12b441064972b353976faad58d0b0463343afd2c4048fe1aa0471f4be9e4a9096d66
-
Filesize
6KB
MD51887b9bc9a93b1f53641d77076486c82
SHA1cb8b20db90084e0fc6160237a79b6d81228b372f
SHA2568cbb626bd9c6b4ddb9e913effcef2b97ca4acfb70d0586feac30dfdfddf02ab7
SHA5123ac3da85bfffda10e65d7d10aade63350a2d72a4f004b67ebc2e44b6891316b76e1185691be1d7b0738286ac613f9f7a469b80ceff0d28388db221f1176006ac
-
Filesize
64KB
MD5deeced8825e857ead7ba3784966be7be
SHA1e72a09807d97d0aeb8baedd537f2489306e25490
SHA256b9f022442a1506e592bf51284091a8a7fe17580b165d07e70c06fd6827343a54
SHA51201d303232d6481af322137b44fef6c2a584f0643c48bab2836f9fe3193207015da7f7514fe338500ae4469651e3d9618293858ae507e722198a249257677099e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhg31lui.default-release\sessionCheckpoints.json
Filesize90B
MD5c4ab2ee59ca41b6d6a6ea911f35bdc00
SHA15942cd6505fc8a9daba403b082067e1cdefdfbc4
SHA25600ad9799527c3fd21f3a85012565eae817490f3e0d417413bf9567bb5909f6a2
SHA51271ea16900479e6af161e0aad08c8d1e9ded5868a8d848e7647272f3002e2f2013e16382b677abe3c6f17792a26293b9e27ec78e16f00bd24ba3d21072bd1cae2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhg31lui.default-release\sessionCheckpoints.json.tmp
Filesize53B
MD5ea8b62857dfdbd3d0be7d7e4a954ec9a
SHA1b43bc4b3ea206a02ef8f63d5bfad0c96bf2a3b2a
SHA256792955295ae9c382986222c6731c5870bd0e921e7f7e34cc4615f5cd67f225da
SHA512076ee83534f42563046d25086166f82e1a3ec61840c113aec67abe2d8195daa247d827d0c54e7e8f8a1bbf2d082a3763577587e84342ec160ff97905243e6d19
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhg31lui.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD549a508567804a5dff81d3e49f5ff309f
SHA133f36caf656868d6e382e11038885a8dd1574e81
SHA256c9a5026ce9e04a0a2ad823f833587385664981420cb51d6b1fedc304f6979a08
SHA512154fb86cebd180868eaeb0b332914071478a55bead2fde34e8b3c7160def5bf533eff97007f412e5e5ff69ff9667c0938362ff1078f5b8619a4dbcb3683f6d8f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhg31lui.default-release\sessionstore-backups\recovery.jsonlz4
Filesize1KB
MD5cdc5fd7092c93971594e17f50914c174
SHA1e2013162900da74a7be2f391048cf11c819f6e0d
SHA256e0ed8c27b52cd0d72cd00a53684bd0d3cf64b67f9b8f249f1311c0648e26bfd4
SHA51276a7c6bb26460c3114fcbda083065b827406e434229f660c8da5173155fd6a4250615920759c2c5588ba5f3f8a07a6277c8f26a9008d9339cd9ea0941abd1b93
-
Filesize
4KB
MD5e754fbe11ba0e708fa319a0396ff4274
SHA146687e5fe95275f8d9512e64659a7ad985343553
SHA25633f31db8b6798aad9d7752c69ddbf9c4b97621fb924c9171f7f8c4d4e6c59704
SHA512e02fc85d8b3bcc22c33e93dda90993122df5be0dcdff02302577978f47fb202ecb20cfaa899c2c67f4d09c6381b076eae6b2e0af682de10b8df7e187e735bdab
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhg31lui.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize184KB
MD50584fa52a0ba3f20c45d1eabf82a1be0
SHA1b78423b9dde01c545d3da94b871265005c13c856
SHA256d42b41a7f66fb56294218c566a6077276d4bfbfa251cf9d6a0244dd8fc12f3ea
SHA5127ba0e21d1258965e3bc60efafebdefda9ab6765028a318b0de223e37ed4fc5f4c3096bdaf91b631d760f9cb1d7cb94c039d43527fad572a230c339ce95152a22
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhg31lui.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite-wal
Filesize56KB
MD5764104a0957036e16d5ec492b0f750da
SHA1b2a1c11f66063a18a89e4d4c8709a83dcf4813f3
SHA256c199f9bee260d373562e547f320b0d309c811988f305cf31272df35e54a1e441
SHA51260e8a52a07e5343fe3db61b3aa194718d2fe6077cb54410cf204ad2c54e29ab70a88daeaff8b6e14385372d48dac8354d4c4cc5f24116c82572e97f1a754277a
-
Filesize
2.8MB
MD5b466bf1dc60388a22cb73be01ca6bf57
SHA121eb9665e42d6c4a8d9e764627049b2a6e3a69a4
SHA256e5f0f0c3383080fc2702779e3040c490ab022af69a4bc8c61bf9b1f6514ae7ad
SHA5126cb51dae17b3bcef6254ecf6538ecc49cdd53c40c979fd743f49987b28d05c033781b1047dbf25b203b02bf70ce4205dcc1cc5bbea46119cb0e2cd0ce140cbe2
-
Filesize
1.8MB
MD5880d50b201c9a9c42ad4dc0d4eece5a3
SHA13e71ad87d7184de4b6f1892d06bd74bb89b1f305
SHA256763b24905d097aee3844268d4825c726b1218eae5ff7ea971bb1275301811096
SHA51216cee76e2cb07814363b5c5e8fdbb27f84654d6ab04fda94c1a57b0ba7ce3f2cc9819276193b39dd19572417d016cdafb54013785558dc69bb28cf2df984a068
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3