Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-12-2024 21:24
Static task
static1
General
-
Target
a1a647f34c4a8583f720a1042e570cdca073f8303b9245765d49a809d017466c.exe
-
Size
6.9MB
-
MD5
e58c50d1d193f4f718e949fd72e60afa
-
SHA1
6130753cb7e2fffba27e7079a0b44f603e37c611
-
SHA256
a1a647f34c4a8583f720a1042e570cdca073f8303b9245765d49a809d017466c
-
SHA512
b092c6230f7736d0f8308bc73bce8509e9dd029806901557a8a1ac56310fdc2e49a6a5d13c014ef105006ce0c6ec20d4bc2934216bf6fc9803d53feb19072cc5
-
SSDEEP
98304:07u2bgZJJu5WEsXtf5NICKbdyljXB09t4ktMYydmMUFYcRvnoykBs6koSUMT6lMa:WsJJaBEf5KbFxGsFloyX6kvKM
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
https://atten-supporse.biz/api
https://infect-crackle.cyou/api
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
amadey
5.04
397a17
http://89.110.69.103
http://94.156.177.33
-
install_dir
0efeaab28d
-
install_file
Gxtuum.exe
-
strings_key
6dea7a0890c1d404d1b67c90aea6ece4
-
url_paths
/Lv2D7fGdopb/index.php
/b9kdj3s3C0/index.php
Extracted
lumma
https://atten-supporse.biz/api
https://se-blurry.biz/api
https://zinc-sneark.biz/api
https://infect-crackle.cyou/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" e773cc7f4e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" e773cc7f4e.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4s029g.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" e773cc7f4e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4s029g.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4s029g.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4s029g.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" e773cc7f4e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" e773cc7f4e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4s029g.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4s029g.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3t22M.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6b707dcd32.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e773cc7f4e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1Y45c5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2c8286.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4s029g.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7qg0CPF.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e7b7ab29ab.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 22 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4s029g.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e7b7ab29ab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1Y45c5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3t22M.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7qg0CPF.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7qg0CPF.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e773cc7f4e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e773cc7f4e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3t22M.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6b707dcd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e7b7ab29ab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6b707dcd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2c8286.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4s029g.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1Y45c5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2c8286.exe -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 1Y45c5.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation word.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation word.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 7qg0CPF.exe -
Executes dropped EXE 25 IoCs
pid Process 2912 D1L61.exe 2700 L0O43.exe 4636 1Y45c5.exe 1112 skotes.exe 2172 2c8286.exe 4408 qtmPs7h.exe 3772 3t22M.exe 436 4s029g.exe 2424 word.exe 4472 skotes.exe 2340 7qg0CPF.exe 2484 word.exe 4368 word.exe 1068 vector.exe 4544 XfpUz7y.exe 4084 6b707dcd32.exe 4024 e7b7ab29ab.exe 1528 7a42576289.exe 32 skotes.exe 2924 e773cc7f4e.exe 5940 vector.exe 5944 vector.exe 5952 vector.exe 5968 vector.exe 5980 vector.exe -
Identifies Wine through registry keys 2 TTPs 11 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 2c8286.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 6b707dcd32.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine e773cc7f4e.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 1Y45c5.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 3t22M.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 4s029g.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 7qg0CPF.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine e7b7ab29ab.exe -
Loads dropped DLL 1 IoCs
pid Process 2340 7qg0CPF.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4s029g.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4s029g.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" e773cc7f4e.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a1a647f34c4a8583f720a1042e570cdca073f8303b9245765d49a809d017466c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" D1L61.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" L0O43.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\word = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\word.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\6b707dcd32.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013036001\\6b707dcd32.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e7b7ab29ab.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013037001\\e7b7ab29ab.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\7a42576289.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013038001\\7a42576289.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e773cc7f4e.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013039001\\e773cc7f4e.exe" skotes.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 14 IoCs
flow ioc 79 raw.githubusercontent.com 83 raw.githubusercontent.com 88 raw.githubusercontent.com 94 raw.githubusercontent.com 48 raw.githubusercontent.com 81 raw.githubusercontent.com 82 raw.githubusercontent.com 87 raw.githubusercontent.com 90 raw.githubusercontent.com 95 raw.githubusercontent.com 49 raw.githubusercontent.com 84 raw.githubusercontent.com 89 raw.githubusercontent.com 91 raw.githubusercontent.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 52 ip-api.com -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0003000000000731-313.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
pid Process 4636 1Y45c5.exe 1112 skotes.exe 2172 2c8286.exe 436 4s029g.exe 4472 skotes.exe 2340 7qg0CPF.exe 4084 6b707dcd32.exe 4024 e7b7ab29ab.exe 32 skotes.exe 2924 e773cc7f4e.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2424 set thread context of 5116 2424 word.exe 119 PID 1068 set thread context of 5980 1068 vector.exe 171 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1Y45c5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
pid pid_target Process procid_target 4696 2172 WerFault.exe 87 1052 2172 WerFault.exe 87 4144 4084 WerFault.exe 137 6208 5980 WerFault.exe 171 -
System Location Discovery: System Language Discovery 1 TTPs 34 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e773cc7f4e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3t22M.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language word.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language word.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language word.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1a647f34c4a8583f720a1042e570cdca073f8303b9245765d49a809d017466c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1Y45c5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vector.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6b707dcd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D1L61.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qtmPs7h.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 7a42576289.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vector.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language L0O43.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4s029g.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e7b7ab29ab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7a42576289.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 7a42576289.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2c8286.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7qg0CPF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 5 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4664 PING.EXE 4256 cmd.exe 4308 PING.EXE 3776 cmd.exe 4032 PING.EXE -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 7qg0CPF.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 7qg0CPF.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 2140 taskkill.exe 2552 taskkill.exe 3428 taskkill.exe 4420 taskkill.exe 3556 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings firefox.exe -
Runs ping.exe 1 TTPs 3 IoCs
pid Process 4308 PING.EXE 4032 PING.EXE 4664 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4636 1Y45c5.exe 4636 1Y45c5.exe 1112 skotes.exe 1112 skotes.exe 2172 2c8286.exe 2172 2c8286.exe 4408 qtmPs7h.exe 4408 qtmPs7h.exe 4408 qtmPs7h.exe 4408 qtmPs7h.exe 4408 qtmPs7h.exe 4408 qtmPs7h.exe 4408 qtmPs7h.exe 4408 qtmPs7h.exe 4408 qtmPs7h.exe 4408 qtmPs7h.exe 4408 qtmPs7h.exe 4408 qtmPs7h.exe 4408 qtmPs7h.exe 4408 qtmPs7h.exe 4408 qtmPs7h.exe 4408 qtmPs7h.exe 4408 qtmPs7h.exe 4408 qtmPs7h.exe 4408 qtmPs7h.exe 4408 qtmPs7h.exe 4408 qtmPs7h.exe 4408 qtmPs7h.exe 4408 qtmPs7h.exe 4408 qtmPs7h.exe 4408 qtmPs7h.exe 4408 qtmPs7h.exe 436 4s029g.exe 436 4s029g.exe 436 4s029g.exe 436 4s029g.exe 2424 word.exe 2424 word.exe 2424 word.exe 4472 skotes.exe 4472 skotes.exe 2340 7qg0CPF.exe 2340 7qg0CPF.exe 2340 7qg0CPF.exe 2340 7qg0CPF.exe 2340 7qg0CPF.exe 2340 7qg0CPF.exe 2340 7qg0CPF.exe 2340 7qg0CPF.exe 2340 7qg0CPF.exe 2340 7qg0CPF.exe 2340 7qg0CPF.exe 2340 7qg0CPF.exe 2340 7qg0CPF.exe 2340 7qg0CPF.exe 2340 7qg0CPF.exe 2340 7qg0CPF.exe 2340 7qg0CPF.exe 2340 7qg0CPF.exe 2340 7qg0CPF.exe 2340 7qg0CPF.exe 2340 7qg0CPF.exe 2340 7qg0CPF.exe 2340 7qg0CPF.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeDebugPrivilege 4408 qtmPs7h.exe Token: SeDebugPrivilege 436 4s029g.exe Token: SeDebugPrivilege 2424 word.exe Token: SeDebugPrivilege 2340 7qg0CPF.exe Token: SeDebugPrivilege 2484 word.exe Token: SeDebugPrivilege 4368 word.exe Token: SeDebugPrivilege 1068 vector.exe Token: SeDebugPrivilege 2552 taskkill.exe Token: SeDebugPrivilege 3428 taskkill.exe Token: SeDebugPrivilege 4420 taskkill.exe Token: SeDebugPrivilege 3556 taskkill.exe Token: SeDebugPrivilege 2140 taskkill.exe Token: SeDebugPrivilege 3596 firefox.exe Token: SeDebugPrivilege 3596 firefox.exe Token: SeDebugPrivilege 2924 e773cc7f4e.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 4636 1Y45c5.exe 1528 7a42576289.exe 1528 7a42576289.exe 1528 7a42576289.exe 1528 7a42576289.exe 1528 7a42576289.exe 1528 7a42576289.exe 1528 7a42576289.exe 1528 7a42576289.exe 3596 firefox.exe 3596 firefox.exe 3596 firefox.exe 3596 firefox.exe 3596 firefox.exe 3596 firefox.exe 3596 firefox.exe 3596 firefox.exe 3596 firefox.exe 3596 firefox.exe 3596 firefox.exe 3596 firefox.exe 3596 firefox.exe 3596 firefox.exe 3596 firefox.exe 3596 firefox.exe 3596 firefox.exe 3596 firefox.exe 3596 firefox.exe 3596 firefox.exe 3596 firefox.exe 1528 7a42576289.exe 1528 7a42576289.exe 1528 7a42576289.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 1528 7a42576289.exe 1528 7a42576289.exe 1528 7a42576289.exe 1528 7a42576289.exe 1528 7a42576289.exe 1528 7a42576289.exe 1528 7a42576289.exe 1528 7a42576289.exe 3596 firefox.exe 3596 firefox.exe 3596 firefox.exe 3596 firefox.exe 3596 firefox.exe 3596 firefox.exe 3596 firefox.exe 3596 firefox.exe 3596 firefox.exe 3596 firefox.exe 3596 firefox.exe 3596 firefox.exe 3596 firefox.exe 3596 firefox.exe 3596 firefox.exe 3596 firefox.exe 3596 firefox.exe 3596 firefox.exe 3596 firefox.exe 3596 firefox.exe 1528 7a42576289.exe 1528 7a42576289.exe 1528 7a42576289.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3596 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3652 wrote to memory of 2912 3652 a1a647f34c4a8583f720a1042e570cdca073f8303b9245765d49a809d017466c.exe 83 PID 3652 wrote to memory of 2912 3652 a1a647f34c4a8583f720a1042e570cdca073f8303b9245765d49a809d017466c.exe 83 PID 3652 wrote to memory of 2912 3652 a1a647f34c4a8583f720a1042e570cdca073f8303b9245765d49a809d017466c.exe 83 PID 2912 wrote to memory of 2700 2912 D1L61.exe 84 PID 2912 wrote to memory of 2700 2912 D1L61.exe 84 PID 2912 wrote to memory of 2700 2912 D1L61.exe 84 PID 2700 wrote to memory of 4636 2700 L0O43.exe 85 PID 2700 wrote to memory of 4636 2700 L0O43.exe 85 PID 2700 wrote to memory of 4636 2700 L0O43.exe 85 PID 4636 wrote to memory of 1112 4636 1Y45c5.exe 86 PID 4636 wrote to memory of 1112 4636 1Y45c5.exe 86 PID 4636 wrote to memory of 1112 4636 1Y45c5.exe 86 PID 2700 wrote to memory of 2172 2700 L0O43.exe 87 PID 2700 wrote to memory of 2172 2700 L0O43.exe 87 PID 2700 wrote to memory of 2172 2700 L0O43.exe 87 PID 1112 wrote to memory of 4408 1112 skotes.exe 89 PID 1112 wrote to memory of 4408 1112 skotes.exe 89 PID 1112 wrote to memory of 4408 1112 skotes.exe 89 PID 4408 wrote to memory of 4256 4408 qtmPs7h.exe 90 PID 4408 wrote to memory of 4256 4408 qtmPs7h.exe 90 PID 4408 wrote to memory of 4256 4408 qtmPs7h.exe 90 PID 4256 wrote to memory of 4308 4256 cmd.exe 92 PID 4256 wrote to memory of 4308 4256 cmd.exe 92 PID 4256 wrote to memory of 4308 4256 cmd.exe 92 PID 4408 wrote to memory of 3776 4408 qtmPs7h.exe 93 PID 4408 wrote to memory of 3776 4408 qtmPs7h.exe 93 PID 4408 wrote to memory of 3776 4408 qtmPs7h.exe 93 PID 3776 wrote to memory of 4032 3776 cmd.exe 95 PID 3776 wrote to memory of 4032 3776 cmd.exe 95 PID 3776 wrote to memory of 4032 3776 cmd.exe 95 PID 2912 wrote to memory of 3772 2912 D1L61.exe 104 PID 2912 wrote to memory of 3772 2912 D1L61.exe 104 PID 2912 wrote to memory of 3772 2912 D1L61.exe 104 PID 3652 wrote to memory of 436 3652 a1a647f34c4a8583f720a1042e570cdca073f8303b9245765d49a809d017466c.exe 105 PID 3652 wrote to memory of 436 3652 a1a647f34c4a8583f720a1042e570cdca073f8303b9245765d49a809d017466c.exe 105 PID 3652 wrote to memory of 436 3652 a1a647f34c4a8583f720a1042e570cdca073f8303b9245765d49a809d017466c.exe 105 PID 4256 wrote to memory of 4832 4256 cmd.exe 106 PID 4256 wrote to memory of 4832 4256 cmd.exe 106 PID 4256 wrote to memory of 4832 4256 cmd.exe 106 PID 3776 wrote to memory of 4664 3776 cmd.exe 107 PID 3776 wrote to memory of 4664 3776 cmd.exe 107 PID 3776 wrote to memory of 4664 3776 cmd.exe 107 PID 3776 wrote to memory of 2424 3776 cmd.exe 115 PID 3776 wrote to memory of 2424 3776 cmd.exe 115 PID 3776 wrote to memory of 2424 3776 cmd.exe 115 PID 2424 wrote to memory of 5116 2424 word.exe 119 PID 2424 wrote to memory of 5116 2424 word.exe 119 PID 2424 wrote to memory of 5116 2424 word.exe 119 PID 2424 wrote to memory of 5116 2424 word.exe 119 PID 2424 wrote to memory of 5116 2424 word.exe 119 PID 2424 wrote to memory of 5116 2424 word.exe 119 PID 2424 wrote to memory of 5116 2424 word.exe 119 PID 2424 wrote to memory of 5116 2424 word.exe 119 PID 2424 wrote to memory of 5116 2424 word.exe 119 PID 2424 wrote to memory of 5116 2424 word.exe 119 PID 1112 wrote to memory of 2340 1112 skotes.exe 127 PID 1112 wrote to memory of 2340 1112 skotes.exe 127 PID 1112 wrote to memory of 2340 1112 skotes.exe 127 PID 2424 wrote to memory of 2484 2424 word.exe 129 PID 2424 wrote to memory of 2484 2424 word.exe 129 PID 2424 wrote to memory of 2484 2424 word.exe 129 PID 2484 wrote to memory of 4368 2484 word.exe 130 PID 2484 wrote to memory of 4368 2484 word.exe 130 PID 2484 wrote to memory of 4368 2484 word.exe 130 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1a647f34c4a8583f720a1042e570cdca073f8303b9245765d49a809d017466c.exe"C:\Users\Admin\AppData\Local\Temp\a1a647f34c4a8583f720a1042e570cdca073f8303b9245765d49a809d017466c.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\D1L61.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\D1L61.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\L0O43.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\L0O43.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1Y45c5.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1Y45c5.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Users\Admin\AppData\Local\Temp\1012982001\qtmPs7h.exe"C:\Users\Admin\AppData\Local\Temp\1012982001\qtmPs7h.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 9 > nul && REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "word" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\word.exe"7⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 98⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4308
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "word" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\word.exe"8⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4832
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 8 > nul && copy "C:\Users\Admin\AppData\Local\Temp\1012982001\qtmPs7h.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\word.exe" && ping 127.0.0.1 -n 8 > nul && "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\word.exe"7⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:3776 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 88⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4032
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 88⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4664
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\word.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\word.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"9⤵
- System Location Discovery: System Language Discovery
PID:5116 -
C:\Users\Admin\AppData\Local\Temp\10000760101\vector.exe"C:\Users\Admin\AppData\Local\Temp\10000760101\vector.exe"10⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1068 -
C:\Users\Admin\AppData\Local\Temp\10000760101\vector.exe"C:\Users\Admin\AppData\Local\Temp\10000760101\vector.exe"11⤵
- Executes dropped EXE
PID:5940
-
-
C:\Users\Admin\AppData\Local\Temp\10000760101\vector.exe"C:\Users\Admin\AppData\Local\Temp\10000760101\vector.exe"11⤵
- Executes dropped EXE
PID:5944
-
-
C:\Users\Admin\AppData\Local\Temp\10000760101\vector.exe"C:\Users\Admin\AppData\Local\Temp\10000760101\vector.exe"11⤵
- Executes dropped EXE
PID:5952
-
-
C:\Users\Admin\AppData\Local\Temp\10000760101\vector.exe"C:\Users\Admin\AppData\Local\Temp\10000760101\vector.exe"11⤵
- Executes dropped EXE
PID:5968
-
-
C:\Users\Admin\AppData\Local\Temp\10000760101\vector.exe"C:\Users\Admin\AppData\Local\Temp\10000760101\vector.exe"11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5980 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5980 -s 137612⤵
- Program crash
PID:6208
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\word.exe"C:\Users\Admin\AppData\Local\Temp\word.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\word.exe"C:\Users\Admin\AppData\Local\Temp\word.exe"10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4368
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1012992001\7qg0CPF.exe"C:\Users\Admin\AppData\Local\Temp\1012992001\7qg0CPF.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2340 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp7F6C.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp7F6C.tmp.bat7⤵
- System Location Discovery: System Language Discovery
PID:5052
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013035001\XfpUz7y.exe"C:\Users\Admin\AppData\Local\Temp\1013035001\XfpUz7y.exe"6⤵
- Executes dropped EXE
PID:4544
-
-
C:\Users\Admin\AppData\Local\Temp\1013036001\6b707dcd32.exe"C:\Users\Admin\AppData\Local\Temp\1013036001\6b707dcd32.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:4084 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4084 -s 16087⤵
- Program crash
PID:4144
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013037001\e7b7ab29ab.exe"C:\Users\Admin\AppData\Local\Temp\1013037001\e7b7ab29ab.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:4024
-
-
C:\Users\Admin\AppData\Local\Temp\1013038001\7a42576289.exe"C:\Users\Admin\AppData\Local\Temp\1013038001\7a42576289.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1528 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2552
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3428
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4420
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3556
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2140
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵PID:4392
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3596 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2032 -parentBuildID 20240401114208 -prefsHandle 1952 -prefMapHandle 1944 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {39d3866c-05b9-4e59-b378-00fba20ff4c1} 3596 "\\.\pipe\gecko-crash-server-pipe.3596" gpu9⤵PID:3620
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2508 -parentBuildID 20240401114208 -prefsHandle 2484 -prefMapHandle 2472 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {393182f5-271e-4680-b9a7-28f8ae0c5c60} 3596 "\\.\pipe\gecko-crash-server-pipe.3596" socket9⤵PID:4516
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2804 -childID 1 -isForBrowser -prefsHandle 3232 -prefMapHandle 3108 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1280 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7e3941b1-6e55-4a20-a14c-82f1a0655488} 3596 "\\.\pipe\gecko-crash-server-pipe.3596" tab9⤵PID:4188
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4156 -childID 2 -isForBrowser -prefsHandle 3764 -prefMapHandle 3496 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1280 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1c8e164e-aa19-4dac-bd5b-24e292b61ae5} 3596 "\\.\pipe\gecko-crash-server-pipe.3596" tab9⤵PID:3140
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4700 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4692 -prefMapHandle 4732 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c69e0548-6f15-456f-adda-029731f0b4ad} 3596 "\\.\pipe\gecko-crash-server-pipe.3596" utility9⤵
- Checks processor information in registry
PID:5252
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5460 -childID 3 -isForBrowser -prefsHandle 5412 -prefMapHandle 5388 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1280 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4c1f3e33-1155-493d-b25f-8b1083d99821} 3596 "\\.\pipe\gecko-crash-server-pipe.3596" tab9⤵PID:5264
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5600 -childID 4 -isForBrowser -prefsHandle 5680 -prefMapHandle 5676 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1280 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {312d9888-76bc-4d9b-9da8-de6f57133bc4} 3596 "\\.\pipe\gecko-crash-server-pipe.3596" tab9⤵PID:5380
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5820 -childID 5 -isForBrowser -prefsHandle 5584 -prefMapHandle 5588 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1280 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ade963b8-e2a0-45ed-969a-7f2e68d10a09} 3596 "\\.\pipe\gecko-crash-server-pipe.3596" tab9⤵PID:5396
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013039001\e773cc7f4e.exe"C:\Users\Admin\AppData\Local\Temp\1013039001\e773cc7f4e.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2924
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2c8286.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2c8286.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2172 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2172 -s 16485⤵
- Program crash
PID:4696
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2172 -s 16045⤵
- Program crash
PID:1052
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3t22M.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3t22M.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- System Location Discovery: System Language Discovery
PID:3772
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4s029g.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4s029g.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:436
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2172 -ip 21721⤵PID:3080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2172 -ip 21721⤵PID:1696
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4472
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4084 -ip 40841⤵PID:3736
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:32
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 5980 -ip 59801⤵PID:6188
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Query Registry
6Remote System Discovery
1System Information Discovery
4System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57dca233df92b3884663fa5a40db8d49c
SHA1208b8f27b708c4e06ac37f974471cc7b29c29b60
SHA25690c83311e35da0b5f8aa65aa2109745feb68ee9540e863f4ed909872e9c6a84c
SHA512d134b96fd33c79c85407608f76afc5a9f937bff453b1c90727a3ed992006c7d4c8329be6a2b5ba6b11da1a32f7cd60e9bc380be388b586d6cd5c2e6b1f57bd07
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\activity-stream.discovery_stream.json
Filesize19KB
MD515fc9a814747af206dd684127e31f316
SHA1fed5ead2f11a67cdee32d2cb7b815163d5529994
SHA256ba77936749042ba593803451e46ed9040262fb344d1ff8d2fc0dec1c4221e16b
SHA512a785c3eb1b4a3aebbc8f95f29aa5a24ad980154289e12935e9d6b43e8397b5379f50ae77e7c25ec30dce107b9c42796e6b8d57f037588dad9d01ccf29c48f8d7
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD5955704868010a97b41ace6ccd4362211
SHA1c3f97022ab61348a17b6e094f06d0d5672964d63
SHA2569a901d9a4636ad4bd93bea8978136af7e017414127096a44cb3f6cf91e3bef06
SHA5129d04d247b355369b7b13ae0942c2245ca0c15f6255ad2bdaba25505d9ad2d997075c936eb3b32f30b6f50bb6736b7102f2152e0a2c094272dca8f99aa03e304b
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
5.0MB
MD5b183e5ff29a1532a84e5a38983ab9e4e
SHA1230c9cbd2e14598aaf73ae78c85c998a6b923a51
SHA25681a45f430c102365b46c663203ae5708b6befe2848f01efc7b702aff7170c901
SHA51231be2761821fb6bc81a010a3f68fa6901aa5e9768e9c57db53b52e0495c7340abccc9191500aa39540fef159578403e78d2af31ac364b89774d5f359b54c6c1e
-
Filesize
2.5MB
MD5d1e3f88d0caf949d5f1b4bf4efbb95a4
SHA161ffd2589a1965bf9cb874833c4c9b106b3e43e8
SHA256c505f3b2f40b8a68e7cacfe2a9925498ab0f7ef29aa7023bb472597021066b2e
SHA5125d4c43e858371f24ebafb56388a586c081d7b0289a3b039dbb2b011e9864e8e9f5dc7037fcb3e88f4bec4259a09ce5f3ccdae3161b43dff140e0e4ca7bff96c3
-
Filesize
799KB
MD589bd66e4285cb7295300a941964af529
SHA1232d9fee67a3c3652a80e1c1a258f0d789c6a6cf
SHA256a46bf8412717f75bf098966cb1f5074836e78f5699bb5073dcc45d59ca790047
SHA51272d1c8c4b74bacca619a58062441203c6cfea81d064dc1933af7a3cb9758d924b011a6935e8d255aad58159a4ecbb3677cc6a6e80f6daa8b135711195a5c8498
-
Filesize
5.9MB
MD53297554944a2e2892096a8fb14c86164
SHA14b700666815448a1e0f4f389135fddb3612893ec
SHA256e0a9fcd5805e66254aa20f8ddb3bdfca376a858b19222b178cc8893f914a6495
SHA512499aa1679f019e29b4d871a472d24b89adddc68978317f85f095c7278f25f926cbf532c8520c2f468b3942a3e37e9be20aea9f83c68e8b5e0c9adbf69640ad25
-
Filesize
13.3MB
MD55122e07da6c4389fbd0b811d41b18ae0
SHA1fa33ca1356b54c8c2d2f564a49754ed6104e0fd5
SHA256dc36cd245d0aa5750724ac2dc74d5368b9c06a6281b8082d682d3741185e18bf
SHA5121d1bd90f9c1adcd326911f4956661a21e20453eda601c05b741cc4859b5c182290b2830451a387d737eaefd4d2eedcfbc9a84892bb38b604f2900e4bd7d66753
-
Filesize
947KB
MD58ff64952a4b6ad604177055c0386a243
SHA11a51a318ee155add2edd493fb2197da18a54e548
SHA2563cef996b5c18ab07c07b96325a43ef611f74a90124d11e1451e76678028cbabf
SHA5129ceb86679fa29a761019efff8ae465a5c4ac311c998c6430cf2619204bd850bde73b1c29051db48d31af0411d9446f3205c03f0f8e1e7c5a0dc056a95b6a176a
-
Filesize
1.4MB
MD56f2fdecc48e7d72ca1eb7f17a97e59ad
SHA1fcbc8c4403e5c8194ee69158d7e70ee7dbd4c056
SHA25670e48ef5c14766f3601c97451b47859fddcbe7f237e1c5200cea8e7a7609d809
SHA512fea98a3d6fff1497551dc6583dd92798dcac764070a350fd381e856105a6411c94effd4b189b7a32608ff610422b8dbd6d93393c5da99ee66d4569d45191dc8b
-
Filesize
2.7MB
MD5daaa30f2dff00615a67ec640591df80d
SHA1f21f0d0f4c0ce3ccbeabc21537c56968366314e3
SHA256048ef18f5af0753f1703e5c6672728e70dfd0576a91d84abc5af1f0661e1ac61
SHA51275a0243194020db5896a18c4eec2ea6074fd735e7166f05fe00a8e0eaf339328817775d585cbd31b6d9ced14edf5ab864e9a91cf80f84802a9bc378bc966e510
-
Filesize
5.3MB
MD5845b8b792223088b1fd9f30f1c4f0998
SHA14343ec62d9c1d55b79f2b3e66fac1c7e4ae4276f
SHA256f42f2641be45ca04eedabf2162f735f3e6dd7e506ba20e7472b001903ae61df7
SHA5129ecb7b0afe7d20050fb858a32436b65ac4d698885aafd62dbec31cf95b4a3df8872c80b4b06e727a4eabf5dd73e396a1b41591f8b925ca02169f3d31b80ac417
-
Filesize
1.7MB
MD523d4f0764b48e58b48fe9d219ad8644b
SHA1490db0a630a6fa02179be21a40e8b9daf0b09a2a
SHA2560bf27ed8c4e9a4d4fb5d91ef15604296d731cfd062aed351dc6cc5a0c246a698
SHA51238643ef85d55edcdce0f46e5bf2f0f2dfa465bb648449968de394c14bce8b47266657aec252049102bcac43a4eee669dfe11448e9092ec54d5db0eba063dfbde
-
Filesize
3.5MB
MD5b9c2a2af9fa6daa11fb3a832f26199e3
SHA15b17232245ff3b13e3cf5bf46ad59e0d076d0440
SHA256f735dbbb3fd0ed7c73924f7661aff8eeb498b5cd6537b1b7a1954a1107e2719d
SHA51214ba25d8b9789314d3605f83f88a1206b09c05a034e622a1ada36a9cbdf8361ed50fe9c91989fe0beb55d77db99b8b9553f73c6a58675240295e5841986622ed
-
Filesize
3.1MB
MD5a6de850843679453111199938e2f063f
SHA1d3d29b0b125f2c153f7705752d2e04840d859056
SHA2564cbc26196d6f678797589a2277973ea4c3c5ef052c87170f613ed7d4698923ea
SHA5121a74e9763181d44bf58b8f62b730a387da38c091613c4934388843572e5d61df0a0f3f6529bda7926b66fcaa6b066b9c219822a8a7122098566f84ac8f37915f
-
Filesize
1.8MB
MD5615e21148ab9f18a2cd5fc57a29d2f9d
SHA13d0ac153bf285fd266e38b60f4ead5ba9a06cd3f
SHA256d20f28f876e0b6796e3f2d8b5c855eee43e6f9b20d2c9117a0d3179cd51b3d7e
SHA512aefa69bc9174dda7d21c1cdc3afa0a66ba6c4522d947f07049e21ae17f61801b3a3858429ad50882c00228a37e43ce7278002377dc435c6f7f64dccc64edd48d
-
Filesize
186B
MD5790dd6f9aab53b59e358a126dc5d59fc
SHA1ec6bf3eb0fa5d2e37c694bf71254e0ce0be1a5fc
SHA2567ca8c160037742b7da30366775d7aae7882a98e1fbfdbbefb743c2a93d6b1c52
SHA512a9d819b8d771febfa027de6f201d4effaf7bdd3334255707dddceb57b2b322649698903ee5d72f0e431780d29b01abedd5250d372100e6c66c0639965f86c7ef
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
Filesize
76KB
MD50e362e7005823d0bec3719b902ed6d62
SHA1590d860b909804349e0cdc2f1662b37bd62f7463
SHA2562d0dc6216f613ac7551a7e70a798c22aee8eb9819428b1357e2b8c73bef905ad
SHA512518991b68496b3f8545e418cf9b345e0791e09cc20d177b8aa47e0aba447aa55383c64f5bdaca39f2b061a5d08c16f2ad484af8a9f238ca23ab081618fba3ad3
-
Filesize
91B
MD581784d19996473d2db79de737a1e00e5
SHA1e354ed781ff2382de2d4133181e0b8cea586c89d
SHA256eb91a81caf30243e8bcd125a6e20235fa5e10efa40108d93a5e75cfa77964214
SHA512c11cb4b6f029a5427c2b438cf9e661b76b4c2436a1f677cefda77a7a51e8f9d96779372e0ba59e0f17fbcf3c0f557ae856b2ffa2abe70444678a65c7b7b6ae1d
-
Filesize
91B
MD50e226c26d17d7e5fcbbe2d8f10f5e416
SHA19000259b7bdbc5f5baf62d8efd1ff871a4ce99ff
SHA256b792ce3ec91fcec283a118806a9b2e216eb4da2ae7ef5934a46abc8bd7b1fbc3
SHA512a75734dbdd5203acc2de0c89f40ebf32be879f3bebab3ad8d0720b29da0c1658dfb1f99f0b16aae32b8de2af20a23a9c50b0f5c3caf55f3deefb25a5e2f8649b
-
Filesize
116KB
MD5f70aa3fa04f0536280f872ad17973c3d
SHA150a7b889329a92de1b272d0ecf5fce87395d3123
SHA2568d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8
SHA51230675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\AlternateServices.bin
Filesize6KB
MD5d5f0023a6be3725b6e9e8ec9492a2435
SHA1886fed6bf1087c5efb50a00fdb709242075b12b3
SHA2566252392f2828f3ae0fe540b1a9021c1aa340cf24c56df02fef8e14d4ba91c21d
SHA512ddd655880c89407739c80759e483b17c58e07c6072e9575ef6fdfad32259e5868501dbef6c806dd31cd4e397b10772505e76715d68cd607a87983ed78f7acfdd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\AlternateServices.bin
Filesize10KB
MD54e8619b47812eed2b8b5e8a9c218aa25
SHA1806402b08e1d560c9313b76b5db6929eecf9a82a
SHA256fb6697fb78545e54b5225e5c3affee5a424022ed271d58d895b8bc38dfc45590
SHA512c79f2a08c49be02f4d3ea167f51f1db1d456af7a1c6e67b8354fc2fe4f62b9febc6cda001153d9dea72befb70b19a9f3c738aa3bc1f090efc78ffb0959dab9fe
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.bin
Filesize23KB
MD5b6bd66fe933fb20764cc5abbc04a0ff7
SHA12cc8b025ab759f6bfda6a0d63c6508f42ad8e939
SHA256efbdf0a83892f711eeead5586a7273a0f220f5b285f026cbfd8646e20d4e853e
SHA512bdf760c1bab9d2056653db50103f9582a142f11d6e7a570e406e3d9ad4782072b85abfb4747fde57c7850caf0cfaa13a3df6c621057b644d8e2fe50c979c80dc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.bin
Filesize5KB
MD56fe52765350ae0e56221e4d97228f66d
SHA16cb8a5d300ef72f254512c9fdda580ad52fab5ba
SHA2562216bcac37bda287a66b7cdee45a102b36fd3687bbd764db29b3be696a44380e
SHA5124eea6772582271a5528d481c5836ae4cb28a205ec04004ec186eddaef7cd1d0f95cf9a81afda4c8decc55137b61752b331a8c813a00e360c22818fb592c1de9f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.bin
Filesize6KB
MD50c970e3dafe12efbb5e793743e201084
SHA12daf217892849a091b49a7b84225f0743b0ac3a2
SHA256aad3aadde8eed29b8efa615d0f34e83afaf9ba8a84d82331d949d02b74efa84c
SHA5122e5af42af85a8fab7af38587381040a8c277cd195eaaa5b0918b750f4a100ce8ac228e29c6a9a608fd3f2bf4aa422d08dfcef0df31276c6c72ba37e41eecd01e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.bin
Filesize14KB
MD52a8f30dcb6d4b7e6d793fff1265b0416
SHA190678d8f9d2227d3798b22638c0ed1089e54260e
SHA256340353981335a4c139ca319bbf347a937cf391bd4e8f247ed49791ebe839038d
SHA512eb69e7d2eff6b873ea7a3bf0b6047d3169453bc1a809d697bf0406aba0276a98dbc445473358a44211e3c6b6b76e8c656561914d0432fe2970e297c99332e6f1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.bin
Filesize15KB
MD5a5f49c0e43a980436829166281b4e022
SHA1a7b4ae523ce9461f22cf67ead0b6adf47317ba7f
SHA25676c42755af97a1007aeea7f31e38d3c42c0a28ed2cbd8755af8ddd3278c769d4
SHA512441b482c84a00436f96c40d5b08487e831d8e3c51f41b0a9cf41056993be722c2b45a0b55e2c057321a238ae146ed6153ac40bf6ea5230f8b69da34b2a274dd5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5fa034ffa2f8aa7d640057b1cdc84d5f4
SHA1169d64096f86d3c4fe32af6259586220c31b70f4
SHA256a4b14762e6797c03c368a26452a91292c9a0f92bb424f8c76de33802b1c4f7f3
SHA5124d1b18d53184f1f313da11d8f79d15bf675d331ff9d955f142c33846184aecef2239f066353ff1259db47fd0f12d0370e884b1ef7602702d41aa66d63d708ea6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5054cfb1cb7069f09d5606a5d36da9c01
SHA12a6f98038102acf8e4d41fe4fd8f84152b64142d
SHA256f216fdbc81e7295e138d6a4420236253c7315fd78c18ed4959b319617e23794d
SHA512cacaaa793b1d018b5c902021aff25eac135aee1ed2b797af1a51cc36f5f731fd81606e5986a1761c420e5a993404eb8d836b037fd94b85b49bbf1590ed02bd20
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD56ec948336d9bfe0c58ed8ec652bb69fd
SHA10e5de781c4f3022441b5c26e8ad8f887c9bd82f6
SHA2560f1dbf954bfaf0b77ad9446784822e3bd918c732a2971f2c70f1d54e879ed72f
SHA512a02983da459a86668c7e0ca8f3aed6787c585bde19836d2b17accecf5f0a6a1adfb85dffd9584d6fa6e6aacd7ae8a644ed906f41a212a186b94a19961c1cd68b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5e209e7b95a473a0a015e1dc539af5ff2
SHA1781b004d8e47233a54f824cb5fb0ea9f6eb70ccb
SHA256fe09b7b6f2ff1e8c81ccea111e5faa4df134a281d83d4827120d4e06435f61a6
SHA512f01cd5884b2059e7329a0a6e2396874fa461e718729bb6e4f05991c2dff30a16fd2efb9c8ecc2446fb65951af930adf71ddb0d3f7f4a9ddc0acc41cfc9707190
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD56da949e1fa65eb7f1b3cc7ae040c72c0
SHA1c8df896d3fa06e0e6433a976cb880029d2df588e
SHA256250c85326a8804a68532160d82aeb7538adcf300c6653177c2eb36c2986f64be
SHA512ef091be360cbfbb81ff175d706d08b7631c2fa89dc1b4571e2d7708ae3ad65273b6d264e500e784b14e992a4e815d97242934bdb846a5c83b0ee2c4ac8c33995
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\a4915d59-8bb0-43ad-b145-d3363c98519a
Filesize671B
MD552d03149bf8ab6c2d4f58331e1ee1a70
SHA1a6520fbcdd5f9b501e73d9eb050b372bb2a78a7c
SHA25684612fc0ef1d359fc8f0fead969a05103bde7fe3e12d83d6bc46718abb1b5c72
SHA512a09bc4bfbb7ee6951eac74fb4f97f4a1ad31c6892993e3e0e1ea9e0526a0770545e12081f1920240b51753ec0b9817f3bf7329efc90fa595344a17f37287b9a3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\ae1e39d0-a241-4515-ad17-0264ac86a85c
Filesize29KB
MD55d719bc84246297ce20a54c8d9e6cc92
SHA1ccf89c6e1c1e9f68079c04674e88ef6abfffa4ee
SHA256d691575ef8eda92c7a11740538e20a82cf441690c0db1de403be480979a363a8
SHA5125fdd3b9c29ec734ef4a2eb989935a55627ef900bc74bde345f457936fccf856e3cd1835f2299103df28433ae29cd2c467296e17c0568ddda556ab6fe8d8876a2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\bbb114ef-bd53-4375-9c48-32fc5f7ed8fc
Filesize982B
MD51befb9b4ba4bb7c9b01472d69244c93e
SHA1ff9d2b2eab509b9c748d0433724e9bc0b122e243
SHA256aa948ef6e2670db313c40300fd71cb51fbe354f2c74520cac0c964e8d7e36726
SHA512c180a9926d4f4c54a636c2802aed22414a00cf7e071a9bac779a3d203f02b7aad176f6998419462a5740e0868b3653c4d7def83082489003f973d8f884c1b1c8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD56a64f82879948286213a9803a5d0627d
SHA12941dc2ca5b4731579247d84bdd8ac1228e8d8e8
SHA2560bec5a773101e8e1e3f7d8e29e859ea7994d057302c8d4127746351d6c2764e0
SHA51207542a43c8a032a1abe7fb9cf8c999a16fe3e379478177586c36d19138caa7537433f06f9ce3178a63a62abd68a632d2dae7330368ec04225fd8326044a7f513
-
Filesize
15KB
MD5509316a76b1dc261f13c39fe5938001b
SHA153a9c68a92470f7e2beccdaae020fed242c9fe4c
SHA256bb3f41cd64330b16468e3ee7b47bb3b8ec764d10c463bab50f52ebf1bb39b693
SHA512bb0f3b2e2295c116a7f113774ccd30ba23fce40c33a6cc4dc1811fb97dee51f8fe3afaa383051209c5c7cf4ac88627262a92ad7cd040a84291204938094f80cf
-
Filesize
11KB
MD54db8940468b05398e803aaab8521b094
SHA1ab419d9cef80dcedd50a556463327b07296e0a42
SHA256bc5d837cda1af5815368c02571eb5e0db1f00a69b538eb521bbe356468a6b415
SHA512a913d6751f55cd5d1799aa8a64dba88bee0ac017ab30b1d8c3e96bd0e5761695f050da42a710896788acc510192f7592dee140b279abd0f023be1671dd7737e0
-
Filesize
10KB
MD5ed58a0ae2a8c3b8a0f284055084f81af
SHA15cc52c4ba761b5b1d98ad6a5983ad6ef522e8c86
SHA25686bccd300c5f6acbb3b756268752dbb82ecd4bb4636d17ef5613a6fc226c8856
SHA51291217dc8647a857d96daad5a2b99b56b07ae0bbf16a746c97c5d2fc0f8c91eeeb82ee53ab9c7549343f6b94d4715751d456307b69cdd6ac85aabc841b0c33ff2