Analysis
-
max time kernel
137s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-12-2024 18:35
Static task
static1
Behavioral task
behavioral1
Sample
ec798a7883c65756c2d8c19fdd14a24353ab0584e2d7cf4920a798938272cc24.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ec798a7883c65756c2d8c19fdd14a24353ab0584e2d7cf4920a798938272cc24.exe
Resource
win10v2004-20241007-en
General
-
Target
ec798a7883c65756c2d8c19fdd14a24353ab0584e2d7cf4920a798938272cc24.exe
-
Size
3.1MB
-
MD5
2b3dca9f3f8f7b379021a041b731aed3
-
SHA1
e8fc7d977c0a76e25b1e69f4398a10fef83918d0
-
SHA256
ec798a7883c65756c2d8c19fdd14a24353ab0584e2d7cf4920a798938272cc24
-
SHA512
ce65473353253347788ed1d0641a6c6a3be815c50bd1046c1aa8bf827f48c0f09b61560f3aa3eeb8f641afa6d7a870dd68834615b3fe81b6f62a9ffee946f98a
-
SSDEEP
49152:QGzTfwucejjjsjgACxGnlEaX+IWYxR8SJe2cC9/1+F0U:Bzb20jIjgACxNyWCR8S42cC9/1+z
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
https://atten-supporse.biz/api
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://atten-supporse.biz/api
https://se-blurry.biz/api
https://zinc-sneark.biz/api
Signatures
-
Amadey family
-
Asyncrat family
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 98226c9bc2.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 98226c9bc2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 98226c9bc2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 98226c9bc2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 98226c9bc2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 98226c9bc2.exe -
Stealc family
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral2/memory/5408-3069-0x0000000000400000-0x0000000000704000-memory.dmp family_stormkitty -
Stormkitty family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
description pid Process procid_target PID 4480 created 3500 4480 callmobile.exe 56 PID 1816 created 3500 1816 callmobile.exe 56 -
resource yara_rule behavioral2/memory/5408-3069-0x0000000000400000-0x0000000000704000-memory.dmp VenomRAT -
Venomrat family
-
DCRat payload 2 IoCs
resource yara_rule behavioral2/files/0x000b000000023ce3-1295.dat family_dcrat_v2 behavioral2/memory/2932-1303-0x0000000000B60000-0x0000000000D08000-memory.dmp family_dcrat_v2 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8b0d03025f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 98226c9bc2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ec798a7883c65756c2d8c19fdd14a24353ab0584e2d7cf4920a798938272cc24.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0tClIDb.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 196e021007.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 164 6072 powershell.exe -
pid Process 6072 powershell.exe 5340 powershell.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ec798a7883c65756c2d8c19fdd14a24353ab0584e2d7cf4920a798938272cc24.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 196e021007.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 196e021007.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 98226c9bc2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 98226c9bc2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8b0d03025f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0tClIDb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0tClIDb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8b0d03025f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ec798a7883c65756c2d8c19fdd14a24353ab0584e2d7cf4920a798938272cc24.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation ec798a7883c65756c2d8c19fdd14a24353ab0584e2d7cf4920a798938272cc24.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wTMEVe8.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation K6vkVgoA9D.exe -
Drops startup file 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\AutoRun_WindosCPUsystem.bat powershell.exe -
Executes dropped EXE 20 IoCs
pid Process 4272 skotes.exe 3580 skotes.exe 1400 B3vKvPi.exe 4480 callmobile.exe 3208 0tClIDb.exe 4016 wTMEVe8.exe 2148 wTMEVe8.exe 1084 oSD2N7jCQf.exe 2932 K6vkVgoA9D.exe 4340 ntRoEwh.exe 1816 callmobile.exe 2184 fontdrvhost.exe 4256 196e021007.exe 1316 8b0d03025f.exe 3608 dd94fa9303.exe 3492 98226c9bc2.exe 2268 skotes.exe 5984 downloaded_file.exe 3992 Wihnup.exe 2128 WindosCPUsystem.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine ec798a7883c65756c2d8c19fdd14a24353ab0584e2d7cf4920a798938272cc24.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 0tClIDb.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 196e021007.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 8b0d03025f.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 98226c9bc2.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 98226c9bc2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 98226c9bc2.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" B3vKvPi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ntRoEwh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\196e021007.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013244001\\196e021007.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\8b0d03025f.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013245001\\8b0d03025f.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dd94fa9303.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013246001\\dd94fa9303.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\98226c9bc2.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013247001\\98226c9bc2.exe" skotes.exe -
Power Settings 1 TTPs 4 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 5816 powercfg.exe 5820 powercfg.exe 5408 powercfg.exe 5800 powercfg.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000700000000072f-2601.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 2040 ec798a7883c65756c2d8c19fdd14a24353ab0584e2d7cf4920a798938272cc24.exe 4272 skotes.exe 3580 skotes.exe 3208 0tClIDb.exe 4256 196e021007.exe 1316 8b0d03025f.exe 3492 98226c9bc2.exe 2268 skotes.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4016 set thread context of 2148 4016 wTMEVe8.exe 103 PID 4480 set thread context of 5408 4480 callmobile.exe 145 PID 2128 set thread context of 5768 2128 WindosCPUsystem.exe 165 PID 1816 set thread context of 5748 1816 callmobile.exe 170 -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files (x86)\Google\Temp\explorer.exe K6vkVgoA9D.exe File created C:\Program Files (x86)\Google\Temp\7a0fd90576e088 K6vkVgoA9D.exe File created C:\Program Files (x86)\Microsoft\SearchApp.exe K6vkVgoA9D.exe File created C:\Program Files (x86)\Microsoft\38384e6a620884 K6vkVgoA9D.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job ec798a7883c65756c2d8c19fdd14a24353ab0584e2d7cf4920a798938272cc24.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
pid pid_target Process procid_target 2144 3208 WerFault.exe 95 2964 3208 WerFault.exe 95 1812 4256 WerFault.exe 114 3488 4256 WerFault.exe 114 -
System Location Discovery: System Language Discovery 1 TTPs 27 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 196e021007.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 98226c9bc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8b0d03025f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dd94fa9303.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ec798a7883c65756c2d8c19fdd14a24353ab0584e2d7cf4920a798938272cc24.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0tClIDb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language dd94fa9303.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage dd94fa9303.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language callmobile.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wTMEVe8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language downloaded_file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wihnup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language callmobile.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wTMEVe8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3780 PING.EXE -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 5744 timeout.exe 5200 timeout.exe -
Kills process with taskkill 5 IoCs
pid Process 3680 taskkill.exe 3268 taskkill.exe 224 taskkill.exe 5060 taskkill.exe 4848 taskkill.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings K6vkVgoA9D.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings firefox.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3780 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5812 schtasks.exe 216 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2040 ec798a7883c65756c2d8c19fdd14a24353ab0584e2d7cf4920a798938272cc24.exe 2040 ec798a7883c65756c2d8c19fdd14a24353ab0584e2d7cf4920a798938272cc24.exe 4272 skotes.exe 4272 skotes.exe 3580 skotes.exe 3580 skotes.exe 3208 0tClIDb.exe 3208 0tClIDb.exe 2932 K6vkVgoA9D.exe 2932 K6vkVgoA9D.exe 2932 K6vkVgoA9D.exe 2932 K6vkVgoA9D.exe 2932 K6vkVgoA9D.exe 2932 K6vkVgoA9D.exe 2932 K6vkVgoA9D.exe 2932 K6vkVgoA9D.exe 2932 K6vkVgoA9D.exe 2932 K6vkVgoA9D.exe 2932 K6vkVgoA9D.exe 2932 K6vkVgoA9D.exe 2932 K6vkVgoA9D.exe 2932 K6vkVgoA9D.exe 2932 K6vkVgoA9D.exe 2932 K6vkVgoA9D.exe 2932 K6vkVgoA9D.exe 2932 K6vkVgoA9D.exe 2932 K6vkVgoA9D.exe 2932 K6vkVgoA9D.exe 2932 K6vkVgoA9D.exe 2932 K6vkVgoA9D.exe 2932 K6vkVgoA9D.exe 2932 K6vkVgoA9D.exe 2932 K6vkVgoA9D.exe 2932 K6vkVgoA9D.exe 2932 K6vkVgoA9D.exe 2932 K6vkVgoA9D.exe 2932 K6vkVgoA9D.exe 2932 K6vkVgoA9D.exe 2932 K6vkVgoA9D.exe 2932 K6vkVgoA9D.exe 2932 K6vkVgoA9D.exe 2932 K6vkVgoA9D.exe 2932 K6vkVgoA9D.exe 2932 K6vkVgoA9D.exe 2932 K6vkVgoA9D.exe 2932 K6vkVgoA9D.exe 2932 K6vkVgoA9D.exe 2932 K6vkVgoA9D.exe 2932 K6vkVgoA9D.exe 2932 K6vkVgoA9D.exe 2932 K6vkVgoA9D.exe 2932 K6vkVgoA9D.exe 2932 K6vkVgoA9D.exe 2932 K6vkVgoA9D.exe 2932 K6vkVgoA9D.exe 2932 K6vkVgoA9D.exe 2932 K6vkVgoA9D.exe 2932 K6vkVgoA9D.exe 2932 K6vkVgoA9D.exe 2932 K6vkVgoA9D.exe 2932 K6vkVgoA9D.exe 2932 K6vkVgoA9D.exe 2932 K6vkVgoA9D.exe 2932 K6vkVgoA9D.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 5984 downloaded_file.exe 5984 downloaded_file.exe 5984 downloaded_file.exe 6060 explorer.exe 6060 explorer.exe 6060 explorer.exe -
Suspicious use of AdjustPrivilegeToken 27 IoCs
description pid Process Token: SeDebugPrivilege 4480 callmobile.exe Token: SeDebugPrivilege 2932 K6vkVgoA9D.exe Token: SeDebugPrivilege 1816 callmobile.exe Token: SeDebugPrivilege 2184 fontdrvhost.exe Token: SeDebugPrivilege 3680 taskkill.exe Token: SeDebugPrivilege 3268 taskkill.exe Token: SeDebugPrivilege 224 taskkill.exe Token: SeDebugPrivilege 5060 taskkill.exe Token: SeDebugPrivilege 4848 taskkill.exe Token: SeDebugPrivilege 2324 firefox.exe Token: SeDebugPrivilege 2324 firefox.exe Token: SeDebugPrivilege 6072 powershell.exe Token: SeDebugPrivilege 3492 98226c9bc2.exe Token: SeDebugPrivilege 4480 callmobile.exe Token: SeDebugPrivilege 5408 MSBuild.exe Token: SeDebugPrivilege 5340 powershell.exe Token: SeShutdownPrivilege 5820 powercfg.exe Token: SeCreatePagefilePrivilege 5820 powercfg.exe Token: SeShutdownPrivilege 5816 powercfg.exe Token: SeCreatePagefilePrivilege 5816 powercfg.exe Token: SeShutdownPrivilege 5800 powercfg.exe Token: SeCreatePagefilePrivilege 5800 powercfg.exe Token: SeShutdownPrivilege 5408 powercfg.exe Token: SeCreatePagefilePrivilege 5408 powercfg.exe Token: SeLockMemoryPrivilege 5768 explorer.exe Token: SeLockMemoryPrivilege 5768 explorer.exe Token: SeDebugPrivilege 1816 callmobile.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2040 ec798a7883c65756c2d8c19fdd14a24353ab0584e2d7cf4920a798938272cc24.exe 3608 dd94fa9303.exe 3608 dd94fa9303.exe 3608 dd94fa9303.exe 3608 dd94fa9303.exe 3608 dd94fa9303.exe 3608 dd94fa9303.exe 3608 dd94fa9303.exe 2324 firefox.exe 3608 dd94fa9303.exe 2324 firefox.exe 2324 firefox.exe 2324 firefox.exe 2324 firefox.exe 2324 firefox.exe 2324 firefox.exe 2324 firefox.exe 2324 firefox.exe 2324 firefox.exe 2324 firefox.exe 2324 firefox.exe 2324 firefox.exe 2324 firefox.exe 2324 firefox.exe 2324 firefox.exe 2324 firefox.exe 2324 firefox.exe 2324 firefox.exe 2324 firefox.exe 2324 firefox.exe 3608 dd94fa9303.exe 3608 dd94fa9303.exe 3608 dd94fa9303.exe 5768 explorer.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 3608 dd94fa9303.exe 3608 dd94fa9303.exe 3608 dd94fa9303.exe 3608 dd94fa9303.exe 3608 dd94fa9303.exe 3608 dd94fa9303.exe 3608 dd94fa9303.exe 2324 firefox.exe 3608 dd94fa9303.exe 2324 firefox.exe 2324 firefox.exe 2324 firefox.exe 2324 firefox.exe 2324 firefox.exe 2324 firefox.exe 2324 firefox.exe 2324 firefox.exe 2324 firefox.exe 2324 firefox.exe 2324 firefox.exe 2324 firefox.exe 2324 firefox.exe 2324 firefox.exe 2324 firefox.exe 2324 firefox.exe 2324 firefox.exe 2324 firefox.exe 2324 firefox.exe 3608 dd94fa9303.exe 3608 dd94fa9303.exe 3608 dd94fa9303.exe 5768 explorer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2324 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2040 wrote to memory of 4272 2040 ec798a7883c65756c2d8c19fdd14a24353ab0584e2d7cf4920a798938272cc24.exe 82 PID 2040 wrote to memory of 4272 2040 ec798a7883c65756c2d8c19fdd14a24353ab0584e2d7cf4920a798938272cc24.exe 82 PID 2040 wrote to memory of 4272 2040 ec798a7883c65756c2d8c19fdd14a24353ab0584e2d7cf4920a798938272cc24.exe 82 PID 4272 wrote to memory of 1400 4272 skotes.exe 93 PID 4272 wrote to memory of 1400 4272 skotes.exe 93 PID 1400 wrote to memory of 4480 1400 B3vKvPi.exe 94 PID 1400 wrote to memory of 4480 1400 B3vKvPi.exe 94 PID 1400 wrote to memory of 4480 1400 B3vKvPi.exe 94 PID 4272 wrote to memory of 3208 4272 skotes.exe 95 PID 4272 wrote to memory of 3208 4272 skotes.exe 95 PID 4272 wrote to memory of 3208 4272 skotes.exe 95 PID 4272 wrote to memory of 4016 4272 skotes.exe 101 PID 4272 wrote to memory of 4016 4272 skotes.exe 101 PID 4272 wrote to memory of 4016 4272 skotes.exe 101 PID 4016 wrote to memory of 2148 4016 wTMEVe8.exe 103 PID 4016 wrote to memory of 2148 4016 wTMEVe8.exe 103 PID 4016 wrote to memory of 2148 4016 wTMEVe8.exe 103 PID 4016 wrote to memory of 2148 4016 wTMEVe8.exe 103 PID 4016 wrote to memory of 2148 4016 wTMEVe8.exe 103 PID 4016 wrote to memory of 2148 4016 wTMEVe8.exe 103 PID 4016 wrote to memory of 2148 4016 wTMEVe8.exe 103 PID 4016 wrote to memory of 2148 4016 wTMEVe8.exe 103 PID 4016 wrote to memory of 2148 4016 wTMEVe8.exe 103 PID 4016 wrote to memory of 2148 4016 wTMEVe8.exe 103 PID 2148 wrote to memory of 1084 2148 wTMEVe8.exe 104 PID 2148 wrote to memory of 1084 2148 wTMEVe8.exe 104 PID 2148 wrote to memory of 2932 2148 wTMEVe8.exe 106 PID 2148 wrote to memory of 2932 2148 wTMEVe8.exe 106 PID 2932 wrote to memory of 3292 2932 K6vkVgoA9D.exe 107 PID 2932 wrote to memory of 3292 2932 K6vkVgoA9D.exe 107 PID 3292 wrote to memory of 2088 3292 cmd.exe 109 PID 3292 wrote to memory of 2088 3292 cmd.exe 109 PID 3292 wrote to memory of 3780 3292 cmd.exe 110 PID 3292 wrote to memory of 3780 3292 cmd.exe 110 PID 4272 wrote to memory of 4340 4272 skotes.exe 111 PID 4272 wrote to memory of 4340 4272 skotes.exe 111 PID 4340 wrote to memory of 1816 4340 ntRoEwh.exe 112 PID 4340 wrote to memory of 1816 4340 ntRoEwh.exe 112 PID 4340 wrote to memory of 1816 4340 ntRoEwh.exe 112 PID 3292 wrote to memory of 2184 3292 cmd.exe 113 PID 3292 wrote to memory of 2184 3292 cmd.exe 113 PID 4272 wrote to memory of 4256 4272 skotes.exe 114 PID 4272 wrote to memory of 4256 4272 skotes.exe 114 PID 4272 wrote to memory of 4256 4272 skotes.exe 114 PID 4272 wrote to memory of 1316 4272 skotes.exe 119 PID 4272 wrote to memory of 1316 4272 skotes.exe 119 PID 4272 wrote to memory of 1316 4272 skotes.exe 119 PID 4272 wrote to memory of 3608 4272 skotes.exe 120 PID 4272 wrote to memory of 3608 4272 skotes.exe 120 PID 4272 wrote to memory of 3608 4272 skotes.exe 120 PID 3608 wrote to memory of 3680 3608 dd94fa9303.exe 121 PID 3608 wrote to memory of 3680 3608 dd94fa9303.exe 121 PID 3608 wrote to memory of 3680 3608 dd94fa9303.exe 121 PID 3608 wrote to memory of 3268 3608 dd94fa9303.exe 123 PID 3608 wrote to memory of 3268 3608 dd94fa9303.exe 123 PID 3608 wrote to memory of 3268 3608 dd94fa9303.exe 123 PID 3608 wrote to memory of 224 3608 dd94fa9303.exe 125 PID 3608 wrote to memory of 224 3608 dd94fa9303.exe 125 PID 3608 wrote to memory of 224 3608 dd94fa9303.exe 125 PID 3608 wrote to memory of 5060 3608 dd94fa9303.exe 127 PID 3608 wrote to memory of 5060 3608 dd94fa9303.exe 127 PID 3608 wrote to memory of 5060 3608 dd94fa9303.exe 127 PID 3608 wrote to memory of 4848 3608 dd94fa9303.exe 129 PID 3608 wrote to memory of 4848 3608 dd94fa9303.exe 129 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3500
-
C:\Users\Admin\AppData\Local\Temp\ec798a7883c65756c2d8c19fdd14a24353ab0584e2d7cf4920a798938272cc24.exe"C:\Users\Admin\AppData\Local\Temp\ec798a7883c65756c2d8c19fdd14a24353ab0584e2d7cf4920a798938272cc24.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Users\Admin\AppData\Local\Temp\1013210001\B3vKvPi.exe"C:\Users\Admin\AppData\Local\Temp\1013210001\B3vKvPi.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\callmobile.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\callmobile.exe5⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4480
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013229001\0tClIDb.exe"C:\Users\Admin\AppData\Local\Temp\1013229001\0tClIDb.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3208 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3208 -s 15085⤵
- Program crash
PID:2144
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3208 -s 15405⤵
- Program crash
PID:2964
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013238001\wTMEVe8.exe"C:\Users\Admin\AppData\Local\Temp\1013238001\wTMEVe8.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Users\Admin\AppData\Local\Temp\1013238001\wTMEVe8.exe"C:\Users\Admin\AppData\Local\Temp\1013238001\wTMEVe8.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Users\Admin\AppData\Roaming\oSD2N7jCQf.exe"C:\Users\Admin\AppData\Roaming\oSD2N7jCQf.exe"6⤵
- Executes dropped EXE
PID:1084
-
-
C:\Users\Admin\AppData\Roaming\K6vkVgoA9D.exe"C:\Users\Admin\AppData\Roaming\K6vkVgoA9D.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\k4MfjKi2rh.bat"7⤵
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Windows\system32\chcp.comchcp 650018⤵PID:2088
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost8⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3780
-
-
C:\Recovery\WindowsRE\fontdrvhost.exe"C:\Recovery\WindowsRE\fontdrvhost.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2184
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013239001\ntRoEwh.exe"C:\Users\Admin\AppData\Local\Temp\1013239001\ntRoEwh.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\callmobile.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\callmobile.exe5⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1816
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013244001\196e021007.exe"C:\Users\Admin\AppData\Local\Temp\1013244001\196e021007.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:4256 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4256 -s 14765⤵
- Program crash
PID:1812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4256 -s 14525⤵
- Program crash
PID:3488
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013245001\8b0d03025f.exe"C:\Users\Admin\AppData\Local\Temp\1013245001\8b0d03025f.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1316
-
-
C:\Users\Admin\AppData\Local\Temp\1013246001\dd94fa9303.exe"C:\Users\Admin\AppData\Local\Temp\1013246001\dd94fa9303.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3680
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3268
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:224
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5060
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4848
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking5⤵PID:2976
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking6⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2324 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1968 -parentBuildID 20240401114208 -prefsHandle 1892 -prefMapHandle 1884 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7523fd73-0421-4f24-bfd3-c21c79fd7ed0} 2324 "\\.\pipe\gecko-crash-server-pipe.2324" gpu7⤵PID:1804
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2432 -parentBuildID 20240401114208 -prefsHandle 2424 -prefMapHandle 2412 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b7872aaa-9898-472c-b358-9bc83f4f5a40} 2324 "\\.\pipe\gecko-crash-server-pipe.2324" socket7⤵PID:4736
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2744 -childID 1 -isForBrowser -prefsHandle 3524 -prefMapHandle 3520 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1252 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b5b8bf08-1a79-4951-8c4d-7c7573a328f0} 2324 "\\.\pipe\gecko-crash-server-pipe.2324" tab7⤵PID:1300
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4056 -childID 2 -isForBrowser -prefsHandle 4120 -prefMapHandle 4116 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1252 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a52c8298-5f4a-498e-b01c-85608834df36} 2324 "\\.\pipe\gecko-crash-server-pipe.2324" tab7⤵PID:4880
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4816 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4764 -prefMapHandle 4824 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5f84b417-1275-4fa3-b0df-a1812135d384} 2324 "\\.\pipe\gecko-crash-server-pipe.2324" utility7⤵
- Checks processor information in registry
PID:5264
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5404 -childID 3 -isForBrowser -prefsHandle 5408 -prefMapHandle 5396 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1252 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c38139a8-7d6a-4c3e-adb9-c7af4f415461} 2324 "\\.\pipe\gecko-crash-server-pipe.2324" tab7⤵PID:2132
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5272 -childID 4 -isForBrowser -prefsHandle 5576 -prefMapHandle 5580 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1252 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {279dc100-a9fd-49fc-a1ed-add8ef23c22b} 2324 "\\.\pipe\gecko-crash-server-pipe.2324" tab7⤵PID:1848
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5752 -childID 5 -isForBrowser -prefsHandle 5756 -prefMapHandle 5760 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1252 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2dea0b96-ed34-4611-b4ab-45d05dd2f901} 2324 "\\.\pipe\gecko-crash-server-pipe.2324" tab7⤵PID:1476
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013247001\98226c9bc2.exe"C:\Users\Admin\AppData\Local\Temp\1013247001\98226c9bc2.exe"4⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3492
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1013248041\KeaEfrP.ps1"4⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Drops startup file
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:6072 -
C:\Users\Admin\AppData\Local\Temp\downloaded_file.exe"C:\Users\Admin\AppData\Local\Temp\downloaded_file.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:5984 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:\ProgramData\WindowsSystem\WindowsSystem.exe','C:\ProgramData\WindowsSystem1\WindosCPUsystem.exe'6⤵PID:6020
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Add-MpPreference -ExclusionPath 'C:\ProgramData\WindowsSystem\WindowsSystem.exe','C:\ProgramData\WindowsSystem1\WindosCPUsystem.exe'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:5340
-
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"6⤵
- Suspicious behavior: MapViewOfSection
PID:6060 -
C:\Windows\EXPLORER.EXEC:\Windows\EXPLORER.EXE {DF4EE2DA-C20C-4BBF-97D5-4B94E23FE1C8}7⤵PID:3584
-
-
C:\ProgramData\WindowsSystem1\WindosCPUsystem.exe"C:\ProgramData\WindowsSystem1\WindosCPUsystem.exe" ""7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2128 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 08⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:5408
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 08⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:5820
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 08⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:5816
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 08⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:5800
-
-
C:\Windows\explorer.exeexplorer.exe8⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5768
-
-
-
-
-
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5408 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Wihnup" /tr '"C:\Users\Admin\AppData\Roaming\Wihnup.exe"' & exit3⤵
- System Location Discovery: System Language Discovery
PID:5616 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Wihnup" /tr '"C:\Users\Admin\AppData\Roaming\Wihnup.exe"'4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5812
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp7FD5.tmp.bat""3⤵
- System Location Discovery: System Language Discovery
PID:5704 -
C:\Windows\SysWOW64\timeout.exetimeout 34⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:5744
-
-
C:\Users\Admin\AppData\Roaming\Wihnup.exe"C:\Users\Admin\AppData\Roaming\Wihnup.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3992
-
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- System Location Discovery: System Language Discovery
PID:5748 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Wihnup" /tr '"C:\Users\Admin\AppData\Roaming\Wihnup.exe"' & exit3⤵PID:4468
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Wihnup" /tr '"C:\Users\Admin\AppData\Roaming\Wihnup.exe"'4⤵
- Scheduled Task/Job: Scheduled Task
PID:216
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpE19C.tmp.bat""3⤵PID:2688
-
C:\Windows\SysWOW64\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
PID:5200
-
-
C:\Users\Admin\AppData\Roaming\Wihnup.exe"C:\Users\Admin\AppData\Roaming\Wihnup.exe"4⤵PID:5300
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3580
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 3208 -ip 32081⤵PID:372
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3208 -ip 32081⤵PID:552
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4256 -ip 42561⤵PID:2124
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4256 -ip 42561⤵PID:3340
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2268
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Power Settings
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Query Registry
6Remote System Discovery
1System Information Discovery
4System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD5d16e6918118a615a302759477165e256
SHA1b19c5484666b5f05d39946562d69ecf4476a7488
SHA256d6740630f206d849f2329a794c862acac202f8b984b843de0c35848417f65b23
SHA512c4febc8e482f2169c4d028383d1a195a6bc3b604e6ff5297267fb43e8502ffd3a52a09957f3112da8958a08eb76b2e0c292303c582e248548487c737b97955dd
-
Filesize
942B
MD508fd55ab7b211d3fba9ba080bb93fc07
SHA13519a855c1d90857159c68422848785d68a89591
SHA256eb1d1fa6b376f369681435d4e310dc2e6e832877a6e2880640727f9390559614
SHA51261c362ac9ac9809532be0383eb239e06290b1387bc6e49e0ab0045bd7e4b904032f8def000d4b1e4800b6387c193f4ab78f8c507138030490014104cecb726d7
-
Filesize
841B
MD50efd0cfcc86075d96e951890baf0fa87
SHA16e98c66d43aa3f01b2395048e754d69b7386b511
SHA256ff981780f37479af6a428dd121eef68cf6e0b471ae92f080893a55320cc993f7
SHA5124e79f5a8494aac94f98af8dbbc71bdd0a57b02103757ad970da7e7d4e6a0dc5015ca008256a6bd2c5bdec3a0f5736a994e17b3ef004b0f374a3339e480ac41b1
-
Filesize
18KB
MD52e7980d378d6bbb80b5a81a8eba7722c
SHA1665a7e26fe08e3f4d4c2324a64176b87de2ac5e9
SHA256fbe68410e7b37b4f12c02796dc45184aaeaf4550ff4fb33a98fc48b7dd58fcd3
SHA5127a486aea396d3085a8a706555e560a897f04769f06e60e9bad2c51a3bcf4f81382b2c66bb62790b030c60f2c3c5e10c4915ef7b08fd11ff465eb7207f8e4f544
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\activity-stream.discovery_stream.json
Filesize18KB
MD5a8c2b99fed57d9763f9ab366514bb099
SHA1619ce35062b6ce141ada9d1447212a8264a28630
SHA25661fd4ab8d7f824f2626594de3dba5f00466fb808fd31956541a01d9d695803bd
SHA5122196e8ed61588fe96ab777d2bfec691d94c8e7c484c9289807f9c7bdc10611cd4b8d805bd87f1a4f958ac9d8b406e16d25bcf2478718b7cf6187400bed3fe44e
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
2.2MB
MD53541c1ac26eb5bbb87f01c20fd9f8824
SHA1bf5d136c911491f59bdeb3bf37b8f1a155fd3a97
SHA256b7cd929ce4d0fa849eeab8a216e1333f63c7d3530da674f163efab4dae3439d1
SHA512babc17723d2389919acd96f977821d57bdd737f01a9598209efafa72ae0418e914a5d229f196d80cb5ba70ce82b0f340b18aa255bbe4ed77d821a432d5794a93
-
Filesize
1.8MB
MD56367fb8a64f997be8d65536534bdd057
SHA13ee062142dde2330881566a63a92957037a0e6b3
SHA256bdae46a5cb1f1b6b9864b5e944ed5b2e24622d7385a196e0293f7b9da59bda5e
SHA512ace2dbba313180a64f70f49c7763fb9da23ef76b82548c8fa54a7d1e8d4810cad83726fe532459660e12e4f6a9210df09dd836ea28f1cc5a791a4873b95a274c
-
Filesize
3.9MB
MD55db95c4de9b6e98c653ac3dec5dce83d
SHA1c3e1cb98b5450d21c8e9e975148c282afcf4ccae
SHA2568ac4f1dcdf7ce5276d4ee9dbdaeaa4232aa8ad0c383bf804472f156ae2a879c7
SHA51242e5504904f0db4e62d56c03c8e7e302df0eba488a966259aa686e7d952db8a25eb56b5ac72731400cfd2541b6429d82e95e3bb8e87565bdf0cbe2b488c47368
-
Filesize
1.8MB
MD5c42fbc53b1b42194728f4f5904cc925a
SHA1e62e1d938f9a9be31f3ccb82ece3997354df132b
SHA25646253c842675dfbc5fc9c852bcf64e6d6175b6efe9d81774b6d84e42a3be9cb9
SHA512e833b0fa711fd4bfaf3f00c1d816b4f7988959f445509089f4795f4d6a419aed154b2d33cb71ea49e918c82ba0545d70a36eed8687597378b0065817f8bb5f95
-
Filesize
1.7MB
MD57dcf4c4df2997ccd8c4a0fd2398b784a
SHA17f623f31d30a0d45058eeaa38f12ecf43f54fd33
SHA2564c2d2f9f76daff7560ac8bf55c348f7051216db171fba2a25f7ac939410b7cff
SHA512697dbc4f0cda3affdfcf0639b53de8a67273cd4ff3e356236277cb2851c6c24be67c4b6ed51bc1229a842ddbd53231b07d2b9dba2d484447240066ad32845d1b
-
Filesize
948KB
MD5ea332702c8adf6f8be3dd834363924bd
SHA1eaf972aeb4a0eebeede9b2a53c48670965af4d17
SHA2563b609f119a3ac3d881d7e2e7bf637618500e6d5afe0b65f9087b6653cbbc42eb
SHA51202662320d09805f2a09fd7431576a7b70c83fdc2ea6a139e53c23509705659b4a9034f135383166b0c0d0f3777f0220a53d2e7a02a2a1642af96eb0030cb44fc
-
Filesize
2.7MB
MD5ed56e3fd052ff78dc552adc8c68c1ae1
SHA1a3ec743c5faf04b546213f35d186599704da24c3
SHA256d4a86adb78b87482ffaf354bdddfd4b0db486b10de088f923851c23e25f7813b
SHA512975391c94d487377d5c3c240a9f83b8edaad51f9cab4bfb6f7705a23ab8a0435961bde4f3469f30b3c1c351586f4d664a091eb3584bd21c33524735fbc3e7556
-
Filesize
2KB
MD562e668d5993865a150073479bdc42ec5
SHA1b2b4e7767c5b0c9218127401c8d8b8723148ffc7
SHA256ea4b7480d291e1e3ec6029bc92c3c732d005ad215518e8c483388b8227f4dd52
SHA5126ba4fe44398b89a82804013151a73f4aa00be9468d76cf2b40fe7a410c4d646c84ab10f2561fed694ee0b3a24bd50f46a75427097996be171a83f671196b0cbc
-
Filesize
40KB
MD5a182561a527f929489bf4b8f74f65cd7
SHA18cd6866594759711ea1836e86a5b7ca64ee8911f
SHA25642aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914
SHA5129bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558
-
Filesize
2.3MB
MD5ffabcc262fb699998b6191d7656c8805
SHA1fd3ea79a8550b14e9cc75fb831fd7a141964a714
SHA256f46e4a7de978baceec5f64cbc9fa1f1e772e864fa3310045cd19d77264698cde
SHA51279b2e21a9111b16b0f67ae5d1cc40a25773b847d3f4cf78711a8dfd8b67c30beec332ed65ac008c9dca62c84de891eff20d7c6050bc868bce77a17fe56da61ba
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
3.1MB
MD52b3dca9f3f8f7b379021a041b731aed3
SHA1e8fc7d977c0a76e25b1e69f4398a10fef83918d0
SHA256ec798a7883c65756c2d8c19fdd14a24353ab0584e2d7cf4920a798938272cc24
SHA512ce65473353253347788ed1d0641a6c6a3be815c50bd1046c1aa8bf827f48c0f09b61560f3aa3eeb8f641afa6d7a870dd68834615b3fe81b6f62a9ffee946f98a
-
Filesize
503KB
MD5d60c9e070239f8c240aaa6d8832e11ef
SHA1aaac23a338a91505c56c3057d22a14bf190a2795
SHA256493f1bd7227c4ee9430f8ad226e929908996b97a28f578a850e9b26c393ad2d2
SHA512d70cf79dec352bd965f8506ad989375642a8931300d5497724c82882ae4d57ccc314d4e6b24c398075af3deb4433207522106647e70e74c90e56791e20bca42c
-
Filesize
165B
MD5403a3a01e326692688e6e5aef522801a
SHA1a36c83ec932edd369d9f6fc991d376d893896b29
SHA256e09fecc0a7cbfc7d09ecaf8ba7ff8e41a5cfc00a1170e11b50ce6a368ebfe17c
SHA5124edcb3912f16a94ef8d52d2949a0b73646ac4fbbbc6736b57cb3d38704042ae057a59ef8bff8f369083b165f6e75039199b02ce4f80dde5e321e33fc2233cde5
-
Filesize
150B
MD508e7c34b4d104e98a3bc1638652bc943
SHA1b022caefd6f4806881811349e63bc485c0cefc37
SHA2564c6b90ef6276ac1b49e7bc34fa4e1a45812910fb41281de1ddc831fa2931b3b5
SHA512a32b4a29ddb72e2b1fda530bd9b572a55fb6b4641bd7c758fd722d7aa48e00c75e6e92d0d2b33e7061cdc67954ef082c2d6b6a9bf8e7ec28f56849b10d9e388a
-
Filesize
150B
MD57e85cc6597252080f2f9cd3c222e5085
SHA1a49d0338f18cd00b60f79d187a7843e4d0593db8
SHA256c294a10e1e95dbf4da024ef0e19646f98a76f6bf2d8bb7c983e76fbb2a8c07f9
SHA5126adda059745c2cf2eeba9e26f536e3aa88dd1fe606209c0d293889b36bab992341d80204c5fb14e67680a3629fd50ab866ee7e23188735cc11ee809aaa6d78fe
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
Filesize
1.6MB
MD5579fd24f4cacc972f63f47214f9c3c34
SHA120be9c6e9aa29d57b670d6809ffad1786a8508e5
SHA256f80bd8eb42194df565e3152d35bad6a40fdae70e221e9e66873587bffb73d64b
SHA5121a8f7918b931fa10cbc4b47a88405c0b28255360ac27e1d44ba00554186ed20139fbaaa278a362c34a20083f4fff30dc83876c3f382397f831f781fb6a9aab91
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin
Filesize6KB
MD5f0cf2267f56199baf5b214fbfc6ae7a1
SHA1417d0483d3fa39ec3b2d047b61d61715416f586c
SHA2566621eac92bdb019b966cb03763681f4144ee53b374ec436065efd276224704e9
SHA51254d3712c01703bab7d27f0f378c22d056130444ea6ea1d2360906e368e2d9dace0d0564f5199257c3edbfb3d1e661fd9519b1df07d032e52c8972df778942fc3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin
Filesize8KB
MD5efa9bbd6098b661e43fb3bd3435b8f72
SHA1bc979d76dedd119734fa918fe3d08332e65d2c9c
SHA256f49e9074fb4f1a3af73bd5f17f12a9d567dbf3c3599dda71373688a25772750d
SHA51231823a38543fb0b6243fe5343bff61fd09545bf116de28d5c478c9838a9c01680adf05af8bf0fe6026da0cbe4d99f6bd9b4015c1ade601a3898b80e327033f90
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin
Filesize17KB
MD5e017db5a133e2002b297a364b1395d14
SHA1747b5146a0c6264ee4b0fd710919ea091e8639d0
SHA256b6cf12113ef9c550386f22b416b773ed00f847186b12b77de9eeb82659706e86
SHA512e0f84ec188d0616e6aed1e7e32c410ac111ca572dab80f6823edaad558f6280ec7ff76c9b32e6314b83b35763fe7261506bf6acca5671070386b974751338aab
-
Filesize
224KB
MD59662ad8ef6a3296dde96c6eddd6e5e96
SHA117a6059321f422d2fbda8c5d448d652090fcc518
SHA2560f3766f0838cea1ec29202debc23f24fb86e6cb0568f6df8e459b21a77280e5b
SHA5129c4a1e96ab4f28679f4c9ed216c3c220ca7095c7e511ff44f6a3f85e43f49aa461527dc4c617827ad772c49993f97e37fd72eb0f32297de3c02e144ec0a7d8e4
-
Filesize
256KB
MD591e96a9b67487ab85f63bfafb3cff9c5
SHA147f498026455ba4b3c9fb90e917f46f9c0d889e6
SHA25674848c457189db709eab50b29d19f10bb54b475e0ac7977253b801014cadb01b
SHA512ae8b2ab0e7fb031f76be0cc6a555fa2c5990dae5e0ec6b56a31b3bad6fb0960af9ff6b037ca3e250ee9b4412b1fc18dc3364ef157c62f2aafd2166c0a33d5985
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD55a0a45e2cf902c2189c42bb30d65d916
SHA113fa005703d4b7303bf95c3ef691e5687ae3bd49
SHA256e34269749425c63cdb3eb199befb2f0eb04f9215f9d129eede1c9985d095b001
SHA5121cd75e35f42b3ead119ef9f7c7ac33a0de9a12f29d94ea6895760c2ea3bcc9a7e589dd63f10853af18ae6520c38cb3d12cb3e2339eee5308cf44cd55ae64acad
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize27KB
MD565288c141e3933198616129e518909c8
SHA18e0f79852f856b51318675aa4052788141fb7982
SHA256183ce9c67003814ca38db586d7a83c3599de721205a53ca2b55e6a9a7a1903c4
SHA51277fe72185f0bd5d2c9a7e877ac24b13db46ddb747363a7685b43a0abcb5201edddcec8e944a9ffc40bc2c254b7711deef594fca986f17cc27a2cf092730f2c96
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD553e9ea8702eb0e3137574dac02495b09
SHA1f1dfbae605d46891bf2d7d502090900b409bf4e1
SHA2569fd7ffc1321244354261a891c15e54a0a0568419132b4ffd737775c151460c8b
SHA5123ef626a175c99c62f37dba1e1a6839c60ef2f406326d57115875f7a23c870836744fc985f291c4140f0f21d5b62e676f637296ae5161b19b4a07f168b4a29a8a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD57dc7e67abe6ac8221acad53bae05b833
SHA16c532309685a6aca211b48feee6340ff19455a2c
SHA256cb4d2f88adc46dce46da239e04d4c327a13af0794d61dcfaec03360b1e9c2890
SHA5126dd98ca1a20a122c8192f28b68701c39d9b38995b57edbd174642193f1051d7ee597a0b9fd5a9ef6cbcfb1910f4bc15d09987c411bb9e1f22063d68223131073
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\3da6d979-fd41-4c9c-8872-d7ed65f85829
Filesize982B
MD5873182329347b99e80025d4feafd522d
SHA13d12f0b033ab8508e1c5661f1eb0e7e32f1c319b
SHA25668ec14861c94ef816053591b62ac6cd59a21403dae7727db9658f5d457ad9c83
SHA5127753b2fc71c01e4a19c6d82ebb1fa712b8b80ee36e3906241780bdc14fa3bbc6a40fcba27d494131375d5847ec644388e3e3584068ce731bd8d147794cae7dc8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\76bba098-114d-4ac8-a5a8-3e7aa8294538
Filesize671B
MD5bae38ebd401f6bde84a6e1b1805411fc
SHA1e25185f9ed9b95364ad186ff2516aa42d8db7962
SHA25644a18fdd59eff74ae197da34af7181e02a3afd2b37286409fcac4ac1cd840922
SHA512b09912b28666ceed3e312d2256528285a185a7897105dd22543355d971b9770fef8a304bab54d61d5e5c8489983c883191d3fabb7f3f978014fd254a804ead76
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\ef26d9fd-7392-4c81-bd22-1be738b9d5f4
Filesize27KB
MD5c0520634c41b175aefcfadbad2141580
SHA19f59456fe3667eabc6879108100024f64b9ed2b5
SHA256f46a6791ad87ed2325c3cdf8a10e39bd6be7043b59c9da3d4bd9f5098e31e24c
SHA512bc41948b0349cae6ac8f2bf27b555a02bc65cbf8b68e39fb478b93e13d97df9cd55e9e88e5736fd61e838a57b9998a4c9c8ad5145db1ce37ac2c1f95e19d32ac
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
1.4MB
MD5c9b100834df5e658bc788da891495293
SHA1568b6f0f05dbdba3e71cec29d23c5e46af655872
SHA256756bc370cc69b02c8352533c0963400cf673a8f9fa28623d615c379946698379
SHA512de3c28bd3b0449a23d54dc08a6774ee43281318ab9f0fa4f30c1059cc019ee942340dbc41619d86210ee06cdeab292575fed0d3994efcffb98b964ee7a9cc268
-
Filesize
11KB
MD5030491dbdefe4ab6266a329dbcc016d3
SHA1742c826ce890279e2b12c38f7cf2d10a7eb2eb0d
SHA2567bc19b9853676523b3a0cb2868da248709c4b19fe2eafc0d681996b31817758c
SHA512a8d69424076a23e9821a9b63aec4400ee2a291ecf0dcc34d406ec93564c57b6acf7ea9cff651b371f5d0f68790c84dd00ec4721f649706d7fb7c957e7a07728b
-
Filesize
12KB
MD5b117c3e29200663d214d4d1f9e55c7d1
SHA10cb4ad8cf1b1dbcfac1b3dab223d1bf5eabe13f2
SHA256f7737bce84eb0e5803c14dd9605b88f2fa219ce0ec14bff2b9b3172d1e5b141c
SHA512a8a0e8522d7b4b6708b013277df7c8b3cae73e1744aee86f4705b8bd0c946c4f6e5f3540731105acb02bb21da034ec8183ad18b0738923bddb7f792a86d34294
-
Filesize
10KB
MD51a04eff160b81aa1f2ec97d108d0dadb
SHA18350b22bac42250878737762d39231757635bd7f
SHA2562e03ee2f166d860c6ba49ef787f6d1ff753b7d531e4f42726d4f2aba19d09882
SHA512a608c334c91e6e7c3a8794e64c5afc5a799cf090cdb1502c2e40845db5df1ffc9a67f719baeea132ca4dae78532b46ffdf5efafaa6236cf92d26abf4e96bfb80
-
Filesize
256KB
MD58fdf47e0ff70c40ed3a17014aeea4232
SHA1e6256a0159688f0560b015da4d967f41cbf8c9bd
SHA256ed9884bac608c06b7057037cc91d90e4ae5f74dd2dbce2af476699c6d4492d82
SHA512bd69d092ed4f9c5e1f24eaf5ec79fb316469d53849dc798fae0fcba5e90869b77ee924c23cc6f692198ff25827ab60ad47bb46cadd6e0aadde7731cbafb013be
-
Filesize
18KB
MD5f3edff85de5fd002692d54a04bcb1c09
SHA14c844c5b0ee7cb230c9c28290d079143e00cb216
SHA256caf29650446db3842e1c1e8e5e1bafadaf90fc82c5c37b9e2c75a089b7476131
SHA512531d920e2567f58e8169afc786637c1a0f7b9b5c27b27b5f0eddbfc3e00cecd7bea597e34061d836647c5f8c7757f2fe02952a9793344e21b39ddd4bf7985f9d