Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-12-2024 16:44
Static task
static1
Behavioral task
behavioral1
Sample
04ccac472e7f9760a547e7bbb721c713f00021fcc74a59637c198f4bbee06c2d.exe
Resource
win10v2004-20241007-en
General
-
Target
04ccac472e7f9760a547e7bbb721c713f00021fcc74a59637c198f4bbee06c2d.exe
-
Size
6.9MB
-
MD5
fcc5c005c3ccbddee8bee4dc5ca441e2
-
SHA1
d597f7ec6f9309af338b0bbb2234f9a0a5ca1a92
-
SHA256
04ccac472e7f9760a547e7bbb721c713f00021fcc74a59637c198f4bbee06c2d
-
SHA512
f9f2ac3fa052093f622989ae40bd4c06871853e507064fd92760b54e0e4973b0cc77339bf4dda99959c083bb34c2a557a701b8161cd16340a4f6fc8d3340ff3a
-
SSDEEP
196608:qZjdOmZw7qclSdCdbM8evA0U4YJtJq8Y4KM:Ej1ZwOcniTA02Bl
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
https://atten-supporse.biz/api
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://atten-supporse.biz/api
https://se-blurry.biz/api
https://zinc-sneark.biz/api
https://classify-shed.biz/api
Signatures
-
Amadey family
-
Asyncrat family
-
Gcleaner family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4U637G.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4U637G.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a984c64bc8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a984c64bc8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a984c64bc8.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4U637G.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4U637G.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4U637G.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4U637G.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a984c64bc8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a984c64bc8.exe -
Stealc family
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral1/memory/7036-2398-0x0000000000400000-0x0000000000704000-memory.dmp family_stormkitty -
Stormkitty family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 4644 created 6420 4644 callmobile.exe 164 -
resource yara_rule behavioral1/memory/7036-2398-0x0000000000400000-0x0000000000704000-memory.dmp VenomRAT -
Venomrat family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 12 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b36aa0d711.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4U637G.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f26daf7d99.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 81714f8964.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a984c64bc8.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1J17n3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2U9131.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3w55K.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 157 5736 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 6576 powershell.exe 5736 powershell.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 24 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4U637G.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f26daf7d99.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 81714f8964.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a984c64bc8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1J17n3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3w55K.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 81714f8964.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a984c64bc8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3w55K.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4U637G.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f26daf7d99.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b36aa0d711.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1J17n3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2U9131.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2U9131.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b36aa0d711.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 1J17n3.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 25 IoCs
pid Process 2440 f4R43.exe 1752 e0b81.exe 4564 1J17n3.exe 1824 skotes.exe 448 2U9131.exe 1848 skotes.exe 3388 3w55K.exe 1680 4U637G.exe 4412 B3vKvPi.exe 4644 callmobile.exe 3144 0tClIDb.exe 2280 0tClIDb.exe 2388 vdGy6gA.exe 4428 ziNGMDa.exe 5104 ziNGMDa.exe 1376 f26daf7d99.exe 3264 81714f8964.exe 3052 bad0f0d4e8.exe 1960 a984c64bc8.exe 5212 b36aa0d711.exe 6208 downloaded_file.exe 6568 skotes.exe 6692 WindosCPUsystem.exe 456 Wihnup.exe 4976 skotes.exe -
Identifies Wine through registry keys 2 TTPs 12 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 4U637G.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine f26daf7d99.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 81714f8964.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine a984c64bc8.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine b36aa0d711.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 1J17n3.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 3w55K.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 2U9131.exe -
Loads dropped DLL 9 IoCs
pid Process 5104 ziNGMDa.exe 5104 ziNGMDa.exe 5104 ziNGMDa.exe 5104 ziNGMDa.exe 5104 ziNGMDa.exe 5104 ziNGMDa.exe 5104 ziNGMDa.exe 5104 ziNGMDa.exe 5104 ziNGMDa.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4U637G.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4U637G.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a984c64bc8.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" e0b81.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" B3vKvPi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\f26daf7d99.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013469001\\f26daf7d99.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\81714f8964.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013470001\\81714f8964.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bad0f0d4e8.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013471001\\bad0f0d4e8.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\a984c64bc8.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013472001\\a984c64bc8.exe" skotes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 04ccac472e7f9760a547e7bbb721c713f00021fcc74a59637c198f4bbee06c2d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" f4R43.exe -
Power Settings 1 TTPs 4 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 2264 powercfg.exe 4024 powercfg.exe 2324 powercfg.exe 1900 powercfg.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0009000000023d38-1469.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
pid Process 4564 1J17n3.exe 1824 skotes.exe 448 2U9131.exe 1848 skotes.exe 3388 3w55K.exe 1680 4U637G.exe 1376 f26daf7d99.exe 3264 81714f8964.exe 1960 a984c64bc8.exe 5212 b36aa0d711.exe 6568 skotes.exe 4976 skotes.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3144 set thread context of 2280 3144 0tClIDb.exe 111 PID 4644 set thread context of 7036 4644 callmobile.exe 168 PID 6692 set thread context of 1412 6692 WindosCPUsystem.exe 192 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1J17n3.exe -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral1/files/0x0009000000023cb1-1314.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 6 IoCs
pid pid_target Process procid_target 4324 448 WerFault.exe 87 1924 2280 WerFault.exe 111 1848 1376 WerFault.exe 123 1172 2388 WerFault.exe 112 6840 2388 WerFault.exe 112 6328 5212 WerFault.exe 157 -
System Location Discovery: System Language Discovery 1 TTPs 32 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4U637G.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e0b81.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0tClIDb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vdGy6gA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wihnup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f4R43.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1J17n3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3w55K.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0tClIDb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language callmobile.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f26daf7d99.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language downloaded_file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 04ccac472e7f9760a547e7bbb721c713f00021fcc74a59637c198f4bbee06c2d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bad0f0d4e8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a984c64bc8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b36aa0d711.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage bad0f0d4e8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2U9131.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 81714f8964.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language bad0f0d4e8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4516 timeout.exe -
Kills process with taskkill 5 IoCs
pid Process 2368 taskkill.exe 2084 taskkill.exe 832 taskkill.exe 5084 taskkill.exe 732 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1624 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4564 1J17n3.exe 4564 1J17n3.exe 1824 skotes.exe 1824 skotes.exe 448 2U9131.exe 448 2U9131.exe 1848 skotes.exe 1848 skotes.exe 3388 3w55K.exe 3388 3w55K.exe 1680 4U637G.exe 1680 4U637G.exe 1680 4U637G.exe 1680 4U637G.exe 1376 f26daf7d99.exe 1376 f26daf7d99.exe 3264 81714f8964.exe 3264 81714f8964.exe 3052 bad0f0d4e8.exe 3052 bad0f0d4e8.exe 1960 a984c64bc8.exe 1960 a984c64bc8.exe 1960 a984c64bc8.exe 1960 a984c64bc8.exe 1960 a984c64bc8.exe 3052 bad0f0d4e8.exe 3052 bad0f0d4e8.exe 5212 b36aa0d711.exe 5212 b36aa0d711.exe 5736 powershell.exe 5736 powershell.exe 5736 powershell.exe 6576 powershell.exe 6576 powershell.exe 6568 skotes.exe 6568 skotes.exe 6576 powershell.exe 4644 callmobile.exe 4644 callmobile.exe 7036 MSBuild.exe 7036 MSBuild.exe 7036 MSBuild.exe 7036 MSBuild.exe 7036 MSBuild.exe 7036 MSBuild.exe 7036 MSBuild.exe 7036 MSBuild.exe 7036 MSBuild.exe 7036 MSBuild.exe 7036 MSBuild.exe 7036 MSBuild.exe 7036 MSBuild.exe 7036 MSBuild.exe 7036 MSBuild.exe 7036 MSBuild.exe 7036 MSBuild.exe 7036 MSBuild.exe 7036 MSBuild.exe 7036 MSBuild.exe 6692 WindosCPUsystem.exe 6692 WindosCPUsystem.exe 6692 WindosCPUsystem.exe 6692 WindosCPUsystem.exe 6692 WindosCPUsystem.exe -
Suspicious behavior: MapViewOfSection 9 IoCs
pid Process 6208 downloaded_file.exe 6208 downloaded_file.exe 6208 downloaded_file.exe 6420 explorer.exe 6420 explorer.exe 6420 explorer.exe 6420 explorer.exe 6420 explorer.exe 6420 explorer.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 1680 4U637G.exe Token: SeDebugPrivilege 4644 callmobile.exe Token: SeDebugPrivilege 2368 taskkill.exe Token: SeDebugPrivilege 2084 taskkill.exe Token: SeDebugPrivilege 832 taskkill.exe Token: SeDebugPrivilege 5084 taskkill.exe Token: SeDebugPrivilege 732 taskkill.exe Token: SeDebugPrivilege 316 firefox.exe Token: SeDebugPrivilege 316 firefox.exe Token: SeDebugPrivilege 1960 a984c64bc8.exe Token: SeDebugPrivilege 5736 powershell.exe Token: SeDebugPrivilege 6576 powershell.exe Token: SeDebugPrivilege 4644 callmobile.exe Token: SeDebugPrivilege 7036 MSBuild.exe Token: SeShutdownPrivilege 2264 powercfg.exe Token: SeCreatePagefilePrivilege 2264 powercfg.exe Token: SeShutdownPrivilege 4024 powercfg.exe Token: SeCreatePagefilePrivilege 4024 powercfg.exe Token: SeShutdownPrivilege 2324 powercfg.exe Token: SeCreatePagefilePrivilege 2324 powercfg.exe Token: SeShutdownPrivilege 1900 powercfg.exe Token: SeCreatePagefilePrivilege 1900 powercfg.exe Token: SeLockMemoryPrivilege 1412 explorer.exe Token: SeLockMemoryPrivilege 1412 explorer.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4564 1J17n3.exe 3052 bad0f0d4e8.exe 3052 bad0f0d4e8.exe 3052 bad0f0d4e8.exe 3052 bad0f0d4e8.exe 3052 bad0f0d4e8.exe 3052 bad0f0d4e8.exe 3052 bad0f0d4e8.exe 3052 bad0f0d4e8.exe 3052 bad0f0d4e8.exe 316 firefox.exe 316 firefox.exe 316 firefox.exe 316 firefox.exe 316 firefox.exe 316 firefox.exe 316 firefox.exe 316 firefox.exe 316 firefox.exe 316 firefox.exe 316 firefox.exe 316 firefox.exe 316 firefox.exe 316 firefox.exe 316 firefox.exe 316 firefox.exe 316 firefox.exe 316 firefox.exe 316 firefox.exe 316 firefox.exe 316 firefox.exe 3052 bad0f0d4e8.exe 3052 bad0f0d4e8.exe 3052 bad0f0d4e8.exe 1412 explorer.exe 1412 explorer.exe 1412 explorer.exe 1412 explorer.exe 1412 explorer.exe 1412 explorer.exe 1412 explorer.exe 1412 explorer.exe 1412 explorer.exe 1412 explorer.exe 1412 explorer.exe 1412 explorer.exe 1412 explorer.exe 1412 explorer.exe 1412 explorer.exe 1412 explorer.exe 1412 explorer.exe 1412 explorer.exe 1412 explorer.exe 1412 explorer.exe 1412 explorer.exe 1412 explorer.exe 1412 explorer.exe 1412 explorer.exe 1412 explorer.exe 1412 explorer.exe 1412 explorer.exe 1412 explorer.exe 1412 explorer.exe 1412 explorer.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 3052 bad0f0d4e8.exe 3052 bad0f0d4e8.exe 3052 bad0f0d4e8.exe 3052 bad0f0d4e8.exe 3052 bad0f0d4e8.exe 3052 bad0f0d4e8.exe 3052 bad0f0d4e8.exe 3052 bad0f0d4e8.exe 3052 bad0f0d4e8.exe 316 firefox.exe 316 firefox.exe 316 firefox.exe 316 firefox.exe 316 firefox.exe 316 firefox.exe 316 firefox.exe 316 firefox.exe 316 firefox.exe 316 firefox.exe 316 firefox.exe 316 firefox.exe 316 firefox.exe 316 firefox.exe 316 firefox.exe 316 firefox.exe 316 firefox.exe 316 firefox.exe 316 firefox.exe 316 firefox.exe 3052 bad0f0d4e8.exe 3052 bad0f0d4e8.exe 3052 bad0f0d4e8.exe 1412 explorer.exe 1412 explorer.exe 1412 explorer.exe 1412 explorer.exe 1412 explorer.exe 1412 explorer.exe 1412 explorer.exe 1412 explorer.exe 1412 explorer.exe 1412 explorer.exe 1412 explorer.exe 1412 explorer.exe 1412 explorer.exe 1412 explorer.exe 1412 explorer.exe 1412 explorer.exe 1412 explorer.exe 1412 explorer.exe 1412 explorer.exe 1412 explorer.exe 1412 explorer.exe 1412 explorer.exe 1412 explorer.exe 1412 explorer.exe 1412 explorer.exe 1412 explorer.exe 1412 explorer.exe 1412 explorer.exe 1412 explorer.exe 1412 explorer.exe 1412 explorer.exe 1412 explorer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 316 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4596 wrote to memory of 2440 4596 04ccac472e7f9760a547e7bbb721c713f00021fcc74a59637c198f4bbee06c2d.exe 83 PID 4596 wrote to memory of 2440 4596 04ccac472e7f9760a547e7bbb721c713f00021fcc74a59637c198f4bbee06c2d.exe 83 PID 4596 wrote to memory of 2440 4596 04ccac472e7f9760a547e7bbb721c713f00021fcc74a59637c198f4bbee06c2d.exe 83 PID 2440 wrote to memory of 1752 2440 f4R43.exe 84 PID 2440 wrote to memory of 1752 2440 f4R43.exe 84 PID 2440 wrote to memory of 1752 2440 f4R43.exe 84 PID 1752 wrote to memory of 4564 1752 e0b81.exe 85 PID 1752 wrote to memory of 4564 1752 e0b81.exe 85 PID 1752 wrote to memory of 4564 1752 e0b81.exe 85 PID 4564 wrote to memory of 1824 4564 1J17n3.exe 86 PID 4564 wrote to memory of 1824 4564 1J17n3.exe 86 PID 4564 wrote to memory of 1824 4564 1J17n3.exe 86 PID 1752 wrote to memory of 448 1752 e0b81.exe 87 PID 1752 wrote to memory of 448 1752 e0b81.exe 87 PID 1752 wrote to memory of 448 1752 e0b81.exe 87 PID 2440 wrote to memory of 3388 2440 f4R43.exe 96 PID 2440 wrote to memory of 3388 2440 f4R43.exe 96 PID 2440 wrote to memory of 3388 2440 f4R43.exe 96 PID 4596 wrote to memory of 1680 4596 04ccac472e7f9760a547e7bbb721c713f00021fcc74a59637c198f4bbee06c2d.exe 99 PID 4596 wrote to memory of 1680 4596 04ccac472e7f9760a547e7bbb721c713f00021fcc74a59637c198f4bbee06c2d.exe 99 PID 4596 wrote to memory of 1680 4596 04ccac472e7f9760a547e7bbb721c713f00021fcc74a59637c198f4bbee06c2d.exe 99 PID 1824 wrote to memory of 4412 1824 skotes.exe 102 PID 1824 wrote to memory of 4412 1824 skotes.exe 102 PID 4412 wrote to memory of 4644 4412 B3vKvPi.exe 103 PID 4412 wrote to memory of 4644 4412 B3vKvPi.exe 103 PID 4412 wrote to memory of 4644 4412 B3vKvPi.exe 103 PID 1824 wrote to memory of 3144 1824 skotes.exe 107 PID 1824 wrote to memory of 3144 1824 skotes.exe 107 PID 1824 wrote to memory of 3144 1824 skotes.exe 107 PID 3144 wrote to memory of 2280 3144 0tClIDb.exe 111 PID 3144 wrote to memory of 2280 3144 0tClIDb.exe 111 PID 3144 wrote to memory of 2280 3144 0tClIDb.exe 111 PID 3144 wrote to memory of 2280 3144 0tClIDb.exe 111 PID 3144 wrote to memory of 2280 3144 0tClIDb.exe 111 PID 3144 wrote to memory of 2280 3144 0tClIDb.exe 111 PID 3144 wrote to memory of 2280 3144 0tClIDb.exe 111 PID 3144 wrote to memory of 2280 3144 0tClIDb.exe 111 PID 3144 wrote to memory of 2280 3144 0tClIDb.exe 111 PID 3144 wrote to memory of 2280 3144 0tClIDb.exe 111 PID 1824 wrote to memory of 2388 1824 skotes.exe 112 PID 1824 wrote to memory of 2388 1824 skotes.exe 112 PID 1824 wrote to memory of 2388 1824 skotes.exe 112 PID 1824 wrote to memory of 4428 1824 skotes.exe 119 PID 1824 wrote to memory of 4428 1824 skotes.exe 119 PID 4428 wrote to memory of 5104 4428 ziNGMDa.exe 121 PID 4428 wrote to memory of 5104 4428 ziNGMDa.exe 121 PID 1824 wrote to memory of 1376 1824 skotes.exe 123 PID 1824 wrote to memory of 1376 1824 skotes.exe 123 PID 1824 wrote to memory of 1376 1824 skotes.exe 123 PID 1824 wrote to memory of 3264 1824 skotes.exe 127 PID 1824 wrote to memory of 3264 1824 skotes.exe 127 PID 1824 wrote to memory of 3264 1824 skotes.exe 127 PID 1824 wrote to memory of 3052 1824 skotes.exe 128 PID 1824 wrote to memory of 3052 1824 skotes.exe 128 PID 1824 wrote to memory of 3052 1824 skotes.exe 128 PID 3052 wrote to memory of 2368 3052 bad0f0d4e8.exe 130 PID 3052 wrote to memory of 2368 3052 bad0f0d4e8.exe 130 PID 3052 wrote to memory of 2368 3052 bad0f0d4e8.exe 130 PID 3052 wrote to memory of 2084 3052 bad0f0d4e8.exe 132 PID 3052 wrote to memory of 2084 3052 bad0f0d4e8.exe 132 PID 3052 wrote to memory of 2084 3052 bad0f0d4e8.exe 132 PID 3052 wrote to memory of 832 3052 bad0f0d4e8.exe 134 PID 3052 wrote to memory of 832 3052 bad0f0d4e8.exe 134 PID 3052 wrote to memory of 832 3052 bad0f0d4e8.exe 134 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\04ccac472e7f9760a547e7bbb721c713f00021fcc74a59637c198f4bbee06c2d.exe"C:\Users\Admin\AppData\Local\Temp\04ccac472e7f9760a547e7bbb721c713f00021fcc74a59637c198f4bbee06c2d.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\f4R43.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\f4R43.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\e0b81.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\e0b81.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1J17n3.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1J17n3.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Users\Admin\AppData\Local\Temp\1013210001\B3vKvPi.exe"C:\Users\Admin\AppData\Local\Temp\1013210001\B3vKvPi.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\callmobile.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\callmobile.exe7⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4644
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013229001\0tClIDb.exe"C:\Users\Admin\AppData\Local\Temp\1013229001\0tClIDb.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Users\Admin\AppData\Local\Temp\1013229001\0tClIDb.exe"C:\Users\Admin\AppData\Local\Temp\1013229001\0tClIDb.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2280 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2280 -s 14048⤵
- Program crash
PID:1924
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013334001\vdGy6gA.exe"C:\Users\Admin\AppData\Local\Temp\1013334001\vdGy6gA.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2388 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2388 -s 13847⤵
- Program crash
PID:1172
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2388 -s 14127⤵
- Program crash
PID:6840
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013433001\ziNGMDa.exe"C:\Users\Admin\AppData\Local\Temp\1013433001\ziNGMDa.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Users\Admin\AppData\Local\Temp\1013433001\ziNGMDa.exe"C:\Users\Admin\AppData\Local\Temp\1013433001\ziNGMDa.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5104
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013469001\f26daf7d99.exe"C:\Users\Admin\AppData\Local\Temp\1013469001\f26daf7d99.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1376 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1376 -s 15927⤵
- Program crash
PID:1848
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013470001\81714f8964.exe"C:\Users\Admin\AppData\Local\Temp\1013470001\81714f8964.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3264
-
-
C:\Users\Admin\AppData\Local\Temp\1013471001\bad0f0d4e8.exe"C:\Users\Admin\AppData\Local\Temp\1013471001\bad0f0d4e8.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2368
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2084
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:832
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5084
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:732
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵PID:836
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:316 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2076 -parentBuildID 20240401114208 -prefsHandle 1988 -prefMapHandle 1980 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {0d9aefea-05bf-4b09-840c-2b52834f07ac} 316 "\\.\pipe\gecko-crash-server-pipe.316" gpu9⤵PID:4484
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2508 -parentBuildID 20240401114208 -prefsHandle 2476 -prefMapHandle 2472 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {863d299f-3763-468b-9542-eaf11bba6155} 316 "\\.\pipe\gecko-crash-server-pipe.316" socket9⤵PID:3088
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3160 -childID 1 -isForBrowser -prefsHandle 3068 -prefMapHandle 3220 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {53323f65-ef39-41d7-82e7-1825755fb726} 316 "\\.\pipe\gecko-crash-server-pipe.316" tab9⤵PID:4940
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4108 -childID 2 -isForBrowser -prefsHandle 4100 -prefMapHandle 4056 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cb8e39a0-465d-4d65-8df6-a0a409343666} 316 "\\.\pipe\gecko-crash-server-pipe.316" tab9⤵PID:1968
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4568 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4688 -prefMapHandle 4684 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fa515623-0297-4002-a80f-3c8a6f1d7fd1} 316 "\\.\pipe\gecko-crash-server-pipe.316" utility9⤵
- Checks processor information in registry
PID:6012
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5048 -childID 3 -isForBrowser -prefsHandle 4608 -prefMapHandle 5000 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {95ff2149-8f6f-4268-98ac-0b7e930ce9ef} 316 "\\.\pipe\gecko-crash-server-pipe.316" tab9⤵PID:7096
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5396 -childID 4 -isForBrowser -prefsHandle 5316 -prefMapHandle 5320 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2098bb3f-5c57-421d-9d44-26b543a96c61} 316 "\\.\pipe\gecko-crash-server-pipe.316" tab9⤵PID:7156
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5504 -childID 5 -isForBrowser -prefsHandle 5124 -prefMapHandle 5584 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c9ad121e-a1fd-482b-b894-b35eee416d31} 316 "\\.\pipe\gecko-crash-server-pipe.316" tab9⤵PID:5308
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013472001\a984c64bc8.exe"C:\Users\Admin\AppData\Local\Temp\1013472001\a984c64bc8.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1960
-
-
C:\Users\Admin\AppData\Local\Temp\1013473001\b36aa0d711.exe"C:\Users\Admin\AppData\Local\Temp\1013473001\b36aa0d711.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5212 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5212 -s 17887⤵
- Program crash
PID:6328
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1013474041\2EW05w7.ps1"6⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5736 -
C:\Users\Admin\AppData\Local\Temp\downloaded_file.exe"C:\Users\Admin\AppData\Local\Temp\downloaded_file.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:6208 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:\ProgramData\WindowsSystem\WindowsSystem.exe','C:\ProgramData\WindowsSystem1\WindosCPUsystem.exe'8⤵PID:6404
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Add-MpPreference -ExclusionPath 'C:\ProgramData\WindowsSystem\WindowsSystem.exe','C:\ProgramData\WindowsSystem1\WindosCPUsystem.exe'9⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6576
-
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"8⤵
- Suspicious behavior: MapViewOfSection
PID:6420 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"9⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:7036 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Wihnup" /tr '"C:\Users\Admin\AppData\Roaming\Wihnup.exe"' & exit10⤵
- System Location Discovery: System Language Discovery
PID:2416 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Wihnup" /tr '"C:\Users\Admin\AppData\Roaming\Wihnup.exe"'11⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1624
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpB91A.tmp.bat""10⤵
- System Location Discovery: System Language Discovery
PID:1372 -
C:\Windows\SysWOW64\timeout.exetimeout 311⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4516
-
-
C:\Users\Admin\AppData\Roaming\Wihnup.exe"C:\Users\Admin\AppData\Roaming\Wihnup.exe"11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:456
-
-
-
-
C:\Windows\EXPLORER.EXEC:\Windows\EXPLORER.EXE {DF4EE2DA-C20C-4BBF-97D5-4B94E23FE1C8}9⤵PID:4968
-
-
C:\ProgramData\WindowsSystem1\WindosCPUsystem.exe"C:\ProgramData\WindowsSystem1\WindosCPUsystem.exe" ""9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:6692 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 010⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:2264
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 010⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:4024
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 010⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:1900
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 010⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:2324
-
-
C:\Windows\explorer.exeexplorer.exe10⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1412
-
-
-
C:\Windows\EXPLORER.EXEC:\Windows\EXPLORER.EXE {DF4EE2DA-C20C-4BBF-97D5-4B94E23FE1C8}9⤵PID:6716
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2U9131.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2U9131.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:448 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 448 -s 15885⤵
- Program crash
PID:4324
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3w55K.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3w55K.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3388
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4U637G.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4U637G.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1680
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1848
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 448 -ip 4481⤵PID:3148
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2280 -ip 22801⤵PID:724
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1376 -ip 13761⤵PID:1568
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2388 -ip 23881⤵PID:4320
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 2388 -ip 23881⤵PID:4192
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6568
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 5212 -ip 52121⤵PID:5872
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4976
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Power Settings
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.8MB
MD556ec5472231866630749ccf6977c4fbd
SHA103c5fe2e0dd49a554b354e7ef26f794f4aa86e9d
SHA256e19905020c9685a68c3f4c9f62f57e4b21bc8dcfad567c89b0b37b42a120182b
SHA51246274dfec96406c4bd101c6207c813e03b965e9f9a6b1b57147bcfb7d24a9180002c3b8001ac85a91dfd0b75f0aabba119e455d52fa847a751c32f00e3ad4753
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
19KB
MD5a97c902d5c004e4655b7b3c1c8c8105c
SHA16de53259e42a05269c4680ded500d226ac0e51a8
SHA25677b98e4f6c294a9c42f339514949b6261aa9a6fac0ee100d91748715eeaea8a4
SHA5127f2b6f05e69a9b7256804046dd654b4597232811fe3ecbd785eb16f4f5344c439de003847ef246311d37220eab22b0c8c6da171665a17baf708c72c4e6c5ca9d
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ws2kncw.default-release\activity-stream.discovery_stream.json
Filesize19KB
MD5db0bf7ed4ccec0de379e469ef86853ff
SHA1a61e45ad66b759853cabecbf77c797421c7729bf
SHA25691304250795424d9e676e9cd9ed3a16dd1bb2f4725978168f751737b970a7674
SHA51207f4e7be56630a8ca91708b75953ab7d2c6cfb05e5a822d9ef394349167a2373e9f90f35b5de88e0ea7f7a1092dcecbbcc39a2b9119830091156f6d821109970
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ws2kncw.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
2.2MB
MD53541c1ac26eb5bbb87f01c20fd9f8824
SHA1bf5d136c911491f59bdeb3bf37b8f1a155fd3a97
SHA256b7cd929ce4d0fa849eeab8a216e1333f63c7d3530da674f163efab4dae3439d1
SHA512babc17723d2389919acd96f977821d57bdd737f01a9598209efafa72ae0418e914a5d229f196d80cb5ba70ce82b0f340b18aa255bbe4ed77d821a432d5794a93
-
Filesize
809KB
MD5ec31a091e3c06294cade73a10d5cae88
SHA10eadea9ac15955c791ad35ebb2719fb632ce0197
SHA25623f46ec28302b106fa23d1db2a513875c7157b803cf32f4f3f94e51ed4ba2d83
SHA512827499e195dfea6bbbcd3e92dff81dab77d32418eaa9438fe66d6c35df2c7736b5842afb83e892a2f1c84e8fba1b53f3f300a1b9ed465ecbf2cb55b6544cc328
-
Filesize
2.5MB
MD52a78ce9f3872f5e591d643459cabe476
SHA19ac947dfc71a868bc9c2eb2bd78dfb433067682e
SHA25621a2ac44acd7a640735870eebfd04b8dc57bc66877cb5be3b929299e86a43dae
SHA51203e2cd8161a1394ee535a2ea7d197791ab715d69a02ffab98121ec5ac8150d2b17a9a32a59307042c4bbeffad7425b55efa047651de6ed39277dba80711454f9
-
Filesize
9.9MB
MD553306653e88891da35bdfc1330a2dafd
SHA10870df54ca24e32bf88ccf00d7dd0ada3a0ea096
SHA256fc3471e819eafc1640b51c5c8d4bd36db60dc96d912769fa0dfd619f3ec6ff09
SHA512930ff27fc7377eaf0097cc6430f2c5486336c398a7ae08fadbcb0af62490b96c0b9ec3d36455c04e5a79d2405fc0c6f1f6a44b0298f3b6ff46f2a6c591aa51ba
-
Filesize
1.8MB
MD5fc730cc04cea274ba94c95faad570950
SHA19959c1e33b3fe4f3e4da5e033f97a39004518b7d
SHA256478b4646887cf4961943568f8aef881f2991e0fffaf5d2592939724c6a8c2d78
SHA5125eb3af384e548e3ae02a1a0b972394b6a4b40798df44e379d50dd251c1f61eccc0d90460f966de2c3868ed9b521daae7e59c1eef449b02e884ffb96b408a7281
-
Filesize
1.7MB
MD5be752df2a3bae5d9fbd14d433b351967
SHA164355c823c38b257e469ff717c5ba8a9e0b0bbf2
SHA25608570ded4cf2c4a1d44b1837436d241c0392f3c9f35ff96da78ffc80dcdcf0fc
SHA512600cb7a8e7832f70909f53ea387c850d8a8b7e255d80f7049ff4833b198ae18cb817460e2343ff92021935c17d4845caa88ecf4ecbad8b832083d6f0fd83b151
-
Filesize
948KB
MD520f205ebc3ddeec636e52a437b8c3c9b
SHA1a7d0319411c2b8d115b5fb02f1ef63a37c7ea55f
SHA256d1f20d134a92d23683fc218749a27d327a9ac6a35cdcde8bded0854bc05ab3e8
SHA5122a7880884aabb5a5cd1677455c38f50d6e97d7ffe11688673f683c76031725fe068acfc0f530bd3d1d574d721566ef9308431595b09cff17840a294b5b19afcb
-
Filesize
2.7MB
MD543c842910f45deae72a62e0819adceb0
SHA1fffcc762a5d4753855e62bd845ad39e43c962097
SHA256aedb1af233367d2b3facb397055713f112e2fd833e625f07fff1ae723ebc4fb8
SHA512c9fca70038e11e562e613d13061e2b68c378ee16bddf7341ca81e3502e07f31d01431f8acb39d35d43444115d96a0ace52d81d352ccbddbbe66773f64cc73fc0
-
Filesize
1.9MB
MD5e96cd9e1c8cbc927c9c445e155d5bd75
SHA16c8d7a80cb4635fda0f7b799ace942dcd10b3700
SHA2569f1169888c4c2acd65e79928bb27a686204fa3b622b921a7ee56c7a735924eb6
SHA512419cb0650a718f7356335745a64d441d8693c48181692bdfb22da508fa993e93772f5ee89ae5085e5ae3d04f28936b57e12e6704291be6acc45041744ba7f413
-
Filesize
8KB
MD5de8938735aac7e7328ab07101836c2e8
SHA11109c9d099e5caa3fdb90c4e45622aaa1d9fa7e3
SHA2562a772aefe91cd03f252ecfd3f1141a75506dd52f41c584fb754ba66f0a7accb9
SHA512b78b4217ff3e01b998c4c884f10d0bdeeac41b373826b428304587f4929ccff2379f8884aa00e9aa6b9149eaf062009266a6c5fd3792bcb25b4fcaba2597b71c
-
Filesize
48KB
MD5349e6eb110e34a08924d92f6b334801d
SHA1bdfb289daff51890cc71697b6322aa4b35ec9169
SHA256c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a
SHA5122a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574
-
Filesize
2.6MB
MD599cff6034a2010e18f19281afa021aec
SHA16b045ce6bc1d26d244c083dbc4381c1d38539700
SHA256bda24b571a92286e33963d7790a6cada3b23b2d5b8c4099eb7f4922d41df113e
SHA512eed961481c0678c7777e79d5d9fd3fad71d6af44fa74a704018ce5dd5290945fd28e5220ffc8b6ab8aca5497d2dd9f8f062f61ffc9a8e77aec62d525f1dc41f2
-
Filesize
5.3MB
MD5777d6a67707876286fe17d655c830ebf
SHA179867f542222556a1e256d800495f471d0c958f0
SHA2564280ed645ef5b31060f54161c295196fc3ea72407fc1c466f43d21a96ffb133b
SHA5123824620a7fbf59927bf61ed4cb0844a97e94e2f3d8c768b2530eea4b957212d81cb8364f7b1ce5e01f1c980f396bcd9df079ace9fc1bfeeec55f0a2c39167dd1
-
Filesize
1.7MB
MD582b70cb96dc208843a0380d75ff08f9b
SHA1d6d8eeabc5868e73a39ff5c9fd86270bda3a48b5
SHA256697d7f31a1d5adab597902ceb9228a77b6e84d776be1f49a610b04de25d87801
SHA5127c33eb7aea7854aade6aa7c94b1ac5fde978e57904dd344bd4405edd6d7652d8c28cd3075c87e37306a89d333a740f7552d7f4ccdc42c0d64a008449b5bdd39d
-
Filesize
2.3MB
MD5ffabcc262fb699998b6191d7656c8805
SHA1fd3ea79a8550b14e9cc75fb831fd7a141964a714
SHA256f46e4a7de978baceec5f64cbc9fa1f1e772e864fa3310045cd19d77264698cde
SHA51279b2e21a9111b16b0f67ae5d1cc40a25773b847d3f4cf78711a8dfd8b67c30beec332ed65ac008c9dca62c84de891eff20d7c6050bc868bce77a17fe56da61ba
-
Filesize
3.5MB
MD5dec11b3cc0ee1492fbf2c3f8f5e21497
SHA10fbe6977002f563e309b75e36a89db3a33060254
SHA2569223019e435ac3deb348e7ae211abe23c5f7bbccc4d2b9765a5cd1b7be82c06b
SHA512c569ef71e1738da249b0efb35542f414392e7c3a620f4b7ca4f42498a32a2f87b5b1d39eb41b866ff6660f32082fe09c5b2d6bfe31ea73b8831b9370336dc04f
-
Filesize
3.1MB
MD511c23f104d7ecfcb5b535f22214c5dbe
SHA10899ffd81ea3727de16614c5f9e84749f8182552
SHA256c5741977022e908fbe2c233df25c5d5c6b0b88af01a026acc6085f30793708ef
SHA512eca9bf13c3f03db9508a83dc3abef5268a9fcd8ffc3307a832fd871196dfc4e09bc1c1416ff5f66c49b153cad22c22e14bd7eb3da11ba848641d88a984764388
-
Filesize
1.7MB
MD5ffbf4dac7f1ed0ade66186644f98132c
SHA1dfb1a1993b0de0922174dce31e80df9508cd162a
SHA256ea3d6a813bfa00a6fe5888fdb841e24063e24bf7723ac233df33d1e07129e23c
SHA5127bdcbdc172e4b7fc1d1d072f3258e4a5144b065d4b2d327bca306eada4f70bca5fd9ee603b3e1d1f4c98b298e4032bcd83dfbf9eb2b85b5abce649769645e856
-
Filesize
94KB
MD5a87575e7cf8967e481241f13940ee4f7
SHA1879098b8a353a39e16c79e6479195d43ce98629e
SHA256ded5adaa94341e6c62aea03845762591666381dca30eb7c17261dd154121b83e
SHA512e112f267ae4c9a592d0dd2a19b50187eb13e25f23ded74c2e6ccde458bcdaee99f4e3e0a00baf0e3362167ae7b7fe4f96ecbcd265cc584c1c3a4d1ac316e92f0
-
Filesize
78KB
MD5bcf0d58a4c415072dae95db0c5cc7db3
SHA18ce298b7729c3771391a0decd82ab4ae8028c057
SHA256d7faf016ef85fdbb6636f74fc17afc245530b1676ec56fc2cc756fe41cd7bf5a
SHA512c54d76e50f49249c4e80fc6ce03a5fdec0a79d2ff0880c2fc57d43227a1388869e8f7c3f133ef8760441964da0bf3fc23ef8d3c3e72ce1659d40e8912cb3e9bc
-
Filesize
116KB
MD541a9708af86ae3ebc358e182f67b0fb2
SHA1accab901e2746f7da03fab8301f81a737b6cc180
SHA2560bd4ed11f2fb097f235b62eb26a00c0cb16815bbf90ab29f191af823a9fed8cf
SHA512835f9aa33fdfbb096c31f8ac9a50db9fac35918fc78bce03dae55ea917f738a41f01aee4234a5a91ffa5bdbbd8e529399205592eb0cae3224552c35c098b7843
-
Filesize
150KB
MD5ba3797d77b4b1f3b089a73c39277b343
SHA1364a052731cfe40994c6fef4c51519f7546cd0b1
SHA256f904b02720b6498634fc045e3cc2a21c04505c6be81626fe99bdb7c12cc26dc6
SHA5125688ae25405ae8c5491898c678402c7a62ec966a8ec77891d9fd397805a5cfcf02d7ae8e2aa27377d65e6ce05b34a7ffdedf3942a091741af0d5bce41628bf7d
-
Filesize
73KB
MD579c2ff05157ef4ba0a940d1c427c404e
SHA117da75d598deaa480cdd43e282398e860763297b
SHA256f3e0e2f3e70ab142e7ce1a4d551c5623a3317fb398d359e3bd8e26d21847f707
SHA512f91fc9c65818e74ddc08bbe1ccea49f5f60d6979bc27e1cdb2ef40c2c8a957bd3be7aea5036394abab52d51895290d245fd5c9f84cc3cc554597ae6f85c149e1
-
Filesize
812KB
MD5ab6d3149a35e6baddf630cdcefe0dab5
SHA144cdb197e8e549a503f6cfcb867a83bf2214d01c
SHA2561d91fa604893531393f83e03e68eb97d2c14c2d957ed33877d2b27b7c30ce059
SHA51228a882e86d92d42ff983b68445cc90431c2b65b7ec3abbffb5585a9750d67b8b52a1361e20d4d80ca4a30b927fe543a2e9c9a65c1846e42a112b511ddc59545a
-
Filesize
32KB
MD5eef7981412be8ea459064d3090f4b3aa
SHA1c60da4830ce27afc234b3c3014c583f7f0a5a925
SHA256f60dd9f2fcbd495674dfc1555effb710eb081fc7d4cae5fa58c438ab50405081
SHA512dc9ff4202f74a13ca9949a123dff4c0223da969f49e9348feaf93da4470f7be82cfa1d392566eaaa836d77dde7193fed15a8395509f72a0e9f97c66c0a096016
-
Filesize
187KB
MD5f3630fa0ca9cb85bfc865d00ef71f0aa
SHA1f176fdb823417abeb54daed210cf0ba3b6e02769
SHA256ac1dfb6cdeeadbc386dbd1afdda4d25ba5b9b43a47c97302830d95e2a7f2d056
SHA512b8472a69000108d462940f4d2b5a611e00d630df1f8d6041be4f7b05a9fd9f8e8aa5de5fe880323569ac1b6857a09b7b9d27b3268d2a83a81007d94a8b8da0ff
-
Filesize
4.2MB
MD5c6c37b848273e2509a7b25abe8bf2410
SHA1b27cfbd31336da1e9b1f90e8f649a27154411d03
SHA256b7a7f3707beab109b66de3e340e3022dd83c3a18f444feb9e982c29cf23c29b8
SHA512222ad791304963a4b8c1c6055e02c0c4c47fce2bb404bd4f89c022ff9706e29ca6fa36c72350fbf296c8a0e3e48e3756f969c003dd1eb056cd026efe0b7eba40
-
Filesize
25KB
MD5431464c4813ed60fbf15a8bf77b0e0ce
SHA19825f6a8898e38c7a7ddc6f0d4b017449fb54794
SHA2561f56df23a36132f1e5be4484582c73081516bee67c25ef79beee01180c04c7f0
SHA51253175384699a7bb3b93467065992753b73d8f3a09e95e301a1a0386c6a1224fa9ed8fa42c99c1ffbcfa6377b6129e3db96e23750e7f23b4130af77d14ac504a0
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
503KB
MD5d60c9e070239f8c240aaa6d8832e11ef
SHA1aaac23a338a91505c56c3057d22a14bf190a2795
SHA256493f1bd7227c4ee9430f8ad226e929908996b97a28f578a850e9b26c393ad2d2
SHA512d70cf79dec352bd965f8506ad989375642a8931300d5497724c82882ae4d57ccc314d4e6b24c398075af3deb4433207522106647e70e74c90e56791e20bca42c
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin
Filesize6KB
MD557d85827375b6fb4621ec8f7e9b76115
SHA16db283a24bed9b7e2eb49ab3ad368bf75d989803
SHA256ef0cb85921b80347aa30f9fc1e72589ae4ef615ed225e8a483fdaa58b4be827a
SHA512169e468491500a7faf09fbf6097db4dcdbe2cedd71e8c6b378761382e71b433119a2e400255a96b77739961c4358cf2924cf8e0d1e6366e279e6311d26adae44
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin
Filesize8KB
MD577a00b06618d30d98d5bf6a6661860e7
SHA1580ab168d9c5b0aaf03a5bfd134edf2070552ed8
SHA25636623f0220c3418c62dfb67c1edfe0e24d52209f9c283c8713844cc810fdf706
SHA512e325f21394046e458a82bded8935405263dfade1f16132e14892a32f65da2a92007f25351ee7b27f866531489018b01fbb0dd35f93f9e1ebfb7c5cf159405c69
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin
Filesize13KB
MD597349bb8f41086d870dadd726f5df74e
SHA17e144041f7eae5267e87b9e25914f4f939c02dee
SHA256a19539429a6a85f79fbc0e7c852956c1e1a963ac05ba8c5397fb368bd1ab0de0
SHA512ce679450baab44f3a677aaecc690b0390d3d82889d1bfd258ec11df6dc594bf3f141ec5122f962b60e94e55f25891e241aa5373baab63bf6a0356c0d3f7de8c3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin
Filesize17KB
MD5d690fd559879268a562109eaaec0f356
SHA164c40992c5edfdaa14b60ee9703ad7a3589eef2c
SHA256333163e40c34e52c4cc50bcb15a22a37093b87ec6bd21b29c6f6afa74ef59261
SHA51262f761564fe217bcbc40fd414932b88e0316d9a3c8d93ad19fb4038dd1252bad21c2706226085f487bca81a935901e0fdb1cf781c693983a02b2f997353e2127
-
Filesize
224KB
MD5a4495aedd32846b57e47797abcc8a720
SHA190b6f1d6dbc9465d3cc02bddcd4c229db9d09fdf
SHA2569cf52be45100779024b89cb1a09774b618ee5834599cd876024f5009914de830
SHA512feb888c922b59f48eec1fb53e9f8f08e9df7e701d0625faa30354026b277fad241a97a4352b1f88efa23679e8139115daceea5f9ff1c4676f4dcb1c1d26fbf8e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.bin
Filesize27KB
MD5c0e887dbdd8f4b184ae2cbf7b040d04b
SHA188052490d5fdb087a8f08f45d64b485efe8a9082
SHA256788a0940f8895b58281e59e147d0374738c4b97900e29d08e22359c0a45a45f2
SHA512d44038b723b8e420a9484336c2c92b1127f143327c5720c03659f7b95c47dc89328e88950d3b76e96701436f9446cdcaf22bdad5abdeed72253cdfa9056bb442
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.bin
Filesize23KB
MD5e0a005d0df8bf0cc1454be2cffda068d
SHA1be17760638e25e450115fab21ee6ce2ff88f15ce
SHA256cad50561d0928ab28f5a771a3198d4f052a8dd8f7f466e6e9b5a156125a8bb33
SHA51295e670d57dbc481251db8b40d42770e7ede132f803424602f8ecfeab066b083286426bdfc6afdce9d532b8074e0c5d2e379c20fa539f6d92db8eb118384539af
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.bin
Filesize6KB
MD5dd16dca2fd89cc0b81f45e2fc21e872f
SHA1b7d61835e1dabf1369aa75c473026b4958ac8fec
SHA25653899aaf12667dda30a23544a142dd0b042561e8483e676313b9b6a7dd5e680d
SHA512135d3bc65de0a664cf9f7a46c5ed336636df92662e3734226358ded858c0883ec1e6589ee992a7ead8f6ddd5f1b7600878aa0bab956fdcc48ac4da562ef38669
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp
Filesize28KB
MD50c9bfac62231ce7ca93dc1d723942bbb
SHA1f37bc4e9e3c43a62fae6544fd4911f01f0245e95
SHA25670a25ef640ffe32867caba12a72f79e9fa642e9fe357ca8b2dfaccd4c2a87e5b
SHA5120e90a95601fcf687ee8900cef3136274b05e15452c788d01a9dc303a9e7c191a582f5eff15f9be6641b1495238fd7a5007de50d32368db99a7cd0c570b985c11
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5b81a82642b8575050352abcf49b7a819
SHA15a8dcd88a092f6a87f4ea020bb0b10fce0232b73
SHA256b472f6dddba9c3e7ba5c0ccb0cdf5260af81dd99690bfa2d5f85111bde26f47d
SHA51249e66e55069f423447cadb3b3b0d840a923b0c375a2e4e3d8607739d5c322a4af3e8459eaa60ee53a287af5b39fec7bee4862c2c79b5ccc2030ead6488e635a9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5165f1150b36c8bca694ebbaf2833f01d
SHA12e11f8c8c32a6a2d01c788c0871b9c5ee1a39ea5
SHA256bcc2d8dab50ecb75a75adee942de783e572e8529e36e29cfbfb1cfa5d72695d6
SHA5129d1eb2eac182786f38370e0f5227fdeb582609747048f14da6589d87c7222dd5a153e907b6688ab6753ac52578ddb9d669ff1280d328ca9953799ac6ca0e0ccb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\537086e5-b844-4797-b49e-fa6a312133b0
Filesize671B
MD533a66d3f43d5b8ab54ab5192fe9fdb8f
SHA180e7ff11fd21a6cccf5e34279a670b786df571af
SHA25605ddbf9973a5b49c56b7a3ebd4bd6d9af5ca49dafbee18ceddd7f04c3a556f46
SHA512010943a5afdadfd0f760c43f1f8815d7c5d4b2ab70fd34467d3f3e1bc35c272ea1e00d83857090b2de69a1265c87ce95472a3158c6e674c2fa5dd97e463f9bae
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\7902d730-3ded-4ecf-be8d-05e1ef2243d3
Filesize982B
MD5dacf629ad5ba4fe9d6aa6f5c3023eeeb
SHA12cd47e3dfa86701c097823f84312f0db1ef20fc1
SHA256cc0868342f4e65d26b90e486003758fcf1914b3b1c4771f4d87841978557feed
SHA512a35210855f4453c349065311bb28f816da0c3c9080ee16d0993cb3e856f33c5b3c2ef13dc268be7f1e0a00f1c03bf8d8a65dfd0f11178de0eacdeeb368f54af0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\f8b1ce02-b84f-4aec-9207-dfa2efd4bb17
Filesize25KB
MD5a899a7eba8a77c693f89e5ca8e84c90d
SHA1afb11f8fa2786343994a6f23fbb6ead62519c9ae
SHA256874eaed1ea07f6e0c526bc4806b20e2494f4fdff61a1489252cdc6c5b7ee8d2f
SHA512e90215b00ed9ce6b73155672d149f75fdb23b2db8280ce6186b6afc73f134f130f828c97606e68fc4620b8526d9ae4fa245ecf3a44f8ade6627d3f441ae16203
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD557208dfe32ee0dbd035764592c080d6d
SHA1da4129738ecd3c113447c7842d8b9b3027130fda
SHA256e32f66b2f1347f32f6276ce9fe17723d6a44aa2dcab17361647f47d44dd78e26
SHA512f9938c4f200dcb75a77940eef966ba28affca5e496d71c00aa408768c19d6d6b8840ebdce296d9c7a9fd379ecd5bd098e5b3dad12f5bb18c6a32e5d87e102e96
-
Filesize
10KB
MD5f636b6115d9cf48cb6dc86fe559e15ba
SHA1370f8381aafaefc905477c7063014d0c96192eb6
SHA256330ccb32e40727f467d879452c2ae3ebc795139227f8e60461e42664b2f96029
SHA512b8535c6735eb219761581ef5d43229e203cbcd973429f694982c0965ad5ba0052c92b220902d1ca02e6deaa9fc309790ecb365d11afc6eaee6c4ede5395ffb3f
-
Filesize
11KB
MD59162af81ab542f7dd7e72c62e83fe3bf
SHA1b24baef64d48dca9c3f07b48aa366496329940c7
SHA25652545ef017c294709ac5f647f6f291040dd00d71a0640c156b2193b4dca6584a
SHA512fe85e35fee74ec879024f96dff3793ab2bb984d9b5ca1941d3f065a87d41ad2a26caa12a274fea31f113f4c9188f86bd39744a5697480b497f344bbb15c9a50f
-
Filesize
10KB
MD5d8446acf44996d13fafa271247732417
SHA16d55f34ccbbaccea86e78537d62bdce5ee3f30e1
SHA25680326da046df5e44a922c24b4a94afc9f9707410c3bde784b76e55cd7e0bdcd8
SHA5122973df8026ca77c38926469790d0c72936ddce1488281828946f398b6d0c890591ec76d88b2b3c5da9874d6335b70ce2ae5fae8d55255fd497d75ac8824a6b1f