Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-12-2024 02:38
Static task
static1
General
-
Target
9642b949eed76ccea83d0aaaace3c863c7a66534bcf5fbe32739c87dce53c99a.exe
-
Size
6.9MB
-
MD5
af444cdb4f19dd4827c8cfe737745c2b
-
SHA1
fa09119844d86d8aff9dcbf87fdbde69059c7771
-
SHA256
9642b949eed76ccea83d0aaaace3c863c7a66534bcf5fbe32739c87dce53c99a
-
SHA512
62f84e7058510a529abbe925ef572e75e19dfc83918a2729ed40f07aea5ad0dcdb07bfe6fd2ff9ecfdf39acdf0434a94aa09a6020369446280f940593314f14c
-
SSDEEP
196608:/Qf6QjrPgeAsCIJ4AOTl2hgfqMNkFYzIagrf2/1h:G6QjvCIJ4A8lK+NgEIaT/1
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
https://drive-connect.cyou/api
https://sordid-snaked.cyou/api
https://awake-weaves.cyou/api
https://wrathful-jammy.cyou/api
https://debonairnukk.xyz/api
https://diffuculttan.xyz/api
https://effecterectz.xyz/api
https://deafeninggeh.biz/api
https://immureprech.biz/api
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
cryptbot
Signatures
-
Amadey family
-
Cryptbot family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4A129Q.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4A129Q.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" QWIPGKFHRSXZHA9BMS88.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" QWIPGKFHRSXZHA9BMS88.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" QWIPGKFHRSXZHA9BMS88.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 089a978919.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 9R9H0OZ30BYGNSU8HJE1S.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 9R9H0OZ30BYGNSU8HJE1S.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4A129Q.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4A129Q.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 089a978919.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 9R9H0OZ30BYGNSU8HJE1S.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4A129Q.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" QWIPGKFHRSXZHA9BMS88.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 089a978919.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 089a978919.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 089a978919.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 9R9H0OZ30BYGNSU8HJE1S.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 9R9H0OZ30BYGNSU8HJE1S.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 9R9H0OZ30BYGNSU8HJE1S.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" QWIPGKFHRSXZHA9BMS88.exe -
Stealc family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 6264 created 2640 6264 a079cf7816.exe 44 -
Enumerates VirtualBox registry keys 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF d4d9ba463c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF 177cd10feb.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 19 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 586ca7d356.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9R9H0OZ30BYGNSU8HJE1S.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ cf99b3d495.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ QWIPGKFHRSXZHA9BMS88.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d4d9ba463c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ cc15f0cfbb.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 177cd10feb.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2L6203.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 54e13c7066.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3i56O.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 34ZVH0VBT5VFM0FBY5U.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 089a978919.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1V43P2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4A129Q.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a079cf7816.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3S34ZWZ9G4Z32V3X2PTLH3.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 38 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9R9H0OZ30BYGNSU8HJE1S.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3i56O.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion QWIPGKFHRSXZHA9BMS88.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cc15f0cfbb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 177cd10feb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 177cd10feb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1V43P2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 586ca7d356.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 586ca7d356.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4A129Q.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 089a978919.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a079cf7816.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 54e13c7066.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 34ZVH0VBT5VFM0FBY5U.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d4d9ba463c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2L6203.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 089a978919.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a079cf7816.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1V43P2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9R9H0OZ30BYGNSU8HJE1S.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d4d9ba463c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4A129Q.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cf99b3d495.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 34ZVH0VBT5VFM0FBY5U.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2L6203.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3S34ZWZ9G4Z32V3X2PTLH3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cf99b3d495.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion QWIPGKFHRSXZHA9BMS88.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cc15f0cfbb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 54e13c7066.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3S34ZWZ9G4Z32V3X2PTLH3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3i56O.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 1V43P2.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 54e13c7066.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\54e13c7066.lnk 54e13c7066.exe -
Executes dropped EXE 25 IoCs
pid Process 3692 H2M69.exe 3400 c6h55.exe 3552 1V43P2.exe 1564 skotes.exe 624 2L6203.exe 1452 54e13c7066.exe 1940 9R9H0OZ30BYGNSU8HJE1S.exe 1964 586ca7d356.exe 1700 3S34ZWZ9G4Z32V3X2PTLH3.exe 1696 3i56O.exe 1844 4A129Q.exe 5076 cf99b3d495.exe 3276 QWIPGKFHRSXZHA9BMS88.exe 208 34ZVH0VBT5VFM0FBY5U.exe 4012 9d573f1c24.exe 2936 089a978919.exe 2648 776fdad63e.exe 5728 776fdad63e.exe 5736 776fdad63e.exe 5996 d4d9ba463c.exe 6264 a079cf7816.exe 6660 cc15f0cfbb.exe 5744 177cd10feb.exe 2740 skotes.exe 5424 skotes.exe -
Identifies Wine through registry keys 2 TTPs 19 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 3S34ZWZ9G4Z32V3X2PTLH3.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 3i56O.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 4A129Q.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 177cd10feb.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 34ZVH0VBT5VFM0FBY5U.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine a079cf7816.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 9R9H0OZ30BYGNSU8HJE1S.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine QWIPGKFHRSXZHA9BMS88.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 089a978919.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine d4d9ba463c.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine cc15f0cfbb.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 1V43P2.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 2L6203.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 54e13c7066.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 586ca7d356.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine cf99b3d495.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" QWIPGKFHRSXZHA9BMS88.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 089a978919.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 9R9H0OZ30BYGNSU8HJE1S.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 9R9H0OZ30BYGNSU8HJE1S.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4A129Q.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" H2M69.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" c6h55.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\586ca7d356.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1016432001\\586ca7d356.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cf99b3d495.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1016433001\\cf99b3d495.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\9d573f1c24.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1016434001\\9d573f1c24.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\089a978919.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1016435001\\089a978919.exe" skotes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9642b949eed76ccea83d0aaaace3c863c7a66534bcf5fbe32739c87dce53c99a.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0008000000023cb2-147.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 19 IoCs
pid Process 3552 1V43P2.exe 1564 skotes.exe 624 2L6203.exe 1452 54e13c7066.exe 1940 9R9H0OZ30BYGNSU8HJE1S.exe 1964 586ca7d356.exe 1700 3S34ZWZ9G4Z32V3X2PTLH3.exe 1696 3i56O.exe 1844 4A129Q.exe 5076 cf99b3d495.exe 3276 QWIPGKFHRSXZHA9BMS88.exe 208 34ZVH0VBT5VFM0FBY5U.exe 2936 089a978919.exe 5996 d4d9ba463c.exe 6264 a079cf7816.exe 6660 cc15f0cfbb.exe 5744 177cd10feb.exe 2740 skotes.exe 5424 skotes.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2648 set thread context of 5736 2648 776fdad63e.exe 133 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1V43P2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 6576 6264 WerFault.exe 135 -
System Location Discovery: System Language Discovery 1 TTPs 34 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9d573f1c24.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 776fdad63e.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 9d573f1c24.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1V43P2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4A129Q.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language H2M69.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 34ZVH0VBT5VFM0FBY5U.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 586ca7d356.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 089a978919.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a079cf7816.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 177cd10feb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9R9H0OZ30BYGNSU8HJE1S.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 9d573f1c24.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d4d9ba463c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c6h55.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2L6203.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cf99b3d495.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cc15f0cfbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9642b949eed76ccea83d0aaaace3c863c7a66534bcf5fbe32739c87dce53c99a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3S34ZWZ9G4Z32V3X2PTLH3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 776fdad63e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 54e13c7066.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3i56O.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language QWIPGKFHRSXZHA9BMS88.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 1016 taskkill.exe 2528 taskkill.exe 4716 taskkill.exe 2800 taskkill.exe 4860 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 6840 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3552 1V43P2.exe 3552 1V43P2.exe 1564 skotes.exe 1564 skotes.exe 624 2L6203.exe 624 2L6203.exe 624 2L6203.exe 624 2L6203.exe 624 2L6203.exe 624 2L6203.exe 1452 54e13c7066.exe 1452 54e13c7066.exe 1940 9R9H0OZ30BYGNSU8HJE1S.exe 1940 9R9H0OZ30BYGNSU8HJE1S.exe 1964 586ca7d356.exe 1964 586ca7d356.exe 1700 3S34ZWZ9G4Z32V3X2PTLH3.exe 1700 3S34ZWZ9G4Z32V3X2PTLH3.exe 1940 9R9H0OZ30BYGNSU8HJE1S.exe 1940 9R9H0OZ30BYGNSU8HJE1S.exe 1696 3i56O.exe 1696 3i56O.exe 1964 586ca7d356.exe 1964 586ca7d356.exe 1964 586ca7d356.exe 1964 586ca7d356.exe 1844 4A129Q.exe 1844 4A129Q.exe 1844 4A129Q.exe 1844 4A129Q.exe 1844 4A129Q.exe 5076 cf99b3d495.exe 5076 cf99b3d495.exe 3276 QWIPGKFHRSXZHA9BMS88.exe 3276 QWIPGKFHRSXZHA9BMS88.exe 208 34ZVH0VBT5VFM0FBY5U.exe 208 34ZVH0VBT5VFM0FBY5U.exe 3276 QWIPGKFHRSXZHA9BMS88.exe 3276 QWIPGKFHRSXZHA9BMS88.exe 4012 9d573f1c24.exe 4012 9d573f1c24.exe 2936 089a978919.exe 2936 089a978919.exe 2936 089a978919.exe 2936 089a978919.exe 2936 089a978919.exe 4012 9d573f1c24.exe 4012 9d573f1c24.exe 5996 d4d9ba463c.exe 5996 d4d9ba463c.exe 5996 d4d9ba463c.exe 5996 d4d9ba463c.exe 5996 d4d9ba463c.exe 5996 d4d9ba463c.exe 5996 d4d9ba463c.exe 5996 d4d9ba463c.exe 5996 d4d9ba463c.exe 5996 d4d9ba463c.exe 6264 a079cf7816.exe 6264 a079cf7816.exe 6264 a079cf7816.exe 6264 a079cf7816.exe 6264 a079cf7816.exe 6264 a079cf7816.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeDebugPrivilege 1940 9R9H0OZ30BYGNSU8HJE1S.exe Token: SeDebugPrivilege 1844 4A129Q.exe Token: SeDebugPrivilege 4860 taskkill.exe Token: SeDebugPrivilege 3276 QWIPGKFHRSXZHA9BMS88.exe Token: SeDebugPrivilege 1016 taskkill.exe Token: SeDebugPrivilege 2528 taskkill.exe Token: SeDebugPrivilege 4716 taskkill.exe Token: SeDebugPrivilege 2800 taskkill.exe Token: SeDebugPrivilege 2936 089a978919.exe Token: SeDebugPrivilege 3120 firefox.exe Token: SeDebugPrivilege 3120 firefox.exe Token: SeDebugPrivilege 1452 54e13c7066.exe Token: SeDebugPrivilege 1452 54e13c7066.exe Token: SeDebugPrivilege 3120 firefox.exe Token: SeDebugPrivilege 3120 firefox.exe Token: SeDebugPrivilege 3120 firefox.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 3552 1V43P2.exe 4012 9d573f1c24.exe 4012 9d573f1c24.exe 4012 9d573f1c24.exe 4012 9d573f1c24.exe 4012 9d573f1c24.exe 4012 9d573f1c24.exe 4012 9d573f1c24.exe 4012 9d573f1c24.exe 3120 firefox.exe 3120 firefox.exe 3120 firefox.exe 3120 firefox.exe 4012 9d573f1c24.exe 3120 firefox.exe 3120 firefox.exe 3120 firefox.exe 3120 firefox.exe 3120 firefox.exe 3120 firefox.exe 3120 firefox.exe 3120 firefox.exe 3120 firefox.exe 3120 firefox.exe 3120 firefox.exe 3120 firefox.exe 3120 firefox.exe 3120 firefox.exe 3120 firefox.exe 3120 firefox.exe 3120 firefox.exe 4012 9d573f1c24.exe 4012 9d573f1c24.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 4012 9d573f1c24.exe 4012 9d573f1c24.exe 4012 9d573f1c24.exe 4012 9d573f1c24.exe 4012 9d573f1c24.exe 4012 9d573f1c24.exe 4012 9d573f1c24.exe 4012 9d573f1c24.exe 3120 firefox.exe 3120 firefox.exe 3120 firefox.exe 3120 firefox.exe 4012 9d573f1c24.exe 3120 firefox.exe 3120 firefox.exe 3120 firefox.exe 3120 firefox.exe 3120 firefox.exe 3120 firefox.exe 3120 firefox.exe 3120 firefox.exe 3120 firefox.exe 3120 firefox.exe 3120 firefox.exe 3120 firefox.exe 3120 firefox.exe 3120 firefox.exe 3120 firefox.exe 3120 firefox.exe 4012 9d573f1c24.exe 4012 9d573f1c24.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3120 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4828 wrote to memory of 3692 4828 9642b949eed76ccea83d0aaaace3c863c7a66534bcf5fbe32739c87dce53c99a.exe 85 PID 4828 wrote to memory of 3692 4828 9642b949eed76ccea83d0aaaace3c863c7a66534bcf5fbe32739c87dce53c99a.exe 85 PID 4828 wrote to memory of 3692 4828 9642b949eed76ccea83d0aaaace3c863c7a66534bcf5fbe32739c87dce53c99a.exe 85 PID 3692 wrote to memory of 3400 3692 H2M69.exe 86 PID 3692 wrote to memory of 3400 3692 H2M69.exe 86 PID 3692 wrote to memory of 3400 3692 H2M69.exe 86 PID 3400 wrote to memory of 3552 3400 c6h55.exe 87 PID 3400 wrote to memory of 3552 3400 c6h55.exe 87 PID 3400 wrote to memory of 3552 3400 c6h55.exe 87 PID 3552 wrote to memory of 1564 3552 1V43P2.exe 88 PID 3552 wrote to memory of 1564 3552 1V43P2.exe 88 PID 3552 wrote to memory of 1564 3552 1V43P2.exe 88 PID 3400 wrote to memory of 624 3400 c6h55.exe 89 PID 3400 wrote to memory of 624 3400 c6h55.exe 89 PID 3400 wrote to memory of 624 3400 c6h55.exe 89 PID 1564 wrote to memory of 1452 1564 skotes.exe 91 PID 1564 wrote to memory of 1452 1564 skotes.exe 91 PID 1564 wrote to memory of 1452 1564 skotes.exe 91 PID 624 wrote to memory of 1940 624 2L6203.exe 92 PID 624 wrote to memory of 1940 624 2L6203.exe 92 PID 624 wrote to memory of 1940 624 2L6203.exe 92 PID 1564 wrote to memory of 1964 1564 skotes.exe 95 PID 1564 wrote to memory of 1964 1564 skotes.exe 95 PID 1564 wrote to memory of 1964 1564 skotes.exe 95 PID 624 wrote to memory of 1700 624 2L6203.exe 96 PID 624 wrote to memory of 1700 624 2L6203.exe 96 PID 624 wrote to memory of 1700 624 2L6203.exe 96 PID 3692 wrote to memory of 1696 3692 H2M69.exe 97 PID 3692 wrote to memory of 1696 3692 H2M69.exe 97 PID 3692 wrote to memory of 1696 3692 H2M69.exe 97 PID 4828 wrote to memory of 1844 4828 9642b949eed76ccea83d0aaaace3c863c7a66534bcf5fbe32739c87dce53c99a.exe 100 PID 4828 wrote to memory of 1844 4828 9642b949eed76ccea83d0aaaace3c863c7a66534bcf5fbe32739c87dce53c99a.exe 100 PID 4828 wrote to memory of 1844 4828 9642b949eed76ccea83d0aaaace3c863c7a66534bcf5fbe32739c87dce53c99a.exe 100 PID 1564 wrote to memory of 5076 1564 skotes.exe 101 PID 1564 wrote to memory of 5076 1564 skotes.exe 101 PID 1564 wrote to memory of 5076 1564 skotes.exe 101 PID 1964 wrote to memory of 3276 1964 586ca7d356.exe 102 PID 1964 wrote to memory of 3276 1964 586ca7d356.exe 102 PID 1964 wrote to memory of 3276 1964 586ca7d356.exe 102 PID 1964 wrote to memory of 208 1964 586ca7d356.exe 103 PID 1964 wrote to memory of 208 1964 586ca7d356.exe 103 PID 1964 wrote to memory of 208 1964 586ca7d356.exe 103 PID 1564 wrote to memory of 4012 1564 skotes.exe 104 PID 1564 wrote to memory of 4012 1564 skotes.exe 104 PID 1564 wrote to memory of 4012 1564 skotes.exe 104 PID 4012 wrote to memory of 4860 4012 9d573f1c24.exe 106 PID 4012 wrote to memory of 4860 4012 9d573f1c24.exe 106 PID 4012 wrote to memory of 4860 4012 9d573f1c24.exe 106 PID 4012 wrote to memory of 1016 4012 9d573f1c24.exe 109 PID 4012 wrote to memory of 1016 4012 9d573f1c24.exe 109 PID 4012 wrote to memory of 1016 4012 9d573f1c24.exe 109 PID 4012 wrote to memory of 2528 4012 9d573f1c24.exe 111 PID 4012 wrote to memory of 2528 4012 9d573f1c24.exe 111 PID 4012 wrote to memory of 2528 4012 9d573f1c24.exe 111 PID 4012 wrote to memory of 4716 4012 9d573f1c24.exe 113 PID 4012 wrote to memory of 4716 4012 9d573f1c24.exe 113 PID 4012 wrote to memory of 4716 4012 9d573f1c24.exe 113 PID 4012 wrote to memory of 2800 4012 9d573f1c24.exe 115 PID 4012 wrote to memory of 2800 4012 9d573f1c24.exe 115 PID 4012 wrote to memory of 2800 4012 9d573f1c24.exe 115 PID 1564 wrote to memory of 2936 1564 skotes.exe 117 PID 1564 wrote to memory of 2936 1564 skotes.exe 117 PID 1564 wrote to memory of 2936 1564 skotes.exe 117 PID 4012 wrote to memory of 4712 4012 9d573f1c24.exe 118 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 6376 attrib.exe
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2640
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\System32\svchost.exe"2⤵
- System Location Discovery: System Language Discovery
PID:6424
-
-
C:\Users\Admin\AppData\Local\Temp\9642b949eed76ccea83d0aaaace3c863c7a66534bcf5fbe32739c87dce53c99a.exe"C:\Users\Admin\AppData\Local\Temp\9642b949eed76ccea83d0aaaace3c863c7a66534bcf5fbe32739c87dce53c99a.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\H2M69.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\H2M69.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c6h55.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c6h55.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1V43P2.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1V43P2.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Users\Admin\AppData\Local\Temp\1016431001\54e13c7066.exe"C:\Users\Admin\AppData\Local\Temp\1016431001\54e13c7066.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1452 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /Query /TN "54e13c7066"7⤵
- System Location Discovery: System Language Discovery
PID:6768
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc onlogon /tn "54e13c7066" /tr "C:\Users\Admin\AppData\Local\Temp\1016431001\54e13c7066.exe"7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:6840
-
-
C:\Windows\SysWOW64\attrib.exe"attrib.exe" +h +s "C:\Users\Admin\AppData\Local\Temp\1016431001\54e13c7066.exe"7⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:6376
-
-
-
C:\Users\Admin\AppData\Local\Temp\1016432001\586ca7d356.exe"C:\Users\Admin\AppData\Local\Temp\1016432001\586ca7d356.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\QWIPGKFHRSXZHA9BMS88.exe"C:\Users\Admin\AppData\Local\Temp\QWIPGKFHRSXZHA9BMS88.exe"7⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3276
-
-
C:\Users\Admin\AppData\Local\Temp\34ZVH0VBT5VFM0FBY5U.exe"C:\Users\Admin\AppData\Local\Temp\34ZVH0VBT5VFM0FBY5U.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:208
-
-
-
C:\Users\Admin\AppData\Local\Temp\1016433001\cf99b3d495.exe"C:\Users\Admin\AppData\Local\Temp\1016433001\cf99b3d495.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5076
-
-
C:\Users\Admin\AppData\Local\Temp\1016434001\9d573f1c24.exe"C:\Users\Admin\AppData\Local\Temp\1016434001\9d573f1c24.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4860
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1016
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2528
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4716
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2800
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵PID:4712
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3120 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2024 -parentBuildID 20240401114208 -prefsHandle 1940 -prefMapHandle 1932 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {616bda68-b3ae-45d7-b206-5177b53a2a0f} 3120 "\\.\pipe\gecko-crash-server-pipe.3120" gpu9⤵PID:3200
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2508 -parentBuildID 20240401114208 -prefsHandle 2500 -prefMapHandle 2496 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {59f3b6d2-6097-4672-a720-c4b3a55c05e8} 3120 "\\.\pipe\gecko-crash-server-pipe.3120" socket9⤵PID:3336
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3104 -childID 1 -isForBrowser -prefsHandle 3096 -prefMapHandle 3092 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e5c056ea-cafb-42c1-a336-4bc0958698d3} 3120 "\\.\pipe\gecko-crash-server-pipe.3120" tab9⤵PID:4648
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3940 -childID 2 -isForBrowser -prefsHandle 4036 -prefMapHandle 4032 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {862fa018-78a8-4fac-a4fc-42250e2c9748} 3120 "\\.\pipe\gecko-crash-server-pipe.3120" tab9⤵PID:5016
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4880 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4636 -prefMapHandle 4832 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7dec5d92-0f1b-49fd-ae22-339395dbe1b0} 3120 "\\.\pipe\gecko-crash-server-pipe.3120" utility9⤵
- Checks processor information in registry
PID:6612
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5172 -childID 3 -isForBrowser -prefsHandle 4636 -prefMapHandle 5144 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f8e86e78-8ecd-4581-aae1-378fa0db23a3} 3120 "\\.\pipe\gecko-crash-server-pipe.3120" tab9⤵PID:6992
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5304 -childID 4 -isForBrowser -prefsHandle 5312 -prefMapHandle 5316 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {876e6803-0fb9-4107-86a1-dbc368eb732b} 3120 "\\.\pipe\gecko-crash-server-pipe.3120" tab9⤵PID:7044
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5604 -childID 5 -isForBrowser -prefsHandle 5520 -prefMapHandle 5524 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b416e8b5-0d4a-4c8e-88c1-2d2a5f88b956} 3120 "\\.\pipe\gecko-crash-server-pipe.3120" tab9⤵PID:7128
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1016435001\089a978919.exe"C:\Users\Admin\AppData\Local\Temp\1016435001\089a978919.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2936
-
-
C:\Users\Admin\AppData\Local\Temp\1016436001\776fdad63e.exe"C:\Users\Admin\AppData\Local\Temp\1016436001\776fdad63e.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\1016436001\776fdad63e.exe"C:\Users\Admin\AppData\Local\Temp\1016436001\776fdad63e.exe"7⤵
- Executes dropped EXE
PID:5728
-
-
C:\Users\Admin\AppData\Local\Temp\1016436001\776fdad63e.exe"C:\Users\Admin\AppData\Local\Temp\1016436001\776fdad63e.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5736
-
-
-
C:\Users\Admin\AppData\Local\Temp\1016437001\d4d9ba463c.exe"C:\Users\Admin\AppData\Local\Temp\1016437001\d4d9ba463c.exe"6⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5996
-
-
C:\Users\Admin\AppData\Local\Temp\1016438001\a079cf7816.exe"C:\Users\Admin\AppData\Local\Temp\1016438001\a079cf7816.exe"6⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:6264 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6264 -s 8047⤵
- Program crash
PID:6576
-
-
-
C:\Users\Admin\AppData\Local\Temp\1016439001\cc15f0cfbb.exe"C:\Users\Admin\AppData\Local\Temp\1016439001\cc15f0cfbb.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:6660
-
-
C:\Users\Admin\AppData\Local\Temp\1016440001\177cd10feb.exe"C:\Users\Admin\AppData\Local\Temp\1016440001\177cd10feb.exe"6⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5744
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2L6203.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2L6203.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Users\Admin\AppData\Local\Temp\9R9H0OZ30BYGNSU8HJE1S.exe"C:\Users\Admin\AppData\Local\Temp\9R9H0OZ30BYGNSU8HJE1S.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1940
-
-
C:\Users\Admin\AppData\Local\Temp\3S34ZWZ9G4Z32V3X2PTLH3.exe"C:\Users\Admin\AppData\Local\Temp\3S34ZWZ9G4Z32V3X2PTLH3.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1700
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3i56O.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3i56O.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1696
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4A129Q.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4A129Q.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1844
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 6264 -ip 62641⤵PID:6512
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2740
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5424
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ws2kncw.default-release\activity-stream.discovery_stream.json
Filesize27KB
MD5e7befff31ac2164c0545ba0d2caa3a81
SHA11c51e398fed1f94b27fb1847cd0d8247ef082627
SHA256b4594d2386aa6fc38eeb14a968387bb6c07f3a7f566a67905b03997e15a4e51a
SHA512f881d4af239b3a15ebfe94274217cf2d74e8d06907ba486b27d8148e76b999c6bcc1fdf5fb027b25e394c0f1de9aa4969a282e0c4128f7b6b7d1611c80597e28
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ws2kncw.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD563a4dfa2afc5a6bb1623c18a55a01a4f
SHA17a659617b5935629154241ac247d97fea66956a6
SHA256f24b7725415dc50b27c7f824c035108713212011fe3a66692d35905e65a66c9e
SHA5122b6a3c76d16f756afaa3854674b34b413d5b865bd0c7d06157f143d0bf8e70ed753af79bf6485ae5c82c85ed652754bd02c4053520c210f8763adcc94a59e7a4
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ws2kncw.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
1.7MB
MD5d37dab4c59e707f632bb0b91eaa87ff9
SHA10e153debcf54805a0543646620511b57865d6fc9
SHA256375a067be10250dc045ea14025444ad7ec0662cf189abbbd393e6f7ffe85b35d
SHA5120ae81abbe56f0a20c8066c52672d969c962a20b19c7e7165b12c7b16a4f0681c4f96ce2cedde50ade5975ced262d581fc99d0947c188cec847c8a82eb85bc0ae
-
Filesize
1.8MB
MD51922024ccd8d7a9bd347a0789ce7f30c
SHA13e2908ffe9cee89b9e636f3090ed481699bb2712
SHA256a3feaf6db591278388bb8fcd25a6bd5a1419901b3ba9a1e0d803c64af6644bd0
SHA51232daaeca71f644c7976ace329cfb7f47ed9a16c4e9a3e1a9265c3e395a6331375ee6d79f2c1bf55c76ed46afe3ec9e41e901a2837bb42f96e7c114d3b098f5d0
-
Filesize
944KB
MD57152b64cbdf980e824181620d9ca66ac
SHA1740fb5dcf7f20f3ede2be9ca2521de16a485c701
SHA25625f1a591367832ad336292fa1218f5bccf783002b7c8ef45869e7e5d13f1dc67
SHA512b26f66cd563d07d5b62ca0cfe750aaa27d6ccfd294e224fb5a4da4a5cd3f205bd8a6f1d3329e00f4cc0b769a2e4e67b6cc2dcec19bd18222990feb0a62728bce
-
Filesize
710KB
MD528e568616a7b792cac1726deb77d9039
SHA139890a418fb391b823ed5084533e2e24dff021e1
SHA2569597798f7789adc29fbe97707b1bd8ca913c4d5861b0ad4fdd6b913af7c7a8e2
SHA51285048799e6d2756f1d6af77f34e6a1f454c48f2f43042927845931b7ecff2e5de45f864627a3d4aa061252401225bbb6c2caa8532320ccbe401e97c9c79ac8e5
-
Filesize
4.3MB
MD59bd5b9ceba49c19a9c2f80c23279d441
SHA158f855a1fd2fba52a9dab57da4b762e9620e437d
SHA256ede017ad6960a447c0f2337c5bee277d1ce62ee31fb9685e5a2a4628f0e6b31f
SHA5125a643d4afcd9eed9b2423256871c9d2859e14f5e8a36f6c8641efd95dfab5f86b82cbf2c1be32b85a954ce84c970e792759a5d29b7bb5d6bcdaa8a9e30a73f9a
-
Filesize
1.9MB
MD5129e9d731c27f28d25a824fecd066e54
SHA1c42fb09e9dbbb309db3a30deecf9a0edd285e7a1
SHA2560186a9725d8a17443751c82eee6683e68637fe4fd6f041f5d5855e6d8bd5ec47
SHA512a243cc3e7fd661bc37f90165f8494d45edb1a038e2e56513c256d1666d901298992d42390baed8c18f1ea68ac5400a8d2da9c25e49fc89315b6a2ae07e96f6fb
-
Filesize
1.8MB
MD5fd17d712c627b434e99749cfc82c7d51
SHA1bf00a1fe4d9efc63e963751201a383bf9df7d25e
SHA256af8729a17698880e54e9f23b48e6b68d73672179f58868c201c8cf54d1a578bc
SHA512b3f56a4457df967d9355f42316e8332813c46003b4d2e216fbabded7edcddcbefc72ee01fd706722cf81e2fb3e0986c31358a22270f7b36106e77a88b6c25c85
-
Filesize
4.2MB
MD53fcd7adcd85540ce4d7097b400381963
SHA1be68d28acb2c143a5d45bea59b9dfdf7bd4ad617
SHA25608187fe32be97680f07b29be1fb116c2e19e2f380f6e5c2cdb18272bb3f9c2e7
SHA512e8c7e58b9c9bcbe5a20b40207754c5345480a4d905f01be3ff1806f4708fca8263885ababf14b54fa7b38f6c4aaadd4c9284908c4e2bb09fd64933cfdb7fca55
-
Filesize
2.8MB
MD5f10511fc918f0b1648e448adabadb5ac
SHA1de86f9989345f527964309965735cdaee4935ff9
SHA256b60a85fbc4a8c4db17b7a02e922fa6354ed7bab533fab292fc79b6c73e17e1b4
SHA512414055e0a1f1d3c625de5f36e69530bf8f3e88b77e56ec95dd64761580a0f1ac32cd42b1ad30fb8ad9ae8382d610a4ea7d8c0c368b03a615b046cfeaea22040b
-
Filesize
1.6MB
MD5c22653a5dec4646861e3a66a0275dbc5
SHA1627a1c28de11ba6bed383a2947aa482c1cfa14e7
SHA2567d70a4737819c33b2875e14f862a474910e1d8618ae4b16dc194ca9a68dae9c7
SHA512e1c1add085fbf978055385288f613fe65011d8c827d7c9d73b0f06ee303df87b4877d68b30988aea0f7730c854b23db11dbfdda313f1a2a6f00ede0aaca61dac
-
Filesize
1.7MB
MD5c07b01af18efd92367ed44ab96bb6562
SHA118484683aafa4933e4ffd59640b4ea9df33d2cd8
SHA256ff16e4b2824ca8102e810f3101d709ffa1f09aca620d07872183cbb4af64b441
SHA5129d5b830a270c0198bb9788f10758a1fffe83c130d21eebd6a5c2590032d6fcd36cf2958ab794b4283a98a9e38e0a842878fc474ae3ba5c4d659eec9acdf17b8d
-
Filesize
5.2MB
MD5b8e5ea1085848ece999bb0e786904c94
SHA19b5667397632aa88dbf519f605ca723ec0a0bf75
SHA256ecb3a73c665f5c65288db80d86d90278534cd69a966ae8adb792652153e8bf1e
SHA5128c805632dfbe5c2b01aada6b13ea6ae941f0d15df14304fca5fa1916c4cd404ca16545a76a43743d1e67550d070a787446ade104d5664f1f0df1af61986b32ed
-
Filesize
2.7MB
MD5b4c1dba163af3b5402e1746b69c964ed
SHA171efe2f7ec13586ae2578c60a56f23732392bc2c
SHA2567ec038e9dd03aebc33ae61653612825040d6ede00bc677f73e1ae6c13378dd3c
SHA512ce80a035481af64cfb46370ea38daa4ba86ba5341579e34a3e82debb14c7599b1512d35229502655a9307c4e3557276248dba7baa971af4444290d7e6533ecdc
-
Filesize
3.6MB
MD56a5e1110a7403eb838a4dc48a2401245
SHA1bb125bb5988b73afca031343b3be7e7c475ecc4d
SHA2569a6c1dffafd6800eda43958b95ce6dcdf27a9be13cf4e7c398633bb5de13e6f2
SHA51221f2ed12db8eb052b7e315044598cb4c72489215f9c03e2dfc2697aae483c90dd00e78766190359634750205c5d003a471a7a988f1e23ae2b7fa01e73607d6d8
-
Filesize
2.9MB
MD57cf236240d235f35fbfd37f4abfed7cd
SHA1eb904f17eabb2837a239e3c6b55490657a3a00c7
SHA256da8d837276d6ed969359c92e63e8bb6d9c3531f48dd84358031978939b0ca1e4
SHA51291aa97e27ea392efc654fd6737875dcf910ac3630f55cb2140782a49a7bc108df55a5292613fe01fdee9e63b46ac768e62c1e41299f93e9e4f240e6d2c426a8f
-
Filesize
1.8MB
MD533f9e889016b41140afdad01332d5a26
SHA1f4de250dbaa6b3f9c8801498526e0bc22ad340a5
SHA256599086e8d07adba2a1da0154abc7ec0c3517e4b13ed3f2cb0c6091bde27cc1eb
SHA51240bc464738fe493630dc133edec1f7e02c5ae3aa8999a911636e3ba071b6e2080400f73d02f4f268526b0fa218d30a35361a7df69309c67b0e470be2392344b1
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin
Filesize6KB
MD5e5a11ce84d8a0712c47dc9fcb8d3e4c8
SHA1b727642e5f8577be43777590e58bbe1524713411
SHA2569217f33ec9e1c49a1ea6f019cc9782a1990999048a09ddc6163729d5448fc650
SHA5124187ddd14b07334e53d877597d95767d2ec061f0b3d24121c68824b34827625f720e987a11d1c4b38923ce1b0b4dc7e6f48459d16fd8b57c1faa39695bdac97c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin
Filesize8KB
MD5011f835d9e41520ffbab2ea5deb3839a
SHA1948918b5a20055f99f50a4bbf1ac023e2fb9cc67
SHA25627893987e126d8e4ae92cd09244e33e67e1c5627e19addf46701d855419efcd1
SHA512878575bafd12de6ffb48fecc993d1258b3f080a03c047cf10e1f602c178d2841013cedf75df92ffd729528e43a375c634a9b6c4d2f2d1083e72624422e5b1077
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin
Filesize13KB
MD54143640ad79d6e765932986356505257
SHA1541fb5118696915c52a3968aa000dd300770f24c
SHA2561010179729de95ce677c9e4d33f12e0fd86d3eba637be5e99ef89221be445700
SHA5125b9cfba6f822849d8f8208d0314a26cd07d76ea3b344870e0a715340ed0ee7ffa3b4de1616a252575d1f2912c965a8c8dd837c5989a26532c02097157b879379
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.bin
Filesize24KB
MD54a97c890d31dc3fad9b5c434b6c58e21
SHA1ce251799c6a7897cb9f783c792cfddac41ae6426
SHA256f2e2fffa6152662dc78786313cb67616a59ba5aca0c035c9436cfeb4c8656437
SHA512cabe13e17a4d75ef8e70e170a417e81ad35d85f297e5e3c100ecab70dbbcd476ab6ec252211dfd5ca01096e4ab23821b69ac0825ae0c7d53bf286207edb64463
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.bin
Filesize23KB
MD598421a686559115df8a7c8d620eef53b
SHA1004dec14e006e3500954056e843c616aae95eac1
SHA256752f7433015b0c05c33051a7d085064d0515c3e975f242837e8d33e0261236a7
SHA512a07664d8ea437b5a695aed154c235fcd312a802b5bc866e35eca804ee8d9d6df543c7fd1e6cbfd979806a0bfd3ef838ec10d7ef626b04f55703898fcff0cdc51
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.bin
Filesize22KB
MD528f8f4b2614eab8beace9f0deff78539
SHA18f445f4f49cdb57220e153e6dc86697727f699bb
SHA2560bab43926512a28aa0ec3e5ef8854be65580fb64110d2cd67b37c72ab8015034
SHA512ca1f6866392d38b81d7c1037163a85698b7e6f40df340e5a28a9f93c0114d9ce5942d9ddcd7d4ad71564fe189b16b8d2304dad1a131d50a7681ca08cbc3ea997
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.bin
Filesize24KB
MD52e4f41a6626a1612ba4ed1c1943f9161
SHA14bd352d2f4eb133d2bb86106dca4ebc273d7057f
SHA256a2ad4c5b6eb7f368e29a3990fb21691eedaa76aeadaaf48e91d72fc3bbf4ea97
SHA512897a51100eeb3d8e58aa80f37257c8701f7d8df89637fb99a98d1b198271bbe479f4f915f8be9f6a392bede87aa9df29751b970c2c04b9f259f62abbde3c1b48
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD540742fafa6f8e337f4c5b2ed204f0a2e
SHA1ccee487b6834c927b72a6f47b0a89cd9b00999e2
SHA256f8c5ba9ec93ab67e6372d7c8b2139af6671e81b76807db7c2da532ba445b10b4
SHA512b8a31ac0f636e75cd95a1b827e602e38f7407abf260b965f02e335b1c30653ab7117149ac9b0fa6a7bb90e11557914ed90b3a23edfb076c26ae62498f0649c91
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD5f189581caad934e01c1f64bfd29efa54
SHA1b10e1084ce45287047a1ff4150a036c37342604e
SHA256ed3c598fac42ae99b1b08aa3e76ca6a84df67d8de196ead81b9d34b7c380e0d7
SHA512a1718496e2ef46ebb5cbb80a8643f9c58fd6e7cc6586598983896632dd5f66a09e0c7e518bd7c1c30f3d40d7342835ead46d39fac040db5e30768f7d8c4a2e07
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp
Filesize24KB
MD57e7c1085d646b6d2a98256a03f9b64a5
SHA13655307cdd437574cb080655080724ac2fb4ee0d
SHA2568a223dcd4acf9bda95c8b7f4d68b91622751a29a7e49d321b42e1805ea37784d
SHA5124b946ac80fc76e7c9ec4e15a39c35599bd19fbd6387a62042a5e6035d20a39de659ac2f34971490ef2b119c26ca2360ba4e238027ad86ee6c943fddbda93ab32
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp
Filesize21KB
MD5ad2cb03587d45c10eaf03566c5f0554c
SHA16d9ef4a4b0ca9c1fd6085549cc76892376e94f7f
SHA2568264788669e4cb06b8ffc5a8d3df4051a2e30906c766d4dc3e61ac9b229e7f36
SHA51214d44955b5753e5f45779cadbb35944bcdbe11b0aae3fedbaf7481f1f8a5f514b81191da8aeba1e2a22ec416a5634d39c17f663b7dac9d7fceed88bf4876e448
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD5b0ffe4247930b6ff384ecb7da3cf482c
SHA1a4c70bedbbcdf01118778fe43b5ecfa2806b6a66
SHA2566e4a71d8841d3dd1a3aeb57099b72a555993693373f5b93e6271f8d59ffd7457
SHA5123a1898a6b2879abf483a7f683865cde14dc9a3a966b7a3c19bc403b95fa3879bf9b4a5828920f5ecda8dc5301e7cd96e37510d4c467df23e9910404300a1909d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\49643fe4-056a-4e2d-b0e0-759370316147
Filesize659B
MD5c1a74a8a1f4f08828711a1f19b3d7e2f
SHA12fab0525881e7bfcb94151d239c841696694d019
SHA256e25229c5e244e6db100548287224816ff8ac970ae366d4d59697d708175e5e59
SHA5127058c3d569179c54ed570e093c597cbbf8f4f2cbd636b9af1e31bfbcbd3d21fe94a06a4e782f559189b437ba4ed248d464f93c9985a322494229219374839f8a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\d6bf5b7b-ad50-44d1-a596-d732c5a11275
Filesize982B
MD5881c29484a2e4fce1e5f085b4e84f335
SHA1ab5094648ca94c7959579a489297112cf824c9e3
SHA256e5af0532eae9e219bd6091aadaa4f5d52a0e6927c5eb447bc0fad6b134e836f0
SHA512cc39ef1aa2a30611f3f24272df62c9a42bf633d4177dd3a01bcdb5a93e46600dbcfa5b55da120313d1718073c5fb7589e14efadea8585ed6afdcf3847f1d8e7e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
11KB
MD5481febca705e22ae40795ef674b7e3a4
SHA1dd15dbb0429638ac5e257a25d21d39f518bdbf22
SHA2568d89ed4f17370bdc76c9929f70e70371a2395a24bb9a0b620bb3a97d8a2361e3
SHA512928ed0d6a9ee3384b1837c77d1cf573908fd9a0cd8840d9dbccde04504647096af7505a3035a9d8f1146894cba580b14b9633904ab491fa8f5dd86b4111de162
-
Filesize
15KB
MD562684b1568d3103a8b34936079ea81d5
SHA139476ad1b298b1aad162476b007ed7d260908352
SHA2561a02f72ae92b1c7580948f544eab33e6cea733fefc4905d966c4f9c88e8c1f28
SHA512a8a43b29e83d783839b8ab1135edcf84aac575fa92512930e39c17c89b2d070cbb92f8256b08df0a5dd0b05999e058c2f979bf035436b6cfdee2577fec3f6918
-
Filesize
10KB
MD51a9762fdcbea88354853530d46cdc1c9
SHA18850650115ecadb76259d6f13394f68fdd38e70e
SHA25690e91602b85b1809b36e945c1befdb7412dd7385a3ffaf226721d311ef1fb677
SHA51226706da839d7bd2298aeff007d8265ab5456790bfc60dfd0430f2dae27435488c83d278b64d10648a365551d48dce7f411e6bb255b969689d8cb2758b0e54dce
-
Filesize
11KB
MD57c436ba651d9cc8955f7d9de6da7220c
SHA1c0d030a9d196fd5555ef7fa30e46a04c6326c3a3
SHA256cdcfafa8a9266d583220edb0ec9d6aaaa717be786682ab0165c1901cc7c56834
SHA51220415461e97534282348c0bff538363362ee0579af6b72212aef66ac3ce1281b51e6fd53933ecc6a0d84f7023c7ab28579db0a5c03e0dfc83d6ab3c4288655e0