Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/12/2024, 03:44
Static task
static1
Behavioral task
behavioral1
Sample
b2f8caea1c0425e7cf69d729262dfeede6df2a415803a7b497359f0124db3ad4.exe
Resource
win7-20240903-en
General
-
Target
b2f8caea1c0425e7cf69d729262dfeede6df2a415803a7b497359f0124db3ad4.exe
-
Size
2.8MB
-
MD5
8487b3f80d4a1d6db6d0268b17b66b8b
-
SHA1
16ebd2a072305b3432b0f1348c94e90899225e71
-
SHA256
b2f8caea1c0425e7cf69d729262dfeede6df2a415803a7b497359f0124db3ad4
-
SHA512
fa961e40f5c40dffbfc0eeec88eef0622acc0103191ec16c3b5a679464c0cb54f16d762918cec20db36b603752d563ad438305ccdf317e1fd4e1d18f085da451
-
SSDEEP
49152:vjiYy8ijVHr78ghs32AITsqe52cGs2UFv3lwhCcmy:Le8ijVHv8ghs3z0bgFGsB1whC/y
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
Extracted
cryptbot
http://home.fivetk5vt.top/hLfzXsaqNtoEGyaUtOMJ1734
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Cryptbot family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" CE03EBLVJEJKGS323HBLBN8627PR.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" CE03EBLVJEJKGS323HBLBN8627PR.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" CE03EBLVJEJKGS323HBLBN8627PR.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 976fadb21c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 976fadb21c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 976fadb21c.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection CE03EBLVJEJKGS323HBLBN8627PR.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" CE03EBLVJEJKGS323HBLBN8627PR.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" CE03EBLVJEJKGS323HBLBN8627PR.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 976fadb21c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 976fadb21c.exe -
Stealc family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 3492 created 2652 3492 8da6b8c60d.exe 46 -
Enumerates VirtualBox registry keys 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF 5109184294.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF 5110830a89.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 14 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b2f8caea1c0425e7cf69d729262dfeede6df2a415803a7b497359f0124db3ad4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6bd1bab17d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ fbc47016c8.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5110830a89.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 976fadb21c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8da6b8c60d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5109184294.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dbf77b1117.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ CE03EBLVJEJKGS323HBLBN8627PR.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1E9GK4AB1NJELUL9AATJO7HSPXSKU.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e41e0a5b09.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2156 powershell.exe 836 powershell.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 28 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 976fadb21c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 976fadb21c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5110830a89.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion fbc47016c8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion fbc47016c8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion CE03EBLVJEJKGS323HBLBN8627PR.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1E9GK4AB1NJELUL9AATJO7HSPXSKU.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b2f8caea1c0425e7cf69d729262dfeede6df2a415803a7b497359f0124db3ad4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5110830a89.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dbf77b1117.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e41e0a5b09.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6bd1bab17d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5109184294.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8da6b8c60d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8da6b8c60d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5109184294.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e41e0a5b09.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dbf77b1117.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion CE03EBLVJEJKGS323HBLBN8627PR.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1E9GK4AB1NJELUL9AATJO7HSPXSKU.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b2f8caea1c0425e7cf69d729262dfeede6df2a415803a7b497359f0124db3ad4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6bd1bab17d.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation b2f8caea1c0425e7cf69d729262dfeede6df2a415803a7b497359f0124db3ad4.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 4c6f1089ef.exe -
Executes dropped EXE 24 IoCs
pid Process 3432 skotes.exe 4008 6a14c8199c.exe 8 e41e0a5b09.exe 4364 5110830a89.exe 836 539bca399f.exe 4636 539bca399f.exe 704 4c6f1089ef.exe 3492 8da6b8c60d.exe 3128 09e5eb3e6a.exe 1796 09e5eb3e6a.exe 4824 6bd1bab17d.exe 2316 6b1286ea1b6a4048b34c79636bb9d73f.exe 2076 5109184294.exe 1516 6a14c8199c.exe 5080 dbf77b1117.exe 3328 fbc47016c8.exe 4112 d166b4bfbe.exe 3292 CE03EBLVJEJKGS323HBLBN8627PR.exe 2348 1E9GK4AB1NJELUL9AATJO7HSPXSKU.exe 5032 976fadb21c.exe 452 zudFSfy.exe 5704 skotes.exe 5540 zudFSfy.exe 5324 skotes.exe -
Identifies Wine through registry keys 2 TTPs 14 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 1E9GK4AB1NJELUL9AATJO7HSPXSKU.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine b2f8caea1c0425e7cf69d729262dfeede6df2a415803a7b497359f0124db3ad4.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine CE03EBLVJEJKGS323HBLBN8627PR.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 5110830a89.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine dbf77b1117.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 6bd1bab17d.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine fbc47016c8.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 976fadb21c.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine e41e0a5b09.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 8da6b8c60d.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 5109184294.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features CE03EBLVJEJKGS323HBLBN8627PR.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" CE03EBLVJEJKGS323HBLBN8627PR.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 976fadb21c.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\976fadb21c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1017318001\\976fadb21c.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dbf77b1117.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1017315001\\dbf77b1117.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fbc47016c8.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1017316001\\fbc47016c8.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\d166b4bfbe.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1017317001\\d166b4bfbe.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 103 raw.githubusercontent.com 104 raw.githubusercontent.com -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000023cd2-340.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 16 IoCs
pid Process 4280 b2f8caea1c0425e7cf69d729262dfeede6df2a415803a7b497359f0124db3ad4.exe 3432 skotes.exe 8 e41e0a5b09.exe 4364 5110830a89.exe 3492 8da6b8c60d.exe 4824 6bd1bab17d.exe 2316 6b1286ea1b6a4048b34c79636bb9d73f.exe 2076 5109184294.exe 5080 dbf77b1117.exe 2316 6b1286ea1b6a4048b34c79636bb9d73f.exe 3328 fbc47016c8.exe 3292 CE03EBLVJEJKGS323HBLBN8627PR.exe 2348 1E9GK4AB1NJELUL9AATJO7HSPXSKU.exe 5032 976fadb21c.exe 5704 skotes.exe 5324 skotes.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 836 set thread context of 4636 836 539bca399f.exe 101 PID 3128 set thread context of 1796 3128 09e5eb3e6a.exe 117 PID 4008 set thread context of 1516 4008 6a14c8199c.exe 128 PID 452 set thread context of 5540 452 zudFSfy.exe 161 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job b2f8caea1c0425e7cf69d729262dfeede6df2a415803a7b497359f0124db3ad4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4816 3492 WerFault.exe 107 -
System Location Discovery: System Language Discovery 1 TTPs 33 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CE03EBLVJEJKGS323HBLBN8627PR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zudFSfy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6a14c8199c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d166b4bfbe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dbf77b1117.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage d166b4bfbe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zudFSfy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b2f8caea1c0425e7cf69d729262dfeede6df2a415803a7b497359f0124db3ad4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6a14c8199c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e41e0a5b09.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 09e5eb3e6a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5109184294.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language d166b4bfbe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 976fadb21c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5110830a89.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 539bca399f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 539bca399f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 09e5eb3e6a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6bd1bab17d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6b1286ea1b6a4048b34c79636bb9d73f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fbc47016c8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4c6f1089ef.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8da6b8c60d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1E9GK4AB1NJELUL9AATJO7HSPXSKU.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 2196 taskkill.exe 2908 taskkill.exe 1344 taskkill.exe 5040 taskkill.exe 4768 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4280 b2f8caea1c0425e7cf69d729262dfeede6df2a415803a7b497359f0124db3ad4.exe 4280 b2f8caea1c0425e7cf69d729262dfeede6df2a415803a7b497359f0124db3ad4.exe 3432 skotes.exe 3432 skotes.exe 8 e41e0a5b09.exe 8 e41e0a5b09.exe 4364 5110830a89.exe 4364 5110830a89.exe 4364 5110830a89.exe 4364 5110830a89.exe 4364 5110830a89.exe 4364 5110830a89.exe 4364 5110830a89.exe 4364 5110830a89.exe 4364 5110830a89.exe 4364 5110830a89.exe 8 e41e0a5b09.exe 8 e41e0a5b09.exe 8 e41e0a5b09.exe 8 e41e0a5b09.exe 704 4c6f1089ef.exe 2156 powershell.exe 2156 powershell.exe 3492 8da6b8c60d.exe 3492 8da6b8c60d.exe 3492 8da6b8c60d.exe 3492 8da6b8c60d.exe 3492 8da6b8c60d.exe 3492 8da6b8c60d.exe 3848 svchost.exe 3848 svchost.exe 3848 svchost.exe 3848 svchost.exe 836 powershell.exe 836 powershell.exe 836 powershell.exe 4636 539bca399f.exe 4636 539bca399f.exe 4636 539bca399f.exe 4636 539bca399f.exe 4824 6bd1bab17d.exe 4824 6bd1bab17d.exe 1796 09e5eb3e6a.exe 1796 09e5eb3e6a.exe 1796 09e5eb3e6a.exe 1796 09e5eb3e6a.exe 2076 5109184294.exe 2076 5109184294.exe 2076 5109184294.exe 2076 5109184294.exe 2076 5109184294.exe 2076 5109184294.exe 2076 5109184294.exe 2076 5109184294.exe 2076 5109184294.exe 2076 5109184294.exe 2316 6b1286ea1b6a4048b34c79636bb9d73f.exe 2316 6b1286ea1b6a4048b34c79636bb9d73f.exe 2316 6b1286ea1b6a4048b34c79636bb9d73f.exe 2316 6b1286ea1b6a4048b34c79636bb9d73f.exe 5080 dbf77b1117.exe 5080 dbf77b1117.exe 4824 6bd1bab17d.exe 4824 6bd1bab17d.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeDebugPrivilege 4008 6a14c8199c.exe Token: SeDebugPrivilege 704 4c6f1089ef.exe Token: SeDebugPrivilege 2156 powershell.exe Token: SeDebugPrivilege 836 powershell.exe Token: SeDebugPrivilege 2196 taskkill.exe Token: SeDebugPrivilege 2908 taskkill.exe Token: SeDebugPrivilege 1344 taskkill.exe Token: SeDebugPrivilege 5040 taskkill.exe Token: SeDebugPrivilege 4768 taskkill.exe Token: SeDebugPrivilege 3292 CE03EBLVJEJKGS323HBLBN8627PR.exe Token: SeDebugPrivilege 2724 firefox.exe Token: SeDebugPrivilege 2724 firefox.exe Token: SeDebugPrivilege 5032 976fadb21c.exe Token: SeDebugPrivilege 5540 zudFSfy.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 4280 b2f8caea1c0425e7cf69d729262dfeede6df2a415803a7b497359f0124db3ad4.exe 4112 d166b4bfbe.exe 4112 d166b4bfbe.exe 4112 d166b4bfbe.exe 4112 d166b4bfbe.exe 4112 d166b4bfbe.exe 4112 d166b4bfbe.exe 4112 d166b4bfbe.exe 4112 d166b4bfbe.exe 2724 firefox.exe 2724 firefox.exe 2724 firefox.exe 2724 firefox.exe 2724 firefox.exe 2724 firefox.exe 2724 firefox.exe 2724 firefox.exe 2724 firefox.exe 2724 firefox.exe 2724 firefox.exe 2724 firefox.exe 2724 firefox.exe 2724 firefox.exe 2724 firefox.exe 2724 firefox.exe 2724 firefox.exe 2724 firefox.exe 2724 firefox.exe 2724 firefox.exe 2724 firefox.exe 4112 d166b4bfbe.exe 4112 d166b4bfbe.exe 4112 d166b4bfbe.exe 4112 d166b4bfbe.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 4112 d166b4bfbe.exe 4112 d166b4bfbe.exe 4112 d166b4bfbe.exe 4112 d166b4bfbe.exe 4112 d166b4bfbe.exe 4112 d166b4bfbe.exe 4112 d166b4bfbe.exe 4112 d166b4bfbe.exe 2724 firefox.exe 2724 firefox.exe 2724 firefox.exe 2724 firefox.exe 2724 firefox.exe 2724 firefox.exe 2724 firefox.exe 2724 firefox.exe 2724 firefox.exe 2724 firefox.exe 2724 firefox.exe 2724 firefox.exe 2724 firefox.exe 2724 firefox.exe 2724 firefox.exe 2724 firefox.exe 2724 firefox.exe 2724 firefox.exe 2724 firefox.exe 2724 firefox.exe 4112 d166b4bfbe.exe 4112 d166b4bfbe.exe 4112 d166b4bfbe.exe 4112 d166b4bfbe.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2316 6b1286ea1b6a4048b34c79636bb9d73f.exe 2724 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4280 wrote to memory of 3432 4280 b2f8caea1c0425e7cf69d729262dfeede6df2a415803a7b497359f0124db3ad4.exe 83 PID 4280 wrote to memory of 3432 4280 b2f8caea1c0425e7cf69d729262dfeede6df2a415803a7b497359f0124db3ad4.exe 83 PID 4280 wrote to memory of 3432 4280 b2f8caea1c0425e7cf69d729262dfeede6df2a415803a7b497359f0124db3ad4.exe 83 PID 3432 wrote to memory of 4008 3432 skotes.exe 86 PID 3432 wrote to memory of 4008 3432 skotes.exe 86 PID 3432 wrote to memory of 4008 3432 skotes.exe 86 PID 3432 wrote to memory of 8 3432 skotes.exe 90 PID 3432 wrote to memory of 8 3432 skotes.exe 90 PID 3432 wrote to memory of 8 3432 skotes.exe 90 PID 3432 wrote to memory of 4364 3432 skotes.exe 98 PID 3432 wrote to memory of 4364 3432 skotes.exe 98 PID 3432 wrote to memory of 4364 3432 skotes.exe 98 PID 3432 wrote to memory of 836 3432 skotes.exe 99 PID 3432 wrote to memory of 836 3432 skotes.exe 99 PID 3432 wrote to memory of 836 3432 skotes.exe 99 PID 836 wrote to memory of 4636 836 539bca399f.exe 101 PID 836 wrote to memory of 4636 836 539bca399f.exe 101 PID 836 wrote to memory of 4636 836 539bca399f.exe 101 PID 836 wrote to memory of 4636 836 539bca399f.exe 101 PID 836 wrote to memory of 4636 836 539bca399f.exe 101 PID 836 wrote to memory of 4636 836 539bca399f.exe 101 PID 836 wrote to memory of 4636 836 539bca399f.exe 101 PID 836 wrote to memory of 4636 836 539bca399f.exe 101 PID 836 wrote to memory of 4636 836 539bca399f.exe 101 PID 3432 wrote to memory of 704 3432 skotes.exe 103 PID 3432 wrote to memory of 704 3432 skotes.exe 103 PID 3432 wrote to memory of 704 3432 skotes.exe 103 PID 704 wrote to memory of 2156 704 4c6f1089ef.exe 105 PID 704 wrote to memory of 2156 704 4c6f1089ef.exe 105 PID 704 wrote to memory of 2156 704 4c6f1089ef.exe 105 PID 3432 wrote to memory of 3492 3432 skotes.exe 107 PID 3432 wrote to memory of 3492 3432 skotes.exe 107 PID 3432 wrote to memory of 3492 3432 skotes.exe 107 PID 3492 wrote to memory of 3848 3492 8da6b8c60d.exe 108 PID 3492 wrote to memory of 3848 3492 8da6b8c60d.exe 108 PID 3492 wrote to memory of 3848 3492 8da6b8c60d.exe 108 PID 3492 wrote to memory of 3848 3492 8da6b8c60d.exe 108 PID 3492 wrote to memory of 3848 3492 8da6b8c60d.exe 108 PID 3432 wrote to memory of 3128 3432 skotes.exe 113 PID 3432 wrote to memory of 3128 3432 skotes.exe 113 PID 3432 wrote to memory of 3128 3432 skotes.exe 113 PID 704 wrote to memory of 836 704 4c6f1089ef.exe 115 PID 704 wrote to memory of 836 704 4c6f1089ef.exe 115 PID 704 wrote to memory of 836 704 4c6f1089ef.exe 115 PID 3128 wrote to memory of 1796 3128 09e5eb3e6a.exe 117 PID 3128 wrote to memory of 1796 3128 09e5eb3e6a.exe 117 PID 3128 wrote to memory of 1796 3128 09e5eb3e6a.exe 117 PID 3128 wrote to memory of 1796 3128 09e5eb3e6a.exe 117 PID 3128 wrote to memory of 1796 3128 09e5eb3e6a.exe 117 PID 3128 wrote to memory of 1796 3128 09e5eb3e6a.exe 117 PID 3128 wrote to memory of 1796 3128 09e5eb3e6a.exe 117 PID 3128 wrote to memory of 1796 3128 09e5eb3e6a.exe 117 PID 3128 wrote to memory of 1796 3128 09e5eb3e6a.exe 117 PID 3432 wrote to memory of 4824 3432 skotes.exe 122 PID 3432 wrote to memory of 4824 3432 skotes.exe 122 PID 3432 wrote to memory of 4824 3432 skotes.exe 122 PID 704 wrote to memory of 2316 704 4c6f1089ef.exe 124 PID 704 wrote to memory of 2316 704 4c6f1089ef.exe 124 PID 704 wrote to memory of 2316 704 4c6f1089ef.exe 124 PID 3432 wrote to memory of 2076 3432 skotes.exe 127 PID 3432 wrote to memory of 2076 3432 skotes.exe 127 PID 3432 wrote to memory of 2076 3432 skotes.exe 127 PID 4008 wrote to memory of 1516 4008 6a14c8199c.exe 128 PID 4008 wrote to memory of 1516 4008 6a14c8199c.exe 128 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2652
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\System32\svchost.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3848
-
-
C:\Users\Admin\AppData\Local\Temp\b2f8caea1c0425e7cf69d729262dfeede6df2a415803a7b497359f0124db3ad4.exe"C:\Users\Admin\AppData\Local\Temp\b2f8caea1c0425e7cf69d729262dfeede6df2a415803a7b497359f0124db3ad4.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Users\Admin\AppData\Local\Temp\1017306001\6a14c8199c.exe"C:\Users\Admin\AppData\Local\Temp\1017306001\6a14c8199c.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Users\Admin\AppData\Local\Temp\1017306001\6a14c8199c.exe"C:\Users\Admin\AppData\Local\Temp\1017306001\6a14c8199c.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1516
-
-
-
C:\Users\Admin\AppData\Local\Temp\1017307001\e41e0a5b09.exe"C:\Users\Admin\AppData\Local\Temp\1017307001\e41e0a5b09.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:8
-
-
C:\Users\Admin\AppData\Local\Temp\1017308001\5110830a89.exe"C:\Users\Admin\AppData\Local\Temp\1017308001\5110830a89.exe"3⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4364
-
-
C:\Users\Admin\AppData\Local\Temp\1017309001\539bca399f.exe"C:\Users\Admin\AppData\Local\Temp\1017309001\539bca399f.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Users\Admin\AppData\Local\Temp\1017309001\539bca399f.exe"C:\Users\Admin\AppData\Local\Temp\1017309001\539bca399f.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4636
-
-
-
C:\Users\Admin\AppData\Local\Temp\1017310001\4c6f1089ef.exe"C:\Users\Admin\AppData\Local\Temp\1017310001\4c6f1089ef.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:704 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath "C:\vnmpejhr"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2156
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:836
-
-
C:\vnmpejhr\6b1286ea1b6a4048b34c79636bb9d73f.exe"C:\vnmpejhr\6b1286ea1b6a4048b34c79636bb9d73f.exe"4⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2316
-
-
-
C:\Users\Admin\AppData\Local\Temp\1017311001\8da6b8c60d.exe"C:\Users\Admin\AppData\Local\Temp\1017311001\8da6b8c60d.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3492 -s 5364⤵
- Program crash
PID:4816
-
-
-
C:\Users\Admin\AppData\Local\Temp\1017312001\09e5eb3e6a.exe"C:\Users\Admin\AppData\Local\Temp\1017312001\09e5eb3e6a.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3128 -
C:\Users\Admin\AppData\Local\Temp\1017312001\09e5eb3e6a.exe"C:\Users\Admin\AppData\Local\Temp\1017312001\09e5eb3e6a.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1796
-
-
-
C:\Users\Admin\AppData\Local\Temp\1017313001\6bd1bab17d.exe"C:\Users\Admin\AppData\Local\Temp\1017313001\6bd1bab17d.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4824
-
-
C:\Users\Admin\AppData\Local\Temp\1017314001\5109184294.exe"C:\Users\Admin\AppData\Local\Temp\1017314001\5109184294.exe"3⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2076
-
-
C:\Users\Admin\AppData\Local\Temp\1017315001\dbf77b1117.exe"C:\Users\Admin\AppData\Local\Temp\1017315001\dbf77b1117.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\CE03EBLVJEJKGS323HBLBN8627PR.exe"C:\Users\Admin\AppData\Local\Temp\CE03EBLVJEJKGS323HBLBN8627PR.exe"4⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3292
-
-
C:\Users\Admin\AppData\Local\Temp\1E9GK4AB1NJELUL9AATJO7HSPXSKU.exe"C:\Users\Admin\AppData\Local\Temp\1E9GK4AB1NJELUL9AATJO7HSPXSKU.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2348
-
-
-
C:\Users\Admin\AppData\Local\Temp\1017316001\fbc47016c8.exe"C:\Users\Admin\AppData\Local\Temp\1017316001\fbc47016c8.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3328
-
-
C:\Users\Admin\AppData\Local\Temp\1017317001\d166b4bfbe.exe"C:\Users\Admin\AppData\Local\Temp\1017317001\d166b4bfbe.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4112 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2196
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2908
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1344
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5040
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4768
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:3312
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2724 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1984 -parentBuildID 20240401114208 -prefsHandle 1912 -prefMapHandle 1904 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {24d463ff-a1c8-430e-b3b3-3151114bafba} 2724 "\\.\pipe\gecko-crash-server-pipe.2724" gpu6⤵PID:4680
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2420 -parentBuildID 20240401114208 -prefsHandle 2412 -prefMapHandle 2408 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {371b70c5-f61d-4eff-8cab-f6fdcbc70893} 2724 "\\.\pipe\gecko-crash-server-pipe.2724" socket6⤵PID:3504
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2884 -childID 1 -isForBrowser -prefsHandle 3192 -prefMapHandle 3020 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cbbd1195-4283-42f2-ada1-7cd6a0f04681} 2724 "\\.\pipe\gecko-crash-server-pipe.2724" tab6⤵PID:4524
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4164 -childID 2 -isForBrowser -prefsHandle 4156 -prefMapHandle 4152 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {22be46a3-a08f-4358-a9ea-90655b302caa} 2724 "\\.\pipe\gecko-crash-server-pipe.2724" tab6⤵PID:5008
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4912 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4944 -prefMapHandle 4908 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {aab1c406-d2d6-4f36-a16a-598ca0cde77f} 2724 "\\.\pipe\gecko-crash-server-pipe.2724" utility6⤵
- Checks processor information in registry
PID:5596
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5076 -childID 3 -isForBrowser -prefsHandle 5204 -prefMapHandle 5200 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {03d63f5d-b370-4025-b84f-02b815d3b735} 2724 "\\.\pipe\gecko-crash-server-pipe.2724" tab6⤵PID:5872
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5436 -childID 4 -isForBrowser -prefsHandle 5344 -prefMapHandle 5348 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9836b50d-9220-469d-959c-09e7f72d1913} 2724 "\\.\pipe\gecko-crash-server-pipe.2724" tab6⤵PID:5888
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5456 -childID 5 -isForBrowser -prefsHandle 5548 -prefMapHandle 5552 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d7f77522-70eb-4c92-8fdc-7bdd580c9e8e} 2724 "\\.\pipe\gecko-crash-server-pipe.2724" tab6⤵PID:5900
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1017318001\976fadb21c.exe"C:\Users\Admin\AppData\Local\Temp\1017318001\976fadb21c.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5032
-
-
C:\Users\Admin\AppData\Local\Temp\1017319001\zudFSfy.exe"C:\Users\Admin\AppData\Local\Temp\1017319001\zudFSfy.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:452 -
C:\Users\Admin\AppData\Local\Temp\1017319001\zudFSfy.exe"C:\Users\Admin\AppData\Local\Temp\1017319001\zudFSfy.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5540
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3492 -ip 34921⤵PID:1852
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5704
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5324
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
1KB
MD58ec831f3e3a3f77e4a7b9cd32b48384c
SHA1d83f09fd87c5bd86e045873c231c14836e76a05c
SHA2567667e538030e3f8ce2886e47a01af24cb0ea70528b1e821c5d8832c5076cb982
SHA51226bffa2406b66368bd412bf25869a792631455645992cdcade2dbc13a2e56fb546414a6a9223b94c96c38d89187add6678d4779a88b38b0c9e36be8527b213c3
-
Filesize
18KB
MD531501156ea7fd2c854c544636d14da30
SHA18e8bb90c9389b58c6e7287fa70483b62c0795277
SHA2568959e1c73d9ddffc68b29616940ce27b8c591c160a369536bbfd10976566e98e
SHA512d1fd00e2712afcdd4eaffe6eafb7cbd92356ef53fb4da39ef287db8ccadb03a6f43bf13e8e12b67e04ff48bfd4ef1e2fc2395f6435d30de019b6d112ea150749
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\g9per00b.default-release\activity-stream.discovery_stream.json
Filesize27KB
MD5a11b3d6dfd642845a7c2940d091af0e2
SHA1493ab85d956baeedde080e90ce87cdd47ddf0bd0
SHA256b18906ee2f1df10c6cc8540f66a9abf2c653ef74b1d37569396489c0fdbcd8f7
SHA5123fbe69f68a5557c220551e8bc867b0ee2fa0cec8fca958986e37ff8b415a0bc040be024aee8bdeb6a0962bacb9ce171d86d9973c83163e97b7495128beeb8073
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\g9per00b.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD5071a635167b2a5cb9023f86dd832dede
SHA174404558bed333a2567831867a9bdd9cc8d2c735
SHA2568b5e0429cf83949f51d1c93ce309d2a0632247c30379bfed088c70ddba0a8f87
SHA512fbc6a8bd9dfb753e0c4110e402a0cb246178517b563054c728685be861234633306814e7a651aca29e0e1f23c9f7b9785b7f2d1ecb909cec73f16a70c78673c1
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\g9per00b.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
3.1MB
MD5c00a67d527ef38dc6f49d0ad7f13b393
SHA17b8f2de130ab5e4e59c3c2f4a071bda831ac219d
SHA25612226ccae8c807641241ba5178d853aad38984eefb0c0c4d65abc4da3f9787c3
SHA5129286d267b167cba01e55e68c8c5582f903bed0dd8bc4135eb528ef6814e60e7d4dda2b3611e13efb56aa993635fbab218b0885daf5daea6043061d8384af40ca
-
Filesize
1.8MB
MD5ff279f4e5b1c6fbda804d2437c2dbdc8
SHA12feb3762c877a5ae3ca60eeebc37003ad0844245
SHA256e115298ab160da9c7a998e4ae0b72333f64b207da165134ca45eb997a000d378
SHA512c7a8bbcb122b2c7b57c8b678c5eed075ee5e7c355afbf86238282d2d3458019da1a8523520e1a1c631cd01b555f7df340545fd1e44ad678dc97c40b23428f967
-
Filesize
4.3MB
MD532353fd729d2709ff0f7fbd5af5d38b1
SHA1bd2666a194111152ed802d4c5ae96f5ecc6f61c3
SHA256506a9cff027877d2344079b59c90ed5cd5f85225ede2828ce2a9aaf0c22cd329
SHA51209f8cf2c288453d75d0ef19065f62791bbdd7a5fe1f91294db23025b9f394f9edcaae3c4451b2ce6807f0bdd9b39a977a5905a6aa44b9ba6ab39b162486839b7
-
Filesize
758KB
MD5afd936e441bf5cbdb858e96833cc6ed3
SHA13491edd8c7caf9ae169e21fb58bccd29d95aefef
SHA256c6491d7a6d70c7c51baca7436464667b4894e4989fa7c5e05068dde4699e1cbf
SHA512928c15a1eda602b2a66a53734f3f563ab9626882104e30ee2bf5106cfd6e08ec54f96e3063f1ab89bf13be2c8822a8419f5d8ee0a3583a4c479785226051a325
-
Filesize
21KB
MD514becdf1e2402e9aa6c2be0e6167041e
SHA172cbbae6878f5e06060a0038b25ede93b445f0df
SHA2567a769963165063758f15f6e0cece25c9d13072f67fa0d3c25a03a5104fe0783a
SHA51216b837615505f352e134afd9d8655c9cabfa5bfcfbee2c0c34f2d7d9588aa71f875e4e5feb8cdf0f7bacc00f7c1ca8dabd3b3d92afc99abf705c05c78e298b4a
-
Filesize
1.9MB
MD5eed0b74ba5f52789a7b50fbf64a6eb5f
SHA1146367bafe9364ec489c48dbee6b8b8aeecf38fc
SHA256e3d09adecc926177201dc5ec6b6a3ba661b8de3aed15afa65893e3ad76303c61
SHA512e9bd7a33f7da4b87aa0f18f33b3b54fe3cf8c4436e88d1d39405608a62dc8d69d516dde7bb5211b9b4396c2198ed42c447b7c4a627eed892bfc0d468ddf92d3f
-
Filesize
747KB
MD58a9cb17c0224a01bd34b46495983c50a
SHA100296ea6a56f6e10a0f1450a20c5fb329b8856c1
SHA2563d51b9523b387859bc0d94246dfb216cfa82f9d650c8d11be11ed67f70e7440b
SHA5121472e4670f469c43227b965984ecc223a526f6284363d8e08a3b5b55e602ccce62df4bc49939ee5bd7df7b0c26e20da896b084eccab767f8728e6bf14d71c840
-
Filesize
1.8MB
MD525fb9c54265bbacc7a055174479f0b70
SHA14af069a2ec874703a7e29023d23a1ada491b584e
SHA256552f8be2c6b2208a89c728f68488930c661b3a06c35a20d133ef7d3c63a86b9c
SHA5127dfd9e0f3fa2d68a6ce8c952e3b755559db73bb7a06c95ad6ed8ac16dedb49be8b8337afc07c9c682f0c4be9db291a551286353e2e2b624223487dc1c8b54668
-
Filesize
4.2MB
MD5fa2b9ef3eedea37bee3f07f9a580ca57
SHA1886267a5d0287a9e8385aa7337f7c0dfb6e0c3b2
SHA256bb2af2fb0383047e427ce40b100535426c1037778a3e3c713158d02d6ab6c8a2
SHA512a5ffb97936a0c9b4451436b9b8d5e433a108ad5c9c70c9bce55e8597e7b76e9d8d0786663f9e535bb313a51a1ed75a482c08dba6ec64eafe46029905ad406f64
-
Filesize
1.7MB
MD581cfbdcd567c50d28a6380910dd6cf83
SHA13fac13a3e2416853ce16ed6052ba91e4ec978c86
SHA25655cb3e812b8545ae08027c08bc3d8d0ffc8e6cd2854547a582ab3c4e2db88d1d
SHA512fd083c0ec0a95175ef05afb2c60cc1990b868d0a5db483372a294bda2955db7dbe586ab9c3633a7bbb2bfc6f478e09b2f5e04fae41393a626dbb53345fc81838
-
Filesize
2.7MB
MD5b02d86ff1695f8c3faf80f6e5cd1b8bf
SHA1aaf7bc27106152a25b5ad8ce4c643f4def00bfe8
SHA256ff283c5f3e854c82dcfb4ea631f5f68496fb1654d025b5f3acfae5318c5ed088
SHA5124c219352d2555f183b143ec875f7944c622d1f5fdd5969caf46844e537fd8852c0309e9d9d0cadc55e151bda2cc49eff2d8bb2d84e81ce5261f2e0f474fc7098
-
Filesize
945KB
MD5457285e2cf3c306e05a2dc450c9748ad
SHA1d9d57583b4eac7332c9ff79869695b995ba44d2f
SHA2560c9c4c41cda2b02f17a65d180643a428c70c4535d0e214739c3d461403408f06
SHA512f4c5f17aa2e388e4f682869999ca7ff10c79cd2a66e2803c630c75a2748399201805ac7bf0a352132bd8f9ae06420a51a2c5a003a5b4d1a011ddbc12ee728003
-
Filesize
1.1MB
MD5ef08a45833a7d881c90ded1952f96cb4
SHA1f04aeeb63a1409bd916558d2c40fab8a5ed8168b
SHA25633c236dc81af2a47d595731d6fa47269b2874b281152530fdffdda9cbeb3b501
SHA51274e84f710c90121527f06d453e9286910f2e8b6ac09d2aeb4ab1f0ead23ea9b410c5d1074d8bc759bc3e766b5bc77d156756c7df093ba94093107393290ced97
-
Filesize
1.7MB
MD551501deb706a509a1dec7745ecf713e3
SHA17a925e2f3231498ab0cbd8cefe9b475fbab5f58b
SHA256fe72e6a8775634e7d76adecf570a2866a81714d3e3d7be6174c8fefb327f2f0b
SHA512cae65b34492e2c8413bcc19448697bd8c76e685046b60ecc65b313a49e4d7f9e9df24f0593f4691cffca1d8c7e9bc077bb2df7918767614b2172167bdc847476
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2.8MB
MD58487b3f80d4a1d6db6d0268b17b66b8b
SHA116ebd2a072305b3432b0f1348c94e90899225e71
SHA256b2f8caea1c0425e7cf69d729262dfeede6df2a415803a7b497359f0124db3ad4
SHA512fa961e40f5c40dffbfc0eeec88eef0622acc0103191ec16c3b5a679464c0cb54f16d762918cec20db36b603752d563ad438305ccdf317e1fd4e1d18f085da451
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\AlternateServices.bin
Filesize6KB
MD513eb50618fa8e0196bf8755e67182f2f
SHA1abe8731cc6073874dd7c6c4619e7e16e424d015b
SHA256fe7174862c4f42bf8b0086b49334b2f2f2c114aa384d8263847a47f1b4f8cf58
SHA512db207bbb1343a8f4e50763211a55276ee7729ad7dba01aa3fe7dea15d484a007cb519991d5ea4b70e397a59a7227f3dca3b88e7a428eb083964800667b51be89
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\AlternateServices.bin
Filesize10KB
MD503759c1f9718d718ae693eb73fe3cb54
SHA10e3ea908621a1614ef0979abba3de2ddeaf81a0d
SHA2561e7006f16e179366559f7af9f8b66f06be6307b8d9a77cc670afb6fa79cd64cd
SHA5121991c78253a5805bec3b7d5f727a7b25c98b173cbf3b7dfd58e3df046902166a9faf77e5bae444bf44b2200fe9a849556e6fde5e0c53fa708542c25f5b87e2a0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.tmp
Filesize21KB
MD5f7f3894c057ef7370da1e835438c426a
SHA16384e175dfaaa3b76a6c16ca0c7b1fbd3b68b9ce
SHA256a322a26c84337eaa8c04322dded81ecb69b7c308899e9dab99638b1cbba6fcd5
SHA5121d1733241ba71a511b6c179fffcf574260c48c498cae947ebe239240c4459dffac7c1dc8beec797208618a79afcddfbc9ecc41da02b567317794a2f87418e4b9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD5faecdbd0f2a9a98e9c6d5381c57cdf6a
SHA1f4e4c47b1f997ea79b8dcc2e53f06eeb843b692b
SHA25698c946fa7026ca22df76225a1cf5f1bbbf3ac4e70b3b1638ee4dedaf97e6610b
SHA512884e6a6a71747cf1f52995b1f8dfa76aa0026792e189ed285a183bf16805978b482f3953e79a461580d4df55d46451eab30693ea99445a665a3fab6007b58e1f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD5cfffdce9dfa7f4243900abb020c6ef01
SHA1b86a9a83b250d53eaea09c7cbe016e361f9c76ee
SHA256f3537df9b714e126bc93014ae4897f3e14426596219e7ef419aac4820ecc30cf
SHA5120ac5ae8e665e0fa555f0a6693c6332baed2432f678e4552bfa8c77325ed9d42efc97192043cc25a53ebd3a35a1027e5e62c605a13f1c49a69e0e3b5b58e0aa5e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD567538dff70058b9fc65507c12f3a0d8e
SHA152c339f030bbbd48079b92015ae05d5c5eecf72a
SHA256c02c46c3457984c362f7a75b62b6a91199726a6bd993376291910f89984b0129
SHA512d3c3725241722e39a6ee9ed250f4503c51654c8c940bdbfcb3df1c655b313e0a7ac07403771cf96dfc6471d71c3c84ee714f08c9df426e6786c8ee807f2425d4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD59d0ff9ac3228e3573802d72ccd5fa2a6
SHA1257bbd30b9e2a0811a519f215777f696b69c8c88
SHA256887e45f0bc911f782b88f670702a7db6c2b73b587c115cbfa3f0377265dacbcf
SHA512bfbdf7cc0be7e1b3e4edc3defd510e2a41c250e2fd4127d6e46cc8206d29809cb831d59eb8720c73588fb04d8d743715df6ec6812706359029a8214f6d337472
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\pending_pings\e2b928e0-967f-4bc1-b67c-a95408f35cd1
Filesize659B
MD5267627892d73794038cad6b1d969e382
SHA1f498039a172aa67839996ea8a14450c12a510d09
SHA256f0b3378a42e7cf3bfc3045fa919c2335a82ecb439ceb7f9fdf4420855e472dbd
SHA512212f940588c03260235b8e6476dc9bfd5520841e415ce8e70245e9474e0249e65bfe339eb224e41d21b9af7cc9ce77259076a823345cacbbea732f0199b0f11a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\pending_pings\e4972639-0c55-411d-b594-94687bae180b
Filesize982B
MD591cc8f8b6c47a58bf51b3c0fbc86fe24
SHA14f925f6e6ff2bf69ed77b6ff791027d1ccb230e9
SHA256451bbce8a64c3017ee7e97d7bbe9d8a14732e3b3db9d3b284c45b68842446175
SHA51227b6d1337b22687d34b83b1615971e9e92010eb50fee0d907dc8b8138d5cd2a5d8b4fab7e4045af8268c936ad17084f86a604d42f3524afc2db57f4f7c0ba731
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD576c2314df4ed2fe8139a12b76cc4154a
SHA1c52e8d96d2828f48fc24e29fd8e6e8fe656aed1c
SHA2565ae2969a25d71ac5a5098b462c54dda38edcf94dec7969ec23a6bba6be08df96
SHA512bddbd7d440d17c21835f29e88eecfdaaabc6dd169a92603db1f5e107d4f820e7fce492487166e14cdd4d00deca5aa34e63c676633605da38d1fe9555c42754c5
-
Filesize
12KB
MD5814bcbb915f81bd08ccc6ae913cb177e
SHA18a2a46f07d656dee28a6c59420753eeec9941e6a
SHA256460415c6f2c891fcd16a806dca324062c0e18712c03b07689895ca5308e3b225
SHA51248087326c0a2a23dc25e9297a41129ff577ffb61701c7315fcf820926f0db987941fa494a5433f5017b7f8c01a650d8a3b3b1ec801d7679a4ac66e4add2a7425
-
Filesize
15KB
MD5c158b6772afabbd4782c7efa2d7a724a
SHA1955f1317b81808d672eb4e6dd2b8212d47c56a0f
SHA256e0d58551bb1f6589f842174b688ddd26acf0ac9323aa652e689d5d7994cc2045
SHA51239165777eb4d750b4881bd7b9c7eeeb906eb6435ae837d40a8c7ce006a25a7dd631c6a206d4b71bc67a97ba3ba51b7dcf45005ec7eb94ac088573d2348cf4046
-
Filesize
10KB
MD5c8d02c8eed1c402895e9883153666dfe
SHA19a1cae86bad7e0064d344594695e218c929bf8b7
SHA25601b23a5dc4554ea1b2bcf8b3a01b6ac171f43c4342d1f90cdaeb40e0b06a563d
SHA51265da3905a9698797f6117169d1a7e6e78c0e58b4b8697e61ed3b79bbcdc3afd47278259040a82bd9822cf51425dccf49c45d4b53fa9cfbdfde5f1610696ef865
-
Filesize
1.2MB
MD5577cd52217da6d7163cea46bb01c107f
SHA182b31cc52c538238e63bdfc22d1ea306ea0b852a
SHA256139762e396fb930400fab8faab80cb679abbe642144261cba24973fb23bcd728
SHA5128abad4eaf2a302dfd9ead058e8c14d996437975730125c46d034a71028921ff36ff5d157ad3671e328ac667ec8095db19fa14a9e8eaaf1a7738aa3d0120b5474