Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-11-2024 04:03
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20241010-en
General
-
Target
file.exe
-
Size
1.9MB
-
MD5
6d36fdc5dd140f0431b931b1fb8ab8fc
-
SHA1
adbe7e131b9375984e6de751853d324405cb71cd
-
SHA256
ec24753b20aaee3043247b49828eb15efd02a5c04bff64caccd49a8523d179aa
-
SHA512
26c8c7ec7733d80ce9a198194a6813d7fc1221fe7637b766591f05c59fe64fd16d32cf3d89fce8eb14581db298f32f693f350dda0c11c3ddb13ad65aeb0eca4e
-
SSDEEP
49152:DDj/gXSixGKKuuDVgL4OfZCc/muT0JdD49APk2OxqR:DcNQKSpgL4iCbuTudaok2Oxq
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://processhol.sbs/api
https://p10tgrace.sbs/api
https://peepburry828.sbs/api
https://3xp3cts1aim.sbs/api
https://p3ar11fter.sbs/api
Signatures
-
Amadey family
-
Cryptbot family
-
Detects CryptBot payload 1 IoCs
CryptBot is a C++ stealer distributed widely in bundle with other software.
resource yara_rule behavioral2/memory/2956-3722-0x0000000069CC0000-0x000000006A71B000-memory.dmp family_cryptbot_v3 -
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c890d02f7f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c890d02f7f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c890d02f7f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c890d02f7f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c890d02f7f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c890d02f7f.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 80fef865d0.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3ecda541a8.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 09df19ace1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c890d02f7f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 8 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 1756 chrome.exe 228 chrome.exe 1060 chrome.exe 4864 chrome.exe 1952 chrome.exe 2712 chrome.exe 2392 chrome.exe 3280 chrome.exe -
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3ecda541a8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 09df19ace1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 09df19ace1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 80fef865d0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 80fef865d0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c890d02f7f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c890d02f7f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3ecda541a8.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation file.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 80fef865d0.exe -
Executes dropped EXE 9 IoCs
pid Process 4176 skotes.exe 2956 80fef865d0.exe 1952 3ecda541a8.exe 1276 09df19ace1.exe 1132 7880a27bad.exe 4496 c890d02f7f.exe 5868 skotes.exe 1544 skotes.exe 3960 service123.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 80fef865d0.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 3ecda541a8.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 09df19ace1.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine c890d02f7f.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine file.exe -
Loads dropped DLL 1 IoCs
pid Process 3960 service123.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c890d02f7f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c890d02f7f.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\c890d02f7f.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007317001\\c890d02f7f.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\3ecda541a8.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007314001\\3ecda541a8.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\09df19ace1.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007315001\\09df19ace1.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\7880a27bad.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007316001\\7880a27bad.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000023c8f-83.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 3920 file.exe 4176 skotes.exe 2956 80fef865d0.exe 1952 3ecda541a8.exe 1276 09df19ace1.exe 4496 c890d02f7f.exe 5868 skotes.exe 1544 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 3100 1276 WerFault.exe 93 4720 2956 WerFault.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3ecda541a8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 80fef865d0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7880a27bad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 09df19ace1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c890d02f7f.exe -
Checks processor information in registry 2 TTPs 12 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 80fef865d0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 80fef865d0.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 09df19ace1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 09df19ace1.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 5 IoCs
pid Process 4504 taskkill.exe 2124 taskkill.exe 3672 taskkill.exe 1456 taskkill.exe 3612 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 540 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 3920 file.exe 3920 file.exe 4176 skotes.exe 4176 skotes.exe 2956 80fef865d0.exe 2956 80fef865d0.exe 1952 3ecda541a8.exe 1952 3ecda541a8.exe 1276 09df19ace1.exe 1276 09df19ace1.exe 1276 09df19ace1.exe 1276 09df19ace1.exe 1276 09df19ace1.exe 1276 09df19ace1.exe 228 chrome.exe 228 chrome.exe 1132 7880a27bad.exe 1132 7880a27bad.exe 4496 c890d02f7f.exe 4496 c890d02f7f.exe 1132 7880a27bad.exe 1132 7880a27bad.exe 4496 c890d02f7f.exe 4496 c890d02f7f.exe 4496 c890d02f7f.exe 5868 skotes.exe 5868 skotes.exe 2712 chrome.exe 2712 chrome.exe 1544 skotes.exe 1544 skotes.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 228 chrome.exe 228 chrome.exe 228 chrome.exe 2712 chrome.exe 2712 chrome.exe 2712 chrome.exe -
Suspicious use of AdjustPrivilegeToken 19 IoCs
description pid Process Token: SeDebugPrivilege 4504 taskkill.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeDebugPrivilege 2124 taskkill.exe Token: SeDebugPrivilege 3672 taskkill.exe Token: SeDebugPrivilege 1456 taskkill.exe Token: SeDebugPrivilege 3612 taskkill.exe Token: SeDebugPrivilege 4916 firefox.exe Token: SeDebugPrivilege 4916 firefox.exe Token: SeDebugPrivilege 4496 c890d02f7f.exe Token: SeShutdownPrivilege 2712 chrome.exe Token: SeCreatePagefilePrivilege 2712 chrome.exe Token: SeShutdownPrivilege 2712 chrome.exe Token: SeCreatePagefilePrivilege 2712 chrome.exe Token: SeDebugPrivilege 4916 firefox.exe Token: SeDebugPrivilege 4916 firefox.exe Token: SeDebugPrivilege 4916 firefox.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3920 file.exe 1132 7880a27bad.exe 1132 7880a27bad.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 1132 7880a27bad.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 1132 7880a27bad.exe 1132 7880a27bad.exe 1132 7880a27bad.exe 1132 7880a27bad.exe 4916 firefox.exe 4916 firefox.exe 4916 firefox.exe 4916 firefox.exe 4916 firefox.exe 4916 firefox.exe 4916 firefox.exe 4916 firefox.exe 4916 firefox.exe 4916 firefox.exe 4916 firefox.exe 4916 firefox.exe 4916 firefox.exe 4916 firefox.exe 4916 firefox.exe 4916 firefox.exe 4916 firefox.exe 4916 firefox.exe 4916 firefox.exe 4916 firefox.exe 4916 firefox.exe 1132 7880a27bad.exe 1132 7880a27bad.exe 1132 7880a27bad.exe 1132 7880a27bad.exe 2712 chrome.exe 2712 chrome.exe 2712 chrome.exe 2712 chrome.exe 2712 chrome.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 1132 7880a27bad.exe 1132 7880a27bad.exe 1132 7880a27bad.exe 1132 7880a27bad.exe 1132 7880a27bad.exe 1132 7880a27bad.exe 1132 7880a27bad.exe 4916 firefox.exe 4916 firefox.exe 4916 firefox.exe 4916 firefox.exe 4916 firefox.exe 4916 firefox.exe 4916 firefox.exe 4916 firefox.exe 4916 firefox.exe 4916 firefox.exe 4916 firefox.exe 4916 firefox.exe 4916 firefox.exe 4916 firefox.exe 4916 firefox.exe 4916 firefox.exe 4916 firefox.exe 4916 firefox.exe 4916 firefox.exe 4916 firefox.exe 1132 7880a27bad.exe 1132 7880a27bad.exe 1132 7880a27bad.exe 1132 7880a27bad.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4916 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3920 wrote to memory of 4176 3920 file.exe 86 PID 3920 wrote to memory of 4176 3920 file.exe 86 PID 3920 wrote to memory of 4176 3920 file.exe 86 PID 4176 wrote to memory of 2956 4176 skotes.exe 87 PID 4176 wrote to memory of 2956 4176 skotes.exe 87 PID 4176 wrote to memory of 2956 4176 skotes.exe 87 PID 4176 wrote to memory of 1952 4176 skotes.exe 90 PID 4176 wrote to memory of 1952 4176 skotes.exe 90 PID 4176 wrote to memory of 1952 4176 skotes.exe 90 PID 4176 wrote to memory of 1276 4176 skotes.exe 93 PID 4176 wrote to memory of 1276 4176 skotes.exe 93 PID 4176 wrote to memory of 1276 4176 skotes.exe 93 PID 4176 wrote to memory of 1132 4176 skotes.exe 95 PID 4176 wrote to memory of 1132 4176 skotes.exe 95 PID 4176 wrote to memory of 1132 4176 skotes.exe 95 PID 1132 wrote to memory of 4504 1132 7880a27bad.exe 96 PID 1132 wrote to memory of 4504 1132 7880a27bad.exe 96 PID 1132 wrote to memory of 4504 1132 7880a27bad.exe 96 PID 1276 wrote to memory of 228 1276 09df19ace1.exe 98 PID 1276 wrote to memory of 228 1276 09df19ace1.exe 98 PID 228 wrote to memory of 4964 228 chrome.exe 99 PID 228 wrote to memory of 4964 228 chrome.exe 99 PID 228 wrote to memory of 2488 228 chrome.exe 101 PID 228 wrote to memory of 2488 228 chrome.exe 101 PID 228 wrote to memory of 2488 228 chrome.exe 101 PID 228 wrote to memory of 2488 228 chrome.exe 101 PID 228 wrote to memory of 2488 228 chrome.exe 101 PID 228 wrote to memory of 2488 228 chrome.exe 101 PID 228 wrote to memory of 2488 228 chrome.exe 101 PID 228 wrote to memory of 2488 228 chrome.exe 101 PID 228 wrote to memory of 2488 228 chrome.exe 101 PID 228 wrote to memory of 2488 228 chrome.exe 101 PID 228 wrote to memory of 2488 228 chrome.exe 101 PID 228 wrote to memory of 2488 228 chrome.exe 101 PID 228 wrote to memory of 2488 228 chrome.exe 101 PID 228 wrote to memory of 2488 228 chrome.exe 101 PID 228 wrote to memory of 2488 228 chrome.exe 101 PID 228 wrote to memory of 2488 228 chrome.exe 101 PID 228 wrote to memory of 2488 228 chrome.exe 101 PID 228 wrote to memory of 2488 228 chrome.exe 101 PID 228 wrote to memory of 2488 228 chrome.exe 101 PID 228 wrote to memory of 2488 228 chrome.exe 101 PID 228 wrote to memory of 2488 228 chrome.exe 101 PID 228 wrote to memory of 2488 228 chrome.exe 101 PID 228 wrote to memory of 2488 228 chrome.exe 101 PID 228 wrote to memory of 2488 228 chrome.exe 101 PID 228 wrote to memory of 2488 228 chrome.exe 101 PID 228 wrote to memory of 2488 228 chrome.exe 101 PID 228 wrote to memory of 2488 228 chrome.exe 101 PID 228 wrote to memory of 2488 228 chrome.exe 101 PID 228 wrote to memory of 2488 228 chrome.exe 101 PID 228 wrote to memory of 2488 228 chrome.exe 101 PID 228 wrote to memory of 3740 228 chrome.exe 102 PID 228 wrote to memory of 3740 228 chrome.exe 102 PID 228 wrote to memory of 920 228 chrome.exe 103 PID 228 wrote to memory of 920 228 chrome.exe 103 PID 228 wrote to memory of 920 228 chrome.exe 103 PID 228 wrote to memory of 920 228 chrome.exe 103 PID 228 wrote to memory of 920 228 chrome.exe 103 PID 228 wrote to memory of 920 228 chrome.exe 103 PID 228 wrote to memory of 920 228 chrome.exe 103 PID 228 wrote to memory of 920 228 chrome.exe 103 PID 228 wrote to memory of 920 228 chrome.exe 103 PID 228 wrote to memory of 920 228 chrome.exe 103 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Users\Admin\AppData\Local\Temp\1007309001\80fef865d0.exe"C:\Users\Admin\AppData\Local\Temp\1007309001\80fef865d0.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2956 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2712 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffc0c83cc40,0x7ffc0c83cc4c,0x7ffc0c83cc585⤵PID:4648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1968,i,11421750963629375562,7019261281905871317,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1964 /prefetch:25⤵PID:3580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1848,i,11421750963629375562,7019261281905871317,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2500 /prefetch:35⤵PID:5404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2172,i,11421750963629375562,7019261281905871317,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2572 /prefetch:85⤵PID:5512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3188,i,11421750963629375562,7019261281905871317,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3224 /prefetch:15⤵
- Uses browser remote debugging
PID:2392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3196,i,11421750963629375562,7019261281905871317,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3376 /prefetch:15⤵
- Uses browser remote debugging
PID:1756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4524,i,11421750963629375562,7019261281905871317,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3644 /prefetch:15⤵
- Uses browser remote debugging
PID:3280
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3960
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:540
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2956 -s 18524⤵
- Program crash
PID:4720
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007314001\3ecda541a8.exe"C:\Users\Admin\AppData\Local\Temp\1007314001\3ecda541a8.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1952
-
-
C:\Users\Admin\AppData\Local\Temp\1007315001\09df19ace1.exe"C:\Users\Admin\AppData\Local\Temp\1007315001\09df19ace1.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffbfcfbcc40,0x7ffbfcfbcc4c,0x7ffbfcfbcc585⤵PID:4964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=272,i,8878070900379053687,10111486517876238744,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1676 /prefetch:25⤵PID:2488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2168,i,8878070900379053687,10111486517876238744,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2128 /prefetch:35⤵PID:3740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2228,i,8878070900379053687,10111486517876238744,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2568 /prefetch:85⤵PID:920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3176,i,8878070900379053687,10111486517876238744,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3188 /prefetch:15⤵
- Uses browser remote debugging
PID:1060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3196,i,8878070900379053687,10111486517876238744,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3232 /prefetch:15⤵
- Uses browser remote debugging
PID:4864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4540,i,8878070900379053687,10111486517876238744,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4516 /prefetch:15⤵
- Uses browser remote debugging
PID:1952
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1276 -s 15804⤵
- Program crash
PID:3100
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007316001\7880a27bad.exe"C:\Users\Admin\AppData\Local\Temp\1007316001\7880a27bad.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4504
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2124
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3672
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1456
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3612
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:1096
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4916 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1964 -parentBuildID 20240401114208 -prefsHandle 1880 -prefMapHandle 1872 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {90b11bfb-450f-4418-9498-2d63b39d9b24} 4916 "\\.\pipe\gecko-crash-server-pipe.4916" gpu6⤵PID:1900
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2420 -parentBuildID 20240401114208 -prefsHandle 2412 -prefMapHandle 2400 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4c2f2fbc-84d7-47b2-b538-f0022627bc86} 4916 "\\.\pipe\gecko-crash-server-pipe.4916" socket6⤵PID:3588
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3048 -childID 1 -isForBrowser -prefsHandle 3052 -prefMapHandle 3216 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1264 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5bf24fdb-264e-4c5e-a1e9-47703f58b8d0} 4916 "\\.\pipe\gecko-crash-server-pipe.4916" tab6⤵PID:1628
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4044 -childID 2 -isForBrowser -prefsHandle 4036 -prefMapHandle 4032 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1264 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e5aed4e2-cfc9-49ea-b7e0-1a2d0ec84a31} 4916 "\\.\pipe\gecko-crash-server-pipe.4916" tab6⤵PID:2864
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4888 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4740 -prefMapHandle 4744 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d7725975-b233-47c1-a018-ec5681c61436} 4916 "\\.\pipe\gecko-crash-server-pipe.4916" utility6⤵
- Checks processor information in registry
PID:5224
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5020 -childID 3 -isForBrowser -prefsHandle 5052 -prefMapHandle 5048 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1264 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {83267bb9-62c0-4708-95d4-ba20e7b0801f} 4916 "\\.\pipe\gecko-crash-server-pipe.4916" tab6⤵PID:5168
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5296 -childID 4 -isForBrowser -prefsHandle 5288 -prefMapHandle 5284 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1264 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {66b6ab7f-40de-4200-a663-579ec2842545} 4916 "\\.\pipe\gecko-crash-server-pipe.4916" tab6⤵PID:320
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5404 -childID 5 -isForBrowser -prefsHandle 5484 -prefMapHandle 5480 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1264 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fd2cdabb-12da-4bff-a705-e7f19a033ade} 4916 "\\.\pipe\gecko-crash-server-pipe.4916" tab6⤵PID:772
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007317001\c890d02f7f.exe"C:\Users\Admin\AppData\Local\Temp\1007317001\c890d02f7f.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4496
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1276 -ip 12761⤵PID:6096
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5868
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4752
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1544
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2956 -ip 29561⤵PID:3324
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40B
MD5980ebd34ef8cdfa9900dba4fe367d2f7
SHA135955645e6324fce99a971a5a80ecae0fc21d971
SHA256d5384308d29f2f9478f0d1354e9f94053300496f3b7cd2f88f5f8d00dbe1482e
SHA512470cce060f4dcca34b26c8c3b2d3d4024c12fb4631ed8251e942e7e992149a422f30526b27f9f55c13d5d9581f022d3b18439893c6b0455180ae70c0fb24430a
-
Filesize
44KB
MD599c5b339b37eb4ee4154dac2fb7c9924
SHA195421d83b2948c7ced2666b611342e37b8bebd52
SHA256e71d86dc906a5311ae7e5c202d45202613e402d7b58a75cdf382de61bc6bc35f
SHA512f645c1c51c3c41e87696d81091ba360875d56e3f47fe370b769c00bd6c554d11332e0fb2fa3d55c756ec7d7bfa605749cb4be34f50d7a7ff30b22a156d9e084b
-
Filesize
264KB
MD51ce58ad6af4ad29f20adbf44b626463d
SHA13a4539ba0927ce9fe657f9ca61d8ad99c3b54712
SHA256742e03c2370356f1c6b7ce8ccf77c6d3b1f3fbb8bfc8a15d41c5a69c5a38c9ee
SHA51228a8b998fdc34bff7b4b288adc9ff7c5e61551fd8adf3fd03e34b51238945d7484a6886127596d4be9b130689a489165924f2d183a5e9942be30ae49c7217f35
-
Filesize
4.0MB
MD5ef5a64a9016bbaf2653a998319d3ab42
SHA106b45c6853e1722ae7a3e484cd623100e76e7519
SHA2561c9bd19325e447c0d92c9f79b934c4a123a5bcf9e1c349606cf409dada4d8cc4
SHA51220b4579bf48e86231629aad747ccde04506ce7db30a7c31745c1eb8445a48f6929749e682a050f323eefcbb866bf4a2baa09989b63f70ea47082308d97056940
-
Filesize
317B
MD50d479c5ed5b19130885fbda9dac55327
SHA164546cbbaf2d28c31208e8c8fd0273613a8a7aa7
SHA2562ee4bac09e8472f24a5e1a5279ddf4a6e70ca2aed1035cc5bd748043c6bfb86f
SHA512ad863af42823503c20027d88a83bc6658947c8e079cb3fa29178cb854db2f5daffe4e1d27153928024225afbabb720024c8a40d9d3b97dd3800f55a37ed4e19f
-
Filesize
44KB
MD5f9ed15100922a6bb68cbf85f13350696
SHA18147d910998cb28dc6b555b0626b887922819a3c
SHA2566c732123408cfe2ffa144336941bfbd532f24173e9ceca05010bf6f0dde8f116
SHA512a71d8551441d16c974c3257e415f0ad7b9a40547a8f747959019c1653a1e459be78d15b1d232c047d809f64ddfc889d37ed432f62e43a4630d58379dd9b85683
-
Filesize
264KB
MD50cc7d24dc69e554729156cbeee1a799d
SHA1f0d0e4b8dce26b50495571513dc9cf093ea838fd
SHA25652ee9a184d16d53c83c1d3ccc4b0adf6648b9b669b4af8729605038711f2c7b7
SHA512f5a61b9f4ef8e13eacf8eb65137eaa088ae89813df70e87d758baa1281243402a0094f772d36de2c5f374dc9100e2d613ff7d47df969d76cb1c3cfc3990f88a3
-
Filesize
1.0MB
MD54e2e997da0ae227057e074c67afdb7fa
SHA10a0b4db63b5a84f0bbbd8b0d472e665be69697cb
SHA256e8fca9c48d54e3405ad60c23ca5eaf2f15fb9a1d59b3936f178fcfac70a967e4
SHA512cb721fb2c0a687fdf89041d9baac042e45991bdd57b1093968e16ba5230741f027c358c8e9f45bab4bf16461fd9145dfacf596e418f4cfda60694af4237ced3f
-
Filesize
4.0MB
MD5c73ceb946a84dd65c7571e065361ff89
SHA10188249b60156917726cece1be3ed2c5157841c4
SHA2565ac5fb30df32a601b6b949cb1a86f869a07ee8b35df9d4cf2a2187681e699483
SHA512f67fc989f0af95783654b6258b8061ec4eb69abb9065db26731eb76e735e6914ffd25b6ebbf4e018fc6899dbaa711af689e62fae4cac97d75d913f2047c2ced4
-
Filesize
329B
MD5a3a9ef1750fd4b464e668b1ea5bb75d5
SHA1b5fd038bb47f30de0d8dd9817c3396dd4275de8e
SHA25606e809777e6b9c4d5aefa2a794a065d1dc6451f44ca319219718aae3d9e46094
SHA512989fd18822d51c980e1494ff1ea56cb1626fab2054136fb571a065e4ec6f159c50eedb1c123103aa408153290e44009e8bbec4f406afed60943c24b5d95d393f
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
336B
MD524c892959e0a819387fcf175d326991f
SHA148b091a8563c84ba441b5794c46bd01e38d1f9e9
SHA256c449ca42792c1fbdef094e38d1a60d39b95f3abc53d668f4b5fba27bac86a939
SHA51244dcbf041a9d10ba3b5fdaa07f9844509a32df1c7eca59ba7e5c846a60f8f231514e2ce46ad5db7fdd41bda6ec3472ce0cc37846a70fb4105453585659d9e6c8
-
Filesize
289B
MD5541c42f1c98b3e1b011d22eba854e707
SHA1db30188de1f22e3077e7044be1386a5d0ecaed9d
SHA2560768e811c51ac61a8e573ac6b53f89dbb1d89eb2fcf62536a9a5f730329c584b
SHA51247828c1b40deb8d37d6ff4fc8f7673fbb59b40e07f54f0fa4121b91941160134c251e20f7f28f7ee5185f3c8aee2b7e95a1bef573bc64c68912016accbe90604
-
Filesize
317B
MD5793a05d4fea6e5ee835b8f6e8cc8f4e9
SHA1592b7c56082150ac2e743595b7e9878602937568
SHA2565386d5abdc20535c705884a5856f446314363e67b1ab4fe7f1a7e137add7d687
SHA51233cb7837894021cb7e6436a5e8c703dc225f6c75b6c319d169d1834ef0655700f68b6fb6ab043df4468b5e2c169f1907d251ed8254d21feb31ae4a71d94c4d99
-
Filesize
345B
MD5c7629d39c235350b1538ae9317c637b6
SHA12fdeadf6b795c049091776a985461010fa6ea226
SHA2562fe53fe93308552d2b98538a1eb38822596fd4a6b4213ffc8dd80053433fc6f2
SHA512a4298056fa78c9ddeedf3b18096fde0360d536e23d067e2ac240de78a2c01528010dd05a6d1748184c278d4b29496eb5044d8824be2fd69516ca29bf79b9b3ba
-
Filesize
321B
MD569f9f238e2d7659fdcc2c259b06851c1
SHA1a4f3076969c8dd85362d19f39c30df5af4df715d
SHA2564652ca2409bdc6a4f5af9ea8f76757dec9ab104e5ace79852820f01f411933cc
SHA512e7df81b22f3f0ae79ba13a09e3076a8ea63b59f1a269f2bbd14f4a00bd3831113914b61f6db532c7d55c12b59d9376c9bc996c5f3e6fd36a729b15915733ef17
-
Filesize
8KB
MD530881ecc7328004704a9d171579af4ee
SHA1b8514d46474a401cdeb8597fc13cddca46c853d7
SHA2561fc3aff06a2a1d13ac4da06129beffa4956a3af17a757b0fc606a981c3214cbf
SHA51202af0366d1482c5e9f7434eb5b25763a883ec396f2a16071e33e2dfdce5f9c59ae1b1e91d4a903bbf5a55d4af66d76364d9360ad6d36c5ba347297c62173e6f5
-
Filesize
14KB
MD51aa2a0dd29bb6664431f818361403652
SHA181caae53929183d52f07b51feaa2c8741fde092e
SHA256c947eacaa0b11563b911fc894c87bea5a64e75bdc09c917426296b5eed11f164
SHA512d7b47c042dc0147c9c27eab7f04901d04b030837dd0d054107efb4e584ffac119b130caa856b0342e39d94a8875241a9b3d389007aa89e14c2ab59ea151188b5
-
Filesize
320B
MD5712fa3f54be11848c1b185f0b8503423
SHA1ec1acde232672474e2af15cd24c06929f29a59b5
SHA256f7df27767b26906ea3fb139494046fc2945778be293095381b1ac033c738b389
SHA51250aaecd15f90811bdbda8442d8b0b16adb03a81c01510de110d3c3c51a40f5adae98598475d13c353eb9f6e28f539ca17fb731e3ae1ab2241513939ee162e485
-
Filesize
1KB
MD575652c62c119dfe37ee77f60fb7ee336
SHA1ade90ff5f41686ca1694a733d22dd7ef9ce7f37a
SHA25681851e3d10bf74dd12ae7c4cb4e8fe27c89bcf8a3a621264cf8d3cb366bd8793
SHA5125fe2ab8fa11432c09bd109fcfd3db25259c0f983aa41236ca237cd9d33c49544c749f6e8a307d44435255817a0ec830b1599522e457eb83c6f72dc26f2980134
-
Filesize
338B
MD5115834f1c954c6bbfa7d30d0a5a82faf
SHA1593d30283c039a22ff3c1690d96ceb71862b86fd
SHA256dcdf7d889ee0a5f4fc0e18d3125b01eab71404abce2aa5bad625fe0671d46e88
SHA512db97b6c7ffd52cbe8ff7f943bd8ccb68293b66c51514eb2b96baaeab13f00c9805d122bae0d1a84e278f61373a8b77549618c204e93e7744218680a364ddf3df
-
Filesize
44KB
MD5ab9c37946764acfcb0fd43f9917119dd
SHA15ae0e0fca9c9730d17df81424404b26864920649
SHA2563037a070a0eac3a1ab94772aca48a72dd51870b9244a6105bf5a55b02c242634
SHA512ebeb7de5b3997798feeb134c80b9b36832b583745db1ceb1f7db159cbae158c7be4f1482ba609b44a6ee9f7c86dcccfd8034049c3d47158de1b955faf97478ae
-
Filesize
264KB
MD544adc52f7dbc0972f69a673657e97986
SHA1548df9a6fc9f4e0140c442804d862b9989b80484
SHA256bfff49e74b6931b5e7a66d7bbcc1f6501ddadfc7883150e1277ae4c783c33fad
SHA5125416f8404ecca171f8eee7ecbc10e61f14207ecd823137ad4cc7b4e6fdcbc5cc1d1b7fedf3dfb4b9b278ba8816725c39b749b8fd9c94628978deb9057e15bcc5
-
Filesize
4.0MB
MD5ecad6b9b7837f5e78f039a17597ad25d
SHA1461682f5242499bdbe539935e39ecfae7dc2dcb9
SHA2569eac008e0aa6c566c787201976c07f77228c054e2893a2dcc35c93adbea737e1
SHA512893949a14d7dc8c79d873c9938a91383b24ee22c154f9ef6f39a3a134684e394c9cf885a76863864ba71ebdf5d926672674030480437f12fb1d2d9e58bbf1870
-
Filesize
14B
MD5ef48733031b712ca7027624fff3ab208
SHA1da4f3812e6afc4b90d2185f4709dfbb6b47714fa
SHA256c9ce8dbbe51a4131073db3d6ceef1e11eaca6308ad88a86125f221102d2cee99
SHA512ce3a5a429e3796977a8019f47806b8c0671b597ead642fcbfbe3144e2b8112d35a9f2250896b7f215d237d0d19c5966caf3fe674165a6d50e14cb2b88c892029
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\activity-stream.discovery_stream.json
Filesize27KB
MD584c93498107d0b056cd84e58d888ef63
SHA1b4fa178d03c3d8c7c95a15dfdb06fcde0fec365c
SHA2562a4ca0b4a0e411c5ae6f5e724477610207e51e9f5479eef5ee86ff866b3fd155
SHA512319b569c88482d051be603cb0bfc15a12e813b70e1ac14ed4bc14cf2db66182f8212a1813d90478bd6c61aa608a38deffd3b7d9efdfcbf68ccac8dcdc33605a6
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD506308d202c273d3bd5498c2c7d4e2587
SHA1b2c1e5f724f3e90ec5b591cd52782325a7424b36
SHA256b3351a48c3bbdf09c0f87b2388942837579d4c53aa0a59f708573962fea2ce20
SHA512843f80115a696912d63052d35dafa80e862adbab8bc74910d003ee37a48b4fa05bb82d3029a10a72ab93aa8fa98ba98fb73c922a48d4a9a4db01971d293dd0a7
-
Filesize
4.2MB
MD50bd6fb5f0ba4460ad6f658894adb9874
SHA15eec17725b6bf038c21b15b9c5e3c81f09b25ead
SHA25619de4e31f35bc0e2876217eb616667a91ec02f94207740e66a556e3eae2e4ae3
SHA512c014c8083f66efe22b4cf5e868709bc1b8b063d438c53c0843fbcfe67bcccdd5bc26ede47276ad41eb65dbcc0a02550032da4ed73a5145896674dd885c83b176
-
Filesize
1.8MB
MD50a6de6db27ceb0c7e160a20f7f42c8ef
SHA13d7c76cdec663a73ae3aaa56207b23b8b1b1b723
SHA25687da4317ccc344877716fe1ad35b0822a31d775c83ad338a08bb333bde58fa5a
SHA512192a819a48d967471701da736bb6d639bf5e5dd552c1bfe8a7385057fc13aa8b90ac5cd4c5d08a0fcbd79222f796d556d31d9e072ba7cb39613c029d7aac2ba1
-
Filesize
1.7MB
MD51b413d047eaf75ebaac69270367d449a
SHA1039a3a64b7ef3801426856cc41d7f65b06834826
SHA256f0c849084e61a7a2c7b86da07de2d72abc98e03e4f9a6c396c246046817da169
SHA512acb6774e4ff1f8a6b0a2257ba4dbe6c3b6c12742d4cd49bd5b510f20547188d6c0ed4a41e5219669ac347202c17b7cba751486a8a13889392cb1e3b32fec9bcd
-
Filesize
901KB
MD5c70c83740132cc3b542503656a15cddb
SHA14a3555378e0f0c6673d3a59b7ca23135ff979f39
SHA256b8f5ee502c969d4287fb08f59f8b1ca0f86d88e6e70231520f575cd1d4d213cd
SHA512093a989ff2e59db99e7b0311c577c750383980c60045d4eea938dd895a32d57baf1fb96663a0328d6349835d2d1945151c7e519a86b270878a157b525639c7e4
-
Filesize
2.7MB
MD569d5d8bfe91330e7e7ae7a86582240ec
SHA1c67b101b83020e492b3fdabf3f446f250efabaaa
SHA2567b5a695c62d1b5d43361d8ddf0b568c2884dda9a973789c25a8cef535405a294
SHA512bb59e192d41621e5ef284ea2015ad5869a8e91b920cf90c23353ccaece6fe73d1e917335bde134bab53678e00f170f89ca2dae405ca4dfc45a210d2dd3f8f920
-
Filesize
1.9MB
MD56d36fdc5dd140f0431b931b1fb8ab8fc
SHA1adbe7e131b9375984e6de751853d324405cb71cd
SHA256ec24753b20aaee3043247b49828eb15efd02a5c04bff64caccd49a8523d179aa
SHA51226c8c7ec7733d80ce9a198194a6813d7fc1221fe7637b766591f05c59fe64fd16d32cf3d89fce8eb14581db298f32f693f350dda0c11c3ddb13ad65aeb0eca4e
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin
Filesize6KB
MD52eeacc3f90b6fa26725bb3f3dea2f715
SHA1e563b03067d0e838fc1404041fb60c7f320c020b
SHA256beca9bb363fb0fd890d0e9502c91b0d8abaa99d4aedbfe276b407c36dd703972
SHA512968cc046599495ea283a3b3fe8ac83db57f6f21046c65e8c76c7f2ef48a9cad416f7b65286ef5387760110e6e2bef03487c5bdd2eb3bc00c4293ac797329c41b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin
Filesize18KB
MD50bc7f80d12e5d324c3e0439a53e02c92
SHA148db94de99387e465c7ada1dd576258ec2492fbb
SHA25689ad6b8a3355adb334eef7e8ae90e13d399118ac8dd0a41ca578fcf0bfcbee68
SHA51240ab8dc59ced79594d528702031d13f93efbb11baf2c6c5bea28c8b5ee8bc76ae30e745de11e21e4c6c6a98b6456816ca6a8118dbf1ccc530218c15dd3e0bf87
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin
Filesize8KB
MD52fdf776f776352f16870ec63978b7bc0
SHA110430430b988ef43775581d4c86766bbb0018d47
SHA25621df5d0e050f2593f7d615de13be2add1739144f923ea776d3c428ee3a4a752e
SHA5126f1b88c6d5f5dce7b8eedf837bb38c3c1c9668ab323c4f4e9bba50defb59b86f3863f3551e7b343f3ce2884e6fa82bf5cb80704c91a72150d79624504ca5c58e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5cd1ea1eaba8e8228f273ee4dc934f985
SHA1824a71b27b449af86ac5e6db830308d4339faa03
SHA256fb214e9ec46bbc3ebe5531d5a3648ffedb7bd7379c936e4fe1c17edd5c51fbee
SHA512dd7b350c49ea45d7c3a24748137e4890651f303d50e9047bfac5b36ec4a65e1794b9f522cfceedec4a5d26288f462635223bbc0495a45d7155ffc2f22ff79108
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD537f020a2e25d31bdf222444bd9e3e8c1
SHA1816f299fb576bbb41c2ae6ab02b839ea49125912
SHA256be1af5b605004e3e1b53d3633d35aa9dd55e21a10385fb16b57c98b72afdee9c
SHA51258bbc51b57c719f5b8c8bbfdb10888ba7581885232aa847bd65b2e2c8e77e8a873f7013d3d1cd9713c4e08ad8f49e4d88962a645602401953e3d77bf20f3b040
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize3KB
MD54976ecac96c6aa6585a7d428ebd91f45
SHA1739a51cd1df37d5b8b18e39b16a87991bb77e857
SHA256b3919003b9a5e2920318e61a7f6195afa6006e375e58358eddb9ed229ecbeae3
SHA512f11ab4171afe7524903a381ae6f70a2a3f5cf3ff3c81617c193a082e08456aa1f807f1305d51a2415e8f8300021571f66a081ed31219a5f91ad7953b97f80be4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize14KB
MD5097bfa3f48f21b821106717c79789772
SHA1843309f837c490b8fe70d68d41c9d58480acf8d4
SHA256367e2784e2d054e2a0d4e23bd98dcbdd9b7fc97cbf9918c03fb6f96d9d0fdb91
SHA512e918705d4753c293f8d01097c9d2094b1b16255a7b361b0fd1984d76361e359a50489183fc48e1b81e82e12856b4506932e905303db7e5d69e0cc4eadb759cdc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\294183ef-d19e-4e66-9626-2d5f575d04dd
Filesize671B
MD5968b7c53804eaea817fa70515b8842f5
SHA1a9f078058956bf16be679e5612b8cdc896bd9b6c
SHA2569557ce79cc179c6d2a3f446fde490cee39326c9c84fb9a171d5186aa5d5086c1
SHA512df281cbd662ae8bd0f6c5044ce2d75a9e7ae728f5b951427a7c1ed4d969225d9b674bdcb89abfca9e0c19f1d8a9dbf93d5786d73b8dfb68b7e54dcab41ca3dac
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\32247fdc-5ac6-4d07-ae7d-b9ed88545fe6
Filesize27KB
MD56637ed694fc1721272020c31d149b070
SHA1ba46e17f24768804efe8e9281017543096b13244
SHA25649c4c0ea26591f2828fca951d26c171bd75ce47cf7eaad0e78ad56a7c61cee78
SHA51238300499a9bd566fc5fb2cba5b6125c42b974b0ff3af978a2d799d993b25bf9e22ef349ef15e78fa1a2a8618cd39c40a67011f5424c18374d2e9466c14c60ea9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\e4d31a95-f3f7-4af5-a865-8f9fdf5fa501
Filesize982B
MD5f52d7dab29dffdec88e619f3908f787c
SHA168f6d41d26921cd094dddfcf163bc73e9098bbb4
SHA2568cff0063f1d91391feaa2ca7b3d7d2c837456751d247dedf9f244969b9d064d5
SHA512bd4f05647ff0f40b89e4e529103b454304493fad5e0a242cd2d51b6063974590ea0ba31e1f83b39f7ca44aca2fe518b8d5dd41622e07b07ca1983ae429620ba8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD51ab383c91f0dbb2fd8a7c7197f763cfd
SHA196c23b98b7d7639b6b05dabaee6b56c09d450332
SHA256fc6752dab8ddc7a21f8b1960feb9246275cc73b22d1ecbc1be4d4aa8754e19c6
SHA51259e3dde90627aab549b684285d07e191c844d2a1ec78330e9b72037abd6bacdf340ec17fe1b45d82ebbf6004e68226f20efbde3d2d7f0d194e02e2f60c733346
-
Filesize
15KB
MD55b8318ecc8d92a904ec662b618b97780
SHA111620276f7d641cb8c5a3fa00e6c387f901cb87b
SHA256491f4c8ed901da352979b688340983c693c08074d481ecd95008d5dfa602522f
SHA5122864120b84f7fc2415ef5cb31634e99dd45df9f715083e9944bdf18fa444080c1e34cde63c08678db7b071ad021db65515782b330f22920da256e75c418838e4
-
Filesize
10KB
MD53996fc0539a63366108f1bd810634aec
SHA14312536eadede8d5f84b9c8e9cfc64f10f953c42
SHA2563b3528a6408117120dd27779ad4922ea56e65d6d7eb04f4b361072564143569b
SHA51298d93b3b7669d08c232ebefe2680789300fea804f2238874360564f965244f416cd70ed61623e49d9934411f21a141b6a2b6d7b77093600d90f362e65e011c0a
-
Filesize
10KB
MD575979fcb2be908b44faac2f55536566b
SHA1c08b5906fb30975ac558a82d676d2d855617c451
SHA2561e963efe545a65c0959510d4be9d417d121ffbd0610b4f528e91f33b41f7527b
SHA5127d21fb292c93fad1feaa201496eed4da04fa637c519c7b95c3235d08583b035d723c1c7ca82244bf3e321706d2236671bb19a8ac0140af4b906a81d5b70fa82e