Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 09:23
Static task
static1
Behavioral task
behavioral1
Sample
c7b59dea2273e4ebd8fe978be25b382793dcfd9fda75a70b8e47729019102645.exe
Resource
win7-20241010-en
General
-
Target
c7b59dea2273e4ebd8fe978be25b382793dcfd9fda75a70b8e47729019102645.exe
-
Size
1.8MB
-
MD5
946e0d79b6edda9e5ab8153aa408d19d
-
SHA1
a21e757593cbb76bf2577e005d49cc1ac4a3e2f9
-
SHA256
c7b59dea2273e4ebd8fe978be25b382793dcfd9fda75a70b8e47729019102645
-
SHA512
480286484c5365bd62040c1f5aec39707c82d6e84fc9c8e9f7d7fc6c55c9f0fbbb92b83bc2a3dc1731d32525488a4ce468bdf0b4c0dcf067caf8154f4760b293
-
SSDEEP
49152:eMgDvfXfXaSDycRZQmCBFWpWlzlioNECaKvgz:fgD/a+x5diwopaKvgz
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Cryptbot family
-
Detects CryptBot payload 1 IoCs
CryptBot is a C++ stealer distributed widely in bundle with other software.
resource yara_rule behavioral2/memory/2444-80-0x0000000069CC0000-0x000000006A71B000-memory.dmp family_cryptbot_v3 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 7753c7cdc6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 7753c7cdc6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 7753c7cdc6.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 7753c7cdc6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 7753c7cdc6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 7753c7cdc6.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7753c7cdc6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c7b59dea2273e4ebd8fe978be25b382793dcfd9fda75a70b8e47729019102645.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 80a17224ca.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ed6c079fcd.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 121b7d2323.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 7 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 3588 chrome.exe 1716 chrome.exe 1428 chrome.exe 2604 chrome.exe 4520 chrome.exe 5580 chrome.exe 5568 chrome.exe -
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 80a17224ca.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ed6c079fcd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 121b7d2323.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 121b7d2323.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c7b59dea2273e4ebd8fe978be25b382793dcfd9fda75a70b8e47729019102645.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c7b59dea2273e4ebd8fe978be25b382793dcfd9fda75a70b8e47729019102645.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7753c7cdc6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 80a17224ca.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7753c7cdc6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ed6c079fcd.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation c7b59dea2273e4ebd8fe978be25b382793dcfd9fda75a70b8e47729019102645.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 80a17224ca.exe -
Executes dropped EXE 12 IoCs
pid Process 224 skotes.exe 1856 skotes.exe 2444 80a17224ca.exe 4948 ed6c079fcd.exe 4232 121b7d2323.exe 1856 2deeb4bf98.exe 4068 7753c7cdc6.exe 5644 service123.exe 5080 skotes.exe 5580 service123.exe 5928 skotes.exe 3432 service123.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine c7b59dea2273e4ebd8fe978be25b382793dcfd9fda75a70b8e47729019102645.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine ed6c079fcd.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 7753c7cdc6.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 80a17224ca.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 121b7d2323.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe -
Loads dropped DLL 3 IoCs
pid Process 5644 service123.exe 5580 service123.exe 3432 service123.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 7753c7cdc6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 7753c7cdc6.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ed6c079fcd.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007626001\\ed6c079fcd.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\121b7d2323.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007627001\\121b7d2323.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2deeb4bf98.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007628001\\2deeb4bf98.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\7753c7cdc6.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007629001\\7753c7cdc6.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000023ca3-96.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 3460 c7b59dea2273e4ebd8fe978be25b382793dcfd9fda75a70b8e47729019102645.exe 224 skotes.exe 1856 skotes.exe 2444 80a17224ca.exe 4948 ed6c079fcd.exe 4232 121b7d2323.exe 4068 7753c7cdc6.exe 5080 skotes.exe 5928 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job c7b59dea2273e4ebd8fe978be25b382793dcfd9fda75a70b8e47729019102645.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 5500 4232 WerFault.exe 101 5716 2444 WerFault.exe 98 -
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2deeb4bf98.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7753c7cdc6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 80a17224ca.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7b59dea2273e4ebd8fe978be25b382793dcfd9fda75a70b8e47729019102645.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ed6c079fcd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 121b7d2323.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Checks processor information in registry 2 TTPs 12 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 121b7d2323.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 121b7d2323.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 80a17224ca.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 80a17224ca.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Kills process with taskkill 5 IoCs
pid Process 4152 taskkill.exe 3428 taskkill.exe 832 taskkill.exe 3628 taskkill.exe 1012 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5300 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 3460 c7b59dea2273e4ebd8fe978be25b382793dcfd9fda75a70b8e47729019102645.exe 3460 c7b59dea2273e4ebd8fe978be25b382793dcfd9fda75a70b8e47729019102645.exe 224 skotes.exe 224 skotes.exe 1856 skotes.exe 1856 skotes.exe 2444 80a17224ca.exe 2444 80a17224ca.exe 4948 ed6c079fcd.exe 4948 ed6c079fcd.exe 4232 121b7d2323.exe 4232 121b7d2323.exe 4232 121b7d2323.exe 4232 121b7d2323.exe 4232 121b7d2323.exe 4232 121b7d2323.exe 3588 chrome.exe 3588 chrome.exe 1856 2deeb4bf98.exe 1856 2deeb4bf98.exe 4068 7753c7cdc6.exe 4068 7753c7cdc6.exe 1856 2deeb4bf98.exe 1856 2deeb4bf98.exe 4068 7753c7cdc6.exe 4068 7753c7cdc6.exe 4068 7753c7cdc6.exe 4520 chrome.exe 4520 chrome.exe 5080 skotes.exe 5080 skotes.exe 5928 skotes.exe 5928 skotes.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 3588 chrome.exe 3588 chrome.exe 3588 chrome.exe 4520 chrome.exe 4520 chrome.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 4152 taskkill.exe Token: SeShutdownPrivilege 3588 chrome.exe Token: SeCreatePagefilePrivilege 3588 chrome.exe Token: SeDebugPrivilege 3428 taskkill.exe Token: SeDebugPrivilege 832 taskkill.exe Token: SeDebugPrivilege 3628 taskkill.exe Token: SeDebugPrivilege 1012 taskkill.exe Token: SeDebugPrivilege 3964 firefox.exe Token: SeDebugPrivilege 3964 firefox.exe Token: SeDebugPrivilege 4068 7753c7cdc6.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3460 c7b59dea2273e4ebd8fe978be25b382793dcfd9fda75a70b8e47729019102645.exe 1856 2deeb4bf98.exe 1856 2deeb4bf98.exe 1856 2deeb4bf98.exe 3588 chrome.exe 3588 chrome.exe 3588 chrome.exe 3588 chrome.exe 3588 chrome.exe 3588 chrome.exe 3588 chrome.exe 3588 chrome.exe 3588 chrome.exe 3588 chrome.exe 3588 chrome.exe 3588 chrome.exe 3588 chrome.exe 3588 chrome.exe 3588 chrome.exe 3588 chrome.exe 3588 chrome.exe 3588 chrome.exe 3588 chrome.exe 3588 chrome.exe 3588 chrome.exe 3588 chrome.exe 3588 chrome.exe 3588 chrome.exe 3588 chrome.exe 3588 chrome.exe 1856 2deeb4bf98.exe 1856 2deeb4bf98.exe 1856 2deeb4bf98.exe 1856 2deeb4bf98.exe 3964 firefox.exe 3964 firefox.exe 3964 firefox.exe 3964 firefox.exe 1856 2deeb4bf98.exe 3964 firefox.exe 3964 firefox.exe 3964 firefox.exe 3964 firefox.exe 3964 firefox.exe 3964 firefox.exe 3964 firefox.exe 3964 firefox.exe 3964 firefox.exe 3964 firefox.exe 3964 firefox.exe 3964 firefox.exe 3964 firefox.exe 3964 firefox.exe 3964 firefox.exe 3964 firefox.exe 3964 firefox.exe 1856 2deeb4bf98.exe 1856 2deeb4bf98.exe 1856 2deeb4bf98.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 1856 2deeb4bf98.exe 1856 2deeb4bf98.exe 1856 2deeb4bf98.exe 1856 2deeb4bf98.exe 1856 2deeb4bf98.exe 1856 2deeb4bf98.exe 1856 2deeb4bf98.exe 3964 firefox.exe 3964 firefox.exe 3964 firefox.exe 3964 firefox.exe 1856 2deeb4bf98.exe 3964 firefox.exe 3964 firefox.exe 3964 firefox.exe 3964 firefox.exe 3964 firefox.exe 3964 firefox.exe 3964 firefox.exe 3964 firefox.exe 3964 firefox.exe 3964 firefox.exe 3964 firefox.exe 3964 firefox.exe 3964 firefox.exe 3964 firefox.exe 3964 firefox.exe 3964 firefox.exe 1856 2deeb4bf98.exe 1856 2deeb4bf98.exe 1856 2deeb4bf98.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3964 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3460 wrote to memory of 224 3460 c7b59dea2273e4ebd8fe978be25b382793dcfd9fda75a70b8e47729019102645.exe 86 PID 3460 wrote to memory of 224 3460 c7b59dea2273e4ebd8fe978be25b382793dcfd9fda75a70b8e47729019102645.exe 86 PID 3460 wrote to memory of 224 3460 c7b59dea2273e4ebd8fe978be25b382793dcfd9fda75a70b8e47729019102645.exe 86 PID 224 wrote to memory of 2444 224 skotes.exe 98 PID 224 wrote to memory of 2444 224 skotes.exe 98 PID 224 wrote to memory of 2444 224 skotes.exe 98 PID 224 wrote to memory of 4948 224 skotes.exe 99 PID 224 wrote to memory of 4948 224 skotes.exe 99 PID 224 wrote to memory of 4948 224 skotes.exe 99 PID 224 wrote to memory of 4232 224 skotes.exe 101 PID 224 wrote to memory of 4232 224 skotes.exe 101 PID 224 wrote to memory of 4232 224 skotes.exe 101 PID 224 wrote to memory of 1856 224 skotes.exe 102 PID 224 wrote to memory of 1856 224 skotes.exe 102 PID 224 wrote to memory of 1856 224 skotes.exe 102 PID 1856 wrote to memory of 4152 1856 2deeb4bf98.exe 103 PID 1856 wrote to memory of 4152 1856 2deeb4bf98.exe 103 PID 1856 wrote to memory of 4152 1856 2deeb4bf98.exe 103 PID 4232 wrote to memory of 3588 4232 121b7d2323.exe 105 PID 4232 wrote to memory of 3588 4232 121b7d2323.exe 105 PID 3588 wrote to memory of 1264 3588 chrome.exe 106 PID 3588 wrote to memory of 1264 3588 chrome.exe 106 PID 3588 wrote to memory of 1692 3588 chrome.exe 107 PID 3588 wrote to memory of 1692 3588 chrome.exe 107 PID 3588 wrote to memory of 1692 3588 chrome.exe 107 PID 3588 wrote to memory of 1692 3588 chrome.exe 107 PID 3588 wrote to memory of 1692 3588 chrome.exe 107 PID 3588 wrote to memory of 1692 3588 chrome.exe 107 PID 3588 wrote to memory of 1692 3588 chrome.exe 107 PID 3588 wrote to memory of 1692 3588 chrome.exe 107 PID 3588 wrote to memory of 1692 3588 chrome.exe 107 PID 3588 wrote to memory of 1692 3588 chrome.exe 107 PID 3588 wrote to memory of 1692 3588 chrome.exe 107 PID 3588 wrote to memory of 1692 3588 chrome.exe 107 PID 3588 wrote to memory of 1692 3588 chrome.exe 107 PID 3588 wrote to memory of 1692 3588 chrome.exe 107 PID 3588 wrote to memory of 1692 3588 chrome.exe 107 PID 3588 wrote to memory of 1692 3588 chrome.exe 107 PID 3588 wrote to memory of 1692 3588 chrome.exe 107 PID 3588 wrote to memory of 1692 3588 chrome.exe 107 PID 3588 wrote to memory of 1692 3588 chrome.exe 107 PID 3588 wrote to memory of 1692 3588 chrome.exe 107 PID 3588 wrote to memory of 1692 3588 chrome.exe 107 PID 3588 wrote to memory of 1692 3588 chrome.exe 107 PID 3588 wrote to memory of 1692 3588 chrome.exe 107 PID 3588 wrote to memory of 1692 3588 chrome.exe 107 PID 3588 wrote to memory of 1692 3588 chrome.exe 107 PID 3588 wrote to memory of 1692 3588 chrome.exe 107 PID 3588 wrote to memory of 1692 3588 chrome.exe 107 PID 3588 wrote to memory of 1692 3588 chrome.exe 107 PID 3588 wrote to memory of 1692 3588 chrome.exe 107 PID 3588 wrote to memory of 1692 3588 chrome.exe 107 PID 3588 wrote to memory of 3104 3588 chrome.exe 108 PID 3588 wrote to memory of 3104 3588 chrome.exe 108 PID 3588 wrote to memory of 3776 3588 chrome.exe 109 PID 3588 wrote to memory of 3776 3588 chrome.exe 109 PID 3588 wrote to memory of 3776 3588 chrome.exe 109 PID 3588 wrote to memory of 3776 3588 chrome.exe 109 PID 3588 wrote to memory of 3776 3588 chrome.exe 109 PID 3588 wrote to memory of 3776 3588 chrome.exe 109 PID 3588 wrote to memory of 3776 3588 chrome.exe 109 PID 3588 wrote to memory of 3776 3588 chrome.exe 109 PID 3588 wrote to memory of 3776 3588 chrome.exe 109 PID 3588 wrote to memory of 3776 3588 chrome.exe 109 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\c7b59dea2273e4ebd8fe978be25b382793dcfd9fda75a70b8e47729019102645.exe"C:\Users\Admin\AppData\Local\Temp\c7b59dea2273e4ebd8fe978be25b382793dcfd9fda75a70b8e47729019102645.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Users\Admin\AppData\Local\Temp\1007625001\80a17224ca.exe"C:\Users\Admin\AppData\Local\Temp\1007625001\80a17224ca.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2444 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4520 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffbabb5cc40,0x7ffbabb5cc4c,0x7ffbabb5cc585⤵PID:5704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2360,i,9876909492402287020,13128688154507251608,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2356 /prefetch:25⤵PID:3952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1728,i,9876909492402287020,13128688154507251608,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2396 /prefetch:35⤵PID:5684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2020,i,9876909492402287020,13128688154507251608,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2532 /prefetch:85⤵PID:5716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3116,i,9876909492402287020,13128688154507251608,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3152 /prefetch:15⤵
- Uses browser remote debugging
PID:5568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3120,i,9876909492402287020,13128688154507251608,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3196 /prefetch:15⤵
- Uses browser remote debugging
PID:5580
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5644
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5300
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2444 -s 18284⤵
- Program crash
PID:5716
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007626001\ed6c079fcd.exe"C:\Users\Admin\AppData\Local\Temp\1007626001\ed6c079fcd.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4948
-
-
C:\Users\Admin\AppData\Local\Temp\1007627001\121b7d2323.exe"C:\Users\Admin\AppData\Local\Temp\1007627001\121b7d2323.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ffbadf2cc40,0x7ffbadf2cc4c,0x7ffbadf2cc585⤵PID:1264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1968,i,4877341618614258108,6793165415746259045,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1964 /prefetch:25⤵PID:1692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1868,i,4877341618614258108,6793165415746259045,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2008 /prefetch:35⤵PID:3104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2220,i,4877341618614258108,6793165415746259045,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2320 /prefetch:85⤵PID:3776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3156,i,4877341618614258108,6793165415746259045,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3176 /prefetch:15⤵
- Uses browser remote debugging
PID:1716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3200,i,4877341618614258108,6793165415746259045,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3236 /prefetch:15⤵
- Uses browser remote debugging
PID:1428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3148,i,4877341618614258108,6793165415746259045,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4192 /prefetch:15⤵
- Uses browser remote debugging
PID:2604
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4232 -s 15804⤵
- Program crash
PID:5500
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007628001\2deeb4bf98.exe"C:\Users\Admin\AppData\Local\Temp\1007628001\2deeb4bf98.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4152
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3428
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:832
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3628
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1012
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:3984
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3964 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2032 -parentBuildID 20240401114208 -prefsHandle 1960 -prefMapHandle 1952 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {29cfbf62-f476-4986-b93c-995c8953807f} 3964 "\\.\pipe\gecko-crash-server-pipe.3964" gpu6⤵PID:4764
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2468 -parentBuildID 20240401114208 -prefsHandle 2460 -prefMapHandle 2456 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {383f960b-6160-40fd-bab7-e88bfc47882a} 3964 "\\.\pipe\gecko-crash-server-pipe.3964" socket6⤵PID:3988
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3184 -childID 1 -isForBrowser -prefsHandle 3312 -prefMapHandle 3308 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1260 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1c15fec1-4f22-4724-9e2b-44965fc81b4e} 3964 "\\.\pipe\gecko-crash-server-pipe.3964" tab6⤵PID:4628
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3680 -childID 2 -isForBrowser -prefsHandle 3672 -prefMapHandle 2976 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1260 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {70babe95-b2ef-443b-83cb-86f0b9fc5f1d} 3964 "\\.\pipe\gecko-crash-server-pipe.3964" tab6⤵PID:1732
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4248 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4344 -prefMapHandle 4336 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f2677d1e-e37f-407d-93f9-ceec4847d15e} 3964 "\\.\pipe\gecko-crash-server-pipe.3964" utility6⤵
- Checks processor information in registry
PID:5428
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5068 -childID 3 -isForBrowser -prefsHandle 5064 -prefMapHandle 5060 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1260 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cc3a3f25-1b03-488d-b4cb-9cda84d08204} 3964 "\\.\pipe\gecko-crash-server-pipe.3964" tab6⤵PID:4696
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5276 -childID 4 -isForBrowser -prefsHandle 5232 -prefMapHandle 5132 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1260 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {97037727-180f-4c8a-8760-af1010b1bc65} 3964 "\\.\pipe\gecko-crash-server-pipe.3964" tab6⤵PID:4516
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5504 -childID 5 -isForBrowser -prefsHandle 5548 -prefMapHandle 5544 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1260 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cbaf4834-2352-4327-82f3-7ca12173985d} 3964 "\\.\pipe\gecko-crash-server-pipe.3964" tab6⤵PID:4004
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007629001\7753c7cdc6.exe"C:\Users\Admin\AppData\Local\Temp\1007629001\7753c7cdc6.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4068
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1856
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4060
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:5372
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4232 -ip 42321⤵PID:5512
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 176 -p 2444 -ip 24441⤵PID:3236
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5080
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5580
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5928
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3432
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40B
MD553f896e6ec3a1c85c0d9124da3b7380e
SHA1f4b222bb0b3fda0f2ab34768d1d086bc6533575e
SHA25617445b99fe65252ca0a67cde3f5d2b1feb0224d39f52d1641ae0bb8dd0282453
SHA512512cd2d07e1e7ebe78ddf8f5c5a682a30a0a9a1f55099a466ddd54c351295a92f4ac4946ebf4218d6353a3148ac38a2dbc07c9f96e12042868acce13c9edb1c3
-
Filesize
44KB
MD53b569bae05f7330e03f9797bc7a0dce2
SHA1b6e720d7d6f3d1d5835a8da7fb267a2d89daa361
SHA2566400185a252d2da26ec47bb93004f528f57a9f9e32c3a5232f32d0cfe7e27771
SHA512550f6c1180ffbb8c6c89f83101fd3b2630899d4a062628daa4ee89393d649f4cdba5c22f30c9f0e4de06d1290313c7958cda1b40668e7b1ae0d58ae0f737d511
-
Filesize
264KB
MD54545931bf7634eb4e9c4d9bb7450d65c
SHA128e943385c66cb7eb0612098a8e9ca163a05a276
SHA2560a62b3546f5c011403d73a4bdee289bbabfddfec5722f0cc009fec87e6516c4b
SHA512477cd6e432a9a99697dc1bee81b31c742913d1ffca1df575f995093c714cbb30c0de7fcdf89d420b6e577e979be9cfade49c07a2a293dd8e0788e555b71973fb
-
Filesize
4.0MB
MD5bf5653521da1e04a8cabfdb771e4fe2f
SHA14218995084d134ebf4e0fa85caeed7af0117f5ee
SHA2566350686bfd3d7a088afdf0c2deb54b281ccc78324a498739587788d204d1decd
SHA512ca79fb80e7976c1c50e6e4ebd12bae3be6d096610831e8cc174b97b3e460f8861c07f5983055c9884f50f2c5459c148221a973445acbe6dc1328537200744fe4
-
Filesize
317B
MD5ddc7f9c38a8be1dd0744c7ebf8be6922
SHA1ba9a8350432ba47c780338af4fbce37babbf3768
SHA256931a450b371d61a6d3d466f78eccde31998b1bbbec9b708fe4cf736e2f76ef13
SHA5128343fb5b6717c4d56c76669946b39cac4ba18f25abf5c3e8b4a90f8177f67f2a417d53546fda8641cd4e4e3299b9c4700fe0ac9a7627c86f14e478bf303ddcee
-
Filesize
44KB
MD59b18b53164cad7134669cf6e3d9896b1
SHA149788736a5d796417e9f6e89b2447ed4ab51a40f
SHA2568299348249b6c75a0db563b5b8c595deb04aa4e70b48faa237f186e81c6d864d
SHA5122b260e36e5e5ed6c9c8bf9d3f6d1db39cf7d4d910e12eecf5a47f5d71283bb85558be60e4cceb37ac73ea86d35af5a037923777946341ef45aa929b62429ddee
-
Filesize
264KB
MD5e0afe14fb9f662e174dbe0252d8879e7
SHA1e5767240e6120fc1ced98569b4597b99c2bb746a
SHA256d42e4c6f2656343f9991bb7852e16fff7f3a0949624b7b5af48ce1a1d44e0797
SHA51289fab7a9a1388b2c04b4bc9d3a3a59c73f23e65e1a38692fd61981dc64f742f7d1079455cbd4fe15a385ba049c4d4bdcee51ecdca2762e7a5ce91919ec5a5a66
-
Filesize
1.0MB
MD5fe993339a25710ebec86c051941d462c
SHA11a7a578b7a32bbe2102a789c2321090d406838d1
SHA25659ce81d41051a1d16c02906cd586fcdeabbe7ee30ea7b7b1bb0970b981ffa443
SHA512b81201876efadc61a8fb48718abb16f7f458856f2ee676db8b0da36790492ad930585c14ce200e7a9e079b8115b15e20ed95176cbfdc337b3ab732e5fe72bbd2
-
Filesize
4.0MB
MD5d6b0609c4b6edb45553ff9afbfc95e33
SHA12697657b75906d3653f48080ec1f3993c07bd8bf
SHA256eb5cc165f4f69f7a3e72851b1b63e67efa9afb3c96bf8aefc962a5fdbdd6cc2e
SHA512db4c837c9a8a30e65f0f634bcceecff3354d6b72b34536e584fafd02eb103cb4a6b01522d4463d8c54e6852d28a71d9ec8997e2f353e59ea8724aadbbc2a80ca
-
Filesize
329B
MD5aa1e1b4db058ae674b9df915114b81d9
SHA1be878a2dd3ddc1f4ca2e8b2c8784ea470fc6d99c
SHA256f9a0399dab1cefb7842311849c546dc751cf80e7926a37cd5c3a9d1929083095
SHA512b406e66a82589233645ba7481c73d7a31d49c828d833f05e38b25e195335edd474f4528abedc264314bfe0d248797408e39f473adaf714ab65d6388d5711588f
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
336B
MD5dba91cdac4d194466919756b6a73160f
SHA1d9fc31c0b6cd3674ddca931ba0b6ce5f5892c7a6
SHA2567e4a07bb773d53adf6b043a61176f7d76ad7b4203e98a441fc5857b840d6c3b6
SHA512d04eef623dc7d2ed3e31094fc36c1ba41db22d33a247c29fddc9f4e4f278089ea4fc2c818f9f03e710053d0403df1e0803243b6093e3b7bfc83739388b74f0e8
-
Filesize
308B
MD54e7982b86b3d7d916b7722aa3b3f0669
SHA1ce4e874903cb71d9012cc7654ca7a6ba5e4f7efd
SHA256cbee1100a2c9add47776b7e416b58a809f6feb9fe458bef8185b0c176b5db340
SHA512c4dda8b36e90a327061dab901730f47fc23cca129b02a157f1ed0c566a1d6dddf272a4e74d3acbf14eb3a7fac0820387a584db9e19ca299724ed7f3030f891bb
-
Filesize
317B
MD519a98642568dd6ca92bd9e5229a85d63
SHA1c204dc00d110e265cec23d3ea98f849c24c20294
SHA256fd69b0271435ebe8f3310eae54957f9c4be0c193f8da54757a413086304cfe5e
SHA5129df6bd2ee1109f8e1186eb1dd966c9c76f23383c6d906586906c40e21038e0c2279301942467cce939c85b8d423e4eef06a514b557c843e1f415357fff2c6e4b
-
Filesize
345B
MD5d5f664f08d0ac851cdb41ca4d2aa6d4e
SHA1353f4ec38b702d0720e84bb6f8706bfb8b22b5c8
SHA25628886a307534e4211c800127efc4300e307b73dd49592a36654bf0529c6f2727
SHA512258a2f0ccfc1739ac5dffdfdba9aa590a8f5be266432f1fc59ee74e7ae752e6f6e91da60f9f517d119a43beccaf1fa058d77339ac6f1d3e4f331e93cd632a252
-
Filesize
321B
MD5156f1903f62d57956533f74f06979cb1
SHA15b52de3116a1cd572de85b3a3c6aef72644485ea
SHA256315861bcd1f4dbcb6f9bc45db38ad4c0d74b8697c98e9e315aa8547403e76a9e
SHA5125777de6002b5eb1eada19df5d5b1fe45b53f01f425b6f8cd193e4cb8373e79f441490b967cde10031e3b2b46f62cbe2004f6072f01719de855b14a7e8c0470ba
-
Filesize
8KB
MD52bf526d4aaeca2829a504979569379a4
SHA1e0d300a52fd76e260d1667c9cde28e0b5ab9249d
SHA25635e69d94af8d9bd16af929ee87f6b077b2265d793e298ad1d776fb52f102d3e2
SHA5122f81781d022d162fe46638b0a88d37a52b3825445e5ad69b9e3c1375f3e7a4fabd0f3336b7cad28b70447b82c348809816d398d43dfd99d7f25159d4c2597aea
-
Filesize
14KB
MD5f62e664d580a6128ea42b27a6d6146ea
SHA1aa8bf7fcd66c84d9579ef16c366beb5095bdad91
SHA25638304f32bd0a7df8fd7967a274b237b590a855d9537b3df31f73ade5e294d183
SHA512ff215e08de9651a9982966f93d67c770a1a4c9dad650c37e3aa76d1b5c388d3cb61e304d62834c6c1291ea19015db4711e1f1ced5624be3d9b9ab8048bfeefb9
-
Filesize
317B
MD5ca9f2eb0579105d03e664344d3834016
SHA14300dfa04e8f4dddc42510995c6123e9b6eeab45
SHA256075f5cc40f092ab7c2a3d02b2f94cedd98226ad6659539e1be4db94ebe08a926
SHA512503845238a1eb5734c8513ff4acd9d8a60e233120aa24d570c24dffa330b626993117aa3a389878e0abef012ab0087f4f0330c7d51bd78d0aa628d4d858b3302
-
Filesize
1KB
MD56978e7eb9da621931caa7e3f561efeee
SHA105017a8f63ca607996213ec7887b34cc25c064fe
SHA2563b6850c66c12e731f6acffd6854d50c21b2d249a6c1becc77c2bbe7291dbc8d0
SHA5128c583e2411ce6efd85619337a25591d107b5d8188b8fd20b5f83471bbebd90f6af71974c80ddb755eec8abcabd56856b1f6a916f2f68a44ed949d99a59b4efba
-
Filesize
335B
MD522fe0548cd98a9df962d18539122b64a
SHA1a8eced79babdbae785472bc7be66e01e01a38653
SHA256ff7badcb063d79d9c49dfc2e005f6c8d89d0cefe4816a102b547a28359c812e4
SHA512189c2918b6d7154d96492909bd34f0b439130cd00416a334c57903f4919e02c7e133cc05fd78c7555978baffd5cd957a5475de8e721a8b645e0378dc08c1229c
-
Filesize
44KB
MD5f317ff7fcccd28e7c1c9703d8875f1ec
SHA1137e7f1e5ccee7639ed1935d3aa95de2712f8eb0
SHA25621937445794009d570e1e00fdc9799d5bf52cfc071cea0af6f69447e061f03c2
SHA5127be0089293c58d31ebcc288ae3cbebd88369bc367902226a675c721115ca80f0e72f3f600219e9739ac069701f5c6af4bc8825e55ab93aa0cf62a4f6945c437e
-
Filesize
264KB
MD557ef8a15efb3f61d4916baaa458e29c7
SHA10d9986a1b2b9e73ef447547d46d7ee1be7c7ee03
SHA25682f419b8e543c51361046b2df28428617880479e0a5c0e5644bb9dccc222e5fc
SHA5125a26cad7a560da49ea434bcb1132ca64add88b9713eb4125fc378824d818d46fe6a3cec65b56b77e550ac98a71f5a18f8973b1d6870764ae235e79db54d764aa
-
Filesize
4.0MB
MD5f98f41e0e81f61760fe79a697a53d2f0
SHA1a77df8c6d80348a4cda08ec4fcedae3cc7dcd239
SHA2560b786157e734230df829a7fe738c2303e44da7048ec8f6e5dc28d4976e3f1830
SHA512f8e8cd1df8569cb437807f3471b6ee0f282c3ea301e4823cc90a348f2c6870eabd85d07f46236a80d06eb263713a90a41851878e0d58f34740a864cd3a82d4af
-
Filesize
14B
MD5ef48733031b712ca7027624fff3ab208
SHA1da4f3812e6afc4b90d2185f4709dfbb6b47714fa
SHA256c9ce8dbbe51a4131073db3d6ceef1e11eaca6308ad88a86125f221102d2cee99
SHA512ce3a5a429e3796977a8019f47806b8c0671b597ead642fcbfbe3144e2b8112d35a9f2250896b7f215d237d0d19c5966caf3fe674165a6d50e14cb2b88c892029
-
Filesize
86B
MD5f732dbed9289177d15e236d0f8f2ddd3
SHA153f822af51b014bc3d4b575865d9c3ef0e4debde
SHA2562741df9ee9e9d9883397078f94480e9bc1d9c76996eec5cfe4e77929337cbe93
SHA512b64e5021f32e26c752fcba15a139815894309b25644e74ceca46a9aa97070bca3b77ded569a9bfd694193d035ba75b61a8d6262c8e6d5c4d76b452b38f5150a4
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\activity-stream.discovery_stream.json.tmp
Filesize22KB
MD51ecbaa3ec10456c170a451e17dd34145
SHA1717194d04e8a99b3cece39e6542d46c05fe997f3
SHA256ba2b63c03a21089b70deeeea41229cb4090b20d7d1b36b45d4d07f0c39ad8524
SHA51264ff39f920f64c34151307e79dcf4e37f970accec75cb6b86bac6fb75795f640ded2712ea33651cadb3dc83b67b505a1582e35ecf1e03310a0d6d191a6c54786
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD5c5741e533ef5acd0693b2bfcfca05916
SHA180177848da7415bd0f0152e3d33d2cf8bf3d0473
SHA256af72f331eb90dc3667528a2d844018401c586fa7ee871e3d0f1a648a83a3cf0e
SHA512058555e12d67df4a46b9029c74968b75e43b35542c84711d3fcdf2cd3790ee45c4438e3857e41a3b5e9012ee761ac622034f0f148a300278e278ac3f1174efde
-
Filesize
4.2MB
MD5e0daf3617f84af41981769a31ed23565
SHA1e366c1340ba76460bbb29a86530bb855fbd2ffaa
SHA2563a312ae4537c6311d8d2a395f3ce7b1b7ba74280b84069c800ca9f81efa23eec
SHA512a33c985efd651dce9dcfcb84285485a01fa39c74ee593b1e68be83ebf8b8b29a1e7807e7b54f691b0c9db24bddc15a5bc6d376dfc8cb8994c2e5b754639e4039
-
Filesize
1.8MB
MD59d93b116a16c2a6279e05dc9c3a82266
SHA101286257fb3486cc5f64ae587f7001657bc67ee7
SHA2569e95aa08df8c8bccd4f8520f5528690a6cc0c108d7b4d7d2ba97d11191557b74
SHA51278fc17213f619d62c6374c2e2ff3551651aa25593be48ec176061a95506ab6985580ef27eb4b90ee3bee4db9bd77882f8d082e23c4280078896a86c240b072cd
-
Filesize
1.7MB
MD5f606993b2d650ae388adda55d42b7e17
SHA1c6c016892a7d17c3c8575c9577f344c886dbbca6
SHA256c16911abc93470f42ddb1714b510d25394238d3b42bc35e4e7a944dd3262690e
SHA512ab757797767fd0d17593ece660fbc6c79092673d69523af5a4a85e9fc74c1196f464801c993ca7b31f3aa14575ff3a7b0f2423fbfa4b64b40a473ee2a5b42d15
-
Filesize
901KB
MD5ac622fc7f4931e186a40e7635a86d748
SHA16594b6e7392378860c28ae1947c60d67c504f989
SHA256e897e7c522d68cce5842935f168b5726a53cd614234e12cf70bfb1f3a0d6a50f
SHA5125cb8727030ce42113006a81af314dd6e9b2de4b053004479c28fd1e4a92d564da797e7d3f3d0e0eb09b1fe1326d66764bdf163069f09b6e043df6d63892cdd75
-
Filesize
2.7MB
MD5b62b9dcea356e3f8a8c78af1a50afd35
SHA15aca24a2903fd669fbb68fb569bca5fe33d85b38
SHA25671b678c7736d4233ae99da291758a4b6ecb4081ed28d2f2c468d6e730780ae3f
SHA5128631356774eabe63f9c9b988e2b62497b8b017a183c44893bbb57fa85d773f08500c9b22e5bf2c2d2df6c5f3477b40991643e6818d222667a3fe63300d393449
-
Filesize
1.8MB
MD5946e0d79b6edda9e5ab8153aa408d19d
SHA1a21e757593cbb76bf2577e005d49cc1ac4a3e2f9
SHA256c7b59dea2273e4ebd8fe978be25b382793dcfd9fda75a70b8e47729019102645
SHA512480286484c5365bd62040c1f5aec39707c82d6e84fc9c8e9f7d7fc6c55c9f0fbbb92b83bc2a3dc1731d32525488a4ce468bdf0b4c0dcf067caf8154f4760b293
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\AlternateServices.bin
Filesize8KB
MD5249fe453ae660596e627cfcc585274b8
SHA19fa8c6dd51af6daeb4e5777aa6a81c51c93b4181
SHA256ccf16b3c64beb579b14def54054b3e3a6685a56e105b8d1a2ee589a9836dec67
SHA5124bf38c9cc68fa73a4f77bac30e6925aab39d1cb44f1d590915eeeaf1eb3440ae9c9ca2240070b9e318fe97d592bd05ab8c71d89d52a4cc370be89febaddc2c72
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5c26af35d5c25537fd8232a20a30e7cbc
SHA14da851a6a2ec21e4816134532eb28a2d62566060
SHA25637fbb34f958a1b0f4302f629f869d95ac9714ebcf41350095ee1c0cc41e0ff41
SHA512304818c29d01bedfa19962c626bca629fff4c8b1b36d3cb062f76e6326c08bb3ebad39a1b6a8c10a86a4144a10dd26dbcd823d09860b0bce14f32fc8b8e2f7f7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD57bcfaf5a1a140377a7fa272ab1ea1a9e
SHA12149553ff6a7875e91e6513e29ade76152393792
SHA256baaf26f260abeeccae5a95a134be86b6dac98e148da54e3937bf4b663bf76b06
SHA51236c641e85d63cc5e9344779c964499374a9635524cf38902b33391cb2bb065612a460d5cbc7e51b752c2338794d28e67b7e209df4542db37d22c4a894a2d6e13
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD54c3fb2fc7d97f98625dcd48e924b8407
SHA18bb138ff0de2f22c8541b0e13148fb8e25060c1e
SHA25680444913e841b58e7894fc04dc24cdabe0c644289ec81ddec25cfed7b69710e7
SHA5122ec96a923394c7e14a91c43a953fd0d8680df64d89cf69f104762daec7f0ceaae31de837acea82957e9039df6d765ac4fc5109f092a0f60e9e87e2b51cd5373d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\pending_pings\b46087a7-f377-4314-bb44-7feace45fc73
Filesize671B
MD5d04a9f5fa7d39779fe377ba160e785ec
SHA1f2abe56f92a532913564189d77862c4fd95022e3
SHA256950b748a7741082d1681908f75e934c15ac3c5a357ef04a42077584cae21d93a
SHA512674da36473c20e7c4235bf9186b2681c329ee208bca33d82691bae280c841fedb0a9ff173e57f2213b379bf8bdffec5ab54de40ff8f2debd0aa63e7d6392af93
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\pending_pings\bb037a6d-bd43-4b9f-8b81-772af8aef8c4
Filesize26KB
MD5326d2bdb1211997ac0feb162eafa028a
SHA139716d511c0eb9effc4c0c3af57f45496100adf6
SHA256b2c385de0c0c64db38e3876f10fe52d1aaa2c5c4fb6c71a1032f5fd13732199a
SHA512dff0f2991cb63ec8c6778ae4d24807ffb4ebb54beb50e21fe548e91b912e63698d7143aa41e6348615f94d8e34b3e623750bd0909859195608ea0fe550f058bf
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\pending_pings\e2b39d00-6b9b-4814-b72c-088042a91d38
Filesize982B
MD586e4ccab66fd5bfd4f1a9733f6886747
SHA14d1ae73de592e55ce00952df5f7778fbc17cbbcd
SHA256076942d281c84627e016b511ba628a815bd7d42852451e63b3dd6b93186af600
SHA512177fef2717e31042019c509b15e776854f570d70658aead501d9a62ebfb07b172e3aa01b5f2c22070ef2c2f2e75d14f780ea48ec349454c2e91885db0a62e1d4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
15KB
MD55ae1c0c3654194cf0ae2bd68b0f42bcb
SHA1bcfc55d616cd4c38dad2fb22ed567d1fb2934846
SHA25685cff1cfa109f5d71592871d4d3624db3da618bbbeed2caa92f7d3bae5c52cdc
SHA51205d5a686fe1be6087f210624bde35ce67c8eca0cb19cd944f62822fe28c6ee3e9c708f437752834d640df4d89f8ca8df213e650919d3fd2874ac2fd6efc3b42a
-
Filesize
10KB
MD53079fcc89a6f03730cbb1eff13be0963
SHA107655db9d26286dc2e037ebade37fb52decad79a
SHA2564d2fc38b26058230c748e61ece06228c5c5204c0e2c12aa1423defca45296de9
SHA512dee2cebf8c89278c836f62398ee0d0d8c7c18a92a0c2cb46fbacf75d09f4f04baa98087dc5efb1fc60b3031d601815cffeb61bce12ae7c195c246fd0ec3561be
-
Filesize
12KB
MD5ec4699a9791b34fda7b69b9864d2be0c
SHA156fe7eb6598be46c060d0151041169ec992d9aff
SHA256551d64e3c1452f93a36f2a9e833e5312e02dfdc2332508240ae4084d8535e8e4
SHA51234fbe6ddc5b7af61ec6edfc707f4b88352acda6a5ff4acd8c35fd732e97440fcb042165db4b0b355ebede8d356e2a12750114c39a0ce456f2865f3830415ba32
-
Filesize
11KB
MD50d80dd5b95497f56f78782c5568b28b3
SHA1e81a8c5e007e03a8e7687d4cd319ca6ea7135c38
SHA25646932a79c124e149b941bdf7a453444cd78bff4b79aa8ca7fcabe00c74e29ae3
SHA5128de090bf37bcea13682d03ec3ac537f47a17255e4776f644dd408cf913a47bbbb4f5cc858c8c858d1c7160697883d396ddd238991639671194806b1d2630d6ed
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize1.9MB
MD5c7330da2c0ced928945259d21d53a857
SHA10e7a72378b57f76d06a793f5c852214f80d80d85
SHA2564e38fdcb1852257ddb3f72475de6bae9fd96d0812fedbb0474ce57a3f035086a
SHA51299d6e0e24aa459e38581fb8d1b4b3a0cb2a0e7f6e384ac0e5b376842caf8c3368ea52e0e2389631a6656f26955a5dcdfc81cbda0471da0d87fc4b4c7323957ab