Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2024 22:45
Static task
static1
Behavioral task
behavioral1
Sample
099744b9bcea8baa80000eb185ff004f5e9dfd2abff28d50a5959858d90e8adeN.exe
Resource
win7-20240903-en
General
-
Target
099744b9bcea8baa80000eb185ff004f5e9dfd2abff28d50a5959858d90e8adeN.exe
-
Size
3.1MB
-
MD5
035d4f0c02471d8611df2f1749ce4ed0
-
SHA1
95604864ead15d71306fb081d7b5dc5652999653
-
SHA256
099744b9bcea8baa80000eb185ff004f5e9dfd2abff28d50a5959858d90e8ade
-
SHA512
125651e8e9b0c3527e3e59672f57c5b266a6ecbcfee682a372c541339944787564305abeba4f805213105c9416c37fbc5b54a6afbac98ec6908bbb40292d997e
-
SSDEEP
49152:F1uPRkNVR57XB1qkc/KfmC+GaOVWg1yl+KjOEZD:mPYVR57B1qksBC+GaOVlk+Kym
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Cryptbot family
-
Detects CryptBot payload 1 IoCs
CryptBot is a C++ stealer distributed widely in bundle with other software.
resource yara_rule behavioral2/memory/3228-81-0x0000000069CC0000-0x000000006A71B000-memory.dmp family_cryptbot_v3 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c2868357b4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c2868357b4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c2868357b4.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c2868357b4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c2868357b4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c2868357b4.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 184d2b9c09.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c2868357b4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 099744b9bcea8baa80000eb185ff004f5e9dfd2abff28d50a5959858d90e8adeN.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ db5e45f26b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5115a909ce.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 8 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 772 chrome.exe 4508 chrome.exe 628 chrome.exe 5572 chrome.exe 1708 chrome.exe 3460 chrome.exe 3180 chrome.exe 1800 chrome.exe -
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion db5e45f26b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c2868357b4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 184d2b9c09.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5115a909ce.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5115a909ce.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 184d2b9c09.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 099744b9bcea8baa80000eb185ff004f5e9dfd2abff28d50a5959858d90e8adeN.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 099744b9bcea8baa80000eb185ff004f5e9dfd2abff28d50a5959858d90e8adeN.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion db5e45f26b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c2868357b4.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation db5e45f26b.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 099744b9bcea8baa80000eb185ff004f5e9dfd2abff28d50a5959858d90e8adeN.exe -
Executes dropped EXE 10 IoCs
pid Process 4736 skotes.exe 3228 db5e45f26b.exe 3936 5115a909ce.exe 4984 184d2b9c09.exe 3636 e7a83886cd.exe 3724 c2868357b4.exe 5784 skotes.exe 6984 service123.exe 1744 skotes.exe 5856 service123.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 184d2b9c09.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine c2868357b4.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 099744b9bcea8baa80000eb185ff004f5e9dfd2abff28d50a5959858d90e8adeN.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine db5e45f26b.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 5115a909ce.exe -
Loads dropped DLL 2 IoCs
pid Process 6984 service123.exe 5856 service123.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c2868357b4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c2868357b4.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5115a909ce.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008542001\\5115a909ce.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\184d2b9c09.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008543001\\184d2b9c09.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e7a83886cd.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008544001\\e7a83886cd.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\c2868357b4.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008545001\\c2868357b4.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000a000000023b8a-98.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 440 099744b9bcea8baa80000eb185ff004f5e9dfd2abff28d50a5959858d90e8adeN.exe 4736 skotes.exe 3228 db5e45f26b.exe 3936 5115a909ce.exe 4984 184d2b9c09.exe 3724 c2868357b4.exe 5784 skotes.exe 1744 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 099744b9bcea8baa80000eb185ff004f5e9dfd2abff28d50a5959858d90e8adeN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 5256 4984 WerFault.exe 92 5592 3228 WerFault.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 099744b9bcea8baa80000eb185ff004f5e9dfd2abff28d50a5959858d90e8adeN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language db5e45f26b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 184d2b9c09.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5115a909ce.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e7a83886cd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c2868357b4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Checks processor information in registry 2 TTPs 12 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 184d2b9c09.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 db5e45f26b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString db5e45f26b.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 184d2b9c09.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 5 IoCs
pid Process 3108 taskkill.exe 2376 taskkill.exe 116 taskkill.exe 2872 taskkill.exe 992 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4716 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 39 IoCs
pid Process 440 099744b9bcea8baa80000eb185ff004f5e9dfd2abff28d50a5959858d90e8adeN.exe 440 099744b9bcea8baa80000eb185ff004f5e9dfd2abff28d50a5959858d90e8adeN.exe 4736 skotes.exe 4736 skotes.exe 3228 db5e45f26b.exe 3228 db5e45f26b.exe 3936 5115a909ce.exe 3936 5115a909ce.exe 4984 184d2b9c09.exe 4984 184d2b9c09.exe 4984 184d2b9c09.exe 4984 184d2b9c09.exe 4984 184d2b9c09.exe 4984 184d2b9c09.exe 1708 chrome.exe 1708 chrome.exe 3636 e7a83886cd.exe 3636 e7a83886cd.exe 3724 c2868357b4.exe 3724 c2868357b4.exe 772 chrome.exe 772 chrome.exe 3636 e7a83886cd.exe 3636 e7a83886cd.exe 3724 c2868357b4.exe 3724 c2868357b4.exe 3724 c2868357b4.exe 3228 db5e45f26b.exe 3228 db5e45f26b.exe 3228 db5e45f26b.exe 3228 db5e45f26b.exe 3228 db5e45f26b.exe 3228 db5e45f26b.exe 3228 db5e45f26b.exe 3228 db5e45f26b.exe 5784 skotes.exe 5784 skotes.exe 1744 skotes.exe 1744 skotes.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 772 chrome.exe 772 chrome.exe 772 chrome.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 992 taskkill.exe Token: SeShutdownPrivilege 1708 chrome.exe Token: SeCreatePagefilePrivilege 1708 chrome.exe Token: SeDebugPrivilege 3108 taskkill.exe Token: SeDebugPrivilege 2376 taskkill.exe Token: SeDebugPrivilege 116 taskkill.exe Token: SeDebugPrivilege 2872 taskkill.exe Token: SeShutdownPrivilege 772 chrome.exe Token: SeCreatePagefilePrivilege 772 chrome.exe Token: SeDebugPrivilege 3724 c2868357b4.exe Token: SeDebugPrivilege 1896 firefox.exe Token: SeDebugPrivilege 1896 firefox.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 440 099744b9bcea8baa80000eb185ff004f5e9dfd2abff28d50a5959858d90e8adeN.exe 3636 e7a83886cd.exe 3636 e7a83886cd.exe 3636 e7a83886cd.exe 3636 e7a83886cd.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 3636 e7a83886cd.exe 3636 e7a83886cd.exe 3636 e7a83886cd.exe 3636 e7a83886cd.exe 3636 e7a83886cd.exe 3636 e7a83886cd.exe 772 chrome.exe 772 chrome.exe 772 chrome.exe 772 chrome.exe 772 chrome.exe 772 chrome.exe 772 chrome.exe 772 chrome.exe 772 chrome.exe 772 chrome.exe 772 chrome.exe 772 chrome.exe 772 chrome.exe 772 chrome.exe 772 chrome.exe 772 chrome.exe 772 chrome.exe 772 chrome.exe 772 chrome.exe 772 chrome.exe 772 chrome.exe 772 chrome.exe 772 chrome.exe 772 chrome.exe 772 chrome.exe 772 chrome.exe 1896 firefox.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 3636 e7a83886cd.exe 3636 e7a83886cd.exe 3636 e7a83886cd.exe 3636 e7a83886cd.exe 3636 e7a83886cd.exe 3636 e7a83886cd.exe 3636 e7a83886cd.exe 3636 e7a83886cd.exe 3636 e7a83886cd.exe 3636 e7a83886cd.exe 1896 firefox.exe 1896 firefox.exe 1896 firefox.exe 1896 firefox.exe 3636 e7a83886cd.exe 3636 e7a83886cd.exe 1896 firefox.exe 1896 firefox.exe 1896 firefox.exe 1896 firefox.exe 1896 firefox.exe 1896 firefox.exe 1896 firefox.exe 1896 firefox.exe 1896 firefox.exe 1896 firefox.exe 1896 firefox.exe 1896 firefox.exe 1896 firefox.exe 1896 firefox.exe 1896 firefox.exe 1896 firefox.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1896 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 440 wrote to memory of 4736 440 099744b9bcea8baa80000eb185ff004f5e9dfd2abff28d50a5959858d90e8adeN.exe 82 PID 440 wrote to memory of 4736 440 099744b9bcea8baa80000eb185ff004f5e9dfd2abff28d50a5959858d90e8adeN.exe 82 PID 440 wrote to memory of 4736 440 099744b9bcea8baa80000eb185ff004f5e9dfd2abff28d50a5959858d90e8adeN.exe 82 PID 4736 wrote to memory of 3228 4736 skotes.exe 89 PID 4736 wrote to memory of 3228 4736 skotes.exe 89 PID 4736 wrote to memory of 3228 4736 skotes.exe 89 PID 4736 wrote to memory of 3936 4736 skotes.exe 91 PID 4736 wrote to memory of 3936 4736 skotes.exe 91 PID 4736 wrote to memory of 3936 4736 skotes.exe 91 PID 4736 wrote to memory of 4984 4736 skotes.exe 92 PID 4736 wrote to memory of 4984 4736 skotes.exe 92 PID 4736 wrote to memory of 4984 4736 skotes.exe 92 PID 4736 wrote to memory of 3636 4736 skotes.exe 93 PID 4736 wrote to memory of 3636 4736 skotes.exe 93 PID 4736 wrote to memory of 3636 4736 skotes.exe 93 PID 3636 wrote to memory of 992 3636 e7a83886cd.exe 94 PID 3636 wrote to memory of 992 3636 e7a83886cd.exe 94 PID 3636 wrote to memory of 992 3636 e7a83886cd.exe 94 PID 4984 wrote to memory of 1708 4984 184d2b9c09.exe 96 PID 4984 wrote to memory of 1708 4984 184d2b9c09.exe 96 PID 1708 wrote to memory of 1316 1708 chrome.exe 97 PID 1708 wrote to memory of 1316 1708 chrome.exe 97 PID 1708 wrote to memory of 1304 1708 chrome.exe 98 PID 1708 wrote to memory of 1304 1708 chrome.exe 98 PID 1708 wrote to memory of 1304 1708 chrome.exe 98 PID 1708 wrote to memory of 1304 1708 chrome.exe 98 PID 1708 wrote to memory of 1304 1708 chrome.exe 98 PID 1708 wrote to memory of 1304 1708 chrome.exe 98 PID 1708 wrote to memory of 1304 1708 chrome.exe 98 PID 1708 wrote to memory of 1304 1708 chrome.exe 98 PID 1708 wrote to memory of 1304 1708 chrome.exe 98 PID 1708 wrote to memory of 1304 1708 chrome.exe 98 PID 1708 wrote to memory of 1304 1708 chrome.exe 98 PID 1708 wrote to memory of 1304 1708 chrome.exe 98 PID 1708 wrote to memory of 1304 1708 chrome.exe 98 PID 1708 wrote to memory of 1304 1708 chrome.exe 98 PID 1708 wrote to memory of 1304 1708 chrome.exe 98 PID 1708 wrote to memory of 1304 1708 chrome.exe 98 PID 1708 wrote to memory of 1304 1708 chrome.exe 98 PID 1708 wrote to memory of 1304 1708 chrome.exe 98 PID 1708 wrote to memory of 1304 1708 chrome.exe 98 PID 1708 wrote to memory of 1304 1708 chrome.exe 98 PID 1708 wrote to memory of 1304 1708 chrome.exe 98 PID 1708 wrote to memory of 1304 1708 chrome.exe 98 PID 1708 wrote to memory of 1304 1708 chrome.exe 98 PID 1708 wrote to memory of 1304 1708 chrome.exe 98 PID 1708 wrote to memory of 1304 1708 chrome.exe 98 PID 1708 wrote to memory of 1304 1708 chrome.exe 98 PID 1708 wrote to memory of 1304 1708 chrome.exe 98 PID 1708 wrote to memory of 1304 1708 chrome.exe 98 PID 1708 wrote to memory of 1304 1708 chrome.exe 98 PID 1708 wrote to memory of 1304 1708 chrome.exe 98 PID 1708 wrote to memory of 4576 1708 chrome.exe 99 PID 1708 wrote to memory of 4576 1708 chrome.exe 99 PID 1708 wrote to memory of 4236 1708 chrome.exe 100 PID 1708 wrote to memory of 4236 1708 chrome.exe 100 PID 1708 wrote to memory of 4236 1708 chrome.exe 100 PID 1708 wrote to memory of 4236 1708 chrome.exe 100 PID 1708 wrote to memory of 4236 1708 chrome.exe 100 PID 1708 wrote to memory of 4236 1708 chrome.exe 100 PID 1708 wrote to memory of 4236 1708 chrome.exe 100 PID 1708 wrote to memory of 4236 1708 chrome.exe 100 PID 1708 wrote to memory of 4236 1708 chrome.exe 100 PID 1708 wrote to memory of 4236 1708 chrome.exe 100 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\099744b9bcea8baa80000eb185ff004f5e9dfd2abff28d50a5959858d90e8adeN.exe"C:\Users\Admin\AppData\Local\Temp\099744b9bcea8baa80000eb185ff004f5e9dfd2abff28d50a5959858d90e8adeN.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Users\Admin\AppData\Local\Temp\1008541001\db5e45f26b.exe"C:\Users\Admin\AppData\Local\Temp\1008541001\db5e45f26b.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:3228 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:772 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffbfa32cc40,0x7ffbfa32cc4c,0x7ffbfa32cc585⤵PID:1956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2276,i,14673172280064639129,17865103610003187858,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2272 /prefetch:25⤵PID:3152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1780,i,14673172280064639129,17865103610003187858,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2448 /prefetch:35⤵PID:4236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2028,i,14673172280064639129,17865103610003187858,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2452 /prefetch:85⤵PID:436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3120,i,14673172280064639129,17865103610003187858,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3184 /prefetch:15⤵
- Uses browser remote debugging
PID:4508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3128,i,14673172280064639129,17865103610003187858,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3348 /prefetch:15⤵
- Uses browser remote debugging
PID:628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4416,i,14673172280064639129,17865103610003187858,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4412 /prefetch:15⤵
- Uses browser remote debugging
PID:5572
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:6984
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4716
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3228 -s 8764⤵
- Program crash
PID:5592
-
-
-
C:\Users\Admin\AppData\Local\Temp\1008542001\5115a909ce.exe"C:\Users\Admin\AppData\Local\Temp\1008542001\5115a909ce.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3936
-
-
C:\Users\Admin\AppData\Local\Temp\1008543001\184d2b9c09.exe"C:\Users\Admin\AppData\Local\Temp\1008543001\184d2b9c09.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffbfb0bcc40,0x7ffbfb0bcc4c,0x7ffbfb0bcc585⤵PID:1316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1948,i,6287502031446004720,454659814178118878,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1944 /prefetch:25⤵PID:1304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1904,i,6287502031446004720,454659814178118878,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2276 /prefetch:35⤵PID:4576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2160,i,6287502031446004720,454659814178118878,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2468 /prefetch:85⤵PID:4236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3172,i,6287502031446004720,454659814178118878,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3192 /prefetch:15⤵
- Uses browser remote debugging
PID:3460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3212,i,6287502031446004720,454659814178118878,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3324 /prefetch:15⤵
- Uses browser remote debugging
PID:3180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4464,i,6287502031446004720,454659814178118878,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4664 /prefetch:15⤵
- Uses browser remote debugging
PID:1800
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4984 -s 16004⤵
- Program crash
PID:5256
-
-
-
C:\Users\Admin\AppData\Local\Temp\1008544001\e7a83886cd.exe"C:\Users\Admin\AppData\Local\Temp\1008544001\e7a83886cd.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:992
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3108
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2376
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:116
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2872
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:1184
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1896 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1976 -parentBuildID 20240401114208 -prefsHandle 1884 -prefMapHandle 1876 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {3463fdee-7b47-492b-861e-9e3c4dd4fdd8} 1896 "\\.\pipe\gecko-crash-server-pipe.1896" gpu6⤵PID:3116
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2476 -parentBuildID 20240401114208 -prefsHandle 2444 -prefMapHandle 2440 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {90b91df1-de00-44b8-bfb8-01fd2f32e4ef} 1896 "\\.\pipe\gecko-crash-server-pipe.1896" socket6⤵PID:2952
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3624 -childID 1 -isForBrowser -prefsHandle 3424 -prefMapHandle 3440 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c472c246-c318-42be-af06-a5d308ede8cd} 1896 "\\.\pipe\gecko-crash-server-pipe.1896" tab6⤵PID:5312
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4112 -childID 2 -isForBrowser -prefsHandle 3280 -prefMapHandle 4108 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2d0eb46b-cd8b-4ce5-9478-6b8331a23b08} 1896 "\\.\pipe\gecko-crash-server-pipe.1896" tab6⤵PID:5888
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4928 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4364 -prefMapHandle 4368 -prefsLen 29197 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {77b157d4-5c06-4c2f-aeef-149d94e0b188} 1896 "\\.\pipe\gecko-crash-server-pipe.1896" utility6⤵
- Checks processor information in registry
PID:6368
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5380 -childID 3 -isForBrowser -prefsHandle 5236 -prefMapHandle 5232 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {20c059dd-8d70-4acd-ac99-83260208ad75} 1896 "\\.\pipe\gecko-crash-server-pipe.1896" tab6⤵PID:7124
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5364 -childID 4 -isForBrowser -prefsHandle 5296 -prefMapHandle 5300 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f207b9c8-2b92-420e-9ed9-cb024ad3b79c} 1896 "\\.\pipe\gecko-crash-server-pipe.1896" tab6⤵PID:7144
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5604 -childID 5 -isForBrowser -prefsHandle 5596 -prefMapHandle 5592 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b94f322c-c40b-475d-be70-c00a6b2bfba0} 1896 "\\.\pipe\gecko-crash-server-pipe.1896" tab6⤵PID:6100
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1008545001\c2868357b4.exe"C:\Users\Admin\AppData\Local\Temp\1008545001\c2868357b4.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3724
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2924
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:5328
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4984 -ip 49841⤵PID:6124
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5784
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3228 -ip 32281⤵PID:704
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1744
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5856
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40B
MD573d076263128b1602fe145cd548942d0
SHA169fe6ab6529c2d81d21f8c664da47c16c2e663ae
SHA256f2dd7199b48e34d54ee1a221f654ad9c04d8b606c02bdbe77b33b82fb2df6b29
SHA512e371083407ee6a1e3436a3d1ea4e6a84f211c6ad7c501f7a09916a9ada5b50a39dcb9e8be7a4dee664ea88ec33be8c6197c2f0ac2eabe3c0691bc9d0ed4e415d
-
Filesize
44KB
MD5ccdf643777a40f82845cdf60a967e1e4
SHA1861c084928f1f0405ff1b53242e0fa55094d9e51
SHA256d024456194aae99431c20d58c008e3dcb1ec639a62ad3c16b579f8720dadbc18
SHA51235f44e7ab8d2078a487ef3fbb4b39a4c8b9673416ea50dcd94630ba953346408e33c74bda053227a50e3b8d58b0e19106fc2aafb2fb9284bd39939f33834ef05
-
Filesize
264KB
MD568e249bba96c7cf7739b32a4551339a5
SHA18529c46e4dd863424e2a3c7463fca9573c0da805
SHA256a4b5e81a8754f62df7d78c4cbc384e95a8738a06fb0a4dc65d08fb0775dfbd67
SHA5122ed1ba09831e2ac1ca4ee29b75c15bb74f8aa6259bfb2c0408e80994d8f54970f7a95e69bc3f6ff4989965d20f94725b30dc7f1bfe9a85ca4956c064ff08a9ed
-
Filesize
320B
MD51e25ca8f34e66a9a77fbe64748a32e03
SHA1e91cfae9bea54df4f4dd7e5e91ddcf926b7c92af
SHA2567184aab93d69db439bc29d6a42ba87fbe61827c0a3fc9f6a3346fd11295e6152
SHA512e82a903f38597011517d30cf253a63ad90074346c4c656f4d6d5a4390a6d06fd3fdc4348dfb2d749ab9252975b1345766ad90fe4af9247414e501758f362d1e6
-
Filesize
44KB
MD5984db98034487291ca75c0dc0a335de8
SHA14e688b9b4717a517b8d721d76dd620e5e0a4f221
SHA256886abc1a837498c1719b4998706d2665d3862026b969a9e2f92b75befcf8fd0c
SHA512ce87cb7fe82ceca4e543262a36d24302c954c5acc65544bc9716305a7c076b9630aced1cdc7a5cac292fa1da77f5714322ceb2b631e2a93d1b66c43409266ab5
-
Filesize
264KB
MD5bd142056563012a3be15bf0b83c4a561
SHA1c97aa6fbd433260d5d140287242ffb609a69e027
SHA256d9743345a40d6b7f5f6affc0f8c7d85298d139c4944cf954aa0c3c3d52312151
SHA51282edab4646752e48a6e5b25f9927c3f6058944b52dc588b2ba86a47dc68ae586fe324b69833dbb0a6895c06baae12c9f07fb6e280dc1bda9361ff3114d89af75
-
Filesize
1.0MB
MD5fe993339a25710ebec86c051941d462c
SHA11a7a578b7a32bbe2102a789c2321090d406838d1
SHA25659ce81d41051a1d16c02906cd586fcdeabbe7ee30ea7b7b1bb0970b981ffa443
SHA512b81201876efadc61a8fb48718abb16f7f458856f2ee676db8b0da36790492ad930585c14ce200e7a9e079b8115b15e20ed95176cbfdc337b3ab732e5fe72bbd2
-
Filesize
4.0MB
MD5d6b0609c4b6edb45553ff9afbfc95e33
SHA12697657b75906d3653f48080ec1f3993c07bd8bf
SHA256eb5cc165f4f69f7a3e72851b1b63e67efa9afb3c96bf8aefc962a5fdbdd6cc2e
SHA512db4c837c9a8a30e65f0f634bcceecff3354d6b72b34536e584fafd02eb103cb4a6b01522d4463d8c54e6852d28a71d9ec8997e2f353e59ea8724aadbbc2a80ca
-
Filesize
329B
MD535ae4a1de9eca85d1a3cf6394d6d0a0a
SHA1afc5af3f5f5df12eff534f42d387e712f2c99715
SHA2563b37d0b69d4cb68bf01f22ef597d4e7a1b8302c8940b14cec5bbd681b740311a
SHA51293f86c0760d679ea1910185e47f2acf844f48144fda9da4076247f28b976e5fb798a6c383f098f28ec65e0ce3e1f1235c1dd109b5d00ce33bf050e5215a70768
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
333B
MD5ad17bfb43cc27c7af810d7693832ca89
SHA1febcb5faf4c91b456f701d139c1269143ba8e333
SHA256afaf9417da6ec7f85b3637d53300b392efec79c026d4109f1672efc2edd1f2b7
SHA512ca8691c3ef35f45329bee71e9c0f1c98fd42dc25bfa72a9dd45df80534420a800e4e0c82e0ecf93ad13f52ac934fa75f2a0eca800fbc28bc7e798879ed54f683
-
Filesize
289B
MD5541c42f1c98b3e1b011d22eba854e707
SHA1db30188de1f22e3077e7044be1386a5d0ecaed9d
SHA2560768e811c51ac61a8e573ac6b53f89dbb1d89eb2fcf62536a9a5f730329c584b
SHA51247828c1b40deb8d37d6ff4fc8f7673fbb59b40e07f54f0fa4121b91941160134c251e20f7f28f7ee5185f3c8aee2b7e95a1bef573bc64c68912016accbe90604
-
Filesize
317B
MD5d339057df84afdcbcc1445ba1eab20dd
SHA1fbd89493cbda88de5b4839d732c9fbb7d3ab309d
SHA256a7af789f389ce0f3df6ee1d8addf3e85ac83cae1ba59a6a4460d7582f705ab4c
SHA51229a72bc8b899f6540a5a16692139adf6a985a6eadfc932b8e58ec46ec98b792b17c82e50c1121c9a5fd91757ec097c0b4a66a95d7478de737e988ace64145e22
-
Filesize
348B
MD5512f0b4358d9dcb8dc5fc9b007f7df61
SHA15db1e888c976dc660c1ecd09b6a4870b5a5be7f6
SHA256019dd73ebd6e4e600499c404b984b23a309ad15a6ff1a6881c6e7f70f54c8ca5
SHA512ff49cb72c3f1fdd0f9ac2d7310c44999528227613486f42487b8686471c41ae0aefbb5dfda150d55b41b4f9e85f2355dd9b7cfa5d8643c27dfba7933e396e8a3
-
Filesize
324B
MD5a22ad0efc6a9f100dd39946b9cc79da3
SHA1e960f17d83ef053e63e1c8ad911074d5e1164eab
SHA2568316f14f1dd62512f85783ece95e78a2ff63d0536272f522c5fe8a934f1fc33a
SHA512fca5777058607eb22d1389ec2c67d644d81ffae1fc36e454e163f8cd78243748b711bbc66c3c30f75418ae23860b6b2c9125fe15c99bedc154c2e56b63ee5929
-
Filesize
8KB
MD54fa2b8b4c7580919f96d56afe788d2d6
SHA16e023f5281e5a667241c37d623bb439a2f952da3
SHA256ebeec3ad6f44d31ce3f9a2e8efe24887552335b516a79237302703281dec1879
SHA51236c44b8b41c99fd180fb244c15460264a8cc34fdd618a743b9793cb29189beb54877306c854395175d8f3ffb92ac59d1b719800d18a65ba647f3d9748503c90e
-
Filesize
14KB
MD504ed0b8f65c8a1e0e9d3fca0a848df75
SHA1043c70376c843799bb6b543f20475515396986bb
SHA2564c1139879fb2ea069a75bc3351f41450258e1ce2d4abd23f3c0abb1986a4a2fe
SHA5122b86b6a5c2ea8e7216fb559b564a29180aa523589118da8491164c9410abe1a73cbd804e68c72a32c48d5364af250f03495495554720cc19d64459d8a08e7bf6
-
Filesize
317B
MD59f2d55ff1e1135f82bedede50cb2f4a7
SHA162827d8f158239224be7963d4c00e07933de921b
SHA25629350baab6add13e2d440d819b66e35133b4b162a06d0d2516d36c2e6bc1b549
SHA51223fa23cf6b62fc62e73895c8e526e09ae23d35e08d731306fe79803ac50a5a626edadd41defebb3db467b199d5377e5b93270c884df6085ff255810878ddff08
-
Filesize
1KB
MD5e99c26c4c0cca685c6b0ff4709b57cd7
SHA1437d67e170863eb0f926a467d89e4ad88d7e065d
SHA256427e6466401f0f2a14669fe96fa57333fe381faa1708db4734cf409039a83bab
SHA512cb8daf5284df7b25391b4dc4cd7df296facc99db399fc76194ff34e47b2f737dfe71aaf62ede0458ded03152a7c4a2fac5c01ae626af7dabfc6001218f7ccb56
-
Filesize
335B
MD58f2eaf6c17fd9d314c93f8e27548ab9e
SHA1fd3c2fddd8856585fee83f8271184df948319fc6
SHA2562857cc4f9c6c5f2f2a30804d023167163667560e665b2fff7027b19c3048d89c
SHA512f714c381fe48ffa6e1a26e8b7902a265cc2f83d9c9a0b423ea8c0bdcd2e63454f910afac2f064e7babfd88c2f25606beeb9b64cec95928642128b7f576db4938
-
Filesize
44KB
MD5d71d942ec52eecacda5d7b0f194b621b
SHA17ef720aa5d9aeb08d72dd5d8e96a2e09411b370c
SHA256a9e2f1cc40c1ddc3a51b2ac380e0dcbc32f37098c268d5c612e19a4901ffbb3d
SHA5128f3ffbd20471a5c27449925ca0c761bec86d8f42bd6c7516821bcf914cbce7419c747b1781ca279b0a5f2e332bb5d59489722f423dc339b8fe051647b9707b71
-
Filesize
264KB
MD5d7221370095d5298b9d80afef5e2629c
SHA16bf66e1b91dd6f2eb87146a417d1f9ab78410ed6
SHA256ecaddbf943e5cf25072c4cf7a670243ad7b61930172e70edd5d746905d2253eb
SHA512d9a3310d8ec7c9c32c59285ac0f15d8c4352044a6821d31994db2530ef2094f2f1c5412829b0d79a12c69e1d40d471f71bf90f4860033ae34d3997070b8a7bd3
-
Filesize
4.0MB
MD5f98f41e0e81f61760fe79a697a53d2f0
SHA1a77df8c6d80348a4cda08ec4fcedae3cc7dcd239
SHA2560b786157e734230df829a7fe738c2303e44da7048ec8f6e5dc28d4976e3f1830
SHA512f8e8cd1df8569cb437807f3471b6ee0f282c3ea301e4823cc90a348f2c6870eabd85d07f46236a80d06eb263713a90a41851878e0d58f34740a864cd3a82d4af
-
Filesize
14B
MD5ef48733031b712ca7027624fff3ab208
SHA1da4f3812e6afc4b90d2185f4709dfbb6b47714fa
SHA256c9ce8dbbe51a4131073db3d6ceef1e11eaca6308ad88a86125f221102d2cee99
SHA512ce3a5a429e3796977a8019f47806b8c0671b597ead642fcbfbe3144e2b8112d35a9f2250896b7f215d237d0d19c5966caf3fe674165a6d50e14cb2b88c892029
-
Filesize
86B
MD5f732dbed9289177d15e236d0f8f2ddd3
SHA153f822af51b014bc3d4b575865d9c3ef0e4debde
SHA2562741df9ee9e9d9883397078f94480e9bc1d9c76996eec5cfe4e77929337cbe93
SHA512b64e5021f32e26c752fcba15a139815894309b25644e74ceca46a9aa97070bca3b77ded569a9bfd694193d035ba75b61a8d6262c8e6d5c4d76b452b38f5150a4
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\85mw8mk9.default-release\activity-stream.discovery_stream.json.tmp
Filesize22KB
MD5cdc98a8bffacd37c3c685991699cca98
SHA18b6fede720490d17598d133b4a9740d3d939e9fa
SHA256d6d03ccca16f88e4fc4a8e68089edc2a772fdf554324a5d128a58b4be4cb97ce
SHA512553a07af1c7dc58a001a0d7f3074b4206c810a7b7d419363a6e76c9e68a45270adae22312c7d4ff14ab77d350601d7f671a0e2332e3b3f2cc3fe508c0a37054a
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\85mw8mk9.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD5bf449712671ca1d26c3a1b3bf68b54e5
SHA100b2832d7d99e1c3ab3d7cd3685dbf1e86f58e74
SHA256c574caf31e5ab63b4dfaf7b58c087b43db593c8a8cd61197ad662d05c7b0a0bc
SHA512459282cb912576dcd6ca47a6bd5c1b28dd59ae1817548e17c1f774c3d0591de1eb6a11223db67b2b5003c2529e809554e5cd400a558532a4a82105f80be6d9e5
-
Filesize
4.2MB
MD5e4ce436577c61894061cb66d79ff104c
SHA1f9fefdd313f0418ddf9d143bf66566c2932cc0b5
SHA256f9445c47bc1b7580e4a81cda77fe412ffad705411ab1cc28d164250d275a3017
SHA5126d3ead9324b8061e32f1e4dc133e6a1e129d24cd17d147595fe8aeb445c462b39a696edb5c4fa005d4fb86113b7183f37103b0e10648490ed87302fc423fb222
-
Filesize
1.8MB
MD5ace99b08916d1db23e510939aa97ab49
SHA13891ed604b6265e288bb1cfa5f1c952d12e15bb6
SHA2568682c013ec1c703d754770792b7229d40ab863d7e5c2f2e953be152b57ad138c
SHA512cca1590d65e0d32ef3c2acc5159436140cef2ab48ad7bc827176daeb503af1343d50d0fc1e946add3f9c5a98c4362284fdea42fa5616967bf49355327037c619
-
Filesize
1.7MB
MD56fe3130fbf57b8dfe19158188df1e915
SHA1ff0e2328c167f39bab919190099086312150ff31
SHA256d31217975514e9ecb073887fad050b7455c43a746a5ee3273368f48ba106d56f
SHA512bbca47bf611131d0041ebd05f1758d524bbe568b28a09514afa4402c53ad009f08011f79092e8d6116895e3165bf9e584f29926bed725e3e46048dc1be44ebc0
-
Filesize
901KB
MD54c4eb739fcbfa409e50878b57d82c424
SHA13caa458a9d00da3dcedf459d45ca927348e3f8bd
SHA256452c647c3a33b28a82330b450c78cf0e18d862a2c7aa756e730ba4a9859d44a3
SHA51268f9216799874f0ebe61253448d26e5c5b26b67ba13db096b7f8e713d26b87a386aa6e9c0111dd07edd7bab33e86ba55f296eb8d532a691baab077a3be568dcb
-
Filesize
2.7MB
MD55d3609d2ec83d15d87b45ca4c6333659
SHA1d4fcc48c2f86e794bab06294a70b30133eda409d
SHA25601d17f2ada1b93d1d5af1aa0b16af5eb328d4bdb68ddb137167fe26a7ee83c2b
SHA512423cf45f27f3ee3976694fab7aab03f81f76c61c52c468f555edb1660a260e8d63099135d73aa6f784798dab6af5de2b5796861c56bcfa592c48348ad2cf2753
-
Filesize
3.1MB
MD5035d4f0c02471d8611df2f1749ce4ed0
SHA195604864ead15d71306fb081d7b5dc5652999653
SHA256099744b9bcea8baa80000eb185ff004f5e9dfd2abff28d50a5959858d90e8ade
SHA512125651e8e9b0c3527e3e59672f57c5b266a6ecbcfee682a372c541339944787564305abeba4f805213105c9416c37fbc5b54a6afbac98ec6908bbb40292d997e
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\AlternateServices.bin
Filesize10KB
MD5f4f3bfa8e964de01b121396b1124b3fd
SHA1ed1f67c8e38591a774d922451a45325b190ce53f
SHA256a190da78a777f64f9a63e87bab88d03f3d8441a2389a9e50fa6a08280fba7a20
SHA51205d34342c82acb917a3a06ecb21485cef119cb3f224184cc8460e3d720e5092d1d109ef129ebb21fa75ce240b1e27a0e22b2abfa6f1c0c5f1f1898f555c0c18f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5d72b4f348f2958728243b529515f4a34
SHA1e8883e99df42c61572636f33cfa828dcc58c3634
SHA2562ea8635707e7ec6533d1eadd9832956168fdf19b6171092fcdaf2dd359c1a1ef
SHA512f4719b792ea2d4a741aea5fdacc2be1f3afbf86b84324a03812298ce9d975c44b94ac0cf871cedf4d310e3b788186200e3fc5ca15de1e31613c1eed3afadd8f9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD57fbbd2a8b7d1078d70b5912146cff1cf
SHA1267b81112f41b81d385d7a1075529553bf8d49bd
SHA2565640d0fa6414980245ec10280f2c058b63d3e81015e91ee78d6d7dbb34f3cbb5
SHA5128d9a10c891709691d4cd2de513ee41824fb6bd20a2d53218e29793db670b3168090a22357b69c0e925317ae843a51a9618f5fb8a9bc94004c002f24fa69eedac
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5c561bb054d14c857deac38be97cf5e4a
SHA1968d3e94643b0e2b0c9414924f86f1a906d9f8ac
SHA2568312db1427aa36faab2d46e498d5c5d4bec9de0d74465995b40e540a5290db0d
SHA51244180630c1260f4dbef0e8ea8d5c1acd752b13d1e2dac5c0ab0be11d1ce349c965dbd9a27302dc300df045c2c1b0921372d27e57d6f25fa264efd82d0ce56df6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\pending_pings\438e37e8-d7b4-4d66-b84c-4ff9c86aec3d
Filesize26KB
MD5c1705046a289012c6764a714466b50aa
SHA109629829435fd2d6487e3d468cffc051eee667f3
SHA256876bed9e73ce31626ba06eee1a61217d0f413492227afa4c0a792cd266692063
SHA5127d7a17a59877aa0318270aa89ec06b61c86bb1f40ff575b80c040601c7c4714ce7cd0d3d31b3e2ce2721267c4f6e1a2ff059c34c17bb0d25838e5895fa620c9d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\pending_pings\5f248573-a82c-4417-81f8-41cea9f80e29
Filesize982B
MD51b58869d7d75f9bcc9651f936ccf6e9b
SHA1dbdacae7be795e29a4351e726196ad1cc09a8d54
SHA256bd95919bb3879fc13d7bf77e98ada9a08ac849f4412c039ec35e99e9d7090b61
SHA512001b6a06754133232fa37efbc2829df2322bbb26a8626f504ba06192e4b18392e0fe26928ea75e11257278ada0229c964e5884a0d50d8b31b71faa5b6a008741
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\pending_pings\718215e6-716f-4de8-971c-400f8ea9eef0
Filesize671B
MD5405bbe391c6e1f84126a6f8291e4057a
SHA13d16200a88860ae6838af13b9bfc3fe7d23b4761
SHA256036edb7b7c544bcbe175e5883d47151e614a0e8211bd3472d0e1cbe04074f17c
SHA512516fdcc9a85337e165eb24de873ee2a304a018d53abe3ced64f5cb9b59cd03a88f08e50beb57908e68dae8883c05446c8032a909f729fb2ab9ccc749ff3493e9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
15KB
MD5307f9d79eea4d58f262626a39dfb5023
SHA1bff4d900e3e1dc1b7c0e4157f1abec64a848a2d7
SHA256b08b1192d9ae80df65e68f310e7c27df5627efb84f412447907b12a8cf85fde3
SHA512f25a36e75300804444109b4326e4d0b24258d6d2c318291f2a255ee72d487a595e0c6eeb6d568eddad907bf4657cee652cf95b0548625357a42f99e1cd61c47c
-
Filesize
10KB
MD5bfc9d1ce0de600c8d953f8a0734a9609
SHA106f590c260142838d1a089fdb8d80a0dc2000efc
SHA25650c151edc0a59e375e275051ecb53bbde6d8703c783d5c2c35961bb60f0eb497
SHA512010bb6f27a7a07f137947918a1ab87aa74f3b677fae9b3246c435bcf87a808a23410b8d10225249a062ab78eb340a873ca18efdfcd13a03f4afe4bbe52d48c3a
-
Filesize
12KB
MD52c0fee3555cf639eb691d4d8b236fff0
SHA195c957f18dcbb9d25ccbb7d6decee08ea555ce6e
SHA256ee7a98119ee3de2e6ca2677082e5edd770e7a9dede2ec6f06e7267196d6b4ca8
SHA512fd8ee8ea0bcf4b59c7d76066472ec5750c90058c09911eb98e6c12ffdbbf2ef01ffacd9fb3de237953f629d0f4f93942e0d8f38d547e6f2d96e349d6088c8e24
-
Filesize
15KB
MD53acfe3eb29abc5cab095ed8307475965
SHA1651d965a59ade9a141c36da3d235f10bf78e6efb
SHA256052943a4abdb700699fa387c5df378b45664b30cac9bcd875ccceffdf81078ee
SHA512ab1e782ef5ffe72555191c810aeaa936e16dde871bc96782fff9b41e47b3a3335a5926bf3ecfdcf44acc5a01ebde67ee7bcbf7b6c78df9cae500662f2b0ec565
-
Filesize
10KB
MD526b37dd55702613169df1b242f66939a
SHA1bf4b703823d95472d8fff6f19727dc4d7260643f
SHA25650de75e4630f345b0ced23c0b1539ca88321df368913fe9f606bab4f8f5f9a3d
SHA512047caf559eff554005d7387f5ffd69a02405f912b55b80ca17a193c0fb4c901b222ee58c816d0afcbf47e32bb07517822e7ffadc4ae7ca777ee3b560a4a9b254
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize2.1MB
MD53fabc2ca95928b476b108e14240baa06
SHA1b2163aa38e615b793a91c5a74df0840c973b0d05
SHA256d43b0019f8ee2df9f512ceac00823f6f96c4bca324cf868b11be10d14625af4c
SHA5126a34c4f4d08b679476f6160929ac6e757ed7b8e33a1aff02848b0c1975f4da5b93b96947b2dc3d61f0795446491dd1d825fab7281bffe3b9b8bebd5991c4b5fe
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize9.6MB
MD56d900024bc91d5643c9e39550a6c02b9
SHA1fc3817262032acef99044ae057b0189e06b38a20
SHA2563a195481d362dc1542f887c43089af3e73ee7bd273164a492659ec3cb3bef24b
SHA5123bc5f1629efe87fd6e8dc4d75cd69216f1d3e1ad87a3a90a868c956aa17222fcb8093a4d8806cee303a6e057dafc1d39bb96065fe8732d6773b33cc9eed437a6