Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2024 05:22
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240903-en
General
-
Target
file.exe
-
Size
1.8MB
-
MD5
2e0b7ce5f1f886f477023b165b5edfec
-
SHA1
091bd515d53e83ef4d47e6616f24415a056a3ccd
-
SHA256
140f7ea0334b06302663adcb3bab944439ae5efde9465a69e655f490297674ba
-
SHA512
a1ad471ad3c9bcfce4850884b52da31498c0fab61e590e51b50612443e97ad44d46f157f7dc4507eebad6c323c7d4eefe169a5b7290b1517531fc2272030f27a
-
SSDEEP
24576:XFWKcW3OuZZL3c7j2u5nWvgAB9zmAk+2+Y8PMLq/5vzsSH0F1nq00wrRz9eLtUkq:E7WVZZLs7j2hvgWt1JHPsc0L86EU3
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Cryptbot family
-
Detects CryptBot payload 1 IoCs
CryptBot is a C++ stealer distributed widely in bundle with other software.
resource yara_rule behavioral2/memory/3428-550-0x0000000069CC0000-0x000000006A71B000-memory.dmp family_cryptbot_v3 -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 04bcc09da9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 04bcc09da9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 04bcc09da9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 04bcc09da9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 04bcc09da9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 04bcc09da9.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 04bcc09da9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 42fcff268a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ cb640baf4c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 378ebfba68.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 8 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 2588 chrome.exe 2452 chrome.exe 648 chrome.exe 3576 chrome.exe 8 chrome.exe 4048 chrome.exe 1920 chrome.exe 5288 chrome.exe -
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 42fcff268a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cb640baf4c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 42fcff268a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 04bcc09da9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 378ebfba68.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 378ebfba68.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cb640baf4c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 04bcc09da9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation file.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 42fcff268a.exe -
Executes dropped EXE 12 IoCs
pid Process 5072 skotes.exe 3512 rimdll32.exe 3428 42fcff268a.exe 3588 cb640baf4c.exe 2596 378ebfba68.exe 2312 8b24c83cf2.exe 4212 04bcc09da9.exe 5156 installer.exe 4440 skotes.exe 5480 service123.exe 380 skotes.exe 2880 service123.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine file.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 42fcff268a.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine cb640baf4c.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 378ebfba68.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 04bcc09da9.exe -
Loads dropped DLL 2 IoCs
pid Process 5480 service123.exe 2880 service123.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 04bcc09da9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 04bcc09da9.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cb640baf4c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008655001\\cb640baf4c.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\378ebfba68.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008656001\\378ebfba68.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\8b24c83cf2.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008657001\\8b24c83cf2.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\04bcc09da9.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008658001\\04bcc09da9.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000023cbe-112.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 5032 file.exe 5072 skotes.exe 3428 42fcff268a.exe 3588 cb640baf4c.exe 2596 378ebfba68.exe 4212 04bcc09da9.exe 4440 skotes.exe 380 skotes.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5156 set thread context of 5200 5156 installer.exe 145 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 5516 2596 WerFault.exe 102 4876 3428 WerFault.exe 99 -
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 42fcff268a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dxdiag.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cb640baf4c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 378ebfba68.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8b24c83cf2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 04bcc09da9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe -
Checks processor information in registry 2 TTPs 12 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 378ebfba68.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 378ebfba68.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 42fcff268a.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 42fcff268a.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 5 IoCs
pid Process 5080 taskkill.exe 1636 taskkill.exe 3704 taskkill.exe 3524 taskkill.exe 1988 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1532 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 5032 file.exe 5032 file.exe 5072 skotes.exe 5072 skotes.exe 3428 42fcff268a.exe 3428 42fcff268a.exe 3588 cb640baf4c.exe 3588 cb640baf4c.exe 2596 378ebfba68.exe 2596 378ebfba68.exe 2596 378ebfba68.exe 2596 378ebfba68.exe 2596 378ebfba68.exe 2596 378ebfba68.exe 3576 chrome.exe 3576 chrome.exe 3576 chrome.exe 2312 8b24c83cf2.exe 2312 8b24c83cf2.exe 4212 04bcc09da9.exe 4212 04bcc09da9.exe 4212 04bcc09da9.exe 4212 04bcc09da9.exe 4212 04bcc09da9.exe 2312 8b24c83cf2.exe 2312 8b24c83cf2.exe 5288 chrome.exe 5288 chrome.exe 4440 skotes.exe 4440 skotes.exe 380 skotes.exe 380 skotes.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3576 chrome.exe 3576 chrome.exe 3576 chrome.exe 5288 chrome.exe 5288 chrome.exe 5288 chrome.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeDebugPrivilege 3512 rimdll32.exe Token: SeDebugPrivilege 1636 taskkill.exe Token: SeShutdownPrivilege 3576 chrome.exe Token: SeCreatePagefilePrivilege 3576 chrome.exe Token: SeShutdownPrivilege 3576 chrome.exe Token: SeCreatePagefilePrivilege 3576 chrome.exe Token: SeShutdownPrivilege 3576 chrome.exe Token: SeCreatePagefilePrivilege 3576 chrome.exe Token: SeDebugPrivilege 3704 taskkill.exe Token: SeDebugPrivilege 3524 taskkill.exe Token: SeDebugPrivilege 1988 taskkill.exe Token: SeDebugPrivilege 5080 taskkill.exe Token: SeDebugPrivilege 2112 firefox.exe Token: SeDebugPrivilege 2112 firefox.exe Token: SeDebugPrivilege 4212 04bcc09da9.exe Token: SeShutdownPrivilege 5288 chrome.exe Token: SeCreatePagefilePrivilege 5288 chrome.exe Token: SeShutdownPrivilege 5288 chrome.exe Token: SeCreatePagefilePrivilege 5288 chrome.exe Token: SeDebugPrivilege 2112 firefox.exe Token: SeDebugPrivilege 2112 firefox.exe Token: SeDebugPrivilege 2112 firefox.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 5032 file.exe 2312 8b24c83cf2.exe 2312 8b24c83cf2.exe 3576 chrome.exe 3576 chrome.exe 3576 chrome.exe 3576 chrome.exe 3576 chrome.exe 3576 chrome.exe 3576 chrome.exe 3576 chrome.exe 3576 chrome.exe 3576 chrome.exe 3576 chrome.exe 3576 chrome.exe 3576 chrome.exe 3576 chrome.exe 3576 chrome.exe 3576 chrome.exe 3576 chrome.exe 3576 chrome.exe 3576 chrome.exe 3576 chrome.exe 3576 chrome.exe 3576 chrome.exe 3576 chrome.exe 3576 chrome.exe 3576 chrome.exe 3576 chrome.exe 2312 8b24c83cf2.exe 2312 8b24c83cf2.exe 2312 8b24c83cf2.exe 2312 8b24c83cf2.exe 2312 8b24c83cf2.exe 2312 8b24c83cf2.exe 2312 8b24c83cf2.exe 2112 firefox.exe 2112 firefox.exe 2112 firefox.exe 2112 firefox.exe 2112 firefox.exe 2112 firefox.exe 2112 firefox.exe 2112 firefox.exe 2112 firefox.exe 2112 firefox.exe 2112 firefox.exe 2112 firefox.exe 2112 firefox.exe 2112 firefox.exe 2112 firefox.exe 2112 firefox.exe 2112 firefox.exe 2112 firefox.exe 2112 firefox.exe 2112 firefox.exe 2112 firefox.exe 2312 8b24c83cf2.exe 2312 8b24c83cf2.exe 2312 8b24c83cf2.exe 5288 chrome.exe 5288 chrome.exe 5288 chrome.exe 5288 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2312 8b24c83cf2.exe 2312 8b24c83cf2.exe 2312 8b24c83cf2.exe 2312 8b24c83cf2.exe 2312 8b24c83cf2.exe 2312 8b24c83cf2.exe 2312 8b24c83cf2.exe 2312 8b24c83cf2.exe 2312 8b24c83cf2.exe 2112 firefox.exe 2112 firefox.exe 2112 firefox.exe 2112 firefox.exe 2112 firefox.exe 2112 firefox.exe 2112 firefox.exe 2112 firefox.exe 2112 firefox.exe 2112 firefox.exe 2112 firefox.exe 2112 firefox.exe 2112 firefox.exe 2112 firefox.exe 2112 firefox.exe 2112 firefox.exe 2112 firefox.exe 2112 firefox.exe 2112 firefox.exe 2112 firefox.exe 2312 8b24c83cf2.exe 2312 8b24c83cf2.exe 2312 8b24c83cf2.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2112 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5032 wrote to memory of 5072 5032 file.exe 83 PID 5032 wrote to memory of 5072 5032 file.exe 83 PID 5032 wrote to memory of 5072 5032 file.exe 83 PID 5072 wrote to memory of 3512 5072 skotes.exe 92 PID 5072 wrote to memory of 3512 5072 skotes.exe 92 PID 5072 wrote to memory of 3428 5072 skotes.exe 99 PID 5072 wrote to memory of 3428 5072 skotes.exe 99 PID 5072 wrote to memory of 3428 5072 skotes.exe 99 PID 5072 wrote to memory of 3588 5072 skotes.exe 100 PID 5072 wrote to memory of 3588 5072 skotes.exe 100 PID 5072 wrote to memory of 3588 5072 skotes.exe 100 PID 5072 wrote to memory of 2596 5072 skotes.exe 102 PID 5072 wrote to memory of 2596 5072 skotes.exe 102 PID 5072 wrote to memory of 2596 5072 skotes.exe 102 PID 2596 wrote to memory of 3576 2596 378ebfba68.exe 104 PID 2596 wrote to memory of 3576 2596 378ebfba68.exe 104 PID 3576 wrote to memory of 4660 3576 chrome.exe 105 PID 3576 wrote to memory of 4660 3576 chrome.exe 105 PID 5072 wrote to memory of 2312 5072 skotes.exe 106 PID 5072 wrote to memory of 2312 5072 skotes.exe 106 PID 5072 wrote to memory of 2312 5072 skotes.exe 106 PID 2312 wrote to memory of 1636 2312 8b24c83cf2.exe 107 PID 2312 wrote to memory of 1636 2312 8b24c83cf2.exe 107 PID 2312 wrote to memory of 1636 2312 8b24c83cf2.exe 107 PID 3576 wrote to memory of 1660 3576 chrome.exe 109 PID 3576 wrote to memory of 1660 3576 chrome.exe 109 PID 3576 wrote to memory of 1660 3576 chrome.exe 109 PID 3576 wrote to memory of 1660 3576 chrome.exe 109 PID 3576 wrote to memory of 1660 3576 chrome.exe 109 PID 3576 wrote to memory of 1660 3576 chrome.exe 109 PID 3576 wrote to memory of 1660 3576 chrome.exe 109 PID 3576 wrote to memory of 1660 3576 chrome.exe 109 PID 3576 wrote to memory of 1660 3576 chrome.exe 109 PID 3576 wrote to memory of 1660 3576 chrome.exe 109 PID 3576 wrote to memory of 1660 3576 chrome.exe 109 PID 3576 wrote to memory of 1660 3576 chrome.exe 109 PID 3576 wrote to memory of 1660 3576 chrome.exe 109 PID 3576 wrote to memory of 1660 3576 chrome.exe 109 PID 3576 wrote to memory of 1660 3576 chrome.exe 109 PID 3576 wrote to memory of 1660 3576 chrome.exe 109 PID 3576 wrote to memory of 1660 3576 chrome.exe 109 PID 3576 wrote to memory of 1660 3576 chrome.exe 109 PID 3576 wrote to memory of 1660 3576 chrome.exe 109 PID 3576 wrote to memory of 1660 3576 chrome.exe 109 PID 3576 wrote to memory of 1660 3576 chrome.exe 109 PID 3576 wrote to memory of 1660 3576 chrome.exe 109 PID 3576 wrote to memory of 1660 3576 chrome.exe 109 PID 3576 wrote to memory of 1660 3576 chrome.exe 109 PID 3576 wrote to memory of 1660 3576 chrome.exe 109 PID 3576 wrote to memory of 1660 3576 chrome.exe 109 PID 3576 wrote to memory of 1660 3576 chrome.exe 109 PID 3576 wrote to memory of 1660 3576 chrome.exe 109 PID 3576 wrote to memory of 1660 3576 chrome.exe 109 PID 3576 wrote to memory of 1660 3576 chrome.exe 109 PID 3576 wrote to memory of 4452 3576 chrome.exe 110 PID 3576 wrote to memory of 4452 3576 chrome.exe 110 PID 3576 wrote to memory of 3000 3576 chrome.exe 111 PID 3576 wrote to memory of 3000 3576 chrome.exe 111 PID 3576 wrote to memory of 3000 3576 chrome.exe 111 PID 3576 wrote to memory of 3000 3576 chrome.exe 111 PID 3576 wrote to memory of 3000 3576 chrome.exe 111 PID 3576 wrote to memory of 3000 3576 chrome.exe 111 PID 3576 wrote to memory of 3000 3576 chrome.exe 111 PID 3576 wrote to memory of 3000 3576 chrome.exe 111 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Users\Admin\AppData\Local\Temp\1008634001\rimdll32.exe"C:\Users\Admin\AppData\Local\Temp\1008634001\rimdll32.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3512
-
-
C:\Users\Admin\AppData\Local\Temp\1008641001\42fcff268a.exe"C:\Users\Admin\AppData\Local\Temp\1008641001\42fcff268a.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:3428 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5288 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff940e3cc40,0x7ff940e3cc4c,0x7ff940e3cc585⤵PID:5312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1984,i,17681989026355739502,16057253721836223637,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1972 /prefetch:25⤵PID:5680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1736,i,17681989026355739502,16057253721836223637,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2004 /prefetch:35⤵PID:5504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2288,i,17681989026355739502,16057253721836223637,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2508 /prefetch:85⤵PID:2056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3340,i,17681989026355739502,16057253721836223637,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3352 /prefetch:15⤵
- Uses browser remote debugging
PID:2588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3360,i,17681989026355739502,16057253721836223637,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3512 /prefetch:15⤵
- Uses browser remote debugging
PID:2452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4540,i,17681989026355739502,16057253721836223637,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4564 /prefetch:15⤵
- Uses browser remote debugging
PID:648
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5480
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3428 -s 12884⤵
- Program crash
PID:4876
-
-
-
C:\Users\Admin\AppData\Local\Temp\1008655001\cb640baf4c.exe"C:\Users\Admin\AppData\Local\Temp\1008655001\cb640baf4c.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3588
-
-
C:\Users\Admin\AppData\Local\Temp\1008656001\378ebfba68.exe"C:\Users\Admin\AppData\Local\Temp\1008656001\378ebfba68.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff93a74cc40,0x7ff93a74cc4c,0x7ff93a74cc585⤵PID:4660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1968,i,10453932213162730169,12509161121944521274,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1964 /prefetch:25⤵PID:1660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1928,i,10453932213162730169,12509161121944521274,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2000 /prefetch:35⤵PID:4452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2264,i,10453932213162730169,12509161121944521274,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2276 /prefetch:85⤵PID:3000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3088,i,10453932213162730169,12509161121944521274,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3216 /prefetch:15⤵
- Uses browser remote debugging
PID:4048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3204,i,10453932213162730169,12509161121944521274,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3256 /prefetch:15⤵
- Uses browser remote debugging
PID:8
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4540,i,10453932213162730169,12509161121944521274,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4548 /prefetch:15⤵
- Uses browser remote debugging
PID:1920
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2596 -s 15364⤵
- Program crash
PID:5516
-
-
-
C:\Users\Admin\AppData\Local\Temp\1008657001\8b24c83cf2.exe"C:\Users\Admin\AppData\Local\Temp\1008657001\8b24c83cf2.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1636
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3704
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3524
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1988
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5080
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:404
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2112 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2032 -parentBuildID 20240401114208 -prefsHandle 1956 -prefMapHandle 1936 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {71a52a7d-e3b8-4154-b19d-05d572be4fc8} 2112 "\\.\pipe\gecko-crash-server-pipe.2112" gpu6⤵PID:2908
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2468 -parentBuildID 20240401114208 -prefsHandle 2444 -prefMapHandle 2440 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {df9749ee-bcbc-4d2b-a0ea-a5de5a4033f3} 2112 "\\.\pipe\gecko-crash-server-pipe.2112" socket6⤵PID:3108
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3348 -childID 1 -isForBrowser -prefsHandle 3156 -prefMapHandle 3272 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1260 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3b3429e5-8780-4c6a-a510-d7bbb3ba8194} 2112 "\\.\pipe\gecko-crash-server-pipe.2112" tab6⤵PID:1536
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3304 -childID 2 -isForBrowser -prefsHandle 4024 -prefMapHandle 4020 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1260 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d8de8b8e-3a37-4f2c-950e-2a910c8d5f7d} 2112 "\\.\pipe\gecko-crash-server-pipe.2112" tab6⤵PID:3932
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4620 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4608 -prefMapHandle 4612 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c51f4c13-e9e6-4505-bacf-b25a0db9e98b} 2112 "\\.\pipe\gecko-crash-server-pipe.2112" utility6⤵
- Checks processor information in registry
PID:5548
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5480 -childID 3 -isForBrowser -prefsHandle 5512 -prefMapHandle 5508 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1260 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fac692f8-f43d-4209-9404-89476291b974} 2112 "\\.\pipe\gecko-crash-server-pipe.2112" tab6⤵PID:5656
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5476 -childID 4 -isForBrowser -prefsHandle 5648 -prefMapHandle 5652 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1260 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {981ed694-a23a-4f6c-b048-c01c088b2c13} 2112 "\\.\pipe\gecko-crash-server-pipe.2112" tab6⤵PID:5728
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5824 -childID 5 -isForBrowser -prefsHandle 5832 -prefMapHandle 5836 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1260 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {00538c5a-7584-45e0-9a54-3d3cca161eed} 2112 "\\.\pipe\gecko-crash-server-pipe.2112" tab6⤵PID:5688
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1008658001\04bcc09da9.exe"C:\Users\Admin\AppData\Local\Temp\1008658001\04bcc09da9.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4212
-
-
C:\Users\Admin\AppData\Local\Temp\1008661001\installer.exe"C:\Users\Admin\AppData\Local\Temp\1008661001\installer.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5156 -
C:\Windows\SysWOW64\dxdiag.exe"C:\Windows\SysWOW64\dxdiag.exe"4⤵
- System Location Discovery: System Language Discovery
PID:5200
-
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:5080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2596 -ip 25961⤵PID:5468
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:6048
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3428 -ip 34281⤵PID:5588
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:380
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2880
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40B
MD51fd21a5228803360e7498b21377bd349
SHA1c028d9a423b995bb2f9d9b56ef09e5a4f9535b38
SHA256920270c469d0fdd572881597d30bae6f24faec32c8a1e7e689186947ac7958d3
SHA512c2324e1b0a32c3d4abdac5ee1c2e663d1e49c24c17f0b5a5dac56cc867f67d2665f29148de2773f2e048292b189d136876b557ae9837517f612155633cbb09b2
-
Filesize
44KB
MD5ffeb127997d8ad269fcf6436b3ac29e6
SHA11d4a8ded4b8950cf0b7c47b130242de8856161e1
SHA2561436e492cf994ce0891ab1446fed9d286c4c2ab42f27fcf8d95ddd7b41e7f7b5
SHA512d9ed3116dbb2da9c065baf67c9c88ce008fcfe60dc8b42eb2a565ab27b60185646c4792739eacf75282cc35fdc8fff321284b44746b91228ccdd19e69fd606b5
-
Filesize
264KB
MD5a10061998799c60009c5003f8d35732d
SHA1e741dde6d7839ea7ac5efdeb7969c73f3100d827
SHA2567d79c2c7c9f6bcfd74b21da8c7734cfeb7a8bb2509b4581e866f7d91b7594540
SHA5125a343934e0634f4505e770112bbafc86c39a0612897fe0108517dc2be7040061cbdacb32ddfc0af59283a9b5d2f5da64cfd4fc45882098d071b55ff09dab09f6
-
Filesize
4.0MB
MD506203d256a2afe292914817429992d3d
SHA1ae0585868d7633c8061d1ef8924e1dd889595aee
SHA25696d8106d5c428911a02695f686e1bba3e6ce97124dd35ff29056de27c9d9c0e1
SHA5121b0b481689b33a37b6c883ec357b7831d7a94219a098b7e31d34c32699904fa92fb3f5f1f1fc45f2018e6bc4d47471de11c7229a92c2fb0154455f9a66001634
-
Filesize
317B
MD533bf78611178d99aeb1c9db5422c6be1
SHA1824dc098cff34a5040e0d558d91498438636f9b3
SHA25665ca80a7065bb20398b662d55be99735cb1e60baf39f2bbc49efd9dc64545ef8
SHA51220f61b64b28f07ab21f9185d76cc19581ac0f74ba31fb4c15433c8945b64dbe2a11b84dd0593411b6c0a9b539ff86d795972cc64755f6c956abfa5392ebeae0b
-
Filesize
44KB
MD5a7898b2dc4064c498d92f4a82c0b9745
SHA104981a79e1e7d75566fff880c648d20b26b1c215
SHA256051edd74014114aceed5a6ab9bea59cf13d831c8a08b272e8916dbe55e3db25f
SHA5123bb87dca5900154842a349f940393db0083d4f6f205226f65ee5ab4f7dbdc78f78ec84e40f25956324056d3e5acf59a37a892a18daa2bed5adb2957588b99213
-
Filesize
264KB
MD5a8c8b14dd999d537b9fe0df199ff4eaa
SHA1264999cb4affa835a2fff17e11a96bc9ccc16ba8
SHA256ae7ed06598745be57dade02e45b9491926e63e94aace030cd048b7fcf67ca77e
SHA512daed7afeb7e8342d1b5e25927b0b9abaedb3a83dcd8f08ce62aeb2e763f6fe4c63306c3710b3e73d8d39f1b8e98eaebe57fb6cd25a9f9b6071bc01344e14b790
-
Filesize
1.0MB
MD5fe993339a25710ebec86c051941d462c
SHA11a7a578b7a32bbe2102a789c2321090d406838d1
SHA25659ce81d41051a1d16c02906cd586fcdeabbe7ee30ea7b7b1bb0970b981ffa443
SHA512b81201876efadc61a8fb48718abb16f7f458856f2ee676db8b0da36790492ad930585c14ce200e7a9e079b8115b15e20ed95176cbfdc337b3ab732e5fe72bbd2
-
Filesize
4.0MB
MD5d6b0609c4b6edb45553ff9afbfc95e33
SHA12697657b75906d3653f48080ec1f3993c07bd8bf
SHA256eb5cc165f4f69f7a3e72851b1b63e67efa9afb3c96bf8aefc962a5fdbdd6cc2e
SHA512db4c837c9a8a30e65f0f634bcceecff3354d6b72b34536e584fafd02eb103cb4a6b01522d4463d8c54e6852d28a71d9ec8997e2f353e59ea8724aadbbc2a80ca
-
Filesize
329B
MD5c4fac24ff7b0e870f7297c67456e03ae
SHA1bdb84b902f52b8ef63cf98a91e621340e5aa39fd
SHA25654eae9001612f82c78983f6a1c59e4d2f8397c27d792e0c23203d278126cc626
SHA512ff6d0441f77e1e12e26a0e57e6be76005b4a20a4b8a48cd63d772cc2b5c52014fbdba36c0980b5006946d23d2767ed2055b2278b2662909783a180ff02d6cc42
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
333B
MD58c9d03ec5692b56a8ee1db547f3bd0b0
SHA12c2d25689de7ddb264489d066111938270a102fb
SHA25603d9aa4188d438657db78fb010492f91ef1fa6c7a64c5842cf833c156534c7a2
SHA512fa1d4cd94b7dd0984e3f453ac2c89b2d06e253c8338328290ab127a145a31ed761749ad6a9bfebd6461235bb3f61261207945be1726f549819cc34df247930a2
-
Filesize
289B
MD5541c42f1c98b3e1b011d22eba854e707
SHA1db30188de1f22e3077e7044be1386a5d0ecaed9d
SHA2560768e811c51ac61a8e573ac6b53f89dbb1d89eb2fcf62536a9a5f730329c584b
SHA51247828c1b40deb8d37d6ff4fc8f7673fbb59b40e07f54f0fa4121b91941160134c251e20f7f28f7ee5185f3c8aee2b7e95a1bef573bc64c68912016accbe90604
-
Filesize
317B
MD5fca8d0d450df24db664be85abf39e239
SHA168e90227a5615176d1846c5276dd21efbe91af1b
SHA25672eb3a8ebfa99bc59ee840dd31947c24e86dadcaff0852e2639d5c5eab6fb710
SHA512f837ee9e90aca0be2a2fd668f7f6e397e527e9116f50314924436d06b93ab1e5a68d719830991a8a0060902259112dff0b043d6df21ba1518b029eb23f641008
-
Filesize
348B
MD50b820efbfefb99265b0beb5d09d80e12
SHA18cfdbcf9e818c5f86783eb9cfc031a8fc275e882
SHA25602426ee0a539009200e12af922502e2d651df8cb28521be10f5489ea1160bf7e
SHA512cce7d01e650f67c256c40e6f61810987e6f8acfcfce57264b487207a81e3d9c7618eb1a8f79940ca551b1842d266dee1cc0508fa1fd36f76e3a7dbd83ed4f231
-
Filesize
321B
MD57c97027c19dbd02a07eeb5f0aa995e31
SHA12fb4d1942427a6d525f8f20c719b2552279e4ea2
SHA2563cdb46192ffdb40fdb14d623a2efe0aefa51d54519b1f85acf4fe626964ef759
SHA51204f3f8e52849fc7d339e4e0f8a2a80af104324266f09b37784551a2051f9859f37fcf66d7d84025f2cd0d0fbc5eb2a73e84f647c83aaa073999e5419162b5122
-
Filesize
8KB
MD5d2ffbe0fe7c4cd4f1970a24d1f843397
SHA175eea770bb51ef28da7395561cb70bb894153f45
SHA25694f0e4393d39ab15ed241e6c5fb43998735f23e535c40f60a5e244301535efa2
SHA512dd47070717fcbee3630b9904771d3cda0e8115aeac2bd76d5e894fdbc27abe431f025b535b46d0aa440877062426e304c4875667377b5ab3f292d0205959f711
-
Filesize
14KB
MD5831d074a683800664e6eaa10809970f6
SHA1f094f44aebf2e33b6882d3ee3669fd63e0b3c897
SHA256913157648ed98fe494e0b743dbf20914accbdf3d37c67f427488f0be3195398c
SHA5121da9f15585572950be495d3799045d254dee010b7fb44e9e205a829a7a722438e586c3c179ffb6daada411d0caa776171b3d425e1d5b75a6906717217a748809
-
Filesize
317B
MD5e6869efe97979b40d8f1d4b2a2df1e30
SHA1d7841e7608315ba4c022aa6eb0cdc690f4cb707b
SHA256c7251ce26ed3bae70c829ce49cf51fc3c49645ddbb68e2f4270adb705b80f4e5
SHA512f6494e41ab70ee3a6233ea02e1b0de05cf786d6de4d3039c48eda80e4bec73486563cb54890c61ec2db7a24fdb11f3bfe84227e42b5de6b01340c2c71945bb4b
-
Filesize
1KB
MD5b929e77800ac39e2df35dc2812b851e3
SHA1c54cff1159b9137cc081c82a26ec7169f191cb63
SHA2569c592ee5b8a897b4fd0932a84b4bd0cf0336eaf3a83abfd541ca306051a32ac4
SHA51204d9d9afab3b928fc095e1ef9465e6245474e80cd2639130e53f895d4f7eb4dcd42e8001a589bd97bd5f2146aed36fe36fbf0e45af28c76df736d9f46ac31d02
-
Filesize
335B
MD514fc5e22c34bd3bd77f63c0628fd4fa9
SHA19e9e17f1d88c780c33315ddf06caf0b3c5f95fe5
SHA2564e5fdb5bc48f65bf4cf233fdb0421223f33f833915a12c7ec421cab1fc3f594f
SHA5120e763bfe002f48b09ac776acf5f2e82625224e9c5ffeb9f9572a8e30018dc398bfc6a8a8dcdc31f6465735b8a92afea63e7bc33b3d8bd3b49d7fd26f25665a56
-
Filesize
44KB
MD5799bceaafec4826c0de0d5f5207668f4
SHA16de4de322c9b9f090d0bdd93d3191c5e07af98f1
SHA25691a2e9768e3f43ce17c484a3e1ab8339b78be20b2a91b2c7db37a458a5f9f3fd
SHA512f7ad69d0e06f313bf2645275b67b8b8efb186b87398c17ddb2cca67f8a8b2e3fef02493696478967d238ff695e6541f7c3b2fc20b6092f5266757e4372ba3fa4
-
Filesize
264KB
MD5f10e8874fe8d7413f7d0b4f906e0ea0e
SHA1ee8644e5809fb2547cea36d8efd8e100ffc08293
SHA25651b1738a39a2dda1ce05730755d08b8f7174e8f0fa3113df50bd807e8aa1ffcc
SHA5125fb724359fe39c941909995d0f29321c0b15e4723d8b2a1c8c33649dca154c0ef4f80b0aaa0e69503fe4e97b5317055b8f2ee1ce171520fae437e628e451ebd4
-
Filesize
4.0MB
MD5f98f41e0e81f61760fe79a697a53d2f0
SHA1a77df8c6d80348a4cda08ec4fcedae3cc7dcd239
SHA2560b786157e734230df829a7fe738c2303e44da7048ec8f6e5dc28d4976e3f1830
SHA512f8e8cd1df8569cb437807f3471b6ee0f282c3ea301e4823cc90a348f2c6870eabd85d07f46236a80d06eb263713a90a41851878e0d58f34740a864cd3a82d4af
-
Filesize
14B
MD5ef48733031b712ca7027624fff3ab208
SHA1da4f3812e6afc4b90d2185f4709dfbb6b47714fa
SHA256c9ce8dbbe51a4131073db3d6ceef1e11eaca6308ad88a86125f221102d2cee99
SHA512ce3a5a429e3796977a8019f47806b8c0671b597ead642fcbfbe3144e2b8112d35a9f2250896b7f215d237d0d19c5966caf3fe674165a6d50e14cb2b88c892029
-
Filesize
86B
MD5f732dbed9289177d15e236d0f8f2ddd3
SHA153f822af51b014bc3d4b575865d9c3ef0e4debde
SHA2562741df9ee9e9d9883397078f94480e9bc1d9c76996eec5cfe4e77929337cbe93
SHA512b64e5021f32e26c752fcba15a139815894309b25644e74ceca46a9aa97070bca3b77ded569a9bfd694193d035ba75b61a8d6262c8e6d5c4d76b452b38f5150a4
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\g9per00b.default-release\activity-stream.discovery_stream.json
Filesize27KB
MD5642b7bbb4573e090f589af99dee5885b
SHA1f7294a8fc7a44168fbc9d788dd0125d37f717991
SHA256abf5e8784c917942cfcf7ceb31cad41c7fa1eb0940aa4efd62abfe2a41383199
SHA51269c43096a9c07e1e23806d2c40b5de76c46997d94d2c18b00cb8d308a7e1a9d5d0db0e7036277851677025ba0a4accc2ef196a1f1bc6c69e06e4b537cb280cf6
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\g9per00b.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD5a5d72b2cda9f66fb66c8041d78bc9da9
SHA101534b64021840b28e20612338d8f0bb4779e71a
SHA25612935a130d016079dc5de9df75014c95c0cd4305b93de024372a123e5a8a0cf4
SHA512f99f21eb6ea05c9812ac950a036cb64f2b3bc01bfb62648595a694c50747f372bf272b66be0ec60a221abc421743595bde187fcb43a27601a88a31e571ab0433
-
Filesize
386KB
MD503ca3823af479cb440c0283066b794b1
SHA1fa607b381f390512effe17926dfe1783a48e1364
SHA256a3e66240301c3b9a402704082ce72ed1055a5c3248406d3a0a1f1ac075798408
SHA512de4b9ab2caad3e704b6224073d6b80ac46b3ae5d077dce549f3d2de1a64754819c8ca51a4ff0eee8e55e1750eac1bdd18919e3f5e33780f6326bc390dbae04bd
-
Filesize
4.2MB
MD508305ea461f669a3cec283e3b3109d49
SHA1be401743abb7a28ba167e612af473aca20ae333a
SHA256ec04fbfddf968df86e0d0e0c0943bf3bb32a70b4fbb7280519a2f73d448fdc96
SHA51276c35c666c6b5cecf474af20ef20a0527e663871c1b61092f0eabcc90a6c2ac8c93b88c12ef609a79a65193259128809c2173d6ed7113b6f71cda1df0a9f919c
-
Filesize
1.8MB
MD5be99e6d317db92832a715c0d81a73d86
SHA1967c6a2baa432fc148ff7b5a11f2878706c097b1
SHA256cda93e6fec4d55eb040345d437e46c7ef2cd53a04722787e7c8304c920511861
SHA5120134977176ccd0716aaa2dd5488a78a01210075c805271db05042b59cf0c69acd3bf2a50096004bbd6a406b73bb7573821bcbbbec00d2f8ed156cd3c0ea16509
-
Filesize
1.7MB
MD585c52cefa22a78fcbd9b6fd8ee2d5e50
SHA1f40c5b7bd336b4fb5b187602e68045a091137126
SHA2565323c3c7c0c60e5e69b8b5eeb05dffc8ce3bbeb52335bc5ed51f7179186d7df9
SHA51218cd50049c383dd5731b4fffb32336e6ef456782bc8356e8c24ef2c9e7e54873515f7513ce22b78b173973469356023053e7ee213c481d3b54387c840a7e3c2e
-
Filesize
900KB
MD5a9b8660c40e0582b27b38387fc2a82a2
SHA14258bc33d119db4931e48bf72a87d032e330c671
SHA2565d8ae2f74c7249bccbc24fde4e6e1bde4e72be6e3709f81fcf3f35cb0a5c91b8
SHA51227041d68d53eb3eb5dad427c9c4edd6e5a91d32fb733533c6d4636a5396473d5f68c08f6ad01f03cab6ebe6777847f0a63c331a40c08f78bd746682bd33dbe70
-
Filesize
2.7MB
MD505eaf12f2c44f62d98c11e8e8530fbb3
SHA165faecebf9b66cecb18921f5848815c3490456ab
SHA256726a12b068a2970d06e89984c2eadb44f5404e0aa9bd776f5725d87fcf4c6129
SHA51200a011cc6cecc64ad743916a93cb7a3bb4f057cec3659d4f8505a6cf5780cd76747c8ebdd0678c4bd1f8c39fc491d7f581f3ac5f119d3842d4eb84f2c9a76e17
-
Filesize
13.2MB
MD529a0fa0fc484ddb637bcad2ad32f5721
SHA1f40e2ead6bdf1c84c2259493e913dc07a6a66e49
SHA2560029ed3abbdfb26ce8f939182f9c44e20c22e85065830eb318ec14cc5ab88ceb
SHA51200fc9213acd055dc85640c21b3fc680098f4acf5beea0f68f2251a6fae60b891a88cda0c8aa2e2991feb6825f20823a23c1f96d30a24953b3c7c2f1465e90955
-
Filesize
1.8MB
MD52e0b7ce5f1f886f477023b165b5edfec
SHA1091bd515d53e83ef4d47e6616f24415a056a3ccd
SHA256140f7ea0334b06302663adcb3bab944439ae5efde9465a69e655f490297674ba
SHA512a1ad471ad3c9bcfce4850884b52da31498c0fab61e590e51b50612443e97ad44d46f157f7dc4507eebad6c323c7d4eefe169a5b7290b1517531fc2272030f27a
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\AlternateServices.bin
Filesize6KB
MD5cac116e849e24bc1418c42715d7ac100
SHA1c42d635a90b4e5bb0cd05c5122894c0a6c2f6472
SHA256f5f7b459b17fb1f50b47bb6722bd3ce7f200ac2599b9610e18f5ead65f9fc054
SHA512417f91f0dec1490d95031957127addf84c25e950d8b085808d16cfa969a53d50b0800237f70afd0b867f83034ec9db97422b98e6b10f7fc43ec3ab5d2bb83b84
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\AlternateServices.bin
Filesize18KB
MD55dfed01773bdbe21cdf65f65ca3f192a
SHA1851e56e4b313fba67c17c79eac16f22208f874ac
SHA2561930b10e921f64057f88a29a9f1f07a7929ed005d6f3a0a519250410ed7d44f9
SHA512b71f5a19114a1fcdc1040fd0eec60b68f269a639ea228969c6102f454fcf40f843ca4554c9f3f64ea99cc0558d26de9d09495d2e495645f737e5147c89bb89f0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\AlternateServices.bin
Filesize8KB
MD5388ffc2b5a9265f161b2064eeb3f9315
SHA16a7678ad7b62eefe24d14428ab631977aad55b40
SHA2565e7efcac5cea0226a4d0c4a0e9fe0e591d6da75a6e021aceded354c69e4827a0
SHA5123f4c65148a7e92652a1b1278cdf34dee81d4159941d2c373f868dde90f0f72b132b8b15a7e9b60bfd840c361c78ae1270c0a0edafad2cf5a40234bc9dcb95716
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5f740d31af23677761aed8721a254b9e5
SHA1158f8aa9d9037bbc30f9fd7fc5c285683bead11f
SHA256f3c4b8b7ff9a9101f1194541f422a0e24d85701f5f92c6e463db4e99542e9a9b
SHA5120a7731d73503addadbb44655f5ae6dc466ed52fcd1620568e79444e96dbb8bd9fdaab737693976ba3c774e6a9b2ddf8514aa072a5892e1e0a58c1d8e369afd6d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD56b2a0d7439dce5e88c29e3739cbe97db
SHA10ccc60296f67a64b71f1aac40e4d5867e446ee92
SHA25682feec9171488c6f6592e203eb605c3b5f587d050a7dfc73f0e19543b2c0ec85
SHA5128296b5a339ce1603ce033a8083c6b17d79bca172242e2ec3be6ed7583dcbb0e49d6666fb86fefc62df47febf0e6733153c576f99eba0b219408c9448de6985a8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\pending_pings\5eaf1732-4134-4afa-bbb8-aeb5e1d019ae
Filesize982B
MD5e390837cbc3dada02956b55b5bb96454
SHA10eb76d10d8caae91aad9f763e7b4c5a82349f499
SHA2567eba79715eb88626bb1cc01f7300714c464daa040e31cbbb2710ec26778b87dd
SHA51246865a8f0139fcec22a717ac74dfade431cef7d2cc4412fcb8ed839979c5aa16717c69d45c066c56b878107d6fb7ac60ebce8aeec5d969d7f680d077f2994653
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\pending_pings\c60f5b5f-7bba-432b-9b3f-b76f71b4a989
Filesize25KB
MD53f03c57fff010b0195bc80bc39da3b17
SHA13aa8bfe692f72c10b594888ee69e4a00f9441a80
SHA256c08a5c3371ef7b644dd58001d554c875ad2a49139f3512d1d963087dd273bd12
SHA512f7e8912f0c0fa3429b8c5d0740606f000dd967ee77d9884ce4fe7a21ab8656ddd6050e70165964489a7915d4b9bac223821e1e35d4ebfb31834b6d81cef1b6e8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\pending_pings\eaf321a6-01af-4e2f-9d94-340c68df519d
Filesize671B
MD5a5719e668a5dabe9051973958b730d7b
SHA10360e5fb8fc1453aae1897250bbbbce41baac8cb
SHA2569edc915baf334d0281acf671144a74f6cc28da24140e07bb8b596d0209d29cc6
SHA512ef3fcdfcedcd80b9be2fd0a9795e0b59a356ca3f7e9478727d7c68e7dea8728501fcf8429c5c19973b61c7b2857b9870c124993a90901507660d289c1edf45f5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
11KB
MD5ea58f226b46e9f39bd61a0b4de2f24a6
SHA112b096c330d71d5aabaa646c7fac47c48122453f
SHA256da551b130459b3ef7e62dc10c24db0b1f44701daeb9804268685b980e4850bc5
SHA5127e0c3d3f6bc06c9364cf5d6ba33f93b17c4e7ff49e8c8ec1259059d422b86062a8f86337dec91264b708ec2ec9acd232161da9b757323761f54c3244c1eed09c
-
Filesize
15KB
MD5577b551d209bd23f8f6f1e673cb4acb5
SHA1443d3cfb3f36ea0435d9656da214d4385a723410
SHA2562080c84527cd787c71dee7e433afc1b2253dfd3edc431225e97504b183c6126d
SHA512c42c68a479968beb141d764b13b1ec43258b1a1041dd3e453cf2b5e47c0345bd5fd93277ab567d096b7f4106c4f064ceac44eb1ba116da1e79cce8ea23b62a99
-
Filesize
15KB
MD5b65c6e3d6a53ce4d865befeaccf6127a
SHA1957c2916a379538a9ece28e887886dc1842ec95a
SHA256c5d89a9856bb0b5f7d8c32fe1693cb9464d01503fabf9b8f3d7c8d04052545f7
SHA51286cb18a64064c5a9c02ac08746f81cf80a25e668e0ede041e5ed9943b9871e89e5e89feef30fe76ee5f680ce4f0041431a064cb45b4659acb2b1a041d9e945b3
-
Filesize
11KB
MD566961c9d65b623123f7b126a1b3ddccd
SHA1e6cc5981370f32372256d85ec592c76e1fbd6a76
SHA256ab993904b4c036d6dad9c8fcb3780d9c31c5a46f561e6ce69edc20aa06e839d5
SHA5128f24833454789957a0b783faa95ff06608a6c68d3446ab1b4625639719294679384e96eba1fe8052b58331244da721cf3e560737a4c15aa2f277ecdd6b75bdff
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize912KB
MD5d44a96aca645f13470e742dced806d82
SHA10372464ece785b15cc1000fefa177b7a72da748d
SHA2567b566f8df7af3272e27fa0e8c3603891d77a361e1b8802563f9c99114aa2b648
SHA51276c641f5888dc8a463f99e5a7d539c24b79d3eeb94dec78367576225b46c4842c0c04b1bb798a138ebd0e9c5d2255215d87c772ea85fc2da695cc4f926ca1971
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize9.5MB
MD569f7a70869a286d5bc8e8dda7017bb79
SHA15c0931744522a0f77ed314603384cff00a734d40
SHA25680b8c067b6206d0c8fcce24c6bae0dec31fa6f83ff8ee3e6a3c2461b6fd0cdbe
SHA5122c19fcf32bd37b417f69d366750e86b3d262eb89968b93d03f6c162484452fc9c33219b78897c58bcc2097db3a32443d635f26641d23386bfb9c7b10f3fba51b