Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2024 15:22
Static task
static1
General
-
Target
6dcb800d284badead6d660ddbcdebec96c5c9c60f376c0e39a8e9763a6e9badb.exe
-
Size
7.2MB
-
MD5
af23a2c9a9ad9d6a279a0735664a5f8d
-
SHA1
b4db7c70d15e1b29d00c186ff2a699ff17df100a
-
SHA256
6dcb800d284badead6d660ddbcdebec96c5c9c60f376c0e39a8e9763a6e9badb
-
SHA512
967c881e76659d248cc6961466c663ee899220afe6fa40b01cd76add9e6f21df07ffd90ae715d73251dc397f95120e3880fc0ee2ced7263f737a96f642c42eb2
-
SSDEEP
196608:oM9Ita/0NSJ2dvQcMjUyZc5nEg36vmTBoc6e:QN8UQcQUimnH36vgn
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Cryptbot family
-
Detects CryptBot payload 1 IoCs
CryptBot is a C++ stealer distributed widely in bundle with other software.
resource yara_rule behavioral1/memory/3712-1026-0x0000000069CC0000-0x000000006A71B000-memory.dmp family_cryptbot_v3 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4r508d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4r508d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4r508d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4r508d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 0caa907b23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 0caa907b23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 0caa907b23.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4r508d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 0caa907b23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 0caa907b23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4r508d.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0caa907b23.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1i68t5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ddc137e745.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4r508d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2c6185.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3g59G.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a2c779547c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 21193784f7.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 11 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 3364 chrome.exe 7048 chrome.exe 7040 chrome.exe 2832 msedge.exe 3220 msedge.exe 6432 chrome.exe 5024 chrome.exe 1996 chrome.exe 1940 chrome.exe 2992 chrome.exe 1680 msedge.exe -
Checks BIOS information in registry 2 TTPs 22 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1i68t5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2c6185.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a2c779547c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ddc137e745.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a2c779547c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 21193784f7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0caa907b23.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0caa907b23.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3g59G.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3g59G.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1i68t5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2c6185.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 21193784f7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ddc137e745.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4r508d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4r508d.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 1i68t5.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation a2c779547c.exe -
Executes dropped EXE 16 IoCs
pid Process 4408 d4C49.exe 2944 c2x22.exe 1728 1i68t5.exe 3136 skotes.exe 2848 2c6185.exe 4992 3g59G.exe 3712 a2c779547c.exe 2132 21193784f7.exe 5004 ddc137e745.exe 3628 4r508d.exe 376 ec8c2c4c1c.exe 5328 skotes.exe 6160 0caa907b23.exe 4816 service123.exe 6344 skotes.exe 2088 service123.exe -
Identifies Wine through registry keys 2 TTPs 11 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 1i68t5.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 2c6185.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 3g59G.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 21193784f7.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine a2c779547c.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine ddc137e745.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 4r508d.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 0caa907b23.exe -
Loads dropped DLL 2 IoCs
pid Process 4816 service123.exe 2088 service123.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4r508d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4r508d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 0caa907b23.exe -
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" c2x22.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\21193784f7.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008785001\\21193784f7.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ddc137e745.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008786001\\ddc137e745.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ec8c2c4c1c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008787001\\ec8c2c4c1c.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\0caa907b23.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008788001\\0caa907b23.exe" skotes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6dcb800d284badead6d660ddbcdebec96c5c9c60f376c0e39a8e9763a6e9badb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" d4C49.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0007000000023cc7-257.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
pid Process 1728 1i68t5.exe 3136 skotes.exe 2848 2c6185.exe 4992 3g59G.exe 3712 a2c779547c.exe 2132 21193784f7.exe 5004 ddc137e745.exe 3628 4r508d.exe 5328 skotes.exe 6160 0caa907b23.exe 6344 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1i68t5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 4896 4992 WerFault.exe 92 7080 3712 WerFault.exe 104 -
System Location Discovery: System Language Discovery 1 TTPs 20 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c2x22.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2c6185.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a2c779547c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1i68t5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 21193784f7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddc137e745.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4r508d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ec8c2c4c1c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6dcb800d284badead6d660ddbcdebec96c5c9c60f376c0e39a8e9763a6e9badb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d4C49.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3g59G.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0caa907b23.exe -
Checks processor information in registry 2 TTPs 15 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3g59G.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString a2c779547c.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3g59G.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 a2c779547c.exe -
Enumerates system info in registry 2 TTPs 11 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Kills process with taskkill 5 IoCs
pid Process 4180 taskkill.exe 3492 taskkill.exe 2624 taskkill.exe 2528 taskkill.exe 4280 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133769353608891586" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 6624 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 56 IoCs
pid Process 1728 1i68t5.exe 1728 1i68t5.exe 3136 skotes.exe 3136 skotes.exe 2848 2c6185.exe 2848 2c6185.exe 4992 3g59G.exe 4992 3g59G.exe 4992 3g59G.exe 4992 3g59G.exe 4992 3g59G.exe 4992 3g59G.exe 3364 chrome.exe 3364 chrome.exe 3712 a2c779547c.exe 3712 a2c779547c.exe 2132 21193784f7.exe 2132 21193784f7.exe 4992 3g59G.exe 4992 3g59G.exe 4992 3g59G.exe 4992 3g59G.exe 4248 msedge.exe 4248 msedge.exe 1680 msedge.exe 1680 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 5004 ddc137e745.exe 5004 ddc137e745.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 3628 4r508d.exe 3628 4r508d.exe 376 ec8c2c4c1c.exe 376 ec8c2c4c1c.exe 3628 4r508d.exe 3628 4r508d.exe 3628 4r508d.exe 376 ec8c2c4c1c.exe 376 ec8c2c4c1c.exe 5328 skotes.exe 5328 skotes.exe 6160 0caa907b23.exe 6160 0caa907b23.exe 6160 0caa907b23.exe 6160 0caa907b23.exe 6160 0caa907b23.exe 6432 chrome.exe 6432 chrome.exe 6344 skotes.exe 6344 skotes.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 1680 msedge.exe 1680 msedge.exe 6432 chrome.exe 6432 chrome.exe 6432 chrome.exe -
Suspicious use of AdjustPrivilegeToken 27 IoCs
description pid Process Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeDebugPrivilege 2528 taskkill.exe Token: SeDebugPrivilege 4280 taskkill.exe Token: SeDebugPrivilege 3628 4r508d.exe Token: SeDebugPrivilege 4180 taskkill.exe Token: SeDebugPrivilege 3492 taskkill.exe Token: SeDebugPrivilege 2624 taskkill.exe Token: SeDebugPrivilege 4900 firefox.exe Token: SeDebugPrivilege 4900 firefox.exe Token: SeDebugPrivilege 6160 0caa907b23.exe Token: SeShutdownPrivilege 6432 chrome.exe Token: SeCreatePagefilePrivilege 6432 chrome.exe Token: SeShutdownPrivilege 6432 chrome.exe Token: SeCreatePagefilePrivilege 6432 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1728 1i68t5.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 1680 msedge.exe 376 ec8c2c4c1c.exe 376 ec8c2c4c1c.exe 376 ec8c2c4c1c.exe 376 ec8c2c4c1c.exe 376 ec8c2c4c1c.exe 376 ec8c2c4c1c.exe 376 ec8c2c4c1c.exe 376 ec8c2c4c1c.exe 4900 firefox.exe 4900 firefox.exe 4900 firefox.exe 4900 firefox.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 376 ec8c2c4c1c.exe 376 ec8c2c4c1c.exe 376 ec8c2c4c1c.exe 376 ec8c2c4c1c.exe 376 ec8c2c4c1c.exe 376 ec8c2c4c1c.exe 376 ec8c2c4c1c.exe 376 ec8c2c4c1c.exe 4900 firefox.exe 4900 firefox.exe 4900 firefox.exe 4900 firefox.exe 4900 firefox.exe 4900 firefox.exe 4900 firefox.exe 4900 firefox.exe 4900 firefox.exe 4900 firefox.exe 4900 firefox.exe 4900 firefox.exe 4900 firefox.exe 4900 firefox.exe 4900 firefox.exe 4900 firefox.exe 4900 firefox.exe 4900 firefox.exe 4900 firefox.exe 4900 firefox.exe 376 ec8c2c4c1c.exe 376 ec8c2c4c1c.exe 376 ec8c2c4c1c.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4900 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3040 wrote to memory of 4408 3040 6dcb800d284badead6d660ddbcdebec96c5c9c60f376c0e39a8e9763a6e9badb.exe 83 PID 3040 wrote to memory of 4408 3040 6dcb800d284badead6d660ddbcdebec96c5c9c60f376c0e39a8e9763a6e9badb.exe 83 PID 3040 wrote to memory of 4408 3040 6dcb800d284badead6d660ddbcdebec96c5c9c60f376c0e39a8e9763a6e9badb.exe 83 PID 4408 wrote to memory of 2944 4408 d4C49.exe 84 PID 4408 wrote to memory of 2944 4408 d4C49.exe 84 PID 4408 wrote to memory of 2944 4408 d4C49.exe 84 PID 2944 wrote to memory of 1728 2944 c2x22.exe 85 PID 2944 wrote to memory of 1728 2944 c2x22.exe 85 PID 2944 wrote to memory of 1728 2944 c2x22.exe 85 PID 1728 wrote to memory of 3136 1728 1i68t5.exe 86 PID 1728 wrote to memory of 3136 1728 1i68t5.exe 86 PID 1728 wrote to memory of 3136 1728 1i68t5.exe 86 PID 2944 wrote to memory of 2848 2944 c2x22.exe 89 PID 2944 wrote to memory of 2848 2944 c2x22.exe 89 PID 2944 wrote to memory of 2848 2944 c2x22.exe 89 PID 4408 wrote to memory of 4992 4408 d4C49.exe 92 PID 4408 wrote to memory of 4992 4408 d4C49.exe 92 PID 4408 wrote to memory of 4992 4408 d4C49.exe 92 PID 4992 wrote to memory of 3364 4992 3g59G.exe 99 PID 4992 wrote to memory of 3364 4992 3g59G.exe 99 PID 3364 wrote to memory of 4412 3364 chrome.exe 100 PID 3364 wrote to memory of 4412 3364 chrome.exe 100 PID 3364 wrote to memory of 1432 3364 chrome.exe 101 PID 3364 wrote to memory of 1432 3364 chrome.exe 101 PID 3364 wrote to memory of 1432 3364 chrome.exe 101 PID 3364 wrote to memory of 1432 3364 chrome.exe 101 PID 3364 wrote to memory of 1432 3364 chrome.exe 101 PID 3364 wrote to memory of 1432 3364 chrome.exe 101 PID 3364 wrote to memory of 1432 3364 chrome.exe 101 PID 3364 wrote to memory of 1432 3364 chrome.exe 101 PID 3364 wrote to memory of 1432 3364 chrome.exe 101 PID 3364 wrote to memory of 1432 3364 chrome.exe 101 PID 3364 wrote to memory of 1432 3364 chrome.exe 101 PID 3364 wrote to memory of 1432 3364 chrome.exe 101 PID 3364 wrote to memory of 1432 3364 chrome.exe 101 PID 3364 wrote to memory of 1432 3364 chrome.exe 101 PID 3364 wrote to memory of 1432 3364 chrome.exe 101 PID 3364 wrote to memory of 1432 3364 chrome.exe 101 PID 3364 wrote to memory of 1432 3364 chrome.exe 101 PID 3364 wrote to memory of 1432 3364 chrome.exe 101 PID 3364 wrote to memory of 1432 3364 chrome.exe 101 PID 3364 wrote to memory of 1432 3364 chrome.exe 101 PID 3364 wrote to memory of 1432 3364 chrome.exe 101 PID 3364 wrote to memory of 1432 3364 chrome.exe 101 PID 3364 wrote to memory of 1432 3364 chrome.exe 101 PID 3364 wrote to memory of 1432 3364 chrome.exe 101 PID 3364 wrote to memory of 1432 3364 chrome.exe 101 PID 3364 wrote to memory of 1432 3364 chrome.exe 101 PID 3364 wrote to memory of 1432 3364 chrome.exe 101 PID 3364 wrote to memory of 1432 3364 chrome.exe 101 PID 3364 wrote to memory of 1432 3364 chrome.exe 101 PID 3364 wrote to memory of 1432 3364 chrome.exe 101 PID 3364 wrote to memory of 5108 3364 chrome.exe 102 PID 3364 wrote to memory of 5108 3364 chrome.exe 102 PID 3364 wrote to memory of 1428 3364 chrome.exe 103 PID 3364 wrote to memory of 1428 3364 chrome.exe 103 PID 3364 wrote to memory of 1428 3364 chrome.exe 103 PID 3364 wrote to memory of 1428 3364 chrome.exe 103 PID 3364 wrote to memory of 1428 3364 chrome.exe 103 PID 3364 wrote to memory of 1428 3364 chrome.exe 103 PID 3364 wrote to memory of 1428 3364 chrome.exe 103 PID 3364 wrote to memory of 1428 3364 chrome.exe 103 PID 3364 wrote to memory of 1428 3364 chrome.exe 103 PID 3364 wrote to memory of 1428 3364 chrome.exe 103 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\6dcb800d284badead6d660ddbcdebec96c5c9c60f376c0e39a8e9763a6e9badb.exe"C:\Users\Admin\AppData\Local\Temp\6dcb800d284badead6d660ddbcdebec96c5c9c60f376c0e39a8e9763a6e9badb.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d4C49.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d4C49.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c2x22.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c2x22.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1i68t5.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1i68t5.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3136 -
C:\Users\Admin\AppData\Local\Temp\1008780001\a2c779547c.exe"C:\Users\Admin\AppData\Local\Temp\1008780001\a2c779547c.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:3712 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"7⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
PID:6432 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x160,0x164,0x168,0x13c,0x16c,0x7ffc27becc40,0x7ffc27becc4c,0x7ffc27becc588⤵PID:6448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1996,i,8922972841386699057,12870913973254456323,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1988 /prefetch:28⤵PID:6628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1900,i,8922972841386699057,12870913973254456323,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2104 /prefetch:38⤵PID:6640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2308,i,8922972841386699057,12870913973254456323,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2516 /prefetch:88⤵PID:6692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3204,i,8922972841386699057,12870913973254456323,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3216 /prefetch:18⤵
- Uses browser remote debugging
PID:7040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3236,i,8922972841386699057,12870913973254456323,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3264 /prefetch:18⤵
- Uses browser remote debugging
PID:7048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4500,i,8922972841386699057,12870913973254456323,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4576 /prefetch:18⤵
- Uses browser remote debugging
PID:5024
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4816
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:6624
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3712 -s 19287⤵
- Program crash
PID:7080
-
-
-
C:\Users\Admin\AppData\Local\Temp\1008785001\21193784f7.exe"C:\Users\Admin\AppData\Local\Temp\1008785001\21193784f7.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2132
-
-
C:\Users\Admin\AppData\Local\Temp\1008786001\ddc137e745.exe"C:\Users\Admin\AppData\Local\Temp\1008786001\ddc137e745.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5004
-
-
C:\Users\Admin\AppData\Local\Temp\1008787001\ec8c2c4c1c.exe"C:\Users\Admin\AppData\Local\Temp\1008787001\ec8c2c4c1c.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:376 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2528
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4280
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4180
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3492
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2624
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵PID:2224
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4900 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2012 -parentBuildID 20240401114208 -prefsHandle 1952 -prefMapHandle 1944 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {3c9b709c-295b-4fc6-9088-b8e605c1340d} 4900 "\\.\pipe\gecko-crash-server-pipe.4900" gpu9⤵PID:860
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2472 -parentBuildID 20240401114208 -prefsHandle 2464 -prefMapHandle 2460 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b7f55304-f4d4-412a-ad44-f5e4c0d468b6} 4900 "\\.\pipe\gecko-crash-server-pipe.4900" socket9⤵PID:4584
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3344 -childID 1 -isForBrowser -prefsHandle 3056 -prefMapHandle 3324 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1116 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3bef9232-427e-4c14-a38d-ff715106d460} 4900 "\\.\pipe\gecko-crash-server-pipe.4900" tab9⤵PID:684
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4016 -childID 2 -isForBrowser -prefsHandle 4008 -prefMapHandle 2796 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1116 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {79285083-e334-4b27-a1dd-b115d259d360} 4900 "\\.\pipe\gecko-crash-server-pipe.4900" tab9⤵PID:3024
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4808 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4800 -prefMapHandle 4776 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b6ce95c3-f1fb-4f49-b493-0fb3c70737d6} 4900 "\\.\pipe\gecko-crash-server-pipe.4900" utility9⤵
- Checks processor information in registry
PID:6760
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5300 -childID 3 -isForBrowser -prefsHandle 5308 -prefMapHandle 5292 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1116 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a887e987-7095-4fe0-ba6d-b4b79a2c6c73} 4900 "\\.\pipe\gecko-crash-server-pipe.4900" tab9⤵PID:5556
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5476 -childID 4 -isForBrowser -prefsHandle 5616 -prefMapHandle 5620 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1116 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d5bf9c75-8768-421e-b823-6ee769c188bd} 4900 "\\.\pipe\gecko-crash-server-pipe.4900" tab9⤵PID:5584
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5464 -childID 5 -isForBrowser -prefsHandle 5812 -prefMapHandle 5816 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1116 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b42de597-24e6-4c0c-88e4-e3e6abd177c5} 4900 "\\.\pipe\gecko-crash-server-pipe.4900" tab9⤵PID:5624
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1008788001\0caa907b23.exe"C:\Users\Admin\AppData\Local\Temp\1008788001\0caa907b23.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6160
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2c6185.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2c6185.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2848
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3g59G.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3g59G.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x160,0x164,0x168,0x13c,0x16c,0x7ffc194dcc40,0x7ffc194dcc4c,0x7ffc194dcc585⤵PID:4412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1816,i,93423315802445213,8396701478784778056,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1824 /prefetch:25⤵PID:1432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1876,i,93423315802445213,8396701478784778056,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1896 /prefetch:35⤵PID:5108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2272,i,93423315802445213,8396701478784778056,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2288 /prefetch:85⤵PID:1428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3160,i,93423315802445213,8396701478784778056,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3192 /prefetch:15⤵
- Uses browser remote debugging
PID:1940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3200,i,93423315802445213,8396701478784778056,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3224 /prefetch:15⤵
- Uses browser remote debugging
PID:1996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4456,i,93423315802445213,8396701478784778056,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4488 /prefetch:15⤵
- Uses browser remote debugging
PID:2992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4820,i,93423315802445213,8396701478784778056,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4832 /prefetch:85⤵PID:2500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5004,i,93423315802445213,8396701478784778056,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5016 /prefetch:85⤵PID:1408
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:1680 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7ffc194e46f8,0x7ffc194e4708,0x7ffc194e47185⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:2316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,10768846400994074318,12690464439819829780,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:25⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,10768846400994074318,12690464439819829780,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:4248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,10768846400994074318,12690464439819829780,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2604 /prefetch:85⤵PID:4852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,10768846400994074318,12690464439819829780,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2572 /prefetch:25⤵PID:4676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,10768846400994074318,12690464439819829780,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3196 /prefetch:25⤵PID:2644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2132,10768846400994074318,12690464439819829780,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:15⤵
- Uses browser remote debugging
PID:3220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2132,10768846400994074318,12690464439819829780,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3428 /prefetch:15⤵
- Uses browser remote debugging
PID:2832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,10768846400994074318,12690464439819829780,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3192 /prefetch:25⤵PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,10768846400994074318,12690464439819829780,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2340 /prefetch:25⤵PID:4376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,10768846400994074318,12690464439819829780,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2532 /prefetch:25⤵PID:2976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,10768846400994074318,12690464439819829780,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=3120 /prefetch:25⤵PID:1500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,10768846400994074318,12690464439819829780,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=4044 /prefetch:25⤵PID:1416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,10768846400994074318,12690464439819829780,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=3216 /prefetch:25⤵PID:1432
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 21284⤵
- Program crash
PID:4896
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4r508d.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4r508d.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3628
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4936
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4992 -ip 49921⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5328
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3712 -ip 37121⤵PID:7024
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6344
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2088
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40B
MD5800547b40b40a6d57a70b74809b450fa
SHA1310a064c7ba82120f80af50892dcbe61b53f9d70
SHA256a562ff4b14badc73b0804883bf4ccfd9972e485123de5e5949981794f66ed936
SHA51239630e3b5069d0c66ea44069358cf01f180bf25103968f77d483a27deb7e91e796a1718ce9af2f438bebe8207537e735cd402d649e2adfa2ca7748faae2db949
-
Filesize
649B
MD5c8bba45d36a545448042fcf9481a0d3c
SHA12720683befcd871890581c86b3c8857e3c61f806
SHA256f75fecb325dccf1e2514b01e43e84279212525f043205dc180d284c879c7601d
SHA512895dae25b740f260c0ffdb2a4ccee328c38f4359bb253aa3b407b0715114215499fb8fffe1c2c8b6ec967fa7524d8279f7b286dd83023a04f1894de9b029ca47
-
Filesize
44KB
MD5479a1d23ad9aabb8148ca1cb14f301c0
SHA11e818a199dc68e8941b7489676bbe08fca65fae0
SHA2561206a1566a37fdc60063f74f4f38e008879d2cad1d5e7f362c331965472c129d
SHA51225d5556887274824663d8316c1750073f49cbbc029a3c4a0c6d02db4b081502369bbbe6a189953582f133022d39781b91426afe9bfd0c952211a0355981b6350
-
Filesize
264KB
MD5437e50108df40b5683c875659e01a9e0
SHA12ea0db0a091f52db5e5012252f39f83ffa0df6f7
SHA256b8afcfde852853e10315a6349fa2a275d78430ba12e0daa024bcdd33d8c09350
SHA5120919852e742679db4fc5ffb2045ebb2d2323c2f2b99e806cb4afbc951e13bae21f4419154ba6298ba066870cdb6f67df059e22e38059ec5e540d6aaf9e9e2c3d
-
Filesize
4.0MB
MD5ca63cc47ed3a261abd50645e54ecf9e3
SHA10488cc29c20b5868da65e5e089bad8b46b1c5b7b
SHA256b947ed6eaf31c435ddc6e664e9859ffa7a7d4d7462447691fa5089b9b9d3ffef
SHA512630055d485736fd79e8640cf2ca6be670b4f312ca9f2c6ca4fc72ca721f05735b2957e36c57d811e7d7aa8f7afd86fbf3c062eb81c980b86cd66588e21045fe3
-
Filesize
317B
MD554b24a0fe2d54a6a638b476f8856e37a
SHA1799c14c7691f72c068896706aea601e734be7fcc
SHA256f588d1599661aa8f582dc6acd173e23e4fa4ab0cdb16b3c4f4317cbabe2316a9
SHA5123119c06229d088b1a58da331f8b48141050836fb6efa9205c8d8fae13acfca5c0d519fab4090007ae311c756d8dffc05c53112f7acde0a331cf9857a4b261ae6
-
Filesize
329B
MD5405252443c1bb757efc63677d0e791f0
SHA14844b98340cd2c2e3e367f461fd499018452dd0a
SHA25660afd9936898b8c051cd1c324154a666e476bdc1786cb857a4e33aa0f8f620ef
SHA512624b1f2baed8f9d440e0e52af956021b6f207c72d17f6cc7bda3612fcf084196e709bdc54190931d567fb7ab2dad59d1f156eb532014c536b1c13b06ac8feab8
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
336B
MD5fee147937d2377ad039c157e9e481316
SHA18917012438d459ccdb2d4eb387348f5a8ec8b540
SHA256d6f4c233c833bd852059c281eb92c51dbfb881e71325d005f66c9d27933d0ba2
SHA512c52df31111609c4a2a154527f8ada6384e6a3d3df1a9f9b4afb1d28dc0a3addc46455f42f53116698e35c4d2d68d0c2d40e1368b152c0e0760257500a76709c3
-
Filesize
308B
MD54e7982b86b3d7d916b7722aa3b3f0669
SHA1ce4e874903cb71d9012cc7654ca7a6ba5e4f7efd
SHA256cbee1100a2c9add47776b7e416b58a809f6feb9fe458bef8185b0c176b5db340
SHA512c4dda8b36e90a327061dab901730f47fc23cca129b02a157f1ed0c566a1d6dddf272a4e74d3acbf14eb3a7fac0820387a584db9e19ca299724ed7f3030f891bb
-
Filesize
317B
MD5d529619c41422ec25c3f1b639c2c97f0
SHA185052f5a345c9ae9d704a9d44b52da7a5cf2a62a
SHA25632178e86dcf8a05cb56d551bc33111207240c2d36cc6a667d901724d22af6a61
SHA512d421f06f6b6138d4d275606f6715ddafa264d1c337ea061b70a63bbbba441b91ecf297c66093aa0f6d93acba4dc170e2fa966bc62004608f33231d3ffc6a37e3
-
Filesize
348B
MD56a930a846b40f014bd85084a0c9cae31
SHA15becf52e5ae84acbbe648b07e731bcd7dce7d74c
SHA25674a105f13b25b22e69ae34659fd8523b85101459ff2d46cffa421d3dac2d16ed
SHA512e06a81b7993a16076bba2e772a8e3b73b98e7a2181b8288147ed9820a3b979d0aa7811fe9acc9943020954edec8a476834a02daa5724f7cd4021d474585e1529
-
Filesize
321B
MD51001adf5bcae0f1614cfb32c537c1ea1
SHA17a5520afce51a1aea015a783395625ebebd27fd9
SHA256dca5ad47b858e7906b7e48cc7479e5542f1c778f5965c6ec4c4347b8b8f9731c
SHA5120289f3a9dd674e556103584ba8dae48aa2fee46c5502a3ec86ea4c5e6f05ff429070d04a75226231979aeac596d1001256050a3a55fffd8b84a19b4968e0d8b4
-
Filesize
8KB
MD521b3488d36a975e20eb8c6205bb0af7d
SHA105bf2022f81c4ff9a11524fd94ef884dbcc74684
SHA2560b0142df164ba5e64fa1766c497b0985cec95eb6576036a7c114eddc21388a10
SHA5127c4724c5f2c91f817cbd856fc30aab35b9ed56e68a86f052a9e08c5b528944c19dbac714a0b7c776a898edf532429a4e61dbb34dce04a26303e399ab9d0dd595
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\cd5863ef-1f99-4bcc-87c0-7d05611599d4.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
18KB
MD5334cc54075c690fb39704098b00bfba9
SHA14ba1d554aa7cbb9fa37b5de69dcbe090ad00b967
SHA25683a75cf23ecef7af43b11cfc494991cb140185e521558ef2fc7d5e251f003c9a
SHA51259f1e844831bd2817c520506c8971b54f691a353b9330345426b53c1b27371a8558635db3324f04ecd37acf6422d76f7440bb576b39cf022fe9d9b521c583a75
-
Filesize
317B
MD5ede0408cad9d45447bbf629bd00c946c
SHA173902aa37f110d5ad38d328abb1fe68b842ebb99
SHA256e6f6a0fa3f73004235109e107619dd2169536a5d50834788eda4b004ff3f8e7f
SHA512ca1a5cf4915b6ab0894dc4574ae0c9ede2aa048df1af793926c7cd18de6515bc045f59635164f79ecff3ad159e6a7050e35376d13e1df3716e85778344f338f2
-
Filesize
1KB
MD55d4170fc4610647c9841057aa0e7102d
SHA1517090b546695c52b79fa9af0c29d85c6dfebda8
SHA256d005782c29b049ed6c52e95c70c873d491297e6ee36b2a269b162099f80f5e09
SHA5129b83aca1983d2c329b9b894d3e5378fb1e674b2d8f1b97b25edc9c4fc993d1bb087434d9dd0522f05726d1c9d57024fe25391ddcbb5ae90cc7d735aeaf0ccd2e
-
Filesize
335B
MD574a9b99a6ac4efcb513e42f103ddf093
SHA16a34328e0029319c939f2c99d069e2f18f5377f1
SHA256fce7bcfd068e6d4093a08d78fdc9132c5fe28bd30ee551242c52e23ed9ed4065
SHA512f61cd6f0887ce0132d687345cb32273e1c4bd9a6f88d063d4dcea5cb13dbe2cab9d2ff0cf7a917cee20af7fba03340e4d36edb4bb273695941bf326ca48e75cb
-
Filesize
44KB
MD55b34c50618e3ecb40d2c7a4179557fd9
SHA1ad2a19c40924255f520d8a31b046cdbb8e8e689a
SHA256acca5ed6078ddc7f9ce9af0d7e900f31e40b6e3b68f0df6f4153322c6b62957c
SHA51205e347a372ae3567f609e735a54354c18781aeaccd5a70c15162c75042d47c1baa46e5f8e82b155cdec5f4721d7c4acaac4a3217a5772a238366fc3038eb61e5
-
Filesize
264KB
MD5141f45933c4d4bcc4a2dff1fac5c6033
SHA19552eb2e4d695cc621322c0fae5fa0070f7a352d
SHA256f0b904f99ea8cfd75e6a52f8725e8b81d418c138531d4575124f949c81be1e8a
SHA512e55254a4f3bbc184eb23f4e7d14a601b6790d4ff543bd7427f0289e16bb7ac3dbaefdd05d2be465990855edbd75a6bf7404c45a0939a285a854ceac924eaaf6f
-
Filesize
4.0MB
MD57c1545467327ab65586d2e406af287b3
SHA15fa1cfa59e3a94f500adb32cf2694fae117ca263
SHA256446a82751fd132a1842063595857afc774f0055350ae74076c8f31722d5dd650
SHA512f9a47a34c74bad3cba1e106fbe812620a25177ce4720dbebc10132645abedc6fc6fe43f6976225ead305bb9236365f846edf9270eed69e8570b809ecb63df377
-
Filesize
14B
MD5ef48733031b712ca7027624fff3ab208
SHA1da4f3812e6afc4b90d2185f4709dfbb6b47714fa
SHA256c9ce8dbbe51a4131073db3d6ceef1e11eaca6308ad88a86125f221102d2cee99
SHA512ce3a5a429e3796977a8019f47806b8c0671b597ead642fcbfbe3144e2b8112d35a9f2250896b7f215d237d0d19c5966caf3fe674165a6d50e14cb2b88c892029
-
Filesize
86B
MD5f732dbed9289177d15e236d0f8f2ddd3
SHA153f822af51b014bc3d4b575865d9c3ef0e4debde
SHA2562741df9ee9e9d9883397078f94480e9bc1d9c76996eec5cfe4e77929337cbe93
SHA512b64e5021f32e26c752fcba15a139815894309b25644e74ceca46a9aa97070bca3b77ded569a9bfd694193d035ba75b61a8d6262c8e6d5c4d76b452b38f5150a4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\e8977d0d-2f25-4519-9927-8e03eecae8e1.dmp
Filesize10.5MB
MD592d6d1c421294660e3915e44fac6e779
SHA1b421575dd02bd2b8bbdd05af6547c97a56166948
SHA2563da9e4b5a95836b60aaf771be92b090c6465113cb1145e1ac551a42651d47aba
SHA512cd1bfbd376226e5c3dad601b9a046f7c758186a72f3948b905b34892727884fef83e3a8ef42c50fa0194e5e03c7947fbf903c166b8ba016f54340295ec446d36
-
Filesize
152B
MD537f660dd4b6ddf23bc37f5c823d1c33a
SHA11c35538aa307a3e09d15519df6ace99674ae428b
SHA2564e2510a1d5a50a94fe4ce0f74932ab780758a8cbdc6d176a9ce8ab92309f26f8
SHA512807b8b8dc9109b6f78fc63655450bf12b9a006ff63e8f29ade8899d45fdf4a6c068c5c46a3efbc4232b9e1e35d6494f00ded5cdb3e235c8a25023bfbd823992d
-
Filesize
152B
MD5d7cb450b1315c63b1d5d89d98ba22da5
SHA1694005cd9e1a4c54e0b83d0598a8a0c089df1556
SHA25638355fd694faf1223518e40bac1996bdceaf44191214b0a23c4334d5fb07d031
SHA512df04d4f4b77bae447a940b28aeac345b21b299d8d26e28ecbb3c1c9e9a0e07c551e412d545c7dbb147a92c12bad7ae49ac35af021c34b88e2c6c5f7a0b65f6a8
-
Filesize
5KB
MD5b2eeb3aceb4feb787e4ec11e60a9a75d
SHA14eab8764741912e3bc56507015d33bcb04c83aa9
SHA256dad62db40ab62823bbb28d627aa9c0674734aeed70a0fea1533f7154ed0128da
SHA51296b9bb182d7467f680ddcfd34293e559b9ed588a81cb1e5e6889197eb6ae4a35e2464d1fe699c8cbc50be884162854a677d0dc1caadb1354345d39da2fe15d10
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\activity-stream.discovery_stream.json.tmp
Filesize25KB
MD5149b11449482e8b0d48883df36cb6f71
SHA1a74087820ee7681509f0b9974fa02d1def56a507
SHA256b9cf4bb8590174b28b6b63e1ef018a5727ad1a56f9715d7d0d205bcb06337e3c
SHA5120e76afb25724f8ebfd9cb53d024ea2df06af84eef199cce002debd9549eea05905b70ef15ea5a5a9df49f0d50251febd0d84dbd6ccea0f9dc544fab16cbc7378
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD59d15f4fc721e95a1ecca1d28e4ca6679
SHA14f9d2b58a5ebbea46d0020ebf9e3311464172f14
SHA256bf517814d9ec2ca760caffff1f2f35b0dc93c8146bae5823192f84ccb43e9d7b
SHA512405cc8a6a018f853a11ea071be00d315b1df4502eb127bd9d95b8ee5368c19120f8589d1c9feb19b42b402d20dd7f97fa09adf7cf4fd3e283dc7b8a03795719f
-
Filesize
4.2MB
MD5ccfe9bcb47d17daa52ad54c47bcd5385
SHA1f272d7519e728efe636f85126fed21d541125d11
SHA256b4d038b967536bb78113868b0819e5ae63d1a3f536d8a6c900cc80f1c541c0fc
SHA5128026d45c70084433e241b8db8eecadc8872692cec8358a6336eeda25ac728fa637237ceb6e89a05067785985ee329685d0428ea589a41e1a7d1661b01a925220
-
Filesize
1.8MB
MD5f07c7bf3fbb7f742a4a362f9eefb6899
SHA14f31c4085872a05fdb7695e6ad91d943d30a5550
SHA2561f14193237a928d994bbcfa0d18a9e918ac640f89acbf6f7edaa2072a241f191
SHA512af4070174dff46f3e3b3bd3c3340e0e31df65efd3c9fa50d4512c657ec312eb0035b841ab810cf5a7e55f0d4f82b8d03d398da85637c1609eaf2424bdfba1915
-
Filesize
1.7MB
MD5aa243ef1bdfdcb20fd32d145b3d27813
SHA149dbda343ca429d7831aada6a481b2c500c3a589
SHA256669a254bff31d40ec0bdc035455c88d9a28401641daba531f6ee922bdf1b7aac
SHA5127254f6cc2e9d7ceecb2deb83757779611cf145a2aaa924178d80948c4843c5dc4bf4e48b7e8533937f7aebb618f4f975b0a3018962c34c58c8c407a1e1730bd0
-
Filesize
901KB
MD5ae0f6fdf04622d10f01de468342f6baf
SHA135c2a64ccde1119e9fa9b80e3c6cf4a31662667a
SHA2563b88389e8f6cde01224b045939807c73898122b2e3899f9ab8f5cc0b271da1c2
SHA512a80b458a9133c2c87f3a1c7789256379c94d54792f99ca8ec8966c331f61e18dc3d8aaf3640a0ae871c01ccce4595a1dababc503317626f425a3fd0ba375cb52
-
Filesize
2.7MB
MD5751950267471878ad06f2a12c93c07e3
SHA145f7c9efb573361211ca7f622728a4b2a0a47c08
SHA25664ed44f2f643f7a1704fe4a7ca30002b00df9929fa8c80a464757bdc44504e34
SHA5125f9777b7d91c52ea87ec2999306cda3bdb3eb55187e18c03fc9761559d1a12531f9c0914534ae76eb237c50da2c6bdc103f7133d990468ced7af9ed3800046e6
-
Filesize
2.7MB
MD50bb88754e164f3ce3853b0c2b823d140
SHA151c57bab308b0aa2c8477b2cd60803c19d98dd11
SHA2569f48b62e3ae09c545cd40e074a44d833bca136da8971dce12aad758272d5bf54
SHA51271f4cffd6dae155adc6e03a5cf38a8297eb15941a179ecebbcd99c0eb2a41385848d0599d32343031848effd041b80c6d454574ff6dd7ef333355948ab9db8d1
-
Filesize
5.6MB
MD5dc98e8a69778d3b4b850c77eecd4f313
SHA15b762c804c0d0e4135c6128b984777099c9731d0
SHA256eb70210c644f620e505f81059fa850ccc2675c33b0055d337734fdea95fb2690
SHA51258d798d2625519994929e4529d416911b190f087fcaa0ce89efcd2b868119810ce239ffdba60b1f16817c0d5b179b0b92b809b9cf66a8f66d358045ccb5881d5
-
Filesize
1.8MB
MD52f54862033f0c859845e063b0de4086b
SHA1448d12afa10f15b4ca1eaf57c8f88b30ae70608e
SHA256f5947732c4e7fa325ba0f68f616411a07a3f7a6f758ecf59eacda86398b7be20
SHA51209b7809d7bbfb501dee9dffd40aec7b7ecbc0dfb3386f19c9b50841a13a28aeeb85bea9e9a901ad8c8897acbb8434fdcfb65f1138609c281519eabe147d9c9df
-
Filesize
3.7MB
MD58c7dfc52ce618e5a3a75494146a5b0ba
SHA18ec2fc6008124e833111873c88c90d9f5ba3009c
SHA2566c507cb7aa6e3ae468726dbf44b57a8cfb21124ae4a86ad626f2ba4ed150bd74
SHA512dcc90e72c5bbddf575881f0814c33a01c931e73da3bcb45678dec2c7bf1f47d8fee01b4a1875028465f39594e9a73a33a2860075edb82348097d9c0e2fcde18a
-
Filesize
1.8MB
MD530de3639a385b3cf6fbed1ef19e9357a
SHA1c47a95429f09de6c357d44e84b37c8778901b488
SHA256fc542e068b1d0207551bcd08754abd76fdaa5de2f208e1ef412f621e89e7a278
SHA5121ee3abfdba1862e987b54d7f609844b28db4cde41737d0f11438657b559c6751bcbd955c98ca580c50dc5f4b31fd4d5ca35faee45343c9b5a27c3119db199ec1
-
Filesize
1.8MB
MD5fae56c725c998ae13c5c6fb651837bf1
SHA190b6075ae9573dc89e488b23de2755a7c74ec002
SHA256cb6908f88e13cc27772cb43d694881ccd8f5640533e018946b5a4d270a1b09ef
SHA512c3b09b5d384e40ca5228ceba66063cac119652b54b7da2801130c9033e26dcbe83a463c6fc4c6fc1a19aa1577113404815a427a29c2da9d867179cb7888c5638
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin
Filesize6KB
MD5d8c142588db2e1b5d9cc0926dafce122
SHA10d653bf65c7b77d9395ed9ee25025d9bfcbeca8a
SHA25677cbbc32990ceb144e8b79eab96a7cdd35225a2268db92095f20ab1b40f8d61e
SHA512a53cde62e437e347e0c47a517b0194477e810b8f5275d0684459f602a1c0ab3c6c5d307f35b82431e87056afae807c70e47f4959cb3a9632ffea4bc91d00f7d0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin
Filesize10KB
MD5c2ab1abd03767b79c1c700dc25b79e3f
SHA1aa5e5064e9c0d1fb572f7d2b2fbde78f7580d6ea
SHA256ee648148b0352cd8d02081c7651abbddf1a15b7994f95e4673aff3b5844abcc9
SHA5128514eb7c190c93d96ca23519d1c8addc7350f70b2492eb52cccbd994a58ba9101b31f96b32f3e7d48fcada0e87af95d97dc128a4177bb8cfba014c06c9357b95
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin
Filesize13KB
MD52ff392d5a66b28116b387b4b0b498754
SHA1a32ab12ea176096bd66fce7067551210d52287b4
SHA2565418610de14c38300e336f99d78d01c94dff00534768a479e81e507ac415602b
SHA5122dd5fe62bd71df7610d366869d387bd5fb25bb374faad2213b62bbe89c13cb693d9cd61fe7becb7ed1c195de56be3b370585eccbab8db48d772fb78459c3d198
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.bin
Filesize23KB
MD529534e4b42cf2968f1da6159f0f51b6e
SHA10918118e39623bb10467d04d851ea276eddbdaa8
SHA25617d4d20eecf54498a922c0e9526f0194cfae2bcd24bb5e2a5d998249fbbe2d76
SHA5121358fedc8e1531c5e472fca3c4ef8a58dd6c23af6a7f3a30b7f5142784ccaa5f78a2cbf833273ea2ab11841d090ea41a063632bf5ed9d507db12669729ec1b36
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.bin
Filesize15KB
MD577383cd67f8d59e7fdd2d6fc4f49ac53
SHA168badde518ca7ce5e09ad547bc86345d5c6a177d
SHA256b41946124fd00177998c89791d847625c4ebb1bf2e3888f2961399b6734763c1
SHA512233e4dadee0621791137cc4ef95eba57adf2ada194da2ff9609dd54120012b52b91fe17c642d358fce1622b34a88c244ff049c8eaa72723524424030bb91b8a3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.bin
Filesize5KB
MD5b04778cd4372d98324b4085085ca32e9
SHA17f006dc51a6f2fd269829ec434a8f6b0da4247fb
SHA256d7bc6f0ae405085905010f9b7c9a47982f68e25d1e24357b3f8094eaf0923e53
SHA5129d71820a8b2f674bbb9c07548ab2b4a07393245608bac1fdcf3d9ceabd53d314ec2fe1477b7cb94cea07ce7acfa780257f2bbc0b6daa5adfbb49ef77f16dbca4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.bin
Filesize15KB
MD51829e83891ebd039ee760940f4b60c71
SHA1c44781183ed6210cc2dfe9363ccd7db84674fab4
SHA256dcb9752030aca990c4da023e7564d505d14b4e4ff19ef1580c32a3d939d43005
SHA51234fa245b56c9c529fd2c079fb7210a304c7388c0d28d8c1dd1d0e2443a531e3cb12812b1e4ad794a69527a0a47b300eedd2aa8922e0d22e95a4d228ad1920b30
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD57f782b5c695a19e05e32459edcdf6e0f
SHA158331c464bc4eba65c862e18809dbdac3103a019
SHA256083fac40ec9faa0b84d0d94396ea7e2d20605ebeff752ee28aa8c1bb40e60ed9
SHA5120c5d89d24707adbe95b9e6ecc81f20e16ab280f5ba6402b7b7ccc573777da8deecd34c3b383694e5d5bdbf03eb179ac21d637437fbe654d17d528bcfc2e9badf
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD553933b168fba5a995d14afb9b07c7bdf
SHA1cc721c648529fb2b6fa9df49d927bb6e84a908c7
SHA2567f80168ad3fa165cdaa835f3e400dc784c54f384c3daba566d49cf4f49cbb650
SHA512a1ce461d7f583cb4d040891412dc79aa86a6f48d8cee8b08f6d293b47919c9b557c762c728f47f6b60b789bf280e633654656fbf883b4d55d991c1978cfe9701
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5982be7604246a29f6cff5a4c4b0911d7
SHA13c1b3bd10c109e4449ff85a4fd4de98ba9a9beb5
SHA256dc8899b551cd3803accba01a6d2c09ad98d7d4350ebb45fb85cbeeb83f09f576
SHA512ab46822692d952626b6e9e37e49a153e258a9b048a0564942c742832338468aa7a80ec5423b81a31c4b7f72c13c817de74bb704406d091a88a10834d0e391acf
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD57a1ce26331180731cd57de05efc2ef04
SHA1c70c40941ab8d337737564815bb5505919b65e86
SHA2568dc8205d98913956b5da472a2c8793b7ebf4eb70490fc9807ff8b874d7063415
SHA5128ab7f453d296c43bad5aead6753085b062fc7b0027fa10d045b8210d34ccfaa6535aaafd191821e9e52792650020ff37753b3932a80fd6720d77c64376f955d9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\3605c399-f24e-465b-aa4d-06f8c3fcd2be
Filesize671B
MD5e38a19c583f8b968a8878d605c01e7c9
SHA10d932268021f20b4ebdafdb3cf528abd2fc2e16c
SHA256f5a71bcafb2fbe6ec427cd9b8cb0238a9a9d6ce27d8621c412aa73d0feb6a433
SHA512bfd4f981c4e1a8ddca63bd116fe049ae5cff69af5efce3bac27b4b382b9b986590f82bae91427398aa8892ea603ca34774fd14c38e537b7dd992b7307b219f55
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\cbca5e09-f7b2-414b-a7c4-d4174f4212f5
Filesize26KB
MD5105a7032eb7b4788cddf4ba431dbd6b5
SHA158eb3ebe8706162908bd59c02ba0f5c1e07fc235
SHA256db47864eccea1142624954b631b806c1822894c9d77f22c84779e27cdc02d178
SHA5125f6668dad9d97fd104e5d33e96be099914cdaa6227c4c0a5eb2fd6c533baf10f580ec44c3760d829c089eace388029f63002ac876c2ee4af66efdf2a67ef5853
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\db367593-0b0e-473b-a027-96dda7450b13
Filesize982B
MD52a5e0c9de380304798c9fd243c036997
SHA181c5d5d3e9df6016b35eeccdd76e3841c45c4260
SHA25640e7e3c948430d61b86bd22104b0dc10f74f951156805510cf787af9fa41cdc9
SHA512a6acee7c3a03c98a845d077698cc8d673eb7f5c65ebccb5d2290d5de2b8c1644785f2918ccc3e8af6a25a5ec35b976c74f0a402fd6676049c66b2a02ae6eab06
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD5d5efe28a54bb180c31017283cebdacb6
SHA124d9c2dfb3c2b4644a781d452d997a81d6eacbb3
SHA2565161ba8073bcad8e04998076fedffc78d6fd9d8477838cf7f0b02339c5b2a60f
SHA512371b3cdfad62d757dbacd8c97b06aa8cfc86cfe2ee464e9f51fc6206d9eb10f4f8e954f4914e66636ee08d16ea34ca1442fccdfdc346afeb5a5e17f696385572
-
Filesize
11KB
MD565961c7aeb72bf02dd743ff07ef29269
SHA1667db13db5f25d4f3c29ca982a043621ab4a456f
SHA2568bc2a0c1cd6d5cdd1bace0f19da0b4ce361b2510b193817072f49a812f1f29ac
SHA512349b8e6a9fff739cccf71c65d7a88233bb5e97b06e3b58fd28da3087cb0d316c01aad79987c855b6b0f58f696525694d39e86ebbd58eb9cc14a03b0a62e1ede3
-
Filesize
15KB
MD5f77a346fb47dfcd322d4fddc82c24d74
SHA15b43675ee400bab383892c8780c39c31c01aedc0
SHA2563a6f73256cf355ab2797cb121670324f27b5a552253938400a89f2acfa6e85ab
SHA512e2311e3b272d91be7674de5997413df2284d5e9c71b48aa5459964845a0ff06c8fda96235c395181edac7ce80bd21411fcc2f40c0c1a88d2dc8456884233cf05
-
Filesize
10KB
MD5607e8d8b0eefb63439905eac6cdca768
SHA1a32c42f26022e2e75b6e0c5d3f48b47c7881e591
SHA256bb99d0ac0ba83275fecbab9bcf2de6a7b603cab8d4c991832026f783a4542e13
SHA5121429e431e82506b64edaf30b72fca387699ce3548a4a800e67011257d2775ae14dc3e154ddaf601ee913f9853bdd5473995edfd35caba609c564cb5528eafd6b