Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2024 07:47
Static task
static1
General
-
Target
9e17c7a53bf1fdd19eebd7e0ee9055ce5c30a5a5997abc3ba2e5d404c91ed915.exe
-
Size
7.0MB
-
MD5
3a1a64491c393ddb08139749c1b06b38
-
SHA1
1f1c4de5675f0e3905546ecb23c5b346dd190142
-
SHA256
9e17c7a53bf1fdd19eebd7e0ee9055ce5c30a5a5997abc3ba2e5d404c91ed915
-
SHA512
8afe8a4323b790d7ca803819895d65f150bacb45385983eb77816b0143ab027cda20a1f02bb5805167f37c975eea119b1af0dd076163cd5a104cfa8e37a31553
-
SSDEEP
196608:QlS0oLY3kTr+HsAd5FhV59FkDnMAyC32Ih1qpDmenc+rLO8MoRf:QlS03kTr+X3g7m84nc+3O8L
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Cryptbot family
-
Detects CryptBot payload 1 IoCs
CryptBot is a C++ stealer distributed widely in bundle with other software.
Processes:
resource yara_rule behavioral1/memory/5460-923-0x0000000069CC0000-0x000000006A71B000-memory.dmp family_cryptbot_v3 -
Processes:
4L367B.exeae2648351c.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4L367B.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4L367B.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4L367B.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" ae2648351c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" ae2648351c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" ae2648351c.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4L367B.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4L367B.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4L367B.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" ae2648351c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" ae2648351c.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 12 IoCs
Processes:
skotes.exe3y96L.exeae2648351c.exeskotes.exeskotes.exe1x98q1.exe2G9220.exe749b1bf35c.exe4L367B.exe609d351aab.exe68e1b587e4.exeskotes.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3y96L.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ae2648351c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1x98q1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2G9220.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 749b1bf35c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4L367B.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 609d351aab.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 68e1b587e4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
Processes:
chrome.exechrome.exechrome.exechrome.exepid Process 6520 chrome.exe 4432 chrome.exe 3872 chrome.exe 4984 chrome.exe -
Checks BIOS information in registry 2 TTPs 24 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
1x98q1.exeskotes.exe2G9220.exe609d351aab.exeskotes.exe68e1b587e4.exeskotes.exe3y96L.exe749b1bf35c.exeskotes.exe4L367B.exeae2648351c.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1x98q1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2G9220.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 609d351aab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 68e1b587e4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3y96L.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3y96L.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 749b1bf35c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 749b1bf35c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 609d351aab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2G9220.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4L367B.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4L367B.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ae2648351c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 68e1b587e4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1x98q1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ae2648351c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
1x98q1.exeskotes.exe68e1b587e4.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 1x98q1.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 68e1b587e4.exe -
Executes dropped EXE 17 IoCs
Processes:
Q7g89.exev0h43.exe1x98q1.exeskotes.exeskotes.exe2G9220.exe3y96L.exe749b1bf35c.exe4L367B.exe609d351aab.exeac3863390d.exeae2648351c.exe68e1b587e4.exeskotes.exeservice123.exeskotes.exeservice123.exepid Process 4392 Q7g89.exe 5068 v0h43.exe 2436 1x98q1.exe 5112 skotes.exe 552 skotes.exe 1092 2G9220.exe 4496 3y96L.exe 1676 749b1bf35c.exe 4072 4L367B.exe 452 609d351aab.exe 1372 ac3863390d.exe 4484 ae2648351c.exe 5460 68e1b587e4.exe 5776 skotes.exe 5872 service123.exe 6392 skotes.exe 6848 service123.exe -
Identifies Wine through registry keys 2 TTPs 12 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
skotes.exe1x98q1.exeskotes.exeskotes.exe4L367B.exeae2648351c.exeskotes.exe2G9220.exe3y96L.exe749b1bf35c.exe609d351aab.exe68e1b587e4.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 1x98q1.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 4L367B.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine ae2648351c.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 2G9220.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 3y96L.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 749b1bf35c.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 609d351aab.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 68e1b587e4.exe -
Loads dropped DLL 2 IoCs
Processes:
service123.exeservice123.exepid Process 5872 service123.exe 6848 service123.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
4L367B.exeae2648351c.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4L367B.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" ae2648351c.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4L367B.exe -
Adds Run key to start application 2 TTPs 7 IoCs
Processes:
skotes.exe9e17c7a53bf1fdd19eebd7e0ee9055ce5c30a5a5997abc3ba2e5d404c91ed915.exeQ7g89.exev0h43.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\609d351aab.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009234001\\609d351aab.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ac3863390d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009235001\\ac3863390d.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ae2648351c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009236001\\ae2648351c.exe" skotes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9e17c7a53bf1fdd19eebd7e0ee9055ce5c30a5a5997abc3ba2e5d404c91ed915.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Q7g89.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v0h43.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\749b1bf35c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009233001\\749b1bf35c.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral1/files/0x0008000000023c33-100.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
Processes:
1x98q1.exeskotes.exeskotes.exe2G9220.exe3y96L.exe749b1bf35c.exe4L367B.exe609d351aab.exeae2648351c.exe68e1b587e4.exeskotes.exeskotes.exepid Process 2436 1x98q1.exe 5112 skotes.exe 552 skotes.exe 1092 2G9220.exe 4496 3y96L.exe 1676 749b1bf35c.exe 4072 4L367B.exe 452 609d351aab.exe 4484 ae2648351c.exe 5460 68e1b587e4.exe 5776 skotes.exe 6392 skotes.exe -
Drops file in Windows directory 1 IoCs
Processes:
1x98q1.exedescription ioc Process File created C:\Windows\Tasks\skotes.job 1x98q1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 6040 5460 WerFault.exe 128 -
System Location Discovery: System Language Discovery 1 TTPs 20 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
609d351aab.exetaskkill.exeae2648351c.exeservice123.exe9e17c7a53bf1fdd19eebd7e0ee9055ce5c30a5a5997abc3ba2e5d404c91ed915.exeskotes.exe749b1bf35c.exetaskkill.exe68e1b587e4.exev0h43.exe1x98q1.exe3y96L.exe2G9220.exeac3863390d.exetaskkill.exetaskkill.exeschtasks.exeQ7g89.exe4L367B.exetaskkill.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 609d351aab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ae2648351c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9e17c7a53bf1fdd19eebd7e0ee9055ce5c30a5a5997abc3ba2e5d404c91ed915.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 749b1bf35c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 68e1b587e4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v0h43.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1x98q1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3y96L.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2G9220.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ac3863390d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Q7g89.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4L367B.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
68e1b587e4.exefirefox.exefirefox.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 68e1b587e4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 68e1b587e4.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 5 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid Process 2344 taskkill.exe 5068 taskkill.exe 4304 taskkill.exe 3664 taskkill.exe 3096 taskkill.exe -
Modifies registry class 1 IoCs
Processes:
firefox.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 35 IoCs
Processes:
1x98q1.exeskotes.exeskotes.exe2G9220.exe3y96L.exe749b1bf35c.exe4L367B.exe609d351aab.exeac3863390d.exeae2648351c.exe68e1b587e4.exechrome.exeskotes.exeskotes.exepid Process 2436 1x98q1.exe 2436 1x98q1.exe 5112 skotes.exe 5112 skotes.exe 552 skotes.exe 552 skotes.exe 1092 2G9220.exe 1092 2G9220.exe 4496 3y96L.exe 4496 3y96L.exe 1676 749b1bf35c.exe 1676 749b1bf35c.exe 4072 4L367B.exe 4072 4L367B.exe 452 609d351aab.exe 452 609d351aab.exe 4072 4L367B.exe 4072 4L367B.exe 1372 ac3863390d.exe 1372 ac3863390d.exe 4484 ae2648351c.exe 4484 ae2648351c.exe 1372 ac3863390d.exe 1372 ac3863390d.exe 4484 ae2648351c.exe 4484 ae2648351c.exe 4484 ae2648351c.exe 5460 68e1b587e4.exe 5460 68e1b587e4.exe 6520 chrome.exe 6520 chrome.exe 5776 skotes.exe 5776 skotes.exe 6392 skotes.exe 6392 skotes.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid Process 6520 chrome.exe 6520 chrome.exe 6520 chrome.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
Processes:
4L367B.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exefirefox.exeae2648351c.exechrome.exedescription pid Process Token: SeDebugPrivilege 4072 4L367B.exe Token: SeDebugPrivilege 3664 taskkill.exe Token: SeDebugPrivilege 3096 taskkill.exe Token: SeDebugPrivilege 2344 taskkill.exe Token: SeDebugPrivilege 5068 taskkill.exe Token: SeDebugPrivilege 4304 taskkill.exe Token: SeDebugPrivilege 4488 firefox.exe Token: SeDebugPrivilege 4488 firefox.exe Token: SeDebugPrivilege 4484 ae2648351c.exe Token: SeShutdownPrivilege 6520 chrome.exe Token: SeCreatePagefilePrivilege 6520 chrome.exe Token: SeShutdownPrivilege 6520 chrome.exe Token: SeCreatePagefilePrivilege 6520 chrome.exe Token: SeDebugPrivilege 4488 firefox.exe Token: SeDebugPrivilege 4488 firefox.exe Token: SeDebugPrivilege 4488 firefox.exe -
Suspicious use of FindShellTrayWindow 59 IoCs
Processes:
1x98q1.exeac3863390d.exefirefox.exechrome.exepid Process 2436 1x98q1.exe 1372 ac3863390d.exe 1372 ac3863390d.exe 1372 ac3863390d.exe 1372 ac3863390d.exe 1372 ac3863390d.exe 1372 ac3863390d.exe 1372 ac3863390d.exe 1372 ac3863390d.exe 4488 firefox.exe 4488 firefox.exe 4488 firefox.exe 4488 firefox.exe 1372 ac3863390d.exe 4488 firefox.exe 4488 firefox.exe 4488 firefox.exe 4488 firefox.exe 4488 firefox.exe 4488 firefox.exe 4488 firefox.exe 4488 firefox.exe 4488 firefox.exe 4488 firefox.exe 4488 firefox.exe 4488 firefox.exe 4488 firefox.exe 4488 firefox.exe 4488 firefox.exe 4488 firefox.exe 4488 firefox.exe 1372 ac3863390d.exe 1372 ac3863390d.exe 6520 chrome.exe 6520 chrome.exe 6520 chrome.exe 6520 chrome.exe 6520 chrome.exe 6520 chrome.exe 6520 chrome.exe 6520 chrome.exe 6520 chrome.exe 6520 chrome.exe 6520 chrome.exe 6520 chrome.exe 6520 chrome.exe 6520 chrome.exe 6520 chrome.exe 6520 chrome.exe 6520 chrome.exe 6520 chrome.exe 6520 chrome.exe 6520 chrome.exe 6520 chrome.exe 6520 chrome.exe 6520 chrome.exe 6520 chrome.exe 6520 chrome.exe 6520 chrome.exe -
Suspicious use of SendNotifyMessage 31 IoCs
Processes:
ac3863390d.exefirefox.exepid Process 1372 ac3863390d.exe 1372 ac3863390d.exe 1372 ac3863390d.exe 1372 ac3863390d.exe 1372 ac3863390d.exe 1372 ac3863390d.exe 1372 ac3863390d.exe 1372 ac3863390d.exe 4488 firefox.exe 4488 firefox.exe 4488 firefox.exe 4488 firefox.exe 1372 ac3863390d.exe 4488 firefox.exe 4488 firefox.exe 4488 firefox.exe 4488 firefox.exe 4488 firefox.exe 4488 firefox.exe 4488 firefox.exe 4488 firefox.exe 4488 firefox.exe 4488 firefox.exe 4488 firefox.exe 4488 firefox.exe 4488 firefox.exe 4488 firefox.exe 4488 firefox.exe 4488 firefox.exe 1372 ac3863390d.exe 1372 ac3863390d.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
firefox.exepid Process 4488 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
9e17c7a53bf1fdd19eebd7e0ee9055ce5c30a5a5997abc3ba2e5d404c91ed915.exeQ7g89.exev0h43.exe1x98q1.exeskotes.exeac3863390d.exefirefox.exefirefox.exedescription pid Process procid_target PID 4356 wrote to memory of 4392 4356 9e17c7a53bf1fdd19eebd7e0ee9055ce5c30a5a5997abc3ba2e5d404c91ed915.exe 83 PID 4356 wrote to memory of 4392 4356 9e17c7a53bf1fdd19eebd7e0ee9055ce5c30a5a5997abc3ba2e5d404c91ed915.exe 83 PID 4356 wrote to memory of 4392 4356 9e17c7a53bf1fdd19eebd7e0ee9055ce5c30a5a5997abc3ba2e5d404c91ed915.exe 83 PID 4392 wrote to memory of 5068 4392 Q7g89.exe 84 PID 4392 wrote to memory of 5068 4392 Q7g89.exe 84 PID 4392 wrote to memory of 5068 4392 Q7g89.exe 84 PID 5068 wrote to memory of 2436 5068 v0h43.exe 85 PID 5068 wrote to memory of 2436 5068 v0h43.exe 85 PID 5068 wrote to memory of 2436 5068 v0h43.exe 85 PID 2436 wrote to memory of 5112 2436 1x98q1.exe 86 PID 2436 wrote to memory of 5112 2436 1x98q1.exe 86 PID 2436 wrote to memory of 5112 2436 1x98q1.exe 86 PID 5068 wrote to memory of 1092 5068 v0h43.exe 88 PID 5068 wrote to memory of 1092 5068 v0h43.exe 88 PID 5068 wrote to memory of 1092 5068 v0h43.exe 88 PID 4392 wrote to memory of 4496 4392 Q7g89.exe 94 PID 4392 wrote to memory of 4496 4392 Q7g89.exe 94 PID 4392 wrote to memory of 4496 4392 Q7g89.exe 94 PID 5112 wrote to memory of 1676 5112 skotes.exe 97 PID 5112 wrote to memory of 1676 5112 skotes.exe 97 PID 5112 wrote to memory of 1676 5112 skotes.exe 97 PID 4356 wrote to memory of 4072 4356 9e17c7a53bf1fdd19eebd7e0ee9055ce5c30a5a5997abc3ba2e5d404c91ed915.exe 99 PID 4356 wrote to memory of 4072 4356 9e17c7a53bf1fdd19eebd7e0ee9055ce5c30a5a5997abc3ba2e5d404c91ed915.exe 99 PID 4356 wrote to memory of 4072 4356 9e17c7a53bf1fdd19eebd7e0ee9055ce5c30a5a5997abc3ba2e5d404c91ed915.exe 99 PID 5112 wrote to memory of 452 5112 skotes.exe 103 PID 5112 wrote to memory of 452 5112 skotes.exe 103 PID 5112 wrote to memory of 452 5112 skotes.exe 103 PID 5112 wrote to memory of 1372 5112 skotes.exe 105 PID 5112 wrote to memory of 1372 5112 skotes.exe 105 PID 5112 wrote to memory of 1372 5112 skotes.exe 105 PID 1372 wrote to memory of 3664 1372 ac3863390d.exe 106 PID 1372 wrote to memory of 3664 1372 ac3863390d.exe 106 PID 1372 wrote to memory of 3664 1372 ac3863390d.exe 106 PID 1372 wrote to memory of 3096 1372 ac3863390d.exe 108 PID 1372 wrote to memory of 3096 1372 ac3863390d.exe 108 PID 1372 wrote to memory of 3096 1372 ac3863390d.exe 108 PID 1372 wrote to memory of 2344 1372 ac3863390d.exe 110 PID 1372 wrote to memory of 2344 1372 ac3863390d.exe 110 PID 1372 wrote to memory of 2344 1372 ac3863390d.exe 110 PID 1372 wrote to memory of 5068 1372 ac3863390d.exe 112 PID 1372 wrote to memory of 5068 1372 ac3863390d.exe 112 PID 1372 wrote to memory of 5068 1372 ac3863390d.exe 112 PID 1372 wrote to memory of 4304 1372 ac3863390d.exe 114 PID 1372 wrote to memory of 4304 1372 ac3863390d.exe 114 PID 1372 wrote to memory of 4304 1372 ac3863390d.exe 114 PID 1372 wrote to memory of 4752 1372 ac3863390d.exe 116 PID 1372 wrote to memory of 4752 1372 ac3863390d.exe 116 PID 4752 wrote to memory of 4488 4752 firefox.exe 117 PID 4752 wrote to memory of 4488 4752 firefox.exe 117 PID 4752 wrote to memory of 4488 4752 firefox.exe 117 PID 4752 wrote to memory of 4488 4752 firefox.exe 117 PID 4752 wrote to memory of 4488 4752 firefox.exe 117 PID 4752 wrote to memory of 4488 4752 firefox.exe 117 PID 4752 wrote to memory of 4488 4752 firefox.exe 117 PID 4752 wrote to memory of 4488 4752 firefox.exe 117 PID 4752 wrote to memory of 4488 4752 firefox.exe 117 PID 4752 wrote to memory of 4488 4752 firefox.exe 117 PID 4752 wrote to memory of 4488 4752 firefox.exe 117 PID 5112 wrote to memory of 4484 5112 skotes.exe 118 PID 5112 wrote to memory of 4484 5112 skotes.exe 118 PID 5112 wrote to memory of 4484 5112 skotes.exe 118 PID 4488 wrote to memory of 2300 4488 firefox.exe 119 PID 4488 wrote to memory of 2300 4488 firefox.exe 119 PID 4488 wrote to memory of 2300 4488 firefox.exe 119 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\9e17c7a53bf1fdd19eebd7e0ee9055ce5c30a5a5997abc3ba2e5d404c91ed915.exe"C:\Users\Admin\AppData\Local\Temp\9e17c7a53bf1fdd19eebd7e0ee9055ce5c30a5a5997abc3ba2e5d404c91ed915.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Q7g89.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Q7g89.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0h43.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0h43.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1x98q1.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1x98q1.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\1009233001\749b1bf35c.exe"C:\Users\Admin\AppData\Local\Temp\1009233001\749b1bf35c.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1676
-
-
C:\Users\Admin\AppData\Local\Temp\1009234001\609d351aab.exe"C:\Users\Admin\AppData\Local\Temp\1009234001\609d351aab.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:452
-
-
C:\Users\Admin\AppData\Local\Temp\1009235001\ac3863390d.exe"C:\Users\Admin\AppData\Local\Temp\1009235001\ac3863390d.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3664
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3096
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2344
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5068
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4304
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2016 -parentBuildID 20240401114208 -prefsHandle 1932 -prefMapHandle 1924 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {aca735c3-dcde-452e-9b0a-6221a8ad3211} 4488 "\\.\pipe\gecko-crash-server-pipe.4488" gpu9⤵PID:2300
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2504 -parentBuildID 20240401114208 -prefsHandle 2472 -prefMapHandle 2468 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {783d1cd4-ce2f-48ab-8a1b-b4648ed162d7} 4488 "\\.\pipe\gecko-crash-server-pipe.4488" socket9⤵PID:4532
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3284 -childID 1 -isForBrowser -prefsHandle 3296 -prefMapHandle 3204 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {906d0cb0-cad9-48c7-beee-d4d6099ae82e} 4488 "\\.\pipe\gecko-crash-server-pipe.4488" tab9⤵PID:2440
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3720 -childID 2 -isForBrowser -prefsHandle 3688 -prefMapHandle 3684 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {78ac65ad-ee5f-4dc1-99a5-bdba8182c660} 4488 "\\.\pipe\gecko-crash-server-pipe.4488" tab9⤵PID:3660
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4956 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4860 -prefMapHandle 4912 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {99803c16-c9af-4d20-b03b-3eed89a74ef8} 4488 "\\.\pipe\gecko-crash-server-pipe.4488" utility9⤵
- Checks processor information in registry
PID:6576
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5396 -childID 3 -isForBrowser -prefsHandle 5400 -prefMapHandle 5524 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a141e9ad-4544-4a71-a8f6-acc771c1ae1f} 4488 "\\.\pipe\gecko-crash-server-pipe.4488" tab9⤵PID:5008
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5732 -childID 4 -isForBrowser -prefsHandle 5724 -prefMapHandle 5720 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7b54a028-97f4-407b-b0d0-9c48a3be3624} 4488 "\\.\pipe\gecko-crash-server-pipe.4488" tab9⤵PID:3772
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5752 -childID 5 -isForBrowser -prefsHandle 5744 -prefMapHandle 5740 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {84ebbde8-896f-44f3-8799-8a16cd7a1615} 4488 "\\.\pipe\gecko-crash-server-pipe.4488" tab9⤵PID:2924
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009236001\ae2648351c.exe"C:\Users\Admin\AppData\Local\Temp\1009236001\ae2648351c.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4484
-
-
C:\Users\Admin\AppData\Local\Temp\1009237001\68e1b587e4.exe"C:\Users\Admin\AppData\Local\Temp\1009237001\68e1b587e4.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:5460 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"7⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:6520 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x160,0x164,0x168,0x40,0x16c,0x7ff9068ccc40,0x7ff9068ccc4c,0x7ff9068ccc588⤵PID:6552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1996,i,191596200576438509,7489801644623081937,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1988 /prefetch:28⤵PID:6876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1844,i,191596200576438509,7489801644623081937,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2152 /prefetch:38⤵PID:6884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2272,i,191596200576438509,7489801644623081937,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2256 /prefetch:88⤵PID:7016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3212,i,191596200576438509,7489801644623081937,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3216 /prefetch:18⤵
- Uses browser remote debugging
PID:3872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3284,i,191596200576438509,7489801644623081937,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3276 /prefetch:18⤵
- Uses browser remote debugging
PID:4432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4440,i,191596200576438509,7489801644623081937,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4592 /prefetch:18⤵
- Uses browser remote debugging
PID:4984
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5872
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5460 -s 19127⤵
- Program crash
PID:6040
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2G9220.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2G9220.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1092
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3y96L.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3y96L.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4496
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4L367B.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4L367B.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4072
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:552
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:452
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5776
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 5460 -ip 54601⤵PID:784
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6392
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:6848
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD52146960e485095f146ba3ff397047cdc
SHA1925b3bddbac2aa7be28a434d5b47a69019431a9e
SHA25687ad826e43a95035b86fdae49d597bbc08a4e7c63be4da290dfa68b28cf31e66
SHA5123c20f346344a5cc671ad436ba0eb521908999c39ef2980773d745e58eee3795fe716261f5ddaf9fdfd5f80cd4e6891019785ba97bcf222e0b73d62781668857f
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\activity-stream.discovery_stream.json
Filesize28KB
MD5c0b4122e9523e4406259f9ee9ad09bda
SHA155f114197262a29f5e54a0f95b69daef29b1934c
SHA25698a2ff1134b1c43fdebb2935dda568e3562cdad2cc86e48a7b9ce41bf36b35e0
SHA5127f17491d893380232b93525d37b2e5d647ab3e5c06daba5744213483736f0a85423e0d30954d0863076b0402d27715a6295ee882fe0a008e818c0c063f05cad7
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD560edd8f0d89a075eeccacfd9e1150881
SHA10f3f34f6cb0913ed846066316b254ce67caf0ae7
SHA25684d7c81563a609689bf03da6a963ae3d5b1e6cad9b992e107e828af02f7192b2
SHA51204ed64498c6904447564a45d05fb4b85112856dec36ea734f47c46b0c85971cb4bda60a8cbdeb17769abf1a5b16b9a190be315ab3874ac22f8d5782e5aaa4d08
-
Filesize
1.8MB
MD5e4b5250f65686e87e82210c71f5d5870
SHA12c9d0de98a7cbcf69d6cb496ed85bece6aa2e3f1
SHA2564e5951866d4ca4fdd5e76ace99b49d8d92f13c28289b78d3989957069bc1799a
SHA51280c6e789bdedc6a95aa47e65e0fab15c1d3bfec3daf8c79629b60296e8b508421a55e9e978689cb9f661f0702c56c2ed3f7f59ab722eec9241aac1903d438b92
-
Filesize
1.7MB
MD5637c18dc90ea5e349eb27bd582fac705
SHA17fdfba2b9007dc1b2c6bb508f5fc320b4ceab182
SHA256f3f6386f2bdec68aa8b66dcc8e2a248dc2934264b39814cbba85831b4dd4ad0d
SHA5126daeecf25db8d0a968c5a3f15f533d36fc219074ddcd59d03ef17d230d010a360619c43bd7f9d95c14b149cc957316a4171e8421594aef6faebc9e24e053d4d8
-
Filesize
901KB
MD50f6832047e7bced4a803541e7c53fd0f
SHA1d384c8fd05f725f0557b74d471a07658e177d40d
SHA256d04d6399b3c5ae64db783bee5a7ff7e996c157c149ebb8126a4c3b8777411900
SHA512e28f93ffd6c0f525c764214093d01100252e0d72949e6c34844921000f24226c0bca5726110b6e95f09cb21bfad87353d8afe1e8090e39f7941855dc36d56de3
-
Filesize
2.6MB
MD57152f5ad6af0a21c03104c040cab2367
SHA13d5e4d02fa7d4dcce03af0ea2453321492379fb2
SHA256963a58fad4f05c153e70205aea5788a64608ed6c1ae952ca7b3581d8e567faef
SHA512356d73bc01a2f47426bf3160403403919f2c20b83b844f3658f07d5d134b039db95ef1a8c3eac76493091364461f5a4be13962430dfa814c2fc51d5c0b53f042
-
Filesize
4.2MB
MD5b4de34dcc96d16ec82f6fa3a7d037d4f
SHA1a61abdbcf17bd347b2f0733d921100bf5503e844
SHA256176260afa9071597e2a1a9947ae1394acf082932fbbb78b3c830c6d7c63bfa76
SHA512619dd38b27a461164a5541a42d4796b5f946df776d7e8e5e0849580c7148a6bbd7afb50db9e7ee0fb0f2dce02962a260fa7545c14d70f1e005243e1fd600aa33
-
Filesize
2.7MB
MD50d1e5334ceac878a5054ae5dbcfe0942
SHA11e3bdc4a9a1b54c65cd489187c51f41b51f2a3a2
SHA256fece7908c91ac1248fe2ac0d2bd28f80c59b6d26669d2f144e8d5f92a7d1166b
SHA512d96f09715b513b8bfa277df9524c4da73ad7e761128714f9da21c4fdff354d10f6bfe75936156fc70f2e6ed9fc02a827b29e2967fe3da9234e6f584d7dddf945
-
Filesize
5.4MB
MD50be3b0973890672a601efd0c890884c2
SHA18869ee15f83516a7e7bf9ff730e89ded9aee1000
SHA25631496b5bbc45781d3ce977713992cadb9d44bab477be21acbce8dbd3bbe9613b
SHA512fb9c2242496837cff34fb4d1a02d703d52b0073d5b93e0f5f37bc61e72c9f3b3d37145e673a06b81625e7f096dcca4133b346912b155aeacd60be792ef9ad23c
-
Filesize
1.7MB
MD539150cb5924999ed343818b23d52319f
SHA15e32677c6eb3e4abd9400645e5c79601e3379964
SHA256a02e0441ef8f1c4768bf648c73f2a3210828a6f62836acbf73a3c93bae91747a
SHA512c0d48d9a6fe6cf508e800023b7aa76dfa85a337967ba2fc5a2e5b4c0060b00799d0ac2a5a41f7206f7ab4dd09606c4923a12f57c9e31ce31facc7d99394e32aa
-
Filesize
3.7MB
MD53d9833d9d661485a51439a0b1c46fb4c
SHA1298e8ef5d2df25e0ba34e20b91e3c12aa0e3389b
SHA256cfe15cb4dc0e3e86f9a8253665f9ca2a454cb31f0ba3da5eb522fd50675ecc38
SHA512fdfba390be4fdaf2ff21915a28077de08c78adfc45de7170789054989e048140baa377a80e2f72cabcf1946b1d02414ec0569e8e3729c114f74a7db4167fb09f
-
Filesize
1.8MB
MD5a5c1bede87aa32763c4260e89488190e
SHA1c6aebc9f05315ba9f7fab59b47fd661fb4856db9
SHA256213feee2adf1407723f34322234a1ad83857745e38641909a8b50e0ecffe2f11
SHA512bcf6c75025bc990feff564a49f0d2e6dbb8207c39b374adcd71f08e2dba8b67305d0ab4cad0a3843ae22f9407f6d5fa1819c003a01664787bfaaf337bc558baa
-
Filesize
1.8MB
MD5bc555453e167161e80e5d71952110fb8
SHA1ced441305778199ae6039b36f12137059c20f3f7
SHA256389df27a4c0a96ccebb77722d502ba46b74be45f1b6a39189716deb76b0e8d4a
SHA51220bca4de5fcd8b1da7d608c27eec7bff218e01b71225c9bb612cf0bf11a4efdf4c3a019da421a84ee60f883ad2d68a9a017b8ff57ea6f340850c739d0198035e
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\AlternateServices.bin
Filesize18KB
MD54b20d03318bc5a5b06caf04dac5bb565
SHA1d5b628861f31269417efb67f668ee7367bdc2213
SHA25675841fd18317c84dd30e4d79655c328d67bc3c1aea18a9bcc0a8cbc3d0d8038b
SHA5123450728e9ce94b11699cd6f66a8ae9c4567a7b4d2987d85c91f74f855e6871fcf0beb32920454ed68339d951f12f4f5207fd5c84e41cdaa26a57777712c1cb5d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\AlternateServices.bin
Filesize7KB
MD52b54f582b275d1b3067b9ca2714d5419
SHA1320f727c7769bde39aed18a084e251b0ac2ab12d
SHA256c50a36899d23d3f0d4e2eb797e3c761318dbbce6c838e45dc25b94dde947c4e7
SHA51201e5583f739fd29f532e2d21e2b820636dc17447add98446a8f04ad394eef50fcbb45a57d384c7db84010d4eaf49ee89f4f82ba6358278931672f76b39748441
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\AlternateServices.bin
Filesize10KB
MD59f18c5b516c3e89aac040f5c147d904f
SHA181609e800487ba96435941d5e9165916886cb2a1
SHA2561d042a64bfa914deae5032cffb7fdd3d9ad49e9bdd654f7c5a2c4ac12f7b49d4
SHA512ae4e875fab1c5b1b54fc3ad227a2c56062ea57ff6d22305d13a4a8e48cbdbf91950672bb8003015a995d2ff74f095da2cd4dec8f1cff16511d4c50eb034822b1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.bin
Filesize23KB
MD5458a0abbb0fea9157f0f7abdc7cc6d88
SHA126b64089e8d8fef4801ca081e3c47764aa67a436
SHA256861afea72c4bb9c3148b404530938a44a815c4698f57c20f18861459a1f063a8
SHA512d0f1ed9508684bed9910506c05fe30c8f56f9f803dc0021874d273bb79e652ae5f8d5120b6eecaf85fa711b9d3b00ca56d678460d6d001e1e5f7ea24c190ec77
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.bin
Filesize5KB
MD5e0fe0548050bd0bcac199b54af7f12bc
SHA1b4963853ece164c343d997dafb3936b228aac67f
SHA256ffd1bdf25f38860c40f1e24bdee0e463b44f18f3dcf26a4488f2fd795a94fe58
SHA512cbd9da96501f72a39de26d048ea23d6b047d7d7a33ac39161e8c3632077707c5dbba90470365fd24c2caf07ec35c4d1a126b19f9c4375a14a025bf98eb84164f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.bin
Filesize15KB
MD585c8db14d9e16f71a3a2c4d94b07746c
SHA1cb7c2f1555732c65bbc6b2e4d3b55e4ff402be0e
SHA2567d46e4d1f43101d239cf4c8c8edc29b757e69bbc6f20834d5fa22099bff602b5
SHA512a123c0bdaaefa80d9ab351831e287900fd89271c430b6c6b2390d0b8461e7d91290ae47f46622d556cffe6d34c37e4f8dce9b5761cde3c6a506ccade907ede7d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.bin
Filesize15KB
MD5bbd0a57646db815380379293535138bc
SHA17acd827eddb9bf3243540fb412d91b0c36bcea51
SHA256ca3b4012c46001878120a6422f73304c2b8dcd661b39c4d87d5695253b42d5d3
SHA5120bbea183addb67f1c12fad2c3ca1b626f06f129703332bfc3459df0af48f37d85d67b3f4784900228764d97c32e6055e1c723bde8c7a91d1c254c6ea048ae096
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5afdba3d9b0fd8dcf94c5830e5df315fd
SHA1dc7b6ec8b7c8c0de54e6c222b25ffe79f3f256f2
SHA25638de274ec2cee11634987b81f91d006935ec06fff89b940bd8ddbad524612bb8
SHA5128e4bb67449b0432a9e9bda27e51551ed21b501c678353586accb7999ef6528fe438e4c7520eb8497b58019d5fd820df3ec46a698234fa9c1648560429cd6f4b4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5be1d585b64bf09615be515111ae6ac98
SHA138d566b8acb733ec023f085878da6b8983061521
SHA256d316ec30b867a8da8e7f846ac2a225b415f3a25759b80c1aaa38405b9847d0c6
SHA5124fde3158766405ad1a0fc532e56070b8e56d26823ca49b61303e012747c1cba6b79ce3702eda323d2d8e0327e3d3cc851db9792fdccd86a4f944699dd4096f86
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5ded69ad52e2c2286e52c01ecf20c6efe
SHA145b27c936f1b9fcbd7786735a218c111885d3bc2
SHA2565dfa89ac783237ed61436bc70f052003e77d496b4416f2d7c32acb768dfa0356
SHA512aa4918d77a4cd4d29759c0b4fe6f836dece26fdb7543cbaf1836aee661fb71abd4da618a11895c7ca70841a9b86e91d953d730a6b191dfe35bd7b237f8d91342
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5b0cdcd193f92e73de2636ec76971b2f6
SHA13b2616fb83fec32c55d00996a0d06877d418c767
SHA256fd3205139cf644a262c4396c9de10822fa2af7ee811e1116c7c4bea9631519c7
SHA5125099de5267dcf5accd0650cb40bee37a934c2fedee2ae8532797cb41b75439be9f86088e5733cf80e506baddd81a7909dcdb92ab9ff7d76a3ed5ecf453116e55
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5be318b43bfdd65751ebb58742a5dfdb0
SHA1f7249227a1a9b9887f90aeeb8623cf5b23e08331
SHA2560598830696a587cc4a8fc5bf4a2fc025ee3dc570139bd3182c865ca8c26880c8
SHA51202f5b69d5858826c3457e45bb68e9f3340e6ef973ecca35675ffd1a783ae6a0d147a1cb5a3e4ad5acf71a3efd7cd9a9a0eecd2891f664d11530638ab521f514c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\pending_pings\11b3eaeb-7738-4007-b8ea-24b57d7a93c6
Filesize26KB
MD5bb0f2fb04899218bacda6ed8ce09c915
SHA1b9a4ef20dfaae12d3ec8b6ee79d3d8eecb6ed58e
SHA2565263d359d58551150dec5c944d545702010854444e21ed640e750f00d133f673
SHA512490340241dbb911f92ceb32e4a2d68d35814ee585a3785898c7104e67e1e79866af707efd9e7d1b4dbae1b010a36a132165e9ace6460ac52f25e7eb8541fa1fe
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\pending_pings\15897b4c-e021-4166-a32d-79d779e8d826
Filesize982B
MD5f90acff5232efcc82a94268aed9a8221
SHA1cf8d5a2dbb7b3f3ca19e946b3fab9266e0598cc8
SHA2569595403e34280797ba6b0664cc6640b667788da1fc098b3af1d8bafcc3ad3838
SHA5123b984e6b21cdb08ca75391db71c3702b5156b3b09b859e58025635ae000be686dedd7c2b212014f2c500fc90d2c412ae5659e299e5a3e5af88fe1317c050e7c9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\pending_pings\b16f6727-5c06-4bca-b965-1d6f14a1f47d
Filesize671B
MD583a8b768c18a87aec83f26de4b113b3f
SHA18d8e8a2b48b1d7ff29a9e4f56125481894d8752d
SHA2568c7513dc952ae8b3f39df21a5aade1da379edc6b854dcb1cd354ce15a68ca55e
SHA512899752297c81f6374c2b650f2797e36b71ff6597b79ed1db8f830cd758ea63f723782d3afb1542a7000e97b10865b657878fe432ac5143a83182c6cc918661e8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD53ae04d1d31a9468cbc17b984659a2452
SHA1d74f38db0686bb05809d540d2344076815809f3e
SHA25636eb274b7888d8cb674edc851e72d1dc911c15d93f7e33988326222cd94dcde5
SHA512361807eb14fdb56e109f6e092c5e3f03f8d287c85e2f9e6455bff8097b162824ad1924496f6d653b6e1c8d50eae557b53c15ce12f1d5ca875718ed49b722976b
-
Filesize
12KB
MD5d3690ea1c9c2a9c1677d89ef22dac3ce
SHA178c7e3735c74bc7bc57ff58ab3237f978b8ec55a
SHA2563387c1eb91b8f55a83065f70e94375afd18de29373fc20ac2e4dae605206c513
SHA512c72a39eecfadf904e966dc45440dc41d8998c833598c469ca8ef14a33267223a3d9cc526b6147732369edb76ea4628cb655f83a0f6a38fdecc6f54112b63a9a8
-
Filesize
15KB
MD5f02137120022fd181a3cb54ccdd02396
SHA1c193073ff9b86e989836c2ca48014d46958c7423
SHA25656784e076ba52089258b3383fa3c44606921c3764a92936e1704e3b7dd66b21e
SHA512cd64bd10646bf93aa50b14bd032c536e26da23e8a0c95982907d8851e9a9c588c52e952b8f5ef099f4647685d11801243fe9360def0d833fbf5339758514e14c
-
Filesize
10KB
MD51d38ca60ab842453396a6d6e788fedc2
SHA1bc1b7a2af595da6af298fcd7cda6697ae971ca19
SHA25653ec471c712290fdf6bd8f2c4a9b063393de49524fa4b6ad4d85b916ddd6a4e2
SHA5124c051b63e275771cf8dc63e9b851198c1da7f7ab33179222c8c1d22c26d6af223573aeff70b63d4a6752da07cc4fdd06380824d774be14cc772385343041224c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize2.7MB
MD5d091c3b02097662a4c63de92d4d71307
SHA19e89f1e86c12f911b3f9d2373417435a360747eb
SHA256e23007c08fe580e87bc8bce0b4a487848b70f727c030ecc994f8339935ef1025
SHA5120548f7909b07a5955532fa68bd7655c51bcfc7f3f316769e09ddcd8a2257ff6126638e41f83acbd305aa966d8e17ad4d81d6fb5d590acdd077a4621041af98b8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize2.7MB
MD5d80f174a5b1bc94b6ea724aca10c1f44
SHA108fc6e44d044339ba78b3840f875faec60853309
SHA256ae12e3e2ca187f5fdd035190f2f482db77c7b86f6eec55150654601fd0c06483
SHA5126985d484da81be5dcf731f02683172d15c97e833792963aebfc26555e9bd678b179093ec9768ffd4b46a9364743702d16606872d79e76b36aa9eda44ffc1a516
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize3.0MB
MD540932324c95f4e357fe5fa5010951418
SHA12a00680eb5fd99b4cacffaa849626a73d2166973
SHA2562ab18b4f6ab0935b17d93c85a6cf967e98a7acb68e8f4fbce7a2723349329a9d
SHA512e8d85a7ff5eb90fcc9f274ec72d6d15bef3cd953eebd8df113edd14864b4bdab2e10f2a072743596e5e5c649c752bb698cf44e68f519e94adb68c2360f6b7373
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite-wal
Filesize64KB
MD59891148209b1d9675b56b351daf084f2
SHA1e142279cc5b961c815b1bc45a9ab0315f2cc9513
SHA256214dfcda36b2e42a9899e8fb439e8bc4363d1064271138f031ec38af46947c7b
SHA5125e5e695f07cc1543baf966717a244533052edb8d33e5ba05f5468f531a98115e09cdae622ec53b9d72a811e1b1e525ce79b8ee84735d6742c8c024df9b89041c
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e