Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 10:05
Static task
static1
Behavioral task
behavioral1
Sample
766cc2b1f9e6dcc1f07a870fb0817f600252d758c09b5ad18466ca9b2a2a3644.exe
Resource
win7-20240903-en
General
-
Target
766cc2b1f9e6dcc1f07a870fb0817f600252d758c09b5ad18466ca9b2a2a3644.exe
-
Size
1.8MB
-
MD5
ad432846853d57476d7b1b1063114709
-
SHA1
ead985339d84415064720ac088cb12ff0ef0fe69
-
SHA256
766cc2b1f9e6dcc1f07a870fb0817f600252d758c09b5ad18466ca9b2a2a3644
-
SHA512
b73504caad497f34b9023f605c6f10bd1c81d779464f98bf624c1db48e73265cb6ac538f7ef5a8ee1e87f85c8c45a440da7ed77cf52e2c3078e1b31ccf9285e1
-
SSDEEP
49152:fbf1+D8s1ITM7ZzPqEdb9fyu7TwzLX8rkuDif4BTsUn:fbsD8s1Waqw97TwXMrkuOf4B1n
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
http://encrypthub.net:8080
https://encrypthub.net/Main/antivm.ps1
Extracted
lumma
Extracted
stealc
drum
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 0efa46b852.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 0efa46b852.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 0efa46b852.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 0efa46b852.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 0efa46b852.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 0efa46b852.exe -
Stealc family
-
Xmrig family
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF ca3c31fd94.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 12 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9436bd2ae0.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0efa46b852.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 766cc2b1f9e6dcc1f07a870fb0817f600252d758c09b5ad18466ca9b2a2a3644.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1d6130a212.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 19e719e1a8.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 137367a1ec.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ XXM5y4g.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ca3c31fd94.exe -
XMRig Miner payload 12 IoCs
resource yara_rule behavioral2/memory/4212-272-0x0000000140000000-0x00000001408F6000-memory.dmp xmrig behavioral2/memory/4212-271-0x0000000140000000-0x00000001408F6000-memory.dmp xmrig behavioral2/memory/4212-274-0x0000000140000000-0x00000001408F6000-memory.dmp xmrig behavioral2/memory/4212-276-0x0000000140000000-0x00000001408F6000-memory.dmp xmrig behavioral2/memory/4212-277-0x0000000140000000-0x00000001408F6000-memory.dmp xmrig behavioral2/memory/4212-278-0x0000000140000000-0x00000001408F6000-memory.dmp xmrig behavioral2/memory/4212-279-0x0000000140000000-0x00000001408F6000-memory.dmp xmrig behavioral2/memory/4212-280-0x0000000140000000-0x00000001408F6000-memory.dmp xmrig behavioral2/memory/4212-311-0x0000000140000000-0x00000001408F6000-memory.dmp xmrig behavioral2/memory/4212-3223-0x0000000140000000-0x00000001408F6000-memory.dmp xmrig behavioral2/memory/4212-3224-0x0000000140000000-0x00000001408F6000-memory.dmp xmrig behavioral2/memory/4212-3225-0x0000000140000000-0x00000001408F6000-memory.dmp xmrig -
Blocklisted process makes network request 9 IoCs
flow pid Process 40 808 powershell.exe 43 808 powershell.exe 45 808 powershell.exe 49 808 powershell.exe 52 808 powershell.exe 54 808 powershell.exe 56 808 powershell.exe 58 808 powershell.exe 257 808 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 808 powershell.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 24 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1d6130a212.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9436bd2ae0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0efa46b852.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0efa46b852.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 766cc2b1f9e6dcc1f07a870fb0817f600252d758c09b5ad18466ca9b2a2a3644.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 766cc2b1f9e6dcc1f07a870fb0817f600252d758c09b5ad18466ca9b2a2a3644.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion XXM5y4g.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1d6130a212.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion XXM5y4g.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ca3c31fd94.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 137367a1ec.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9436bd2ae0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ca3c31fd94.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 19e719e1a8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 19e719e1a8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 137367a1ec.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 766cc2b1f9e6dcc1f07a870fb0817f600252d758c09b5ad18466ca9b2a2a3644.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 17 IoCs
pid Process 1404 skotes.exe 4020 skotes.exe 4708 XXM5y4g.exe 1540 lnwtLq4.exe 2364 XW5qFPl.exe 664 gU8ND0g.exe 2428 1d6130a212.exe 224 ca3c31fd94.exe 4252 19e719e1a8.exe 1716 137367a1ec.exe 1056 skotes.exe 4916 MicrosoftEdgeUpdateTaskMachineCoreSC.exe 2584 9436bd2ae0.exe 3932 396c679d98.exe 2868 0efa46b852.exe 6288 skotes.exe 6100 MicrosoftEdgeUpdateTaskMachineCoreSC.exe -
Identifies Wine through registry keys 2 TTPs 12 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 766cc2b1f9e6dcc1f07a870fb0817f600252d758c09b5ad18466ca9b2a2a3644.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 19e719e1a8.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 137367a1ec.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine ca3c31fd94.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 9436bd2ae0.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 0efa46b852.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine XXM5y4g.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 1d6130a212.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 0efa46b852.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 0efa46b852.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\0efa46b852.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010598001\\0efa46b852.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\137367a1ec.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010595001\\137367a1ec.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\9436bd2ae0.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010596001\\9436bd2ae0.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\396c679d98.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010597001\\396c679d98.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 41 ifconfig.me 44 ip-api.com 48 ident.me 49 ident.me -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x00040000000232fa-318.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
pid Process 1696 766cc2b1f9e6dcc1f07a870fb0817f600252d758c09b5ad18466ca9b2a2a3644.exe 1404 skotes.exe 4020 skotes.exe 4708 XXM5y4g.exe 2428 1d6130a212.exe 224 ca3c31fd94.exe 1716 137367a1ec.exe 1056 skotes.exe 2584 9436bd2ae0.exe 2868 0efa46b852.exe 6288 skotes.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4916 set thread context of 4212 4916 MicrosoftEdgeUpdateTaskMachineCoreSC.exe 134 PID 6100 set thread context of 6788 6100 MicrosoftEdgeUpdateTaskMachineCoreSC.exe 167 -
resource yara_rule behavioral2/memory/4212-265-0x0000000140000000-0x00000001408F6000-memory.dmp upx behavioral2/memory/4212-266-0x0000000140000000-0x00000001408F6000-memory.dmp upx behavioral2/memory/4212-267-0x0000000140000000-0x00000001408F6000-memory.dmp upx behavioral2/memory/4212-269-0x0000000140000000-0x00000001408F6000-memory.dmp upx behavioral2/memory/4212-270-0x0000000140000000-0x00000001408F6000-memory.dmp upx behavioral2/memory/4212-272-0x0000000140000000-0x00000001408F6000-memory.dmp upx behavioral2/memory/4212-271-0x0000000140000000-0x00000001408F6000-memory.dmp upx behavioral2/memory/4212-274-0x0000000140000000-0x00000001408F6000-memory.dmp upx behavioral2/memory/4212-276-0x0000000140000000-0x00000001408F6000-memory.dmp upx behavioral2/memory/4212-277-0x0000000140000000-0x00000001408F6000-memory.dmp upx behavioral2/memory/4212-278-0x0000000140000000-0x00000001408F6000-memory.dmp upx behavioral2/memory/4212-279-0x0000000140000000-0x00000001408F6000-memory.dmp upx behavioral2/memory/4212-280-0x0000000140000000-0x00000001408F6000-memory.dmp upx behavioral2/memory/4212-311-0x0000000140000000-0x00000001408F6000-memory.dmp upx behavioral2/memory/4212-3223-0x0000000140000000-0x00000001408F6000-memory.dmp upx behavioral2/memory/4212-3224-0x0000000140000000-0x00000001408F6000-memory.dmp upx behavioral2/memory/4212-3225-0x0000000140000000-0x00000001408F6000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 766cc2b1f9e6dcc1f07a870fb0817f600252d758c09b5ad18466ca9b2a2a3644.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5640 1716 WerFault.exe 129 -
System Location Discovery: System Language Discovery 1 TTPs 20 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XW5qFPl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0efa46b852.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 766cc2b1f9e6dcc1f07a870fb0817f600252d758c09b5ad18466ca9b2a2a3644.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XXM5y4g.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lnwtLq4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 396c679d98.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ca3c31fd94.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 19e719e1a8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 137367a1ec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9436bd2ae0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1d6130a212.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 6 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4796 powershell.exe 1980 PING.EXE 4604 powershell.exe 1576 PING.EXE 6796 powershell.exe 5384 PING.EXE -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 1600 taskkill.exe 3180 taskkill.exe 4764 taskkill.exe 1056 taskkill.exe 3140 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings firefox.exe -
Runs ping.exe 1 TTPs 3 IoCs
pid Process 1576 PING.EXE 5384 PING.EXE 1980 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3320 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1696 766cc2b1f9e6dcc1f07a870fb0817f600252d758c09b5ad18466ca9b2a2a3644.exe 1696 766cc2b1f9e6dcc1f07a870fb0817f600252d758c09b5ad18466ca9b2a2a3644.exe 1404 skotes.exe 1404 skotes.exe 4020 skotes.exe 4020 skotes.exe 4708 XXM5y4g.exe 4708 XXM5y4g.exe 808 powershell.exe 808 powershell.exe 4796 powershell.exe 4796 powershell.exe 2428 1d6130a212.exe 2428 1d6130a212.exe 224 ca3c31fd94.exe 224 ca3c31fd94.exe 224 ca3c31fd94.exe 224 ca3c31fd94.exe 224 ca3c31fd94.exe 224 ca3c31fd94.exe 224 ca3c31fd94.exe 224 ca3c31fd94.exe 224 ca3c31fd94.exe 224 ca3c31fd94.exe 1716 137367a1ec.exe 1716 137367a1ec.exe 1056 skotes.exe 1056 skotes.exe 4916 MicrosoftEdgeUpdateTaskMachineCoreSC.exe 4212 explorer.exe 4212 explorer.exe 2584 9436bd2ae0.exe 2584 9436bd2ae0.exe 4604 powershell.exe 4604 powershell.exe 4604 powershell.exe 4212 explorer.exe 4212 explorer.exe 3932 396c679d98.exe 3932 396c679d98.exe 4212 explorer.exe 4212 explorer.exe 2868 0efa46b852.exe 2868 0efa46b852.exe 3932 396c679d98.exe 3932 396c679d98.exe 2868 0efa46b852.exe 2868 0efa46b852.exe 2868 0efa46b852.exe 4212 explorer.exe 4212 explorer.exe 4212 explorer.exe 4212 explorer.exe 4212 explorer.exe 4212 explorer.exe 4212 explorer.exe 4212 explorer.exe 4212 explorer.exe 4212 explorer.exe 4212 explorer.exe 4212 explorer.exe 4212 explorer.exe 4212 explorer.exe 6288 skotes.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1540 lnwtLq4.exe Token: SeDebugPrivilege 808 powershell.exe Token: SeDebugPrivilege 4796 powershell.exe Token: SeIncreaseQuotaPrivilege 808 powershell.exe Token: SeSecurityPrivilege 808 powershell.exe Token: SeTakeOwnershipPrivilege 808 powershell.exe Token: SeLoadDriverPrivilege 808 powershell.exe Token: SeSystemProfilePrivilege 808 powershell.exe Token: SeSystemtimePrivilege 808 powershell.exe Token: SeProfSingleProcessPrivilege 808 powershell.exe Token: SeIncBasePriorityPrivilege 808 powershell.exe Token: SeCreatePagefilePrivilege 808 powershell.exe Token: SeBackupPrivilege 808 powershell.exe Token: SeRestorePrivilege 808 powershell.exe Token: SeShutdownPrivilege 808 powershell.exe Token: SeDebugPrivilege 808 powershell.exe Token: SeSystemEnvironmentPrivilege 808 powershell.exe Token: SeRemoteShutdownPrivilege 808 powershell.exe Token: SeUndockPrivilege 808 powershell.exe Token: SeManageVolumePrivilege 808 powershell.exe Token: 33 808 powershell.exe Token: 34 808 powershell.exe Token: 35 808 powershell.exe Token: 36 808 powershell.exe Token: SeIncreaseQuotaPrivilege 808 powershell.exe Token: SeSecurityPrivilege 808 powershell.exe Token: SeTakeOwnershipPrivilege 808 powershell.exe Token: SeLoadDriverPrivilege 808 powershell.exe Token: SeSystemProfilePrivilege 808 powershell.exe Token: SeSystemtimePrivilege 808 powershell.exe Token: SeProfSingleProcessPrivilege 808 powershell.exe Token: SeIncBasePriorityPrivilege 808 powershell.exe Token: SeCreatePagefilePrivilege 808 powershell.exe Token: SeBackupPrivilege 808 powershell.exe Token: SeRestorePrivilege 808 powershell.exe Token: SeShutdownPrivilege 808 powershell.exe Token: SeDebugPrivilege 808 powershell.exe Token: SeSystemEnvironmentPrivilege 808 powershell.exe Token: SeRemoteShutdownPrivilege 808 powershell.exe Token: SeUndockPrivilege 808 powershell.exe Token: SeManageVolumePrivilege 808 powershell.exe Token: 33 808 powershell.exe Token: 34 808 powershell.exe Token: 35 808 powershell.exe Token: 36 808 powershell.exe Token: SeIncreaseQuotaPrivilege 808 powershell.exe Token: SeSecurityPrivilege 808 powershell.exe Token: SeTakeOwnershipPrivilege 808 powershell.exe Token: SeLoadDriverPrivilege 808 powershell.exe Token: SeSystemProfilePrivilege 808 powershell.exe Token: SeSystemtimePrivilege 808 powershell.exe Token: SeProfSingleProcessPrivilege 808 powershell.exe Token: SeIncBasePriorityPrivilege 808 powershell.exe Token: SeCreatePagefilePrivilege 808 powershell.exe Token: SeBackupPrivilege 808 powershell.exe Token: SeRestorePrivilege 808 powershell.exe Token: SeShutdownPrivilege 808 powershell.exe Token: SeDebugPrivilege 808 powershell.exe Token: SeSystemEnvironmentPrivilege 808 powershell.exe Token: SeRemoteShutdownPrivilege 808 powershell.exe Token: SeUndockPrivilege 808 powershell.exe Token: SeManageVolumePrivilege 808 powershell.exe Token: 33 808 powershell.exe Token: 34 808 powershell.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 1696 766cc2b1f9e6dcc1f07a870fb0817f600252d758c09b5ad18466ca9b2a2a3644.exe 4212 explorer.exe 3932 396c679d98.exe 3932 396c679d98.exe 3932 396c679d98.exe 3932 396c679d98.exe 3932 396c679d98.exe 3932 396c679d98.exe 3932 396c679d98.exe 3932 396c679d98.exe 4636 firefox.exe 4636 firefox.exe 4636 firefox.exe 4636 firefox.exe 4636 firefox.exe 4636 firefox.exe 4636 firefox.exe 4636 firefox.exe 4636 firefox.exe 4636 firefox.exe 4636 firefox.exe 4636 firefox.exe 4636 firefox.exe 4636 firefox.exe 4636 firefox.exe 4636 firefox.exe 4636 firefox.exe 4636 firefox.exe 4636 firefox.exe 4636 firefox.exe 4636 firefox.exe 3932 396c679d98.exe 3932 396c679d98.exe 3932 396c679d98.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 3932 396c679d98.exe 3932 396c679d98.exe 3932 396c679d98.exe 3932 396c679d98.exe 3932 396c679d98.exe 3932 396c679d98.exe 3932 396c679d98.exe 3932 396c679d98.exe 4636 firefox.exe 4636 firefox.exe 4636 firefox.exe 4636 firefox.exe 4636 firefox.exe 4636 firefox.exe 4636 firefox.exe 4636 firefox.exe 4636 firefox.exe 4636 firefox.exe 4636 firefox.exe 4636 firefox.exe 4636 firefox.exe 4636 firefox.exe 4636 firefox.exe 4636 firefox.exe 4636 firefox.exe 4636 firefox.exe 4636 firefox.exe 4636 firefox.exe 3932 396c679d98.exe 3932 396c679d98.exe 3932 396c679d98.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4708 XXM5y4g.exe 4708 XXM5y4g.exe 4636 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1696 wrote to memory of 1404 1696 766cc2b1f9e6dcc1f07a870fb0817f600252d758c09b5ad18466ca9b2a2a3644.exe 83 PID 1696 wrote to memory of 1404 1696 766cc2b1f9e6dcc1f07a870fb0817f600252d758c09b5ad18466ca9b2a2a3644.exe 83 PID 1696 wrote to memory of 1404 1696 766cc2b1f9e6dcc1f07a870fb0817f600252d758c09b5ad18466ca9b2a2a3644.exe 83 PID 1404 wrote to memory of 4708 1404 skotes.exe 86 PID 1404 wrote to memory of 4708 1404 skotes.exe 86 PID 1404 wrote to memory of 4708 1404 skotes.exe 86 PID 1404 wrote to memory of 1540 1404 skotes.exe 102 PID 1404 wrote to memory of 1540 1404 skotes.exe 102 PID 1404 wrote to memory of 1540 1404 skotes.exe 102 PID 1404 wrote to memory of 2364 1404 skotes.exe 103 PID 1404 wrote to memory of 2364 1404 skotes.exe 103 PID 1404 wrote to memory of 2364 1404 skotes.exe 103 PID 2364 wrote to memory of 808 2364 XW5qFPl.exe 104 PID 2364 wrote to memory of 808 2364 XW5qFPl.exe 104 PID 2364 wrote to memory of 808 2364 XW5qFPl.exe 104 PID 1404 wrote to memory of 664 1404 skotes.exe 107 PID 1404 wrote to memory of 664 1404 skotes.exe 107 PID 664 wrote to memory of 2612 664 gU8ND0g.exe 108 PID 664 wrote to memory of 2612 664 gU8ND0g.exe 108 PID 664 wrote to memory of 2644 664 gU8ND0g.exe 109 PID 664 wrote to memory of 2644 664 gU8ND0g.exe 109 PID 664 wrote to memory of 3320 664 gU8ND0g.exe 110 PID 664 wrote to memory of 3320 664 gU8ND0g.exe 110 PID 664 wrote to memory of 4796 664 gU8ND0g.exe 112 PID 664 wrote to memory of 4796 664 gU8ND0g.exe 112 PID 4796 wrote to memory of 1980 4796 powershell.exe 116 PID 4796 wrote to memory of 1980 4796 powershell.exe 116 PID 808 wrote to memory of 4564 808 powershell.exe 117 PID 808 wrote to memory of 4564 808 powershell.exe 117 PID 808 wrote to memory of 4564 808 powershell.exe 117 PID 4564 wrote to memory of 4432 4564 csc.exe 118 PID 4564 wrote to memory of 4432 4564 csc.exe 118 PID 4564 wrote to memory of 4432 4564 csc.exe 118 PID 1404 wrote to memory of 2428 1404 skotes.exe 121 PID 1404 wrote to memory of 2428 1404 skotes.exe 121 PID 1404 wrote to memory of 2428 1404 skotes.exe 121 PID 1404 wrote to memory of 224 1404 skotes.exe 127 PID 1404 wrote to memory of 224 1404 skotes.exe 127 PID 1404 wrote to memory of 224 1404 skotes.exe 127 PID 1404 wrote to memory of 4252 1404 skotes.exe 128 PID 1404 wrote to memory of 4252 1404 skotes.exe 128 PID 1404 wrote to memory of 4252 1404 skotes.exe 128 PID 1404 wrote to memory of 1716 1404 skotes.exe 129 PID 1404 wrote to memory of 1716 1404 skotes.exe 129 PID 1404 wrote to memory of 1716 1404 skotes.exe 129 PID 4916 wrote to memory of 4212 4916 MicrosoftEdgeUpdateTaskMachineCoreSC.exe 134 PID 4916 wrote to memory of 4212 4916 MicrosoftEdgeUpdateTaskMachineCoreSC.exe 134 PID 4916 wrote to memory of 4212 4916 MicrosoftEdgeUpdateTaskMachineCoreSC.exe 134 PID 4916 wrote to memory of 4212 4916 MicrosoftEdgeUpdateTaskMachineCoreSC.exe 134 PID 4916 wrote to memory of 4212 4916 MicrosoftEdgeUpdateTaskMachineCoreSC.exe 134 PID 4916 wrote to memory of 4604 4916 MicrosoftEdgeUpdateTaskMachineCoreSC.exe 135 PID 4916 wrote to memory of 4604 4916 MicrosoftEdgeUpdateTaskMachineCoreSC.exe 135 PID 1404 wrote to memory of 2584 1404 skotes.exe 138 PID 1404 wrote to memory of 2584 1404 skotes.exe 138 PID 1404 wrote to memory of 2584 1404 skotes.exe 138 PID 1404 wrote to memory of 3932 1404 skotes.exe 139 PID 1404 wrote to memory of 3932 1404 skotes.exe 139 PID 1404 wrote to memory of 3932 1404 skotes.exe 139 PID 3932 wrote to memory of 1056 3932 396c679d98.exe 140 PID 3932 wrote to memory of 1056 3932 396c679d98.exe 140 PID 3932 wrote to memory of 1056 3932 396c679d98.exe 140 PID 4604 wrote to memory of 1576 4604 powershell.exe 142 PID 4604 wrote to memory of 1576 4604 powershell.exe 142 PID 3932 wrote to memory of 3140 3932 396c679d98.exe 143 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 2644 attrib.exe 2612 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\766cc2b1f9e6dcc1f07a870fb0817f600252d758c09b5ad18466ca9b2a2a3644.exe"C:\Users\Admin\AppData\Local\Temp\766cc2b1f9e6dcc1f07a870fb0817f600252d758c09b5ad18466ca9b2a2a3644.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Users\Admin\AppData\Local\Temp\1010306001\XXM5y4g.exe"C:\Users\Admin\AppData\Local\Temp\1010306001\XXM5y4g.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4708
-
-
C:\Users\Admin\AppData\Local\Temp\1010410001\lnwtLq4.exe"C:\Users\Admin\AppData\Local\Temp\1010410001\lnwtLq4.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1540
-
-
C:\Users\Admin\AppData\Local\Temp\1010425001\XW5qFPl.exe"C:\Users\Admin\AppData\Local\Temp\1010425001\XW5qFPl.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -file "C:\Users\Admin\AppData\Local\Temp\ps72F.tmp.ps1"4⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ys0zpqra\ys0zpqra.cmdline"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES2304.tmp" "c:\Users\Admin\AppData\Local\Temp\ys0zpqra\CSC36F6CF407A1B4D10A070258EFA515628.TMP"6⤵
- System Location Discovery: System Language Discovery
PID:4432
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1010433001\gU8ND0g.exe"C:\Users\Admin\AppData\Local\Temp\1010433001\gU8ND0g.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Windows\SYSTEM32\attrib.exeattrib +H +S C:\Users\Admin\AppData\Roaming\MicrosoftEdgeUpdateTaskMachineCoreSC.exe4⤵
- Views/modifies file attributes
PID:2612
-
-
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\MicrosoftEdgeUpdateTaskMachineCoreSC.exe4⤵
- Views/modifies file attributes
PID:2644
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /f /CREATE /TN "MicrosoftEdgeUpdateTaskMachineCoreSC" /TR "C:\Users\Admin\AppData\Roaming\MicrosoftEdgeUpdateTaskMachineCoreSC.exe" /SC MINUTE4⤵
- Scheduled Task/Job: Scheduled Task
PID:3320
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell ping 127.0.0.1; del gU8ND0g.exe4⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Windows\system32\PING.EXE"C:\Windows\system32\PING.EXE" 127.0.0.15⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1980
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1010592001\1d6130a212.exe"C:\Users\Admin\AppData\Local\Temp\1010592001\1d6130a212.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2428
-
-
C:\Users\Admin\AppData\Local\Temp\1010593001\ca3c31fd94.exe"C:\Users\Admin\AppData\Local\Temp\1010593001\ca3c31fd94.exe"3⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:224
-
-
C:\Users\Admin\AppData\Local\Temp\1010594001\19e719e1a8.exe"C:\Users\Admin\AppData\Local\Temp\1010594001\19e719e1a8.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- System Location Discovery: System Language Discovery
PID:4252
-
-
C:\Users\Admin\AppData\Local\Temp\1010595001\137367a1ec.exe"C:\Users\Admin\AppData\Local\Temp\1010595001\137367a1ec.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1716 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1716 -s 16484⤵
- Program crash
PID:5640
-
-
-
C:\Users\Admin\AppData\Local\Temp\1010596001\9436bd2ae0.exe"C:\Users\Admin\AppData\Local\Temp\1010596001\9436bd2ae0.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2584
-
-
C:\Users\Admin\AppData\Local\Temp\1010597001\396c679d98.exe"C:\Users\Admin\AppData\Local\Temp\1010597001\396c679d98.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:1056
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:3140
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:1600
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:3180
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:4764
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:3320
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4636 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2024 -parentBuildID 20240401114208 -prefsHandle 1948 -prefMapHandle 1940 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {0c1f5c7d-0610-4c0a-b461-ab9151343452} 4636 "\\.\pipe\gecko-crash-server-pipe.4636" gpu6⤵PID:3996
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2448 -parentBuildID 20240401114208 -prefsHandle 2444 -prefMapHandle 2440 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a49ed14d-0ac4-40a6-bc95-7243d9fdbc3a} 4636 "\\.\pipe\gecko-crash-server-pipe.4636" socket6⤵PID:4420
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3208 -childID 1 -isForBrowser -prefsHandle 2968 -prefMapHandle 2944 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cfb6f5fa-6faa-4eff-b87d-f92fadb77e77} 4636 "\\.\pipe\gecko-crash-server-pipe.4636" tab6⤵PID:3692
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4052 -childID 2 -isForBrowser -prefsHandle 4216 -prefMapHandle 4064 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b43bcb1f-1998-43ac-839e-184f983209e4} 4636 "\\.\pipe\gecko-crash-server-pipe.4636" tab6⤵PID:5316
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4348 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4756 -prefMapHandle 4752 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9dd5264f-b63a-49c1-9245-f12199759f49} 4636 "\\.\pipe\gecko-crash-server-pipe.4636" utility6⤵
- Checks processor information in registry
PID:6104
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5072 -childID 3 -isForBrowser -prefsHandle 5064 -prefMapHandle 5060 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {774a27ec-cb67-4156-9c6f-06b001cc4657} 4636 "\\.\pipe\gecko-crash-server-pipe.4636" tab6⤵PID:6412
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5128 -childID 4 -isForBrowser -prefsHandle 5336 -prefMapHandle 5332 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d20928a0-4a0c-48fc-92ce-c0fd100520e6} 4636 "\\.\pipe\gecko-crash-server-pipe.4636" tab6⤵PID:6428
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5536 -childID 5 -isForBrowser -prefsHandle 5456 -prefMapHandle 5460 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e4d82fc9-fa0b-45d1-b68b-6aeaedd00782} 4636 "\\.\pipe\gecko-crash-server-pipe.4636" tab6⤵PID:6440
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1010598001\0efa46b852.exe"C:\Users\Admin\AppData\Local\Temp\1010598001\0efa46b852.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2868
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4020
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1056
-
C:\Users\Admin\AppData\Roaming\MicrosoftEdgeUpdateTaskMachineCoreSC.exeC:\Users\Admin\AppData\Roaming\MicrosoftEdgeUpdateTaskMachineCoreSC.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Windows\explorer.exeexplorer.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:4212
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell ping 127.1.0.1; del MicrosoftEdgeUpdateTaskMachineCoreSC.exe2⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\system32\PING.EXE"C:\Windows\system32\PING.EXE" 127.1.0.13⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1576
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1716 -ip 17161⤵PID:5616
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6288
-
C:\Users\Admin\AppData\Roaming\MicrosoftEdgeUpdateTaskMachineCoreSC.exeC:\Users\Admin\AppData\Roaming\MicrosoftEdgeUpdateTaskMachineCoreSC.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:6100 -
C:\Windows\explorer.exeexplorer.exe2⤵PID:6788
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell ping 127.1.0.1; del MicrosoftEdgeUpdateTaskMachineCoreSC.exe2⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:6796 -
C:\Windows\system32\PING.EXE"C:\Windows\system32\PING.EXE" 127.1.0.13⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5384
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD56cf293cb4d80be23433eecf74ddb5503
SHA124fe4752df102c2ef492954d6b046cb5512ad408
SHA256b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8
SHA5120f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00
-
Filesize
53KB
MD53341c22b37e2d64da556fdb016b45690
SHA1bfc7a93c96ad4ad7b503b7d67a30dd05cefc12c5
SHA256fbbb944a979c6fb8b4050e39977a8778dcd4662c09755ead816a75bb95fb8647
SHA512ded7f8add1236a634ac7aa12f402250a0ba38922db8879823088720fbaef617552e0ebdd427472078db3fe12fa0ce3594b9cf54e6a917c5f35534c28dc91e7e0
-
Filesize
53KB
MD5124edf3ad57549a6e475f3bc4e6cfe51
SHA180f5187eeebb4a304e9caa0ce66fcd78c113d634
SHA256638c51e173ca6b3469494a7e2e0b656021a761f77b4a83f3e430e82e7b9af675
SHA512b6c1a9051feeffad54ba1092fd799d34a9578368d7e66b31780fe478c1def0eb4094dce2879003f7389f2f9d86b94a3ef3975e78092a604597841c9b8db120ee
-
Filesize
1KB
MD5b0a78e60bfb279d18fd3d6e7a67411f5
SHA19344fe3654a14bc66afb9dc6ea215fabfbe5c906
SHA256a28890c82033d3deaf5770ecd1b0239c77321acc93704b1d4b1e167b91e30aeb
SHA5129548be23bec645cd705482f78d43b63659e38cf879c34f7071f42fd86ee02039379a5e92fbe0f1c74c12aaebabdd8002f57eba111d3e855cbd0c89a110e346f2
-
Filesize
1KB
MD5bb4769e4102fb9d0744e63c2499344bf
SHA16edd5dd2b4841718827439413a176af7e5a48a18
SHA256ce9d24bf86a4319180a6182c5462792c527716794251fb6926eb622557b015ee
SHA5125b1e99f37ee1d352b7e48af3671d6a6b81402daaa85829899dcbe1308fe5db55d57d674521bc6652aa09293c95fba76395f98be055c7f826a2520bd6f434c20e
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\activity-stream.discovery_stream.json
Filesize22KB
MD5710e7006ea8b5e58775432bcb3a09466
SHA10ed3be7e2cab57dc898385e984b975a3b4b6c6fd
SHA2567cf3108df1aa52f4e7f48d47feb7d7aa44859e6dc2b577d477c7c97ad341ad99
SHA5125593ad249b083304aad3f9598e8bcce80dfdff09c08de6ffcdf55fcd05abacd62daa037b0b31ec3368a1e52ab749b6ed312693d359a7129bc43965d15d13e732
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD5c8c4e2277c29c2d82d17ccdd5e87f41b
SHA1a28e8789eb23c86df1cd79ddde1a8f42b69b1304
SHA256f1fcdc8bee3fc79a4f86e7a0da8ff580867125ef5ca136c69c61b03383e67c05
SHA5121e5fb7d19e5fda1882fce5ede47cc81098b985ce9bbb226293eab08ddb49de1084542179fc7966a8a45a9b87011d07880ef589e4dc684696bb54929e433c7f78
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD5085752b7fa5c1aa2d057785c40b67d36
SHA161af193a0150b8e2a4285ada4124f825b3a6a916
SHA256d94d3c098b8bfcb801d63b78ecaa87415dc72f09e587744be9f9a58c1ceda13d
SHA512a7ebac8cda3b6b90d66e655ac73c3e8314861189901ba4f3ceae152ea8ba711b9b0e974839b3737f6891f22011d335846a1e674f583a9fde6a7ff773d9820c80
-
Filesize
4.0MB
MD514f4f9bee0a9b56c8993f1a65b520391
SHA1ba5a2f0cb27a753dbc33cd0b4eaa4f042aa01949
SHA256151c86eb2ad872cee3ccddc569c1ae99d93df55d2cf601070fb682da65894f93
SHA5128a73a00816a101fdaca29d57a2b76da46c3cbcdbc995d1f44b8f02bc0949b72a707b5dd92b96396e0b3c1de7ba65b22cf62eda24c8bc157fda4c6d938fee749c
-
Filesize
14.1MB
MD53475c7d37c7995451275305684114989
SHA1648098615ca3a981ff8154063ee78f95359a7769
SHA2567b029d45fdab9e8feee93e443b9b179c6d4010810ba2dde3f2611bf24a7f09a4
SHA5125154d0b550b5df31ea070e8000a50c970bf13020dd2a133e5648aac60c9958ed4f3a2ea8d6ad0e1f513e94b6352dda269fd27044aba33bb6ce88f6fe17f547af
-
Filesize
224KB
MD5dd15cf2bfc32f80e24ca203869cdf7a0
SHA1d65e41d3e892c26d31d64bd129d0de29b4729df2
SHA2563373ad6983c5f596d6c022403fabc1642b957de64b3d5ea7360a11d2c862c040
SHA51228f2ced84d162d86aea6dd508869292c484cd0907f338b9185500a1301144191e32eeb596833d4333c3ef819102887044007952ed93ba04dddbd8b23fd3b650b
-
Filesize
2.2MB
MD54c64aec6c5d6a5c50d80decb119b3c78
SHA1bc97a13e661537be68863667480829e12187a1d7
SHA25675c7692c0f989e63e14c27b4fb7d25f93760068a4ca4e90fa636715432915253
SHA5129054e3c8306999fe851b563a826ca7a87c4ba78c900cd3b445f436e8406f581e5c3437971a1f1dea3f5132c16a1b36c2dd09f2c97800d28e7157bd7dc3ac3e76
-
Filesize
1.9MB
MD5ac44247e8835b336845ad56b84583656
SHA1ff499dadf0fd0f90d3e156ba2d521367678be35e
SHA256e1a6fe984f3ffc681defb85678e20fb0fa1c4afe1a8e99dc974dc3253a04b371
SHA5120a9476d193084f2232301734cb558b2e5bf56e59d73c2e6f418c51c0592e4b350e19855c3b4a7ca95c19fe071baf3ff097ee0b68077d9976f68600a0266f15d5
-
Filesize
4.2MB
MD5904bbdf992562f081562d83ac2966973
SHA1bb2426df996af31757a32714d9cac9be302b18c6
SHA256db2f5c5f62b4da09b2766a8602ae6ca44ca104210147e7281322afb0f2735b39
SHA512e5ccf425fada85f53238db5a0539f5c8a3843aa1e39c7178c82430628456c37accf96fd0861a05a3a2a67742d28b6e315765126f039fdf3fdce6f963b3ce5d8e
-
Filesize
4.3MB
MD5d3a6b0fc90aa053987d7565f37e8e5fa
SHA1d04d066334694263685695bfd279b0f0db819e0b
SHA25645c2c4a4fea92e3f445fda74024cd2de21817fb29c476ba00d3f892b5c3afcb9
SHA51261fadc664f1de30c9e477f8e16c4fdf6ca8af317b851e042b25de7ece3f3285ada45ee77cdbc9523d541c67285ea1aae084ada21f457ca359faaf8bb9dfafdd1
-
Filesize
1.8MB
MD5c95e16fa85212d7cc42cc9f60bf9aff0
SHA1fb4b7cba8662fa25801a9391897b89003b5db01a
SHA2561de83d3da10d2ad6b08aeb687648d4ee5dd7226b69900e665668979f4157d3c1
SHA512ac099074dbe2563705bc501e4111330d65b4e50cde790f6f9926d2f31aa4a6f68ac9965f5dcce4ff9dfa4c5f87f173e3710cdc0e1e964f45e65c217fe07bcdab
-
Filesize
1.8MB
MD5920221b4876c778fad4ec6aad2d12c1e
SHA1a7996f976af7a68a7277f86e829bda7f8794ed15
SHA256916e3c38f646207dd403fb1a6d3d147b1c28073a8f4c6a2b246e9fa3d9b1c205
SHA5121011872e25ab03edc5423abd069eaa44e1501e2095bd5b54d4891c8e71614b6d1275e0b1fd691f91edabb340ca704f344c20efee03f863042f8421e162a93755
-
Filesize
901KB
MD5925eef0676269737c20b2059405b5d13
SHA131610b248537727b1311be39a1d8d1809b4af95a
SHA25615ee7f1968d130f455f69e5ce8c30a89097e02f589fd160993c7d9957208c777
SHA5123b5433270d63a5379039d72cee0edecd0c4e5c7b23ede97181b19543eadc9f9c25dc3dc7416d2f90ba37c8483818fd35f90f2405b834830d7fa49f6377de3a13
-
Filesize
2.6MB
MD520d566a1116bc4c2fc3ab0e1ec71a486
SHA1b5f26b08f112a496d83a700d97905a1e3136913c
SHA2566de56e6d486aa66998da88665456086a2c159b54db96cbab2fd600c4c5f6cf79
SHA512a896e317e46f3ec45c9f4a36a1128fca8d71075174665d9609d0e265009baad1f4450e7c904aee650aaf9b41eb44bec93e2bd13af7bc243e77dd6a514c6ad527
-
Filesize
1KB
MD57cefe55f289bc082efbad32629909492
SHA1eae06a27f23daa5a94c459ced48b39687e22327c
SHA256e1021a015c1e515233398fe986fecd2136fdaf9039784e85b5b26b6ab1c8f99d
SHA512c76e49fbfee965da303671560a44bbdc1c435613e471a5ee51d9036b7c95fd0bb62535c0a44cb1a2dadbb2ab1d3f55c4593e7c48591ca8a8925c97a1c719f502
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1.8MB
MD5ad432846853d57476d7b1b1063114709
SHA1ead985339d84415064720ac088cb12ff0ef0fe69
SHA256766cc2b1f9e6dcc1f07a870fb0817f600252d758c09b5ad18466ca9b2a2a3644
SHA512b73504caad497f34b9023f605c6f10bd1c81d779464f98bf624c1db48e73265cb6ac538f7ef5a8ee1e87f85c8c45a440da7ed77cf52e2c3078e1b31ccf9285e1
-
Filesize
4KB
MD56a67d58617fb9923f8b51746dab46333
SHA151d6afa54aa92c82f755511d3c9029e73b17ac9e
SHA256679d28798cf9618b7be8f7d6bd669c2f4501cec6e780d9f59510021742162a47
SHA51231a9915591bcce34cb0a139e93d29d56b740295eb6e1a7d5254f591fbf77bb007d6a28737f79959d86c0392486aa4f84a6f6ff64bb151d8dcb36ed5e177d8dfe
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
Filesize
3KB
MD507aabbf7650b2de0cd88d440f05b61b6
SHA1a87964a77aec61502ba228fa83f5ec0faaa5f604
SHA2566b0f1fb0ecafa786f2a66b11cc534fe45af3cdab39479f660b4ed1a3ff445160
SHA512275c31579abb50ade9bc8b96aafb231d6ad97589764526657dc52bad05f7e8b117b6ae616030a4d8a57697fb519a2b02c9b59f067b32a5c79e006e15c3c80bb8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\AlternateServices.bin
Filesize13KB
MD5c4922b3098f7e3a01c07674bbf18bf1b
SHA1cff3639142ce9fb6ecff4d1da528bfb81e15ba1b
SHA256f2ec2fce016e7f76eca556f2487d7859f0a060f48a80ff23379a2244de420851
SHA512fa8da9c630f2471a5d21476fd26f7063cd44f8a1387ee24dec7188d6d55ceb0aac8bfd8de5d89c9e263bef6e7b152f43485dcac8e9426d3a6cc3e4fa29a5645b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD569a91e008a223ae9598bfbf9e8c167a4
SHA1c598a672c308ead115c82c61f154325c35ccc854
SHA25614ce68f483c8a5d2f9ccc000f3a7d813ea3ebeacd78ce486ee0b0fa6d693f420
SHA512550e9e09e99863aa0cae4fdbf281a95ad914e39b43e1de90209969555780aab17f6f017f2ce586c0c17b3275007064c9d5daece0ccc71e29ff7f3a265e8cc846
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5addc2b5c077a9c3f7b324eb849b9d6e7
SHA1b23a0b7167090d32beb2f2b9700452d08f2c16fe
SHA2565d8e0e7288c8758b7d8cbc1baec19ffa03ccde994ba2c5443a02017bef814fa8
SHA512c0cf0b11d8731fec9abc6084babdfa2b3d3ffb73f9d238aec51372323bc7cdef166ca7dbf23ab1d7e3865522b6f5b6bedfdc27774056ce2717a82b18e45e3f5b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD539ce0dbb2e66f932af7e1cc1fa3f86b9
SHA16239c20c1bf884b44b2d250c21d0cfa043bab5ea
SHA2562f469cea84c4f4c196d56dd7d23dd044362f64be9cba59eb5d79dcbe60d4e202
SHA512fd3f0504c1c2242d337aaef1cc094062f643559e844dbe58527441993ec2a4a0ef68f583bf415c68d3f71b75762b9b53f630d53d2465f9bf9c81058e722afcc9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5eda7d35df8f4c1d0b26506cd5b05546f
SHA16f912f08edf7b33634b6135c4fc509925debd305
SHA25663b43823d726ee8f4835c07b9a463a38d7b4d974e439191c9c3d7afce6b9acb1
SHA51272f25c89df645df43343a66c95c81371a4bf878147cc73e37adee98b9da6356de637421a6c6bf3879459fd821d333588c0fcc07d00d86d2627be51615c6fee30
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\89e4f11d-5d48-45e5-b5e4-60840f13089b
Filesize982B
MD5574fa46b7ca664913523caabac335066
SHA174c8600d81714946af6ae7be3c6e938bb3fdffa3
SHA2567fd22dce52eb44e2a48da5f4c00f110b5e8bc818d2dffbd6eea6b489b6dd64c3
SHA5129bbce62271873909baf079a72ab1d9a49d2b815be88bd98320524da54d0394149d2a7b6f4fe83812a0d5069faa3dad807281daafb90ebbae6fcdef458d61e95b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\c03597b1-c6b5-415b-a800-62fd1904dbc0
Filesize28KB
MD5c68a1f9597f375e8ddfc7cf5a35dbd63
SHA1be7a719ef29ddbcec425ab0c79dfde955fb6e689
SHA25608c519db96057fb1b876ac95ecbe07f7f89414523119dde51a4008c48fc5f898
SHA512cb7ba1d5260cbbec34666b10b837d32c9e55777929f4b12f942aa2268bb7f0b79dd9e9afe4591c2d4eef0fe45f10fd236a22e9a1e9007765d057abdae03f8275
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\f9cfecaf-6df5-4e33-8c2d-b20f8c241632
Filesize671B
MD52f45b2fc23dae99c05945a77fce2cf78
SHA13b1418776f6f89942f34b0a4990475fa663a9a3e
SHA2567badf6c76fd484002be53f0df621adb254e136de0e54166b7847fe2645df737f
SHA51222db363cf74892b18b52c99740c6acb49709ef9db40bab827a8f9df44ed5829705c9d65e1cb95317b0b4ae9d1f027478158c6def7114337d3b4c318039e28b43
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
15KB
MD55fb4826b04b41de23f935e6f4d85bfc6
SHA14cf105eb4b13d2913b1537f93230db6460495dc5
SHA25647144e60d44e47f51a0bb269241d1003f0becb9576bbcf66139368b6ea7edc59
SHA5122a3026a40cb31e39745f81edef0fe48741b6f26ab44d64f65477c2912b809e32cf00489a41cfae91da14722bc833a3754fac1731ac8486f2fb4f8d6fb770ef93
-
Filesize
10KB
MD5cb625cba421d6277f5f109d0692f0f26
SHA14e765c8f80dc273c2c189842ca1b6317eb3de225
SHA256288d4ac1bac9eacf28d22255520d5269374b31e257fda093e2e5d8cb34690282
SHA512c802e58a2049b0e01ced6ad7b1932823e685861eee1bddae2486a807030d3534bbc3204522f12c115c6e70c06d00e9a8e0b3f2bedd93a165852a867a7ca9e0fb
-
Filesize
10KB
MD55f032acb5a528c0e5c03233f1e839f74
SHA1b6980ecdf20f6b0f90b142f7288f7161fded80c4
SHA2564bb7f54daac362f2247b9f1fecb7ff5ac2c16c0ee21d0d58b3efc5ad3b0ddb28
SHA512ad227f0e6fa7dfd6b4f3c385273e2aa58fcacce2d326a7da4f12ceb6da666b7fbf74e82dfcb1b3f6601443b58cee818a5d2a75f6c62b4f597386178fa576bf6b
-
Filesize
12KB
MD527eac4410204e0be353e0625f9926603
SHA14f2da2bae876244fcc1fa1c473911f58f889a8c7
SHA25667d77453cec70f135334487c8e4e2742979385f67938066f233ebdb0d87ee6a1
SHA512a3149485ae19834659ecc9040718d26fb64779e0445329ff623bc0899771fe237517dfeb9b3654356c3b387b90815b6430fceae54f1ae72239e6231318453ae8
-
Filesize
652B
MD5a95cbe73dda45479e05b9e028a0589f7
SHA18d47188b0f6cbfd3f07a72104761b5bc9ff5687e
SHA256b090481d73ed01dfc6fa05339da9612e4aaed652d9598aad1d5c96de51773a40
SHA51268d2a0643c98a72269fcec4ef65b35ce16ddca089927d0de2f9eb8482b1b018cece26459343c9372f33e79cd7812c524b0d8eb548487bfa010aafa24e29ed429
-
Filesize
512B
MD5a36c5dbd22147371b4ea6ffacb560fb6
SHA1e7248cd6a49d3aae9439efdffaceeacad6a7c523
SHA256fc874c6cbd59c24e83702e0cd6f301c4a929865687d8e0d041090a2bcd801a60
SHA512256b2e0beea6305f21024d60acdb0dcc84c2da46824d1c0610a9a22fa0e8c1753271140db278baf26e260c381f13001be1e8c651b01a178ca0922a2ab1bf4361
-
Filesize
369B
MD5186e265cf2b1c24f3817f8b134807ed5
SHA1a166f542522e63852961d4cd0e6d7a201b56972e
SHA256182da3daf20557fe0f1379de46051d238270b7c9b8ef51562351052afcfc59db
SHA512e9856165b221597af746b9fb66ecb69ea014cfb4007b747d24a9a3caf3ab412810bd50a5f826611a4971fdd4412de6835393ac53bfb4a0637695ac385de445a4