Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2024 13:12
Static task
static1
General
-
Target
6ab62c0214d54519bd6b67b7483cb12b30c0ff44ce4c3b37a23f6e13359f3b6b.exe
-
Size
6.7MB
-
MD5
c734ddf8670478beeb6a6cc4fbe37e31
-
SHA1
dcd9cadd264d6d4e3934fe04e642149b7fc7be66
-
SHA256
6ab62c0214d54519bd6b67b7483cb12b30c0ff44ce4c3b37a23f6e13359f3b6b
-
SHA512
a9340e9e9a6587cf09f0ce0c88662611be08a4ccc7e9eced4633f56056e87ede0a578ee56303f4f22ee1b5f9c1b4fb2c8b59ba96efc827b04a761aedb1fd66f0
-
SSDEEP
196608:k+P6n8mqb7h+bDMP93Fj9rHms6jBINIqZOjd1O:Ktqh+bIP93h4FqMjd
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
https://atten-supporse.biz/api
Extracted
stealc
drum
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
gcleaner
92.63.197.221
45.91.200.135
Extracted
cryptbot
Extracted
lumma
https://atten-supporse.biz/api
https://se-blurry.biz/api
https://zinc-sneark.biz/api
https://dwell-exclaim.biz/api
https://formy-spill.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://print-vexer.biz/api
Signatures
-
Amadey family
-
Cryptbot family
-
Gcleaner family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4O989c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4O989c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 9f5aa457a4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 9f5aa457a4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 9f5aa457a4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 9f5aa457a4.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4O989c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4O989c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4O989c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4O989c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 9f5aa457a4.exe -
Stealc family
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF a53c189fec.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 13 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4O989c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2J2225.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 90f1105f73.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rhnew.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3O58K.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2399fa05fc.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9f5aa457a4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 312480c537.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1r83T1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a53c189fec.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 26 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a53c189fec.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2J2225.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rhnew.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 90f1105f73.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9f5aa457a4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3O58K.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 312480c537.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 312480c537.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2J2225.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3O58K.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a53c189fec.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1r83T1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rhnew.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 90f1105f73.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2399fa05fc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9f5aa457a4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1r83T1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4O989c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4O989c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2399fa05fc.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 1r83T1.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 19 IoCs
pid Process 3640 w6s02.exe 4496 c3u44.exe 2992 1r83T1.exe 3408 skotes.exe 2008 2J2225.exe 4856 i1A5m12.exe 388 i1A5m12.tmp 2444 rafencoder.exe 1036 rhnew.exe 2948 90f1105f73.exe 4820 3O58K.exe 2280 4O989c.exe 748 2399fa05fc.exe 5104 fb6ab44ca5.exe 3776 9f5aa457a4.exe 5704 312480c537.exe 5896 skotes.exe 6140 a53c189fec.exe 1604 skotes.exe -
Identifies Wine through registry keys 2 TTPs 13 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 9f5aa457a4.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 90f1105f73.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 3O58K.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 2J2225.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine rhnew.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 4O989c.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 2399fa05fc.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 312480c537.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine a53c189fec.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 1r83T1.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe -
Loads dropped DLL 2 IoCs
pid Process 388 i1A5m12.tmp 2444 rafencoder.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4O989c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4O989c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 9f5aa457a4.exe -
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fb6ab44ca5.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1012387001\\fb6ab44ca5.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\9f5aa457a4.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1012388001\\9f5aa457a4.exe" skotes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6ab62c0214d54519bd6b67b7483cb12b30c0ff44ce4c3b37a23f6e13359f3b6b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" w6s02.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" c3u44.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\90f1105f73.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1012385001\\90f1105f73.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2399fa05fc.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1012386001\\2399fa05fc.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000b000000023b94-180.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 13 IoCs
pid Process 2992 1r83T1.exe 2008 2J2225.exe 3408 skotes.exe 1036 rhnew.exe 2948 90f1105f73.exe 4820 3O58K.exe 2280 4O989c.exe 748 2399fa05fc.exe 3776 9f5aa457a4.exe 5704 312480c537.exe 5896 skotes.exe 6140 a53c189fec.exe 1604 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1r83T1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 5328 1036 WerFault.exe 107 5528 2948 WerFault.exe 109 5520 2948 WerFault.exe 109 -
System Location Discovery: System Language Discovery 1 TTPs 27 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9f5aa457a4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c3u44.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language w6s02.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage fb6ab44ca5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 312480c537.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2J2225.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language fb6ab44ca5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 90f1105f73.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4O989c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6ab62c0214d54519bd6b67b7483cb12b30c0ff44ce4c3b37a23f6e13359f3b6b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language i1A5m12.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language i1A5m12.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rafencoder.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3O58K.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2399fa05fc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a53c189fec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1r83T1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fb6ab44ca5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rhnew.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 4092 taskkill.exe 1996 taskkill.exe 2532 taskkill.exe 3116 taskkill.exe 4780 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings firefox.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 46 IoCs
pid Process 2992 1r83T1.exe 2992 1r83T1.exe 2008 2J2225.exe 2008 2J2225.exe 3408 skotes.exe 3408 skotes.exe 388 i1A5m12.tmp 388 i1A5m12.tmp 1036 rhnew.exe 1036 rhnew.exe 2948 90f1105f73.exe 2948 90f1105f73.exe 4820 3O58K.exe 4820 3O58K.exe 2280 4O989c.exe 2280 4O989c.exe 748 2399fa05fc.exe 748 2399fa05fc.exe 2280 4O989c.exe 2280 4O989c.exe 2280 4O989c.exe 5104 fb6ab44ca5.exe 5104 fb6ab44ca5.exe 3776 9f5aa457a4.exe 3776 9f5aa457a4.exe 5104 fb6ab44ca5.exe 5104 fb6ab44ca5.exe 3776 9f5aa457a4.exe 3776 9f5aa457a4.exe 3776 9f5aa457a4.exe 5704 312480c537.exe 5704 312480c537.exe 5896 skotes.exe 5896 skotes.exe 6140 a53c189fec.exe 6140 a53c189fec.exe 6140 a53c189fec.exe 6140 a53c189fec.exe 6140 a53c189fec.exe 6140 a53c189fec.exe 6140 a53c189fec.exe 6140 a53c189fec.exe 6140 a53c189fec.exe 6140 a53c189fec.exe 1604 skotes.exe 1604 skotes.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 4092 taskkill.exe Token: SeDebugPrivilege 2280 4O989c.exe Token: SeDebugPrivilege 1996 taskkill.exe Token: SeDebugPrivilege 2532 taskkill.exe Token: SeDebugPrivilege 3116 taskkill.exe Token: SeDebugPrivilege 4780 taskkill.exe Token: SeDebugPrivilege 1504 firefox.exe Token: SeDebugPrivilege 1504 firefox.exe Token: SeDebugPrivilege 3776 9f5aa457a4.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2992 1r83T1.exe 388 i1A5m12.tmp 5104 fb6ab44ca5.exe 5104 fb6ab44ca5.exe 5104 fb6ab44ca5.exe 5104 fb6ab44ca5.exe 5104 fb6ab44ca5.exe 5104 fb6ab44ca5.exe 5104 fb6ab44ca5.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 5104 fb6ab44ca5.exe 5104 fb6ab44ca5.exe 5104 fb6ab44ca5.exe 5104 fb6ab44ca5.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 5104 fb6ab44ca5.exe 5104 fb6ab44ca5.exe 5104 fb6ab44ca5.exe 5104 fb6ab44ca5.exe 5104 fb6ab44ca5.exe 5104 fb6ab44ca5.exe 5104 fb6ab44ca5.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 5104 fb6ab44ca5.exe 5104 fb6ab44ca5.exe 5104 fb6ab44ca5.exe 5104 fb6ab44ca5.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1504 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3576 wrote to memory of 3640 3576 6ab62c0214d54519bd6b67b7483cb12b30c0ff44ce4c3b37a23f6e13359f3b6b.exe 83 PID 3576 wrote to memory of 3640 3576 6ab62c0214d54519bd6b67b7483cb12b30c0ff44ce4c3b37a23f6e13359f3b6b.exe 83 PID 3576 wrote to memory of 3640 3576 6ab62c0214d54519bd6b67b7483cb12b30c0ff44ce4c3b37a23f6e13359f3b6b.exe 83 PID 3640 wrote to memory of 4496 3640 w6s02.exe 84 PID 3640 wrote to memory of 4496 3640 w6s02.exe 84 PID 3640 wrote to memory of 4496 3640 w6s02.exe 84 PID 4496 wrote to memory of 2992 4496 c3u44.exe 85 PID 4496 wrote to memory of 2992 4496 c3u44.exe 85 PID 4496 wrote to memory of 2992 4496 c3u44.exe 85 PID 2992 wrote to memory of 3408 2992 1r83T1.exe 86 PID 2992 wrote to memory of 3408 2992 1r83T1.exe 86 PID 2992 wrote to memory of 3408 2992 1r83T1.exe 86 PID 4496 wrote to memory of 2008 4496 c3u44.exe 87 PID 4496 wrote to memory of 2008 4496 c3u44.exe 87 PID 4496 wrote to memory of 2008 4496 c3u44.exe 87 PID 3408 wrote to memory of 4856 3408 skotes.exe 96 PID 3408 wrote to memory of 4856 3408 skotes.exe 96 PID 3408 wrote to memory of 4856 3408 skotes.exe 96 PID 4856 wrote to memory of 388 4856 i1A5m12.exe 98 PID 4856 wrote to memory of 388 4856 i1A5m12.exe 98 PID 4856 wrote to memory of 388 4856 i1A5m12.exe 98 PID 388 wrote to memory of 4700 388 i1A5m12.tmp 99 PID 388 wrote to memory of 4700 388 i1A5m12.tmp 99 PID 388 wrote to memory of 4700 388 i1A5m12.tmp 99 PID 388 wrote to memory of 2444 388 i1A5m12.tmp 101 PID 388 wrote to memory of 2444 388 i1A5m12.tmp 101 PID 388 wrote to memory of 2444 388 i1A5m12.tmp 101 PID 4700 wrote to memory of 4844 4700 net.exe 102 PID 4700 wrote to memory of 4844 4700 net.exe 102 PID 4700 wrote to memory of 4844 4700 net.exe 102 PID 3408 wrote to memory of 1036 3408 skotes.exe 107 PID 3408 wrote to memory of 1036 3408 skotes.exe 107 PID 3408 wrote to memory of 1036 3408 skotes.exe 107 PID 3408 wrote to memory of 2948 3408 skotes.exe 109 PID 3408 wrote to memory of 2948 3408 skotes.exe 109 PID 3408 wrote to memory of 2948 3408 skotes.exe 109 PID 3640 wrote to memory of 4820 3640 w6s02.exe 111 PID 3640 wrote to memory of 4820 3640 w6s02.exe 111 PID 3640 wrote to memory of 4820 3640 w6s02.exe 111 PID 3576 wrote to memory of 2280 3576 6ab62c0214d54519bd6b67b7483cb12b30c0ff44ce4c3b37a23f6e13359f3b6b.exe 112 PID 3576 wrote to memory of 2280 3576 6ab62c0214d54519bd6b67b7483cb12b30c0ff44ce4c3b37a23f6e13359f3b6b.exe 112 PID 3576 wrote to memory of 2280 3576 6ab62c0214d54519bd6b67b7483cb12b30c0ff44ce4c3b37a23f6e13359f3b6b.exe 112 PID 3408 wrote to memory of 748 3408 skotes.exe 113 PID 3408 wrote to memory of 748 3408 skotes.exe 113 PID 3408 wrote to memory of 748 3408 skotes.exe 113 PID 3408 wrote to memory of 5104 3408 skotes.exe 114 PID 3408 wrote to memory of 5104 3408 skotes.exe 114 PID 3408 wrote to memory of 5104 3408 skotes.exe 114 PID 5104 wrote to memory of 4092 5104 fb6ab44ca5.exe 116 PID 5104 wrote to memory of 4092 5104 fb6ab44ca5.exe 116 PID 5104 wrote to memory of 4092 5104 fb6ab44ca5.exe 116 PID 5104 wrote to memory of 1996 5104 fb6ab44ca5.exe 118 PID 5104 wrote to memory of 1996 5104 fb6ab44ca5.exe 118 PID 5104 wrote to memory of 1996 5104 fb6ab44ca5.exe 118 PID 5104 wrote to memory of 2532 5104 fb6ab44ca5.exe 120 PID 5104 wrote to memory of 2532 5104 fb6ab44ca5.exe 120 PID 5104 wrote to memory of 2532 5104 fb6ab44ca5.exe 120 PID 5104 wrote to memory of 3116 5104 fb6ab44ca5.exe 122 PID 5104 wrote to memory of 3116 5104 fb6ab44ca5.exe 122 PID 5104 wrote to memory of 3116 5104 fb6ab44ca5.exe 122 PID 5104 wrote to memory of 4780 5104 fb6ab44ca5.exe 124 PID 5104 wrote to memory of 4780 5104 fb6ab44ca5.exe 124 PID 5104 wrote to memory of 4780 5104 fb6ab44ca5.exe 124 PID 5104 wrote to memory of 4444 5104 fb6ab44ca5.exe 126 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\6ab62c0214d54519bd6b67b7483cb12b30c0ff44ce4c3b37a23f6e13359f3b6b.exe"C:\Users\Admin\AppData\Local\Temp\6ab62c0214d54519bd6b67b7483cb12b30c0ff44ce4c3b37a23f6e13359f3b6b.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w6s02.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w6s02.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c3u44.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c3u44.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1r83T1.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1r83T1.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Users\Admin\AppData\Local\Temp\1012382001\i1A5m12.exe"C:\Users\Admin\AppData\Local\Temp\1012382001\i1A5m12.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Users\Admin\AppData\Local\Temp\is-EBOAT.tmp\i1A5m12.tmp"C:\Users\Admin\AppData\Local\Temp\is-EBOAT.tmp\i1A5m12.tmp" /SL5="$90234,3291517,54272,C:\Users\Admin\AppData\Local\Temp\1012382001\i1A5m12.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" pause raf_encoder_12528⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 pause raf_encoder_12529⤵
- System Location Discovery: System Language Discovery
PID:4844
-
-
-
C:\Users\Admin\AppData\Local\RAF Encoder 1.0.1.55\rafencoder.exe"C:\Users\Admin\AppData\Local\RAF Encoder 1.0.1.55\rafencoder.exe" -i8⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2444
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1012384001\rhnew.exe"C:\Users\Admin\AppData\Local\Temp\1012384001\rhnew.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1036 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1036 -s 16687⤵
- Program crash
PID:5328
-
-
-
C:\Users\Admin\AppData\Local\Temp\1012385001\90f1105f73.exe"C:\Users\Admin\AppData\Local\Temp\1012385001\90f1105f73.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2948 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2948 -s 16367⤵
- Program crash
PID:5520
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2948 -s 16567⤵
- Program crash
PID:5528
-
-
-
C:\Users\Admin\AppData\Local\Temp\1012386001\2399fa05fc.exe"C:\Users\Admin\AppData\Local\Temp\1012386001\2399fa05fc.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:748
-
-
C:\Users\Admin\AppData\Local\Temp\1012387001\fb6ab44ca5.exe"C:\Users\Admin\AppData\Local\Temp\1012387001\fb6ab44ca5.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4092
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1996
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2532
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3116
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4780
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵PID:4444
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1504 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2024 -parentBuildID 20240401114208 -prefsHandle 1952 -prefMapHandle 1944 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {bd2c5b1d-4533-416b-aefa-7f6e9d114a00} 1504 "\\.\pipe\gecko-crash-server-pipe.1504" gpu9⤵PID:1888
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2456 -parentBuildID 20240401114208 -prefsHandle 2432 -prefMapHandle 2420 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {affaf08f-ccbe-484f-a6a7-e5d1e3850234} 1504 "\\.\pipe\gecko-crash-server-pipe.1504" socket9⤵PID:2392
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3172 -childID 1 -isForBrowser -prefsHandle 3208 -prefMapHandle 2676 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1284 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e0433201-c1c7-456f-95cc-b69abfdccec2} 1504 "\\.\pipe\gecko-crash-server-pipe.1504" tab9⤵PID:1656
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4052 -childID 2 -isForBrowser -prefsHandle 4044 -prefMapHandle 4040 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1284 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9e736036-5859-4be2-981a-26a260be2849} 1504 "\\.\pipe\gecko-crash-server-pipe.1504" tab9⤵PID:4132
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4596 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4592 -prefMapHandle 4624 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5f607623-57d8-495d-ab34-cb5180802cc2} 1504 "\\.\pipe\gecko-crash-server-pipe.1504" utility9⤵
- Checks processor information in registry
PID:5424
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5208 -childID 3 -isForBrowser -prefsHandle 5228 -prefMapHandle 5224 -prefsLen 27097 -prefMapSize 244658 -jsInitHandle 1284 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {43371a76-51e1-48e2-8c7a-2e575bc53d68} 1504 "\\.\pipe\gecko-crash-server-pipe.1504" tab9⤵PID:7520
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5372 -childID 4 -isForBrowser -prefsHandle 5452 -prefMapHandle 5448 -prefsLen 27097 -prefMapSize 244658 -jsInitHandle 1284 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5ae7f1c2-c30e-4a40-a8d5-0e227880ea0e} 1504 "\\.\pipe\gecko-crash-server-pipe.1504" tab9⤵PID:7592
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5584 -childID 5 -isForBrowser -prefsHandle 5592 -prefMapHandle 5596 -prefsLen 27097 -prefMapSize 244658 -jsInitHandle 1284 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {94c2261f-94b2-44d4-b164-b9743c3bbc35} 1504 "\\.\pipe\gecko-crash-server-pipe.1504" tab9⤵PID:7640
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1012388001\9f5aa457a4.exe"C:\Users\Admin\AppData\Local\Temp\1012388001\9f5aa457a4.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3776
-
-
C:\Users\Admin\AppData\Local\Temp\1012389001\312480c537.exe"C:\Users\Admin\AppData\Local\Temp\1012389001\312480c537.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5704
-
-
C:\Users\Admin\AppData\Local\Temp\1012390001\a53c189fec.exe"C:\Users\Admin\AppData\Local\Temp\1012390001\a53c189fec.exe"6⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:6140
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2J2225.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2J2225.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2008
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3O58K.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3O58K.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4820
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4O989c.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4O989c.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2280
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1036 -ip 10361⤵PID:5288
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2948 -ip 29481⤵PID:5388
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 2948 -ip 29481⤵PID:5396
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5896
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1604
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
3Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\activity-stream.discovery_stream.json.tmp
Filesize22KB
MD5235b331e3dbdaed98174fa34a495d74c
SHA10ae43ee29fd4663978368b1e3fc3d89d54edde81
SHA256bc152ed352e41b61258fcb06d6f0e594cfb11ba2016918ee512d882eb83bd4a2
SHA512a7fab0ca4fb31567cdd0d49199dc12e141b0808b44e3f59c59c804beff5542860af5b965b6720adc2e4adf8896834e6743702c4edabbef0822eb9cb44127d7e1
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\cache2\entries\0EA2E1AC3653A248EDE38E975FF2A4ADDA308244
Filesize480KB
MD599f4dca564173fc1305cb6be80a31ae3
SHA11a2a352bfb5dc251bb3ec04b8515ba84bba29bd7
SHA2563c0dab9a0b74cf081b456fea6de061335d8bf3e323432f8e63df4ce9252f347c
SHA512370400963be62c816828a56c19418651d5baa0940ce29187a2b28e5538f4392c7d346afdf6fc8997e81eaf4c6f27dca08ab64779d36e9a053bd480b14e9021ff
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD5ecc0d35e58eaf662516a6195c5e7fe08
SHA199bc63bd3014abd14865624633570bede6581402
SHA256b32deac68c78cb55ed4a53c8e26d111684030704ed50de2a09f6a5b698cd81b5
SHA51207aab726981ab9ec088a14d5d2f6a49b75b03c881b80ad98e4d7451c6471b05230ef6da9e39b57adf3cff4e221a6ba4021c6ad12df5423ec1d16d30ca6acac97
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
2.8MB
MD5b466bf1dc60388a22cb73be01ca6bf57
SHA121eb9665e42d6c4a8d9e764627049b2a6e3a69a4
SHA256e5f0f0c3383080fc2702779e3040c490ab022af69a4bc8c61bf9b1f6514ae7ad
SHA5126cb51dae17b3bcef6254ecf6538ecc49cdd53c40c979fd743f49987b28d05c033781b1047dbf25b203b02bf70ce4205dcc1cc5bbea46119cb0e2cd0ce140cbe2
-
Filesize
630KB
MD5e477a96c8f2b18d6b5c27bde49c990bf
SHA1e980c9bf41330d1e5bd04556db4646a0210f7409
SHA25616574f51785b0e2fc29c2c61477eb47bb39f714829999511dc8952b43ab17660
SHA512335a86268e7c0e568b1c30981ec644e6cd332e66f96d2551b58a82515316693c1859d87b4f4b7310cf1ac386cee671580fdd999c3bcb23acf2c2282c01c8798c
-
Filesize
3.4MB
MD53a16d0e4e4522073da3c8a5a9f9e790b
SHA17a42a21a348d2e49c67b426d333a5c354ed2c83e
SHA256ccc4dd64df98c26da462a17a8df9f927d02e202d88ada8cfba92b7bbeb954c3e
SHA5121213c3e077b660afa65133f0b5943bd866f02d736284791dc99ae4d30c6ed7705eb55999cb4a3be1cc0a394111904154bc72a2d0f1fdc453893ecf9a4a25b99a
-
Filesize
1.8MB
MD5f7286fef9317fe91e24cda721ec0be81
SHA10e0197c0f87200f7c1ebb4bba314f7bb875a638c
SHA2564dcf1cc20990dace1f3e7c5a4b94ea7b823f90eb6de639b2b1b6494838f1cc62
SHA512314b3f5cf1a0c15db568d33647b97887b37e987ba253ee9f5ded045446328307ebd04acd832fbdf66ad29be9510bd0c378e2fcb889509dca84df9b9106602c6e
-
Filesize
1.8MB
MD58679b0deef4b3d4f9cd8f90d0b339072
SHA1ca4b77ad94e677808c5f830c0dd1912c0ae73636
SHA2560d1fea700dd2a7efde5e2b34ad0416bcb65200b6253297c9b3fa157ca7d581b3
SHA512502f101ccc1ba0fc03d6f68dd19768befc7ff84be3a0eba94ee66d0b75465ad48543636e486e9dd7cb879150b449ae324b7ee924e379bd3c43e9488b2a411b20
-
Filesize
4.9MB
MD5941507da4995f8296b61a3a35d8b406d
SHA1a90f5209ca0d56938957ed8f5122de984e6ebbe4
SHA25650e4484fb6ee4b27ba6e22b5d65e5da71a5699e92999cc0ea450d5c90f3b5361
SHA5129762bca1fe65fcd816dc08e45a167a3321ee50778161a8241f0f42cb573528d9ffd714857d31192033b25f5654b2f3ec5e655c2238a7756403d77bf227109efd
-
Filesize
948KB
MD55d07496592fcbb447233327756e6605f
SHA18b443c3fe93a1da708859be38bb3f54b3b749a55
SHA256844bfb44822d04e6ddfebd86492bb85af519234b1675e178402f7f61723bee8e
SHA512ebbc673400d148251458067b41b9139ab36015a8802724b1e92b3b7196a597807c475fc18b04817ec6fe17ba831a24fcbdd4f561cd879d77a8cdca15e23f5a82
-
Filesize
2.7MB
MD5a5ebf91bcc1e092e07a46d6c90127358
SHA119459f6f1a555563c2f86d1ddd48072e2f5e32a2
SHA256af6c8125aaedec62ccfc4eec54c4dd8687c4baec2c82b968997c2410f360b553
SHA5125fb412413b505da08effcc0f5e59f53491796d826a14b3e4878b010788aa3c5532dfcacb08c1f248c31466b64e17a62aa9718d8084883fefd5de1ffa3c857b5f
-
Filesize
1.9MB
MD56d00ea43be88c32392e2a3b543d0a1f4
SHA11dfb0cb50425d6bf72467ae0894d614f26f0b987
SHA256747ebc458a95ab80f371b899d4b6e54eaefba46bf5343ae39eeeafba61ba8365
SHA512f111a1b9812891d9ddda571e798545743ff9628bcf2c258a9fcb34a89b3d5286a2882d9d635c16062d974aac4d11904ac95fcbb45ecce38aa0e314cba7e7bbbf
-
Filesize
4.3MB
MD572950603b12d5d99f2ebcedeb3aed5d6
SHA13587c298d27279b481f9efa0c02be575b6a06599
SHA25676d86e157a4fa1f1b3abf649b931cdc91af733e2b50a863cc9a1dcbb131148b4
SHA5121fbcb1f8793eab0107924f6ec8789eb1752fd39eb4683193b6962803911abbb7ff1d05a362dec349c768e656f7f84144150b06a35e13f74d60afe422cbb407c8
-
Filesize
2.6MB
MD580a4a9bd8cdb150cbc228ad88557260f
SHA1057931385a2bd410d5c5502a2f6461471fa0377f
SHA25610ee97136471d63c17d88a987c7b7282b87c2456f7082310c79fe9c2b6e6ffa1
SHA512ff5117d04af0459b8dc7f6f747026fbc9538954db44489d151a85cdcc238563964593326691dcfa440b6ab379e276074c2c9f231255cd5b844e1bb5cce8a0146
-
Filesize
5.2MB
MD5869630a6dbdd3f32b0e1ea30dfa80abe
SHA1225748e2099496f0c2799491fe5471b80deac1d5
SHA256fb46fb0d2038f1ca1ef5a153130f5b930dcb7dd0c456536e5417c0f26639c366
SHA51227905cb6a136ae4ad21d527d1c307215da5f18955b2761ee25f874eed0fdccba8ed52ebbf3289febb2b3b30576e6fcfa251706bc46804f4dc760670eb6b216b1
-
Filesize
4.9MB
MD5834caa1ea7e5fadc7aa0735eed542c0e
SHA11c077c5230136337722a6c127ddbe2ebb49f67b3
SHA256c6502746b552f7a74d91fd5e6574e5059b6e4a6b027f1b3ca68a2d604756c074
SHA5124d8e99d401c0025c38eae93a8b6b41804e83a104a92753eb4a48e9d27c6c901948d7ca0cebaf6771031259039346bb3a2582cce32550bfcba06757edd9b1fe7d
-
Filesize
3.6MB
MD5bdba6366ae217739e5962428725c5c8b
SHA134e40c21b761e2b570e890dc8ea3b25b14b9cf77
SHA2560a0a72d2f739500b96b5f0005c11900f56eb2c6c0de0306cb4aea792d548d3c6
SHA512459fabd83792bffe865c32e528ba888444e5f3b680bd80f7e5e92b3d55491e098fc6d49d182144516d893bc0edca17fd456c6523e667789dc57444701ef5463a
-
Filesize
3.1MB
MD5a398cef26b922bac9e24be75f0bd85e6
SHA1050ccebd0d1ba7e648f6ea1f9eb04d7a526e97e4
SHA25653db2aba7ab8228cb7ab85108918241ce77e527d7688d2590d5b5c5c69e3b83f
SHA51283ab8015f358fb70bfe4fc1f83a8a62c20b0e610f93bd774334258bd7c56e46764e73f210b703759f6f05f627b33c4d7f6c1a2ce52861367aadad17f5e7ca061
-
Filesize
1.8MB
MD58c230debcaa0241cdf437c61b620b77a
SHA19a16380b7a2f8328b04f060791f7ad52466c374f
SHA256572a83147fc938c1ff176431438955f77fc5dd10cedca752fd7da8bab4506b6d
SHA512de539b4e190bc279969ba97513da91d903fef0eae7d91844f820665e9c1ebd303c5641b39229f5810771d7a590842bd30f41c3627ec694bc2799ce06a1a22132
-
Filesize
689KB
MD5e672d5907f1ce471d9784df64d8a306b
SHA16d094cae150d72b587c5480c15127d7059e16932
SHA2569f9250be71bd6254790a9630990f4560d53995db3d8737b7f49986e3551283e5
SHA5129cf10e997d8d99e6eb2f6ccac00ab365f63e03d96c2e2354fdf67683b85553a60cd9542cfb21cbea468c6a2bda454cde71937c0d21c4b738451b5e2c30690c39
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\AlternateServices.bin
Filesize17KB
MD50d4260f3d817063880a92973104e8eff
SHA17f65bbd143ac7134e7e70d14db5219f4f72443fb
SHA2568d5946b644b2ef417f5ce09a99cd05ba750dd2c3550015f160ad329a76d3c3eb
SHA512eeb7bc7866e83bb2010f6f3ea10199fd2942f6d97d2678047089ff6620f5d544acb753d945718b57e980b837ae6cb7e9490ac96a5af9cf3248ff52a0396da427
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\AlternateServices.bin
Filesize7KB
MD5f363cdbcd27e44ec771eb3e8fa812969
SHA1b70badb299b3bace58f29c133d58c5b506a5900b
SHA256543b8a431e312ae8bb735355742229fab081ea66d0edc55de4ba1e075cc8a5cd
SHA512aa4e7cd2840848d7f3c84eeac105b35413094f4668fbb56d7b889163f3f23c5c4da21d102f89fb1e89da264eb8932da9dd7d9cb6ce415993d25b11ad263c9a37
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\AlternateServices.bin
Filesize8KB
MD5129f995c094a2ae33d04d8d7b539b06c
SHA12d9a805c1881343a792dd4bac31bd12705ee1931
SHA25677603dfa03a07649acaa23c5a0d21d4bee214f6e3fb31e7abeebdd4909c2b939
SHA5129b818dc7315908cacb528151ddd07b4407f35557bc47eb6a4b4168adb0a7093ce6a8438de4ebf0b673ec8076e8a7cbc595f74e3bc487d959d726021b247ae1b9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.bin
Filesize28KB
MD58661b13dafd1b94584d73ff3fa5254ff
SHA1b20838ec16df48f2510657e57171930e226c355c
SHA25687282770512f2ea773fec5736d0b7880dabb14c2dee6e782527af6b32e06bfa3
SHA5122214569731c655f9fb30f3b9832e7527e65569f62cf70f8268769ebbce459ea2f370a53e577692559280e483a7522f629f31fdfd4f0166304571af2ba4a40c73
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.bin
Filesize23KB
MD54ea9d862dc3b62e00a7c7de27d06a62c
SHA15d853e2691f2e978023e1516a73d2e89c668562a
SHA25606b9746c3ceb8592ac31b4f0df0f08dfe6ee6067c6d16c193a2626439bf28bf2
SHA5126613cd3353a44902157535fa094d03d2ced6026e8b14030267e627c7cf21991daa77cce121933effb804b7771572a25b66118b5ff7b74852107fe885017291ad
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.bin
Filesize6KB
MD58d3a25c6435a8f235c3c000d0dc0e61c
SHA109b75bac2ed40aa6d98366ab92c18cf20a3da26d
SHA2567d3ea6a3d1edb7a22c4ca61aa43eb953459d5acd166e18b0c275c7bc6ac44484
SHA512ef192f49c0ceff6e5471d86d251ece215e353d587b3a1bc3193a34a7432ca1815cc3738ec770c7deffa22fa8a72bc157b6b91c96eb45a6bfbe7b842874da98cc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize28KB
MD5b3a885f228d2a20266d46bc785e9a151
SHA190dbb90fc2b2c4b045ac2d861e72e7125fe344dc
SHA256baccc2a7fc544b02c56dca9bf7022c60a02fc0d7187f7640a62585dd4ef51029
SHA5126393faa906a3c90ab234c1d4ea22953d9f0df3d877a6635450e8e51c8381a8b033ec1691ddeae0e0b0e6250c8442caffe864bd53590e6bc852c4328c3227997a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize28KB
MD5bce04deb47dd05dc2b7daac31d2ea930
SHA161366aad89912be0742fa6f756887af5afe44187
SHA25638412a45e69cc2bf5f06554296d7f01487eaa8a3304a5667eaa40cc1a6ed8cde
SHA5123039ac62f1dffa6ac6f14611474e0157b85eda58589badca3a64f33c803cadf5e51c7ff4f6ef3742a72f800e3fb6ff44ec11d1170cffe0746ce30c03f86b5b22
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize28KB
MD50c35a62f1b03bef245e1f3863ba9778c
SHA102917e80ff2f2ab3ab75835d69aa788639afb989
SHA2566cb34ea5b1efe0f59f6c8e97f4df43c18a42aa3918185c3457b4eab310edda17
SHA5128358806a5a53268b2d041657cb6d34b2f38d530da6205edd6d315466bc4e55bce6027ef55fc6bc8a31c120a16cf8decc96c6ceff0d2c0ba7565aeeb0a95eda2d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD56afed77096af4aa985597567a64c9a78
SHA10e0bda12b8e6a98d05bd2cb4ed9e59fad41cf8e1
SHA2563cc1c1ade2cb77535b78cab0ce5db5af68a56ab808120293c2f2bb88c9de4c95
SHA512e9f795012db88deba359c97011e749dc3ea906cf835c4990c1b82ff92161ec0eb9fe0b13dfa3e9c2b1a5b094f70e645172a63b9a1a76567468dafdbfafebc35e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD55f4bcf79def8b082b722108c7e0403d8
SHA11ffc94c20cde12c3321baee421bd516b466a7e4d
SHA2560117363e6f2068c76484b44169d6de8c5d5aae30e04c87cc3a6cf9312e5dc173
SHA512308849eaf95be3e1481e639747274d70adac5a6938921e944e9e92e7df42c1e654b4d23e3e8c11840126994047ad825dffee0b5f75f58de0fc02443d9d3561a2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\a9e91666-fbbb-4ce9-a840-f8a11f424160
Filesize671B
MD553192bbcc14cb29af517ed6bb44bd41d
SHA1718033e6e65d146f594aa4db529585e32816a703
SHA256f473f40ffd3a15c0ca165d611277e7599acfade609d55dd256a2a1c22d7b1655
SHA5127dd347daaa3881f346d96e8cfa734ac7e53a4b74644b2e411d43dab98c7ae5ada0d45888dbfe53f8d1897f4fbfb4334e68ba1565f5f01a602c60553e9742bc3e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\ca8cee00-6f56-4c2f-8518-1761e933eecd
Filesize29KB
MD583b8bc26312ad7b3fef735fe3b6278e6
SHA1932810016cdae0a745fc16e78464e5f0dea1d8f7
SHA2566213d31e5af66b6f415bc21cd5b4181d362a7e878fa3d8c9c7f42baac068d827
SHA5120447b398c75cc75b3e2de6200b6acba790eec4774764b1b7e0549308d01b633b22de2027648b6420a8aa9f639cc470222c00ee401e98649800cedaaed3442c64
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\dd6eeb49-7edd-4dc6-a3a4-55f36584dca7
Filesize982B
MD534b5fc1c23b20af8cdc58f1d3c68d968
SHA191a3f8b6ba0fe44d72ae06552ae1161b488ee04d
SHA2562da11259fd171f6490fb1010501ac5edc0bc984d7a53c1c79ea969e15e963c54
SHA51257374632f37f9138b8c80d3e7a768cdd7b5f50e9565ca4e3aa7074309175e0183734a784825f30cf924dcb503cbf914210b14af0164bf4fcc4df03d9f70b68c8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-widevinecdm\4.10.2710.0\LICENSE.txt.tmp
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll.lib.tmp
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll.sig.tmp
Filesize1KB
MD536e5ee071a6f2f03c5d3889de80b0f0d
SHA1cf6e8ddb87660ef1ef84ae36f97548a2351ac604
SHA2566be809d16e0944386e45cf605eae0cd2cf46f111d1a6fe999fec813d2c378683
SHA51299b61896659e558a79f0e9be95286ebf01d31d13b71df6db4923406e88b3ba72584ef2b62e073b2f5e06901af2c7d1b92d3d12187fe5b4b29c9dd2678444f34e
-
Filesize
11KB
MD5f27565876133908e7bd902b9bef52703
SHA126d1d6c03080377add14ab7327dcc30fa49c2b0a
SHA256cb3516599ef38b6b06b86222e0008e39cb81727e4beb67481300d21479418af3
SHA512e024ceda8046db23df9092f0ba83b030e565108a2e5d19f5d7b7e70ee002e12571830e5bc223ead4b793f1a83cdb344121629c05344afba4b203f60b6c984f34
-
Filesize
10KB
MD5e835a9bd37212589dd73626481e0ad3b
SHA1c4dabf01e151df3893ee0ca31d8ea5294c32784a
SHA25621913827b2a9d86a459e3fb6cef937c087d6d8197dff527a2de758470cb1413e
SHA5128328f7c32820511dc96f6256e1029039c6beb9b20976dfc5e46668bcf2b1ca5643c6d1fa1c285db23d58accdfedeea3370bfe756af3bf7b632a60ad9cf07d688
-
Filesize
10KB
MD5ed58a0ae2a8c3b8a0f284055084f81af
SHA15cc52c4ba761b5b1d98ad6a5983ad6ef522e8c86
SHA25686bccd300c5f6acbb3b756268752dbb82ecd4bb4636d17ef5613a6fc226c8856
SHA51291217dc8647a857d96daad5a2b99b56b07ae0bbf16a746c97c5d2fc0f8c91eeeb82ee53ab9c7549343f6b94d4715751d456307b69cdd6ac85aabc841b0c33ff2
-
Filesize
10KB
MD5cbd7097ddb814b24ac86afa44ad280d8
SHA1e9002d38397a29d98f342b8e84bf22bb54f79a16
SHA25672319079fab965c6306475cbab41c6d6f3136f52b934e7f4fa9aeeb76cd415a8
SHA51270d4dcecb1e367843b5082c843c51e3616ea0278f22ae31699a4ccc979251b12b0cf558194f89d2c63a7dc5e1276566a5302226dbbc28f7baa0b570900779d9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize1.2MB
MD5d94239b2cbcb2fd9e7b9e58bc8fab860
SHA1f7f2406fe3e0c4525a4bf15258302d6f33d0cb39
SHA256b0ebcb2391eb9006b3d1ba3d888061e59fea6920ff74ce99782e4f89c9d5ad49
SHA512b121655c740337b2d298aac2db099ba318f91f6b936a24511f5a163fbb464a2284dcec0b5ba37f7af5a67d3d7f925bfe7710026c434fd98d5ca227785a04d082