Analysis
-
max time kernel
112s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2024 00:19
Static task
static1
General
-
Target
95eb3c7a36ea30b9a86fc19e958a49b472d3b6224ee3c5581bfd9a6669b02bfd.exe
-
Size
3.7MB
-
MD5
47d78937897b4346b6ad5e5501d8b864
-
SHA1
687a26e05cf5151da22f4ab9713ecad7e447c795
-
SHA256
95eb3c7a36ea30b9a86fc19e958a49b472d3b6224ee3c5581bfd9a6669b02bfd
-
SHA512
17bc5ac8b9a2b723706f7c29b48ebbfab28e57b432298fc1ae08dcf9219f6d3d8ced70a5b310dedfadbeba408fba7e0a4629491a0b5649d4f9ae2406070ab0b0
-
SSDEEP
98304:0fEs/7VYZPG7/wGd8BIxAhStyekHscn8BdXj9tv+pT:095GGdshStyekH5nUdXjPmp
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
https://atten-supporse.biz/api
Extracted
stealc
drum
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
xworm
185.196.8.239:7000
-
Install_directory
%Userprofile%
-
install_file
WindowsUpdaterConf.exe
-
telegram
https://api.telegram.org/bot8070077125:AAEdRIyp1anHye9Y0jcV8uNF6U4mmijN8Pk/sendMessage?chat_id=1818813749
Extracted
lumma
https://atten-supporse.biz/api
https://se-blurry.biz/api
https://zinc-sneark.biz/api
https://dwell-exclaim.biz/api
https://formy-spill.biz/api
https://covery-mover.biz/api
https://dare-curbys.biz/api
https://print-vexer.biz/api
Signatures
-
Amadey family
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/7068-38505-0x0000000000400000-0x000000000041A000-memory.dmp family_xworm -
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 0693ad23dc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 0693ad23dc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 0693ad23dc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 0693ad23dc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 0693ad23dc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 0693ad23dc.exe -
Stealc family
-
Xworm family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 06926d39fc.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1C03U2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ffa12d1060.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9b21e87caa.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2O9294.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0693ad23dc.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3500 powershell.exe 7024 powershell.exe 5252 powershell.exe 5852 powershell.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1C03U2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 06926d39fc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0693ad23dc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2O9294.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ffa12d1060.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 06926d39fc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1C03U2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ffa12d1060.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9b21e87caa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9b21e87caa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2O9294.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0693ad23dc.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 1C03U2.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 11 IoCs
pid Process 3804 1C03U2.exe 4032 skotes.exe 1444 2O9294.exe 1528 wL3EGdM.exe 348 ffa12d1060.exe 5568 9b21e87caa.exe 924 06926d39fc.exe 5536 skotes.exe 1360 694cc73203.exe 1096 0693ad23dc.exe 5596 skotes.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 2O9294.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 9b21e87caa.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 0693ad23dc.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 1C03U2.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine ffa12d1060.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 06926d39fc.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 0693ad23dc.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 0693ad23dc.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\0693ad23dc.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1012557001\\0693ad23dc.exe" skotes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 95eb3c7a36ea30b9a86fc19e958a49b472d3b6224ee3c5581bfd9a6669b02bfd.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\9b21e87caa.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1012554001\\9b21e87caa.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\06926d39fc.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1012555001\\06926d39fc.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\694cc73203.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1012556001\\694cc73203.exe" skotes.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 213 ip-api.com -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0007000000023c71-9159.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 3804 1C03U2.exe 4032 skotes.exe 1444 2O9294.exe 348 ffa12d1060.exe 5568 9b21e87caa.exe 924 06926d39fc.exe 5536 skotes.exe 1096 0693ad23dc.exe 5596 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1C03U2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1756 1444 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 18 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2O9294.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffa12d1060.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06926d39fc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1C03U2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wL3EGdM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9b21e87caa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0693ad23dc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 694cc73203.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 95eb3c7a36ea30b9a86fc19e958a49b472d3b6224ee3c5581bfd9a6669b02bfd.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 694cc73203.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 694cc73203.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2100 timeout.exe -
Kills process with taskkill 10 IoCs
pid Process 3372 taskkill.exe 5764 taskkill.exe 1704 taskkill.exe 4828 taskkill.exe 6636 taskkill.exe 7108 taskkill.exe 6368 taskkill.exe 5588 taskkill.exe 5184 taskkill.exe 7076 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5552 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 3804 1C03U2.exe 3804 1C03U2.exe 4032 skotes.exe 4032 skotes.exe 1444 2O9294.exe 1444 2O9294.exe 348 ffa12d1060.exe 348 ffa12d1060.exe 5568 9b21e87caa.exe 5568 9b21e87caa.exe 924 06926d39fc.exe 924 06926d39fc.exe 5536 skotes.exe 5536 skotes.exe 1096 0693ad23dc.exe 1096 0693ad23dc.exe 1096 0693ad23dc.exe 1096 0693ad23dc.exe 1096 0693ad23dc.exe 1360 694cc73203.exe 1360 694cc73203.exe 5596 skotes.exe 5596 skotes.exe 1360 694cc73203.exe 1360 694cc73203.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 1528 wL3EGdM.exe Token: SeDebugPrivilege 1096 0693ad23dc.exe Token: SeDebugPrivilege 5184 taskkill.exe Token: SeDebugPrivilege 4828 taskkill.exe Token: SeDebugPrivilege 6636 taskkill.exe Token: SeDebugPrivilege 3372 taskkill.exe Token: SeDebugPrivilege 7076 taskkill.exe Token: SeDebugPrivilege 6788 firefox.exe Token: SeDebugPrivilege 6788 firefox.exe Token: SeDebugPrivilege 7108 taskkill.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3804 1C03U2.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 1360 694cc73203.exe 6788 firefox.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 6788 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3480 wrote to memory of 3804 3480 95eb3c7a36ea30b9a86fc19e958a49b472d3b6224ee3c5581bfd9a6669b02bfd.exe 82 PID 3480 wrote to memory of 3804 3480 95eb3c7a36ea30b9a86fc19e958a49b472d3b6224ee3c5581bfd9a6669b02bfd.exe 82 PID 3480 wrote to memory of 3804 3480 95eb3c7a36ea30b9a86fc19e958a49b472d3b6224ee3c5581bfd9a6669b02bfd.exe 82 PID 3804 wrote to memory of 4032 3804 1C03U2.exe 83 PID 3804 wrote to memory of 4032 3804 1C03U2.exe 83 PID 3804 wrote to memory of 4032 3804 1C03U2.exe 83 PID 3480 wrote to memory of 1444 3480 95eb3c7a36ea30b9a86fc19e958a49b472d3b6224ee3c5581bfd9a6669b02bfd.exe 84 PID 3480 wrote to memory of 1444 3480 95eb3c7a36ea30b9a86fc19e958a49b472d3b6224ee3c5581bfd9a6669b02bfd.exe 84 PID 3480 wrote to memory of 1444 3480 95eb3c7a36ea30b9a86fc19e958a49b472d3b6224ee3c5581bfd9a6669b02bfd.exe 84 PID 4032 wrote to memory of 1528 4032 skotes.exe 89 PID 4032 wrote to memory of 1528 4032 skotes.exe 89 PID 4032 wrote to memory of 1528 4032 skotes.exe 89 PID 4032 wrote to memory of 348 4032 skotes.exe 92 PID 4032 wrote to memory of 348 4032 skotes.exe 92 PID 4032 wrote to memory of 348 4032 skotes.exe 92 PID 4032 wrote to memory of 5568 4032 skotes.exe 94 PID 4032 wrote to memory of 5568 4032 skotes.exe 94 PID 4032 wrote to memory of 5568 4032 skotes.exe 94 PID 4032 wrote to memory of 924 4032 skotes.exe 95 PID 4032 wrote to memory of 924 4032 skotes.exe 95 PID 4032 wrote to memory of 924 4032 skotes.exe 95 PID 4032 wrote to memory of 1360 4032 skotes.exe 98 PID 4032 wrote to memory of 1360 4032 skotes.exe 98 PID 4032 wrote to memory of 1360 4032 skotes.exe 98 PID 4032 wrote to memory of 1096 4032 skotes.exe 99 PID 4032 wrote to memory of 1096 4032 skotes.exe 99 PID 4032 wrote to memory of 1096 4032 skotes.exe 99 PID 1360 wrote to memory of 5184 1360 694cc73203.exe 100 PID 1360 wrote to memory of 5184 1360 694cc73203.exe 100 PID 1360 wrote to memory of 5184 1360 694cc73203.exe 100 PID 1360 wrote to memory of 4828 1360 694cc73203.exe 105 PID 1360 wrote to memory of 4828 1360 694cc73203.exe 105 PID 1360 wrote to memory of 4828 1360 694cc73203.exe 105 PID 1360 wrote to memory of 6636 1360 694cc73203.exe 107 PID 1360 wrote to memory of 6636 1360 694cc73203.exe 107 PID 1360 wrote to memory of 6636 1360 694cc73203.exe 107 PID 1360 wrote to memory of 3372 1360 694cc73203.exe 110 PID 1360 wrote to memory of 3372 1360 694cc73203.exe 110 PID 1360 wrote to memory of 3372 1360 694cc73203.exe 110 PID 1360 wrote to memory of 7076 1360 694cc73203.exe 112 PID 1360 wrote to memory of 7076 1360 694cc73203.exe 112 PID 1360 wrote to memory of 7076 1360 694cc73203.exe 112 PID 1360 wrote to memory of 5784 1360 694cc73203.exe 115 PID 1360 wrote to memory of 5784 1360 694cc73203.exe 115 PID 5784 wrote to memory of 6788 5784 firefox.exe 116 PID 5784 wrote to memory of 6788 5784 firefox.exe 116 PID 5784 wrote to memory of 6788 5784 firefox.exe 116 PID 5784 wrote to memory of 6788 5784 firefox.exe 116 PID 5784 wrote to memory of 6788 5784 firefox.exe 116 PID 5784 wrote to memory of 6788 5784 firefox.exe 116 PID 5784 wrote to memory of 6788 5784 firefox.exe 116 PID 5784 wrote to memory of 6788 5784 firefox.exe 116 PID 5784 wrote to memory of 6788 5784 firefox.exe 116 PID 5784 wrote to memory of 6788 5784 firefox.exe 116 PID 5784 wrote to memory of 6788 5784 firefox.exe 116 PID 6788 wrote to memory of 6396 6788 firefox.exe 117 PID 6788 wrote to memory of 6396 6788 firefox.exe 117 PID 6788 wrote to memory of 6396 6788 firefox.exe 117 PID 6788 wrote to memory of 6396 6788 firefox.exe 117 PID 6788 wrote to memory of 6396 6788 firefox.exe 117 PID 6788 wrote to memory of 6396 6788 firefox.exe 117 PID 6788 wrote to memory of 6396 6788 firefox.exe 117 PID 6788 wrote to memory of 6396 6788 firefox.exe 117 PID 6788 wrote to memory of 6396 6788 firefox.exe 117 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\95eb3c7a36ea30b9a86fc19e958a49b472d3b6224ee3c5581bfd9a6669b02bfd.exe"C:\Users\Admin\AppData\Local\Temp\95eb3c7a36ea30b9a86fc19e958a49b472d3b6224ee3c5581bfd9a6669b02bfd.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1C03U2.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1C03U2.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Users\Admin\AppData\Local\Temp\1012475001\wL3EGdM.exe"C:\Users\Admin\AppData\Local\Temp\1012475001\wL3EGdM.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\1012475001\wL3EGdM.exe"C:\Users\Admin\AppData\Local\Temp\1012475001\wL3EGdM.exe"5⤵PID:7068
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\1012475001\wL3EGdM.exe'6⤵
- Command and Scripting Interpreter: PowerShell
PID:3500
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'wL3EGdM.exe'6⤵
- Command and Scripting Interpreter: PowerShell
PID:7024
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\WindowsUpdaterConf.exe'6⤵
- Command and Scripting Interpreter: PowerShell
PID:5252
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'WindowsUpdaterConf.exe'6⤵
- Command and Scripting Interpreter: PowerShell
PID:5852
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "WindowsUpdaterConf" /tr "C:\Users\Admin\WindowsUpdaterConf.exe"6⤵
- Scheduled Task/Job: Scheduled Task
PID:5552
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c timeout /t 1 && DEL /f wL3EGdM.exe5⤵PID:3512
-
C:\Windows\SysWOW64\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
PID:2100
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1012553001\ffa12d1060.exe"C:\Users\Admin\AppData\Local\Temp\1012553001\ffa12d1060.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:348
-
-
C:\Users\Admin\AppData\Local\Temp\1012554001\9b21e87caa.exe"C:\Users\Admin\AppData\Local\Temp\1012554001\9b21e87caa.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5568
-
-
C:\Users\Admin\AppData\Local\Temp\1012555001\06926d39fc.exe"C:\Users\Admin\AppData\Local\Temp\1012555001\06926d39fc.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:924
-
-
C:\Users\Admin\AppData\Local\Temp\1012556001\694cc73203.exe"C:\Users\Admin\AppData\Local\Temp\1012556001\694cc73203.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5184
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4828
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6636
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3372
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:7076
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking5⤵
- Suspicious use of WriteProcessMemory
PID:5784 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking6⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:6788 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2032 -parentBuildID 20240401114208 -prefsHandle 1948 -prefMapHandle 1940 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {882cc319-419a-4e74-a954-c2dbdb40b645} 6788 "\\.\pipe\gecko-crash-server-pipe.6788" gpu7⤵PID:6396
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2492 -parentBuildID 20240401114208 -prefsHandle 2484 -prefMapHandle 2476 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {82cb9ab3-eb7c-4702-a386-b77eb7ffb910} 6788 "\\.\pipe\gecko-crash-server-pipe.6788" socket7⤵PID:6628
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3124 -childID 1 -isForBrowser -prefsHandle 3116 -prefMapHandle 3112 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1a9fcfda-c752-4890-bace-59b27e93cad2} 6788 "\\.\pipe\gecko-crash-server-pipe.6788" tab7⤵PID:6812
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4028 -childID 2 -isForBrowser -prefsHandle 3104 -prefMapHandle 4044 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d61fca49-09e4-43d7-b1d1-06864ae3d692} 6788 "\\.\pipe\gecko-crash-server-pipe.6788" tab7⤵PID:4028
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4028 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4656 -prefMapHandle 4652 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {31f8baf3-aac4-42e2-8683-a13cca7704fc} 6788 "\\.\pipe\gecko-crash-server-pipe.6788" utility7⤵
- Checks processor information in registry
PID:1100
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2028 -parentBuildID 20240401114208 -prefsHandle 2108 -prefMapHandle 3376 -prefsLen 29090 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {01de2449-fa27-4acf-be5e-c069e8ca450f} 6788 "\\.\pipe\gecko-crash-server-pipe.6788" gpu7⤵PID:6944
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2124 -childID 3 -isForBrowser -prefsHandle 2312 -prefMapHandle 2488 -prefsLen 26998 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {11c42a98-ee55-489c-8f80-85972c35ca81} 6788 "\\.\pipe\gecko-crash-server-pipe.6788" tab7⤵PID:4368
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5340 -childID 4 -isForBrowser -prefsHandle 5264 -prefMapHandle 5272 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0af3bb10-0cb3-48ed-90dc-8475997cac84} 6788 "\\.\pipe\gecko-crash-server-pipe.6788" tab7⤵PID:5828
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5380 -childID 5 -isForBrowser -prefsHandle 5500 -prefMapHandle 5504 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {13745daf-f281-4d71-bed7-a7bfda8988e5} 6788 "\\.\pipe\gecko-crash-server-pipe.6788" tab7⤵PID:7012
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:7108
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T5⤵
- Kills process with taskkill
PID:6368
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T5⤵
- Kills process with taskkill
PID:5764
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T5⤵
- Kills process with taskkill
PID:5588
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T5⤵
- Kills process with taskkill
PID:1704
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking5⤵PID:5244
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking6⤵PID:6640
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2000 -parentBuildID 20240401114208 -prefsHandle 1928 -prefMapHandle 1920 -prefsLen 23680 -prefMapSize 244710 -appDir "C:\Program Files\Mozilla Firefox\browser" - {91cd80ad-9f71-480f-b206-b4f0aabd4522} 6640 "\\.\pipe\gecko-crash-server-pipe.6640" gpu7⤵PID:5020
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2436 -parentBuildID 20240401114208 -prefsHandle 2428 -prefMapHandle 2416 -prefsLen 24600 -prefMapSize 244710 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {94e2a2ef-f7c3-4cef-924c-1f0680036f7c} 6640 "\\.\pipe\gecko-crash-server-pipe.6640" socket7⤵PID:6184
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1608 -childID 1 -isForBrowser -prefsHandle 2844 -prefMapHandle 2896 -prefsLen 22652 -prefMapSize 244710 -jsInitHandle 1292 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d13d73e3-f78c-470e-818b-d77d0b05e5ab} 6640 "\\.\pipe\gecko-crash-server-pipe.6640" tab7⤵PID:6688
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4112 -childID 2 -isForBrowser -prefsHandle 4104 -prefMapHandle 4100 -prefsLen 29144 -prefMapSize 244710 -jsInitHandle 1292 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d5fb129a-9741-49b2-ba04-75ae4a396acf} 6640 "\\.\pipe\gecko-crash-server-pipe.6640" tab7⤵PID:1004
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4728 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4784 -prefMapHandle 4768 -prefsLen 29197 -prefMapSize 244710 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {32576220-9b77-4c40-8f07-31da077455ed} 6640 "\\.\pipe\gecko-crash-server-pipe.6640" utility7⤵PID:5316
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4064 -childID 3 -isForBrowser -prefsHandle 5216 -prefMapHandle 5204 -prefsLen 27051 -prefMapSize 244710 -jsInitHandle 1292 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4b1fb343-d7d1-4c0c-bced-2eab3b02a4d9} 6640 "\\.\pipe\gecko-crash-server-pipe.6640" tab7⤵PID:940
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5364 -childID 4 -isForBrowser -prefsHandle 5440 -prefMapHandle 5436 -prefsLen 27051 -prefMapSize 244710 -jsInitHandle 1292 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {423e5a1f-6c4d-4b77-8655-cda00c0d34d4} 6640 "\\.\pipe\gecko-crash-server-pipe.6640" tab7⤵PID:3440
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5584 -childID 5 -isForBrowser -prefsHandle 5348 -prefMapHandle 5352 -prefsLen 27051 -prefMapSize 244710 -jsInitHandle 1292 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7b7c86b1-e9ce-40aa-ade8-d02e6023a70c} 6640 "\\.\pipe\gecko-crash-server-pipe.6640" tab7⤵PID:6612
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1012557001\0693ad23dc.exe"C:\Users\Admin\AppData\Local\Temp\1012557001\0693ad23dc.exe"4⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1096
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2O9294.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2O9294.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1444 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1444 -s 16443⤵
- Program crash
PID:1756
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1444 -ip 14441⤵PID:4420
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5596
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD54da0717493a858392dace74ff54a02c8
SHA153aeeb7cd7d348c1d0a353dc8653b6cc1852fb00
SHA25649ad18601980ec19faddc0b22de35bfec9e85c0e90072ee0c0e26a8b6e377867
SHA51269c067150c2f61b08f583d918103deee3bb31f34cbab0a6bbb6af30e4aebce8936241cea2e142b1cb6423518219e4acf8c90b8ba4560d304b595f8004264abfe
-
Filesize
18KB
MD5cc691740a18ef935a1c6e9bbb52884a9
SHA122a4692d41d0a9755b9f28929536c3e7bf657d87
SHA25675837fced03c31309026e0df7f3c788c1830acdef0a3ed2522569675b703ddec
SHA512c3a6f3b306ef792955e0c58cecc492a5b473e551e2a7697ee15fc7d532ae9952487635e7b4557d0992fc112d0be0c9a23a39a59be1a5cacc9eca01f3250a4cae
-
Filesize
18KB
MD52849603e2b5d4885cf0de6f078d490f8
SHA141a8f623bff2af3d619574b27f290c6a167a9114
SHA256d9fce677e367135e9729a62efcce7a2125023539c91a16182a77e958a8aba98a
SHA51233efb5e624524426aab4224d4e8623ae8cef99548654428aa4da2a510e67af0f21ff9f5f796ca971376edc0867f3b989a5149f8e4df0bf92a562958a06d4de8a
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\activity-stream.discovery_stream.json.tmp
Filesize25KB
MD504899944ff37205c1703122942ba0c01
SHA1f9471d71fcf7c2cd9f837192091c7e9426ce7b30
SHA256a747427d187e44e632d39916fef601faf123e35fe0d99505d424f45f33bc7200
SHA5125a54f22b745487e9fdd7159b9f881fa58d8519a2127bdef65b482082c3904a874a903fbe3a9827de917ee2d4c9603df00e9ef90b8b7248485728451f692ad778
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\activity-stream.discovery_stream.json.tmp
Filesize20KB
MD5d54ed23a79a315ff241863aa6f0d7533
SHA1ee5b5b908e4dec2912e7e653885e6ba0e0a89790
SHA25664484b90efc25eb9367a20ad9f972b65aefea04101b95185753ed0229d07cb41
SHA5129886bc9a345e4447422c58433c8a1e8db58ecfa9e0f2a5e26bb06044d3353ce40979935edd3109f2302d41fada0c655c627c36139ccb5c7c356dec4507e0912d
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\cache2\entries\254256B27E0C48CF9B80B695F0B3B8CA84610495
Filesize9KB
MD5d084158a9e0aebdfc542bae44f92ed64
SHA19918cddc880db1dce96b9120c168e45c5a7c15e1
SHA256321c5466f588060ae45fe2cf7711751fd6fd66e784898a6934f87a8567b64919
SHA512522852a1ec90e8631465eb942c158a82846eca016cbda36dad384258497ebe2252b8347b765270bc5299138b289c1639bd6ca4a12b7e74843f33bc3ac7b267a8
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\cache2\entries\6D89348819C8881868053197CA0754F36784BF5F
Filesize14KB
MD5070bf76d37c6a098af19270750597f3e
SHA10aa4803ee8c3d84e6ac7727ef5e42addbde2afd3
SHA256a7186a3d63fba9d11a0354140bcc40c93797368552877e5f3c38891056901823
SHA512128ddcdda7aa08a5c8a30c35b7c9d64dfa562b63f1fd287fdda8e02017ef3832bf65d0659a39ac230a67533b2f8560b6de92c36c7f248d04349b2e36f254b238
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
3.3MB
MD57823e902900881094372948957825fe1
SHA1297a663f3b64fb9863164d10ac698bef03dd3a0f
SHA25692d36e5fb3fdbf10ad10c7880c40013c2e21b8a49e20720137d2b4851681233f
SHA51260d4ea35cfec5154cfa3cb767de7c839ca8b3987b27599ea218ec1c47f1d111a59f193cd3cfd1266ae384434ae653f1e0a297f7222a2592e529b2b4404dd6238
-
Filesize
612B
MD5e3eb0a1df437f3f97a64aca5952c8ea0
SHA17dd71afcfb14e105e80b0c0d7fce370a28a41f0a
SHA25638ffd4972ae513a0c79a8be4573403edcd709f0f572105362b08ff50cf6de521
SHA51243573b0cbaac6e2e1646e6217d2d10c40ad10b9db1f4492d6740545e793c891b5e39283a082896c0392b88eb319dfa9392421b1c89c094c9ce9f31b53d37ebaf
-
Filesize
1.9MB
MD589109257f23f068de9f04a3c59df2b15
SHA103ea7063a9d7b54bcdea8f11a990e668d9346121
SHA25674567ee5c75fd4a34c44dc8c75e9f4ea1dcf3c60d6d3fff4e8d8526460e49b10
SHA512b3203b1dbbb28a8f0e69e067c9b48e6a930e05046674f3b7f82a76b4b2ff0f8535150ed46dddbe8421fe4ced283f9edf76e2d15f54c454d43771f4e350655f48
-
Filesize
1.8MB
MD514553b3e4f83021e14520e0f62f95a24
SHA135f37fc3ed8d53920b96b8485e741097cfcd05ba
SHA256d31671f91056db4b63277269b84841872b047643116fce88f5952393daa22691
SHA5129f1a23fa7632155407bdbe9eb2a21708b241906d817c9eaa8cfef2ca65acf67135d8b8e7249b580f67685ccec9b487b65ff1c48378af6418bc7976393dbfdc90
-
Filesize
4.9MB
MD5ebe3d112a464bca87d0600558998c287
SHA1e24f303f33d3d4bd2afc5bc0392de5f14e4bd72a
SHA25608c78546997ccfbffb833a115f8888ad128e5c4d43bddd9e01e2105132ef0824
SHA512fcfd10bd5c930ec50bfa011752db8a28526994712ecb3b905d2d892099df69dcc90ff881669f5b323b99ae9a19061cb5c8abb86b18fc31012d9b91b653c24bed
-
Filesize
948KB
MD59e7ce696dfdb127b028a0610a441047d
SHA179a7805f957617896fd16ec5d1db102d9809f667
SHA256bcb1df1e3ce692f4e284bf91f1873696933a5f2ffd87ac966b719e492b43d1eb
SHA512b226a736eee638e1ef2dc4dfdb6193b23756b525d665209efc6094ba119ddff3004844b8439034e67d79ded9ddff82369edf6d735f72a0e916763dedfa6d1c0a
-
Filesize
2.6MB
MD510f89bc59dd3ebb89c8437a590abbb97
SHA1cb65670a5597fe2bca2423648b7e8325eedbe112
SHA256252af078fcf7992ce1afa0449ffa8591725bf9c46219b19d85369fdc657c8b00
SHA51260d3cedf0b29d9dfdf0eb030ffa817fb102f72bbe6cc5e105d17cd9ddd355c3e9e4374f10bef70919d033f83b3eb1f311bf868bc922633ba8482a9776c84db5d
-
Filesize
1.9MB
MD56d17158239deaa10445332a320d93bb4
SHA1d7928e790267e50aa28a8f734329ea302f8176bb
SHA256547aec0f988c87b03e73231738462dd61c430708e6f9120eddfa1310b34524cf
SHA512c002e6913b1a5674d00e9077af4fada039b06f290114c47d3cd58b5ababc713bf9ba84defcf791e1dd51f93662e940baee376214b24c01fcdca0fd867bde55ff
-
Filesize
1.8MB
MD570f314a25f00b355a279523a9697b6d0
SHA1c178ca3e12e65ddf72b5da4e824ca266420b94b7
SHA2560ac722bdbc25fb4932ec228a7285f44210149c8880707e55f79f67a1a60090cb
SHA51240229050e3a9a30fbceacf7f089ac1fff24d428e59a2cc8bd5bd2b3efc443d63e69eb660d12de07a946bf846192a5f04f1ecf931c0608e306a7703937dd928b5
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\AlternateServices.bin
Filesize6KB
MD59ec05f2d786678e9df978b1ff11047cd
SHA149780bc1d71ec8380f86a600a1b443c8bf02916b
SHA2567a5eb57680ade70e6b8c5378ca9e31f9decb88e00d324168c931a40c5eafbd61
SHA512a3fd2080ca1af12773d9fd0ab9bb1bd69f1a3623c70abbfc7d1dd623952b5f30cdeb83e17614d8177cab7e4d29ea0d73a684c5393cc06c61d980f2171f4058ca
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\AlternateServices.bin
Filesize10KB
MD5efb2c7b3f7863dfe438d3d954fb7c958
SHA168ab0929f75a9a75aa372dab61d2418d3d290497
SHA256dc2847165081fcbac530cd9231a932de3d6132fe3e2c3bcfe5d98e650346b5b9
SHA512ed69cbad175be324a19792af621e79156b43444decaedd9cdc279c59b8ce13babac008abe0e7be4d878ab25ef8e6f27bedbe349717d7b4af45925b01235137dc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\AlternateServices.bin
Filesize11KB
MD5ba71a3bc27291b614e63c5b22d62593d
SHA10db2a2cc5f19002219a4417737e8a0a5c8154e51
SHA256a84a12e5bfb675c3f08e68581187357f410caeb626a91b42a831b87eb2f931f5
SHA512be57febf28f6b4ec9c97f2c7e182b5ac34ff7b03e510c08766d762add30b4f0c9c5f346dbb851f175b09b03000cda328478224e55a89dbd068fb8e7894e612a3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\SiteSecurityServiceState.bin
Filesize1KB
MD5489587bbd1326a3e256775c07204cdc7
SHA1466b212a7aea946a92f0f224413109fd91989a42
SHA256542ff72a1d30614efec1f78aa117d7ead893a1d08d13cc57487ebc4dd46e24c7
SHA512544b7f058a2711b633277603d26bb6ba70a660069d234b25f7e713969ec1cda6b7d1b9d235154df8b751a158dd499d1c22bd107a1f25fdaebc1c1fc8007765bf
-
Filesize
224KB
MD50f27096a0cad14767cbf065dc8ecf25b
SHA114bb39529db5119977f129185cb2edff77cda9cf
SHA256cf863f85c55c02abd5bb3c7b27fdf74e694b51bb9b618bd66fdd1470f7643c7f
SHA512bc2bb41e3ac3fbcbd14c0a906178fd7f4ac5ff9e601107a02a2d610e39c8241b98783d5f8eb32363a2534584df12db14791dbe754a5a7182c7edc5cb292e500e
-
Filesize
64KB
MD5fb8edefe8474eb62c9a21167d0cc5a2d
SHA17b7fccfd967b64c45e78e699f38e6584da43fd8b
SHA2569c2551115db4db1681fc48caa7c0ef3d85ec9b08fc2be1dc94a6976dc2aaf516
SHA512f792f8859b14a176d88ef1ec470896a6411f676f8bf3eb26fe60fa3588904161d4b17f3f437e00dc8e7b89fcac514f221d3bfef0cbe9a012baef389254ba3790
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.bin
Filesize23KB
MD579e37dd386efeccbbe5022ad3b8ebaec
SHA1acdebe3c3b166c2a38e16e114e2b86fba134720c
SHA2569e48307770f445976ffb2b5cd12ec7df95c15b7195d9cd729f8d502cfcc54f0a
SHA512252ed0e5d36ccb69d86dbd760bc0b3f91c14d39a2d03444eec0b55ff5c7af6b9e39896b2f50c2d8a534bb21c2c1fda5736bd52b5fd456f34c835ae0027fc5ec6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.bin
Filesize21KB
MD5a2eac039d031b257f6766dcb89aa6262
SHA1776844ed4b66d3121c8a96784b27d89648f452c6
SHA256600727cc16257ce3ab33e6c7dd67e6a3f53523930e66d3b833c229276c369225
SHA51232687a1566e450b7a5fac2d24ee4b0323e23e9d72bb77be394efd30b3d462a12b63e6a74149b785d8d8048b4792de2c28c5371ab2d7e35cbdfb70094756576cc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp
Filesize21KB
MD51edd8d1bf8fddb18a0136c7a53551c23
SHA1353b3aac0fbe5438e34558af1b170f27d76d7165
SHA2567d193c8d46cf1d8cae0b7d81e80320dfc9e20108196575e766cb26ba1ec51ae6
SHA5125356f0d2d0a011afc103e17c39a617a0254ef1578518e2982f8944037adeaec5e20b520fff0eb3e81bee00ea08c3d3bf3fa5df1922529fad16c27e0f34cb3fc5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp
Filesize23KB
MD537557b5c324432de5f4a607b2e80953a
SHA1fc7c0190aa47496bb5b8ceb5b2c810ac5cdd3e34
SHA2569e7ce05e90ee30ab91eb6305ea3431a41034b353503b51a1e2cf984dc4a50b32
SHA512c378290e685708cc67e54d24e5cd4f470db7dee83820b40163a690b0920164958317f2b241d8430d831783f8e5a8fe2b6eba1e1a41e2105ad110dc44101ce2bb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD57be28f66ab8e6403c3d66f2b61c951bf
SHA18ff91fe65e564ee029576cd1dfe9aae586ddbb0d
SHA256fd7e1c6bc85da8d432027536bb2247ea0897bfca3bb90f39cccb42bdad9039b7
SHA5123f267a9203b48b33e06de46be290d039b50c40c908b27672f67cbc5d7c462e60d675b5582b57ce0c5ee60c4bfd803a6f4571294a9611f96e530ac7ce4c1d7169
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD5f99f6215c5032a5e915c2756ec902600
SHA1b6b4e1655c7af19c92d3e16e5d96dbf9fbab3f45
SHA256ab31ad558f01a23c00c00e8821558b8a98e9805928d2a31035c08c190b0cc536
SHA51249757537e6b25d02764f9ffcdd677717581102f9abe89ebfc10fd48098569f8f1f42deedf42f46aeb1c75cfb03b7d0363e643a140c6167d58280ecf33b94b39f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\events\events
Filesize104B
MD5defbf00981795a992d85fe5a8925f8af
SHA1796910412264ffafc35a3402f2fc1d24236a7752
SHA256db353ec3ecd2bb41dfbe5ed16f68c12da844ff82762b386c8899601d1f61031d
SHA512d01df9cab58abf22ff765736053f79f42e35153e6984c62a375eb4d184c52f233423bb759a52c8eed249a6625d5b984a575ca4d7bf3a0ed72fc447b547e4f20a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\70114f75-92fa-43b0-b8f2-f2e7d379aed6
Filesize982B
MD50bbe960616e9e8287ba859f46749ee40
SHA14c3dd1ef552f0c69fa146cdb0cac4bbe6478daf5
SHA2561102b10a933640fce1f5549c31352c2e8323c98e6c93337e79e3dc0b7de0cf2c
SHA5128bc273736f735fff7f963a04adc5ec192f649af2172b44dbe6c00edcf425a87b4933d097a53501db5e520da75f429e546c9debf0f5bec24c0a5923ebf5f062a1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\8179c0d4-b67c-4ebf-8aba-2c01650b50ac
Filesize905B
MD547c468a99e5350ca5e97543b5348acea
SHA12fd8aeae55f5a4ffb438a2cc8e14a1d92c034a3b
SHA256b1b0b3ce673eafd4e34ac94834ddbb9e2a6de94b07c052895db22b615e4a3849
SHA512ba761142b891ebab21700c8d445633251af37cb7f2afc834a5dbabbfb23b1ab1c8e5aa5682228ac710f11665401862de3ecde8e291162d3b8f9dd6d5a05dfc03
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\a1570113-ea9d-4eaa-9b4c-1c780516ec1d
Filesize659B
MD5156e0d8f713ab387cc81d5cb316d90b6
SHA12fff7b44c3c06b3d8493c7d10dc98ee5867da194
SHA2568577421819e570caf8288b3936bb27ad45094cb3b547efd7894f723e747d7a64
SHA51207cda745ae18364ca7751e1915b8ba0ef73b735d4a6500aacaea406e167b61ebd35fdb67834ca410395a76e737de4074f181f517579db8b5f3f7926f91464c51
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\e8750165-f95f-4648-9a0f-68d1fcad1708
Filesize653B
MD505ce42af44f62de618c36d2898f2ac76
SHA113a7b2ad95440a5840745b469fc4d8f4439b9873
SHA2566b81522566672af1aef3eb05a9a4dd9b97d903e35f44726d62d57d7a6473fdce
SHA5125d7400ee6a583651e4d4742ed72acca34211223ed7f131d0b07a6553db01cf4bc0046a6a708738a356087944f0c2c007a7d61e2b84b01b578fc7ea754c613ebb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\fd941b67-16dc-401b-aa86-a8cf7fbe2362
Filesize648B
MD5dc29386c2827cc25d62f97cc48fe333a
SHA1ce46f405dcbd017b571c39a548f4dcd03c85b351
SHA2562b66b5e08499a80de78db510242ea67742ef175613368079df6f23749db92f42
SHA51237d2f7bc22c706400189efbe854b3abcb2ed0f374c50fa4ccbb2cbdb3ae7b6739986175434b07346682f4b85d001c29ea1f1641e6fff15eac75bad4f562fc40a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
96KB
MD5a671a61d74f5a4a91938a959be35acba
SHA123fcfd3b0adde0f470bbd51278a22a35d5ed1d09
SHA256727eecd957e92cccfaba03ddc05d63cba12adf48bb49c717bc2d09b30e51d716
SHA5125c7963b1cbd06d4b29a26252ddd2d96e99f897449019ba3de3f2884f0faaee46922d6b50554cc0983ea569fb871c20e0904ad3a2be0e99275b4f3251590e0772
-
Filesize
2.0MB
MD52d1926e4b832e49a3f3d4d6b8587419a
SHA1e55143bafb99a3667c6cbdda66cdc08552da8ffd
SHA25654579986f197dc7c42d33bebf56e8adfe88a56d86cf899f28ba09d14426ff92b
SHA5129ff162731dea95e9b1cf57d9b1ff8b0fb3b9d09bd67ba966c0f9653c50c7935a59435267553f2744f24ccc63b71594ff152ccc0a877de68457240d7cf4fa07c5
-
Filesize
11KB
MD56244082aab33aec6b5a31060c5e1b95e
SHA1f654fed085bdae6550be1b4eb2a16da355bdc187
SHA2565752e8f8806a0eb5e97b50193ff10b8a2139b8bb9e05ef7177032ca6fd29ce5c
SHA512b58509d9956e62277f724943f22f322f5040778819edaac79c26ff1e8590656f002d7243fae81ab971cfc6760f8707f6a23cfb54ed17bef3c7645a7bcc00a78e
-
Filesize
11KB
MD5c5b89ba89372cf08aea16dae8acdaeb1
SHA115785be99f6d0ba44076efd9ad50619f19cf127c
SHA256ca5ed421d9d77b4012dc2d4bdb6d6e7442f095c4c65da62fd0176b17913a8bed
SHA5123c2d35bb2de9f180d5495b5d944ea464cf4d8fb0f963bf9608a75662c0cd97ce3d81ff7f242636cd9dea6deb65ba5e5b80c092e74a4d43d44b48328e77c4bc81
-
Filesize
10KB
MD52169982d6e193e372084e99e18e7564c
SHA1a6592ff75056a674d4bf68ba76d754d6ef2504cf
SHA2561976f348b134749ee7cd6a44e9fb2ff374e353363f13ba6c19d5a9a267cec595
SHA512cca2ae0135b475315a2d4a3c8af10c9c216ac1c9d18e75306d721751c74162fea8375e428ed6404d26b17e23773258c6295b0bc090ed13d503304a966292325a
-
Filesize
10KB
MD52e00c4c63aaeedbca09e5e84f0b06bab
SHA14b624fd49d1b755da75fcd87c52b4fcb59b5e80d
SHA2564662405c126e441f913a1c9369262487d4bc5f8d721fb88e087c6599c74eeeca
SHA512283bf2c11d278742037a23a863e8a2059b3a410352ab1ce48bdbfa1fc3fa05eedf0a2519a5063f37a9b40968e33b0d819a66d45bb354019ca01e2a18af1b0e12
-
Filesize
64KB
MD576786a4c0dd19d88d6d3ed95a293bf2f
SHA1b0d6d676127a7694fc6e71ee57fcc2ffaa621ff7
SHA2561a2564c1ba20b8038d35c2319258d94dc15d97914dcf753b31c48b79940dfd31
SHA5128cd3298e2ebba763d3c80ac4b17e44af7eb63b46304967d0c6316d314baf8611c05f7b9979c2c5c329ac167aea0246e8c9f057ffbb272481c13fd5e4b4bcb2d0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\sessionCheckpoints.json
Filesize53B
MD5ea8b62857dfdbd3d0be7d7e4a954ec9a
SHA1b43bc4b3ea206a02ef8f63d5bfad0c96bf2a3b2a
SHA256792955295ae9c382986222c6731c5870bd0e921e7f7e34cc4615f5cd67f225da
SHA512076ee83534f42563046d25086166f82e1a3ec61840c113aec67abe2d8195daa247d827d0c54e7e8f8a1bbf2d082a3763577587e84342ec160ff97905243e6d19
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\sessionCheckpoints.json
Filesize90B
MD5c4ab2ee59ca41b6d6a6ea911f35bdc00
SHA15942cd6505fc8a9daba403b082067e1cdefdfbc4
SHA25600ad9799527c3fd21f3a85012565eae817490f3e0d417413bf9567bb5909f6a2
SHA51271ea16900479e6af161e0aad08c8d1e9ded5868a8d848e7647272f3002e2f2013e16382b677abe3c6f17792a26293b9e27ec78e16f00bd24ba3d21072bd1cae2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize376KB
MD577f6ba5d2552e702bfc3c8e33c338da9
SHA1c99df3ac7a9c294865a2f962c38ce20bf4b3d32f
SHA2566ecd7832eee26920c61db90fa8beeb4a9565e78a69c521ff279bcf1f4623a30f
SHA512e27c9bf7c6a99985d6ce6e8dd08f202ce4c48fa84876757f0e5c57670804572fca03af11419a2ed27c1c30cab17ae41e7d9bbfbec990b72aeddbd7b682769732