Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 03:37
Static task
static1
General
-
Target
fd1fd5578c1d6f55d8b5da615b40ec390ebc97c10d841af1e69a5bea978c6d7b.exe
-
Size
6.0MB
-
MD5
b2137b2d52e9e112a93f9de6b426c61e
-
SHA1
a850404663170a5ddb9f87bc659140ca93e1a0f1
-
SHA256
fd1fd5578c1d6f55d8b5da615b40ec390ebc97c10d841af1e69a5bea978c6d7b
-
SHA512
21ade888148b930990e0d4754bd867bad8f9bf5d9bb785bb97b18cd0e84003e1cfc5ec631f959ba0408fe14e85ea36151b516b3e15b42017dcf004e070f6ed94
-
SSDEEP
98304:udsNzgXsP1JQZGkGE6mSOAsiK+e8ftrLtL5WpEWLRQkbx4OtgTVXDraXZw7bYYfN:uuNzNkGqTiK+L1d5W6WLRQO4O0Vzu27L
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Extracted
remcos
DPDNOW
dpdnow.duckdns.org:8452
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
true
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-A34JIZ
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Extracted
lumma
https://founpiuer.store/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 3e88a77388.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 3e88a77388.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 3e88a77388.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 3e88a77388.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 3e88a77388.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 3e88a77388.exe -
Remcos family
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 12 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1Q31F2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3z03e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ remcos_a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ remcos.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3e88a77388.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2M9591.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1c22880974.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 66ed8d6be2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 24 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion remcos_a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion remcos.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion remcos.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 66ed8d6be2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2M9591.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2M9591.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3z03e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1c22880974.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3e88a77388.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1Q31F2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion remcos_a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1c22880974.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 66ed8d6be2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3e88a77388.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1Q31F2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3z03e.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation remcos_a.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation buildd.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 1Q31F2.exe -
Executes dropped EXE 16 IoCs
pid Process 2124 l0z50.exe 3688 C2Q22.exe 3384 1Q31F2.exe 4180 skotes.exe 1612 2M9591.exe 1460 3z03e.exe 1616 4w793H.exe 3312 remcos_a.exe 3916 remcos.exe 3772 buildd.exe 6636 1c22880974.exe 4440 66ed8d6be2.exe 5208 skotes.exe 5832 3e88a77388.exe 6376 skotes.exe 1868 skotes.exe -
Identifies Wine through registry keys 2 TTPs 12 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 2M9591.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 3z03e.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 1Q31F2.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine remcos.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 1c22880974.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 66ed8d6be2.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 3e88a77388.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine remcos_a.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 3e88a77388.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 3e88a77388.exe -
Accesses Microsoft Outlook profiles 1 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 buildd.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 buildd.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 buildd.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 buildd.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Office\14.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 buildd.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 buildd.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 buildd.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Office\13.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 buildd.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 buildd.exe -
Adds Run key to start application 2 TTPs 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" C2Q22.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Rmc-A34JIZ = "\"C:\\ProgramData\\Remcos\\remcos.exe\"" remcos_a.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\1c22880974.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1004520001\\1c22880974.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\3e88a77388.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1004523001\\3e88a77388.exe" skotes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fd1fd5578c1d6f55d8b5da615b40ec390ebc97c10d841af1e69a5bea978c6d7b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" l0z50.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Rmc-A34JIZ = "\"C:\\ProgramData\\Remcos\\remcos.exe\"" remcos_a.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Rmc-A34JIZ = "\"C:\\ProgramData\\Remcos\\remcos.exe\"" remcos.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Rmc-A34JIZ = "\"C:\\ProgramData\\Remcos\\remcos.exe\"" remcos.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\66ed8d6be2.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1004521001\\66ed8d6be2.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 123 ip-api.com -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000a000000023b60-47.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
pid Process 3384 1Q31F2.exe 4180 skotes.exe 1612 2M9591.exe 1460 3z03e.exe 3312 remcos_a.exe 3916 remcos.exe 6636 1c22880974.exe 4440 66ed8d6be2.exe 5208 skotes.exe 5832 3e88a77388.exe 6376 skotes.exe 1868 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1Q31F2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
Program crash 3 IoCs
pid pid_target Process procid_target 4824 1612 WerFault.exe 90 3604 1612 WerFault.exe 90 6516 6636 WerFault.exe 144 -
System Location Discovery: System Language Discovery 1 TTPs 18 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language remcos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 66ed8d6be2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C2Q22.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3z03e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2M9591.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language remcos_a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3e88a77388.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fd1fd5578c1d6f55d8b5da615b40ec390ebc97c10d841af1e69a5bea978c6d7b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1Q31F2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1c22880974.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language l0z50.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4w793H.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 5452 cmd.exe 5800 netsh.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 7000 timeout.exe -
Kills process with taskkill 5 IoCs
pid Process 716 taskkill.exe 5052 taskkill.exe 1164 taskkill.exe 3480 taskkill.exe 3236 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 37 IoCs
pid Process 3384 1Q31F2.exe 3384 1Q31F2.exe 4180 skotes.exe 4180 skotes.exe 1612 2M9591.exe 1612 2M9591.exe 1460 3z03e.exe 1460 3z03e.exe 1616 4w793H.exe 1616 4w793H.exe 3312 remcos_a.exe 3312 remcos_a.exe 3916 remcos.exe 3916 remcos.exe 3772 buildd.exe 3772 buildd.exe 3772 buildd.exe 3772 buildd.exe 3772 buildd.exe 1616 4w793H.exe 1616 4w793H.exe 3772 buildd.exe 6636 1c22880974.exe 6636 1c22880974.exe 4440 66ed8d6be2.exe 4440 66ed8d6be2.exe 5208 skotes.exe 5208 skotes.exe 5832 3e88a77388.exe 5832 3e88a77388.exe 5832 3e88a77388.exe 5832 3e88a77388.exe 5832 3e88a77388.exe 6376 skotes.exe 6376 skotes.exe 1868 skotes.exe 1868 skotes.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 716 taskkill.exe Token: SeDebugPrivilege 5052 taskkill.exe Token: SeDebugPrivilege 1164 taskkill.exe Token: SeDebugPrivilege 3480 taskkill.exe Token: SeDebugPrivilege 3236 taskkill.exe Token: SeDebugPrivilege 3956 firefox.exe Token: SeDebugPrivilege 3956 firefox.exe Token: SeDebugPrivilege 3772 buildd.exe Token: SeAssignPrimaryTokenPrivilege 3772 buildd.exe Token: SeIncreaseQuotaPrivilege 3772 buildd.exe Token: SeSecurityPrivilege 3772 buildd.exe Token: SeTakeOwnershipPrivilege 3772 buildd.exe Token: SeLoadDriverPrivilege 3772 buildd.exe Token: SeSystemtimePrivilege 3772 buildd.exe Token: SeBackupPrivilege 3772 buildd.exe Token: SeRestorePrivilege 3772 buildd.exe Token: SeShutdownPrivilege 3772 buildd.exe Token: SeSystemEnvironmentPrivilege 3772 buildd.exe Token: SeUndockPrivilege 3772 buildd.exe Token: SeManageVolumePrivilege 3772 buildd.exe Token: SeDebugPrivilege 5832 3e88a77388.exe Token: SeDebugPrivilege 3956 firefox.exe Token: SeDebugPrivilege 3956 firefox.exe Token: SeDebugPrivilege 3956 firefox.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 3384 1Q31F2.exe 1616 4w793H.exe 1616 4w793H.exe 1616 4w793H.exe 1616 4w793H.exe 1616 4w793H.exe 1616 4w793H.exe 1616 4w793H.exe 3956 firefox.exe 3956 firefox.exe 3956 firefox.exe 3956 firefox.exe 3956 firefox.exe 3956 firefox.exe 3956 firefox.exe 3956 firefox.exe 3956 firefox.exe 3956 firefox.exe 3956 firefox.exe 3956 firefox.exe 3956 firefox.exe 3956 firefox.exe 3956 firefox.exe 3956 firefox.exe 3956 firefox.exe 3956 firefox.exe 3956 firefox.exe 3956 firefox.exe 3956 firefox.exe 1616 4w793H.exe 1616 4w793H.exe 1616 4w793H.exe 1616 4w793H.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 1616 4w793H.exe 1616 4w793H.exe 1616 4w793H.exe 1616 4w793H.exe 1616 4w793H.exe 1616 4w793H.exe 1616 4w793H.exe 3956 firefox.exe 3956 firefox.exe 3956 firefox.exe 3956 firefox.exe 3956 firefox.exe 3956 firefox.exe 3956 firefox.exe 3956 firefox.exe 3956 firefox.exe 3956 firefox.exe 3956 firefox.exe 3956 firefox.exe 3956 firefox.exe 3956 firefox.exe 3956 firefox.exe 3956 firefox.exe 3956 firefox.exe 3956 firefox.exe 3956 firefox.exe 3956 firefox.exe 1616 4w793H.exe 1616 4w793H.exe 1616 4w793H.exe 1616 4w793H.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3916 remcos.exe 3956 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3520 wrote to memory of 2124 3520 fd1fd5578c1d6f55d8b5da615b40ec390ebc97c10d841af1e69a5bea978c6d7b.exe 85 PID 3520 wrote to memory of 2124 3520 fd1fd5578c1d6f55d8b5da615b40ec390ebc97c10d841af1e69a5bea978c6d7b.exe 85 PID 3520 wrote to memory of 2124 3520 fd1fd5578c1d6f55d8b5da615b40ec390ebc97c10d841af1e69a5bea978c6d7b.exe 85 PID 2124 wrote to memory of 3688 2124 l0z50.exe 87 PID 2124 wrote to memory of 3688 2124 l0z50.exe 87 PID 2124 wrote to memory of 3688 2124 l0z50.exe 87 PID 3688 wrote to memory of 3384 3688 C2Q22.exe 88 PID 3688 wrote to memory of 3384 3688 C2Q22.exe 88 PID 3688 wrote to memory of 3384 3688 C2Q22.exe 88 PID 3384 wrote to memory of 4180 3384 1Q31F2.exe 89 PID 3384 wrote to memory of 4180 3384 1Q31F2.exe 89 PID 3384 wrote to memory of 4180 3384 1Q31F2.exe 89 PID 3688 wrote to memory of 1612 3688 C2Q22.exe 90 PID 3688 wrote to memory of 1612 3688 C2Q22.exe 90 PID 3688 wrote to memory of 1612 3688 C2Q22.exe 90 PID 2124 wrote to memory of 1460 2124 l0z50.exe 99 PID 2124 wrote to memory of 1460 2124 l0z50.exe 99 PID 2124 wrote to memory of 1460 2124 l0z50.exe 99 PID 3520 wrote to memory of 1616 3520 fd1fd5578c1d6f55d8b5da615b40ec390ebc97c10d841af1e69a5bea978c6d7b.exe 103 PID 3520 wrote to memory of 1616 3520 fd1fd5578c1d6f55d8b5da615b40ec390ebc97c10d841af1e69a5bea978c6d7b.exe 103 PID 3520 wrote to memory of 1616 3520 fd1fd5578c1d6f55d8b5da615b40ec390ebc97c10d841af1e69a5bea978c6d7b.exe 103 PID 1616 wrote to memory of 716 1616 4w793H.exe 104 PID 1616 wrote to memory of 716 1616 4w793H.exe 104 PID 1616 wrote to memory of 716 1616 4w793H.exe 104 PID 1616 wrote to memory of 5052 1616 4w793H.exe 108 PID 1616 wrote to memory of 5052 1616 4w793H.exe 108 PID 1616 wrote to memory of 5052 1616 4w793H.exe 108 PID 1616 wrote to memory of 1164 1616 4w793H.exe 110 PID 1616 wrote to memory of 1164 1616 4w793H.exe 110 PID 1616 wrote to memory of 1164 1616 4w793H.exe 110 PID 4180 wrote to memory of 3312 4180 skotes.exe 112 PID 4180 wrote to memory of 3312 4180 skotes.exe 112 PID 4180 wrote to memory of 3312 4180 skotes.exe 112 PID 1616 wrote to memory of 3480 1616 4w793H.exe 113 PID 1616 wrote to memory of 3480 1616 4w793H.exe 113 PID 1616 wrote to memory of 3480 1616 4w793H.exe 113 PID 1616 wrote to memory of 3236 1616 4w793H.exe 115 PID 1616 wrote to memory of 3236 1616 4w793H.exe 115 PID 1616 wrote to memory of 3236 1616 4w793H.exe 115 PID 3312 wrote to memory of 3916 3312 remcos_a.exe 117 PID 3312 wrote to memory of 3916 3312 remcos_a.exe 117 PID 3312 wrote to memory of 3916 3312 remcos_a.exe 117 PID 1616 wrote to memory of 4940 1616 4w793H.exe 118 PID 1616 wrote to memory of 4940 1616 4w793H.exe 118 PID 4940 wrote to memory of 3956 4940 firefox.exe 119 PID 4940 wrote to memory of 3956 4940 firefox.exe 119 PID 4940 wrote to memory of 3956 4940 firefox.exe 119 PID 4940 wrote to memory of 3956 4940 firefox.exe 119 PID 4940 wrote to memory of 3956 4940 firefox.exe 119 PID 4940 wrote to memory of 3956 4940 firefox.exe 119 PID 4940 wrote to memory of 3956 4940 firefox.exe 119 PID 4940 wrote to memory of 3956 4940 firefox.exe 119 PID 4940 wrote to memory of 3956 4940 firefox.exe 119 PID 4940 wrote to memory of 3956 4940 firefox.exe 119 PID 4940 wrote to memory of 3956 4940 firefox.exe 119 PID 3956 wrote to memory of 4340 3956 firefox.exe 120 PID 3956 wrote to memory of 4340 3956 firefox.exe 120 PID 3956 wrote to memory of 4340 3956 firefox.exe 120 PID 3956 wrote to memory of 4340 3956 firefox.exe 120 PID 3956 wrote to memory of 4340 3956 firefox.exe 120 PID 3956 wrote to memory of 4340 3956 firefox.exe 120 PID 3956 wrote to memory of 4340 3956 firefox.exe 120 PID 3956 wrote to memory of 4340 3956 firefox.exe 120 PID 3956 wrote to memory of 4340 3956 firefox.exe 120 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 buildd.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 buildd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fd1fd5578c1d6f55d8b5da615b40ec390ebc97c10d841af1e69a5bea978c6d7b.exe"C:\Users\Admin\AppData\Local\Temp\fd1fd5578c1d6f55d8b5da615b40ec390ebc97c10d841af1e69a5bea978c6d7b.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l0z50.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l0z50.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\C2Q22.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\C2Q22.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1Q31F2.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1Q31F2.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Users\Admin\AppData\Local\Temp\1004494001\remcos_a.exe"C:\Users\Admin\AppData\Local\Temp\1004494001\remcos_a.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3312 -
C:\ProgramData\Remcos\remcos.exe"C:\ProgramData\Remcos\remcos.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3916
-
-
-
C:\Users\Admin\AppData\Local\Temp\1004506001\buildd.exe"C:\Users\Admin\AppData\Local\Temp\1004506001\buildd.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:3772 -
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c chcp 65001 && netsh wlan show profiles|findstr /R /C:"[ ]:[ ]"7⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:5452 -
C:\Windows\system32\chcp.comchcp 650018⤵PID:5716
-
-
C:\Windows\system32\netsh.exenetsh wlan show profiles8⤵
- Event Triggered Execution: Netsh Helper DLL
- System Network Configuration Discovery: Wi-Fi Discovery
PID:5800
-
-
C:\Windows\system32\findstr.exefindstr /R /C:"[ ]:[ ]"8⤵PID:5808
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c chcp 65001 && netsh wlan show networks mode=bssid | findstr "SSID BSSID Signal"7⤵PID:6196
-
C:\Windows\system32\chcp.comchcp 650018⤵PID:6260
-
-
C:\Windows\system32\netsh.exenetsh wlan show networks mode=bssid8⤵
- Event Triggered Execution: Netsh Helper DLL
PID:6280
-
-
C:\Windows\system32\findstr.exefindstr "SSID BSSID Signal"8⤵PID:6276
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && timeout /t 3 > NUL && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\1004506001\buildd.exe"7⤵PID:6712
-
C:\Windows\system32\chcp.comchcp 650018⤵PID:6784
-
-
C:\Windows\system32\timeout.exetimeout /t 38⤵
- Delays execution with timeout.exe
PID:7000
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1004520001\1c22880974.exe"C:\Users\Admin\AppData\Local\Temp\1004520001\1c22880974.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:6636 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6636 -s 15887⤵
- Program crash
PID:6516
-
-
-
C:\Users\Admin\AppData\Local\Temp\1004521001\66ed8d6be2.exe"C:\Users\Admin\AppData\Local\Temp\1004521001\66ed8d6be2.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4440
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"6⤵PID:5140
-
-
C:\Users\Admin\AppData\Local\Temp\1004523001\3e88a77388.exe"C:\Users\Admin\AppData\Local\Temp\1004523001\3e88a77388.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5832
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2M9591.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2M9591.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1612 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1612 -s 16205⤵
- Program crash
PID:4824
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1612 -s 16445⤵
- Program crash
PID:3604
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3z03e.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3z03e.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1460
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4w793H.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4w793H.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:716
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5052
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1164
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3480
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3236
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking3⤵
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking4⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2060 -parentBuildID 20240401114208 -prefsHandle 1944 -prefMapHandle 1936 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b98501f6-8244-4166-a568-f9f401c6a32d} 3956 "\\.\pipe\gecko-crash-server-pipe.3956" gpu5⤵PID:4340
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2508 -parentBuildID 20240401114208 -prefsHandle 2500 -prefMapHandle 2496 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {be3eadb8-f087-4983-8d03-67b273ba43b2} 3956 "\\.\pipe\gecko-crash-server-pipe.3956" socket5⤵PID:4356
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3324 -childID 1 -isForBrowser -prefsHandle 2952 -prefMapHandle 3244 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {bd590681-b4fb-4ad5-97f3-41366ef19f31} 3956 "\\.\pipe\gecko-crash-server-pipe.3956" tab5⤵PID:684
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3868 -childID 2 -isForBrowser -prefsHandle 3860 -prefMapHandle 3856 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b8e7bc26-d842-417a-9b01-062408b046f5} 3956 "\\.\pipe\gecko-crash-server-pipe.3956" tab5⤵PID:3268
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4648 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4640 -prefMapHandle 4588 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {47d148e4-c062-4196-8412-349238397b56} 3956 "\\.\pipe\gecko-crash-server-pipe.3956" utility5⤵
- Checks processor information in registry
PID:6452
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5648 -childID 3 -isForBrowser -prefsHandle 5656 -prefMapHandle 5660 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9ce56ecb-a8f4-4f88-aa67-8986da5a8d0d} 3956 "\\.\pipe\gecko-crash-server-pipe.3956" tab5⤵PID:5956
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5624 -childID 4 -isForBrowser -prefsHandle 5816 -prefMapHandle 5820 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2ccf62bc-a167-4292-bb02-4a22f3736ce4} 3956 "\\.\pipe\gecko-crash-server-pipe.3956" tab5⤵PID:5984
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6008 -childID 5 -isForBrowser -prefsHandle 5928 -prefMapHandle 5932 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9379abfb-2f3a-4e05-910e-2c13de0e0260} 3956 "\\.\pipe\gecko-crash-server-pipe.3956" tab5⤵PID:5976
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1612 -ip 16121⤵PID:1828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1612 -ip 16121⤵PID:1620
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 6636 -ip 66361⤵PID:7164
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5208
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6376
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1868
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
1Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD5b4bf7a56ef6d24e8ebac7175451a5915
SHA158998e728c467a57866525bca00a11c49127ceeb
SHA25669bcae1f382bc6e809f6a0d9669a0edeffcd8b4522e17d5a1f71b40f501826fb
SHA51239706ae41c303d9a364e30ba3b532052ec8ee6740092782f5728af69861dca0fe09468292d5992d89a082082fc8175ddb56cb4dac96af7137754101254fe2c43
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ws2kncw.default-release\activity-stream.discovery_stream.json
Filesize24KB
MD5c495b4ca950de971ec2195a9fa462f50
SHA141972403cd966b461f358e536ad70e6361b282e3
SHA25604f04d39fb130e9f4760f224fe128849b37232626a0257dc741f2eb3ecfded91
SHA5123258615ce1aa33c4b5c85310191821cc456389c701643b70ed7198430f1a431f66635972dd46ae46b11ecc0e215fd696af66418a2f695dea0f908f90b54e2cbf
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ws2kncw.default-release\cache2\entries\D500AD994A7515157BB2A6ADD5B18B754E4D2F99
Filesize13KB
MD52c3d8fd86f5af0c7909ec3722245df2d
SHA162ea6dbdde849f8e2ef819639296f56f23faf053
SHA25626da086c690deefae49c6423b13bea09cadfadb31b436452429a23443b71042d
SHA512421a4bffbe4f2c629565bcc83ec9d2da0b17724250c0c3e277accbe10629a3179cb7833496acc7a6c7071c4bbc15577e76b34cffe0a7c71a15658bacd369445d
-
Filesize
1.9MB
MD5b85c47881ba0eb0b556b83827f8e75c8
SHA1dccdf0daee468f9e9bed3edf928f0839d26b47cb
SHA2569d577624acca69f5b4097a6882e934b026a344757cf5cf31f3341e643ed2ba20
SHA512ca158aff36e4eeff5d1c263a79972dfa0aa7584132f12a3d301a5cc5c47b57309fe71b4837c7b8caa5022cb18529b565d6a0849acdabd1af939b76b48284a605
-
Filesize
154KB
MD5c426f46f2c074eda8c903f9868be046d
SHA1d0352482370beff107eb2b2f13e2de275fbc91c7
SHA2567cba781d569196e89a86f10cee7d69918fe05df1461d1f0ed3426ccb2046002e
SHA51297eed1bad31bd2e558d2cf6ff3c3026d828f561e2d1439f0daca420f53a3c6b1d59442f043357be9a33761a8e99ac935d08239d2e50811d47909cec8caad7c05
-
Filesize
3.0MB
MD5a17f03daddf4ffd5b038f13ca94cca7d
SHA1ba20321c4f47082502dadddec7a70769c21e253a
SHA2564149dded7fd91b0eca160fff8d1e48d81bd206ef719bd54d1d5f86bc023eb4f9
SHA5127a4d981c68e5be25078a18ae2844c1842c491f93137b7b3037a3ae2af9dd1074ce37f33bcf79c7bb9e47eb83a3ceb595918171f09039c2d1d398e7d892479a54
-
Filesize
2.1MB
MD5d21a2eb1558c04af68aa39932c381a77
SHA18a1c7f2c06fcf55ccdfb8155a2aa2ec94cb8c5bb
SHA256ba62e9e2f8ace5672fbc814db0b5fbd5a2d0a5d2d8ef55fd359e91ac756b4bbc
SHA512bffa84774f7857c827702c1f21619f55e4fe7b8fab650b1e8598ab5d5c327b9ddf80724a3be0acb605c5e177b330830276c59e999754fc28809f1781feba2fc7
-
Filesize
2.6MB
MD5941e61557ef13f76a606c961a64ed6ab
SHA14e95ec0b08c384f4c9752b21df3a50c1a049d00a
SHA256a9f670416324be30fb1ebf3aceb1d7874624461fd3cd7fb094bf8ec917a9720f
SHA5127f804f2dcbb3f8ae209bdddea61259a5c94648661c29f44a6425cd89fcd4ab93f2550a0f05558dfa6071cfd2ebf9831b42e19d967a76f12fbdda62df68d323c3
-
Filesize
898KB
MD508111d2d8d7f25fbf947d406771fe59f
SHA1c9c363df9134252fbde33782915ee1342802e01e
SHA2562a7a6e3bbbc5868b53422fda12c0df49406e389b7aab9ef7a6224eb4d3481dd8
SHA512fc3a7d5a5b5ae7048a85e5703228fb694b6ce307a73b82f2d980dc9c0de1bcccb0aab00346869508c777877565a6b30bbea5d525570228cad2b0a9eae99e7a24
-
Filesize
5.5MB
MD5464ad96e5e3a963ea4553ecb16ce1292
SHA11ea198ef6814d89c963dd44ce981c5682a69e83e
SHA256213c8ccb7364053ee4006958138adb83f297fda8943b10891d450afa88784367
SHA5124a36ebb25007f9430fbf08b7a39534963122912fe0cd0d31806bf634eb3a01ae9a103c12e86e78b86d9b481e01cf33c53780258a437d81414937b82be4c7018d
-
Filesize
2.0MB
MD5d488e0b4b23af8f848a6708747d7b266
SHA10d502db8350e5b92787c523db125bcbbeb1495a7
SHA256073df3ae205c8e564ce589b7a590cb5ff00ceed9eb984354a559355ae24cee5f
SHA512429e688a8c7cf0762573da76527aea5934acd7c6f42f065cc8271e76d3264d281a694f87054d56f8dbf7de25ec5db0f64d73c0d76b47cb6a5f8d8fb0598a6e83
-
Filesize
3.4MB
MD53028160a6a87d55d943654f46441cb8e
SHA167e5a58fa1b709666560f17688a08907a68c5cef
SHA256e72d90a6be2c9b2a510d0bc2bf7386123bf3614f73ea8a25d2354f2d02fe3b2f
SHA51236d7db2e266ad741d25ce2f1fc48aaab08c0dc577ad6d0fef587b1632c63f76e44d17dcd1ece61ec31c04b0ca56ba3fea486b0e1198ccfbf665054678d8fca8d
-
Filesize
3.1MB
MD52ee21f95f5937ba3632ecc66cbe38950
SHA14399c7c028f1645d73b6f093a66601c9a7cc250c
SHA25652fc45fd55742c77e3ef6daff7795c695e65932e2f6513fc62b88e3bcaaa8e36
SHA512aa952eea8bcfb891940a387cee2e0fd99529de327f976e4cd71b7c21c0007a5a7b8c03481c07daefe73db6eec5d0e76a60171c6e7d760507f87e5e5470fb2cd2
-
Filesize
3.1MB
MD53f6d1165cf4934fcb43b26fca5e2e572
SHA1f94a4ec1d90bb7324c9adc59db7b2222b83926a8
SHA2566183ca1822879dc24791fbc1424c81c112ba6032e9dffadab730f25b3b0dd707
SHA512d9ad72e02d35d79becd2ddb34bbdc58946cc42a74c6789286054f07d013ffd3c8e61403f10f790842630a3e7735d0268b9002d77087481c92458a665589e0970
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin
Filesize18KB
MD54704c4fed5447018f1b3f71434d5b309
SHA105859f18b66d8fb4aeec6df7a213b176eb2e4df7
SHA25699dc48dd64f12472f43e1e5ce93d8a8863f968d1a085181c23f1d778edab6ff9
SHA512ba0bc6f72ec8b05a6ed00ddf72e1aa424fb3191007903f857c785d7a24eb80a8bbf2cc1202e00f6c112c380935b9ddfd73003becfefdda6f4e1673e033f24bca
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin
Filesize6KB
MD592a53653324c7c10be39668544e143b0
SHA1c2bece31e7900cba452e9227c04f1ca998a92c77
SHA256cf9925ea127197ec45697e100c34915e6018dfa1730bf880215383c14333304e
SHA512a83f5f2b192bddec63cdf7fab88da661a4f9e10ef6c5178280ac6abf4d48340c1ac3b6a4fe3fecb4227bf44afe69ca9c11c98ea0d3bfbedb25301c8a4651016e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin
Filesize10KB
MD5dc71d00f119c64214be83838ed906d69
SHA127e3555dd61c89f427d9da41d68bf8d1b8ed4944
SHA256f34ed0ac074e59808359aa9267020353605e7c825e5c3b9b9bc96f3a359a48de
SHA5123f3b8298da09ab3a5940b2fea853c7b4e5530b8fc567d4d0e08f187d2cd4b0d84ce13f0ec1a939222804985c3949c1e591b202a9e970fd51e14f2c578a4e66be
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin
Filesize13KB
MD59a97aa10668c92b71c8e042cdc7edc06
SHA1483530126caeb95612f4905c17730df061dfcfbf
SHA2569855465ddca446fd5ef563c496b8449e127ca9b122de6863fe6d1ed5b7bab332
SHA512adc8ce08037991a691dee5741a5095b0c7f99ec3c35456a8fcd4b34945343dc4b39288a060580ed6e248dea9718e28af61d534ba29d0892609953470f677f2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.bin
Filesize23KB
MD5fd415dc9d65930580669c9a1f6c864b0
SHA1556250d2ad0fbd19e5103b3ef00e2c4c4d0e3f53
SHA256c96c695872b96250c645deb1424024b85c57a06844ec486e90c630f767548eeb
SHA5127a0d0a983530b87444dd6a492cb5437df2cf32e3369dc2bdde9b2117acd4ca19f8ebf9da36b7ab63ee89fdeed180f38638225cc9e2cf5cec54f354b108d6e005
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.bin
Filesize25KB
MD538a57e2c897988f782a5700385ebf507
SHA1b0f5eab8e53729c3e492f2136b546fe75664a51e
SHA256b644ada987eb36e6eee4ff8bf85c992d6f8e7719b85ba92a2d11a1e45a95ad76
SHA51266e171d7f1334c539268037145fc5479860651b2da8ff7f3d920737e150c26a7c91ae4ae4b8d6d3b628c3acb6fc4a82a746ae95a862afc852e049ef4cfecd63b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp
Filesize21KB
MD59ca6f3094216872c3cf8dc64e00ba8ac
SHA15d0c90e0721e7a92f863e4545faaf4ff6b428f9c
SHA25645f021bbedd79108a0ba516a0509a7b0a4c423e81c150bcad882a25981abba12
SHA51294f711cd2857aefa9741dca7dbc80ae8d03146f85e197e974973c62319ed2b4c68626ae4b91366446e0788f9eb2132ae1677a69f305749b668994999ad9dca3d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD575c99dd406ae322fb1f7adc523014868
SHA1eefeb1d05ec25aeab7bf6f271e5460c7e660b3ae
SHA256f875fbd378f91132721b85be48ab96c6a2c0d09e31ec01bb8aae1fe012ba54d7
SHA512f1d0674da3d140bb7d487f3506dcc34c9a82c331e2b9e9c039aa0d9ca32039bce57f87ae6578c680ad45ff076d4a4aaf3a46a651adc38eb3880648297a50fbd3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD50d900df90a4141567d8ad8d848d243cc
SHA13f79509b7f9df46d15bc8362694630bf14a62cbc
SHA256aa0ec5ad67cb61b6efea22dbed852ee197e24a5d567a0e2ad541d4b70d4b501e
SHA512e7c97b07d9d30b3b2f0365cabc4bb6f71ca3e88b564ece81549413580a3e0e700c12fbf46f0aa232ad920be65d4e4fa245cb84b6520a6bbd38b28f4aa8ec8887
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD5999d183887a3ea62fcf07efef77d43a0
SHA1f5785e2c854806c57726ed937b5bb5fd5b723411
SHA25637c15083eb7440b93d420fbd89143933efd1544bdcc8cf015ddadb6040c11b91
SHA512d86ee27a72f80761f383910cfa8709c87fec471ac01ccc5df5dadf8065ba4d3acd8e0cb0d2b7f15318687b4da97ac3aa9dfde67ed1a518f09ad6c525752df583
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\79b30433-9717-4d91-91d1-bd63bb4ef85a
Filesize659B
MD5b40a95522479401dfc267e651525adeb
SHA1e533ee71aba6bca73e4348e466e467f8fab58d30
SHA256e166f1510776ba9e03b3773278c67ced5e2c4aaf28d7667c9be7be8a37632095
SHA512ac9c9797f6a6419798800776b4d5299b0c7c99a01af675eed75a3c6b7230d68b86356abb374500fe6ff946404c5b25abd965cc23e5a928d8d2e3ce603595e939
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\c822de80-bb8e-449e-88e5-fcee62e546ad
Filesize982B
MD5263b01202a4b426568e96928cb598e87
SHA125d1e28f521763bc2b49225c2f73d6fa766ede60
SHA256554f3e2b355f71e08b5919f1f85cd58c9d4a6ff894a0e80c8fcf58186273192c
SHA5126cc1f8c42b6046648c1e8f3be9b7254f4eadadd93f8146f24a121adb86e77613aa8275b52c0401fcb2b8c15cdeab5e04680f71e27bcafce7ba24f35db4a36e73
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD5bc9a21fa2d7117ace9f2717afea98aba
SHA1551c5f89c3db63660309384d0f13263b2a7c8568
SHA256494656c4b624ef4fca2b0be265abc5f012663d3d3cb8048785380076f2d73c68
SHA5125ae029f2f155631b0fff0513b3ad18b2f89f0ad02dfbadbd40dde9120f05f992e752ca9f787eb1cf654491e344cdc197975ccd2b7be65ba4f46a8f15b5d4b218
-
Filesize
15KB
MD5212348c665cdb929b3f07bc0b1b24968
SHA1fdd4b3417a855776bf8ba0e2f5fa55bae5e0a843
SHA256bcd6f31f050b55740365cbf53130434408a055449c3848334ff198c4b26c2d45
SHA51224141ba625b9968f2f7c12d1d97b159fbf34094f9a04ff4974026c71aa4bf4e6fece95ab822ee973f7fa3733855e501013428d85f9a58efabd5dd6c962ef702e
-
Filesize
11KB
MD5ab4581170cfdec6841db3373f91e5f79
SHA1e7903b3d1d4e2d50cc7edc1e6d4373dac6fdf7aa
SHA256d06ed6fd12d3d8b25c5cd0a49d97feda950467fc989d7a3dfd9d39da31706f4b
SHA512f9951b94b41108f8756c0db30f7fdf35f81eba416a6a1c5aaf97bb07ccf750a59e9f8151bdbe3130d9a37d1602ee49d7bdcaa4f56cc4e1548d9c817fe191b81b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize1.0MB
MD54acfaa9d2dc8cb91ab1255f37b47ba7d
SHA1a2de81f46a74df78d52666592cf603ecdb0f53ed
SHA256fac46cbb76e87136d9c0e35b58965849ac70a020ef2e60e5b55d86747be74315
SHA512141e04d37782bb421cc7a9dcc41a77b428f8596ef3d011d4e31e5de1da54774a2f3e48f950d5d238ad0359dcdb38331fd0f738ad2833ec8b57b6ccfab55cc38c