Analysis
-
max time kernel
64s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-11-2024 11:05
Static task
static1
Behavioral task
behavioral1
Sample
73dedcc630ebd68669c7ee7befac513271f3a06b39ba6e20f4a4cb585ea726ad.exe
Resource
win7-20240903-en
General
-
Target
73dedcc630ebd68669c7ee7befac513271f3a06b39ba6e20f4a4cb585ea726ad.exe
-
Size
1.8MB
-
MD5
ffc4509537ae91b049189c9f7bc777e0
-
SHA1
d07824e044eaea5c875d4c234eccdcfb46676720
-
SHA256
73dedcc630ebd68669c7ee7befac513271f3a06b39ba6e20f4a4cb585ea726ad
-
SHA512
61a8271bc25878faa2a012ab7fd1dc60043db8a8bbcf2b16cb396d6ce21732b83f44bbd64eeca887c2227409c3b52683123681803687a3faf6d6677089ed784f
-
SSDEEP
49152:DKE1DKkbmqi/HJOvnpW98yK/hol3CHNtZy:mE1DV0ov098Rpo9CHw
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://peepburry828.sbs/api
https://processhol.sbs/api
https://p10tgrace.sbs/api
https://3xp3cts1aim.sbs/api
https://p3ar11fter.sbs/api
Signatures
-
Amadey family
-
Cryptbot family
-
Detects CryptBot payload 1 IoCs
CryptBot is a C++ stealer distributed widely in bundle with other software.
Processes:
resource yara_rule behavioral2/memory/3788-149-0x0000000069CC0000-0x000000006A71B000-memory.dmp family_cryptbot_v3 -
Lumma family
-
Processes:
dea6ecd433.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection dea6ecd433.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" dea6ecd433.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" dea6ecd433.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" dea6ecd433.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" dea6ecd433.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" dea6ecd433.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
Processes:
870911a169.exeskotes.exedea6ecd433.exe73dedcc630ebd68669c7ee7befac513271f3a06b39ba6e20f4a4cb585ea726ad.exeskotes.exerodda.exe9c577c13cd.exe54130b1133.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 870911a169.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dea6ecd433.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 73dedcc630ebd68669c7ee7befac513271f3a06b39ba6e20f4a4cb585ea726ad.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rodda.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9c577c13cd.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 54130b1133.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
Processes:
chrome.exechrome.exechrome.exechrome.exepid process 2276 chrome.exe 5164 chrome.exe 5692 chrome.exe 5032 chrome.exe -
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
skotes.exe9c577c13cd.exe54130b1133.exeskotes.exe73dedcc630ebd68669c7ee7befac513271f3a06b39ba6e20f4a4cb585ea726ad.exerodda.exe870911a169.exedea6ecd433.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9c577c13cd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 54130b1133.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 73dedcc630ebd68669c7ee7befac513271f3a06b39ba6e20f4a4cb585ea726ad.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 73dedcc630ebd68669c7ee7befac513271f3a06b39ba6e20f4a4cb585ea726ad.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rodda.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9c577c13cd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 54130b1133.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 870911a169.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dea6ecd433.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rodda.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 870911a169.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dea6ecd433.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
73dedcc630ebd68669c7ee7befac513271f3a06b39ba6e20f4a4cb585ea726ad.exeskotes.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 73dedcc630ebd68669c7ee7befac513271f3a06b39ba6e20f4a4cb585ea726ad.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 8 IoCs
Processes:
skotes.exerodda.exe9c577c13cd.exe54130b1133.exe870911a169.exe28cd24b254.exeskotes.exedea6ecd433.exepid process 2160 skotes.exe 4928 rodda.exe 3788 9c577c13cd.exe 4400 54130b1133.exe 2108 870911a169.exe 828 28cd24b254.exe 1840 skotes.exe 3616 dea6ecd433.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
870911a169.exeskotes.exedea6ecd433.exe73dedcc630ebd68669c7ee7befac513271f3a06b39ba6e20f4a4cb585ea726ad.exeskotes.exerodda.exe9c577c13cd.exe54130b1133.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 870911a169.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine dea6ecd433.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 73dedcc630ebd68669c7ee7befac513271f3a06b39ba6e20f4a4cb585ea726ad.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine rodda.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 9c577c13cd.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 54130b1133.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
dea6ecd433.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features dea6ecd433.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" dea6ecd433.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
skotes.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\28cd24b254.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007392001\\28cd24b254.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dea6ecd433.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007393001\\dea6ecd433.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\54130b1133.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007390001\\54130b1133.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\870911a169.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007391001\\870911a169.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\1007392001\28cd24b254.exe autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
Processes:
73dedcc630ebd68669c7ee7befac513271f3a06b39ba6e20f4a4cb585ea726ad.exeskotes.exerodda.exe9c577c13cd.exe54130b1133.exe870911a169.exeskotes.exedea6ecd433.exepid process 4944 73dedcc630ebd68669c7ee7befac513271f3a06b39ba6e20f4a4cb585ea726ad.exe 2160 skotes.exe 4928 rodda.exe 3788 9c577c13cd.exe 4400 54130b1133.exe 2108 870911a169.exe 1840 skotes.exe 3616 dea6ecd433.exe -
Drops file in Windows directory 1 IoCs
Processes:
73dedcc630ebd68669c7ee7befac513271f3a06b39ba6e20f4a4cb585ea726ad.exedescription ioc process File created C:\Windows\Tasks\skotes.job 73dedcc630ebd68669c7ee7befac513271f3a06b39ba6e20f4a4cb585ea726ad.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3784 3788 WerFault.exe 9c577c13cd.exe -
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
dea6ecd433.exetaskkill.exeskotes.exerodda.exe9c577c13cd.exe28cd24b254.exetaskkill.exetaskkill.exe73dedcc630ebd68669c7ee7befac513271f3a06b39ba6e20f4a4cb585ea726ad.exe54130b1133.exe870911a169.exetaskkill.exetaskkill.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dea6ecd433.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rodda.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9c577c13cd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 28cd24b254.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 73dedcc630ebd68669c7ee7befac513271f3a06b39ba6e20f4a4cb585ea726ad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 54130b1133.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 870911a169.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exefirefox.exe9c577c13cd.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 9c577c13cd.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 9c577c13cd.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Kills process with taskkill 5 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 2220 taskkill.exe 4412 taskkill.exe 4176 taskkill.exe 2912 taskkill.exe 452 taskkill.exe -
Modifies registry class 1 IoCs
Processes:
firefox.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 25 IoCs
Processes:
73dedcc630ebd68669c7ee7befac513271f3a06b39ba6e20f4a4cb585ea726ad.exeskotes.exerodda.exe9c577c13cd.exe54130b1133.exe870911a169.exe28cd24b254.exeskotes.exedea6ecd433.exechrome.exepid process 4944 73dedcc630ebd68669c7ee7befac513271f3a06b39ba6e20f4a4cb585ea726ad.exe 4944 73dedcc630ebd68669c7ee7befac513271f3a06b39ba6e20f4a4cb585ea726ad.exe 2160 skotes.exe 2160 skotes.exe 4928 rodda.exe 4928 rodda.exe 3788 9c577c13cd.exe 3788 9c577c13cd.exe 4400 54130b1133.exe 4400 54130b1133.exe 2108 870911a169.exe 2108 870911a169.exe 828 28cd24b254.exe 828 28cd24b254.exe 1840 skotes.exe 1840 skotes.exe 3616 dea6ecd433.exe 3616 dea6ecd433.exe 3616 dea6ecd433.exe 3616 dea6ecd433.exe 3616 dea6ecd433.exe 828 28cd24b254.exe 828 28cd24b254.exe 5692 chrome.exe 5692 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 5692 chrome.exe 5692 chrome.exe 5692 chrome.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exedea6ecd433.exefirefox.exechrome.exedescription pid process Token: SeDebugPrivilege 2220 taskkill.exe Token: SeDebugPrivilege 4412 taskkill.exe Token: SeDebugPrivilege 4176 taskkill.exe Token: SeDebugPrivilege 2912 taskkill.exe Token: SeDebugPrivilege 452 taskkill.exe Token: SeDebugPrivilege 3616 dea6ecd433.exe Token: SeDebugPrivilege 4820 firefox.exe Token: SeDebugPrivilege 4820 firefox.exe Token: SeShutdownPrivilege 5692 chrome.exe Token: SeCreatePagefilePrivilege 5692 chrome.exe -
Suspicious use of FindShellTrayWindow 61 IoCs
Processes:
73dedcc630ebd68669c7ee7befac513271f3a06b39ba6e20f4a4cb585ea726ad.exe28cd24b254.exefirefox.exechrome.exepid process 4944 73dedcc630ebd68669c7ee7befac513271f3a06b39ba6e20f4a4cb585ea726ad.exe 828 28cd24b254.exe 828 28cd24b254.exe 828 28cd24b254.exe 828 28cd24b254.exe 828 28cd24b254.exe 828 28cd24b254.exe 828 28cd24b254.exe 828 28cd24b254.exe 828 28cd24b254.exe 828 28cd24b254.exe 4820 firefox.exe 4820 firefox.exe 4820 firefox.exe 4820 firefox.exe 4820 firefox.exe 4820 firefox.exe 4820 firefox.exe 4820 firefox.exe 4820 firefox.exe 4820 firefox.exe 4820 firefox.exe 4820 firefox.exe 4820 firefox.exe 4820 firefox.exe 4820 firefox.exe 4820 firefox.exe 4820 firefox.exe 4820 firefox.exe 4820 firefox.exe 4820 firefox.exe 4820 firefox.exe 828 28cd24b254.exe 828 28cd24b254.exe 828 28cd24b254.exe 5692 chrome.exe 5692 chrome.exe 5692 chrome.exe 5692 chrome.exe 5692 chrome.exe 5692 chrome.exe 5692 chrome.exe 5692 chrome.exe 5692 chrome.exe 5692 chrome.exe 5692 chrome.exe 5692 chrome.exe 5692 chrome.exe 5692 chrome.exe 5692 chrome.exe 5692 chrome.exe 5692 chrome.exe 5692 chrome.exe 5692 chrome.exe 5692 chrome.exe 5692 chrome.exe 5692 chrome.exe 5692 chrome.exe 5692 chrome.exe 5692 chrome.exe 5692 chrome.exe -
Suspicious use of SendNotifyMessage 33 IoCs
Processes:
28cd24b254.exefirefox.exepid process 828 28cd24b254.exe 828 28cd24b254.exe 828 28cd24b254.exe 828 28cd24b254.exe 828 28cd24b254.exe 828 28cd24b254.exe 828 28cd24b254.exe 828 28cd24b254.exe 828 28cd24b254.exe 828 28cd24b254.exe 4820 firefox.exe 4820 firefox.exe 4820 firefox.exe 4820 firefox.exe 4820 firefox.exe 4820 firefox.exe 4820 firefox.exe 4820 firefox.exe 4820 firefox.exe 4820 firefox.exe 4820 firefox.exe 4820 firefox.exe 4820 firefox.exe 4820 firefox.exe 4820 firefox.exe 4820 firefox.exe 4820 firefox.exe 4820 firefox.exe 4820 firefox.exe 4820 firefox.exe 828 28cd24b254.exe 828 28cd24b254.exe 828 28cd24b254.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
firefox.exepid process 4820 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
73dedcc630ebd68669c7ee7befac513271f3a06b39ba6e20f4a4cb585ea726ad.exeskotes.exe28cd24b254.exefirefox.exefirefox.exedescription pid process target process PID 4944 wrote to memory of 2160 4944 73dedcc630ebd68669c7ee7befac513271f3a06b39ba6e20f4a4cb585ea726ad.exe skotes.exe PID 4944 wrote to memory of 2160 4944 73dedcc630ebd68669c7ee7befac513271f3a06b39ba6e20f4a4cb585ea726ad.exe skotes.exe PID 4944 wrote to memory of 2160 4944 73dedcc630ebd68669c7ee7befac513271f3a06b39ba6e20f4a4cb585ea726ad.exe skotes.exe PID 2160 wrote to memory of 4928 2160 skotes.exe rodda.exe PID 2160 wrote to memory of 4928 2160 skotes.exe rodda.exe PID 2160 wrote to memory of 4928 2160 skotes.exe rodda.exe PID 2160 wrote to memory of 3788 2160 skotes.exe 9c577c13cd.exe PID 2160 wrote to memory of 3788 2160 skotes.exe 9c577c13cd.exe PID 2160 wrote to memory of 3788 2160 skotes.exe 9c577c13cd.exe PID 2160 wrote to memory of 4400 2160 skotes.exe 54130b1133.exe PID 2160 wrote to memory of 4400 2160 skotes.exe 54130b1133.exe PID 2160 wrote to memory of 4400 2160 skotes.exe 54130b1133.exe PID 2160 wrote to memory of 2108 2160 skotes.exe 870911a169.exe PID 2160 wrote to memory of 2108 2160 skotes.exe 870911a169.exe PID 2160 wrote to memory of 2108 2160 skotes.exe 870911a169.exe PID 2160 wrote to memory of 828 2160 skotes.exe 28cd24b254.exe PID 2160 wrote to memory of 828 2160 skotes.exe 28cd24b254.exe PID 2160 wrote to memory of 828 2160 skotes.exe 28cd24b254.exe PID 828 wrote to memory of 2220 828 28cd24b254.exe taskkill.exe PID 828 wrote to memory of 2220 828 28cd24b254.exe taskkill.exe PID 828 wrote to memory of 2220 828 28cd24b254.exe taskkill.exe PID 828 wrote to memory of 4412 828 28cd24b254.exe taskkill.exe PID 828 wrote to memory of 4412 828 28cd24b254.exe taskkill.exe PID 828 wrote to memory of 4412 828 28cd24b254.exe taskkill.exe PID 2160 wrote to memory of 3616 2160 skotes.exe dea6ecd433.exe PID 2160 wrote to memory of 3616 2160 skotes.exe dea6ecd433.exe PID 2160 wrote to memory of 3616 2160 skotes.exe dea6ecd433.exe PID 828 wrote to memory of 4176 828 28cd24b254.exe taskkill.exe PID 828 wrote to memory of 4176 828 28cd24b254.exe taskkill.exe PID 828 wrote to memory of 4176 828 28cd24b254.exe taskkill.exe PID 828 wrote to memory of 2912 828 28cd24b254.exe taskkill.exe PID 828 wrote to memory of 2912 828 28cd24b254.exe taskkill.exe PID 828 wrote to memory of 2912 828 28cd24b254.exe taskkill.exe PID 828 wrote to memory of 452 828 28cd24b254.exe taskkill.exe PID 828 wrote to memory of 452 828 28cd24b254.exe taskkill.exe PID 828 wrote to memory of 452 828 28cd24b254.exe taskkill.exe PID 828 wrote to memory of 4564 828 28cd24b254.exe firefox.exe PID 828 wrote to memory of 4564 828 28cd24b254.exe firefox.exe PID 4564 wrote to memory of 4820 4564 firefox.exe firefox.exe PID 4564 wrote to memory of 4820 4564 firefox.exe firefox.exe PID 4564 wrote to memory of 4820 4564 firefox.exe firefox.exe PID 4564 wrote to memory of 4820 4564 firefox.exe firefox.exe PID 4564 wrote to memory of 4820 4564 firefox.exe firefox.exe PID 4564 wrote to memory of 4820 4564 firefox.exe firefox.exe PID 4564 wrote to memory of 4820 4564 firefox.exe firefox.exe PID 4564 wrote to memory of 4820 4564 firefox.exe firefox.exe PID 4564 wrote to memory of 4820 4564 firefox.exe firefox.exe PID 4564 wrote to memory of 4820 4564 firefox.exe firefox.exe PID 4564 wrote to memory of 4820 4564 firefox.exe firefox.exe PID 4820 wrote to memory of 4848 4820 firefox.exe firefox.exe PID 4820 wrote to memory of 4848 4820 firefox.exe firefox.exe PID 4820 wrote to memory of 4848 4820 firefox.exe firefox.exe PID 4820 wrote to memory of 4848 4820 firefox.exe firefox.exe PID 4820 wrote to memory of 4848 4820 firefox.exe firefox.exe PID 4820 wrote to memory of 4848 4820 firefox.exe firefox.exe PID 4820 wrote to memory of 4848 4820 firefox.exe firefox.exe PID 4820 wrote to memory of 4848 4820 firefox.exe firefox.exe PID 4820 wrote to memory of 4848 4820 firefox.exe firefox.exe PID 4820 wrote to memory of 4848 4820 firefox.exe firefox.exe PID 4820 wrote to memory of 4848 4820 firefox.exe firefox.exe PID 4820 wrote to memory of 4848 4820 firefox.exe firefox.exe PID 4820 wrote to memory of 4848 4820 firefox.exe firefox.exe PID 4820 wrote to memory of 4848 4820 firefox.exe firefox.exe PID 4820 wrote to memory of 4848 4820 firefox.exe firefox.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\73dedcc630ebd68669c7ee7befac513271f3a06b39ba6e20f4a4cb585ea726ad.exe"C:\Users\Admin\AppData\Local\Temp\73dedcc630ebd68669c7ee7befac513271f3a06b39ba6e20f4a4cb585ea726ad.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\1007319001\rodda.exe"C:\Users\Admin\AppData\Local\Temp\1007319001\rodda.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4928
-
-
C:\Users\Admin\AppData\Local\Temp\1007381001\9c577c13cd.exe"C:\Users\Admin\AppData\Local\Temp\1007381001\9c577c13cd.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:3788 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5692 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffc1c9acc40,0x7ffc1c9acc4c,0x7ffc1c9acc585⤵PID:5732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1948,i,8270832176939473631,7412876641080929433,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1940 /prefetch:25⤵PID:5824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1788,i,8270832176939473631,7412876641080929433,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2060 /prefetch:35⤵PID:5852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2208,i,8270832176939473631,7412876641080929433,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2460 /prefetch:85⤵PID:6032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3156,i,8270832176939473631,7412876641080929433,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3172 /prefetch:15⤵
- Uses browser remote debugging
PID:2276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3196,i,8270832176939473631,7412876641080929433,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3332 /prefetch:15⤵
- Uses browser remote debugging
PID:5032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4484,i,8270832176939473631,7412876641080929433,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4500 /prefetch:15⤵
- Uses browser remote debugging
PID:5164
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"4⤵PID:5804
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:1552
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3788 -s 17524⤵
- Program crash
PID:3784
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007390001\54130b1133.exe"C:\Users\Admin\AppData\Local\Temp\1007390001\54130b1133.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4400
-
-
C:\Users\Admin\AppData\Local\Temp\1007391001\870911a169.exe"C:\Users\Admin\AppData\Local\Temp\1007391001\870911a169.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2108
-
-
C:\Users\Admin\AppData\Local\Temp\1007392001\28cd24b254.exe"C:\Users\Admin\AppData\Local\Temp\1007392001\28cd24b254.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2220
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4412
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4176
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2912
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:452
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1984 -parentBuildID 20240401114208 -prefsHandle 1892 -prefMapHandle 1884 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {fbee4126-48b4-45ca-9d49-afe6b99e1a6e} 4820 "\\.\pipe\gecko-crash-server-pipe.4820" gpu6⤵PID:4848
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2424 -parentBuildID 20240401114208 -prefsHandle 2400 -prefMapHandle 2396 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c8b7a384-f535-4315-adad-9a3db721e328} 4820 "\\.\pipe\gecko-crash-server-pipe.4820" socket6⤵PID:3536
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2984 -childID 1 -isForBrowser -prefsHandle 3064 -prefMapHandle 3060 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7b37433c-90f1-4fd4-8443-efe93dc1a9ec} 4820 "\\.\pipe\gecko-crash-server-pipe.4820" tab6⤵PID:1060
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4056 -childID 2 -isForBrowser -prefsHandle 4012 -prefMapHandle 4008 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b1134376-640b-4487-a3a3-f7badf586bbc} 4820 "\\.\pipe\gecko-crash-server-pipe.4820" tab6⤵PID:3388
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4608 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4972 -prefMapHandle 4968 -prefsLen 29197 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5127743b-2346-454c-90b5-1c8553e2be07} 4820 "\\.\pipe\gecko-crash-server-pipe.4820" utility6⤵
- Checks processor information in registry
PID:5920
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5408 -childID 3 -isForBrowser -prefsHandle 5476 -prefMapHandle 5460 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d567355e-0a13-41e3-b8e3-77fb04b34347} 4820 "\\.\pipe\gecko-crash-server-pipe.4820" tab6⤵PID:5292
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5360 -childID 4 -isForBrowser -prefsHandle 5608 -prefMapHandle 5592 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {05e2ed14-cf3d-49cc-a4a0-fb6b09c9cc7e} 4820 "\\.\pipe\gecko-crash-server-pipe.4820" tab6⤵PID:5308
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5872 -childID 5 -isForBrowser -prefsHandle 5792 -prefMapHandle 5796 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {59df5b20-9af4-4db3-a5f9-9a4650a42ef2} 4820 "\\.\pipe\gecko-crash-server-pipe.4820" tab6⤵PID:5320
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007393001\dea6ecd433.exe"C:\Users\Admin\AppData\Local\Temp\1007393001\dea6ecd433.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3616
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1840
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3788 -ip 37881⤵PID:1344
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵PID:5836
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵PID:184
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵PID:3880
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵PID:5688
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\85mw8mk9.default-release\activity-stream.discovery_stream.json
Filesize21KB
MD50cb28d6d38af315c2bcde3e80eef610a
SHA1c5fab6795fb84ef5247ab9bc12500fa186fba170
SHA256c514b93684d7a494aafe42ed9f88b39465ec073338687028c0ea7a12b88ae5a3
SHA512663044baedb576d7c890cdc7840ac500afad32161a3a922885ab398db0cb6d447171a014c4dbf698adf64a8fd50c552139939d42584e5e272f3b81e324c0fff6
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\85mw8mk9.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD53378785a3815a530251cd080883f2093
SHA1c2bf489029c02d85c2391dd4d244489448b9ee5a
SHA256551461aecc376a2444d1b86b52a87796d5220ff4c834be7e64d767824fedd907
SHA51271f792358d560acafb11971f7fd61fcaf6f467332f9841feff1192ee1afe08b8141dd006452686c61f499fcaf570638d707f4a9f04b91665fa100684db08d4a7
-
Filesize
1.8MB
MD586a5d7f66a6aa908260e684c97079ef3
SHA1cc3beab7c38ee4a341bce58937eb8433e4b30990
SHA256b4c6b9f9f3bd55090817a9a10fec28be0db3d90578f6c1cc89a9cce3363a2f91
SHA512bb5087e5729cf2ad204de2259c93ff77fa051212759aae0cd67530211409c205f0bec6cc2eac855fb35515af6fb444f6c1d2c1a42abc6aa4d4d455f1665c62de
-
Filesize
4.2MB
MD568966b935b2969df05ccabb39464dadf
SHA15fc3a0411665d92eea50dba29ff9dd1903f7b67c
SHA25688efc081c361faad14d9d2b900cc153dbda1673a7a7fa0cbfb9af3de3a52d5ef
SHA5122ffb245fcaf1fdc1b8d215ae5430e975e123dcc7772e6264c5a5a4ced0c022daf0897900c2b483e336aff29f1a4d6963c4574d528acb961e82748a636c9c5030
-
Filesize
1.8MB
MD5e88c167dbdf77ae802bdcdf1bd4a233a
SHA13799fe37253cc2ec389254b72f8aa00cca1a257d
SHA25696f4bc1469a5c172054bf2a70298d6ff0d7f822957e1f50dd6328d48675066ab
SHA512b2f9ba9faf4bac791be4a54331c1a003179f9e41a7d69c677f486e2f5fd7d592047a0a3311ad20acb33c4d6808025812ece8bbd7ed3f6fb4dc770db8bcba1d26
-
Filesize
1.7MB
MD54af4fd1359ae8fae97130ce218f55035
SHA1423eff555900f795dda17a065b6e46e76d11b2ab
SHA256385057393bd0f229405d31ff87797fbadfb4e410f4cd9c676fa03d52302a19e6
SHA51263b4a2e820db97deb4b4119ab2759ff3212c5bd0b6dd21deaad403729ccd1f06f6d4c267adba3e920ab1ce13b611a56fdd8aa79241ebdf3db039fb2212a21f21
-
Filesize
900KB
MD58fe56e30eacadb8bbbdf7840c377e953
SHA1fc78f67c6888b37c56469282cf5cbde3952e9a5a
SHA256780fe7aacde2ddddfe0ab2e1bb3675ccc9ab5d9d8681b833cdb3f7e56a04cd2f
SHA512472a5f9de8d7e2af7fd30e2f7165457da1afe690b5bd23825ee9efe583c0652077c284a631050ff6ec84ff9130dd9dac18bdc79522e6708f8c8492855182f97d
-
Filesize
2.7MB
MD5d1f0331a911dcf9632e8fc587c76592b
SHA1c39154dda8ed4cddf753f7587d7eda57608c0b73
SHA2569e4e59704d58914adb5704d1bf136690d9e1689a9a7a2bcaa9d1199e2f6c2d08
SHA51226945803dbe5295fdfa6f45e2b03e507016cd160cf3c5a53925be5e6637779fe20489137df7c36ce3ae6ebe906f729bea8bc74519958d8e70f79297af8537149
-
Filesize
1.8MB
MD5ffc4509537ae91b049189c9f7bc777e0
SHA1d07824e044eaea5c875d4c234eccdcfb46676720
SHA25673dedcc630ebd68669c7ee7befac513271f3a06b39ba6e20f4a4cb585ea726ad
SHA51261a8271bc25878faa2a012ab7fd1dc60043db8a8bbcf2b16cb396d6ce21732b83f44bbd64eeca887c2227409c3b52683123681803687a3faf6d6677089ed784f
-
Filesize
92KB
MD5ee55f7a1accf45bea36ff345188cc79a
SHA154bc45145dde689a3f53ec0a4d84fcb76bca97c8
SHA256322a083a646f4d506a6cdd0138778d772cfe1375ce3ec2ef3632fdc9ccf84387
SHA5126bc9a6f2a723c6f7be6acdfc4b3a4c4506099d1a4795cff6a3a57d9d5e4eba60b9e0cc61a7875a763ac30904c0214907bf1168e055159c0523fada41d9519c8f
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\AlternateServices.bin
Filesize18KB
MD5c3c375a2a6bc81a76a89d47b78e13e0e
SHA14c5326aaa7235673b9d9a5f27395dc1e2d2f3151
SHA256016f4f518a4a62f46d773b53596c7c9a9f14984bc33a2994ee211f82e2ff70e1
SHA51214feaa2c130e414b95bf2ee7ea63db49851374e689007dc250b7aca644a48a6dd23f096d9aba4803feb9628fa2169f51f49952d5195c0d734ca1e2135a9c023e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\AlternateServices.bin
Filesize8KB
MD58abe36ac2d9f4c9c08756748f000b484
SHA170f4856e4b23701c42b7fee00430c22f609c3d6b
SHA256d07de4dc5370322f4a99b2adf9e21307d0bc4ccd8476033bdd7a4ccdb796c25f
SHA5128818f83c31202f5068e194d4551e52fa55984a8c6d92eed2ebb1118fab102648e6347af4df493e54fc379c1d5cbd6fd5097e78afdff0c9f07af0504f59dad389
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD54d829b9ed589ab4faae26cd4f8e94f1b
SHA1404cda4acc699f613bebc9c08a61c8e8bf035a29
SHA256fc313e55088c4c419c102b0cdc32ea148942641100a32841adf4b784d7fbb662
SHA512e2fb167471cbd87f5f0339c4b5cb5c4654fbcdd0a18dcf1af8237111c646ff2b5b72a116055f184063b5d472d354f53344d10c36fbdfb7c22f11d7ce77c2b284
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5d2548fa7d49ffc8ef4db317fa2529176
SHA11dea5c24da279237e4749fbfbc4d461207dd878f
SHA256d2432ba2c868a0da693524f33d4a95233a5dbc19c7914500d964565f80f394b2
SHA512fcd22a57f5d3e6210652136c67894397627b5537e2c3c79ce3e16974dea89f819cc191664021cb611bc3e7a960bb7e5ecbdc275309cfde456aff1334c1898602
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5cf86c7f9cfa23725a40a798a118db212
SHA129fd4306875411ae9faa7f76ec7df5c44b8d0484
SHA2568af93f27d95636533791359dd8d34692f737aadeb7eb4aa48a6e3d4cad0ac45f
SHA51292a7f0016fccf8fe1d97f9c8772e5aaa866724b96e72c95dc70d220e03ed2c6091fc1ccc770c117ed44a6cda2977013ca81c2e60c8738d3a44bc02505331118b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD52b315fa5ae8075bea158ee06fa6bd263
SHA189ba1ad5b4969b774e31e33179df29d938db8c57
SHA25651e7af5788f9bf444992d37b05eb577c3a6bede8d2b402a179e43e27bd11ce20
SHA512e49aea6a198fdffc548ae393ae7147cabe38633beddf3d96e921b736e57e9a5f2f763dee3f285784c4864d852ceef1dd2518585d4d30f745f34c3e05b486c849
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\pending_pings\0c872c9f-764c-4886-aed8-16c0fb2b86d0
Filesize982B
MD5b37a0709f62f6b04c23974edef151446
SHA1c73838f7de8623c111f13981445afef06ef01c7c
SHA256c8953ad5c6c1791fc1b029943588da30b9a69b460090c94af9ab3fe3ba5e95d4
SHA512ffce735d79afd6746f81d174b9cc1109ad410bedca276d16c6e3db69814765dc05c22f96f48c90a921cae8f692467383061bebc3c2a8202606267ecf90b7031d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\pending_pings\698023f4-f32a-4a1c-b8c8-503ec2aad906
Filesize671B
MD5008dd6c02c1627934a7605b89cd77bec
SHA1dee6a8b519d4abceef0c8ff2d0a7093f080c47a4
SHA256d16cab4da9ce9193ba81b89e2bf0d1e8eef5b97463f80a63a31ea6787bd27131
SHA512b310cd9626faed548e3e6da23a376b3986757f1a077863b0745ca3876828d537cb1f4c161c653443867af9ee4ddb113a25e084c6be4104d73ad1979f26db02fc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\pending_pings\cbf89bb6-6cfb-4cc3-a968-f394995a6e3e
Filesize27KB
MD5cff70b765e6dc542a8cb25d2d4dc144a
SHA1eee08118097565203f1c80e95cb45d4fce301c8d
SHA256028522cb4be08b0034f77fcc3185ed3beaa63bcb41be8fc031348b950f1b2e75
SHA5127247c49cde3d5bfaf9739050e72f457581dc6076b742859779c6822e4cd2d2f832b2115208878e82bccb196224a984c26a8661f66ad082fca8f4de491e27939a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD50a9b688bb71530b715ddaf81778c2f96
SHA12348edcbce33dfac671a94f6f8d52f75f3c0aa4a
SHA256322c0ff6f8a26dc857c3f6c86ae292832e4ef1c1632a12922f698e08d407b92d
SHA512bc32814ec32d8f925f38454237af272d86aa40a9986b604af5807046fe0905d88a7f50c31f31cff4cfd7731d1a231be9367bf4587ca07407d0d2cba66b36e4cd
-
Filesize
16KB
MD5e9cf2178fd928344c0cac61d1d1c92bd
SHA10946680ea9fb8cc4bb0b2fcc9a893f3303af443a
SHA256de30c12a2f9760ed36dd7dd236d2d649d5f5779b3ea83ecbdb21dd5a97fed270
SHA512c21afc02cd5e57d33afa65ffd440d7f50b4eb535ed91cd3c118b592b39c91aef2cc97f86e003f93c7e9195fd830eb9e65a8123057b6d35839dd1d47126a7a80f
-
Filesize
10KB
MD5f5b4a55186d98856d323b400572ac094
SHA1e9506e34eae8e67445cba52b2c73859b33008ed1
SHA256bc67a419a447282664ca93867df76c5672bb503a1a59f4ce14f73b4f2a48635c
SHA512f93e281f03200c0f6f79701521cd526c650e35bbaabe3be8ac5c2be80e56224d594dc7b6933b1512764a6a755f4ed8e4a209b122df2dd335586e6d73e64b2bc1
-
Filesize
11KB
MD5acb5b4ceac6c9b79b9f5ac435cf20e8c
SHA132a40e32bf262250394a7d66e854487cb60bcb2e
SHA256bcd4f92576e404b48bfdbb78361c462d61ae471a92134a65072a36ec039c823f
SHA5129ad2eff3fce8dade5714924ebccec10e15dbc14e119dd994d85cc01a7762972192880e41b5430df89389c8b1c8ba797b6a23cdb9ee9d9617071c7cb71056c215
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e