Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 08:08
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240903-en
General
-
Target
file.exe
-
Size
1.8MB
-
MD5
46ab0dfcc0d7963fb73bec088b2e576c
-
SHA1
3300d08f1bb7663295961861bd51abe2a85ff5c6
-
SHA256
2eb9ac7a217fdd500e26a8ad53d15f5a458a79240e58cb31348e820d338138ed
-
SHA512
637feffec1fb32c4c7e97a8184797b0df8c590eb83e2d2e659ff70b331510dcaedd186e18cb4bac00245cfbbf8a1f283f0bb290c0cc541f508476532687d7709
-
SSDEEP
49152:dr1+ox7lz+GcT2/2PlVULOrTECkun1W0Ro7:dh7nzWc2PWKkunc6o
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Cryptbot family
-
Detects CryptBot payload 1 IoCs
CryptBot is a C++ stealer distributed widely in bundle with other software.
Processes:
resource yara_rule behavioral2/memory/1772-778-0x0000000069CC0000-0x000000006A71B000-memory.dmp family_cryptbot_v3 -
Processes:
5fdd9314ef.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 5fdd9314ef.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 5fdd9314ef.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 5fdd9314ef.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 5fdd9314ef.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 5fdd9314ef.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 5fdd9314ef.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
Processes:
file.exeskotes.exe401c94916a.exeskotes.exea2f13f4904.exe04c24d163c.exeskotes.exe5fdd9314ef.exeskotes.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 401c94916a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a2f13f4904.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 04c24d163c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5fdd9314ef.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
Processes:
chrome.exechrome.exechrome.exechrome.exepid process 4280 chrome.exe 5396 chrome.exe 5592 chrome.exe 6096 chrome.exe -
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
04c24d163c.exeskotes.exeskotes.exe401c94916a.exe5fdd9314ef.exeskotes.exefile.exea2f13f4904.exeskotes.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 04c24d163c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 401c94916a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5fdd9314ef.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5fdd9314ef.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a2f13f4904.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 401c94916a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a2f13f4904.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 04c24d163c.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
a2f13f4904.exefile.exeskotes.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation a2f13f4904.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation file.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 12 IoCs
Processes:
skotes.exea2f13f4904.exe401c94916a.exe04c24d163c.exe853218adc8.exeskotes.exe5fdd9314ef.exeservice123.exeskotes.exeservice123.exeskotes.exeservice123.exepid process 4396 skotes.exe 1772 a2f13f4904.exe 4684 401c94916a.exe 3128 04c24d163c.exe 1624 853218adc8.exe 3252 skotes.exe 5300 5fdd9314ef.exe 5308 service123.exe 2556 skotes.exe 2128 service123.exe 3448 skotes.exe 2408 service123.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
401c94916a.exeskotes.exe5fdd9314ef.exeskotes.exefile.exeskotes.exea2f13f4904.exe04c24d163c.exeskotes.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 401c94916a.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 5fdd9314ef.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine file.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine a2f13f4904.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 04c24d163c.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe -
Loads dropped DLL 3 IoCs
Processes:
service123.exeservice123.exeservice123.exepid process 5308 service123.exe 2128 service123.exe 2408 service123.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
5fdd9314ef.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 5fdd9314ef.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 5fdd9314ef.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
skotes.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\401c94916a.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007883001\\401c94916a.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\04c24d163c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007884001\\04c24d163c.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\853218adc8.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007885001\\853218adc8.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5fdd9314ef.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007886001\\5fdd9314ef.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\1007885001\853218adc8.exe autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
Processes:
file.exeskotes.exea2f13f4904.exe401c94916a.exe04c24d163c.exeskotes.exe5fdd9314ef.exeskotes.exeskotes.exepid process 1688 file.exe 4396 skotes.exe 1772 a2f13f4904.exe 4684 401c94916a.exe 3128 04c24d163c.exe 3252 skotes.exe 5300 5fdd9314ef.exe 2556 skotes.exe 3448 skotes.exe -
Drops file in Windows directory 1 IoCs
Processes:
file.exedescription ioc process File created C:\Windows\Tasks\skotes.job file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1676 1772 WerFault.exe a2f13f4904.exe -
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
taskkill.exetaskkill.exeskotes.exe853218adc8.exetaskkill.exetaskkill.exe401c94916a.exe5fdd9314ef.exe04c24d163c.exetaskkill.exeschtasks.exefile.exea2f13f4904.exeservice123.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 853218adc8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 401c94916a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5fdd9314ef.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 04c24d163c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a2f13f4904.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exefirefox.exea2f13f4904.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString a2f13f4904.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 a2f13f4904.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 5 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 4464 taskkill.exe 4040 taskkill.exe 3264 taskkill.exe 2808 taskkill.exe 2060 taskkill.exe -
Modifies registry class 1 IoCs
Processes:
firefox.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 27 IoCs
Processes:
file.exeskotes.exea2f13f4904.exe401c94916a.exe04c24d163c.exe853218adc8.exeskotes.exe5fdd9314ef.exechrome.exeskotes.exeskotes.exepid process 1688 file.exe 1688 file.exe 4396 skotes.exe 4396 skotes.exe 1772 a2f13f4904.exe 1772 a2f13f4904.exe 4684 401c94916a.exe 4684 401c94916a.exe 3128 04c24d163c.exe 3128 04c24d163c.exe 1624 853218adc8.exe 1624 853218adc8.exe 3252 skotes.exe 3252 skotes.exe 1624 853218adc8.exe 1624 853218adc8.exe 5300 5fdd9314ef.exe 5300 5fdd9314ef.exe 5300 5fdd9314ef.exe 5300 5fdd9314ef.exe 5300 5fdd9314ef.exe 4280 chrome.exe 4280 chrome.exe 2556 skotes.exe 2556 skotes.exe 3448 skotes.exe 3448 skotes.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exefirefox.exe5fdd9314ef.exechrome.exedescription pid process Token: SeDebugPrivilege 4040 taskkill.exe Token: SeDebugPrivilege 3264 taskkill.exe Token: SeDebugPrivilege 2808 taskkill.exe Token: SeDebugPrivilege 2060 taskkill.exe Token: SeDebugPrivilege 4464 taskkill.exe Token: SeDebugPrivilege 3724 firefox.exe Token: SeDebugPrivilege 3724 firefox.exe Token: SeDebugPrivilege 5300 5fdd9314ef.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeDebugPrivilege 3724 firefox.exe Token: SeDebugPrivilege 3724 firefox.exe Token: SeDebugPrivilege 3724 firefox.exe -
Suspicious use of FindShellTrayWindow 59 IoCs
Processes:
file.exe853218adc8.exefirefox.exechrome.exepid process 1688 file.exe 1624 853218adc8.exe 1624 853218adc8.exe 1624 853218adc8.exe 1624 853218adc8.exe 1624 853218adc8.exe 1624 853218adc8.exe 1624 853218adc8.exe 1624 853218adc8.exe 3724 firefox.exe 3724 firefox.exe 3724 firefox.exe 3724 firefox.exe 3724 firefox.exe 3724 firefox.exe 3724 firefox.exe 3724 firefox.exe 3724 firefox.exe 3724 firefox.exe 3724 firefox.exe 3724 firefox.exe 3724 firefox.exe 3724 firefox.exe 3724 firefox.exe 3724 firefox.exe 3724 firefox.exe 3724 firefox.exe 3724 firefox.exe 3724 firefox.exe 3724 firefox.exe 1624 853218adc8.exe 1624 853218adc8.exe 1624 853218adc8.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe -
Suspicious use of SendNotifyMessage 31 IoCs
Processes:
853218adc8.exefirefox.exepid process 1624 853218adc8.exe 1624 853218adc8.exe 1624 853218adc8.exe 1624 853218adc8.exe 1624 853218adc8.exe 1624 853218adc8.exe 1624 853218adc8.exe 1624 853218adc8.exe 3724 firefox.exe 3724 firefox.exe 3724 firefox.exe 3724 firefox.exe 3724 firefox.exe 3724 firefox.exe 3724 firefox.exe 3724 firefox.exe 3724 firefox.exe 3724 firefox.exe 3724 firefox.exe 3724 firefox.exe 3724 firefox.exe 3724 firefox.exe 3724 firefox.exe 3724 firefox.exe 3724 firefox.exe 3724 firefox.exe 3724 firefox.exe 3724 firefox.exe 1624 853218adc8.exe 1624 853218adc8.exe 1624 853218adc8.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
firefox.exepid process 3724 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
file.exeskotes.exe853218adc8.exefirefox.exefirefox.exedescription pid process target process PID 1688 wrote to memory of 4396 1688 file.exe skotes.exe PID 1688 wrote to memory of 4396 1688 file.exe skotes.exe PID 1688 wrote to memory of 4396 1688 file.exe skotes.exe PID 4396 wrote to memory of 1772 4396 skotes.exe a2f13f4904.exe PID 4396 wrote to memory of 1772 4396 skotes.exe a2f13f4904.exe PID 4396 wrote to memory of 1772 4396 skotes.exe a2f13f4904.exe PID 4396 wrote to memory of 4684 4396 skotes.exe 401c94916a.exe PID 4396 wrote to memory of 4684 4396 skotes.exe 401c94916a.exe PID 4396 wrote to memory of 4684 4396 skotes.exe 401c94916a.exe PID 4396 wrote to memory of 3128 4396 skotes.exe 04c24d163c.exe PID 4396 wrote to memory of 3128 4396 skotes.exe 04c24d163c.exe PID 4396 wrote to memory of 3128 4396 skotes.exe 04c24d163c.exe PID 4396 wrote to memory of 1624 4396 skotes.exe 853218adc8.exe PID 4396 wrote to memory of 1624 4396 skotes.exe 853218adc8.exe PID 4396 wrote to memory of 1624 4396 skotes.exe 853218adc8.exe PID 1624 wrote to memory of 4040 1624 853218adc8.exe taskkill.exe PID 1624 wrote to memory of 4040 1624 853218adc8.exe taskkill.exe PID 1624 wrote to memory of 4040 1624 853218adc8.exe taskkill.exe PID 1624 wrote to memory of 3264 1624 853218adc8.exe taskkill.exe PID 1624 wrote to memory of 3264 1624 853218adc8.exe taskkill.exe PID 1624 wrote to memory of 3264 1624 853218adc8.exe taskkill.exe PID 1624 wrote to memory of 2808 1624 853218adc8.exe taskkill.exe PID 1624 wrote to memory of 2808 1624 853218adc8.exe taskkill.exe PID 1624 wrote to memory of 2808 1624 853218adc8.exe taskkill.exe PID 1624 wrote to memory of 2060 1624 853218adc8.exe taskkill.exe PID 1624 wrote to memory of 2060 1624 853218adc8.exe taskkill.exe PID 1624 wrote to memory of 2060 1624 853218adc8.exe taskkill.exe PID 1624 wrote to memory of 4464 1624 853218adc8.exe taskkill.exe PID 1624 wrote to memory of 4464 1624 853218adc8.exe taskkill.exe PID 1624 wrote to memory of 4464 1624 853218adc8.exe taskkill.exe PID 1624 wrote to memory of 3548 1624 853218adc8.exe firefox.exe PID 1624 wrote to memory of 3548 1624 853218adc8.exe firefox.exe PID 3548 wrote to memory of 3724 3548 firefox.exe firefox.exe PID 3548 wrote to memory of 3724 3548 firefox.exe firefox.exe PID 3548 wrote to memory of 3724 3548 firefox.exe firefox.exe PID 3548 wrote to memory of 3724 3548 firefox.exe firefox.exe PID 3548 wrote to memory of 3724 3548 firefox.exe firefox.exe PID 3548 wrote to memory of 3724 3548 firefox.exe firefox.exe PID 3548 wrote to memory of 3724 3548 firefox.exe firefox.exe PID 3548 wrote to memory of 3724 3548 firefox.exe firefox.exe PID 3548 wrote to memory of 3724 3548 firefox.exe firefox.exe PID 3548 wrote to memory of 3724 3548 firefox.exe firefox.exe PID 3548 wrote to memory of 3724 3548 firefox.exe firefox.exe PID 3724 wrote to memory of 4584 3724 firefox.exe firefox.exe PID 3724 wrote to memory of 4584 3724 firefox.exe firefox.exe PID 3724 wrote to memory of 4584 3724 firefox.exe firefox.exe PID 3724 wrote to memory of 4584 3724 firefox.exe firefox.exe PID 3724 wrote to memory of 4584 3724 firefox.exe firefox.exe PID 3724 wrote to memory of 4584 3724 firefox.exe firefox.exe PID 3724 wrote to memory of 4584 3724 firefox.exe firefox.exe PID 3724 wrote to memory of 4584 3724 firefox.exe firefox.exe PID 3724 wrote to memory of 4584 3724 firefox.exe firefox.exe PID 3724 wrote to memory of 4584 3724 firefox.exe firefox.exe PID 3724 wrote to memory of 4584 3724 firefox.exe firefox.exe PID 3724 wrote to memory of 4584 3724 firefox.exe firefox.exe PID 3724 wrote to memory of 4584 3724 firefox.exe firefox.exe PID 3724 wrote to memory of 4584 3724 firefox.exe firefox.exe PID 3724 wrote to memory of 4584 3724 firefox.exe firefox.exe PID 3724 wrote to memory of 4584 3724 firefox.exe firefox.exe PID 3724 wrote to memory of 4584 3724 firefox.exe firefox.exe PID 3724 wrote to memory of 4584 3724 firefox.exe firefox.exe PID 3724 wrote to memory of 4584 3724 firefox.exe firefox.exe PID 3724 wrote to memory of 4584 3724 firefox.exe firefox.exe PID 3724 wrote to memory of 4584 3724 firefox.exe firefox.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Users\Admin\AppData\Local\Temp\1007882001\a2f13f4904.exe"C:\Users\Admin\AppData\Local\Temp\1007882001\a2f13f4904.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1772 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4280 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffef74acc40,0x7ffef74acc4c,0x7ffef74acc585⤵PID:5140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2064,i,4092547078972995013,6218732815557638330,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2024 /prefetch:25⤵PID:4816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1912,i,4092547078972995013,6218732815557638330,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1600 /prefetch:35⤵PID:5600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2240,i,4092547078972995013,6218732815557638330,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2360 /prefetch:85⤵PID:4588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3188,i,4092547078972995013,6218732815557638330,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3220 /prefetch:15⤵
- Uses browser remote debugging
PID:5396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3200,i,4092547078972995013,6218732815557638330,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3264 /prefetch:15⤵
- Uses browser remote debugging
PID:5592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4528,i,4092547078972995013,6218732815557638330,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4512 /prefetch:15⤵
- Uses browser remote debugging
PID:6096
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5308
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5496
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1772 -s 13044⤵
- Program crash
PID:1676
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007883001\401c94916a.exe"C:\Users\Admin\AppData\Local\Temp\1007883001\401c94916a.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4684
-
-
C:\Users\Admin\AppData\Local\Temp\1007884001\04c24d163c.exe"C:\Users\Admin\AppData\Local\Temp\1007884001\04c24d163c.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3128
-
-
C:\Users\Admin\AppData\Local\Temp\1007885001\853218adc8.exe"C:\Users\Admin\AppData\Local\Temp\1007885001\853218adc8.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4040
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3264
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2808
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2060
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4464
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2040 -parentBuildID 20240401114208 -prefsHandle 1968 -prefMapHandle 1960 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {507c8106-51ae-4cc7-8941-f5dd942528b3} 3724 "\\.\pipe\gecko-crash-server-pipe.3724" gpu6⤵PID:4584
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2468 -parentBuildID 20240401114208 -prefsHandle 2460 -prefMapHandle 2452 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6532efeb-d303-4e92-8098-cbcdf90d860a} 3724 "\\.\pipe\gecko-crash-server-pipe.3724" socket6⤵PID:3036
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3264 -childID 1 -isForBrowser -prefsHandle 3256 -prefMapHandle 3252 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {353b8574-c929-433e-a5df-530616455142} 3724 "\\.\pipe\gecko-crash-server-pipe.3724" tab6⤵PID:2416
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2796 -childID 2 -isForBrowser -prefsHandle 3660 -prefMapHandle 3656 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7e54072a-7a12-4256-8a79-b3bcddbbf19c} 3724 "\\.\pipe\gecko-crash-server-pipe.3724" tab6⤵PID:4252
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4272 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4248 -prefMapHandle 4208 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f631b005-591c-4faf-8eff-66907828384c} 3724 "\\.\pipe\gecko-crash-server-pipe.3724" utility6⤵
- Checks processor information in registry
PID:5280
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5668 -childID 3 -isForBrowser -prefsHandle 5252 -prefMapHandle 5700 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a864226a-5a01-4279-918b-69b6167e925f} 3724 "\\.\pipe\gecko-crash-server-pipe.3724" tab6⤵PID:4980
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5716 -childID 4 -isForBrowser -prefsHandle 5796 -prefMapHandle 5800 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {21e889c3-2801-4ed4-b24f-b62b51e3e9f6} 3724 "\\.\pipe\gecko-crash-server-pipe.3724" tab6⤵PID:4464
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5660 -childID 5 -isForBrowser -prefsHandle 5944 -prefMapHandle 5948 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {103269e4-4582-4797-b05b-f75c4c5d7d68} 3724 "\\.\pipe\gecko-crash-server-pipe.3724" tab6⤵PID:2600
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007886001\5fdd9314ef.exe"C:\Users\Admin\AppData\Local\Temp\1007886001\5fdd9314ef.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5300
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3252
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4624
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1772 -ip 17721⤵PID:2508
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2556
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2128
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3448
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2408
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD59e47983c53fa07258a1497b627df8f70
SHA17b10a4e111a894da3637df0b37e5a85f8ce74c87
SHA2566ba252af503572ef9a766db0b2bdb48aff51ebda582cb2efde94b2e239c33c49
SHA512cea9bf34f9fb4d98180d0c27dc6fd2a5d5130362cb0621a641bea221186408d4e14085ff45444bdd65941090266cb4ac5928fc25ef344f7fd5d7ce0d7206f7fe
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD5324b18dfdcc1253746b4e4c801a72472
SHA13a7769e509cc996596f83e86851c9c83df35ebe2
SHA256154e947be7108444819564bd49ef535dc8ce3337bcbc0b7925a4580be16f08b1
SHA5129650c3613040e62c26102c8d0142f491d77de2dc7287fbb1b10d1ca9874d93195ad028f83c0d66852c424dd3e4c227e37b4af238f3d15bc2dfe4043b8db2c9cf
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\activity-stream.discovery_stream.json
Filesize21KB
MD5f920a92624bd515dcb969da072c200d0
SHA1a9a6504e0374046e20b2edd70a30c6cccbcbb48e
SHA256b7e11d7f58a5db4ca6f75c67013927c97be0e64d4bb001e45395fc72e41313be
SHA5120e705810545e7f4a0c7896289f20de8ffd5a9f002673d190ed6bf5f62ad16e9656fb28f2af9e69c2d2b246b2a1bdcd54f3d2729aca35b435fd44ada8828e86a9
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD58f7448b79168fc96f8d55570be933ff6
SHA1b00a2049a4c277a0f4e15d4f6b89fe3edb858414
SHA2563cbdf19175170089697176b6ce25f57a1b43988951e847a6293e7452e16f2c6d
SHA512aa0203d602534b52d5ce8dcdb8caa1d2a2d43935f49cd67343863e481276997e1b34e7f2c13fd2c7ae9bd7a5153c53b93c99610b8f40d52cde61d85a4fceec24
-
Filesize
4.2MB
MD56b7999360a3bba7b9c342b9f362d09b3
SHA1eda0601fbe1be5ea51a1eb5bdb0df667329e7c72
SHA256e58f6a0abd6378434abc6d2284e3ce60a0b177d2a01c3214c321016a02eaea09
SHA51233caca1ab2b0ba80a6e8c8ec8caa109012a258ffb23951f26c301f0085a5699bbc2a58c5f3c90e944ccff88be76aa8bb88cee7a2be8e7c9620fe10aeded5f5e3
-
Filesize
1.8MB
MD5370fc731525b5f7087a7de06e2de56e6
SHA11064c9d0fbbc6a762cf6d3c0639908952af2d3a3
SHA256278ccd58931cdc130118295753d00791559ff374bd6629158c5cb8f7c38097be
SHA5129ab2e45aa23a0c95b5575cf042b21b45ed61b6854d7d41446942b80618bff9bbca8e1485f7cd94854dd2e8fea46183d317387a2e1965b0b524fab1e7f7c74100
-
Filesize
1.7MB
MD5e28eb84120c7318b0f8fa7fc2bd79398
SHA1f4a8dcebc79558c8640ffc6c0471c6a173d4853d
SHA2560a8d7dc28c9ef08e79873c4446878a4f5b8a443fa31b4f454d606c4419a338f5
SHA512cafcb6ca3a05f3b494592ca9fdd58a022befce7bf89786a99e57a3e8df2c86a22481e9a36615147adab3ee0db8a3f55cfecc4050fce9c4921c63a9caddd03b43
-
Filesize
900KB
MD5b6f1752f8523257a02dc2b78c05025d0
SHA17fc0650f993cf2d6c2796e970f55105105dab707
SHA25641e1a023075295a1c20f923bd4651405bf893ddb7694605f7c576d070c9b8579
SHA5126bcecea3c0e5e37b79b08125e3d49de904a306809f3f31980b205ade0ed72823304387cad59622813a7932013af9cb527408b9aa11c37ac7d26fb7c2dc40ca42
-
Filesize
2.7MB
MD51030d657dac585a568881e12dc2ab0f7
SHA1aa96071d9a8ab685426baa62358cac33b9765621
SHA256f915f6afd3ad47cbf769079b9c5f3bb5394877b0ae2aa072ca9ab46778a7810e
SHA51258a2ad4792b5b4e2a2224866b21de0e83f36206019833a0c29f8967dcfc84e549cb285ac197631bab25e1b0575044c534ec8cc4127e176b27e324b387a99fd86
-
Filesize
1.8MB
MD546ab0dfcc0d7963fb73bec088b2e576c
SHA13300d08f1bb7663295961861bd51abe2a85ff5c6
SHA2562eb9ac7a217fdd500e26a8ad53d15f5a458a79240e58cb31348e820d338138ed
SHA512637feffec1fb32c4c7e97a8184797b0df8c590eb83e2d2e659ff70b331510dcaedd186e18cb4bac00245cfbbf8a1f283f0bb290c0cc541f508476532687d7709
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\AlternateServices.bin
Filesize6KB
MD5571709d0bbc24015026a3861c605e592
SHA1a1e7c774017b4e974718964362be0fc8452c08b3
SHA2568fe662f9e4141f6e51572cc0c5ac0e7d185a02d245a6c7fb8c44d2cde257612a
SHA5121d9b6d15b8a9dbc9bc6a53130f7fe3ee47abc73d714164a251a7de8c3f88940fe4a4e3621a17845cd357cd54f73486cf21ab667ffb76e7720179ba14a907e257
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\AlternateServices.bin
Filesize18KB
MD59a9cf6b080eddb8610476ef3b68c7b78
SHA19cbf7392d1227d34bad984e55cc97b154a52aab7
SHA256a8aeb03d31dd7d6fdf0bbd1cd70d34d34a230b4346743c73fd588c2737066b5c
SHA5124a498ce0705ddd728d0fa159970262408857a7c4a59921132596b3e61b638fe97bd4c69a5358e9ee71cdc7a4efef06f76d2d99e8c764ccc4a1909125234517eb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\AlternateServices.bin
Filesize7KB
MD5eb2361664ece2d0a90d24b4eafdf3f21
SHA15bfc2989adc2c6aa818e82fe30dba6b5325ab625
SHA256926c818df9ad98622da48cefd19086a3bfcfd6fd6b732ec89b0c77a7ae3978a6
SHA512d315c5522703c58c9307271056beea549ab1fe28799877780841aea7b8539cacdbedb42b82c63515ce0aa569a17bd2b65bb474e08061afc101097c01db0ca392
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5832280c76cb95fb8323ad0b2903637b7
SHA161b0c0f0f705e89c21c675e8eba1f2f8720874cb
SHA2568b2ef0067c9242c93b5c6038ffb5134efe1a5ccd636dda9c69e20100593d8971
SHA5124a68c41f6853acfceab1bc2d1c01d5f7475e0c92117bb2738e2a270dbba92672b677425b1b59080a300dd3789087f9fc137e9cf99cb649eb070eca3cb0b00595
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD533327ecf06442587efa25e71601e75bc
SHA12c55f72503dc0a7075177b26203988d9fdac162a
SHA256820febaca210ab01fd4d17b1ab8b159f92eeaf1b2eaea1b6aa3b2d1f7c5078ff
SHA5125027fb4e1defa081ac2b92388aec2a20455cde131a457ff412d74ceb5ed672c01b5f9ac296bb57f1efa49e9bf175bb25a07864e74a255580a89570ff5198d963
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\pending_pings\2c63ccb2-32d2-4889-8127-f6bcff133306
Filesize671B
MD525531eefdea7250e8085e4b2eefc66ad
SHA10a1f3629df6dfecf92c90c2002d63bb513a44797
SHA256a2620511abcf33adcc7de315c1ecf330af17614b88ca8be7827e9f72f42be098
SHA51253e889b26dbefc4cc0b0b06ce46c5cc35eef8800811898f8a6279987b0de1ffa8da09a7dde0e0cba2d23243b501321a15588ff51de007c0c18f00bd73f26b6c3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\pending_pings\c251d5cd-bbf8-44a6-af2d-b37b1e1b6791
Filesize982B
MD59aa32fede468877e22a3e64901efa114
SHA1335ff7c02ee9e5c0b608e22b8ce455b4da918a75
SHA256e968e80c9874668c714492895571e687fc7563d63e1569a38d5642755d247777
SHA51254dd885f7d9b17bd3b8ea400d2f3045c8e456931605355aaf4e6758e236cd39353a6fe9245613f4efc138bca209cf262599eb533f42f6153b2c0a9a4fd6b42ae
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\pending_pings\ca73465c-4eac-4a84-94b5-47c1f9cb4fb2
Filesize25KB
MD5a2ebd401cfac5c6636969ae48cdbebda
SHA1f80483881826aab06fbc6cd7a2bc8b29a890b34d
SHA2560ebf8f45f53f2a2e870d79fb324ad6db0a7f1716551d1265b7dc5ae09da5288d
SHA512f1e6178819fc26d54a411375cb3c42bc119244940ebbde9abd653c2f49f4a5538074353a962d52ffac8091b5a5e4acf742668876bcd4ff23f6c1c639efd87226
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD5511eb1031d357d70d8c51b636fda0208
SHA1a3129f94a446d73231be6fced325ebacf6218311
SHA256e4a30788958882f3b777136da2bd2c95d168234bc9967d115a11ee8ac10bb0a1
SHA512600d866e2a1147fe289d817b387c2c3a85663af4697b5cda19179d68faece5ba22beee299035306da07e294196af6ed5ebb1ab14f1318a55a81b68c4ea71569e
-
Filesize
15KB
MD5b06971576dc0346686673648b3064c6e
SHA1716a8fc12e374eb66c651552aa24465f81d46290
SHA256a337b6eab5e58ecc04a5f4585df0a3c6381153a41e22120fad53aab91846e2c1
SHA512a618219d8fdcf1b6bb569ebd3c79f01e87c271afef835dded04ace12a3987550c74d72612f2f6bca8c3c090dfe3fb406885d406fe917c17d70d8ecbd13d9ecfc
-
Filesize
10KB
MD5f29f3418132dbaaeda98752647bd29cd
SHA1997a42bac1c0cce1cf4473a3d2492984f50d7a19
SHA2561349bfd723d9a88dd0081222ea4849423b25ea8751cccba40d49083c4f1b85c7
SHA5120d6fd231f95d607110c0c1fe98ea03ffe3a48c3c650dc00840d586bf20274861517eb55a2216ebe4dec1f6ac7b45fc59226067983d16d478ee11ec26a0fc682c
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e