Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 13:13
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20241010-en
General
-
Target
file.exe
-
Size
1.8MB
-
MD5
ea7705c2143e7c21967211c16fceb549
-
SHA1
5ed0a996617121fe8c267bcb2b7e7adcbf8cf1be
-
SHA256
f177f34b07fa2237adfda7ce8aa42889e1529bf25abe1f7df58613c8c5197a34
-
SHA512
202a3862bf26a9e3b839c38a30b62473bc4190b010fe54520ffb4ea10a2a0fbb424efa08df14c6df88bfb0669d48cb22e358bca374bbb1391055521d18bc875c
-
SSDEEP
49152:vuYKP41uIfWVr1H9muoLiwthIySOt8r+wc3Tfvuv1WNQsU/xWlE:vf84IiWB1IuoL7SOY+xjfvgxrw
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Cryptbot family
-
Detects CryptBot payload 1 IoCs
CryptBot is a C++ stealer distributed widely in bundle with other software.
Processes:
resource yara_rule behavioral2/memory/1932-68-0x0000000069CC0000-0x000000006A71B000-memory.dmp family_cryptbot_v3 -
Processes:
6adfc28828.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 6adfc28828.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 6adfc28828.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 6adfc28828.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 6adfc28828.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 6adfc28828.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 6adfc28828.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
Processes:
6adfc28828.exefile.exe274e6484df.exec4fdb81414.exeskotes.exeskotes.exeskotes.exeskotes.exe7f5654a0ec.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6adfc28828.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 274e6484df.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c4fdb81414.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7f5654a0ec.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
Processes:
chrome.exechrome.exechrome.exechrome.exepid process 2552 chrome.exe 2344 chrome.exe 4768 chrome.exe 4388 chrome.exe -
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
skotes.exeskotes.exec4fdb81414.exeskotes.exefile.exe7f5654a0ec.exe274e6484df.exeskotes.exe6adfc28828.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c4fdb81414.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7f5654a0ec.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 274e6484df.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 274e6484df.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7f5654a0ec.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c4fdb81414.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6adfc28828.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6adfc28828.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
file.exeskotes.exe7f5654a0ec.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation file.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 7f5654a0ec.exe -
Executes dropped EXE 12 IoCs
Processes:
skotes.exeskotes.exe7f5654a0ec.exe274e6484df.exec4fdb81414.exe4e17fb2f8d.exe6adfc28828.exeservice123.exeskotes.exeservice123.exeskotes.exeservice123.exepid process 4320 skotes.exe 2500 skotes.exe 1932 7f5654a0ec.exe 3236 274e6484df.exe 3664 c4fdb81414.exe 4620 4e17fb2f8d.exe 1040 6adfc28828.exe 5444 service123.exe 3956 skotes.exe 1616 service123.exe 5904 skotes.exe 5300 service123.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
file.exeskotes.exeskotes.exe274e6484df.exeskotes.exeskotes.exe7f5654a0ec.exec4fdb81414.exe6adfc28828.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine file.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 274e6484df.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 7f5654a0ec.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine c4fdb81414.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 6adfc28828.exe -
Loads dropped DLL 3 IoCs
Processes:
service123.exeservice123.exeservice123.exepid process 5444 service123.exe 1616 service123.exe 5300 service123.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
6adfc28828.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 6adfc28828.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 6adfc28828.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
skotes.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\6adfc28828.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007939001\\6adfc28828.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\274e6484df.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007936001\\274e6484df.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\c4fdb81414.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007937001\\c4fdb81414.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\4e17fb2f8d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007938001\\4e17fb2f8d.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\1007938001\4e17fb2f8d.exe autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
Processes:
file.exeskotes.exeskotes.exe7f5654a0ec.exe274e6484df.exec4fdb81414.exe6adfc28828.exeskotes.exeskotes.exepid process 4628 file.exe 4320 skotes.exe 2500 skotes.exe 1932 7f5654a0ec.exe 3236 274e6484df.exe 3664 c4fdb81414.exe 1040 6adfc28828.exe 3956 skotes.exe 5904 skotes.exe -
Drops file in Windows directory 1 IoCs
Processes:
file.exedescription ioc process File created C:\Windows\Tasks\skotes.job file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5868 1932 WerFault.exe 7f5654a0ec.exe -
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
taskkill.exetaskkill.exeservice123.exeschtasks.exefile.exeskotes.exec4fdb81414.exe4e17fb2f8d.exe6adfc28828.exe274e6484df.exetaskkill.exetaskkill.exe7f5654a0ec.exetaskkill.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c4fdb81414.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4e17fb2f8d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6adfc28828.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 274e6484df.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7f5654a0ec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exe7f5654a0ec.exefirefox.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 7f5654a0ec.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 7f5654a0ec.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Kills process with taskkill 5 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 3040 taskkill.exe 2036 taskkill.exe 1060 taskkill.exe 1952 taskkill.exe 1536 taskkill.exe -
Modifies registry class 1 IoCs
Processes:
firefox.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 27 IoCs
Processes:
file.exeskotes.exeskotes.exe7f5654a0ec.exe274e6484df.exec4fdb81414.exe4e17fb2f8d.exechrome.exe6adfc28828.exeskotes.exeskotes.exepid process 4628 file.exe 4628 file.exe 4320 skotes.exe 4320 skotes.exe 2500 skotes.exe 2500 skotes.exe 1932 7f5654a0ec.exe 1932 7f5654a0ec.exe 3236 274e6484df.exe 3236 274e6484df.exe 3664 c4fdb81414.exe 3664 c4fdb81414.exe 4620 4e17fb2f8d.exe 4620 4e17fb2f8d.exe 2344 chrome.exe 2344 chrome.exe 4620 4e17fb2f8d.exe 4620 4e17fb2f8d.exe 1040 6adfc28828.exe 1040 6adfc28828.exe 1040 6adfc28828.exe 1040 6adfc28828.exe 1040 6adfc28828.exe 3956 skotes.exe 3956 skotes.exe 5904 skotes.exe 5904 skotes.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 2344 chrome.exe 2344 chrome.exe 2344 chrome.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exechrome.exefirefox.exe6adfc28828.exedescription pid process Token: SeDebugPrivilege 3040 taskkill.exe Token: SeDebugPrivilege 2036 taskkill.exe Token: SeDebugPrivilege 1060 taskkill.exe Token: SeDebugPrivilege 1952 taskkill.exe Token: SeDebugPrivilege 1536 taskkill.exe Token: SeShutdownPrivilege 2344 chrome.exe Token: SeCreatePagefilePrivilege 2344 chrome.exe Token: SeShutdownPrivilege 2344 chrome.exe Token: SeCreatePagefilePrivilege 2344 chrome.exe Token: SeDebugPrivilege 3008 firefox.exe Token: SeDebugPrivilege 3008 firefox.exe Token: SeDebugPrivilege 1040 6adfc28828.exe Token: SeDebugPrivilege 3008 firefox.exe Token: SeDebugPrivilege 3008 firefox.exe Token: SeDebugPrivilege 3008 firefox.exe -
Suspicious use of FindShellTrayWindow 59 IoCs
Processes:
file.exe4e17fb2f8d.exechrome.exefirefox.exepid process 4628 file.exe 4620 4e17fb2f8d.exe 4620 4e17fb2f8d.exe 4620 4e17fb2f8d.exe 4620 4e17fb2f8d.exe 4620 4e17fb2f8d.exe 4620 4e17fb2f8d.exe 2344 chrome.exe 2344 chrome.exe 2344 chrome.exe 2344 chrome.exe 2344 chrome.exe 2344 chrome.exe 2344 chrome.exe 2344 chrome.exe 2344 chrome.exe 2344 chrome.exe 2344 chrome.exe 2344 chrome.exe 2344 chrome.exe 2344 chrome.exe 2344 chrome.exe 2344 chrome.exe 2344 chrome.exe 2344 chrome.exe 2344 chrome.exe 2344 chrome.exe 2344 chrome.exe 2344 chrome.exe 2344 chrome.exe 2344 chrome.exe 2344 chrome.exe 2344 chrome.exe 4620 4e17fb2f8d.exe 3008 firefox.exe 3008 firefox.exe 3008 firefox.exe 3008 firefox.exe 4620 4e17fb2f8d.exe 3008 firefox.exe 3008 firefox.exe 3008 firefox.exe 3008 firefox.exe 3008 firefox.exe 3008 firefox.exe 3008 firefox.exe 3008 firefox.exe 3008 firefox.exe 3008 firefox.exe 3008 firefox.exe 3008 firefox.exe 3008 firefox.exe 3008 firefox.exe 3008 firefox.exe 3008 firefox.exe 3008 firefox.exe 4620 4e17fb2f8d.exe 4620 4e17fb2f8d.exe 4620 4e17fb2f8d.exe -
Suspicious use of SendNotifyMessage 31 IoCs
Processes:
4e17fb2f8d.exefirefox.exepid process 4620 4e17fb2f8d.exe 4620 4e17fb2f8d.exe 4620 4e17fb2f8d.exe 4620 4e17fb2f8d.exe 4620 4e17fb2f8d.exe 4620 4e17fb2f8d.exe 4620 4e17fb2f8d.exe 3008 firefox.exe 3008 firefox.exe 3008 firefox.exe 3008 firefox.exe 4620 4e17fb2f8d.exe 3008 firefox.exe 3008 firefox.exe 3008 firefox.exe 3008 firefox.exe 3008 firefox.exe 3008 firefox.exe 3008 firefox.exe 3008 firefox.exe 3008 firefox.exe 3008 firefox.exe 3008 firefox.exe 3008 firefox.exe 3008 firefox.exe 3008 firefox.exe 3008 firefox.exe 3008 firefox.exe 4620 4e17fb2f8d.exe 4620 4e17fb2f8d.exe 4620 4e17fb2f8d.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
firefox.exepid process 3008 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
file.exeskotes.exe4e17fb2f8d.exe7f5654a0ec.exechrome.exedescription pid process target process PID 4628 wrote to memory of 4320 4628 file.exe skotes.exe PID 4628 wrote to memory of 4320 4628 file.exe skotes.exe PID 4628 wrote to memory of 4320 4628 file.exe skotes.exe PID 4320 wrote to memory of 1932 4320 skotes.exe 7f5654a0ec.exe PID 4320 wrote to memory of 1932 4320 skotes.exe 7f5654a0ec.exe PID 4320 wrote to memory of 1932 4320 skotes.exe 7f5654a0ec.exe PID 4320 wrote to memory of 3236 4320 skotes.exe 274e6484df.exe PID 4320 wrote to memory of 3236 4320 skotes.exe 274e6484df.exe PID 4320 wrote to memory of 3236 4320 skotes.exe 274e6484df.exe PID 4320 wrote to memory of 3664 4320 skotes.exe c4fdb81414.exe PID 4320 wrote to memory of 3664 4320 skotes.exe c4fdb81414.exe PID 4320 wrote to memory of 3664 4320 skotes.exe c4fdb81414.exe PID 4320 wrote to memory of 4620 4320 skotes.exe 4e17fb2f8d.exe PID 4320 wrote to memory of 4620 4320 skotes.exe 4e17fb2f8d.exe PID 4320 wrote to memory of 4620 4320 skotes.exe 4e17fb2f8d.exe PID 4620 wrote to memory of 3040 4620 4e17fb2f8d.exe taskkill.exe PID 4620 wrote to memory of 3040 4620 4e17fb2f8d.exe taskkill.exe PID 4620 wrote to memory of 3040 4620 4e17fb2f8d.exe taskkill.exe PID 4620 wrote to memory of 2036 4620 4e17fb2f8d.exe taskkill.exe PID 4620 wrote to memory of 2036 4620 4e17fb2f8d.exe taskkill.exe PID 4620 wrote to memory of 2036 4620 4e17fb2f8d.exe taskkill.exe PID 4620 wrote to memory of 1060 4620 4e17fb2f8d.exe taskkill.exe PID 4620 wrote to memory of 1060 4620 4e17fb2f8d.exe taskkill.exe PID 4620 wrote to memory of 1060 4620 4e17fb2f8d.exe taskkill.exe PID 4620 wrote to memory of 1952 4620 4e17fb2f8d.exe taskkill.exe PID 4620 wrote to memory of 1952 4620 4e17fb2f8d.exe taskkill.exe PID 4620 wrote to memory of 1952 4620 4e17fb2f8d.exe taskkill.exe PID 1932 wrote to memory of 2344 1932 7f5654a0ec.exe chrome.exe PID 1932 wrote to memory of 2344 1932 7f5654a0ec.exe chrome.exe PID 2344 wrote to memory of 4540 2344 chrome.exe chrome.exe PID 2344 wrote to memory of 4540 2344 chrome.exe chrome.exe PID 4620 wrote to memory of 1536 4620 4e17fb2f8d.exe taskkill.exe PID 4620 wrote to memory of 1536 4620 4e17fb2f8d.exe taskkill.exe PID 4620 wrote to memory of 1536 4620 4e17fb2f8d.exe taskkill.exe PID 2344 wrote to memory of 2160 2344 chrome.exe chrome.exe PID 2344 wrote to memory of 2160 2344 chrome.exe chrome.exe PID 2344 wrote to memory of 2160 2344 chrome.exe chrome.exe PID 2344 wrote to memory of 2160 2344 chrome.exe chrome.exe PID 2344 wrote to memory of 2160 2344 chrome.exe chrome.exe PID 2344 wrote to memory of 2160 2344 chrome.exe chrome.exe PID 2344 wrote to memory of 2160 2344 chrome.exe chrome.exe PID 2344 wrote to memory of 2160 2344 chrome.exe chrome.exe PID 2344 wrote to memory of 2160 2344 chrome.exe chrome.exe PID 2344 wrote to memory of 2160 2344 chrome.exe chrome.exe PID 2344 wrote to memory of 2160 2344 chrome.exe chrome.exe PID 2344 wrote to memory of 2160 2344 chrome.exe chrome.exe PID 2344 wrote to memory of 2160 2344 chrome.exe chrome.exe PID 2344 wrote to memory of 2160 2344 chrome.exe chrome.exe PID 2344 wrote to memory of 2160 2344 chrome.exe chrome.exe PID 2344 wrote to memory of 2160 2344 chrome.exe chrome.exe PID 2344 wrote to memory of 2160 2344 chrome.exe chrome.exe PID 2344 wrote to memory of 2160 2344 chrome.exe chrome.exe PID 2344 wrote to memory of 2160 2344 chrome.exe chrome.exe PID 2344 wrote to memory of 2160 2344 chrome.exe chrome.exe PID 2344 wrote to memory of 2160 2344 chrome.exe chrome.exe PID 2344 wrote to memory of 2160 2344 chrome.exe chrome.exe PID 2344 wrote to memory of 2160 2344 chrome.exe chrome.exe PID 2344 wrote to memory of 2160 2344 chrome.exe chrome.exe PID 2344 wrote to memory of 2160 2344 chrome.exe chrome.exe PID 2344 wrote to memory of 2160 2344 chrome.exe chrome.exe PID 2344 wrote to memory of 2160 2344 chrome.exe chrome.exe PID 2344 wrote to memory of 2160 2344 chrome.exe chrome.exe PID 2344 wrote to memory of 2160 2344 chrome.exe chrome.exe PID 2344 wrote to memory of 2160 2344 chrome.exe chrome.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4320 -
C:\Users\Admin\AppData\Local\Temp\1007935001\7f5654a0ec.exe"C:\Users\Admin\AppData\Local\Temp\1007935001\7f5654a0ec.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff9185ecc40,0x7ff9185ecc4c,0x7ff9185ecc585⤵PID:4540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1908,i,8195643853380943736,12443474826181545104,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1904 /prefetch:25⤵PID:2160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2144,i,8195643853380943736,12443474826181545104,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2168 /prefetch:35⤵PID:832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2232,i,8195643853380943736,12443474826181545104,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2420 /prefetch:85⤵PID:2164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3180,i,8195643853380943736,12443474826181545104,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3244 /prefetch:15⤵
- Uses browser remote debugging
PID:4388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3188,i,8195643853380943736,12443474826181545104,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3268 /prefetch:15⤵
- Uses browser remote debugging
PID:4768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4496,i,8195643853380943736,12443474826181545104,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4468 /prefetch:15⤵
- Uses browser remote debugging
PID:2552
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5444
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5996
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1932 -s 13044⤵
- Program crash
PID:5868
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007936001\274e6484df.exe"C:\Users\Admin\AppData\Local\Temp\1007936001\274e6484df.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3236
-
-
C:\Users\Admin\AppData\Local\Temp\1007937001\c4fdb81414.exe"C:\Users\Admin\AppData\Local\Temp\1007937001\c4fdb81414.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3664
-
-
C:\Users\Admin\AppData\Local\Temp\1007938001\4e17fb2f8d.exe"C:\Users\Admin\AppData\Local\Temp\1007938001\4e17fb2f8d.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3040
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2036
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1060
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1952
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1536
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:2100
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3008 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1960 -parentBuildID 20240401114208 -prefsHandle 1892 -prefMapHandle 1884 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {0e3f5aa6-7623-49e6-a7ac-edc370364c44} 3008 "\\.\pipe\gecko-crash-server-pipe.3008" gpu6⤵PID:4556
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2468 -parentBuildID 20240401114208 -prefsHandle 2452 -prefMapHandle 2448 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f3916cb5-5bf7-493a-a31a-4a9d555f2d14} 3008 "\\.\pipe\gecko-crash-server-pipe.3008" socket6⤵PID:1464
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3464 -childID 1 -isForBrowser -prefsHandle 3480 -prefMapHandle 3404 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8a4aaed6-219c-41b8-81a4-bfda5fa1749c} 3008 "\\.\pipe\gecko-crash-server-pipe.3008" tab6⤵PID:4940
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4020 -childID 2 -isForBrowser -prefsHandle 4012 -prefMapHandle 4008 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b93656ce-7a06-4ff6-825a-55a4981ae3c9} 3008 "\\.\pipe\gecko-crash-server-pipe.3008" tab6⤵PID:4060
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4632 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4648 -prefMapHandle 4644 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {039e86ea-b4a1-4f05-a37d-2b7534e5c496} 3008 "\\.\pipe\gecko-crash-server-pipe.3008" utility6⤵
- Checks processor information in registry
PID:5824
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5156 -childID 3 -isForBrowser -prefsHandle 5144 -prefMapHandle 5140 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7e7e8abc-d27c-4fd3-bc2d-76eff1052284} 3008 "\\.\pipe\gecko-crash-server-pipe.3008" tab6⤵PID:3736
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5404 -childID 4 -isForBrowser -prefsHandle 5324 -prefMapHandle 5328 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {671d5dc8-f81b-41ca-95ec-ce6d409227b4} 3008 "\\.\pipe\gecko-crash-server-pipe.3008" tab6⤵PID:5156
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5532 -childID 5 -isForBrowser -prefsHandle 5608 -prefMapHandle 5604 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9ec7ede2-d46b-46c7-b376-ecafb2ee855e} 3008 "\\.\pipe\gecko-crash-server-pipe.3008" tab6⤵PID:5140
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007939001\6adfc28828.exe"C:\Users\Admin\AppData\Local\Temp\1007939001\6adfc28828.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1040
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2500
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4744
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1932 -ip 19321⤵PID:4268
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3956
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1616
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5904
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5300
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c8bf8178c7e75a0d51ab4ed48282dd25
SHA1c7880424b1a8d97470cfc277d688059a5e3b6f1e
SHA256157b92158965a545c7a06f673929da1434c94883963f4f158958e6059eebb49a
SHA51213e047703d841d5e88532ebac2677a036d123b68a95e04831cb24d352ffef6bcb65aa34a08cf431732d344c3a01748331b461be252d75cb37ab695efa4eb4ab2
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD5b9c3b8b4b02bfc4635110d97eaee6b07
SHA180655df9fb52ded3788ecbf63878f497de775baa
SHA2565a77f90261b7796b2e2c63a0d50745b773b255babd5b47d1fb75f56fa5e305f8
SHA512ce99dc66fdc8672fc90eab7cd71a7aa4064c4e2bbff45de1eb8fa26defe563d81121bd243223902bf974e0e8e6de1a4c522cf6a10aa3fcc34e4744b174f9de23
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\activity-stream.discovery_stream.json
Filesize19KB
MD5bbcaa10f42a8c0ed647f602c38b873b1
SHA10974ce5fcb66d879ae7ab7f3723bc2b88d4d3f16
SHA256a97015267f09466fa25ec2c373891fd7e0223117940e25ec11145d72f7e718c9
SHA512ad6cd2b4dc121c7d6890316cb0606cdb805da35d7c5e0dbb24eed704e737fa5c30fcfbf2f6c451ae64381aa5a3af1a5733edbbb2dbde20b38f08e44e49ce6e4a
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD5b7aab3a6fc7408eb89073554c7d83979
SHA15d011bfd2e99371614b5681d6794ee5655d4cfff
SHA2563277c10b312f627712f83319b6134f707f2f8ff6764289edf9ae597ff0ebbc81
SHA512b1e92f41abf83a4b3c3c1ec8bc599c15a25c99e8b7d565100ea4c03f7e8af971021d9592dba7c84036a424e8525613e299366ba43f5c16bb98caf40cde5e0c8c
-
Filesize
4.2MB
MD5a02a1cb540d8658f640dba74a1ada983
SHA122cc7cd7bd7a3d13e441e2eff21556267fd63108
SHA2566e71349ff091fa402e51aad05f77f65ee2eea8ec824e5b34f5284b7f11eba1f2
SHA5129316ccc13bd532494ff0e34fb21312fc1f3d532c8deac805a9cfbdf0ac590d610a925edce5c24cec027c11a8e8b62499ef79abd56eeea4867a9198033d7adfd1
-
Filesize
1.8MB
MD5743ae689f70257d7a4ee703c6d9ba24b
SHA19e59fbb68179d85c56bc3a4c6e05d612b9a8436a
SHA25635d8eb1936b64a1baadfdf0e8aad44702346acae6b466217ebc09d4cbf2a69e4
SHA5129be7822139345914743ae4a5bc7c04e840592deeac8727a350c6d388a9e724d82f0c1b8ad96be77c2acbfa6065431450f24ca99bc9c50ad2fccd13fe924c0ff7
-
Filesize
1.7MB
MD5215acb5ad199adeadc4c630b59f09d17
SHA176609d0d3867fa6d84da0958b5c1a954e8643f49
SHA2564596bafc0efc36a8f3ec2574dba1e8ae82e5b6051a2b5cce1605057a20855072
SHA512358b95a6dc92baed9822c95f23fb13196f712ab4c92587a0b13feb35649ee09ecf63b01218cdb436542e0893a824c2b09d61cd1670b879d23fd08c2ce247a850
-
Filesize
901KB
MD5ec1c70253b8b244e9a71d54d6b7a917c
SHA12a4e57c4c91e7d050205ce1cd845d5e8b7b3c197
SHA25675c02ef78aac8f7fb0fc0bca6825df1045e57445d6aeb373f4ad010c22922cce
SHA5120b3a8b8b0b89491f00b3bd9e5a5c086783678780c9e422d5b84d0dec11c7b79c8931d75419579472f86aec35a3156a5ea3219ec2371b1a9b5073a03c9bea8416
-
Filesize
2.7MB
MD5832c9676a2a7c2ad3af65ca7c3cde743
SHA1b773918c7b1880094b9da6153d27c9d718032df7
SHA2560ba03d7bec04e966e7190bd15147ceda3c950a0fcd02d2c0cfe0afd51e5b5eac
SHA51239c64a295bba8e1aab00025bd1f44b6c67e770ed34285667b4243244c90641a71a894159f7c8d9f95d757370907cbfb8f5572350a37963129a06b9f7f436282d
-
Filesize
1.8MB
MD5ea7705c2143e7c21967211c16fceb549
SHA15ed0a996617121fe8c267bcb2b7e7adcbf8cf1be
SHA256f177f34b07fa2237adfda7ce8aa42889e1529bf25abe1f7df58613c8c5197a34
SHA512202a3862bf26a9e3b839c38a30b62473bc4190b010fe54520ffb4ea10a2a0fbb424efa08df14c6df88bfb0669d48cb22e358bca374bbb1391055521d18bc875c
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin
Filesize12KB
MD5b3350caf62307d4c5911edd3febbb769
SHA1c6d9da7bc6a606ba71832c0e84a45af0237b476c
SHA256998da05a9e0ce289034734eb10861b607f53db7062d7bd1eac20fb0b8c7b0b6e
SHA512dd610998380319775793ebe2705932ba3aaae46422bf7828c81fa7cb48acb132003c35d1003faf5e9ded76cf3b21efd19bbb683c40c030654033b21f67f76276
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5bf2ede37bde3eb6fc3aa641ca6c1c1ae
SHA174947b1701b2ccc4f1158cdd3e010ffe7a2c788e
SHA256e67807f8dc57cf4faff2d9431f38a726a991185c5844fd14d5810573b049547c
SHA5125a329e3206cb82bf35608b01b566035e6daa89aca26fc266f14743949a89d08c90c4479999ee4ee54f4072dfef72db3cd5e1efef1e908c0664b109c5f7f10f7e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5b3a8dabc86c71a2d89c0866e176e6e7b
SHA15812326113c03395dd6dfbc0120fa97b2ef120c0
SHA256759ff87b31ddc8390bbe1afb0075abd1090a8bc0428cb28c57feb1b427ac7072
SHA512a36138fbad8a088842211c65ee6ae248f4170e4dd32171eccc49b91a3906fc3e37556d3f64301958fecd275d0e77795fc5c01b497a25df0fcb39d7a285c57a55
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD51bef3dff9837ea0663f363ba4eaea17e
SHA1f8611b8b1e22df8ab36b017f0129b78260c0b8c8
SHA2568a8aa3e8844c5d0a5916f39bb1ea23894508edd38c469a2c78ea96a33fb8e414
SHA512cefed5f894a07c56d7ec6c79ef9628a95922cfa777c1a7cfbaaaaef90e4468eb18b5f6122eda15622727cc761edcabe94321bb2af59d44fbb44aa17412aeae96
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5bbab305a013b26204b5fac65dcbed00b
SHA116de978352af63142b023b0689411316cf520380
SHA25621e1049cb42c318ce40d6f14159556f761103b1be5b1a84e615006f437052270
SHA512e164b95f594bddf4fd765a8754d818168be77d6bcff4c99cfff6ae9a49fef978a882058d8dfb8fb4547d62d09b337436085c31bf1f31ab0667ac7fc74bce3fbd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\1f1bc29c-e0a9-4634-8ede-66cebc5a2587
Filesize982B
MD5ce2b425d2658b40671b491f8e2a60e04
SHA18568b7e915b8146f8ca017138fe9e59f2b7ecd4a
SHA25642ab83f31a43d54c061bffc442d545e08e18e4df435bc6af7fb0d5367c18a894
SHA512a77c8f899f5a059586191b240ec81be501a11de1de6c39034e62b565e2cbd154e670eb837d9b4962854c220824262a880506876ec397e31584f49fa436f00086
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\ec2f2ee8-13aa-40e7-8f39-805d4709ef98
Filesize671B
MD51d698c2dfabcbdc43d07ff7f42e95644
SHA1e2dc777be0174faaa78b7e247ee5c553fad39446
SHA256dfca3331d851f2d0018ea7ed5e559d394a544bd49ad0f52ccfe1107e005b6225
SHA512f7e80387861d281055c6c6073283a04538278f953a5acbd2dcd422df34443a553d0f88da9a20217889c1d880209a31ea9e0b1b03e338eff89e86eedfde5b6535
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\f82d88c5-1ca9-4698-91ed-b6d466744d40
Filesize26KB
MD538db37c8edff1ca501a61a58b7f2544a
SHA15d3e2c0252752bee0c71b006d92779304bf9d88f
SHA25637993714d74249c3b7b708e280ad0ff5854d851bc2d8557e2de363f75a0e7d1f
SHA512fbe9b603db6e26bd71fa156d1148b848c5cf524d895f137495a859be1305eab6c78900e9434b75d8a243a18214f0776dfd450a870420404d7de65900b596ef77
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD5962258bb900ecdbab15b7ac58c95e917
SHA1f7bade86b954aa4669967b207ac6a46cacb76cbf
SHA256016c8ad256608a4d6bb0c84c2d7a72a683c457d60d59b7131949ddff95e44184
SHA51219c141f4eb8b9a238ccdb584bf1cf4378b155dd5d9e51f1e7b30cdd1aa9dc53517472406484eea239b03895f517227e4c16d60764b36eab051f4fa77834c5f6a
-
Filesize
10KB
MD5e595d6408b29aa176597b53653d99526
SHA1b29c5a753973be1fff4dc867ddbdca26bf2feb25
SHA256f463688ae80232a7624576758e60e9c010622f334a2ed46e1b1c342386a12254
SHA5128928b1d1596cfd74b0769cc24cbe583854848100c7119e648e25df1186002244acd5f994bd175c3ae0254579aebc282457170de2f8a91d92db774ca644285870
-
Filesize
10KB
MD57316597151925d46238514daed6d44ae
SHA16aed2a81119433d195ca88d58c7c3b6e00ff0b1a
SHA256ab0200ce35418cb40f9914cd73832b297fec778930ba869ff3a4b9eefa80b582
SHA5123c2d4e60c4692c0d487a4459b419f8bbdc2af5b2f41b3b8e2498e4b6c2d32aebf4c8961804bc9517bc6c334a474cbde1dcd1afc5c2096db706135b836427acd7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize840KB
MD5037e30fc83be79bbb3bcb97d7d8f30cb
SHA112d3d3493ef2e139854a16e63ecc317f5fbbce85
SHA256d47c0c4c5bacb52149eff0902d104f0465f65483820076b3b14104fee3d2d517
SHA5122113d3c8c70db05e666340d9338009b1237c0789ef787be6b0fbe9e206943351133df8e4f21b0f0a9c3b601e20af481eae139a1ff16ce55ed416a6ca82dabfa4
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e