Analysis
-
max time kernel
146s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 15:12
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240903-en
General
-
Target
file.exe
-
Size
1.8MB
-
MD5
be131b7bc8cd4eb30eb81ccceeaaea4d
-
SHA1
d3370bc98065a5b0d11b06a089f9280e184325b1
-
SHA256
8672c7c63c3cf3e5a823a0f5c999c4d29383e810457f79264f64bc2edb563c60
-
SHA512
d3923b754ad3199815d154b996f6fc620ef2a4752e337268ebf46263271d434a35cb94ce0f48c54250a0f3e5284fa263ce00b518df577b76d3ee03b3635a5c9c
-
SSDEEP
49152:x1C65bDvLzDByacb4n+rK7oXKjdPSoj+:xMGbbQai4nMSpSo
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Cryptbot family
-
Detects CryptBot payload 1 IoCs
CryptBot is a C++ stealer distributed widely in bundle with other software.
Processes:
resource yara_rule behavioral2/memory/2328-376-0x0000000069CC0000-0x000000006A71B000-memory.dmp family_cryptbot_v3 -
Processes:
2743cd6611.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 2743cd6611.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 2743cd6611.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 2743cd6611.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 2743cd6611.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 2743cd6611.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 2743cd6611.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
Processes:
skotes.exe66aba68e71.exeskotes.exefile.exeL.exe25a68e6ad3.exeskotes.exe4009cf8732.exe2743cd6611.exeskotes.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 66aba68e71.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ L.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 25a68e6ad3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4009cf8732.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2743cd6611.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 8 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
Processes:
chrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exepid Process 872 chrome.exe 5540 chrome.exe 4312 chrome.exe 3668 chrome.exe 3796 chrome.exe 3384 chrome.exe 5852 chrome.exe 2644 chrome.exe -
Checks BIOS information in registry 2 TTPs 20 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
skotes.exefile.exe66aba68e71.exe2743cd6611.exeskotes.exeskotes.exe4009cf8732.exeskotes.exeL.exe25a68e6ad3.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 66aba68e71.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2743cd6611.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4009cf8732.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4009cf8732.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion L.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion L.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2743cd6611.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 66aba68e71.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 25a68e6ad3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 25a68e6ad3.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
file.exeskotes.exe66aba68e71.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation file.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 66aba68e71.exe -
Executes dropped EXE 13 IoCs
Processes:
skotes.exeL.exe66aba68e71.exe25a68e6ad3.exeskotes.exe4009cf8732.exe42949aa4e3.exe2743cd6611.exeservice123.exeskotes.exeservice123.exeskotes.exeservice123.exepid Process 3216 skotes.exe 4584 L.exe 2328 66aba68e71.exe 4508 25a68e6ad3.exe 2040 skotes.exe 4012 4009cf8732.exe 1936 42949aa4e3.exe 5564 2743cd6611.exe 2548 service123.exe 5180 skotes.exe 5364 service123.exe 1760 skotes.exe 3628 service123.exe -
Identifies Wine through registry keys 2 TTPs 10 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
25a68e6ad3.exeskotes.exeskotes.exeskotes.exe2743cd6611.exefile.exeskotes.exeL.exe66aba68e71.exe4009cf8732.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 25a68e6ad3.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 2743cd6611.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine file.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine L.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 66aba68e71.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 4009cf8732.exe -
Loads dropped DLL 3 IoCs
Processes:
service123.exeservice123.exeservice123.exepid Process 2548 service123.exe 5364 service123.exe 3628 service123.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
2743cd6611.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 2743cd6611.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 2743cd6611.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
skotes.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\4009cf8732.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007960001\\4009cf8732.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\42949aa4e3.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007961001\\42949aa4e3.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2743cd6611.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007962001\\2743cd6611.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\25a68e6ad3.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007959001\\25a68e6ad3.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/files/0x0009000000023bd3-115.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
Processes:
file.exeskotes.exeL.exe66aba68e71.exe25a68e6ad3.exeskotes.exe4009cf8732.exe2743cd6611.exeskotes.exeskotes.exepid Process 1496 file.exe 3216 skotes.exe 4584 L.exe 2328 66aba68e71.exe 4508 25a68e6ad3.exe 2040 skotes.exe 4012 4009cf8732.exe 5564 2743cd6611.exe 5180 skotes.exe 1760 skotes.exe -
Drops file in Windows directory 1 IoCs
Processes:
file.exedescription ioc Process File created C:\Windows\Tasks\skotes.job file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target Process procid_target 5556 4012 WerFault.exe 94 2540 2328 WerFault.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
4009cf8732.exetaskkill.exetaskkill.exefile.exe66aba68e71.exeschtasks.exeL.exe25a68e6ad3.exe42949aa4e3.exetaskkill.exetaskkill.exe2743cd6611.exeservice123.exeskotes.exetaskkill.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4009cf8732.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 66aba68e71.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language L.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 25a68e6ad3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 42949aa4e3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2743cd6611.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 12 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exefirefox.exe66aba68e71.exe4009cf8732.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 66aba68e71.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 66aba68e71.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 4009cf8732.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 4009cf8732.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
Processes:
chrome.exechrome.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 5 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid Process 5044 taskkill.exe 3540 taskkill.exe 3712 taskkill.exe 4808 taskkill.exe 4696 taskkill.exe -
Modifies registry class 1 IoCs
Processes:
firefox.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 35 IoCs
Processes:
file.exeskotes.exeL.exe66aba68e71.exe25a68e6ad3.exeskotes.exe4009cf8732.exechrome.exe42949aa4e3.exe2743cd6611.exechrome.exeskotes.exeskotes.exepid Process 1496 file.exe 1496 file.exe 3216 skotes.exe 3216 skotes.exe 4584 L.exe 4584 L.exe 2328 66aba68e71.exe 2328 66aba68e71.exe 4508 25a68e6ad3.exe 4508 25a68e6ad3.exe 2040 skotes.exe 2040 skotes.exe 4012 4009cf8732.exe 4012 4009cf8732.exe 4012 4009cf8732.exe 4012 4009cf8732.exe 4012 4009cf8732.exe 4012 4009cf8732.exe 4312 chrome.exe 4312 chrome.exe 1936 42949aa4e3.exe 1936 42949aa4e3.exe 5564 2743cd6611.exe 5564 2743cd6611.exe 1936 42949aa4e3.exe 1936 42949aa4e3.exe 5564 2743cd6611.exe 5564 2743cd6611.exe 5564 2743cd6611.exe 5852 chrome.exe 5852 chrome.exe 5180 skotes.exe 5180 skotes.exe 1760 skotes.exe 1760 skotes.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
chrome.exechrome.exepid Process 4312 chrome.exe 4312 chrome.exe 4312 chrome.exe 5852 chrome.exe 5852 chrome.exe 5852 chrome.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
Processes:
taskkill.exechrome.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exefirefox.exe2743cd6611.exechrome.exedescription pid Process Token: SeDebugPrivilege 3540 taskkill.exe Token: SeShutdownPrivilege 4312 chrome.exe Token: SeCreatePagefilePrivilege 4312 chrome.exe Token: SeShutdownPrivilege 4312 chrome.exe Token: SeCreatePagefilePrivilege 4312 chrome.exe Token: SeDebugPrivilege 3712 taskkill.exe Token: SeDebugPrivilege 4808 taskkill.exe Token: SeDebugPrivilege 4696 taskkill.exe Token: SeDebugPrivilege 5044 taskkill.exe Token: SeDebugPrivilege 2160 firefox.exe Token: SeDebugPrivilege 2160 firefox.exe Token: SeDebugPrivilege 5564 2743cd6611.exe Token: SeShutdownPrivilege 5852 chrome.exe Token: SeCreatePagefilePrivilege 5852 chrome.exe Token: SeShutdownPrivilege 5852 chrome.exe Token: SeCreatePagefilePrivilege 5852 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
file.exe42949aa4e3.exechrome.exefirefox.exechrome.exepid Process 1496 file.exe 1936 42949aa4e3.exe 1936 42949aa4e3.exe 4312 chrome.exe 4312 chrome.exe 4312 chrome.exe 4312 chrome.exe 4312 chrome.exe 4312 chrome.exe 4312 chrome.exe 4312 chrome.exe 4312 chrome.exe 4312 chrome.exe 4312 chrome.exe 4312 chrome.exe 4312 chrome.exe 4312 chrome.exe 4312 chrome.exe 4312 chrome.exe 4312 chrome.exe 4312 chrome.exe 4312 chrome.exe 4312 chrome.exe 4312 chrome.exe 4312 chrome.exe 4312 chrome.exe 4312 chrome.exe 4312 chrome.exe 4312 chrome.exe 1936 42949aa4e3.exe 1936 42949aa4e3.exe 1936 42949aa4e3.exe 1936 42949aa4e3.exe 1936 42949aa4e3.exe 2160 firefox.exe 2160 firefox.exe 2160 firefox.exe 2160 firefox.exe 1936 42949aa4e3.exe 2160 firefox.exe 2160 firefox.exe 2160 firefox.exe 2160 firefox.exe 2160 firefox.exe 2160 firefox.exe 2160 firefox.exe 2160 firefox.exe 2160 firefox.exe 2160 firefox.exe 2160 firefox.exe 2160 firefox.exe 2160 firefox.exe 2160 firefox.exe 2160 firefox.exe 2160 firefox.exe 2160 firefox.exe 1936 42949aa4e3.exe 1936 42949aa4e3.exe 1936 42949aa4e3.exe 5852 chrome.exe 5852 chrome.exe 5852 chrome.exe 5852 chrome.exe 5852 chrome.exe -
Suspicious use of SendNotifyMessage 31 IoCs
Processes:
42949aa4e3.exefirefox.exepid Process 1936 42949aa4e3.exe 1936 42949aa4e3.exe 1936 42949aa4e3.exe 1936 42949aa4e3.exe 1936 42949aa4e3.exe 1936 42949aa4e3.exe 1936 42949aa4e3.exe 2160 firefox.exe 2160 firefox.exe 2160 firefox.exe 2160 firefox.exe 1936 42949aa4e3.exe 2160 firefox.exe 2160 firefox.exe 2160 firefox.exe 2160 firefox.exe 2160 firefox.exe 2160 firefox.exe 2160 firefox.exe 2160 firefox.exe 2160 firefox.exe 2160 firefox.exe 2160 firefox.exe 2160 firefox.exe 2160 firefox.exe 2160 firefox.exe 2160 firefox.exe 2160 firefox.exe 1936 42949aa4e3.exe 1936 42949aa4e3.exe 1936 42949aa4e3.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
firefox.exepid Process 2160 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
file.exeskotes.exe4009cf8732.exechrome.exe42949aa4e3.exedescription pid Process procid_target PID 1496 wrote to memory of 3216 1496 file.exe 82 PID 1496 wrote to memory of 3216 1496 file.exe 82 PID 1496 wrote to memory of 3216 1496 file.exe 82 PID 3216 wrote to memory of 4584 3216 skotes.exe 87 PID 3216 wrote to memory of 4584 3216 skotes.exe 87 PID 3216 wrote to memory of 4584 3216 skotes.exe 87 PID 3216 wrote to memory of 2328 3216 skotes.exe 91 PID 3216 wrote to memory of 2328 3216 skotes.exe 91 PID 3216 wrote to memory of 2328 3216 skotes.exe 91 PID 3216 wrote to memory of 4508 3216 skotes.exe 92 PID 3216 wrote to memory of 4508 3216 skotes.exe 92 PID 3216 wrote to memory of 4508 3216 skotes.exe 92 PID 3216 wrote to memory of 4012 3216 skotes.exe 94 PID 3216 wrote to memory of 4012 3216 skotes.exe 94 PID 3216 wrote to memory of 4012 3216 skotes.exe 94 PID 4012 wrote to memory of 4312 4012 4009cf8732.exe 96 PID 4012 wrote to memory of 4312 4012 4009cf8732.exe 96 PID 4312 wrote to memory of 1280 4312 chrome.exe 97 PID 4312 wrote to memory of 1280 4312 chrome.exe 97 PID 3216 wrote to memory of 1936 3216 skotes.exe 98 PID 3216 wrote to memory of 1936 3216 skotes.exe 98 PID 3216 wrote to memory of 1936 3216 skotes.exe 98 PID 1936 wrote to memory of 3540 1936 42949aa4e3.exe 99 PID 1936 wrote to memory of 3540 1936 42949aa4e3.exe 99 PID 1936 wrote to memory of 3540 1936 42949aa4e3.exe 99 PID 4312 wrote to memory of 4076 4312 chrome.exe 101 PID 4312 wrote to memory of 4076 4312 chrome.exe 101 PID 4312 wrote to memory of 4076 4312 chrome.exe 101 PID 4312 wrote to memory of 4076 4312 chrome.exe 101 PID 4312 wrote to memory of 4076 4312 chrome.exe 101 PID 4312 wrote to memory of 4076 4312 chrome.exe 101 PID 4312 wrote to memory of 4076 4312 chrome.exe 101 PID 4312 wrote to memory of 4076 4312 chrome.exe 101 PID 4312 wrote to memory of 4076 4312 chrome.exe 101 PID 4312 wrote to memory of 4076 4312 chrome.exe 101 PID 4312 wrote to memory of 4076 4312 chrome.exe 101 PID 4312 wrote to memory of 4076 4312 chrome.exe 101 PID 4312 wrote to memory of 4076 4312 chrome.exe 101 PID 4312 wrote to memory of 4076 4312 chrome.exe 101 PID 4312 wrote to memory of 4076 4312 chrome.exe 101 PID 4312 wrote to memory of 4076 4312 chrome.exe 101 PID 4312 wrote to memory of 4076 4312 chrome.exe 101 PID 4312 wrote to memory of 4076 4312 chrome.exe 101 PID 4312 wrote to memory of 4076 4312 chrome.exe 101 PID 4312 wrote to memory of 4076 4312 chrome.exe 101 PID 4312 wrote to memory of 4076 4312 chrome.exe 101 PID 4312 wrote to memory of 4076 4312 chrome.exe 101 PID 4312 wrote to memory of 4076 4312 chrome.exe 101 PID 4312 wrote to memory of 4076 4312 chrome.exe 101 PID 4312 wrote to memory of 4076 4312 chrome.exe 101 PID 4312 wrote to memory of 4076 4312 chrome.exe 101 PID 4312 wrote to memory of 4076 4312 chrome.exe 101 PID 4312 wrote to memory of 4076 4312 chrome.exe 101 PID 4312 wrote to memory of 4076 4312 chrome.exe 101 PID 4312 wrote to memory of 4076 4312 chrome.exe 101 PID 4312 wrote to memory of 3632 4312 chrome.exe 102 PID 4312 wrote to memory of 3632 4312 chrome.exe 102 PID 4312 wrote to memory of 2624 4312 chrome.exe 103 PID 4312 wrote to memory of 2624 4312 chrome.exe 103 PID 4312 wrote to memory of 2624 4312 chrome.exe 103 PID 4312 wrote to memory of 2624 4312 chrome.exe 103 PID 4312 wrote to memory of 2624 4312 chrome.exe 103 PID 4312 wrote to memory of 2624 4312 chrome.exe 103 PID 4312 wrote to memory of 2624 4312 chrome.exe 103 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Users\Admin\AppData\Local\Temp\1007944001\L.exe"C:\Users\Admin\AppData\Local\Temp\1007944001\L.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4584
-
-
C:\Users\Admin\AppData\Local\Temp\1007958001\66aba68e71.exe"C:\Users\Admin\AppData\Local\Temp\1007958001\66aba68e71.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2328 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5852 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffef755cc40,0x7ffef755cc4c,0x7ffef755cc585⤵PID:5744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2016,i,11095000460133075105,10744179346589492953,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2012 /prefetch:25⤵PID:4608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1904,i,11095000460133075105,10744179346589492953,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2052 /prefetch:35⤵PID:3924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2272,i,11095000460133075105,10744179346589492953,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2280 /prefetch:85⤵PID:5388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3164,i,11095000460133075105,10744179346589492953,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3200 /prefetch:15⤵
- Uses browser remote debugging
PID:2644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3172,i,11095000460133075105,10744179346589492953,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3236 /prefetch:15⤵
- Uses browser remote debugging
PID:872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4492,i,11095000460133075105,10744179346589492953,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4268 /prefetch:15⤵
- Uses browser remote debugging
PID:5540
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2548
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2344
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2328 -s 13524⤵
- Program crash
PID:2540
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007959001\25a68e6ad3.exe"C:\Users\Admin\AppData\Local\Temp\1007959001\25a68e6ad3.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4508
-
-
C:\Users\Admin\AppData\Local\Temp\1007960001\4009cf8732.exe"C:\Users\Admin\AppData\Local\Temp\1007960001\4009cf8732.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffee881cc40,0x7ffee881cc4c,0x7ffee881cc585⤵PID:1280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1920,i,7517900178284962024,10726358835721583422,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1912 /prefetch:25⤵PID:4076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2144,i,7517900178284962024,10726358835721583422,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2176 /prefetch:35⤵PID:3632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2236,i,7517900178284962024,10726358835721583422,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2432 /prefetch:85⤵PID:2624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3156,i,7517900178284962024,10726358835721583422,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3220 /prefetch:15⤵
- Uses browser remote debugging
PID:3668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3164,i,7517900178284962024,10726358835721583422,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3244 /prefetch:15⤵
- Uses browser remote debugging
PID:3796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4444,i,7517900178284962024,10726358835721583422,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4536 /prefetch:15⤵
- Uses browser remote debugging
PID:3384
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4012 -s 15684⤵
- Program crash
PID:5556
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007961001\42949aa4e3.exe"C:\Users\Admin\AppData\Local\Temp\1007961001\42949aa4e3.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3540
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3712
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4808
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4696
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5044
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:3944
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2160 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2028 -parentBuildID 20240401114208 -prefsHandle 1944 -prefMapHandle 1936 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {dccf2b17-ce99-4909-bdc9-8472ac39afdb} 2160 "\\.\pipe\gecko-crash-server-pipe.2160" gpu6⤵PID:4072
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2464 -parentBuildID 20240401114208 -prefsHandle 2456 -prefMapHandle 2452 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d4464c2f-dd50-4cf6-9e5c-c240c57323c1} 2160 "\\.\pipe\gecko-crash-server-pipe.2160" socket6⤵PID:3672
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2996 -childID 1 -isForBrowser -prefsHandle 3100 -prefMapHandle 2800 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cb376111-7029-444f-9199-9f38a858942d} 2160 "\\.\pipe\gecko-crash-server-pipe.2160" tab6⤵PID:3976
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3884 -childID 2 -isForBrowser -prefsHandle 3908 -prefMapHandle 3904 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {329d66aa-899b-495a-9a31-108bbc6b1549} 2160 "\\.\pipe\gecko-crash-server-pipe.2160" tab6⤵PID:4436
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4448 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4488 -prefMapHandle 4484 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {221ad4b6-a47f-43a0-b5f8-a36be3663643} 2160 "\\.\pipe\gecko-crash-server-pipe.2160" utility6⤵
- Checks processor information in registry
PID:2448
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5088 -childID 3 -isForBrowser -prefsHandle 5080 -prefMapHandle 5076 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {25ea6b55-6870-4de1-ab2b-8b1b4af070b7} 2160 "\\.\pipe\gecko-crash-server-pipe.2160" tab6⤵PID:5820
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5332 -childID 4 -isForBrowser -prefsHandle 5324 -prefMapHandle 5320 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0d1609ef-8b1a-4fec-902c-78411a5235df} 2160 "\\.\pipe\gecko-crash-server-pipe.2160" tab6⤵PID:5840
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5540 -childID 5 -isForBrowser -prefsHandle 5448 -prefMapHandle 5452 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8e265e1a-06c7-4979-85ca-679e7d550b98} 2160 "\\.\pipe\gecko-crash-server-pipe.2160" tab6⤵PID:5868
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007962001\2743cd6611.exe"C:\Users\Admin\AppData\Local\Temp\1007962001\2743cd6611.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5564
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2040
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4012 -ip 40121⤵PID:5460
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:5212
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2328 -ip 23281⤵PID:3812
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5180
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5364
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1760
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3628
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40B
MD51fd2bcf7be677e004a5421b78e261340
SHA14e5abd04329ee1ffaebe9c04b67deef17f89ff84
SHA256f539c848f584add20b43d5daefd614526b67adbf22b0c89eaa7802a8a653cd31
SHA512929499946e38281bd808b37b362c4a86f3b6382eb1ecd5fc094410d3688906d14a114ca930a2cf38b6241ab734bc5959e6fe541270d47ca9538e82a68c99cc77
-
Filesize
44KB
MD5f8c0ab62f859f53eb0eebf24af51c23b
SHA1be8ec11bb284076b46a8a17a7f1c2db77b9f6d24
SHA256e7af4acb9f8f880472b01f766f3c2bf74f4c7d4c8c5c70cead1baeddd75c4933
SHA51233290ace2afb0bfa3a3a653aa84c5aeaa8f97469daf60394c644d7899885cf4a2239fd5dc0528aca2e92c5eaa2d9ba3790e11729a84e3621edab3b0518efca38
-
Filesize
264KB
MD52caf69238fc16fdf70cc10f28bbccecf
SHA1f92ead39609086a5a695d3179045f7b3e339e2ec
SHA25652b2e0d5fc9e25db88c5751c478e7886b2208faea6fdb5f2671d02fea8bc044a
SHA51249570e10b14215093d3a9dc95a1f1f165d88e26636ba838d5d2495c1ef5aa2993ddfbd44d7e8b5438dbeaece8afb09685159b687e0164845330d9b1dad14a42b
-
Filesize
4.0MB
MD55cd89248f582ce3054566e678b2f55c3
SHA142475082fdf8149c78c867f8eefeda3b31714598
SHA25671420cf7aea21cfb98815ba4cbbee259fa4e87d562e69df312d067d73a9cf616
SHA512e2b4f65d289617660855b12a88e11de2d4b3f31ff0d2801ac64123be9d85c2c18ace325923a5936134788e7269ba2576e22e209fad463068c17fc0e7a43f30f6
-
Filesize
320B
MD593e1e9101c0c8292aab39f476be2f019
SHA14470efe20e616d20ed9960a47dc6f54d3b69df78
SHA256c41fbdeed10735f75d422485d1ffbe04bf9144d93e00bc5034770228eca57c84
SHA5127a833c02632d91f7c43fef30e10f0c33b49142e819480a17af5b157f9cf1cc93980c44e498c5a00ae84e5db04cb712f527acea11ceff7d11251405b5c89178b4
-
Filesize
44KB
MD56205715fbb86f2ebd70a9938a92c1e4f
SHA1505976b1102dc96b28f777e65969b4ab85b94b58
SHA256af1f3d1aebeea774957770227bcd922ca55daa8ed0351900319159e787186b9a
SHA512d9732c250f72d63017a51f8eb054c29d6036d766b9b0f806cf57550fd5d8e041204446d025df9f3bd8fb325d3f2f0b7b95608c3578adb0636d6e0de33e409986
-
Filesize
264KB
MD59f6f897a2a085819b680ebb3ede233d8
SHA1af3f8fe7763791ee7343e855caffce0df28a3136
SHA2561a01e498e016215ef2b7f92ec8fe53466990c8d649853a7b10ebbd1967ca2b65
SHA5120b681327b5a088087dfaf85124168e5ec047511213b1fda8ce878ae8cc9035bbc72c121d1aee01e143f9467bfbe57ba74283950f004779473f28181c84fc468a
-
Filesize
1.0MB
MD54e2e997da0ae227057e074c67afdb7fa
SHA10a0b4db63b5a84f0bbbd8b0d472e665be69697cb
SHA256e8fca9c48d54e3405ad60c23ca5eaf2f15fb9a1d59b3936f178fcfac70a967e4
SHA512cb721fb2c0a687fdf89041d9baac042e45991bdd57b1093968e16ba5230741f027c358c8e9f45bab4bf16461fd9145dfacf596e418f4cfda60694af4237ced3f
-
Filesize
4.0MB
MD5c73ceb946a84dd65c7571e065361ff89
SHA10188249b60156917726cece1be3ed2c5157841c4
SHA2565ac5fb30df32a601b6b949cb1a86f869a07ee8b35df9d4cf2a2187681e699483
SHA512f67fc989f0af95783654b6258b8061ec4eb69abb9065db26731eb76e735e6914ffd25b6ebbf4e018fc6899dbaa711af689e62fae4cac97d75d913f2047c2ced4
-
Filesize
329B
MD553fea1398d35a117a82a7a5edd19cd53
SHA119d12f138b4a0e6a19a314f1f4744eb4ea559d5c
SHA256ea114f90ac3679052076d02d73c6ba0e83f3a020c95a9bbc305355a67cf7cbd9
SHA512780fd3841d1f41845305c29e29f0f98f7225d098320d4bf2c5952497b2eceacaac8ff5835785235552046f82aa63b10395b1b41fa333a19773ab42fb246d6173
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
333B
MD51b1a9840582b21cc0699a2a92406005f
SHA185d0092b581287b9d50a1143e214cffeb2976bbb
SHA256ab36c4a3778bdb0e4e6937ce2635e653646ac72709174485a82d97bda069a438
SHA512437a4b5e4c30d90c7fab9b34af0dea66e14e7a9e82b7d2b381f540961ccc0dedad20601a3994eb36706c8c525aa1d50914f7e277d571aca7c1ab1786013dfada
-
Filesize
308B
MD54e7982b86b3d7d916b7722aa3b3f0669
SHA1ce4e874903cb71d9012cc7654ca7a6ba5e4f7efd
SHA256cbee1100a2c9add47776b7e416b58a809f6feb9fe458bef8185b0c176b5db340
SHA512c4dda8b36e90a327061dab901730f47fc23cca129b02a157f1ed0c566a1d6dddf272a4e74d3acbf14eb3a7fac0820387a584db9e19ca299724ed7f3030f891bb
-
Filesize
317B
MD5af70c5ec39ee02b23f98262a5579efbf
SHA15a916cafb6e80e6b5564614e5404af3291e171a8
SHA256cbb0a34bcf19e27a7aca5e925e79ef4502de3bfddb8a7848c34ecf44c06dd2f2
SHA512b19f79527c85444578063b21bfc0ba11d82a84f80df30eed975aca569e986f63b0e0789ce6de72efe1f402ba69dcd5f511fd2644c4f4298508878c782d4564db
-
Filesize
348B
MD563d0220e9db1a8a56fbb625260c92f07
SHA142b8e88c3c91e03d01d0e251b09d022b7a1caa4e
SHA256eb72e6ff795ad1281f4f13575ccfe8640d0249702f9fe5c7c0a133254e3ef4eb
SHA512ef01c2905ab2c6e3e93a1e66e74afdbb141d50d381beb5daf69b643e8a2fe8bc340fa356f2844dc5146bd0d848201dc506b15eff882bbd27318e82e576377667
-
Filesize
324B
MD58f210555376d03254860ac9f5bf78825
SHA1a0730da98a238cfdad15a04731a54f9c0aa85053
SHA256afaa2445174446c80684fed8e6b5c84cfccf2000c41c8f37dd5f4b38d0eee8b0
SHA5121a35ae893cd06428fc479c1b2b3eda3b57bf97614d136cf2ecbb1407f54bdd8790b20c226ee03f8d5030d9fc2be9c1e3b6feba265d64066c06446828b0b5958b
-
Filesize
8KB
MD560a30582bb798427c241116963df54f5
SHA1580e205b4b85e7587db65f3389b68b6efdc70f49
SHA256130b858a1edc16566aace3ad75c16c60ae4b5159078466f5fadf9dfab30154c2
SHA5121b23ec78d9b36b694267bdf179ed7df209b8de6e4e43256072b6e265f9a5b70f65dc48e64fea571751658a8f586836324be8ea762351751bff2a996fd24d6c77
-
Filesize
14KB
MD5cd950c4a55b9bc91ddda57216ba04bf4
SHA18d0093346716e9f42e0d0c3a9354a214f3ccfa26
SHA256c418b69f02f1b15e07af0070859f32751d22222ed295aa3eb9d9dc5a0c6a53f0
SHA51293c327234da83ec0534b84a080353904473b6372aa877be3c1f1069d6acc052849976745934f61e284718bec6fdfc68bf0545e747357cc305acb912b7b033f8d
-
Filesize
317B
MD5654a71c291b6bd31e1b1c52cd1b54bb7
SHA1dbad7e9bccf9d192840b9b00c3bca74e7c2c48e9
SHA256323d379429947cfc9b4534b234a6e6961ac0c9a60ce0f5b9017a75b16a640cc0
SHA512af2b33e620a7cfb2c4a6033db3fa244b97e9d282fc419b1ab2e38bb800ce5e1824685b262359a2720e03240b497373a358e6d1ac267216af882d0b4fcac009c9
-
Filesize
1KB
MD516d75804077e67742c7f4a4c3f4f7eba
SHA1f0d8c8dacf1d85cb540ebd465029ffa6a3b08448
SHA256fa61d98babe9585043c7979d299170447a3b2aae739c218512db01c010196b90
SHA51281f15559e3ebd042bc6f441c0503176cb3f07462e302424f7bc98ecf514a5a2dd4a73c9a07adbafc33026d9d623da4faa714006eb2fe178d1c41d069f57b1a38
-
Filesize
335B
MD5ca2e2a5d03f5e3cfd6020eb738f43b29
SHA16ad5e004904ce56a898c80d7835b0781e52f1864
SHA256f9316f23eff35ca2c2e4275cd46f478ca4d292bb86ba3abde2e86e2a57d32829
SHA512899ad5e2badff73c5d9f866e8b1aa0d33d5d291c6010d6e4d3c7a696afb31a98adab960fe67a5bec134b1ca0ebe108583a118087d59e10a2370eef1cfd221b2a
-
Filesize
44KB
MD5296718a6b769edc5221d9580fad16c30
SHA1cab080505410fae030fb386159617b3fecb27ab2
SHA256cc16b88925a70ca21031e4b2f5d0df42f65012e63a22edc9ce12a4cf1df58f5e
SHA51257aed40d8bd8acd78a126d8e64d0d782a2f2056717a4cf6ec0956627f6a784a4a31277ca982bbff572a4dc174c0dbf5cb9685708a341ad9e9aa0091bd6958a45
-
Filesize
264KB
MD5250d725ddcc123597a8f11bc5bb9257a
SHA116958832e3b133659b2d25df8534e373871bec31
SHA256da20efe17b68c56ad4a980a3272d39e8f70b508715f3f0e09ec8ee16982e451f
SHA512f2929da078d98b02dfdcfa35fceac8b155999d4fb7b7d744f9df05d507089baf0111a7960d2b77cf4165b6e19720b7d00083642d1049837acf4a3a0eb2059050
-
Filesize
4.0MB
MD5ecad6b9b7837f5e78f039a17597ad25d
SHA1461682f5242499bdbe539935e39ecfae7dc2dcb9
SHA2569eac008e0aa6c566c787201976c07f77228c054e2893a2dcc35c93adbea737e1
SHA512893949a14d7dc8c79d873c9938a91383b24ee22c154f9ef6f39a3a134684e394c9cf885a76863864ba71ebdf5d926672674030480437f12fb1d2d9e58bbf1870
-
Filesize
14B
MD5ef48733031b712ca7027624fff3ab208
SHA1da4f3812e6afc4b90d2185f4709dfbb6b47714fa
SHA256c9ce8dbbe51a4131073db3d6ceef1e11eaca6308ad88a86125f221102d2cee99
SHA512ce3a5a429e3796977a8019f47806b8c0671b597ead642fcbfbe3144e2b8112d35a9f2250896b7f215d237d0d19c5966caf3fe674165a6d50e14cb2b88c892029
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\activity-stream.discovery_stream.json
Filesize22KB
MD53f2f6cd29884db8ac21333e00c87e8a1
SHA1450e8685a5f7685899d7507c6d86f960636820a9
SHA256e7f6899c22afd46f18e615aa1aeeb5757309c71c65f51d5e5ddb5233d045753d
SHA512a2984f551e06e17f6ca000f6939865d5bdeefea5a057924f55c2f3cd01c47814c487dc8189a3691e2fe45dfaaf67637f339935a07e96477803be47ddbc201bc2
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD53c54e4fbbc310f4e9b43f79e9aff77be
SHA10543d0ffecbe9074137866341ce9233d323f02dc
SHA2568326b4c51e88847555bf908eb3deeb5a67c79ff83ab562335af0ba4d2a8c56b1
SHA512666bafc1b0d5804642326e459ea5fd43496e9f3a8a1dba5afac0043e4e5f0c7eedd24680952756d94ad2f232bfba702fc7f3d8d61bd8592d8962b2cad4406481
-
Filesize
1.8MB
MD5fa351b72ffb13bfc332a25a57a7f075f
SHA15af49613c179bed23dd43d76aedbe3d1b63004a3
SHA256d2c90431f09fc7818c5afb43bbec077fc29544ddcb786bc655a82d1c33e20cdc
SHA512de49eeaa695f9d6252bd3b547689b0e648999c7ee68d2e16a3d073d88505a1c6b0a4da538db7ce52653bfc2dc89a13dd07c894f8e28f9227f1d1c92df67216f9
-
Filesize
4.2MB
MD57cd76febc5bac2746619015c60faa93b
SHA1c131deaeb2a474cb9bb1aaa8b496dc9f19c570d9
SHA2569f98f7cb75c1618212c4f9343dea4aa27ef27bc9670c96ba2dbf08092e615213
SHA5122539f18525e2aac42e99898e960300732f6028691a966e20d65eca525dc382dd347ab4d43527aeeed9b75121c826d2b3c10c85c06ce213a5002cde28a52fc885
-
Filesize
1.8MB
MD5fb9752b9bd14710795837a5c13ee2256
SHA1fe5df4e65bfd6dfdeafcb5752e7cf9c62040e10d
SHA256f84192b9605e61ed4829b4b0785a046da171ca2a20127259a7bd81512e0106dd
SHA51274b123ac6ea37b3c18e881572f3df5bc13d16778a1fd58caf75b5f692a4ee988c3f063d910835597267dfc54d084d7a8461e975853f51cb713af964649e34f1f
-
Filesize
1.7MB
MD5cf6ba1380a20d081dc42865c39678dbb
SHA13894a0d95656cb2f3f20e1d37b4ffac4d5300c54
SHA2565ec30548e1131d8bc671f66b9029d2dbd58e880848dad0679f445423249e897c
SHA512fb8097af9ebdd4c45f687c545ed401b6d1b8309239d9275e7881d3b41c1d883c4947f9127884112eb31d22547944ca3f2492b739b344bf377638fcf3633fb017
-
Filesize
900KB
MD5c48a9a22f952bc99808f440444ed76a8
SHA10fa59b6efa834581403cd980e1c4e3a05cedcfd4
SHA25600377b3e2b2293eea13d756b3dda645650622fa69fcb438cb503111fed42f0d5
SHA5125090620dd5ff761738fdb112da811a6c97841ab5c673fe32d7d8e51ffd5698aad663c49a02c93154d1ef11d2733aa86b227fb40fd1b0b5b843e7aa70eee92369
-
Filesize
2.7MB
MD5a2f9e6f726fdc1bcd491d5fc9184b449
SHA161fcedf632c5eb6d07186b7468628e2d7e706288
SHA256bb560c6c1c1b47df3aafe508faacaf68382e86f9fddb8b75a8f34fd56ab23c36
SHA5128ae20013266762af015f2e265da36796d7fb45ff520b9b06a5e895f10cafd849b3a844c49ad1fd03a731a49b03e126df4bece8408ac54202611e118904961ed3
-
Filesize
1.8MB
MD5be131b7bc8cd4eb30eb81ccceeaaea4d
SHA1d3370bc98065a5b0d11b06a089f9280e184325b1
SHA2568672c7c63c3cf3e5a823a0f5c999c4d29383e810457f79264f64bc2edb563c60
SHA512d3923b754ad3199815d154b996f6fc620ef2a4752e337268ebf46263271d434a35cb94ce0f48c54250a0f3e5284fa263ce00b518df577b76d3ee03b3635a5c9c
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin
Filesize18KB
MD53e593fa4757e287861d5888d98cceda9
SHA11594cf14f80bed46220582c83ae5fe6f62635461
SHA256e40d5a7ee14fb4e708c84b2c8f635395bb3d41b1e1482c360938718a059f80c4
SHA51261143a8b0b0aad89454f4d184a50bae4b7b837ea4e3bf7f6747128e549a727e47abb5ce1377dff99ea30cbe18fb87c7b3bba32e3492e2d23f3457438a20ff58d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin
Filesize6KB
MD553d53a1de698e6d0c50a3a2d83aff962
SHA18836f9c77fd7f489ed9cc666fe9f409523bffca9
SHA2568ce51c3030ddd02d1c5d52fea4abb160f6bda5c1a77218547a138602308168da
SHA512235f84aa898f4add7d225d64865491738b31fe1a1ab2b9280732c54bf09351abacc7ce6437dd0a732ead198b48f2104560dc355e46b0d6f45b6cf7b59ddf53dc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin
Filesize13KB
MD5291e5a61ac3ac73ed14bb566cb80f9b4
SHA13dde6899f3856ca19d4e29bbc3767a525671feab
SHA256522852934c8db36cb1b170c25e59d71d2d3c553116b97ea8652d312ff698f41c
SHA5128ea5dc6c0bbbd60f0e73c39c07e5ba5ffe6f43dfaf979348c1bbbd4b341f89803e8a91f58d2a5f6cbc8f4554bc80ba974a8353351fbd172c22c77781a9b389fe
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD55d7d88678ea87dab21d217b2140886ac
SHA1019156bc7add9a2950229a5ae6ef234ac208378c
SHA2562bd13aa8422da3dcaec7b79b94cfd1d655f0a84c73bf310a21adab31c17c514c
SHA5120041fcf24be8d1733bf13072a42b2c255cdb4f92b4e5a2a8a52c0428a835185d289284fa1481bf6561dea41617d211df28b27ca204f3772b3afd270db621dff9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD51d23d5adaa56fd45be521093f822e382
SHA18817d4c7863f8a2bb0a9d8c08432e3fc7359b950
SHA256a3ea5fe8bfa2aa922d8405bd34543d88a890f8bdeae0cbff89f7f5e2c7a3f2ce
SHA512ba9af136451e7b74380464e340303419e17a9a1587a29bc9f93915e620065ebdbb75a423efa91f6ee112305d5248dbd271cdbea413e894d6015b1a47304d6764
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD51f817e76ae4c2f32b4a784c42615c00a
SHA1a16d4502fd575a1de841e0c5589cba34f209f263
SHA2564ec82c9421f9d33720a2f1ae08df4c47def397e14147b9c1b6c25785c6dd7e79
SHA512e8f7df09b922d427e1d172306349a7d33f3d489b0e09a446e581d107e49686bde228ea0b9271c29f6a6ea4f476807df2c5e8eeebcf7806789d0309f98c88866e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\48befb9d-331f-4805-b098-20478cf78da4
Filesize982B
MD5745705f9a1b4e06a31710f000d7f0fad
SHA12aa793a143228cf1df605fe1144f150b4c18f7b9
SHA25620e541f6150e8213ce95e82247f273a7a6976712aefa35518213bd905572946f
SHA512949bd812245e85c1691e91652d48755188c4a1703f13722e4adc5d0bc2c69390486095881a99ef5a89da59d6fefdae6fe5f67baa7ed4233749529ca242fd1ee2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\e5ae2c1f-e48b-444d-9ff2-95faf305ccd2
Filesize29KB
MD5f95f6b8ca80e74ee735f89a89d45df86
SHA1ef5b45e9dbf5fc43fcf83d2811b626e24eae5f82
SHA256ee0c83b2131653069852c66e64e6dc83cc642fb981277a81cba0f3c8e34a1531
SHA512dd270336ff811c063e4768f02c2c3de0c4a85eb0a4c29cea0ea94e04d1362d549e0b40efd18d15a3ddaafdedf5f065bd9d7fed50fe155f5152525b8cfdd35456
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\f383ebc3-529e-4bc0-93f1-33c1e414b2d2
Filesize671B
MD56bc3c571b12ba2387d93f4e7c21c7a4b
SHA10862eb8b9e1fc510511fa6f0812ab03955a198ec
SHA256ce746ab95c9d1c5213a9dd2af22120f03cd86138401f9004e77ab7c422fe94b0
SHA512ae71d1ef306b8672e8bd948bf1448f61321201f902dd3c04cd43c01969389783f88d5f5a5985852b3a8ecc5f841bcd0c602da0786160135021d966a306bf0b31
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
15KB
MD5b62068dfa28828ed69c682aefa98b324
SHA1fd1ea99f20e60663ebd6a5b85c725f93ebb5280b
SHA256f7a884ec52b125421c5e3724a7fae29b3fe063c5f4ccdc1a6524d0ea2965f980
SHA5128893a94122b6a87317ef92e7e3be8cb1ba73487d2aabd95ca2e5ded6ff83ee2a09b6a050734cbea8c3db3fd0dab6c7fef8d302b5590d6069310c2b4314dc9623
-
Filesize
10KB
MD59def9418fc7f9953d76eb26eb1e15cd6
SHA1d4cfb55815d50ad2c9c41e8533334c9b6a311931
SHA25659a903eab6a8c9e0a7799f1154926b4ffa48cb05afec949d979e8902d8bae1d1
SHA51284a76e031f85c8ffd7dd54ed4b0f093ce19c26bbf2d45a9caf9447c52dab996cdea47a3ff5e853cba75dc6c91dda2e17d9026ef5fb57c296896342e46385ab2b
-
Filesize
10KB
MD5492dd332d9efe192fc5f9a36171801a5
SHA141a65da43809108874e3e7229a05cc05abeaec2f
SHA256e364aa29d9122102d3a884b8839cd61224d297df79c3004f68190d22bea15546
SHA512551aafc899da4b6d763d303f642a87431a14969ab4afc19d32796a289457d06b3ea2df1ec1cdafe113ed94cdcbaa1b60b36c4c4e55b4534c22024abb0a444fc1
-
Filesize
12KB
MD5f70ee5ed4f52e4b8062475492ee1cfd9
SHA1c8337827ffb4e6a20b3316a74b02cfa289bb0d3e
SHA25629b1ee2b36377e41d36e01e16bc2c8e7acce33846356c8261782b53dcd71ca3c
SHA512e668131801f31fe27ab57c3fc1aa408f3c38dfbd31697c3745c1e26a773f923cb519aed3e27f8515603a290a11e2fc3e9747197476dd5e853fe05fa13e5c300a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize832KB
MD551d7e6188b2c335a30bbccaf9bcc1666
SHA1f369ad2e1cba8abcfd4fed602c712842ad0d2c15
SHA25636c3eb315e6449b74e939816eb3c1fa042d400dfac86d22a40182d71e525b0e4
SHA512d88fa10989244ec46ed96447fc05a35966f2d80885c33b33744696c92fb2a218216b67da1b971d34bfdc17cbd027301f12b35597b0bc3f85251e6c01769716c6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize1.8MB
MD5f3de7753681af28ebbe4271437765868
SHA1bf4da0a934825834e921daad272848140bc38d4b
SHA256e511b24639d1e99a214c26305dba0d154e01b719dc09cb362883e9f653e25b0f
SHA512ddf14e2ffa197f974dfc3effd5578c8b96f3c0cd2f3a495a2f6fda50f36452a27273e7a921891a5b87981039cd0bd6d1ce015994be8c88928ba4bf9ad97fffc1
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e