Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2024 02:15
Static task
static1
General
-
Target
2f66b770e77265722c0de698db8c61e8dcb8c8883100a9f16f5d4b92067c1667.exe
-
Size
1.9MB
-
MD5
15e30b215f9ffa75cb1b5286ab26b6d0
-
SHA1
80b925698720de26222a4d7415d7a3fd711168e6
-
SHA256
2f66b770e77265722c0de698db8c61e8dcb8c8883100a9f16f5d4b92067c1667
-
SHA512
07671ee48bcad3227533758762185fbc7e2368eebd1466360946679cb0a47ce62c0f9b8fbc4c0f06b293bf539b9cf46d82f1b12821b4f0e1f218f61464153311
-
SSDEEP
49152:SYoLk1jvI12b/7453Q6eRjtw4Vp3D7ZIETY9Axyh7r:9nIz3xKjW4uETY9AY5
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Cryptbot family
-
Detects CryptBot payload 1 IoCs
CryptBot is a C++ stealer distributed widely in bundle with other software.
Processes:
resource yara_rule behavioral2/memory/2648-107-0x0000000069CC0000-0x000000006A71B000-memory.dmp family_cryptbot_v3 -
Processes:
31fd7219ec.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 31fd7219ec.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 31fd7219ec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 31fd7219ec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 31fd7219ec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 31fd7219ec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 31fd7219ec.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
Processes:
skotes.exe2f66b770e77265722c0de698db8c61e8dcb8c8883100a9f16f5d4b92067c1667.exeskotes.exe424a536faa.exe4606a3136f.exe77eae7b3ed.exe31fd7219ec.exeskotes.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2f66b770e77265722c0de698db8c61e8dcb8c8883100a9f16f5d4b92067c1667.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 424a536faa.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4606a3136f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 77eae7b3ed.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 31fd7219ec.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
Processes:
chrome.exechrome.exechrome.exechrome.exepid process 5708 chrome.exe 5068 chrome.exe 4568 chrome.exe 4964 chrome.exe -
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
2f66b770e77265722c0de698db8c61e8dcb8c8883100a9f16f5d4b92067c1667.exeskotes.exe424a536faa.exe4606a3136f.exe77eae7b3ed.exe31fd7219ec.exeskotes.exeskotes.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2f66b770e77265722c0de698db8c61e8dcb8c8883100a9f16f5d4b92067c1667.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 424a536faa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4606a3136f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 77eae7b3ed.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 31fd7219ec.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 424a536faa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 31fd7219ec.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2f66b770e77265722c0de698db8c61e8dcb8c8883100a9f16f5d4b92067c1667.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4606a3136f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 77eae7b3ed.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
2f66b770e77265722c0de698db8c61e8dcb8c8883100a9f16f5d4b92067c1667.exeskotes.exe424a536faa.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 2f66b770e77265722c0de698db8c61e8dcb8c8883100a9f16f5d4b92067c1667.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 424a536faa.exe -
Executes dropped EXE 10 IoCs
Processes:
skotes.exe424a536faa.exe4606a3136f.exe77eae7b3ed.exefe51166ee7.exe31fd7219ec.exeskotes.exeservice123.exeskotes.exeservice123.exepid process 908 skotes.exe 2648 424a536faa.exe 1932 4606a3136f.exe 220 77eae7b3ed.exe 2592 fe51166ee7.exe 4944 31fd7219ec.exe 4004 skotes.exe 5384 service123.exe 5420 skotes.exe 2852 service123.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
skotes.exe424a536faa.exe4606a3136f.exe77eae7b3ed.exe31fd7219ec.exeskotes.exeskotes.exe2f66b770e77265722c0de698db8c61e8dcb8c8883100a9f16f5d4b92067c1667.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 424a536faa.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 4606a3136f.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 77eae7b3ed.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 31fd7219ec.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 2f66b770e77265722c0de698db8c61e8dcb8c8883100a9f16f5d4b92067c1667.exe -
Loads dropped DLL 2 IoCs
Processes:
service123.exeservice123.exepid process 5384 service123.exe 2852 service123.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
31fd7219ec.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 31fd7219ec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 31fd7219ec.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
skotes.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\4606a3136f.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008082001\\4606a3136f.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\77eae7b3ed.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008083001\\77eae7b3ed.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fe51166ee7.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008084001\\fe51166ee7.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\31fd7219ec.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008085001\\31fd7219ec.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\1008084001\fe51166ee7.exe autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
Processes:
2f66b770e77265722c0de698db8c61e8dcb8c8883100a9f16f5d4b92067c1667.exeskotes.exe424a536faa.exe4606a3136f.exe77eae7b3ed.exe31fd7219ec.exeskotes.exeskotes.exepid process 4388 2f66b770e77265722c0de698db8c61e8dcb8c8883100a9f16f5d4b92067c1667.exe 908 skotes.exe 2648 424a536faa.exe 1932 4606a3136f.exe 220 77eae7b3ed.exe 4944 31fd7219ec.exe 4004 skotes.exe 5420 skotes.exe -
Drops file in Windows directory 1 IoCs
Processes:
2f66b770e77265722c0de698db8c61e8dcb8c8883100a9f16f5d4b92067c1667.exedescription ioc process File created C:\Windows\Tasks\skotes.job 2f66b770e77265722c0de698db8c61e8dcb8c8883100a9f16f5d4b92067c1667.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5388 2648 WerFault.exe 424a536faa.exe -
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
77eae7b3ed.exefe51166ee7.exetaskkill.exetaskkill.exe2f66b770e77265722c0de698db8c61e8dcb8c8883100a9f16f5d4b92067c1667.exe4606a3136f.exetaskkill.exe31fd7219ec.exeschtasks.exeskotes.exe424a536faa.exetaskkill.exetaskkill.exeservice123.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 77eae7b3ed.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fe51166ee7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2f66b770e77265722c0de698db8c61e8dcb8c8883100a9f16f5d4b92067c1667.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4606a3136f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 31fd7219ec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 424a536faa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exefirefox.exe424a536faa.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 424a536faa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 424a536faa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 5 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 1448 taskkill.exe 4260 taskkill.exe 2108 taskkill.exe 4656 taskkill.exe 2324 taskkill.exe -
Modifies registry class 1 IoCs
Processes:
firefox.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 25 IoCs
Processes:
2f66b770e77265722c0de698db8c61e8dcb8c8883100a9f16f5d4b92067c1667.exeskotes.exe424a536faa.exe4606a3136f.exe77eae7b3ed.exefe51166ee7.exe31fd7219ec.exechrome.exeskotes.exeskotes.exepid process 4388 2f66b770e77265722c0de698db8c61e8dcb8c8883100a9f16f5d4b92067c1667.exe 4388 2f66b770e77265722c0de698db8c61e8dcb8c8883100a9f16f5d4b92067c1667.exe 908 skotes.exe 908 skotes.exe 2648 424a536faa.exe 2648 424a536faa.exe 1932 4606a3136f.exe 1932 4606a3136f.exe 220 77eae7b3ed.exe 220 77eae7b3ed.exe 2592 fe51166ee7.exe 2592 fe51166ee7.exe 2592 fe51166ee7.exe 2592 fe51166ee7.exe 4944 31fd7219ec.exe 4944 31fd7219ec.exe 4944 31fd7219ec.exe 4944 31fd7219ec.exe 4944 31fd7219ec.exe 5708 chrome.exe 5708 chrome.exe 4004 skotes.exe 4004 skotes.exe 5420 skotes.exe 5420 skotes.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 5708 chrome.exe 5708 chrome.exe 5708 chrome.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exefirefox.exe31fd7219ec.exechrome.exedescription pid process Token: SeDebugPrivilege 2324 taskkill.exe Token: SeDebugPrivilege 1448 taskkill.exe Token: SeDebugPrivilege 4260 taskkill.exe Token: SeDebugPrivilege 2108 taskkill.exe Token: SeDebugPrivilege 4656 taskkill.exe Token: SeDebugPrivilege 932 firefox.exe Token: SeDebugPrivilege 932 firefox.exe Token: SeDebugPrivilege 4944 31fd7219ec.exe Token: SeShutdownPrivilege 5708 chrome.exe Token: SeCreatePagefilePrivilege 5708 chrome.exe Token: SeShutdownPrivilege 5708 chrome.exe Token: SeCreatePagefilePrivilege 5708 chrome.exe Token: SeDebugPrivilege 932 firefox.exe Token: SeDebugPrivilege 932 firefox.exe Token: SeDebugPrivilege 932 firefox.exe -
Suspicious use of FindShellTrayWindow 59 IoCs
Processes:
2f66b770e77265722c0de698db8c61e8dcb8c8883100a9f16f5d4b92067c1667.exefe51166ee7.exefirefox.exechrome.exepid process 4388 2f66b770e77265722c0de698db8c61e8dcb8c8883100a9f16f5d4b92067c1667.exe 2592 fe51166ee7.exe 2592 fe51166ee7.exe 2592 fe51166ee7.exe 2592 fe51166ee7.exe 2592 fe51166ee7.exe 2592 fe51166ee7.exe 2592 fe51166ee7.exe 932 firefox.exe 932 firefox.exe 932 firefox.exe 932 firefox.exe 932 firefox.exe 932 firefox.exe 932 firefox.exe 932 firefox.exe 932 firefox.exe 932 firefox.exe 932 firefox.exe 932 firefox.exe 932 firefox.exe 932 firefox.exe 932 firefox.exe 932 firefox.exe 932 firefox.exe 932 firefox.exe 932 firefox.exe 932 firefox.exe 932 firefox.exe 2592 fe51166ee7.exe 2592 fe51166ee7.exe 2592 fe51166ee7.exe 2592 fe51166ee7.exe 5708 chrome.exe 5708 chrome.exe 5708 chrome.exe 5708 chrome.exe 5708 chrome.exe 5708 chrome.exe 5708 chrome.exe 5708 chrome.exe 5708 chrome.exe 5708 chrome.exe 5708 chrome.exe 5708 chrome.exe 5708 chrome.exe 5708 chrome.exe 5708 chrome.exe 5708 chrome.exe 5708 chrome.exe 5708 chrome.exe 5708 chrome.exe 5708 chrome.exe 5708 chrome.exe 5708 chrome.exe 5708 chrome.exe 5708 chrome.exe 5708 chrome.exe 5708 chrome.exe -
Suspicious use of SendNotifyMessage 31 IoCs
Processes:
fe51166ee7.exefirefox.exepid process 2592 fe51166ee7.exe 2592 fe51166ee7.exe 2592 fe51166ee7.exe 2592 fe51166ee7.exe 2592 fe51166ee7.exe 2592 fe51166ee7.exe 2592 fe51166ee7.exe 932 firefox.exe 932 firefox.exe 932 firefox.exe 932 firefox.exe 932 firefox.exe 932 firefox.exe 932 firefox.exe 932 firefox.exe 932 firefox.exe 932 firefox.exe 932 firefox.exe 932 firefox.exe 932 firefox.exe 932 firefox.exe 932 firefox.exe 932 firefox.exe 932 firefox.exe 932 firefox.exe 932 firefox.exe 932 firefox.exe 2592 fe51166ee7.exe 2592 fe51166ee7.exe 2592 fe51166ee7.exe 2592 fe51166ee7.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
firefox.exepid process 932 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2f66b770e77265722c0de698db8c61e8dcb8c8883100a9f16f5d4b92067c1667.exeskotes.exefe51166ee7.exefirefox.exefirefox.exedescription pid process target process PID 4388 wrote to memory of 908 4388 2f66b770e77265722c0de698db8c61e8dcb8c8883100a9f16f5d4b92067c1667.exe skotes.exe PID 4388 wrote to memory of 908 4388 2f66b770e77265722c0de698db8c61e8dcb8c8883100a9f16f5d4b92067c1667.exe skotes.exe PID 4388 wrote to memory of 908 4388 2f66b770e77265722c0de698db8c61e8dcb8c8883100a9f16f5d4b92067c1667.exe skotes.exe PID 908 wrote to memory of 2648 908 skotes.exe 424a536faa.exe PID 908 wrote to memory of 2648 908 skotes.exe 424a536faa.exe PID 908 wrote to memory of 2648 908 skotes.exe 424a536faa.exe PID 908 wrote to memory of 1932 908 skotes.exe 4606a3136f.exe PID 908 wrote to memory of 1932 908 skotes.exe 4606a3136f.exe PID 908 wrote to memory of 1932 908 skotes.exe 4606a3136f.exe PID 908 wrote to memory of 220 908 skotes.exe 77eae7b3ed.exe PID 908 wrote to memory of 220 908 skotes.exe 77eae7b3ed.exe PID 908 wrote to memory of 220 908 skotes.exe 77eae7b3ed.exe PID 908 wrote to memory of 2592 908 skotes.exe fe51166ee7.exe PID 908 wrote to memory of 2592 908 skotes.exe fe51166ee7.exe PID 908 wrote to memory of 2592 908 skotes.exe fe51166ee7.exe PID 2592 wrote to memory of 2324 2592 fe51166ee7.exe taskkill.exe PID 2592 wrote to memory of 2324 2592 fe51166ee7.exe taskkill.exe PID 2592 wrote to memory of 2324 2592 fe51166ee7.exe taskkill.exe PID 2592 wrote to memory of 1448 2592 fe51166ee7.exe taskkill.exe PID 2592 wrote to memory of 1448 2592 fe51166ee7.exe taskkill.exe PID 2592 wrote to memory of 1448 2592 fe51166ee7.exe taskkill.exe PID 2592 wrote to memory of 4260 2592 fe51166ee7.exe taskkill.exe PID 2592 wrote to memory of 4260 2592 fe51166ee7.exe taskkill.exe PID 2592 wrote to memory of 4260 2592 fe51166ee7.exe taskkill.exe PID 2592 wrote to memory of 2108 2592 fe51166ee7.exe taskkill.exe PID 2592 wrote to memory of 2108 2592 fe51166ee7.exe taskkill.exe PID 2592 wrote to memory of 2108 2592 fe51166ee7.exe taskkill.exe PID 2592 wrote to memory of 4656 2592 fe51166ee7.exe taskkill.exe PID 2592 wrote to memory of 4656 2592 fe51166ee7.exe taskkill.exe PID 2592 wrote to memory of 4656 2592 fe51166ee7.exe taskkill.exe PID 2592 wrote to memory of 1424 2592 fe51166ee7.exe firefox.exe PID 2592 wrote to memory of 1424 2592 fe51166ee7.exe firefox.exe PID 1424 wrote to memory of 932 1424 firefox.exe firefox.exe PID 1424 wrote to memory of 932 1424 firefox.exe firefox.exe PID 1424 wrote to memory of 932 1424 firefox.exe firefox.exe PID 1424 wrote to memory of 932 1424 firefox.exe firefox.exe PID 1424 wrote to memory of 932 1424 firefox.exe firefox.exe PID 1424 wrote to memory of 932 1424 firefox.exe firefox.exe PID 1424 wrote to memory of 932 1424 firefox.exe firefox.exe PID 1424 wrote to memory of 932 1424 firefox.exe firefox.exe PID 1424 wrote to memory of 932 1424 firefox.exe firefox.exe PID 1424 wrote to memory of 932 1424 firefox.exe firefox.exe PID 1424 wrote to memory of 932 1424 firefox.exe firefox.exe PID 932 wrote to memory of 1788 932 firefox.exe firefox.exe PID 932 wrote to memory of 1788 932 firefox.exe firefox.exe PID 932 wrote to memory of 1788 932 firefox.exe firefox.exe PID 932 wrote to memory of 1788 932 firefox.exe firefox.exe PID 932 wrote to memory of 1788 932 firefox.exe firefox.exe PID 932 wrote to memory of 1788 932 firefox.exe firefox.exe PID 932 wrote to memory of 1788 932 firefox.exe firefox.exe PID 932 wrote to memory of 1788 932 firefox.exe firefox.exe PID 932 wrote to memory of 1788 932 firefox.exe firefox.exe PID 932 wrote to memory of 1788 932 firefox.exe firefox.exe PID 932 wrote to memory of 1788 932 firefox.exe firefox.exe PID 932 wrote to memory of 1788 932 firefox.exe firefox.exe PID 932 wrote to memory of 1788 932 firefox.exe firefox.exe PID 932 wrote to memory of 1788 932 firefox.exe firefox.exe PID 932 wrote to memory of 1788 932 firefox.exe firefox.exe PID 932 wrote to memory of 1788 932 firefox.exe firefox.exe PID 932 wrote to memory of 1788 932 firefox.exe firefox.exe PID 932 wrote to memory of 1788 932 firefox.exe firefox.exe PID 932 wrote to memory of 1788 932 firefox.exe firefox.exe PID 932 wrote to memory of 1788 932 firefox.exe firefox.exe PID 932 wrote to memory of 1788 932 firefox.exe firefox.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f66b770e77265722c0de698db8c61e8dcb8c8883100a9f16f5d4b92067c1667.exe"C:\Users\Admin\AppData\Local\Temp\2f66b770e77265722c0de698db8c61e8dcb8c8883100a9f16f5d4b92067c1667.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Users\Admin\AppData\Local\Temp\1008081001\424a536faa.exe"C:\Users\Admin\AppData\Local\Temp\1008081001\424a536faa.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2648 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5708 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fff5a52cc40,0x7fff5a52cc4c,0x7fff5a52cc585⤵PID:5728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1992,i,7148981156614559743,5388168741346061760,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1988 /prefetch:25⤵PID:5988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1872,i,7148981156614559743,5388168741346061760,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2156 /prefetch:35⤵PID:6024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2260,i,7148981156614559743,5388168741346061760,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2616 /prefetch:85⤵PID:6120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3196,i,7148981156614559743,5388168741346061760,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3244 /prefetch:15⤵
- Uses browser remote debugging
PID:5068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3232,i,7148981156614559743,5388168741346061760,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3388 /prefetch:15⤵
- Uses browser remote debugging
PID:4568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4284,i,7148981156614559743,5388168741346061760,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3944 /prefetch:15⤵
- Uses browser remote debugging
PID:4964
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5384
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2820
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2648 -s 6924⤵
- Program crash
PID:5388
-
-
-
C:\Users\Admin\AppData\Local\Temp\1008082001\4606a3136f.exe"C:\Users\Admin\AppData\Local\Temp\1008082001\4606a3136f.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1932
-
-
C:\Users\Admin\AppData\Local\Temp\1008083001\77eae7b3ed.exe"C:\Users\Admin\AppData\Local\Temp\1008083001\77eae7b3ed.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:220
-
-
C:\Users\Admin\AppData\Local\Temp\1008084001\fe51166ee7.exe"C:\Users\Admin\AppData\Local\Temp\1008084001\fe51166ee7.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2324
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1448
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4260
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2108
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4656
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2028 -parentBuildID 20240401114208 -prefsHandle 1960 -prefMapHandle 1952 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {f3b622ce-28f0-46fa-a87e-7f16e69909d2} 932 "\\.\pipe\gecko-crash-server-pipe.932" gpu6⤵PID:1788
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2472 -parentBuildID 20240401114208 -prefsHandle 2440 -prefMapHandle 2436 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {207087f2-9e5d-46d7-b67d-7fd88dd8b17f} 932 "\\.\pipe\gecko-crash-server-pipe.932" socket6⤵PID:4828
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3396 -childID 1 -isForBrowser -prefsHandle 3208 -prefMapHandle 3436 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {21131d03-9b42-44c1-84e1-ac21be1d0653} 932 "\\.\pipe\gecko-crash-server-pipe.932" tab6⤵PID:2360
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3860 -childID 2 -isForBrowser -prefsHandle 3624 -prefMapHandle 1000 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {89c7bd5a-492c-43a5-8f61-5d5e2e2dee29} 932 "\\.\pipe\gecko-crash-server-pipe.932" tab6⤵PID:3644
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1572 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 1564 -prefMapHandle 1416 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {30c20431-3db6-427f-8e98-75e3f1042aab} 932 "\\.\pipe\gecko-crash-server-pipe.932" utility6⤵
- Checks processor information in registry
PID:5296
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5296 -childID 3 -isForBrowser -prefsHandle 5260 -prefMapHandle 5264 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0b5c0592-bc2b-4d4b-876e-548e8587fa74} 932 "\\.\pipe\gecko-crash-server-pipe.932" tab6⤵PID:5832
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5432 -childID 4 -isForBrowser -prefsHandle 5440 -prefMapHandle 5236 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {10d6a7f4-585f-4641-8bf2-4f4129ab852b} 932 "\\.\pipe\gecko-crash-server-pipe.932" tab6⤵PID:5864
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5296 -childID 5 -isForBrowser -prefsHandle 5644 -prefMapHandle 5648 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {62e88ae2-5acb-42ac-bfad-35d1bf112596} 932 "\\.\pipe\gecko-crash-server-pipe.932" tab6⤵PID:5892
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1008085001\31fd7219ec.exe"C:\Users\Admin\AppData\Local\Temp\1008085001\31fd7219ec.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4944
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2648 -ip 26481⤵PID:4812
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5420
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2852
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\activity-stream.discovery_stream.json
Filesize27KB
MD5f3e0cdb2d1d074d7b739d230ed71d020
SHA19ede83c984569b604232e252c85a77e1524590f8
SHA256dd3062bb73c9ee20838f9049cd7fe59941e47d765e8ba46c4b916407c98175dd
SHA5129fa97de29df22f1e4b5301a7ef52875de24001d1364f9f9375b8ffdc4cdc5e735cb9a032448cc9e958e987b4e55e3f400f5f969e19f06cf71328348251f3ad4d
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD59b74046c701b9181c050b4b8562d8587
SHA1e4b3e7b5540e795a8f03fc09efaf227d93ab40b4
SHA256562ac2c3678d6fee15e67bdf91bf5107e9ce4615af5bb20fbc5c735a5e6084aa
SHA51225b12746e7c3d40d4e8b8837f6dabaf47a64cc8331ffeb9b5297c3cb7647d346147ea310506e20c54324f815a93ad4f4d3a5b7013eb39faf76c5d7e6feaaffe2
-
Filesize
4.2MB
MD5402af0c244e89244c6e899931f5a23b9
SHA14413e4e963830f4631a64830b8dc8bf3e427d53a
SHA256e4f2dd198edb21635f20639dc65bcae2b2cf6a66b9f8a37b7253dd7b353c3ef9
SHA512fdcce9f496704336b45ec255095f7dd76fa0af26cf8ab784a283d55d5b05bd94ef3d3e61bee5b9f7e20251dfaaef9834373e6ff39e21fc689551a4ae5a27f1da
-
Filesize
1.8MB
MD5c29c30bfb75bf498848c908638625e45
SHA19879e768d895a6f4fa69bbff4c4d7193321dcc9f
SHA25606a34982b9154716e14297712ecb8efb2bc9bcce381e6e4305cf2e1579bfdcd4
SHA512ada1d2345e2a0bbb3aef2916cc001094524638a38f431817eb80207215c9eb935e2f7dfee50870b90dc43af4d39a72b4640d12aaaa51c839da0c7ef076167205
-
Filesize
1.8MB
MD5e5a48f23e7b32f452f9bf2e6bf42094c
SHA14f95895d7a641793c3e603847c06ffd51fb29940
SHA25690a76e28f761c3a0580ec1b56eb241b57001091cac3d63378dec4368279103dd
SHA5123ad71818ffa0544e8c7e302c49a51b7e58b42543a0640a588e448d4d1ebb9e4b880e1869a634b7e66a2d11849eb2c68672b575f7b6386393bc02ff052293ded4
-
Filesize
901KB
MD56e6af329feb47e6d6dec9389429cfd07
SHA1dfd44cfcabd9d5ae746ad4221e55302b89002b0a
SHA256f6dc47d57da7bec7190d32e4140b861714fefc6ceac91faf1ae3d65eae141d5d
SHA512da9e894874433ae748912ad95dc0e92a9e9cb44f95755d2ba929355abd9de631fa9b4fddebd1647d655ca8c62cc7284c97a1d4de174ce47b3cd6ec5c51a5e157
-
Filesize
2.6MB
MD5737f95c4ab6db790a94058de0ae65785
SHA127e0429b7426a619bfdfe0c71e4f5c995eb82dad
SHA256b15c5a342a7300a91373426ca437580d1dc969403e9a855cf89c4876aaa3f3eb
SHA512cc57f79bc6ed4884d174ff37cc5dd64b71946c0114b5fdb1df8aac9248db9425afcd93444bfa1a925801d82caac18eec91ad6ce6eb0d2aacc5c3f77ca693d1f7
-
Filesize
1.9MB
MD515e30b215f9ffa75cb1b5286ab26b6d0
SHA180b925698720de26222a4d7415d7a3fd711168e6
SHA2562f66b770e77265722c0de698db8c61e8dcb8c8883100a9f16f5d4b92067c1667
SHA51207671ee48bcad3227533758762185fbc7e2368eebd1466360946679cb0a47ce62c0f9b8fbc4c0f06b293bf539b9cf46d82f1b12821b4f0e1f218f61464153311
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\AlternateServices.bin
Filesize6KB
MD52f751ad06f13f551b28773bf50929789
SHA1811f5b1b4da6fa1c0190b1640f7a0cebee0c7fec
SHA256cffb6c79fc8dafc0ccf848a80fa46c3e1c71deed2eea339315421b4607ae57ff
SHA5128db0172375e95f0a3fc41f0768dc7621af2052099b64fbeafdd2ea45001c77a8885ee88eda62fae850d7059b67588cde547b7db49353404038e7c59664b44dc5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\AlternateServices.bin
Filesize10KB
MD571c62b92f4f5afb7cb9daab630efb55f
SHA11cf862c973e0b4d4a897fc6f3a0e383bdfaa239d
SHA256d0f8641fc1a86893ab837119b6c5b38ac92035845816b5b527262af148a2693a
SHA512b87fa205f2831f5bc0ed4707b45e203d44c7851ea0ee8f31a7882d41cd3293efbebc002c0509b57e3cb849584b267d2be78bcfac12469d62a4d93342f630250d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp
Filesize21KB
MD5b7c39c7e4217865309131f3e010713a5
SHA160cfc78e079cda102f6df98363a6aa4fcd2ad5ce
SHA2565399d59f87e5d07dc7f451179c8e3b3be125f8f5204855cf5ce54fa7ffc2c768
SHA512675bc1bae3badd753bdbc7f08a7eeed98e0450bced5f376e62ee4c3b8928effa70cb1edc6e3d88a1d16e6a8137ba71a0743d571cb12fef012de119b36023b2b5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp
Filesize24KB
MD5a06575df9a295d72d24ee058c53c9cf9
SHA1ee7f9489e2151c1d07210d2e9bdc5095b34339b4
SHA2569f371e6739577ee409d885b655737ac944b314675d04bc944e1321f836965d3c
SHA5127070ca4b9d0e9e7ebd49d3249b3cbf7ad009aa9b3bbec7081f2c483a152620ee61de762b8f3546d68220f66e3151b0c1f4d13e5f22ec4d458887fd2eed39361c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD5b03a79e3dd5f8cec15eb9106909ca87e
SHA1675cc637ce6965889179870d89135fb3a0a3dfce
SHA2567097a814f1ddf3ec4b00b7bf6bda18486d872381da69555c46fd68c5d0736fcb
SHA512e2b711a2c3be8cdef59c24565e0b4393a282756c708b6f4cfbbb9830473b722d9b974d562fa966ba38371c7500bfac4f4ff62289d402a9633159209685a485a2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\pending_pings\a772f997-1238-49d0-8244-5abfbc89af14
Filesize982B
MD5ddba0dd96f17e588f1667de9c197bf54
SHA1e79c7e41627519fb58d17ca61ccbdcf4198c170d
SHA256458433e156dfe1c6b6db1c7ac0c839023ade74ef5756dd5f234332b9ce16209b
SHA512fb0a5b48cc27ac28ecd16e85730bc03a48d1bb618a1bff0b61cbb998e4e50b5cf8c2d403b3fca17587b80774a56957db59cff30e070e6f91767b5a0f77239243
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\pending_pings\e6b623de-d5d7-4ff1-b898-b548ada3d54a
Filesize659B
MD5d23a64354e5240a583950f0f05409253
SHA18be52ff14a9ccdb433f9a74d7704c95d44a536ff
SHA2565631343cf7f454ad0c20dc6f5d60ef2ae5e275099b471680bf18422638a3f552
SHA5124e0543f7e48b1ddb9294dbd8403794ba1e38a4ca6c96acfff3d793078abcf71ba758fd8d1083b631fc1cce75bff84b6e5636e14b38af3245809317675c84c3e7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD5aed18641371d4d7a4eab6ac2082dc116
SHA19df01bb4e5b9589f787d59b48cedf95143681145
SHA256f2d8870dc81992b8a6e21bca271db699fadb3054d752747192b94a4243a33463
SHA51249adfb533e9d27e2899b82106e6c34d4ccdf432d863625e65e1795064e9e9f76b50121852240819e4d1f1e337c0b50a240c845b3315378be75c426efbca75edb
-
Filesize
15KB
MD5fb917ec65ca1aa97d9ed0efd322ea61c
SHA164bd059bcfdc3a66cdc1a6aa1fdae3ff4d949e8a
SHA2566158a727bfcc8acbb97d0a0a2663abcc3139668c676951eae0d97166b99be5fe
SHA512284cf5b7b76d45069a9e0f0e63b295d737f57e2ce8ee7016a0b4246225ce0be91a973789b8635e308943a71f5822685ac82ad632ca0ba0e240201bec222d7ea9
-
Filesize
11KB
MD511a9fed2ddcbb70d1a31892ec5c4321f
SHA14d5ab81256d117cdffefb6c364d9bccf905132e9
SHA25610e52cd5d2ec2b54a976e80798c75a15e09f8d86ae37f48703f34bae83eee1ee
SHA51288ed41f97fb59b214d956df24b8af85995402400120b0ee07131280f59ba289fe792b0884f29fe41f70ff2579f5ec0657e7d79e25d54093bfca8f5dc7a7f70ea
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize1.9MB
MD5db19cb9745b1725d876e740e3b409776
SHA1d31e62426da656c5739fd73a465730dc1c65f897
SHA256d0bba02231e48306d311d93003bc2b4c64f57d847b141ecb1bc9395f35f77ea4
SHA51232c67af20e0e2959ab32b95dddf40258078b6693485fa4be98d516f7396fd6c527cfaac6fb502f80a30e8b16a6262ea027c4361b5b2203a41280b04f1c1b3f71
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e