Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2024 06:22
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240903-en
General
-
Target
file.exe
-
Size
1.8MB
-
MD5
7e87644426bb54d86265dd3c83727973
-
SHA1
5d7148bdfa59cdc79275e087aa0fc6a7659c2029
-
SHA256
bba49d9c5a233f7916671750711049be4108a7ffae09e955bc9e90c03d2c4ab1
-
SHA512
1e29caca935af25e29c9c5f5e927f97e1be70792300f2d5a8720e29e8de1647ee24ba4462ae13fd186d064feb83a64380a96ed202363a545c89a13dab9a08a9b
-
SSDEEP
49152:3vkiCocWLaGUvpxuMjv1jVep2uqJAQNgLPRBfxBp8:3MiFGpjjv1xPzyRY
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Cryptbot family
-
Detects CryptBot payload 1 IoCs
CryptBot is a C++ stealer distributed widely in bundle with other software.
Processes:
resource yara_rule behavioral2/memory/2192-489-0x0000000069CC0000-0x000000006A71B000-memory.dmp family_cryptbot_v3 -
Processes:
35ceb8ad3f.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 35ceb8ad3f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 35ceb8ad3f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 35ceb8ad3f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 35ceb8ad3f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 35ceb8ad3f.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 35ceb8ad3f.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
Processes:
e452e4e6b4.exe6b359ef797.exe35ceb8ad3f.exe258c6f7683.exefile.exeskotes.exeskotes.exeskotes.exeskotes.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e452e4e6b4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6b359ef797.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 35ceb8ad3f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 258c6f7683.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
Processes:
chrome.exechrome.exechrome.exechrome.exepid process 5780 chrome.exe 3580 chrome.exe 3268 chrome.exe 5200 chrome.exe -
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
6b359ef797.exe35ceb8ad3f.exe258c6f7683.exefile.exeskotes.exeskotes.exee452e4e6b4.exeskotes.exeskotes.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6b359ef797.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 35ceb8ad3f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 258c6f7683.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 258c6f7683.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 35ceb8ad3f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e452e4e6b4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e452e4e6b4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6b359ef797.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
file.exeskotes.exe258c6f7683.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation file.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 258c6f7683.exe -
Executes dropped EXE 11 IoCs
Processes:
skotes.exee452e4e6b4.exe6b359ef797.exeskotes.exeedc719f273.exe35ceb8ad3f.exe258c6f7683.exeservice123.exeskotes.exeskotes.exeservice123.exepid process 2016 skotes.exe 3640 e452e4e6b4.exe 2072 6b359ef797.exe 3496 skotes.exe 3012 edc719f273.exe 5340 35ceb8ad3f.exe 2192 258c6f7683.exe 5020 service123.exe 5404 skotes.exe 1996 skotes.exe 5412 service123.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
file.exeskotes.exe6b359ef797.exeskotes.exe258c6f7683.exeskotes.exeskotes.exee452e4e6b4.exe35ceb8ad3f.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine file.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 6b359ef797.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 258c6f7683.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine e452e4e6b4.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 35ceb8ad3f.exe -
Loads dropped DLL 2 IoCs
Processes:
service123.exeservice123.exepid process 5020 service123.exe 5412 service123.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
35ceb8ad3f.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 35ceb8ad3f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 35ceb8ad3f.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
skotes.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\edc719f273.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008368001\\edc719f273.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\35ceb8ad3f.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008369001\\35ceb8ad3f.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e452e4e6b4.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008366001\\e452e4e6b4.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\6b359ef797.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008367001\\6b359ef797.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\1008368001\edc719f273.exe autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
Processes:
file.exeskotes.exee452e4e6b4.exe6b359ef797.exeskotes.exe35ceb8ad3f.exe258c6f7683.exeskotes.exeskotes.exepid process 2204 file.exe 2016 skotes.exe 3640 e452e4e6b4.exe 2072 6b359ef797.exe 3496 skotes.exe 5340 35ceb8ad3f.exe 2192 258c6f7683.exe 5404 skotes.exe 1996 skotes.exe -
Drops file in Windows directory 1 IoCs
Processes:
file.exedescription ioc process File created C:\Windows\Tasks\skotes.job file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5700 2192 WerFault.exe 258c6f7683.exe -
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
file.exeskotes.exee452e4e6b4.exetaskkill.exe35ceb8ad3f.exe6b359ef797.exeedc719f273.exeservice123.exeschtasks.exetaskkill.exetaskkill.exe258c6f7683.exetaskkill.exetaskkill.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e452e4e6b4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 35ceb8ad3f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6b359ef797.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language edc719f273.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 258c6f7683.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exefirefox.exe258c6f7683.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 258c6f7683.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 258c6f7683.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 5 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 3512 taskkill.exe 3124 taskkill.exe 4456 taskkill.exe 2256 taskkill.exe 1864 taskkill.exe -
Modifies registry class 1 IoCs
Processes:
firefox.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 27 IoCs
Processes:
file.exeskotes.exee452e4e6b4.exe6b359ef797.exeskotes.exeedc719f273.exe35ceb8ad3f.exe258c6f7683.exechrome.exeskotes.exeskotes.exepid process 2204 file.exe 2204 file.exe 2016 skotes.exe 2016 skotes.exe 3640 e452e4e6b4.exe 3640 e452e4e6b4.exe 2072 6b359ef797.exe 2072 6b359ef797.exe 3496 skotes.exe 3496 skotes.exe 3012 edc719f273.exe 3012 edc719f273.exe 3012 edc719f273.exe 3012 edc719f273.exe 5340 35ceb8ad3f.exe 5340 35ceb8ad3f.exe 5340 35ceb8ad3f.exe 5340 35ceb8ad3f.exe 5340 35ceb8ad3f.exe 2192 258c6f7683.exe 2192 258c6f7683.exe 5780 chrome.exe 5780 chrome.exe 5404 skotes.exe 5404 skotes.exe 1996 skotes.exe 1996 skotes.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 5780 chrome.exe 5780 chrome.exe 5780 chrome.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exefirefox.exe35ceb8ad3f.exechrome.exedescription pid process Token: SeDebugPrivilege 3512 taskkill.exe Token: SeDebugPrivilege 3124 taskkill.exe Token: SeDebugPrivilege 4456 taskkill.exe Token: SeDebugPrivilege 2256 taskkill.exe Token: SeDebugPrivilege 1864 taskkill.exe Token: SeDebugPrivilege 5028 firefox.exe Token: SeDebugPrivilege 5028 firefox.exe Token: SeDebugPrivilege 5340 35ceb8ad3f.exe Token: SeShutdownPrivilege 5780 chrome.exe Token: SeCreatePagefilePrivilege 5780 chrome.exe Token: SeShutdownPrivilege 5780 chrome.exe Token: SeCreatePagefilePrivilege 5780 chrome.exe Token: SeDebugPrivilege 5028 firefox.exe Token: SeDebugPrivilege 5028 firefox.exe Token: SeDebugPrivilege 5028 firefox.exe -
Suspicious use of FindShellTrayWindow 59 IoCs
Processes:
file.exeedc719f273.exefirefox.exechrome.exepid process 2204 file.exe 3012 edc719f273.exe 3012 edc719f273.exe 3012 edc719f273.exe 3012 edc719f273.exe 3012 edc719f273.exe 3012 edc719f273.exe 3012 edc719f273.exe 5028 firefox.exe 5028 firefox.exe 5028 firefox.exe 5028 firefox.exe 5028 firefox.exe 5028 firefox.exe 5028 firefox.exe 5028 firefox.exe 5028 firefox.exe 5028 firefox.exe 5028 firefox.exe 5028 firefox.exe 5028 firefox.exe 5028 firefox.exe 5028 firefox.exe 5028 firefox.exe 5028 firefox.exe 5028 firefox.exe 5028 firefox.exe 5028 firefox.exe 5028 firefox.exe 3012 edc719f273.exe 3012 edc719f273.exe 3012 edc719f273.exe 3012 edc719f273.exe 5780 chrome.exe 5780 chrome.exe 5780 chrome.exe 5780 chrome.exe 5780 chrome.exe 5780 chrome.exe 5780 chrome.exe 5780 chrome.exe 5780 chrome.exe 5780 chrome.exe 5780 chrome.exe 5780 chrome.exe 5780 chrome.exe 5780 chrome.exe 5780 chrome.exe 5780 chrome.exe 5780 chrome.exe 5780 chrome.exe 5780 chrome.exe 5780 chrome.exe 5780 chrome.exe 5780 chrome.exe 5780 chrome.exe 5780 chrome.exe 5780 chrome.exe 5780 chrome.exe -
Suspicious use of SendNotifyMessage 31 IoCs
Processes:
edc719f273.exefirefox.exepid process 3012 edc719f273.exe 3012 edc719f273.exe 3012 edc719f273.exe 3012 edc719f273.exe 3012 edc719f273.exe 3012 edc719f273.exe 3012 edc719f273.exe 5028 firefox.exe 5028 firefox.exe 5028 firefox.exe 5028 firefox.exe 5028 firefox.exe 5028 firefox.exe 5028 firefox.exe 5028 firefox.exe 5028 firefox.exe 5028 firefox.exe 5028 firefox.exe 5028 firefox.exe 5028 firefox.exe 5028 firefox.exe 5028 firefox.exe 5028 firefox.exe 5028 firefox.exe 5028 firefox.exe 5028 firefox.exe 5028 firefox.exe 3012 edc719f273.exe 3012 edc719f273.exe 3012 edc719f273.exe 3012 edc719f273.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
firefox.exepid process 5028 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
file.exeskotes.exeedc719f273.exefirefox.exefirefox.exedescription pid process target process PID 2204 wrote to memory of 2016 2204 file.exe skotes.exe PID 2204 wrote to memory of 2016 2204 file.exe skotes.exe PID 2204 wrote to memory of 2016 2204 file.exe skotes.exe PID 2016 wrote to memory of 3640 2016 skotes.exe e452e4e6b4.exe PID 2016 wrote to memory of 3640 2016 skotes.exe e452e4e6b4.exe PID 2016 wrote to memory of 3640 2016 skotes.exe e452e4e6b4.exe PID 2016 wrote to memory of 2072 2016 skotes.exe 6b359ef797.exe PID 2016 wrote to memory of 2072 2016 skotes.exe 6b359ef797.exe PID 2016 wrote to memory of 2072 2016 skotes.exe 6b359ef797.exe PID 2016 wrote to memory of 3012 2016 skotes.exe edc719f273.exe PID 2016 wrote to memory of 3012 2016 skotes.exe edc719f273.exe PID 2016 wrote to memory of 3012 2016 skotes.exe edc719f273.exe PID 3012 wrote to memory of 3512 3012 edc719f273.exe taskkill.exe PID 3012 wrote to memory of 3512 3012 edc719f273.exe taskkill.exe PID 3012 wrote to memory of 3512 3012 edc719f273.exe taskkill.exe PID 3012 wrote to memory of 3124 3012 edc719f273.exe taskkill.exe PID 3012 wrote to memory of 3124 3012 edc719f273.exe taskkill.exe PID 3012 wrote to memory of 3124 3012 edc719f273.exe taskkill.exe PID 3012 wrote to memory of 4456 3012 edc719f273.exe taskkill.exe PID 3012 wrote to memory of 4456 3012 edc719f273.exe taskkill.exe PID 3012 wrote to memory of 4456 3012 edc719f273.exe taskkill.exe PID 3012 wrote to memory of 2256 3012 edc719f273.exe taskkill.exe PID 3012 wrote to memory of 2256 3012 edc719f273.exe taskkill.exe PID 3012 wrote to memory of 2256 3012 edc719f273.exe taskkill.exe PID 3012 wrote to memory of 1864 3012 edc719f273.exe taskkill.exe PID 3012 wrote to memory of 1864 3012 edc719f273.exe taskkill.exe PID 3012 wrote to memory of 1864 3012 edc719f273.exe taskkill.exe PID 3012 wrote to memory of 1004 3012 edc719f273.exe firefox.exe PID 3012 wrote to memory of 1004 3012 edc719f273.exe firefox.exe PID 1004 wrote to memory of 5028 1004 firefox.exe firefox.exe PID 1004 wrote to memory of 5028 1004 firefox.exe firefox.exe PID 1004 wrote to memory of 5028 1004 firefox.exe firefox.exe PID 1004 wrote to memory of 5028 1004 firefox.exe firefox.exe PID 1004 wrote to memory of 5028 1004 firefox.exe firefox.exe PID 1004 wrote to memory of 5028 1004 firefox.exe firefox.exe PID 1004 wrote to memory of 5028 1004 firefox.exe firefox.exe PID 1004 wrote to memory of 5028 1004 firefox.exe firefox.exe PID 1004 wrote to memory of 5028 1004 firefox.exe firefox.exe PID 1004 wrote to memory of 5028 1004 firefox.exe firefox.exe PID 1004 wrote to memory of 5028 1004 firefox.exe firefox.exe PID 5028 wrote to memory of 4304 5028 firefox.exe firefox.exe PID 5028 wrote to memory of 4304 5028 firefox.exe firefox.exe PID 5028 wrote to memory of 4304 5028 firefox.exe firefox.exe PID 5028 wrote to memory of 4304 5028 firefox.exe firefox.exe PID 5028 wrote to memory of 4304 5028 firefox.exe firefox.exe PID 5028 wrote to memory of 4304 5028 firefox.exe firefox.exe PID 5028 wrote to memory of 4304 5028 firefox.exe firefox.exe PID 5028 wrote to memory of 4304 5028 firefox.exe firefox.exe PID 5028 wrote to memory of 4304 5028 firefox.exe firefox.exe PID 5028 wrote to memory of 4304 5028 firefox.exe firefox.exe PID 5028 wrote to memory of 4304 5028 firefox.exe firefox.exe PID 5028 wrote to memory of 4304 5028 firefox.exe firefox.exe PID 5028 wrote to memory of 4304 5028 firefox.exe firefox.exe PID 5028 wrote to memory of 4304 5028 firefox.exe firefox.exe PID 5028 wrote to memory of 4304 5028 firefox.exe firefox.exe PID 5028 wrote to memory of 4304 5028 firefox.exe firefox.exe PID 5028 wrote to memory of 4304 5028 firefox.exe firefox.exe PID 5028 wrote to memory of 4304 5028 firefox.exe firefox.exe PID 5028 wrote to memory of 4304 5028 firefox.exe firefox.exe PID 5028 wrote to memory of 4304 5028 firefox.exe firefox.exe PID 5028 wrote to memory of 4304 5028 firefox.exe firefox.exe PID 5028 wrote to memory of 4304 5028 firefox.exe firefox.exe PID 5028 wrote to memory of 4304 5028 firefox.exe firefox.exe PID 5028 wrote to memory of 4304 5028 firefox.exe firefox.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\1008366001\e452e4e6b4.exe"C:\Users\Admin\AppData\Local\Temp\1008366001\e452e4e6b4.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3640
-
-
C:\Users\Admin\AppData\Local\Temp\1008367001\6b359ef797.exe"C:\Users\Admin\AppData\Local\Temp\1008367001\6b359ef797.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2072
-
-
C:\Users\Admin\AppData\Local\Temp\1008368001\edc719f273.exe"C:\Users\Admin\AppData\Local\Temp\1008368001\edc719f273.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3512
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3124
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4456
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2256
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1864
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1996 -parentBuildID 20240401114208 -prefsHandle 1924 -prefMapHandle 1916 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {36ed3e5b-20cf-46a7-a23d-032a13f13710} 5028 "\\.\pipe\gecko-crash-server-pipe.5028" gpu6⤵PID:4304
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2436 -parentBuildID 20240401114208 -prefsHandle 2412 -prefMapHandle 2408 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4c8b55be-fa76-4f1a-8776-4c1406adecf5} 5028 "\\.\pipe\gecko-crash-server-pipe.5028" socket6⤵PID:3920
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1576 -childID 1 -isForBrowser -prefsHandle 1340 -prefMapHandle 3104 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1312 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1754ed69-3966-4678-8f15-01e44092b97c} 5028 "\\.\pipe\gecko-crash-server-pipe.5028" tab6⤵PID:2232
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4036 -childID 2 -isForBrowser -prefsHandle 4048 -prefMapHandle 4044 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1312 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f7892838-65c1-4d22-be8f-62a5201f336e} 5028 "\\.\pipe\gecko-crash-server-pipe.5028" tab6⤵PID:372
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4784 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4520 -prefMapHandle 3868 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {80d49881-6d4b-4eaf-bf66-e594201009c2} 5028 "\\.\pipe\gecko-crash-server-pipe.5028" utility6⤵
- Checks processor information in registry
PID:5272
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5168 -childID 3 -isForBrowser -prefsHandle 5160 -prefMapHandle 5156 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1312 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {757d170e-2da2-46f6-9dc0-8f624991997b} 5028 "\\.\pipe\gecko-crash-server-pipe.5028" tab6⤵PID:5760
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5316 -childID 4 -isForBrowser -prefsHandle 5396 -prefMapHandle 5392 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1312 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c588789f-60cd-4d46-8c1f-24b3d0a2fcca} 5028 "\\.\pipe\gecko-crash-server-pipe.5028" tab6⤵PID:5772
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5588 -childID 5 -isForBrowser -prefsHandle 5412 -prefMapHandle 5512 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1312 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {bb775d7c-0aa6-4a52-b506-1f96bd5c8b27} 5028 "\\.\pipe\gecko-crash-server-pipe.5028" tab6⤵PID:5784
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1008369001\35ceb8ad3f.exe"C:\Users\Admin\AppData\Local\Temp\1008369001\35ceb8ad3f.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5340
-
-
C:\Users\Admin\AppData\Local\Temp\1008370001\258c6f7683.exe"C:\Users\Admin\AppData\Local\Temp\1008370001\258c6f7683.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2192 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5780 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fff4011cc40,0x7fff4011cc4c,0x7fff4011cc585⤵PID:5572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1932,i,16215286013357637952,4061910702952546623,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1928 /prefetch:25⤵PID:6132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1872,i,16215286013357637952,4061910702952546623,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1964 /prefetch:35⤵PID:3012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2252,i,16215286013357637952,4061910702952546623,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2268 /prefetch:85⤵PID:3896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3156,i,16215286013357637952,4061910702952546623,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3168 /prefetch:15⤵
- Uses browser remote debugging
PID:3580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3176,i,16215286013357637952,4061910702952546623,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3356 /prefetch:15⤵
- Uses browser remote debugging
PID:3268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4116,i,16215286013357637952,4061910702952546623,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4600 /prefetch:15⤵
- Uses browser remote debugging
PID:5200
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5020
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2192 -s 12844⤵
- Program crash
PID:5700
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3496
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2372
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2192 -ip 21921⤵PID:5844
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5404
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1996
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5412
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\g9per00b.default-release\activity-stream.discovery_stream.json
Filesize27KB
MD5ae6637582da99f1be4ac0f6cc11eddeb
SHA1494bcc70955ce38b84dc37d2071ef1c0a4ff49c6
SHA2569a724c9a68c0aa2b0f708c3b31d3c44bf2bd3453691f0454e3dfc11552f79379
SHA51259502ab8682f7073d1fc4f2202e1c6d1ae76ee2cc81eec85751507505e2ad9bfeffef8b25e6d807c8a407e07b28fc3e0be799b9edcd84d3f1aa8cc044082099e
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\g9per00b.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD5e3533dc0b2c3f1377bbe2c692018a396
SHA1d3ea7f704f02c21da51dfe5b45abae99148ef153
SHA256dcbf5432c6dcedfbe21a08650ddb2dd0a210061f48ca3ae223fe2756a0fd8423
SHA51225b99c9450db026a1de3a709b00955eb417a76f6b1b466b2c4e7b892953ee42a96456d8318fd71155907ae72b9bbd36b45e4502779c51d8edba51a869ac343b8
-
Filesize
1.8MB
MD578994eb57a34b9b1d346b469d6cf3b17
SHA1b2e9d7023158ac9326cfbf39ce96780727240d12
SHA25635ade47a0e4ef48ff15454a4d6ac4e4707d86dcf918d6d83b6a8edde92e77e2e
SHA512c580b0a242e0974f35f780da6a9864301eb0dc92bc997e96f093bde8c9a8b7ed06afc6adbbccadb8a90a58b75e3ae520cb10f4ec6513f8afc1cd95720e6295b9
-
Filesize
1.7MB
MD59f1e2f4308ddb08ce70a669d67a97763
SHA1fa3222ecc5bc0e59f5bcd16562bdc0cb9be9f1ee
SHA256f4a38bfe6d64ae092c608adf24f3b294710aacc510f628c4e19e1a1800fb42b8
SHA512d788a4497a4273f379ec2ca975941289eece214b391576133e86ba517224081a82004df6fdab139e674575e32c459c880f433970a7714b7a5e936741e9217c0c
-
Filesize
900KB
MD5fb4cdb6cd605a2ca102a663de2a9499c
SHA15d42a1ad6a467d4a85295292075b5bfbb8519ee3
SHA25617f0071a66d6c3be8d1a333abb46036fd252d83c0a80266bc82953d9e06a7c0f
SHA51204669570eb72c71f550b4ddf1c848a4614045b1089beb13c62d44c2df4ea168f5e89a0be918a3046fb93aa71f46abbfdfda575ff0eef2f24c34e27248da48f4d
-
Filesize
2.6MB
MD5006daee02e842ee4cb9319df03d64396
SHA136a735d0192334585edb2052a4cfcad4d05e4fad
SHA2563d12707c9384a9566fde9e478b4baf6deb504ea7891a4a144ce8f3c63777167b
SHA512bda0444ac5cb2a526a5aa3b88d49100d6fdaae1dcb4bfe554c0644a96ef6d7e7514e328fda193ff33fb3d94138f72464c123609c0bacf621cd7fced61434dd5d
-
Filesize
4.2MB
MD53db3772a8fe7ee091f20b20660559b56
SHA1561dead86e068f55eb1858be78f41aec43498cb9
SHA2564ba3ca651abc2a2b457d128db67aadbc24b9ce55354643cd5d9fd541a67abcf6
SHA51255bb734ea76f0ea188d5d4f519e32059de50e3b2e15403d57ec7a077c4c0d60618d0854d0290efb4127a3803d1375924412cbf34a1d30635151844090387d605
-
Filesize
1.8MB
MD57e87644426bb54d86265dd3c83727973
SHA15d7148bdfa59cdc79275e087aa0fc6a7659c2029
SHA256bba49d9c5a233f7916671750711049be4108a7ffae09e955bc9e90c03d2c4ab1
SHA5121e29caca935af25e29c9c5f5e927f97e1be70792300f2d5a8720e29e8de1647ee24ba4462ae13fd186d064feb83a64380a96ed202363a545c89a13dab9a08a9b
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\AlternateServices.bin
Filesize6KB
MD588863baa5d86ee948018f8134ad2c67a
SHA166b56b925800b8fdbbf983a91d1ae28448350679
SHA256676a5a5337114cbd85a702bc0d890bb1203cfc601c1dfaebd9ead5b0221a9997
SHA512293295a6e8c9156401c05187adc207edebcdb387fb23946231bb023136c70a44d5eacdeb842314643d2924dcf4bb2ca01a718af5c4b9cb6bff7ee844b874b243
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\AlternateServices.bin
Filesize8KB
MD5245e07302607c960dde0f3c6f096f115
SHA16f03fbaf24970216facfff61a21d8767fc175d9e
SHA256719f27df301723f4f7f90dab0d122b2977eaaf80db16ce0c1b49c77980a603d6
SHA512b6671a6e83f99ea95d7fee700a166cbfb51eaf3b3015d5f198363d230bb892871f7eaa544cbdaa8d57bc01a0ae5604cb0048a242599706f100682ef43646bfb2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5db70d36047d3ab86bd5af19ae1b5df52
SHA14f2005057718b58d8ce60951be2ee94fb91b5689
SHA25644466c08a6d329a663d584b5599712e405e316409a27af18a3bf3cc4870d4a1d
SHA5123364a002fe4d6f7caa0121820185b88e18a47df10519cf62f3696b8574c4a3b3588d0b693e4348487fa049ad99c1580b7f6fdb696dcb0be884cec7b771a44341
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5050061a501e407bf46fc5baf7dff83cd
SHA1216d11164cb79e4ae814f87cc1b03d20b4fe1151
SHA256aeeb53195175cb8f1b6014ffa597ebcd9cdb4d9863a57ddccfc3d5a1bc5a778f
SHA5121d2be8c9ced111c3ab337c20672d71646d217c24aca24ff7b8ff3f5ac56e0005c19e45b3bc10d2a889189a15ebab4b3fd169d21ab1926cc9a647b62985194835
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\pending_pings\29419576-da5f-4d32-afbc-aceddc44292c
Filesize671B
MD51df69bced63953a8ced75c2a47ac496e
SHA1e7e5dc1d517eceabd2172c75ec9486ff58ec6517
SHA25655a27f7e6bccf893b53b181cc504ea09b0f95a2e853df8fe8734861d924e5406
SHA512cc51fcd3d7c351d99c2eaac21ff5b4b6d875117914cf68bd37e47a613464035f95e40fd170a4213b2e4adff05b70e5f3c9b298ed46f794e82944ec32a1835e4f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\pending_pings\8876549d-ab44-4417-ada6-e6c903f39423
Filesize27KB
MD56c1704c0014ae2eb8edcb776b51e07e7
SHA12a2acab1af7eb0aa58a7e44e4e5e62ee25e04cb5
SHA256ae7e433892a6033ad3113383857c0bca16c19d73eca3f106974e692896875f8c
SHA512a9586e511eb4f200cf1de656c475f7461b5dea9a1004d7bd2bb8511d35957902f8b47f32e0e1abcb4637458b1f8bab71a69c15f797ae9b988a7ceaa656d57f9f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\pending_pings\a5002e57-9c63-4346-9c86-472e0b19f848
Filesize982B
MD5b3d82eb894168598ec6c3db294e13e2b
SHA13ac1c6d5dfaa1b04da05409e967dde53f4503b32
SHA2560eb3af8690ccb94c03665d7c325eb9ed83884d00b0e0dc24f7ea3d5311cd3657
SHA512291c765e391779f989e65e1b260e28f5def1c840fe2813c474605736e5d4a5a302a8af5d8d0d8de6edf5e1f4010ff47625186c35b87bfee0daddab63205a89c7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
11KB
MD5d601750ff0c61fd9c60d9848dea27c5f
SHA16d58a7dd7e560d9285cd3a1e6473adf3b7289523
SHA25695355089c2fc0a1a4bad04a56b58465da80a5c74dfcf28fa9170c6c4a15b5104
SHA51216106dffa02a1ef17b1f4c76a515733c21d7f5615913bf945643088a62288be3b6693cf3f6473df29528628f03bb77a7b892e6c0f49d30d464a4acd5bfcdf80c
-
Filesize
10KB
MD584a2003a69f998acea219d36e7f4e965
SHA1ff655cb3bf3c2246686e9dea9de25732acf60d5b
SHA2563aefe4a92a85a9327bdccaafb610eed4a70408d691edb360f26ce6b2132cbc3a
SHA5129a10ffe8b71ed9756a57d7ff226c90971ce461f049b36b1711470ca775d32e3d7a083e622d7ae30cd90636a6a784d501a9c1db77eb7de93a77e30cc87285d1f4
-
Filesize
10KB
MD50be094dd5494980fa25fbb947ad9bae5
SHA1d9d6f4f77c73662c76fa3797483aa7f04e6db65c
SHA256ef21a08505412d6ea523598d8fa6bea0a1caf0c6ead4e03f14dc56a71e883961
SHA5121be56e64334f19fa3a3600f26ee0a8e78fb369b169c73a85f7c8ba04b1ae7bb30140c23bb3436af69ae98a1dcddf7aba8038251602296358ab4156e5f1cb201d
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e