Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2024 08:34
Static task
static1
Behavioral task
behavioral1
Sample
5Q2RC_file.exe
Resource
win7-20240903-en
General
-
Target
5Q2RC_file.exe
-
Size
1.8MB
-
MD5
f2d011251d3b81ee30bd85f4f705152b
-
SHA1
b18485051538caf49d226b94f882b68bcfcb7990
-
SHA256
e121118eb9676ffd4bebce8890b74d47dbd7051fce8a9bc5dea45552dccdcf56
-
SHA512
333c96ed465eb6ab016bb9c93f08412ad03d0250e5a6da5d28886501eb8789045f5bd2b90646ce56ddffb9fb880469f87b634776f23bf33316e690328a065804
-
SSDEEP
49152:A9c1CNgLCsZPUC96POCEUr+NAoS0wxY5+4W/:AfqLCIP0OpUmLS0wxY5TM
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Cryptbot family
-
Detects CryptBot payload 1 IoCs
CryptBot is a C++ stealer distributed widely in bundle with other software.
Processes:
resource yara_rule behavioral2/memory/4856-768-0x0000000069CC0000-0x000000006A71B000-memory.dmp family_cryptbot_v3 -
Processes:
cae0afe30c.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" cae0afe30c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" cae0afe30c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" cae0afe30c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" cae0afe30c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" cae0afe30c.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection cae0afe30c.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
Processes:
cae0afe30c.exe5559f1f34c.exeskotes.exe5Q2RC_file.exeskotes.exee3faa11cea.exeskotes.exebd1cb68b18.exeskotes.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ cae0afe30c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5559f1f34c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5Q2RC_file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e3faa11cea.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ bd1cb68b18.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
Processes:
chrome.exechrome.exechrome.exechrome.exepid process 616 chrome.exe 6064 chrome.exe 6096 chrome.exe 3100 chrome.exe -
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
skotes.exe5Q2RC_file.exeskotes.exee3faa11cea.exebd1cb68b18.execae0afe30c.exe5559f1f34c.exeskotes.exeskotes.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5Q2RC_file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e3faa11cea.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion bd1cb68b18.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion bd1cb68b18.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cae0afe30c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5559f1f34c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e3faa11cea.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5559f1f34c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5Q2RC_file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cae0afe30c.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
5Q2RC_file.exeskotes.exe5559f1f34c.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 5Q2RC_file.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 5559f1f34c.exe -
Executes dropped EXE 11 IoCs
Processes:
skotes.exeskotes.exee3faa11cea.exebd1cb68b18.exe7cbb5a2bdb.execae0afe30c.exe5559f1f34c.exeskotes.exeservice123.exeskotes.exeservice123.exepid process 4340 skotes.exe 2204 skotes.exe 1344 e3faa11cea.exe 4164 bd1cb68b18.exe 3908 7cbb5a2bdb.exe 5380 cae0afe30c.exe 4856 5559f1f34c.exe 5940 skotes.exe 3028 service123.exe 220 skotes.exe 5524 service123.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
bd1cb68b18.execae0afe30c.exeskotes.exeskotes.exeskotes.exe5559f1f34c.exeskotes.exe5Q2RC_file.exee3faa11cea.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine bd1cb68b18.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine cae0afe30c.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 5559f1f34c.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 5Q2RC_file.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine e3faa11cea.exe -
Loads dropped DLL 2 IoCs
Processes:
service123.exeservice123.exepid process 3028 service123.exe 5524 service123.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
cae0afe30c.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features cae0afe30c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" cae0afe30c.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
skotes.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e3faa11cea.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008388001\\e3faa11cea.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bd1cb68b18.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008389001\\bd1cb68b18.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\7cbb5a2bdb.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008390001\\7cbb5a2bdb.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cae0afe30c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008391001\\cae0afe30c.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\1008390001\7cbb5a2bdb.exe autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
Processes:
5Q2RC_file.exeskotes.exeskotes.exee3faa11cea.exebd1cb68b18.execae0afe30c.exe5559f1f34c.exeskotes.exeskotes.exepid process 2284 5Q2RC_file.exe 4340 skotes.exe 2204 skotes.exe 1344 e3faa11cea.exe 4164 bd1cb68b18.exe 5380 cae0afe30c.exe 4856 5559f1f34c.exe 5940 skotes.exe 220 skotes.exe -
Drops file in Windows directory 1 IoCs
Processes:
5Q2RC_file.exedescription ioc process File created C:\Windows\Tasks\skotes.job 5Q2RC_file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5336 4856 WerFault.exe 5559f1f34c.exe -
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
skotes.exeservice123.exeschtasks.exe5Q2RC_file.exee3faa11cea.exebd1cb68b18.exe7cbb5a2bdb.exe5559f1f34c.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.execae0afe30c.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5Q2RC_file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e3faa11cea.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bd1cb68b18.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7cbb5a2bdb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5559f1f34c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cae0afe30c.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exefirefox.exe5559f1f34c.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 5559f1f34c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 5559f1f34c.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 5 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 3604 taskkill.exe 3260 taskkill.exe 2692 taskkill.exe 1420 taskkill.exe 1532 taskkill.exe -
Modifies registry class 1 IoCs
Processes:
firefox.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 27 IoCs
Processes:
5Q2RC_file.exeskotes.exeskotes.exee3faa11cea.exebd1cb68b18.exe7cbb5a2bdb.execae0afe30c.exe5559f1f34c.exechrome.exeskotes.exeskotes.exepid process 2284 5Q2RC_file.exe 2284 5Q2RC_file.exe 4340 skotes.exe 4340 skotes.exe 2204 skotes.exe 2204 skotes.exe 1344 e3faa11cea.exe 1344 e3faa11cea.exe 4164 bd1cb68b18.exe 4164 bd1cb68b18.exe 3908 7cbb5a2bdb.exe 3908 7cbb5a2bdb.exe 5380 cae0afe30c.exe 5380 cae0afe30c.exe 3908 7cbb5a2bdb.exe 3908 7cbb5a2bdb.exe 5380 cae0afe30c.exe 5380 cae0afe30c.exe 5380 cae0afe30c.exe 4856 5559f1f34c.exe 4856 5559f1f34c.exe 616 chrome.exe 616 chrome.exe 5940 skotes.exe 5940 skotes.exe 220 skotes.exe 220 skotes.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 616 chrome.exe 616 chrome.exe 616 chrome.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exefirefox.execae0afe30c.exechrome.exedescription pid process Token: SeDebugPrivilege 3604 taskkill.exe Token: SeDebugPrivilege 3260 taskkill.exe Token: SeDebugPrivilege 2692 taskkill.exe Token: SeDebugPrivilege 1420 taskkill.exe Token: SeDebugPrivilege 1532 taskkill.exe Token: SeDebugPrivilege 2268 firefox.exe Token: SeDebugPrivilege 2268 firefox.exe Token: SeDebugPrivilege 5380 cae0afe30c.exe Token: SeShutdownPrivilege 616 chrome.exe Token: SeCreatePagefilePrivilege 616 chrome.exe Token: SeDebugPrivilege 2268 firefox.exe Token: SeDebugPrivilege 2268 firefox.exe Token: SeDebugPrivilege 2268 firefox.exe -
Suspicious use of FindShellTrayWindow 58 IoCs
Processes:
5Q2RC_file.exe7cbb5a2bdb.exefirefox.exechrome.exepid process 2284 5Q2RC_file.exe 3908 7cbb5a2bdb.exe 3908 7cbb5a2bdb.exe 3908 7cbb5a2bdb.exe 3908 7cbb5a2bdb.exe 3908 7cbb5a2bdb.exe 3908 7cbb5a2bdb.exe 3908 7cbb5a2bdb.exe 2268 firefox.exe 2268 firefox.exe 2268 firefox.exe 2268 firefox.exe 2268 firefox.exe 2268 firefox.exe 2268 firefox.exe 2268 firefox.exe 2268 firefox.exe 2268 firefox.exe 2268 firefox.exe 2268 firefox.exe 2268 firefox.exe 2268 firefox.exe 2268 firefox.exe 2268 firefox.exe 2268 firefox.exe 2268 firefox.exe 2268 firefox.exe 2268 firefox.exe 2268 firefox.exe 3908 7cbb5a2bdb.exe 3908 7cbb5a2bdb.exe 3908 7cbb5a2bdb.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe -
Suspicious use of SendNotifyMessage 30 IoCs
Processes:
7cbb5a2bdb.exefirefox.exepid process 3908 7cbb5a2bdb.exe 3908 7cbb5a2bdb.exe 3908 7cbb5a2bdb.exe 3908 7cbb5a2bdb.exe 3908 7cbb5a2bdb.exe 3908 7cbb5a2bdb.exe 3908 7cbb5a2bdb.exe 2268 firefox.exe 2268 firefox.exe 2268 firefox.exe 2268 firefox.exe 2268 firefox.exe 2268 firefox.exe 2268 firefox.exe 2268 firefox.exe 2268 firefox.exe 2268 firefox.exe 2268 firefox.exe 2268 firefox.exe 2268 firefox.exe 2268 firefox.exe 2268 firefox.exe 2268 firefox.exe 2268 firefox.exe 2268 firefox.exe 2268 firefox.exe 2268 firefox.exe 3908 7cbb5a2bdb.exe 3908 7cbb5a2bdb.exe 3908 7cbb5a2bdb.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
firefox.exepid process 2268 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
5Q2RC_file.exeskotes.exe7cbb5a2bdb.exefirefox.exefirefox.exedescription pid process target process PID 2284 wrote to memory of 4340 2284 5Q2RC_file.exe skotes.exe PID 2284 wrote to memory of 4340 2284 5Q2RC_file.exe skotes.exe PID 2284 wrote to memory of 4340 2284 5Q2RC_file.exe skotes.exe PID 4340 wrote to memory of 1344 4340 skotes.exe e3faa11cea.exe PID 4340 wrote to memory of 1344 4340 skotes.exe e3faa11cea.exe PID 4340 wrote to memory of 1344 4340 skotes.exe e3faa11cea.exe PID 4340 wrote to memory of 4164 4340 skotes.exe bd1cb68b18.exe PID 4340 wrote to memory of 4164 4340 skotes.exe bd1cb68b18.exe PID 4340 wrote to memory of 4164 4340 skotes.exe bd1cb68b18.exe PID 4340 wrote to memory of 3908 4340 skotes.exe 7cbb5a2bdb.exe PID 4340 wrote to memory of 3908 4340 skotes.exe 7cbb5a2bdb.exe PID 4340 wrote to memory of 3908 4340 skotes.exe 7cbb5a2bdb.exe PID 3908 wrote to memory of 3604 3908 7cbb5a2bdb.exe taskkill.exe PID 3908 wrote to memory of 3604 3908 7cbb5a2bdb.exe taskkill.exe PID 3908 wrote to memory of 3604 3908 7cbb5a2bdb.exe taskkill.exe PID 3908 wrote to memory of 3260 3908 7cbb5a2bdb.exe taskkill.exe PID 3908 wrote to memory of 3260 3908 7cbb5a2bdb.exe taskkill.exe PID 3908 wrote to memory of 3260 3908 7cbb5a2bdb.exe taskkill.exe PID 3908 wrote to memory of 2692 3908 7cbb5a2bdb.exe taskkill.exe PID 3908 wrote to memory of 2692 3908 7cbb5a2bdb.exe taskkill.exe PID 3908 wrote to memory of 2692 3908 7cbb5a2bdb.exe taskkill.exe PID 3908 wrote to memory of 1420 3908 7cbb5a2bdb.exe taskkill.exe PID 3908 wrote to memory of 1420 3908 7cbb5a2bdb.exe taskkill.exe PID 3908 wrote to memory of 1420 3908 7cbb5a2bdb.exe taskkill.exe PID 3908 wrote to memory of 1532 3908 7cbb5a2bdb.exe taskkill.exe PID 3908 wrote to memory of 1532 3908 7cbb5a2bdb.exe taskkill.exe PID 3908 wrote to memory of 1532 3908 7cbb5a2bdb.exe taskkill.exe PID 3908 wrote to memory of 3992 3908 7cbb5a2bdb.exe firefox.exe PID 3908 wrote to memory of 3992 3908 7cbb5a2bdb.exe firefox.exe PID 3992 wrote to memory of 2268 3992 firefox.exe firefox.exe PID 3992 wrote to memory of 2268 3992 firefox.exe firefox.exe PID 3992 wrote to memory of 2268 3992 firefox.exe firefox.exe PID 3992 wrote to memory of 2268 3992 firefox.exe firefox.exe PID 3992 wrote to memory of 2268 3992 firefox.exe firefox.exe PID 3992 wrote to memory of 2268 3992 firefox.exe firefox.exe PID 3992 wrote to memory of 2268 3992 firefox.exe firefox.exe PID 3992 wrote to memory of 2268 3992 firefox.exe firefox.exe PID 3992 wrote to memory of 2268 3992 firefox.exe firefox.exe PID 3992 wrote to memory of 2268 3992 firefox.exe firefox.exe PID 3992 wrote to memory of 2268 3992 firefox.exe firefox.exe PID 2268 wrote to memory of 4380 2268 firefox.exe firefox.exe PID 2268 wrote to memory of 4380 2268 firefox.exe firefox.exe PID 2268 wrote to memory of 4380 2268 firefox.exe firefox.exe PID 2268 wrote to memory of 4380 2268 firefox.exe firefox.exe PID 2268 wrote to memory of 4380 2268 firefox.exe firefox.exe PID 2268 wrote to memory of 4380 2268 firefox.exe firefox.exe PID 2268 wrote to memory of 4380 2268 firefox.exe firefox.exe PID 2268 wrote to memory of 4380 2268 firefox.exe firefox.exe PID 2268 wrote to memory of 4380 2268 firefox.exe firefox.exe PID 2268 wrote to memory of 4380 2268 firefox.exe firefox.exe PID 2268 wrote to memory of 4380 2268 firefox.exe firefox.exe PID 2268 wrote to memory of 4380 2268 firefox.exe firefox.exe PID 2268 wrote to memory of 4380 2268 firefox.exe firefox.exe PID 2268 wrote to memory of 4380 2268 firefox.exe firefox.exe PID 2268 wrote to memory of 4380 2268 firefox.exe firefox.exe PID 2268 wrote to memory of 4380 2268 firefox.exe firefox.exe PID 2268 wrote to memory of 4380 2268 firefox.exe firefox.exe PID 2268 wrote to memory of 4380 2268 firefox.exe firefox.exe PID 2268 wrote to memory of 4380 2268 firefox.exe firefox.exe PID 2268 wrote to memory of 4380 2268 firefox.exe firefox.exe PID 2268 wrote to memory of 4380 2268 firefox.exe firefox.exe PID 2268 wrote to memory of 4380 2268 firefox.exe firefox.exe PID 2268 wrote to memory of 4380 2268 firefox.exe firefox.exe PID 2268 wrote to memory of 4380 2268 firefox.exe firefox.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\5Q2RC_file.exe"C:\Users\Admin\AppData\Local\Temp\5Q2RC_file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Users\Admin\AppData\Local\Temp\1008388001\e3faa11cea.exe"C:\Users\Admin\AppData\Local\Temp\1008388001\e3faa11cea.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1344
-
-
C:\Users\Admin\AppData\Local\Temp\1008389001\bd1cb68b18.exe"C:\Users\Admin\AppData\Local\Temp\1008389001\bd1cb68b18.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4164
-
-
C:\Users\Admin\AppData\Local\Temp\1008390001\7cbb5a2bdb.exe"C:\Users\Admin\AppData\Local\Temp\1008390001\7cbb5a2bdb.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3604
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3260
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2692
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1420
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1532
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2028 -parentBuildID 20240401114208 -prefsHandle 1944 -prefMapHandle 1936 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ae84fda6-1460-4c08-90ae-00223288fccf} 2268 "\\.\pipe\gecko-crash-server-pipe.2268" gpu6⤵PID:4380
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2464 -parentBuildID 20240401114208 -prefsHandle 2456 -prefMapHandle 2452 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {75646b1c-28bb-497d-bda2-22051b6e17ec} 2268 "\\.\pipe\gecko-crash-server-pipe.2268" socket6⤵PID:740
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3028 -childID 1 -isForBrowser -prefsHandle 3032 -prefMapHandle 3044 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {346da255-2e8c-40fb-ada6-43ecbace7e97} 2268 "\\.\pipe\gecko-crash-server-pipe.2268" tab6⤵PID:2248
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3924 -childID 2 -isForBrowser -prefsHandle 3908 -prefMapHandle 3904 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d7df046a-9053-4810-b32b-9e8afe08505c} 2268 "\\.\pipe\gecko-crash-server-pipe.2268" tab6⤵PID:4432
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4856 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4836 -prefMapHandle 4744 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f73829d2-fa9b-4f04-ab0f-5e7e3fe55ee2} 2268 "\\.\pipe\gecko-crash-server-pipe.2268" utility6⤵
- Checks processor information in registry
PID:5220
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5480 -childID 3 -isForBrowser -prefsHandle 5656 -prefMapHandle 5636 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6163d43e-5342-47e3-bc06-0f9406b0159c} 2268 "\\.\pipe\gecko-crash-server-pipe.2268" tab6⤵PID:1576
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5828 -childID 4 -isForBrowser -prefsHandle 5584 -prefMapHandle 5476 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3e80d7e9-23f0-47b5-a5fd-98442078f4ab} 2268 "\\.\pipe\gecko-crash-server-pipe.2268" tab6⤵PID:2504
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5996 -childID 5 -isForBrowser -prefsHandle 6076 -prefMapHandle 6072 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {bef9319b-8e5b-40b8-828b-f3002113da23} 2268 "\\.\pipe\gecko-crash-server-pipe.2268" tab6⤵PID:2212
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1008391001\cae0afe30c.exe"C:\Users\Admin\AppData\Local\Temp\1008391001\cae0afe30c.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5380
-
-
C:\Users\Admin\AppData\Local\Temp\1008392001\5559f1f34c.exe"C:\Users\Admin\AppData\Local\Temp\1008392001\5559f1f34c.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4856 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:616 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffb8d27cc40,0x7ffb8d27cc4c,0x7ffb8d27cc585⤵PID:432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1984,i,3222199018961079139,12486111457077686036,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1980 /prefetch:25⤵PID:4876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1860,i,3222199018961079139,12486111457077686036,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2100 /prefetch:35⤵PID:5324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2236,i,3222199018961079139,12486111457077686036,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2248 /prefetch:85⤵PID:5516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3156,i,3222199018961079139,12486111457077686036,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3176 /prefetch:15⤵
- Uses browser remote debugging
PID:6096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3192,i,3222199018961079139,12486111457077686036,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3264 /prefetch:15⤵
- Uses browser remote debugging
PID:6064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4476,i,3222199018961079139,12486111457077686036,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3628 /prefetch:15⤵
- Uses browser remote debugging
PID:3100
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3028
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1872
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4856 -s 13124⤵
- Program crash
PID:5336
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2204
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1852
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5940
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4856 -ip 48561⤵PID:5156
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:220
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5524
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
354B
MD53bd3903f857a6a4203abcf8e34a6bd1b
SHA136b76c7b8f39529d3c3b22234aa2aa8cf9ced419
SHA25666094769e5991dee48aacc8456e0dd26b0f203f58989eb4e961435f88d59f894
SHA5123a9562b0971f151243afe9ec528714fc9b1ac47636a83cc56dcdbf5eef3760424c3ebb081ddcd87d8d3eb6f7a5acffbe8346742a1ceb0d872781ed20f101fe9b
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\activity-stream.discovery_stream.json
Filesize27KB
MD5ed0dddb942692a0de0318c498c0e01ba
SHA1f8fa39b03f67165c2b34520b71b2a5e1bd593161
SHA256eb6d10795ad342f2fb2481efe03b7125b0143848261000177ab2ac24e4f1b5a8
SHA5121a64ddb4fdd652f779036511a7ef2d3ea8d5e67edace77d10e1ff3718712816f1d7800beb06a45c908d5aa6c9bc1b5adba975156fc1f8943e8d84d43268fe867
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD5f3d41bd972affe902b74e9861905590b
SHA1d01c7b4b98192d426f5ff1f8730e68aa68845e8b
SHA256e8fe539b06b4b62522d664fa2eae1c117010a2ecfe01dcad39860a1d3d94e632
SHA5121dbad293c18f2a4d6a6f84099074e0713b44df6123422e28088cf0d538d87e34000bf407885ff4c47a2f9934d502d3ae21a2581663a53f872c064c3c3e626e20
-
Filesize
1.8MB
MD5146b67cc688a611abaaf3db22cbc8d26
SHA1d47046efc99525f872ac5b5c09d3dc735df0505f
SHA25648598c159deaee09357c743da2d63ab0f687fb26ac5e437eee42ca5821afc13d
SHA512f8beb22b5e812ac703b3b8490c1056b4d61385837e79230183e14bf8ff29612110a91dd16656f8f5a645fa79af785d7a47e73785d678d9b95fa0b2363e09b7df
-
Filesize
1.7MB
MD59669088834eac5ce82390081d8ba345e
SHA1440930fb6eb8145f1faf1333b735541c93ba8486
SHA256099be17313be4a4d993d9491bd4c3153fec62299c8de01b32600e16a1b63cb25
SHA51279340656a33fa58f7e4fc59ddaf8db335895e1ed3a8accb451ee2a0b874d7758dd244db5c46ecf51edecbc45b2ca73f77b2535c5592464ba6e68ac0fa578898b
-
Filesize
900KB
MD5e218ba15d023b121ed894aa022d2ea9f
SHA177e83ec958858e33b033af0fc09933ebb7456cbe
SHA25620d0c750e012bcc685d1a5a265a69a310af8de3a1775957e6ab41ed0103232ea
SHA512ace650dce8ffc184f94e379dba31a988ad4eb3780f52ed52e01ddacdc7895e4e7064ac01a2b2f09966a6d0afa1a5dae6275358632664e41c53f79dca19d51909
-
Filesize
2.7MB
MD591847f2e81c9f49ea716ec39dd8fbb82
SHA10382c55d753600e213435f447f2803e9d2635401
SHA2567d07638524cc1c3a3032404f0ff3f79b5080c15a22aa4001d719d463137d294f
SHA51288d4d590bdb1a9c1e3c7eec5bdb9c5eef85f9fdffd7e41af08c812076dffceb5eb86f7e01d95b094353f4cfa9688f522b4ed64ff4c3c1c726f4d6e0bb3b9973c
-
Filesize
4.3MB
MD5791373b49f4ee813cd3b2869a62d5e86
SHA11231ef136f9d806edc7202e44e81bd35d05526e8
SHA256ff7dc25ce280c034e4038d4ebc20560904ceef62c9ada19631c8f4a42183c98d
SHA5128321138d61d3fec4b6e45ba45c0b3965a8a9d20f79e4956c1d8c97c815b6d9fc76ae8b8861475016d1aed8397c7d321a8af4b63ab88cf9a45576b131d9ac8c27
-
Filesize
1.8MB
MD5f2d011251d3b81ee30bd85f4f705152b
SHA1b18485051538caf49d226b94f882b68bcfcb7990
SHA256e121118eb9676ffd4bebce8890b74d47dbd7051fce8a9bc5dea45552dccdcf56
SHA512333c96ed465eb6ab016bb9c93f08412ad03d0250e5a6da5d28886501eb8789045f5bd2b90646ce56ddffb9fb880469f87b634776f23bf33316e690328a065804
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\AlternateServices.bin
Filesize6KB
MD59324c1b36993de062aa64c9ebd918f69
SHA168e53dec75b4f2e71b5e04d422c7908f9edf1340
SHA256c4774d634a405cd832ded3bb1c325bb4365a98ba5ed49049780e9a7d150fcb0c
SHA5122c4369beedeaeb297921523bc86c44b7a5d3f7b9a9c6ee8eb53d51ebbfd4f9ba0333d0ba044117620b3ffa58f4a6eb49a6beb1d0c44b36e6991f80696c4c09d0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\AlternateServices.bin
Filesize18KB
MD5dba9f4f36efda2fff1f810fc2bc45560
SHA1df57a516a942be2f59b65321c9b1d0164c4f8a01
SHA256f3c1f174a29b34bdbe91e1859bfa5477b1a913b529d3645f4d96eae560668b16
SHA512540cbac0cd432d687af66fd92b5bc53f9a5065f6b9b50b63e24430b2759e6a56ec0f73984c7c5b91494869a9b030a440c528246e3e149274450ce74a9ff4353f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\AlternateServices.bin
Filesize8KB
MD5d3f43b005890699f8639ede80d47467a
SHA112a30bc9ff1cd9a32ab8300a1e5d85e8b5127a16
SHA256ab5c9e5ae65016d0dc7ad5086d882f10501e05aac245dde3b885c8717e85c972
SHA512dcf05b1cdd9606131d8cdac34e529bed1a1dd54579406c0cd0159239ee348de8ed9ed6604b7f6211e32c738e58a101db1e1cf50f98aafecf5a8ecc071ffcf891
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD59750c11d9881cd24d31c387e8125eb77
SHA19e487608ff7fbf2e15cd1d53568907b90d16f7cb
SHA256d5339622084da42f5d14e810f65d6c93b48f3a73a9bf9072c012293797fabbba
SHA512f9839ed834f808c33fd51f9d2f195e766b471d007cd5190cef57eaea33b9bb7d2b13b288f3ea140c0849eba1e054acb2ad61dfb283f767e03041ec641ed56636
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD599840a1e5964a88878118173c95675a3
SHA1307b567ad554da1ee8b948458f39476949efbea2
SHA256c4f277f8d84332aeab6d3a0f767dff556c7a1cfd92faecd8bbf741640a202848
SHA51245ad742b44ad09fcd280995217c89b9eaf71d6e944a100ae4596dbabc0a2980b3b9abbc325da4c743fbdad74b4e7411930434fffcae2c9cbb9d5c4f4578b5abe
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD533dc456f67b8d310f0a44037024b71eb
SHA1023d05350ed70b63c6c28c946c27b6fed842c5c5
SHA256bbf21f780f6b529b4bf83ce7cbb60445efbd6f0416ac79a2f42f5b24c654c0e5
SHA51284f32a90d260342d44650d909c21cd7d24717e8fbaf390e8345c282c8c172ec420421e2cb3710e4a7a0f9325ddad9294313d3149d310617addacb5b0d7f4bbfc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5532e60fcc327f2b7e9ac76553d61d40f
SHA1eb98a3a32e387ebc3755b028d0dbdaaf8ae54902
SHA256ddb99e7dab9a2c9b67d773138a8d0e218b2c1d63af5ca648d8f4a86bbcd2ace7
SHA51251b26668d02ca54fce64c5db3a0a8d408624221e88e79d0ea09a664ddedd5649d246444f7670cdf091f76688c6752e084719024b9a889f5080923ea313317bda
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5741d9281c431914dd8d53c3e9ed1d6ee
SHA10033b87e6ae4c7866b4180f7d824c9d0e5101936
SHA25688807c816da51c8684e3bc1f7b1b306a634d15d47500b9e0fd0532bcdc54f9b2
SHA51222a1ea92f72f9626a027fd1b4503fc84178982cfc903b1138c45c90a0b4fe69f99d32f9258ac9ce38111d4f9a156152eb5f02f9f3424ce21d84aba2df0f1f137
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\07b15be2-2a1a-4664-8bd9-8374730d17ef
Filesize671B
MD5f19a136e2eb43664a7a7603adda4e2a6
SHA12f3e6d00b6da69d7cbc9d14ffec4e53fc2f7ba1f
SHA256af1d3959d606e56c8cf6dacfb703d6b332448aab4424ec02432ec42ae7a79284
SHA5125fbb33689bbd999c5ba8ea989c66a04f6136e8d970f2d121e8e06f38f5389a7bdc2e43df90ad772bfe096ad7a80148a42f342ee1f3fd4bfe165af0aacf16b6ce
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\416cf0da-d509-4e2e-801a-d830b2ab0623
Filesize26KB
MD55d91968e2f14be48c2e65a9d2c88158e
SHA1fc6bfdfe4317e652743dde7dfd02c5917cfc365e
SHA256f516a3ad882bfc768e3308622ef311a60afe081633bf9a55987c57d43e04c20b
SHA5128571fc3642c18bf14f14c2650e21bca29da6e7c2caa578bfebdea4e2730a3a72f33e53deba3fe13b2607645de3edb5f411314c63fbb324cab90030e608d43c07
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\613f7884-2c19-4dd7-846b-44ca644489f7
Filesize982B
MD5112e29520aed9d52e9fb1ab51fd09cfc
SHA1f5686eaccc93e9d169bd58aec24bf83c1f8a0107
SHA256cf4f0600cb2966a01437ceab882573aad46aa5f510722f121bdc33ed44ff5f00
SHA5128ff2d89550e479fe6da6152b0358341fe32c12ce46d6a7f5f89bb1cee458251356f3503fb1fbb3ef2ff2c2e5b49ca605c9700fb2b4c3df4a927c3c507b934824
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD5c6845fd6d4e64bfe54082dad911b6c9d
SHA182956ab0af02a38e2bf5f11f2bcd0927094ab9e1
SHA256602fccdc4d0489d7bd73eeaf865820e6af13101e26ca3c59908564a367ebf80e
SHA51272dfbfa851a3a32b5a42bef8353daab40792edc4281b5387dede6f6de6e72ded06598e43bb49933a54f8ac90904f412b8bb3cd5d89649a6d4b3d55f499fc6f00
-
Filesize
10KB
MD517e6d241edc6ec6d57280765759053a5
SHA14b842fd963431b3890bb6f3437b9b08ffbfb12d2
SHA256c6d71e131eb84adbe8674fc896d1690541ba7c3b40d12a11bd6f9ba8c5a321e3
SHA512c4f318d4695740e468103e9330d2d7a8502f7332661410dbca1fb25c41b3aa59a9714182aaae5beb2982c5cf6aa7219ec1e0bb62a41211480ea2786c4da524c1
-
Filesize
15KB
MD5e40252263d409a29cc7565db10f6027e
SHA17550ca28c9a25fca67e9c0bc048caaddbf8b90a2
SHA2568b0ffc772332d9bac2598347caf4f0e3cca37088820c336fa3850d9e015b676d
SHA512128b50cdf7d4b585ee4b8ba648dced0b5f92a9b870811693e9b853c9972466958bee9484f9a9f0fc630b875afae4d832f17aae241278eccc7006a384005862cb
-
Filesize
10KB
MD5b9bdcb2904868fe5bba536decd043fd6
SHA1f494575a1504eab5811def3ba1946b3de27159fd
SHA2565124f60916eb71b61dd5feea4e3fb3d649637e7a18ed63688245ba9ed0d5dc9c
SHA5121c89f5d51da58d718dab6113dc3ee49c155321cfd778e84e34015c6b820bbc8edb594d5f4148f9a12911e329dcc3a5f4f723c18e86408b4c14c2673c95a302dd
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e