Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2024 12:20
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240903-en
General
-
Target
file.exe
-
Size
1.8MB
-
MD5
04a06a52131dd6aa517aea8efd7eaaa6
-
SHA1
d200a4bc798f2f5ec733954956f62a5eabe39d8c
-
SHA256
ad1aaee3885a39d93cbafa2bacd8aff7bde905d1c93f555db284ff01f860f346
-
SHA512
2223c5bd5eca386248b05a7f37a98a378e0c229d7856f7953c1fbb1ef3656e1c1c3896d434ff59a4c57e8d15b7d82e68de100b238a448f21ff1196c1e59fd21b
-
SSDEEP
49152:+1jiycyrpUX4bYPFPOLIvI/k2gdhfDtN8JBFN:I+2rpUXVdFvI/k2gdhLYJvN
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Cryptbot family
-
Detects CryptBot payload 1 IoCs
CryptBot is a C++ stealer distributed widely in bundle with other software.
Processes:
resource yara_rule behavioral2/memory/5112-62-0x0000000069CC0000-0x000000006A71B000-memory.dmp family_cryptbot_v3 -
Processes:
90f0d7aa77.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 90f0d7aa77.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 90f0d7aa77.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 90f0d7aa77.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 90f0d7aa77.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 90f0d7aa77.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 90f0d7aa77.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
Processes:
skotes.exeskotes.exefile.exeskotes.exe6bda03457b.exe1eb028b962.exe16c1a7d66b.exe90f0d7aa77.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6bda03457b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1eb028b962.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 16c1a7d66b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 90f0d7aa77.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
Processes:
chrome.exechrome.exechrome.exechrome.exepid Process 5324 chrome.exe 1412 chrome.exe 3868 chrome.exe 5440 chrome.exe -
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
skotes.exe1eb028b962.exe90f0d7aa77.exeskotes.exefile.exeskotes.exe6bda03457b.exe16c1a7d66b.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1eb028b962.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1eb028b962.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 90f0d7aa77.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 90f0d7aa77.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6bda03457b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6bda03457b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 16c1a7d66b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 16c1a7d66b.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
file.exeskotes.exe6bda03457b.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation file.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 6bda03457b.exe -
Executes dropped EXE 10 IoCs
Processes:
skotes.exe6bda03457b.exe1eb028b962.exe16c1a7d66b.exe101aaee66f.exe90f0d7aa77.exeskotes.exeservice123.exeskotes.exeservice123.exepid Process 4312 skotes.exe 5112 6bda03457b.exe 4436 1eb028b962.exe 2916 16c1a7d66b.exe 5064 101aaee66f.exe 6028 90f0d7aa77.exe 5348 skotes.exe 544 service123.exe 4636 skotes.exe 5368 service123.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
skotes.exeskotes.exefile.exeskotes.exe6bda03457b.exe1eb028b962.exe16c1a7d66b.exe90f0d7aa77.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine file.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 6bda03457b.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 1eb028b962.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 16c1a7d66b.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 90f0d7aa77.exe -
Loads dropped DLL 2 IoCs
Processes:
service123.exeservice123.exepid Process 544 service123.exe 5368 service123.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
90f0d7aa77.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 90f0d7aa77.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 90f0d7aa77.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
skotes.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\1eb028b962.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008428001\\1eb028b962.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\16c1a7d66b.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008429001\\16c1a7d66b.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\101aaee66f.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008430001\\101aaee66f.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\90f0d7aa77.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008431001\\90f0d7aa77.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/files/0x000a000000023b98-97.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
Processes:
file.exeskotes.exe6bda03457b.exe1eb028b962.exe16c1a7d66b.exe90f0d7aa77.exeskotes.exeskotes.exepid Process 5064 file.exe 4312 skotes.exe 5112 6bda03457b.exe 4436 1eb028b962.exe 2916 16c1a7d66b.exe 6028 90f0d7aa77.exe 5348 skotes.exe 4636 skotes.exe -
Drops file in Windows directory 1 IoCs
Processes:
file.exedescription ioc Process File created C:\Windows\Tasks\skotes.job file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 1884 5112 WerFault.exe 95 -
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
skotes.exe16c1a7d66b.exe101aaee66f.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exeservice123.exefile.exetaskkill.exe90f0d7aa77.exe6bda03457b.exe1eb028b962.exeschtasks.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 16c1a7d66b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 101aaee66f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 90f0d7aa77.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6bda03457b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1eb028b962.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
6bda03457b.exefirefox.exefirefox.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 6bda03457b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 6bda03457b.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Kills process with taskkill 5 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid Process 4000 taskkill.exe 1560 taskkill.exe 2964 taskkill.exe 4132 taskkill.exe 4164 taskkill.exe -
Modifies registry class 1 IoCs
Processes:
firefox.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 25 IoCs
Processes:
file.exeskotes.exe6bda03457b.exe1eb028b962.exe16c1a7d66b.exe101aaee66f.exechrome.exe90f0d7aa77.exeskotes.exeskotes.exepid Process 5064 file.exe 5064 file.exe 4312 skotes.exe 4312 skotes.exe 5112 6bda03457b.exe 5112 6bda03457b.exe 4436 1eb028b962.exe 4436 1eb028b962.exe 2916 16c1a7d66b.exe 2916 16c1a7d66b.exe 5064 101aaee66f.exe 5064 101aaee66f.exe 5324 chrome.exe 5324 chrome.exe 5064 101aaee66f.exe 5064 101aaee66f.exe 6028 90f0d7aa77.exe 6028 90f0d7aa77.exe 6028 90f0d7aa77.exe 6028 90f0d7aa77.exe 6028 90f0d7aa77.exe 5348 skotes.exe 5348 skotes.exe 4636 skotes.exe 4636 skotes.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid Process 5324 chrome.exe 5324 chrome.exe 5324 chrome.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exefirefox.exechrome.exe90f0d7aa77.exedescription pid Process Token: SeDebugPrivilege 4164 taskkill.exe Token: SeDebugPrivilege 4000 taskkill.exe Token: SeDebugPrivilege 1560 taskkill.exe Token: SeDebugPrivilege 2964 taskkill.exe Token: SeDebugPrivilege 4132 taskkill.exe Token: SeDebugPrivilege 3820 firefox.exe Token: SeDebugPrivilege 3820 firefox.exe Token: SeShutdownPrivilege 5324 chrome.exe Token: SeCreatePagefilePrivilege 5324 chrome.exe Token: SeDebugPrivilege 6028 90f0d7aa77.exe -
Suspicious use of FindShellTrayWindow 58 IoCs
Processes:
file.exe101aaee66f.exefirefox.exechrome.exepid Process 5064 file.exe 5064 101aaee66f.exe 5064 101aaee66f.exe 5064 101aaee66f.exe 5064 101aaee66f.exe 5064 101aaee66f.exe 5064 101aaee66f.exe 5064 101aaee66f.exe 3820 firefox.exe 3820 firefox.exe 3820 firefox.exe 3820 firefox.exe 3820 firefox.exe 3820 firefox.exe 3820 firefox.exe 3820 firefox.exe 3820 firefox.exe 3820 firefox.exe 3820 firefox.exe 3820 firefox.exe 3820 firefox.exe 3820 firefox.exe 3820 firefox.exe 3820 firefox.exe 3820 firefox.exe 3820 firefox.exe 3820 firefox.exe 3820 firefox.exe 3820 firefox.exe 5064 101aaee66f.exe 5064 101aaee66f.exe 5324 chrome.exe 5324 chrome.exe 5324 chrome.exe 5324 chrome.exe 5324 chrome.exe 5324 chrome.exe 5324 chrome.exe 5324 chrome.exe 5324 chrome.exe 5324 chrome.exe 5324 chrome.exe 5324 chrome.exe 5324 chrome.exe 5324 chrome.exe 5324 chrome.exe 5324 chrome.exe 5324 chrome.exe 5324 chrome.exe 5324 chrome.exe 5324 chrome.exe 5324 chrome.exe 5324 chrome.exe 5324 chrome.exe 5324 chrome.exe 5324 chrome.exe 5324 chrome.exe 5064 101aaee66f.exe -
Suspicious use of SendNotifyMessage 30 IoCs
Processes:
101aaee66f.exefirefox.exepid Process 5064 101aaee66f.exe 5064 101aaee66f.exe 5064 101aaee66f.exe 5064 101aaee66f.exe 5064 101aaee66f.exe 5064 101aaee66f.exe 5064 101aaee66f.exe 3820 firefox.exe 3820 firefox.exe 3820 firefox.exe 3820 firefox.exe 3820 firefox.exe 3820 firefox.exe 3820 firefox.exe 3820 firefox.exe 3820 firefox.exe 3820 firefox.exe 3820 firefox.exe 3820 firefox.exe 3820 firefox.exe 3820 firefox.exe 3820 firefox.exe 3820 firefox.exe 3820 firefox.exe 3820 firefox.exe 3820 firefox.exe 3820 firefox.exe 5064 101aaee66f.exe 5064 101aaee66f.exe 5064 101aaee66f.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
firefox.exepid Process 3820 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
file.exeskotes.exe101aaee66f.exefirefox.exefirefox.exedescription pid Process procid_target PID 5064 wrote to memory of 4312 5064 file.exe 83 PID 5064 wrote to memory of 4312 5064 file.exe 83 PID 5064 wrote to memory of 4312 5064 file.exe 83 PID 4312 wrote to memory of 5112 4312 skotes.exe 95 PID 4312 wrote to memory of 5112 4312 skotes.exe 95 PID 4312 wrote to memory of 5112 4312 skotes.exe 95 PID 4312 wrote to memory of 4436 4312 skotes.exe 96 PID 4312 wrote to memory of 4436 4312 skotes.exe 96 PID 4312 wrote to memory of 4436 4312 skotes.exe 96 PID 4312 wrote to memory of 2916 4312 skotes.exe 98 PID 4312 wrote to memory of 2916 4312 skotes.exe 98 PID 4312 wrote to memory of 2916 4312 skotes.exe 98 PID 4312 wrote to memory of 5064 4312 skotes.exe 99 PID 4312 wrote to memory of 5064 4312 skotes.exe 99 PID 4312 wrote to memory of 5064 4312 skotes.exe 99 PID 5064 wrote to memory of 4164 5064 101aaee66f.exe 100 PID 5064 wrote to memory of 4164 5064 101aaee66f.exe 100 PID 5064 wrote to memory of 4164 5064 101aaee66f.exe 100 PID 5064 wrote to memory of 4000 5064 101aaee66f.exe 104 PID 5064 wrote to memory of 4000 5064 101aaee66f.exe 104 PID 5064 wrote to memory of 4000 5064 101aaee66f.exe 104 PID 5064 wrote to memory of 1560 5064 101aaee66f.exe 106 PID 5064 wrote to memory of 1560 5064 101aaee66f.exe 106 PID 5064 wrote to memory of 1560 5064 101aaee66f.exe 106 PID 5064 wrote to memory of 2964 5064 101aaee66f.exe 109 PID 5064 wrote to memory of 2964 5064 101aaee66f.exe 109 PID 5064 wrote to memory of 2964 5064 101aaee66f.exe 109 PID 5064 wrote to memory of 4132 5064 101aaee66f.exe 111 PID 5064 wrote to memory of 4132 5064 101aaee66f.exe 111 PID 5064 wrote to memory of 4132 5064 101aaee66f.exe 111 PID 5064 wrote to memory of 4784 5064 101aaee66f.exe 113 PID 5064 wrote to memory of 4784 5064 101aaee66f.exe 113 PID 4784 wrote to memory of 3820 4784 firefox.exe 114 PID 4784 wrote to memory of 3820 4784 firefox.exe 114 PID 4784 wrote to memory of 3820 4784 firefox.exe 114 PID 4784 wrote to memory of 3820 4784 firefox.exe 114 PID 4784 wrote to memory of 3820 4784 firefox.exe 114 PID 4784 wrote to memory of 3820 4784 firefox.exe 114 PID 4784 wrote to memory of 3820 4784 firefox.exe 114 PID 4784 wrote to memory of 3820 4784 firefox.exe 114 PID 4784 wrote to memory of 3820 4784 firefox.exe 114 PID 4784 wrote to memory of 3820 4784 firefox.exe 114 PID 4784 wrote to memory of 3820 4784 firefox.exe 114 PID 3820 wrote to memory of 3240 3820 firefox.exe 115 PID 3820 wrote to memory of 3240 3820 firefox.exe 115 PID 3820 wrote to memory of 3240 3820 firefox.exe 115 PID 3820 wrote to memory of 3240 3820 firefox.exe 115 PID 3820 wrote to memory of 3240 3820 firefox.exe 115 PID 3820 wrote to memory of 3240 3820 firefox.exe 115 PID 3820 wrote to memory of 3240 3820 firefox.exe 115 PID 3820 wrote to memory of 3240 3820 firefox.exe 115 PID 3820 wrote to memory of 3240 3820 firefox.exe 115 PID 3820 wrote to memory of 3240 3820 firefox.exe 115 PID 3820 wrote to memory of 3240 3820 firefox.exe 115 PID 3820 wrote to memory of 3240 3820 firefox.exe 115 PID 3820 wrote to memory of 3240 3820 firefox.exe 115 PID 3820 wrote to memory of 3240 3820 firefox.exe 115 PID 3820 wrote to memory of 3240 3820 firefox.exe 115 PID 3820 wrote to memory of 3240 3820 firefox.exe 115 PID 3820 wrote to memory of 3240 3820 firefox.exe 115 PID 3820 wrote to memory of 3240 3820 firefox.exe 115 PID 3820 wrote to memory of 3240 3820 firefox.exe 115 PID 3820 wrote to memory of 3240 3820 firefox.exe 115 PID 3820 wrote to memory of 3240 3820 firefox.exe 115 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Users\Admin\AppData\Local\Temp\1008423001\6bda03457b.exe"C:\Users\Admin\AppData\Local\Temp\1008423001\6bda03457b.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:5112 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5324 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffdff4ccc40,0x7ffdff4ccc4c,0x7ffdff4ccc585⤵PID:5384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2288,i,15156047747954651164,4666706463294412700,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2284 /prefetch:25⤵PID:4412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1820,i,15156047747954651164,4666706463294412700,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2320 /prefetch:35⤵PID:4396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=1980,i,15156047747954651164,4666706463294412700,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2424 /prefetch:85⤵PID:3744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3156,i,15156047747954651164,4666706463294412700,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3168 /prefetch:15⤵
- Uses browser remote debugging
PID:3868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3172,i,15156047747954651164,4666706463294412700,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3220 /prefetch:15⤵
- Uses browser remote debugging
PID:1412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4428,i,15156047747954651164,4666706463294412700,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4528 /prefetch:15⤵
- Uses browser remote debugging
PID:5440
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:544
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4664
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5112 -s 18004⤵
- Program crash
PID:1884
-
-
-
C:\Users\Admin\AppData\Local\Temp\1008428001\1eb028b962.exe"C:\Users\Admin\AppData\Local\Temp\1008428001\1eb028b962.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4436
-
-
C:\Users\Admin\AppData\Local\Temp\1008429001\16c1a7d66b.exe"C:\Users\Admin\AppData\Local\Temp\1008429001\16c1a7d66b.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2916
-
-
C:\Users\Admin\AppData\Local\Temp\1008430001\101aaee66f.exe"C:\Users\Admin\AppData\Local\Temp\1008430001\101aaee66f.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4164
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4000
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1560
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2964
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4132
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3820 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2000 -parentBuildID 20240401114208 -prefsHandle 1928 -prefMapHandle 1920 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7b164e77-7513-44ee-918c-f4df44042d67} 3820 "\\.\pipe\gecko-crash-server-pipe.3820" gpu6⤵PID:3240
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2436 -parentBuildID 20240401114208 -prefsHandle 2412 -prefMapHandle 2400 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {07e4ae4e-d75d-4a04-94a9-c98ef8c200ea} 3820 "\\.\pipe\gecko-crash-server-pipe.3820" socket6⤵PID:1444
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3012 -childID 1 -isForBrowser -prefsHandle 3088 -prefMapHandle 3184 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1020 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e59ce44d-271d-48be-9a5b-21ad512a89de} 3820 "\\.\pipe\gecko-crash-server-pipe.3820" tab6⤵PID:3176
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3680 -childID 2 -isForBrowser -prefsHandle 3672 -prefMapHandle 3668 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1020 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1519447f-041c-4312-bcdd-959bd171b69c} 3820 "\\.\pipe\gecko-crash-server-pipe.3820" tab6⤵PID:3504
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4260 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4256 -prefMapHandle 4252 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {64221a07-5d23-4a0d-a218-08e226dbcc4f} 3820 "\\.\pipe\gecko-crash-server-pipe.3820" utility6⤵
- Checks processor information in registry
PID:5204
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5464 -childID 3 -isForBrowser -prefsHandle 4228 -prefMapHandle 5376 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1020 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {75ce3f94-17be-4762-9692-93252f3c9072} 3820 "\\.\pipe\gecko-crash-server-pipe.3820" tab6⤵PID:4892
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5648 -childID 4 -isForBrowser -prefsHandle 5656 -prefMapHandle 5660 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1020 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8e0e5609-c12b-4cfd-8fa7-26ac84338ce2} 3820 "\\.\pipe\gecko-crash-server-pipe.3820" tab6⤵PID:3608
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5848 -childID 5 -isForBrowser -prefsHandle 5852 -prefMapHandle 5860 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1020 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {52e53cce-b2e7-4cf4-b001-fe0ca0b4b352} 3820 "\\.\pipe\gecko-crash-server-pipe.3820" tab6⤵PID:5128
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1008431001\90f0d7aa77.exe"C:\Users\Admin\AppData\Local\Temp\1008431001\90f0d7aa77.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6028
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:5264
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5348
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5112 -ip 51121⤵PID:4740
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4636
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5368
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\activity-stream.discovery_stream.json
Filesize24KB
MD5a68d24bbd6b658a9651695f1f8f26f89
SHA11f4a5f8aee92e86a23f73dcd80dfe95a58a0d7a4
SHA256a68a584ba8c5b141bb6280c55cab983b6b59f78006d5b8c91eadfaf20754f69d
SHA512a166c06580a4e54e5c9085bbaa45688db3c5a5d67a693ee0d9b46f3a7708c5d674bb76016fbb7a58d5d6db58e56e64d4ab761ca8795fcf975bdd3b498b32b576
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD525b5c883dea78e5078595ca7a2d7ef0c
SHA14e38f5fe4b3abbb3ba07a116e042aa8e7f2f9cc4
SHA2568318d961bb64f7a0cdf75a7ddd123270825d0f186d085dbee4190d89c51e5aed
SHA51252715a0c7c2fc4fb38de878dc1eec65b63a8dd913cbcc372778279f4b258c0c94e98358b2a6c629703eb1bb8e4ae281cc735035117c22c712b243b85fb0bf906
-
Filesize
4.2MB
MD5be3a1a14663876ad1fafa3f52fd20337
SHA1824ae3000f78447db0835184a3c537b67ba1e35b
SHA256cb9f29a62f2f969a423fc32a9179c8e6810984f62acc624096d6cf844ad6f6a0
SHA512e372c7cded6669a4e30eaefa4da0153fcd72175aaaec06d7e6759f4e528baa8497986754578bf6c7c2fe348496b387a6492521619b362c537271b8108ba65f4b
-
Filesize
1.8MB
MD544eb876d74e66bc5879d4ac1b636eaf1
SHA1614cc57507b70108e366e88e296db7c9c10f029e
SHA256e8030c08981ae2cccfda22cbfd18ede9d1e1e51495ece00ccae6f8ebcad1c6f0
SHA512ecc0a9a433a72be0b9195fea4dbf46e7f38cb8e6b3854838ffe52dd48162211086c5a4e0c09e8ae023701a7401ab205646d71485cf22558dc3289a38aeb82b92
-
Filesize
1.7MB
MD5ae317d18bc4ca2596e61445e70cbc6db
SHA162beb43b116740abd9c2af0fffebd823748f62a4
SHA256f4ed4f57a7e4e56751abe21cbd71ae96f72af06f340a7f1a443e5ec09c6e81ec
SHA51269bd0757e46516f0c167de05fe9102e2bfc3858389d5d3f43b99d64ccb897fa2245d07a8210d6544ef4da39f985b446b5245503ffd8e01a182e69e4d771a42a0
-
Filesize
901KB
MD5102b6fb97b941e26c4b49de445aedbd7
SHA1f369b8d6bad0e3c24497c0ec39113b1273752160
SHA2562d01b73b6c1b6d2f98cd50a195d1593bf9733f8a15781b07a44609bf049b5646
SHA5125f8eb295ea17a3f718052230ae66171ef6173f1b7ccf3517a705e2cbac2a8ba61f7345d3c7ff5bc056d888ca6302e372676e1ab8126f9de2425eb4a4f049a059
-
Filesize
2.7MB
MD524160b98357772cff1f5e82f48bf18be
SHA1bed6c7fe7febb19e927aa112aaa601dfb9028dbd
SHA256686d30641fd19f689148b76f768d260b90b8ae97eaf53f4707014b6ee077418c
SHA512643b03522016635674e948d2bfe182260f26b9b1efd86a5747782ea0b00e2896d855421b689c2c2a517e4bfc7326b690436f6f1d4c9da4b823aadbecdcfc14cb
-
Filesize
1.8MB
MD504a06a52131dd6aa517aea8efd7eaaa6
SHA1d200a4bc798f2f5ec733954956f62a5eabe39d8c
SHA256ad1aaee3885a39d93cbafa2bacd8aff7bde905d1c93f555db284ff01f860f346
SHA5122223c5bd5eca386248b05a7f37a98a378e0c229d7856f7953c1fbb1ef3656e1c1c3896d434ff59a4c57e8d15b7d82e68de100b238a448f21ff1196c1e59fd21b
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\AlternateServices.bin
Filesize6KB
MD5dfd89b388b817c3448971e2bd0bba45f
SHA1198e497d11f57d2f79ea141256d11cc7016bfa53
SHA256886dfa0c84554eabaa810e02a6d2542ff9493056ff18d32b8d025b884fc37e1c
SHA512943bcab7e4bf12b2bf3db79e0af7444bf652530925e7fc0320092ef5a90cb83cab9b0ab7b2b58b5f76dad880783476e04bb18d7d422c3ffa851d5edab406ea61
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\AlternateServices.bin
Filesize8KB
MD58fedc2062bd6c121c45c357001f912fd
SHA12d4a1fd146eeabece9a78a10814ac996a1a7ce6d
SHA2567e1a3746f9ce19b8e9814c82eab5c02c0a1823a8d75da0a1dc8f4d97b6ada26a
SHA512bda9d69864080f76c9a9f1e7b9f3e2358c199776babc71ab46147dd11a70fc145abd3d4a560acf551dfc4110d927826616fc0b293e68274d4157ad1879bbe7ec
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5abd9671afddeea929437c3d690919f8f
SHA13f88bcc70027a8079bba42958a6238b24f45e6f8
SHA2562816f68418aa825680cfa395ecbb153ea8cf11e6ab9b33c6e6d401195af3888e
SHA512f80dfc530cb38fc10d923529490918cc988842291df10cd1afca37a09bc8d26450d0892f87c0829bc074722bdf357566e3b53ea5f861b4c8c05914def884af5d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD528454f6745fd712a2fd95b909c035fe9
SHA113b0b7619c3e55e30357abdb82270db2883e2c9a
SHA256c8b38a4d9c589d5025a600a1a958a379a8be4d3654a19922ff73fd46ff7792e4
SHA5129a1514b882155c0c3a27153e029c45c3750fa513356155e4c40eba585d564671bf6b5fcf3c538854ae60d31bb4c033920c46c171ace3d17bfc02241d4573df18
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5fe258e3f54ac99460e7235277b663c09
SHA1f114ad019a59bf2ad6e9141601aa34129e21d0db
SHA256dc5b92b7695663e08b166235fa21198f8761274a426f0173ca3367bcaf164f19
SHA5124e1c346e03309d736eca503ce984304186e841bde7727c67970092a1822540db124d9c0eaf1648c6010d61229ff42cac5a4ccd6074e073182ca7f89996c3e280
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\06c1b632-d17c-42b5-8329-b318afb3ad08
Filesize25KB
MD58a2c669b5feff45e6c2f1c1e19bf7d02
SHA1e1bdc4424fdc32fc706da289733df5525fe311cf
SHA25647415340f28fdb00cac9e359e4b822fa0ac8b3b172fda581823ee28a2adaefa0
SHA512e249d6fcddaa43e4bd5b98471fd7e19f340faa8d8555ef29be2cf59fafbb7302bff8c736844c4cc03102155e582c94125d934d2f13ef9d6880263901088603f9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\3b0e4219-8d7e-4c65-aaf2-74de18e27966
Filesize671B
MD56542e2c191bd91cd34af3f3aff785ca3
SHA19e8da250a85e4cf9a82eaa3b26d99947225a7432
SHA2563d7df77e16824e9df73de4df87e4e5482eccab2bed6a90a8bbc48337ba05ad97
SHA512280df4854e7f67954872b610b515f9ba44c329ef218138533123e843c3898975f64f9cce677a25c55bbff7424fe04eeb6cda7de0afb56d356be04c29f47a9a8f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\d717da2f-4ff4-4d7b-8771-8c6b8001f183
Filesize982B
MD55c2cb99335cd4c6251b8c54884687174
SHA189038ab99babb3b802683d733e77541dcc5fe515
SHA256973682a445ae179f084a72485fbc20f8b3db01e476cad8d50a4b4f40755e62a8
SHA51221ffaca25c0a3c8c19c1822ce88b817a492c43844d6da81250613d2601f51ef573683a11c6a82f4f59d7231520a23586350807144d2896fd49ce77e596fcc921
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD5c8449b5417e05fe429dde2aecdc90304
SHA12161d0515ee3f7f6bb062202245dbb4b07d50581
SHA256d560c5ebb81afef221a48d9eb16e9ef7c2e9073490014506f81d457844494795
SHA5126c2d68305ec406c8df83f0a976df5b6a0108fc8c267c6584c6ba14cdf66f639ac41988ee627a2fd9c42d4d809c50da63db83c304c06fc5b8f54f42a0750de416
-
Filesize
10KB
MD5df85b5fea248850a5e087bfb2cb115bd
SHA112c452db5dc42ea3853d23f126ddf57434d0e321
SHA2566e3101f2828a4360f7ee2fe1a3389efd1606cb11c74b11e898be99f7e52b2dd5
SHA512c1957a4a7ac3d98a680a05999985daa89441b36b9f31afa694a6b059f99340a3ee59cbcf564fa2c21962f5f6c0f642c955a3b2f33bafc1b3c35f99ca76298ffc
-
Filesize
15KB
MD55f0022c7b4b770417f516962a7dd77eb
SHA1da131c6a6b268c43fb47c7de37beb2c5bc4201a3
SHA256967e5406175a0e36392a4a546e7b6404d66902d06b38190ea181261bbd72aac8
SHA512519306d27acd850be36c581c1220581177c3250aa974fcd22ceefb7d1728522a345133412d2caf115a6d7364782ef02e469b299598bcea92cec9a81bfc4e51b8
-
Filesize
10KB
MD58d510d6ef5fca2e6a53c2aaedfad0072
SHA1bf7a5cd6b41d169691690f2c6ff7839b540f81cd
SHA2562347ece2f690039256cd943f58fd29593b5ede6d394328ed3877ce4acc3532c2
SHA512d0a62f8434087573bbb7826a87084976e9f0d093154aa2994a444466bed11f90de718b2e87863fabe263041717370d36cfe3198d68777afb302294aa2700be45
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize3.0MB
MD566824984b0ec423105711cd241bddae3
SHA1cde410176e5e6e2584da479fcf0e5ef5fc624e2d
SHA25649d795aeca0b5ed8c23e6fa4359da1eea7cd6e2d8fbb5d77be5dad2191ee6f6b
SHA51245205f23e41b8499410e4175702dde6558e1887b37e837ab7db951fdc8cca6ff21a1c967c07a9502bef540b8420589a7e8369603136dd89b6058e0ad715217ed
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e