Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2024 03:01
Static task
static1
Behavioral task
behavioral1
Sample
d4e13faefc09eb85be337713e8899e9f6761d45593e33d19b14ac6f986b2a103.exe
Resource
win7-20241023-en
General
-
Target
d4e13faefc09eb85be337713e8899e9f6761d45593e33d19b14ac6f986b2a103.exe
-
Size
1.8MB
-
MD5
5ca58d76edc0e7291bf3d6bad7edbbe9
-
SHA1
694124bf2e8d817b7f188706bbc49d0088317fe2
-
SHA256
d4e13faefc09eb85be337713e8899e9f6761d45593e33d19b14ac6f986b2a103
-
SHA512
82b990ce963247c140161ce9ab28c79c5b4d648ddf46d622e152e3c0d79842be1cf1009a493b7af37b83976f36c05b56e353c6f7166dfc701979f87447f51fad
-
SSDEEP
49152:JzqRbJAOwImTwJuvYsiI5kDbZF6j9FWHK:wRVA8xobiI566j9Aq
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Cryptbot family
-
Detects CryptBot payload 1 IoCs
CryptBot is a C++ stealer distributed widely in bundle with other software.
Processes:
resource yara_rule behavioral2/memory/440-3036-0x0000000069CC0000-0x000000006A71B000-memory.dmp family_cryptbot_v3 -
Processes:
e4b7b58740.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" e4b7b58740.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" e4b7b58740.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" e4b7b58740.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" e4b7b58740.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection e4b7b58740.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" e4b7b58740.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
Processes:
skotes.exefa187b4e45.exe24547b606e.exe5b297c6b73.exee4b7b58740.exeskotes.exeskotes.exed4e13faefc09eb85be337713e8899e9f6761d45593e33d19b14ac6f986b2a103.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ fa187b4e45.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 24547b606e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5b297c6b73.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e4b7b58740.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d4e13faefc09eb85be337713e8899e9f6761d45593e33d19b14ac6f986b2a103.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
Processes:
chrome.exechrome.exechrome.exechrome.exepid Process 4004 chrome.exe 952 chrome.exe 2964 chrome.exe 4984 chrome.exe -
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
skotes.exefa187b4e45.exe5b297c6b73.exee4b7b58740.exed4e13faefc09eb85be337713e8899e9f6761d45593e33d19b14ac6f986b2a103.exeskotes.exeskotes.exe24547b606e.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion fa187b4e45.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5b297c6b73.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e4b7b58740.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d4e13faefc09eb85be337713e8899e9f6761d45593e33d19b14ac6f986b2a103.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d4e13faefc09eb85be337713e8899e9f6761d45593e33d19b14ac6f986b2a103.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 24547b606e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5b297c6b73.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion fa187b4e45.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 24547b606e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e4b7b58740.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
d4e13faefc09eb85be337713e8899e9f6761d45593e33d19b14ac6f986b2a103.exeskotes.exefa187b4e45.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation d4e13faefc09eb85be337713e8899e9f6761d45593e33d19b14ac6f986b2a103.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation fa187b4e45.exe -
Executes dropped EXE 11 IoCs
Processes:
skotes.exe7mpPLxE.exe7mpPLxE.exefa187b4e45.exe24547b606e.exe5b297c6b73.exee71318d454.exee4b7b58740.exeskotes.exeskotes.exeservice123.exepid Process 4268 skotes.exe 3008 7mpPLxE.exe 4012 7mpPLxE.exe 440 fa187b4e45.exe 3936 24547b606e.exe 3940 5b297c6b73.exe 1504 e71318d454.exe 3476 e4b7b58740.exe 3900 skotes.exe 2532 skotes.exe 5792 service123.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
5b297c6b73.exee4b7b58740.exeskotes.exeskotes.exed4e13faefc09eb85be337713e8899e9f6761d45593e33d19b14ac6f986b2a103.exeskotes.exefa187b4e45.exe24547b606e.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 5b297c6b73.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine e4b7b58740.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine d4e13faefc09eb85be337713e8899e9f6761d45593e33d19b14ac6f986b2a103.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine fa187b4e45.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 24547b606e.exe -
Loads dropped DLL 1 IoCs
Processes:
service123.exepid Process 5792 service123.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
e4b7b58740.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features e4b7b58740.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" e4b7b58740.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
skotes.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\24547b606e.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008917001\\24547b606e.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5b297c6b73.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008918001\\5b297c6b73.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e71318d454.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008919001\\e71318d454.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e4b7b58740.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008920001\\e4b7b58740.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/files/0x0007000000023cfe-103.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
Processes:
d4e13faefc09eb85be337713e8899e9f6761d45593e33d19b14ac6f986b2a103.exeskotes.exefa187b4e45.exe24547b606e.exe5b297c6b73.exee4b7b58740.exeskotes.exeskotes.exepid Process 4476 d4e13faefc09eb85be337713e8899e9f6761d45593e33d19b14ac6f986b2a103.exe 4268 skotes.exe 440 fa187b4e45.exe 3936 24547b606e.exe 3940 5b297c6b73.exe 3476 e4b7b58740.exe 3900 skotes.exe 2532 skotes.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
7mpPLxE.exedescription pid Process procid_target PID 3008 set thread context of 4012 3008 7mpPLxE.exe 92 -
Drops file in Windows directory 1 IoCs
Processes:
d4e13faefc09eb85be337713e8899e9f6761d45593e33d19b14ac6f986b2a103.exedescription ioc Process File created C:\Windows\Tasks\skotes.job d4e13faefc09eb85be337713e8899e9f6761d45593e33d19b14ac6f986b2a103.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 6056 440 WerFault.exe 93 -
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
taskkill.exee4b7b58740.exed4e13faefc09eb85be337713e8899e9f6761d45593e33d19b14ac6f986b2a103.exetaskkill.exee71318d454.exetaskkill.exetaskkill.exeservice123.exeschtasks.exe7mpPLxE.exefa187b4e45.exe5b297c6b73.exeskotes.exe7mpPLxE.exe24547b606e.exetaskkill.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e4b7b58740.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d4e13faefc09eb85be337713e8899e9f6761d45593e33d19b14ac6f986b2a103.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e71318d454.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7mpPLxE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fa187b4e45.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5b297c6b73.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7mpPLxE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 24547b606e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exefirefox.exefa187b4e45.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 fa187b4e45.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString fa187b4e45.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 5 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid Process 3264 taskkill.exe 4824 taskkill.exe 3052 taskkill.exe 3252 taskkill.exe 3356 taskkill.exe -
Modifies registry class 1 IoCs
Processes:
firefox.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 25 IoCs
Processes:
d4e13faefc09eb85be337713e8899e9f6761d45593e33d19b14ac6f986b2a103.exeskotes.exefa187b4e45.exe24547b606e.exe5b297c6b73.exee71318d454.exee4b7b58740.exeskotes.exeskotes.exechrome.exepid Process 4476 d4e13faefc09eb85be337713e8899e9f6761d45593e33d19b14ac6f986b2a103.exe 4476 d4e13faefc09eb85be337713e8899e9f6761d45593e33d19b14ac6f986b2a103.exe 4268 skotes.exe 4268 skotes.exe 440 fa187b4e45.exe 440 fa187b4e45.exe 3936 24547b606e.exe 3936 24547b606e.exe 3940 5b297c6b73.exe 3940 5b297c6b73.exe 1504 e71318d454.exe 1504 e71318d454.exe 3476 e4b7b58740.exe 3476 e4b7b58740.exe 1504 e71318d454.exe 1504 e71318d454.exe 3476 e4b7b58740.exe 3476 e4b7b58740.exe 3476 e4b7b58740.exe 3900 skotes.exe 3900 skotes.exe 2532 skotes.exe 2532 skotes.exe 2964 chrome.exe 2964 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid Process 2964 chrome.exe 2964 chrome.exe 2964 chrome.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exefirefox.exee4b7b58740.exechrome.exedescription pid Process Token: SeDebugPrivilege 3252 taskkill.exe Token: SeDebugPrivilege 3356 taskkill.exe Token: SeDebugPrivilege 3264 taskkill.exe Token: SeDebugPrivilege 4824 taskkill.exe Token: SeDebugPrivilege 3052 taskkill.exe Token: SeDebugPrivilege 1220 firefox.exe Token: SeDebugPrivilege 1220 firefox.exe Token: SeDebugPrivilege 3476 e4b7b58740.exe Token: SeShutdownPrivilege 2964 chrome.exe Token: SeCreatePagefilePrivilege 2964 chrome.exe Token: SeShutdownPrivilege 2964 chrome.exe Token: SeCreatePagefilePrivilege 2964 chrome.exe -
Suspicious use of FindShellTrayWindow 58 IoCs
Processes:
e71318d454.exefirefox.exechrome.exepid Process 1504 e71318d454.exe 1504 e71318d454.exe 1504 e71318d454.exe 1504 e71318d454.exe 1504 e71318d454.exe 1504 e71318d454.exe 1504 e71318d454.exe 1504 e71318d454.exe 1220 firefox.exe 1220 firefox.exe 1220 firefox.exe 1220 firefox.exe 1220 firefox.exe 1220 firefox.exe 1220 firefox.exe 1220 firefox.exe 1220 firefox.exe 1220 firefox.exe 1220 firefox.exe 1220 firefox.exe 1220 firefox.exe 1220 firefox.exe 1220 firefox.exe 1220 firefox.exe 1220 firefox.exe 1220 firefox.exe 1220 firefox.exe 1220 firefox.exe 1220 firefox.exe 1504 e71318d454.exe 1504 e71318d454.exe 1504 e71318d454.exe 2964 chrome.exe 2964 chrome.exe 2964 chrome.exe 2964 chrome.exe 2964 chrome.exe 2964 chrome.exe 2964 chrome.exe 2964 chrome.exe 2964 chrome.exe 2964 chrome.exe 2964 chrome.exe 2964 chrome.exe 2964 chrome.exe 2964 chrome.exe 2964 chrome.exe 2964 chrome.exe 2964 chrome.exe 2964 chrome.exe 2964 chrome.exe 2964 chrome.exe 2964 chrome.exe 2964 chrome.exe 2964 chrome.exe 2964 chrome.exe 2964 chrome.exe 2964 chrome.exe -
Suspicious use of SendNotifyMessage 31 IoCs
Processes:
e71318d454.exefirefox.exepid Process 1504 e71318d454.exe 1504 e71318d454.exe 1504 e71318d454.exe 1504 e71318d454.exe 1504 e71318d454.exe 1504 e71318d454.exe 1504 e71318d454.exe 1504 e71318d454.exe 1220 firefox.exe 1220 firefox.exe 1220 firefox.exe 1220 firefox.exe 1220 firefox.exe 1220 firefox.exe 1220 firefox.exe 1220 firefox.exe 1220 firefox.exe 1220 firefox.exe 1220 firefox.exe 1220 firefox.exe 1220 firefox.exe 1220 firefox.exe 1220 firefox.exe 1220 firefox.exe 1220 firefox.exe 1220 firefox.exe 1220 firefox.exe 1220 firefox.exe 1504 e71318d454.exe 1504 e71318d454.exe 1504 e71318d454.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
firefox.exepid Process 1220 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
d4e13faefc09eb85be337713e8899e9f6761d45593e33d19b14ac6f986b2a103.exeskotes.exe7mpPLxE.exee71318d454.exefirefox.exefirefox.exedescription pid Process procid_target PID 4476 wrote to memory of 4268 4476 d4e13faefc09eb85be337713e8899e9f6761d45593e33d19b14ac6f986b2a103.exe 82 PID 4476 wrote to memory of 4268 4476 d4e13faefc09eb85be337713e8899e9f6761d45593e33d19b14ac6f986b2a103.exe 82 PID 4476 wrote to memory of 4268 4476 d4e13faefc09eb85be337713e8899e9f6761d45593e33d19b14ac6f986b2a103.exe 82 PID 4268 wrote to memory of 3008 4268 skotes.exe 90 PID 4268 wrote to memory of 3008 4268 skotes.exe 90 PID 4268 wrote to memory of 3008 4268 skotes.exe 90 PID 3008 wrote to memory of 4012 3008 7mpPLxE.exe 92 PID 3008 wrote to memory of 4012 3008 7mpPLxE.exe 92 PID 3008 wrote to memory of 4012 3008 7mpPLxE.exe 92 PID 3008 wrote to memory of 4012 3008 7mpPLxE.exe 92 PID 3008 wrote to memory of 4012 3008 7mpPLxE.exe 92 PID 3008 wrote to memory of 4012 3008 7mpPLxE.exe 92 PID 3008 wrote to memory of 4012 3008 7mpPLxE.exe 92 PID 3008 wrote to memory of 4012 3008 7mpPLxE.exe 92 PID 3008 wrote to memory of 4012 3008 7mpPLxE.exe 92 PID 3008 wrote to memory of 4012 3008 7mpPLxE.exe 92 PID 4268 wrote to memory of 440 4268 skotes.exe 93 PID 4268 wrote to memory of 440 4268 skotes.exe 93 PID 4268 wrote to memory of 440 4268 skotes.exe 93 PID 4268 wrote to memory of 3936 4268 skotes.exe 95 PID 4268 wrote to memory of 3936 4268 skotes.exe 95 PID 4268 wrote to memory of 3936 4268 skotes.exe 95 PID 4268 wrote to memory of 3940 4268 skotes.exe 97 PID 4268 wrote to memory of 3940 4268 skotes.exe 97 PID 4268 wrote to memory of 3940 4268 skotes.exe 97 PID 4268 wrote to memory of 1504 4268 skotes.exe 98 PID 4268 wrote to memory of 1504 4268 skotes.exe 98 PID 4268 wrote to memory of 1504 4268 skotes.exe 98 PID 1504 wrote to memory of 3252 1504 e71318d454.exe 99 PID 1504 wrote to memory of 3252 1504 e71318d454.exe 99 PID 1504 wrote to memory of 3252 1504 e71318d454.exe 99 PID 1504 wrote to memory of 3356 1504 e71318d454.exe 101 PID 1504 wrote to memory of 3356 1504 e71318d454.exe 101 PID 1504 wrote to memory of 3356 1504 e71318d454.exe 101 PID 1504 wrote to memory of 3264 1504 e71318d454.exe 103 PID 1504 wrote to memory of 3264 1504 e71318d454.exe 103 PID 1504 wrote to memory of 3264 1504 e71318d454.exe 103 PID 1504 wrote to memory of 4824 1504 e71318d454.exe 105 PID 1504 wrote to memory of 4824 1504 e71318d454.exe 105 PID 1504 wrote to memory of 4824 1504 e71318d454.exe 105 PID 1504 wrote to memory of 3052 1504 e71318d454.exe 107 PID 1504 wrote to memory of 3052 1504 e71318d454.exe 107 PID 1504 wrote to memory of 3052 1504 e71318d454.exe 107 PID 1504 wrote to memory of 4912 1504 e71318d454.exe 109 PID 1504 wrote to memory of 4912 1504 e71318d454.exe 109 PID 4912 wrote to memory of 1220 4912 firefox.exe 110 PID 4912 wrote to memory of 1220 4912 firefox.exe 110 PID 4912 wrote to memory of 1220 4912 firefox.exe 110 PID 4912 wrote to memory of 1220 4912 firefox.exe 110 PID 4912 wrote to memory of 1220 4912 firefox.exe 110 PID 4912 wrote to memory of 1220 4912 firefox.exe 110 PID 4912 wrote to memory of 1220 4912 firefox.exe 110 PID 4912 wrote to memory of 1220 4912 firefox.exe 110 PID 4912 wrote to memory of 1220 4912 firefox.exe 110 PID 4912 wrote to memory of 1220 4912 firefox.exe 110 PID 4912 wrote to memory of 1220 4912 firefox.exe 110 PID 1220 wrote to memory of 448 1220 firefox.exe 111 PID 1220 wrote to memory of 448 1220 firefox.exe 111 PID 1220 wrote to memory of 448 1220 firefox.exe 111 PID 1220 wrote to memory of 448 1220 firefox.exe 111 PID 1220 wrote to memory of 448 1220 firefox.exe 111 PID 1220 wrote to memory of 448 1220 firefox.exe 111 PID 1220 wrote to memory of 448 1220 firefox.exe 111 PID 1220 wrote to memory of 448 1220 firefox.exe 111 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\d4e13faefc09eb85be337713e8899e9f6761d45593e33d19b14ac6f986b2a103.exe"C:\Users\Admin\AppData\Local\Temp\d4e13faefc09eb85be337713e8899e9f6761d45593e33d19b14ac6f986b2a103.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Users\Admin\AppData\Local\Temp\1008911001\7mpPLxE.exe"C:\Users\Admin\AppData\Local\Temp\1008911001\7mpPLxE.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\1008911001\7mpPLxE.exe"C:\Users\Admin\AppData\Local\Temp\1008911001\7mpPLxE.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4012
-
-
-
C:\Users\Admin\AppData\Local\Temp\1008916001\fa187b4e45.exe"C:\Users\Admin\AppData\Local\Temp\1008916001\fa187b4e45.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:440 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2964 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff87473cc40,0x7ff87473cc4c,0x7ff87473cc585⤵PID:1620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2116,i,1569310479964427410,12689047006101301637,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2112 /prefetch:25⤵PID:3900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1812,i,1569310479964427410,12689047006101301637,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2148 /prefetch:35⤵PID:5192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=1768,i,1569310479964427410,12689047006101301637,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2312 /prefetch:85⤵PID:1408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3168,i,1569310479964427410,12689047006101301637,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3188 /prefetch:15⤵
- Uses browser remote debugging
PID:4004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3212,i,1569310479964427410,12689047006101301637,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3236 /prefetch:15⤵
- Uses browser remote debugging
PID:4984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4532,i,1569310479964427410,12689047006101301637,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4496 /prefetch:15⤵
- Uses browser remote debugging
PID:952
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5792
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5856
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 440 -s 12924⤵
- Program crash
PID:6056
-
-
-
C:\Users\Admin\AppData\Local\Temp\1008917001\24547b606e.exe"C:\Users\Admin\AppData\Local\Temp\1008917001\24547b606e.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3936
-
-
C:\Users\Admin\AppData\Local\Temp\1008918001\5b297c6b73.exe"C:\Users\Admin\AppData\Local\Temp\1008918001\5b297c6b73.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3940
-
-
C:\Users\Admin\AppData\Local\Temp\1008919001\e71318d454.exe"C:\Users\Admin\AppData\Local\Temp\1008919001\e71318d454.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3252
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3356
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3264
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4824
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3052
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2000 -parentBuildID 20240401114208 -prefsHandle 1928 -prefMapHandle 1920 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {88022acc-4ff8-44ba-9e17-a84d6333bea9} 1220 "\\.\pipe\gecko-crash-server-pipe.1220" gpu6⤵PID:448
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2324 -parentBuildID 20240401114208 -prefsHandle 2420 -prefMapHandle 2416 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b12d32ea-96aa-49d4-8ddd-8ac4c2a7efbb} 1220 "\\.\pipe\gecko-crash-server-pipe.1220" socket6⤵PID:456
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2940 -childID 1 -isForBrowser -prefsHandle 2944 -prefMapHandle 2976 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {06ce1d04-9720-4d42-abc8-6cdf8f9cd04d} 1220 "\\.\pipe\gecko-crash-server-pipe.1220" tab6⤵PID:4392
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2992 -childID 2 -isForBrowser -prefsHandle 3876 -prefMapHandle 3872 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cf5cd671-c11a-4b0d-b5f9-5487b83c3973} 1220 "\\.\pipe\gecko-crash-server-pipe.1220" tab6⤵PID:5016
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4860 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4748 -prefMapHandle 4864 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d27619b0-b5bb-4074-aec2-410ff99ad610} 1220 "\\.\pipe\gecko-crash-server-pipe.1220" utility6⤵
- Checks processor information in registry
PID:5392
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5540 -childID 3 -isForBrowser -prefsHandle 5528 -prefMapHandle 5508 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1afdfaf8-6a1e-4382-87c2-c0eee73df6a2} 1220 "\\.\pipe\gecko-crash-server-pipe.1220" tab6⤵PID:4912
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5556 -childID 4 -isForBrowser -prefsHandle 5548 -prefMapHandle 5544 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {32dd63b3-5bde-4c4d-841e-88afc44c311d} 1220 "\\.\pipe\gecko-crash-server-pipe.1220" tab6⤵PID:2468
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5784 -childID 5 -isForBrowser -prefsHandle 5776 -prefMapHandle 5688 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ddfd4854-ff9b-431d-bb35-f8c1797aaab5} 1220 "\\.\pipe\gecko-crash-server-pipe.1220" tab6⤵PID:4740
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1008920001\e4b7b58740.exe"C:\Users\Admin\AppData\Local\Temp\1008920001\e4b7b58740.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3476
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3900
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2532
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4780
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 440 -ip 4401⤵PID:5904
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\activity-stream.discovery_stream.json
Filesize27KB
MD56db864de2ec44137c0b6f2aed096899b
SHA1df13c2a92b9c19a20a98d8ea4784949f027cc5c0
SHA256b4abfbec77882ee18c570025c6449b2ced823639eab39fb83780b155a13dfadc
SHA512acfbc4f84b31955a618edb260cdc899aade9bf0fd666c5ab9b53833d9c2da5bed6f2bbb5ba12c52ce049174c12d22aee71540c05550b8395885f04a4ba382876
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD5f628a80c95dd3b5b4963579bd54b06fa
SHA154c48a9fefab3cc1b49adf014fb6a65b9d3afe57
SHA256688bae9793c193804bed76b2b64fee0d171eae1eabdc70e0b10f9bb7c8523da1
SHA5128a1f41526bb4e6ea8820b73e5a5cca28af758533b498744237d42729d4a755ff79dc112964df9cd0ea260d2ab4ff7154bf5945c39dc80b6cdc69f33e67dc0ef1
-
Filesize
426KB
MD582bb7a2c4d05216ec5fc07aa20324bc1
SHA13f652844912f6c134c656da0ef35750c267016dd
SHA25656e333f04b51aa90a9d086eb855ac51b23c19170f7989f770f6a56383cffe8f2
SHA512efc991b07660b93c2562c58c91bb4ce1f8f907848e3f2ac4c45c80016025148877cf25df336afd041106fa35376ffe2868695c92d2c6f81ae107d16c7cdf051a
-
Filesize
4.2MB
MD58caa4ee3f7639c23aa47df1f7f6074bd
SHA1babf9a3a1e08e9cf57fbcf8c421cc3352a3f6196
SHA25647e8bb0e2c3959d6aaa1bcab0a9c42bbc6fdeca4d0997f57fc7fe70f34021d4e
SHA512edd1f146f86647c0157a5cba3d638defc36c78ededf91a01f34a45862ab7e4a49029a1b3df85df5cd290cc6f477a46f880c996a27209582609ae4721f6d0d128
-
Filesize
1.7MB
MD5fe97db6e35ad42ddf2eb6d305872c516
SHA183b7e6c4ea8b3de907e5469c32847093d856e304
SHA2561ee09d0b261c0ca30c9323108f972055e050104b3e20560ab5ff234ec06a4fee
SHA5127cde034a1eba01842abce1521fd4d202d6928583df4d6f36e331fcad6572f659a8d44d1f36f8c04ce0655387a4a81d30bfd76dd922ecf015ee79a8af925334e4
-
Filesize
1.7MB
MD5f6db1fdb077557936fbf7f79bfaede5d
SHA11fa41fb9ac8c5fee78c19a6c894304c37439a041
SHA256f6c3ae6f370c77c051ed569795bd930f1d6c3ec7202faf9c735f397a244783d6
SHA5124c4b964badf8d7a45f6dce882b4386259467117686280611e7a381a6dfe0b9215ccafcb84e2cc3b6a96825892b2ac2b83f0758b9fa52ca3a91a8d695afdcd84c
-
Filesize
900KB
MD5493ca15bfa69f7a118494d67827857a2
SHA10c6fb2bc1b78b4164167b88a38c04fb01b7aa52b
SHA256a51bd4e358ee0bc9de17a912ba6ee74ea52c0a75b26f9559ab7d0228d3b5d508
SHA51203378de4d079b442b507ac56d5a6dbb7d5cc4520d18898247d46264459b42a65efbb2a9c6e5a132e83d6842f308949877401aae0c6760ffc31f5f2cd8cae5017
-
Filesize
2.7MB
MD5d10c4e196462857c03c9b8af956fcbf0
SHA1823d5b76e29e3fec8288380e5a23f0c84db54074
SHA25657a5b07daca94e357abf146c3019eb72a25e853700ddd2afe315c5ddd4a93dfa
SHA5128a99a33e02b3ffd3dae9874b085ec3f6d394cdf649898b2fc2e6953b160945b25cf3ab6e5689711cbbe82fe062bcc6f5f44cd97f65255994e127e0280b12992c
-
Filesize
1.8MB
MD55ca58d76edc0e7291bf3d6bad7edbbe9
SHA1694124bf2e8d817b7f188706bbc49d0088317fe2
SHA256d4e13faefc09eb85be337713e8899e9f6761d45593e33d19b14ac6f986b2a103
SHA51282b990ce963247c140161ce9ab28c79c5b4d648ddf46d622e152e3c0d79842be1cf1009a493b7af37b83976f36c05b56e353c6f7166dfc701979f87447f51fad
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin
Filesize10KB
MD52fa1468d6b5afb18e74b1af6d9944086
SHA1c21e72d1d20dc84cd1f2ec29c8e1851cc6cbdd48
SHA25604261f4c2ebc33a586c3492561f3601213be6de1877d15740ffb7ed0b9a9c633
SHA5129a6bc8a82fd36bc9e06fe11df05b5aa68af5e369593a548f5a91866e07d7f61878b08ccff66a1f4473cd374bd30893fa652e2407857c518ca475cc8182280e42
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize24KB
MD585e517879857d636a3ca5a62eb0c9f56
SHA1565332eaaea5789c818b33d2ad413a63e9d91c4f
SHA256da1f8b6927b12935c02be63361a2033aaa618845ff782961b23a2bee4cf22fe5
SHA512659bf0d86339c0ae4745ff354735cf51425d0eb1438f9e8ef7ed758d89afa54587a84ca163d3c02cc592a2e84ac4c0d192e4d0c0790190230973b8092d822555
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize21KB
MD5f5c017bd6f6e37f8a5d04289a327eb0d
SHA124b37b23b57675c62604dc633ca04a2d083df17c
SHA256690a5f4675a585981423bb51a2727aac73fd3cf49edefff83ae44e3477dab506
SHA51231df0dc1b7086edb08479b5dea6b66c17249663bac8c4ab2999f605e39bd1a58107d46f5780f5b1425882c5e9a2a03438ea9f76b8e3833386b77d10d2f96fb5b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\5bcf7535-25dd-4b77-b879-2453cbcd5f5c
Filesize659B
MD55a2dae188673f9bd7778b5c75a82e84e
SHA13330b9b0147f64cc2265219fb35f7bcc3401ca7e
SHA256a109e47dfd321c6b4efa7bc32feea648d34bba5d2600f72b1c66a0d25c546755
SHA51210e5a61060854ca53b0bf94b4e03310db8c83f5c339a1277c07b358245c02232a0f440179c410b284e3516e9f2d6dd5ed2f100f41aaa06a5788f28cb3b3e96a7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\cb51abda-2d5d-46f7-a449-a5d5376a49e5
Filesize982B
MD532819bdf4f391d7558d070a506b98418
SHA1e976b505a67e102d2e4bb01c9d6888ef414f256c
SHA2562fe750087f51e44836be3c7f754c79e65f2269fb430900fa6e79fc8108875c36
SHA512b15e6743174caa107710cf1fe3fd378b89d2047833da881360f5641300ec21ddd0076f8572b1b9ec7103aea877d4047cf98f7a0a8c6024c125cb001b04c5b9a2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD538aad4e63939a767937486e53f990359
SHA1e2d6f050690c3c25262fa24d4249685d68d64a5e
SHA256c0e2bc20c5309f58c2444dfe908e2eb6311081bab6803ae12fb5690403bdaf26
SHA51284eab2f93b398103f7a914d21116d1cc46d13547c3fba11881e74ee082c77bfa0b974fd72465f43321cc10fe2c339dd375d84c7de4fa34ca1a835e1120e4a69c
-
Filesize
10KB
MD57664f002bdcca63b4cec5970f81a13f2
SHA1524a6ec91d6bffb8b8278b989d3cf7163a88687b
SHA25640b79e5fd59e4c869ae3bf4d5ebf8599f2f09e2f7c8ba878256adb5f5b8bf87b
SHA512f062f8244b2df4f694d451e343b608ff1d08c4358805bd0c535417aee6ee2ce8401636c0c558bb063879077d88e5bdd015eea790e8ba7376714c53ee09ec3a79
-
Filesize
12KB
MD5fc4b7e339b56295753525f3a5e5aba17
SHA16e1b93ccbd84156e507baa6c4106aeae574557bf
SHA2569d147180f4362c43c50439cc271843e838132d3dcbad26c630001a5b43d5ce2f
SHA512ca6cc7224dc3dc5651d7fe4bddc3b1bc07cde0dd49d9324cb5192c0a246885c6978a64d6096454f1a8c27fadc677c58441776a531c51f8630e40eba34cf0d148
-
Filesize
15KB
MD5d694ba601e5c077c73acaf800d833098
SHA190538fca328ba09b9d16d7c15dddc7a4824f9d0d
SHA2566d22c4dc8ccb2f3100665bfa1ce7385370e69b73d304a5ab45aea1f5faf5e820
SHA51223024e0ea3ac16c2685eb4d739f7838f72465da53965b9bb4c370758cb78203d621f9121032e0c9464d9ee0489549003ef1547604895b033f3881acd5b8d28b5
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e