Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2024 15:57
Static task
static1
Behavioral task
behavioral1
Sample
ce14c1e22923868c58e09ceccce12ef3ac434324f8af938e45f1ea5d21b815cc.exe
Resource
win7-20240729-en
General
-
Target
ce14c1e22923868c58e09ceccce12ef3ac434324f8af938e45f1ea5d21b815cc.exe
-
Size
1.8MB
-
MD5
c358824ae102d5a407754a1fbf3677f5
-
SHA1
24448d0e44bb3a2d5776379454358942e85639f9
-
SHA256
ce14c1e22923868c58e09ceccce12ef3ac434324f8af938e45f1ea5d21b815cc
-
SHA512
dd3d14b4722a211ec541736dfed38cc66badebddfca36136233f107234a20b59011b85e2677db739aadb30bfcffb08b9304196f6d521473bfdcd19462aedf56f
-
SSDEEP
49152:vuYKP41uIfWVr1H9muoLiwthIySOt8r+wc3Tfvuv1WNQsU/xWlEQ:vf84IiWB1IuoL7SOY+xjfvgxrwt
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Cryptbot family
-
Detects CryptBot payload 1 IoCs
CryptBot is a C++ stealer distributed widely in bundle with other software.
Processes:
resource yara_rule behavioral2/memory/184-99-0x0000000069CC0000-0x000000006A71B000-memory.dmp family_cryptbot_v3 -
Processes:
0c99884c0a.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 0c99884c0a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 0c99884c0a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 0c99884c0a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 0c99884c0a.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 0c99884c0a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 0c99884c0a.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
Processes:
skotes.exeskotes.exece14c1e22923868c58e09ceccce12ef3ac434324f8af938e45f1ea5d21b815cc.exeskotes.exe70637b2372.exe6ef06898bf.exe5461845fd9.exe0c99884c0a.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ce14c1e22923868c58e09ceccce12ef3ac434324f8af938e45f1ea5d21b815cc.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 70637b2372.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6ef06898bf.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5461845fd9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0c99884c0a.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
Processes:
chrome.exechrome.exechrome.exechrome.exepid Process 5400 chrome.exe 6136 chrome.exe 5216 chrome.exe 2664 chrome.exe -
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
skotes.exeskotes.exe70637b2372.exe6ef06898bf.exe5461845fd9.exe0c99884c0a.exece14c1e22923868c58e09ceccce12ef3ac434324f8af938e45f1ea5d21b815cc.exeskotes.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 70637b2372.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6ef06898bf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5461845fd9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0c99884c0a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ce14c1e22923868c58e09ceccce12ef3ac434324f8af938e45f1ea5d21b815cc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ce14c1e22923868c58e09ceccce12ef3ac434324f8af938e45f1ea5d21b815cc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0c99884c0a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6ef06898bf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5461845fd9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 70637b2372.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ce14c1e22923868c58e09ceccce12ef3ac434324f8af938e45f1ea5d21b815cc.exeskotes.exe70637b2372.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation ce14c1e22923868c58e09ceccce12ef3ac434324f8af938e45f1ea5d21b815cc.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 70637b2372.exe -
Executes dropped EXE 11 IoCs
Processes:
skotes.exe70637b2372.exe6ef06898bf.exe5461845fd9.exe4df4bc58d7.exe0c99884c0a.exeservice123.exeskotes.exeservice123.exeskotes.exeservice123.exepid Process 4824 skotes.exe 184 70637b2372.exe 1544 6ef06898bf.exe 3976 5461845fd9.exe 368 4df4bc58d7.exe 5608 0c99884c0a.exe 5256 service123.exe 5968 skotes.exe 6096 service123.exe 4440 skotes.exe 3668 service123.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
0c99884c0a.exeskotes.exeskotes.exece14c1e22923868c58e09ceccce12ef3ac434324f8af938e45f1ea5d21b815cc.exeskotes.exe70637b2372.exe6ef06898bf.exe5461845fd9.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 0c99884c0a.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine ce14c1e22923868c58e09ceccce12ef3ac434324f8af938e45f1ea5d21b815cc.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 70637b2372.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 6ef06898bf.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 5461845fd9.exe -
Loads dropped DLL 3 IoCs
Processes:
service123.exeservice123.exeservice123.exepid Process 5256 service123.exe 6096 service123.exe 3668 service123.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
0c99884c0a.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 0c99884c0a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 0c99884c0a.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
skotes.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\6ef06898bf.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009066001\\6ef06898bf.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5461845fd9.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009067001\\5461845fd9.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\4df4bc58d7.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009068001\\4df4bc58d7.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\0c99884c0a.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009069001\\0c99884c0a.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/files/0x000a000000023b96-83.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
Processes:
ce14c1e22923868c58e09ceccce12ef3ac434324f8af938e45f1ea5d21b815cc.exeskotes.exe70637b2372.exe6ef06898bf.exe5461845fd9.exe0c99884c0a.exeskotes.exeskotes.exepid Process 1808 ce14c1e22923868c58e09ceccce12ef3ac434324f8af938e45f1ea5d21b815cc.exe 4824 skotes.exe 184 70637b2372.exe 1544 6ef06898bf.exe 3976 5461845fd9.exe 5608 0c99884c0a.exe 5968 skotes.exe 4440 skotes.exe -
Drops file in Windows directory 1 IoCs
Processes:
ce14c1e22923868c58e09ceccce12ef3ac434324f8af938e45f1ea5d21b815cc.exedescription ioc Process File created C:\Windows\Tasks\skotes.job ce14c1e22923868c58e09ceccce12ef3ac434324f8af938e45f1ea5d21b815cc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 4532 184 WerFault.exe 93 -
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
taskkill.exetaskkill.exe0c99884c0a.exe5461845fd9.exetaskkill.exetaskkill.exeservice123.exeschtasks.exe70637b2372.exe6ef06898bf.exetaskkill.exece14c1e22923868c58e09ceccce12ef3ac434324f8af938e45f1ea5d21b815cc.exe4df4bc58d7.exeskotes.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0c99884c0a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5461845fd9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 70637b2372.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6ef06898bf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ce14c1e22923868c58e09ceccce12ef3ac434324f8af938e45f1ea5d21b815cc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4df4bc58d7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exefirefox.exe70637b2372.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 70637b2372.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 70637b2372.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 5 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid Process 3552 taskkill.exe 3440 taskkill.exe 4504 taskkill.exe 2916 taskkill.exe 1496 taskkill.exe -
Modifies registry class 1 IoCs
Processes:
firefox.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 25 IoCs
Processes:
ce14c1e22923868c58e09ceccce12ef3ac434324f8af938e45f1ea5d21b815cc.exeskotes.exe70637b2372.exe6ef06898bf.exe5461845fd9.exe4df4bc58d7.exe0c99884c0a.exechrome.exeskotes.exeskotes.exepid Process 1808 ce14c1e22923868c58e09ceccce12ef3ac434324f8af938e45f1ea5d21b815cc.exe 1808 ce14c1e22923868c58e09ceccce12ef3ac434324f8af938e45f1ea5d21b815cc.exe 4824 skotes.exe 4824 skotes.exe 184 70637b2372.exe 184 70637b2372.exe 1544 6ef06898bf.exe 1544 6ef06898bf.exe 3976 5461845fd9.exe 3976 5461845fd9.exe 368 4df4bc58d7.exe 368 4df4bc58d7.exe 5608 0c99884c0a.exe 5608 0c99884c0a.exe 368 4df4bc58d7.exe 368 4df4bc58d7.exe 5608 0c99884c0a.exe 5608 0c99884c0a.exe 5608 0c99884c0a.exe 5400 chrome.exe 5400 chrome.exe 5968 skotes.exe 5968 skotes.exe 4440 skotes.exe 4440 skotes.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid Process 5400 chrome.exe 5400 chrome.exe 5400 chrome.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exefirefox.exe0c99884c0a.exechrome.exedescription pid Process Token: SeDebugPrivilege 3552 taskkill.exe Token: SeDebugPrivilege 3440 taskkill.exe Token: SeDebugPrivilege 4504 taskkill.exe Token: SeDebugPrivilege 2916 taskkill.exe Token: SeDebugPrivilege 1496 taskkill.exe Token: SeDebugPrivilege 5020 firefox.exe Token: SeDebugPrivilege 5020 firefox.exe Token: SeDebugPrivilege 5608 0c99884c0a.exe Token: SeShutdownPrivilege 5400 chrome.exe Token: SeCreatePagefilePrivilege 5400 chrome.exe Token: SeShutdownPrivilege 5400 chrome.exe Token: SeCreatePagefilePrivilege 5400 chrome.exe -
Suspicious use of FindShellTrayWindow 59 IoCs
Processes:
ce14c1e22923868c58e09ceccce12ef3ac434324f8af938e45f1ea5d21b815cc.exe4df4bc58d7.exefirefox.exechrome.exepid Process 1808 ce14c1e22923868c58e09ceccce12ef3ac434324f8af938e45f1ea5d21b815cc.exe 368 4df4bc58d7.exe 368 4df4bc58d7.exe 368 4df4bc58d7.exe 368 4df4bc58d7.exe 368 4df4bc58d7.exe 368 4df4bc58d7.exe 368 4df4bc58d7.exe 5020 firefox.exe 5020 firefox.exe 5020 firefox.exe 5020 firefox.exe 368 4df4bc58d7.exe 5020 firefox.exe 5020 firefox.exe 5020 firefox.exe 5020 firefox.exe 5020 firefox.exe 5020 firefox.exe 5020 firefox.exe 5020 firefox.exe 5020 firefox.exe 5020 firefox.exe 5020 firefox.exe 5020 firefox.exe 5020 firefox.exe 5020 firefox.exe 5020 firefox.exe 5020 firefox.exe 5020 firefox.exe 368 4df4bc58d7.exe 368 4df4bc58d7.exe 368 4df4bc58d7.exe 5400 chrome.exe 5400 chrome.exe 5400 chrome.exe 5400 chrome.exe 5400 chrome.exe 5400 chrome.exe 5400 chrome.exe 5400 chrome.exe 5400 chrome.exe 5400 chrome.exe 5400 chrome.exe 5400 chrome.exe 5400 chrome.exe 5400 chrome.exe 5400 chrome.exe 5400 chrome.exe 5400 chrome.exe 5400 chrome.exe 5400 chrome.exe 5400 chrome.exe 5400 chrome.exe 5400 chrome.exe 5400 chrome.exe 5400 chrome.exe 5400 chrome.exe 5400 chrome.exe -
Suspicious use of SendNotifyMessage 31 IoCs
Processes:
4df4bc58d7.exefirefox.exepid Process 368 4df4bc58d7.exe 368 4df4bc58d7.exe 368 4df4bc58d7.exe 368 4df4bc58d7.exe 368 4df4bc58d7.exe 368 4df4bc58d7.exe 368 4df4bc58d7.exe 5020 firefox.exe 5020 firefox.exe 5020 firefox.exe 5020 firefox.exe 368 4df4bc58d7.exe 5020 firefox.exe 5020 firefox.exe 5020 firefox.exe 5020 firefox.exe 5020 firefox.exe 5020 firefox.exe 5020 firefox.exe 5020 firefox.exe 5020 firefox.exe 5020 firefox.exe 5020 firefox.exe 5020 firefox.exe 5020 firefox.exe 5020 firefox.exe 5020 firefox.exe 5020 firefox.exe 368 4df4bc58d7.exe 368 4df4bc58d7.exe 368 4df4bc58d7.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
firefox.exepid Process 5020 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
ce14c1e22923868c58e09ceccce12ef3ac434324f8af938e45f1ea5d21b815cc.exeskotes.exe4df4bc58d7.exefirefox.exefirefox.exedescription pid Process procid_target PID 1808 wrote to memory of 4824 1808 ce14c1e22923868c58e09ceccce12ef3ac434324f8af938e45f1ea5d21b815cc.exe 83 PID 1808 wrote to memory of 4824 1808 ce14c1e22923868c58e09ceccce12ef3ac434324f8af938e45f1ea5d21b815cc.exe 83 PID 1808 wrote to memory of 4824 1808 ce14c1e22923868c58e09ceccce12ef3ac434324f8af938e45f1ea5d21b815cc.exe 83 PID 4824 wrote to memory of 184 4824 skotes.exe 93 PID 4824 wrote to memory of 184 4824 skotes.exe 93 PID 4824 wrote to memory of 184 4824 skotes.exe 93 PID 4824 wrote to memory of 1544 4824 skotes.exe 98 PID 4824 wrote to memory of 1544 4824 skotes.exe 98 PID 4824 wrote to memory of 1544 4824 skotes.exe 98 PID 4824 wrote to memory of 3976 4824 skotes.exe 100 PID 4824 wrote to memory of 3976 4824 skotes.exe 100 PID 4824 wrote to memory of 3976 4824 skotes.exe 100 PID 4824 wrote to memory of 368 4824 skotes.exe 101 PID 4824 wrote to memory of 368 4824 skotes.exe 101 PID 4824 wrote to memory of 368 4824 skotes.exe 101 PID 368 wrote to memory of 3552 368 4df4bc58d7.exe 102 PID 368 wrote to memory of 3552 368 4df4bc58d7.exe 102 PID 368 wrote to memory of 3552 368 4df4bc58d7.exe 102 PID 368 wrote to memory of 3440 368 4df4bc58d7.exe 104 PID 368 wrote to memory of 3440 368 4df4bc58d7.exe 104 PID 368 wrote to memory of 3440 368 4df4bc58d7.exe 104 PID 368 wrote to memory of 4504 368 4df4bc58d7.exe 106 PID 368 wrote to memory of 4504 368 4df4bc58d7.exe 106 PID 368 wrote to memory of 4504 368 4df4bc58d7.exe 106 PID 368 wrote to memory of 2916 368 4df4bc58d7.exe 108 PID 368 wrote to memory of 2916 368 4df4bc58d7.exe 108 PID 368 wrote to memory of 2916 368 4df4bc58d7.exe 108 PID 368 wrote to memory of 1496 368 4df4bc58d7.exe 110 PID 368 wrote to memory of 1496 368 4df4bc58d7.exe 110 PID 368 wrote to memory of 1496 368 4df4bc58d7.exe 110 PID 368 wrote to memory of 4516 368 4df4bc58d7.exe 112 PID 368 wrote to memory of 4516 368 4df4bc58d7.exe 112 PID 4516 wrote to memory of 5020 4516 firefox.exe 113 PID 4516 wrote to memory of 5020 4516 firefox.exe 113 PID 4516 wrote to memory of 5020 4516 firefox.exe 113 PID 4516 wrote to memory of 5020 4516 firefox.exe 113 PID 4516 wrote to memory of 5020 4516 firefox.exe 113 PID 4516 wrote to memory of 5020 4516 firefox.exe 113 PID 4516 wrote to memory of 5020 4516 firefox.exe 113 PID 4516 wrote to memory of 5020 4516 firefox.exe 113 PID 4516 wrote to memory of 5020 4516 firefox.exe 113 PID 4516 wrote to memory of 5020 4516 firefox.exe 113 PID 4516 wrote to memory of 5020 4516 firefox.exe 113 PID 5020 wrote to memory of 3280 5020 firefox.exe 114 PID 5020 wrote to memory of 3280 5020 firefox.exe 114 PID 5020 wrote to memory of 3280 5020 firefox.exe 114 PID 5020 wrote to memory of 3280 5020 firefox.exe 114 PID 5020 wrote to memory of 3280 5020 firefox.exe 114 PID 5020 wrote to memory of 3280 5020 firefox.exe 114 PID 5020 wrote to memory of 3280 5020 firefox.exe 114 PID 5020 wrote to memory of 3280 5020 firefox.exe 114 PID 5020 wrote to memory of 3280 5020 firefox.exe 114 PID 5020 wrote to memory of 3280 5020 firefox.exe 114 PID 5020 wrote to memory of 3280 5020 firefox.exe 114 PID 5020 wrote to memory of 3280 5020 firefox.exe 114 PID 5020 wrote to memory of 3280 5020 firefox.exe 114 PID 5020 wrote to memory of 3280 5020 firefox.exe 114 PID 5020 wrote to memory of 3280 5020 firefox.exe 114 PID 5020 wrote to memory of 3280 5020 firefox.exe 114 PID 5020 wrote to memory of 3280 5020 firefox.exe 114 PID 5020 wrote to memory of 3280 5020 firefox.exe 114 PID 5020 wrote to memory of 3280 5020 firefox.exe 114 PID 5020 wrote to memory of 3280 5020 firefox.exe 114 PID 5020 wrote to memory of 3280 5020 firefox.exe 114 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ce14c1e22923868c58e09ceccce12ef3ac434324f8af938e45f1ea5d21b815cc.exe"C:\Users\Admin\AppData\Local\Temp\ce14c1e22923868c58e09ceccce12ef3ac434324f8af938e45f1ea5d21b815cc.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\1009065001\70637b2372.exe"C:\Users\Admin\AppData\Local\Temp\1009065001\70637b2372.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:184 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5400 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ffbc15ccc40,0x7ffbc15ccc4c,0x7ffbc15ccc585⤵PID:5452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1916,i,7631706968609456007,639601175205780215,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1912 /prefetch:25⤵PID:5700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1596,i,7631706968609456007,639601175205780215,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2148 /prefetch:35⤵PID:5708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2292,i,7631706968609456007,639601175205780215,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2476 /prefetch:85⤵PID:5788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3176,i,7631706968609456007,639601175205780215,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3200 /prefetch:15⤵
- Uses browser remote debugging
PID:6136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3208,i,7631706968609456007,639601175205780215,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3276 /prefetch:15⤵
- Uses browser remote debugging
PID:5216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3832,i,7631706968609456007,639601175205780215,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3632 /prefetch:15⤵
- Uses browser remote debugging
PID:2664
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5256
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5856
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 184 -s 13044⤵
- Program crash
PID:4532
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009066001\6ef06898bf.exe"C:\Users\Admin\AppData\Local\Temp\1009066001\6ef06898bf.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1544
-
-
C:\Users\Admin\AppData\Local\Temp\1009067001\5461845fd9.exe"C:\Users\Admin\AppData\Local\Temp\1009067001\5461845fd9.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3976
-
-
C:\Users\Admin\AppData\Local\Temp\1009068001\4df4bc58d7.exe"C:\Users\Admin\AppData\Local\Temp\1009068001\4df4bc58d7.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:368 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3552
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3440
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4504
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2916
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1496
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2032 -parentBuildID 20240401114208 -prefsHandle 1960 -prefMapHandle 1936 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {34daba0e-5ead-44cf-84ab-1d0c485969fb} 5020 "\\.\pipe\gecko-crash-server-pipe.5020" gpu6⤵PID:3280
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2464 -parentBuildID 20240401114208 -prefsHandle 2444 -prefMapHandle 2440 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {96ce8d36-b478-487e-b7f3-0bf950f68e51} 5020 "\\.\pipe\gecko-crash-server-pipe.5020" socket6⤵PID:2436
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3044 -childID 1 -isForBrowser -prefsHandle 2996 -prefMapHandle 1560 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {eadce8cc-9352-48d3-b949-c5a7a6f7acd3} 5020 "\\.\pipe\gecko-crash-server-pipe.5020" tab6⤵PID:1584
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2736 -childID 2 -isForBrowser -prefsHandle 3856 -prefMapHandle 3832 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e7a63724-4822-4a58-9a0c-67b7523629ef} 5020 "\\.\pipe\gecko-crash-server-pipe.5020" tab6⤵PID:3324
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3848 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4528 -prefMapHandle 4572 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {034b5d42-bdb0-4b5c-88ca-5b349eb9cb5a} 5020 "\\.\pipe\gecko-crash-server-pipe.5020" utility6⤵
- Checks processor information in registry
PID:5276
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5600 -childID 3 -isForBrowser -prefsHandle 5596 -prefMapHandle 5588 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c013b933-0eab-48be-aa1b-a35178173c43} 5020 "\\.\pipe\gecko-crash-server-pipe.5020" tab6⤵PID:2668
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5736 -childID 4 -isForBrowser -prefsHandle 5816 -prefMapHandle 5812 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {81cf3040-81b5-4c37-ab8e-f22a4dff73b0} 5020 "\\.\pipe\gecko-crash-server-pipe.5020" tab6⤵PID:2588
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5716 -childID 5 -isForBrowser -prefsHandle 5948 -prefMapHandle 5952 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6a5bb677-8c3a-487d-a423-6a674dd1b5ae} 5020 "\\.\pipe\gecko-crash-server-pipe.5020" tab6⤵PID:2960
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009069001\0c99884c0a.exe"C:\Users\Admin\AppData\Local\Temp\1009069001\0c99884c0a.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5608
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:972
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 184 -ip 1841⤵PID:2500
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5968
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:6096
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4440
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3668
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\activity-stream.discovery_stream.json
Filesize19KB
MD5731b90d44cc162427941b96fce51342c
SHA1fb75326f9c84a5b6a5b52aa6aa3288ca31c084d3
SHA25697dcf1d6ca1fc4eaa45738bc2ecde3c55e3d3adf1cf47fa9d49c9bab5ae930f2
SHA5126c693460b12909deacac0266498283feb4378d875e8b9a8954e41f21108ac5bb9c2df6a39cadbed33d3b1c245c99220a3512360f780054b7c3f20d408704d12e
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD5eee7cf347f14cfcb05d7fadeda0c2cae
SHA1c00e0529ccd9b524dcc7d744c64396ee86225811
SHA256459d849fc523293cb53aab9ef2f181b232afe06a67c18adff7670f7140ae8553
SHA51269bd7dc4d89c374525868d675f028769fc69d46a9972ceea12c8d95bbd4efa4d81f7edb11fcf3ae951aa3d22752914bc9a56d5b8669f66051f0a17b59bd111ae
-
Filesize
4.2MB
MD55b934bbc39deb3ef6318e983cf938096
SHA175980026dbe1c5451299557d2e4af366bedadb3c
SHA256bf0c204108b2e0095591eed02b027fe7f9892060f6d4d260be250bb110879f98
SHA512d1fcb264ba933e4aa6efec17c70eb91f7d6f59e284c424639bc652440cbb4176038ea81c38ac1d9216802068d68b6ec1b537b6825d7a591bfec76b4a155f5bab
-
Filesize
1.8MB
MD53e4c006936e63898c8bd8c4aba82db63
SHA13dd0d90d652c98b8fdd2faaf926f3a4c533c28ba
SHA256fbd037ce912d8db1d1d6f4a899a9b296666db15bc3465d8262cad706f8e30124
SHA51209f231009c7b390d4d403c3449c8ff5dcb9555eb5513dab5612c557fd51d82e5a1162eeb1c6a9e80897c671386b53b012fb10881082c255998a7023040637745
-
Filesize
1.7MB
MD53c0fdc03af4ee57e1fb552f41e86cfba
SHA141fd1ab70b2ab449460d94de741bf62520eef660
SHA256665596162e2fbd017fb44dc510ea898db681c9c92ef416369fb2869cfd61ed78
SHA512802b1401c765ca5abb11b42f6d5d45b95dc6eebbdce7e0b57d5e1c5c2774f91e0287dd2158c41fe3abe554628341a377de6a196eed3b14567a2342cd316c6bbf
-
Filesize
900KB
MD59d92eba3b1e7bf6b65d98e5a0b16a533
SHA19fa619b8c05484363846262cbfe4c1df1ad2af9d
SHA256d5d7ca8d1b12a956775d1452033bdacf54dce3fa1d00c662f39f837605f37951
SHA512674baf8e3e0c93326accf524fd14d03df6a8251ab3a379889659100b9bebbaa12d82582f12e025fd03129b70019aeca319fb1211a64c37e06cc60715831e31f4
-
Filesize
2.7MB
MD562999b3ca5005da29eb4d0853c5fa789
SHA18512b3a7ac2f37b19b0a75586859d724b857b6c6
SHA2560fd8b2570b5b38cb65325116d2ea01d414876f903cf72c26a1733a1d6f35bd22
SHA512acb504dc190caf3789758c035e8522b057f601e5f8c6d5deb5968d3e248b9cc68e3e804bba8783bce6800b8cf9f6f9a3b1f1c02e82641d76ed17259cc635750e
-
Filesize
1.8MB
MD5c358824ae102d5a407754a1fbf3677f5
SHA124448d0e44bb3a2d5776379454358942e85639f9
SHA256ce14c1e22923868c58e09ceccce12ef3ac434324f8af938e45f1ea5d21b815cc
SHA512dd3d14b4722a211ec541736dfed38cc66badebddfca36136233f107234a20b59011b85e2677db739aadb30bfcffb08b9304196f6d521473bfdcd19462aedf56f
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\AlternateServices.bin
Filesize6KB
MD5665860f2bda5b37c78b3dd7bc6e3be1b
SHA1833dbaa9e8dedfd33e9f1c1920bda1b3ea2379e2
SHA2566e01ceef9c4bc89554fa0bac950abe1c8c3eec8915028d88fead9006b3a4bfdd
SHA51265f08d82d5947933d479a24561bc1974659bba682773db6e61906f1f344afa8fe5f6ebac4ef086f13225459ef91f7b6d7bbe2543875dbe0d3a812bae3a8345a5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\AlternateServices.bin
Filesize10KB
MD5e27df31aa172a193b114943029e905f4
SHA1af3f126fe7bdb55363fb91a471116ca530b43faf
SHA256c4f3c448af541b1dc575633f15162a91624ec57f3ec1a7d42f6ca3d93d48bab6
SHA5123c52cb7b08f9fcc60add96b21f2f8cd732b5fc0e94b00e232b5216d93e8b25b4f0aadc868d88e5a1e660441856d80a4f367e9348ead22eef4a632aa944505c13
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5e55b2cb1b0e8b4b82b2aa2a66b65cae9
SHA12e6293647e1b413b3871d2039d278d31f60d0320
SHA2562a4ae4443d257d06a7da6be6f1fe9d75e368f9048f168e0a7e3c5651d61d6c20
SHA512d04cfc7a1f806402046a1cd5cd75764301df371595436ad04a1c2049dff53b0bb0481893ec65d8ee29949505f242d696d0eedd1bf8ffa7fdeb3a4cb54c8a5be1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD58f06eeab9adf264bdc602eda49d5b832
SHA1a92668cfaff91a9df2efddcf9b912d38678544b0
SHA256f12810088e9a3d57c435f905c01ed2fe347490974377837ec761384980f7c412
SHA512c9cba3966c04d8a54343b0bb54b79919e7a1c4883f600d33e75bf16a498409265f0d96a2dd05cbcee5b4e70cf09a0395ff4709e1e24a1f2fbc968a090758875d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD55342f764a07a8572416caf12d10d9474
SHA13443a2aa124a45b0979b617550a5ad32d78ad118
SHA256e9376a915336f4b7c3e5066cd632b925856ec16f582499d9226d731fcdf5082b
SHA5125177266c928a808f51e3bbaf24d8fd43c8217583bf7fc94370080777005be0448d2306c429f38bf85d7629a1cd675ba34b5908d4260862106201f42e4f178e10
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\pending_pings\39cb9ab8-e9df-476c-aa2b-0b061b25ab74
Filesize671B
MD5478fbf723f82e37b8ec0833d9fa85975
SHA1c229e2d4db4815bd78d8465cb5fa9c88fe5af84c
SHA2566baf0fec1b4726434ea7b81dbf01a43aba087e944a3424f9b5b3ed40de579aa8
SHA512168cb7e95c2ad2652125866a923e58ba30466b4104358eea6377ff24522dfac16dffaf7a705e824abee0be612b32df3b134079eaedc4254d78fe05ec8bec6cda
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\pending_pings\75c20a0f-016f-49bf-8857-3975aced0bd8
Filesize24KB
MD527d6a32012cb725f774905052abdb875
SHA1dfd103ac33c5b199f0a8d76441699c385715dfc0
SHA25626c4c4be5ef3381c870bb22a941bc8c9ea27a4001f4e51ea77e6e232aed68a06
SHA512d1b1aeaf035a6959d7d430dddce1c083930526286daa4b82ea9b9c4ee7af3a42c7e30450036d763b0d8f86d4bb247f662c9a3a1adde1654a4c7fdcecdb3fb955
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\pending_pings\d1d5a6eb-15a2-471e-94f1-674cab495e68
Filesize982B
MD5496f256d2c25210f6150e1e603f31b61
SHA1493ee0545bf06d9a135bc2e1d2b4b10893100671
SHA256a754be6aeb559bb84256dcf3de3d33d786365445648930387119e1ca8c754716
SHA51294db7e70be3fe79554a2b74710e945344c932966fa0418bc6a86c81a62969944f20cfe9d6d42e6b05cbeb48f8c2121d9a284e29977f96c15fe1b6813fe0e7faf
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD5b8b924e1576ba49876a206d51227854e
SHA1360db32f43980ab722eedfd937232bdac39d1055
SHA2561caa5038e8c7709fb6cefb89c6f32be0323620dfe142d519a35bd885ee5a1ce9
SHA512b4abd40d70e8394a61e55a691f49c433f4ff03a4720e130fdab9425d298fb631985b7b63798784a0c03a4e0fd116338f2b267e1527b8eb3d6fe002d092aa9637
-
Filesize
15KB
MD523f2ded87579d8192b359cf44f7370b6
SHA1c49220b475cd764f316cca2d2b0ab69c07a7c2f9
SHA25674a60926fe7f2fc61af2d9822232a0e9eb9dfd0ff79bf0bdc5896332ea6f02d2
SHA5124681a1083d9dbce25690628b2d7ca4ea43eee48deec644faba0c378f47b91c2a525b97bbdc3afc5bae29c03f3f6f4d14e9a8f405b224f5c181bf4d06a2f41500
-
Filesize
10KB
MD5b6a49de2582f9018fae1995069e45d5e
SHA19ed5c96313ea5197e4b56c1b19e6af030c9fdb37
SHA25639046353b06da1e162887f6c613a264139ac5b7ae7d47cb88750c7d401b85e81
SHA512880d6dd391969b40ee09b266ecc73d04bf16e155bf662feae11f3df1a91bd32228010ed9b4193ab2e4f78f168fbf9a0430a67061cb0945e1f0a2e33697c13c87
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize9.5MB
MD58b23657fe64da1f0ee9e2ccf241efb10
SHA1c86c00c5f7ad4d1020a646247cc0232a71665351
SHA256ff4bef4c8a10d41a049812e14115a946eacaac95fafa35137f955234849c8506
SHA512b42653ee921093d783c0ef156909f58315457cfd83280bfd80b01fd5555fa52c8f476430efd06227fd31d4e44ac6c5437eff560de653062ef3e80ad2062dbb06
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e