Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-11-2024 20:02
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240903-en
General
-
Target
file.exe
-
Size
1.8MB
-
MD5
ffc4509537ae91b049189c9f7bc777e0
-
SHA1
d07824e044eaea5c875d4c234eccdcfb46676720
-
SHA256
73dedcc630ebd68669c7ee7befac513271f3a06b39ba6e20f4a4cb585ea726ad
-
SHA512
61a8271bc25878faa2a012ab7fd1dc60043db8a8bbcf2b16cb396d6ce21732b83f44bbd64eeca887c2227409c3b52683123681803687a3faf6d6677089ed784f
-
SSDEEP
49152:DKE1DKkbmqi/HJOvnpW98yK/hol3CHNtZy:mE1DV0ov098Rpo9CHw
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://processhol.sbs/api
https://p10tgrace.sbs/api
https://peepburry828.sbs/api
https://3xp3cts1aim.sbs/api
https://p3ar11fter.sbs/api
Signatures
-
Amadey family
-
Cryptbot family
-
Detects CryptBot payload 1 IoCs
CryptBot is a C++ stealer distributed widely in bundle with other software.
resource yara_rule behavioral2/memory/5812-2720-0x0000000069CC0000-0x000000006A71B000-memory.dmp family_cryptbot_v3 -
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c1bf51f724.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c1bf51f724.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c1bf51f724.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c1bf51f724.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c1bf51f724.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c1bf51f724.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c1bf51f724.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b54307d149.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ cae73009c1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 148ff9a59f.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 4540 chrome.exe 4296 chrome.exe 2052 chrome.exe 2460 chrome.exe -
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cae73009c1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 148ff9a59f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c1bf51f724.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b54307d149.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cae73009c1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 148ff9a59f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c1bf51f724.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b54307d149.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation file.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 8 IoCs
pid Process 2488 skotes.exe 2676 cae73009c1.exe 4432 148ff9a59f.exe 3960 a2abe0afbc.exe 3092 c1bf51f724.exe 5812 b54307d149.exe 5216 skotes.exe 4324 skotes.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine cae73009c1.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 148ff9a59f.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine c1bf51f724.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine b54307d149.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine file.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c1bf51f724.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c1bf51f724.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cae73009c1.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007229001\\cae73009c1.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\148ff9a59f.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007230001\\148ff9a59f.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\a2abe0afbc.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007231001\\a2abe0afbc.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\c1bf51f724.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007232001\\c1bf51f724.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000023ca2-63.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 2936 file.exe 2488 skotes.exe 2676 cae73009c1.exe 4432 148ff9a59f.exe 3092 c1bf51f724.exe 5812 b54307d149.exe 5216 skotes.exe 4324 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5772 4432 WerFault.exe 99 -
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b54307d149.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a2abe0afbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c1bf51f724.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cae73009c1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 148ff9a59f.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 148ff9a59f.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 148ff9a59f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Kills process with taskkill 5 IoCs
pid Process 1728 taskkill.exe 1156 taskkill.exe 4224 taskkill.exe 3908 taskkill.exe 2376 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 2936 file.exe 2936 file.exe 2488 skotes.exe 2488 skotes.exe 2676 cae73009c1.exe 2676 cae73009c1.exe 4432 148ff9a59f.exe 4432 148ff9a59f.exe 4432 148ff9a59f.exe 4432 148ff9a59f.exe 4432 148ff9a59f.exe 4432 148ff9a59f.exe 4540 chrome.exe 4540 chrome.exe 3960 a2abe0afbc.exe 3960 a2abe0afbc.exe 3092 c1bf51f724.exe 3092 c1bf51f724.exe 3092 c1bf51f724.exe 3092 c1bf51f724.exe 3092 c1bf51f724.exe 3960 a2abe0afbc.exe 3960 a2abe0afbc.exe 5812 b54307d149.exe 5812 b54307d149.exe 5216 skotes.exe 5216 skotes.exe 4324 skotes.exe 4324 skotes.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeDebugPrivilege 1728 taskkill.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeDebugPrivilege 1156 taskkill.exe Token: SeDebugPrivilege 4224 taskkill.exe Token: SeDebugPrivilege 3908 taskkill.exe Token: SeDebugPrivilege 2376 taskkill.exe Token: SeDebugPrivilege 1076 firefox.exe Token: SeDebugPrivilege 1076 firefox.exe Token: SeDebugPrivilege 3092 c1bf51f724.exe Token: SeDebugPrivilege 1076 firefox.exe Token: SeDebugPrivilege 1076 firefox.exe Token: SeDebugPrivilege 1076 firefox.exe -
Suspicious use of FindShellTrayWindow 60 IoCs
pid Process 2936 file.exe 3960 a2abe0afbc.exe 3960 a2abe0afbc.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 3960 a2abe0afbc.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 3960 a2abe0afbc.exe 3960 a2abe0afbc.exe 3960 a2abe0afbc.exe 3960 a2abe0afbc.exe 3960 a2abe0afbc.exe 1076 firefox.exe 1076 firefox.exe 1076 firefox.exe 1076 firefox.exe 3960 a2abe0afbc.exe 1076 firefox.exe 1076 firefox.exe 1076 firefox.exe 1076 firefox.exe 1076 firefox.exe 1076 firefox.exe 1076 firefox.exe 1076 firefox.exe 1076 firefox.exe 1076 firefox.exe 1076 firefox.exe 1076 firefox.exe 1076 firefox.exe 1076 firefox.exe 1076 firefox.exe 1076 firefox.exe 1076 firefox.exe 3960 a2abe0afbc.exe 3960 a2abe0afbc.exe 3960 a2abe0afbc.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 3960 a2abe0afbc.exe 3960 a2abe0afbc.exe 3960 a2abe0afbc.exe 3960 a2abe0afbc.exe 3960 a2abe0afbc.exe 3960 a2abe0afbc.exe 3960 a2abe0afbc.exe 3960 a2abe0afbc.exe 1076 firefox.exe 1076 firefox.exe 1076 firefox.exe 1076 firefox.exe 3960 a2abe0afbc.exe 1076 firefox.exe 1076 firefox.exe 1076 firefox.exe 1076 firefox.exe 1076 firefox.exe 1076 firefox.exe 1076 firefox.exe 1076 firefox.exe 1076 firefox.exe 1076 firefox.exe 1076 firefox.exe 1076 firefox.exe 1076 firefox.exe 1076 firefox.exe 1076 firefox.exe 1076 firefox.exe 3960 a2abe0afbc.exe 3960 a2abe0afbc.exe 3960 a2abe0afbc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1076 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2936 wrote to memory of 2488 2936 file.exe 86 PID 2936 wrote to memory of 2488 2936 file.exe 86 PID 2936 wrote to memory of 2488 2936 file.exe 86 PID 2488 wrote to memory of 2676 2488 skotes.exe 93 PID 2488 wrote to memory of 2676 2488 skotes.exe 93 PID 2488 wrote to memory of 2676 2488 skotes.exe 93 PID 2488 wrote to memory of 4432 2488 skotes.exe 99 PID 2488 wrote to memory of 4432 2488 skotes.exe 99 PID 2488 wrote to memory of 4432 2488 skotes.exe 99 PID 2488 wrote to memory of 3960 2488 skotes.exe 101 PID 2488 wrote to memory of 3960 2488 skotes.exe 101 PID 2488 wrote to memory of 3960 2488 skotes.exe 101 PID 4432 wrote to memory of 4540 4432 148ff9a59f.exe 102 PID 4432 wrote to memory of 4540 4432 148ff9a59f.exe 102 PID 3960 wrote to memory of 1728 3960 a2abe0afbc.exe 103 PID 3960 wrote to memory of 1728 3960 a2abe0afbc.exe 103 PID 3960 wrote to memory of 1728 3960 a2abe0afbc.exe 103 PID 4540 wrote to memory of 3684 4540 chrome.exe 105 PID 4540 wrote to memory of 3684 4540 chrome.exe 105 PID 4540 wrote to memory of 780 4540 chrome.exe 106 PID 4540 wrote to memory of 780 4540 chrome.exe 106 PID 4540 wrote to memory of 780 4540 chrome.exe 106 PID 4540 wrote to memory of 780 4540 chrome.exe 106 PID 4540 wrote to memory of 780 4540 chrome.exe 106 PID 4540 wrote to memory of 780 4540 chrome.exe 106 PID 4540 wrote to memory of 780 4540 chrome.exe 106 PID 4540 wrote to memory of 780 4540 chrome.exe 106 PID 4540 wrote to memory of 780 4540 chrome.exe 106 PID 4540 wrote to memory of 780 4540 chrome.exe 106 PID 4540 wrote to memory of 780 4540 chrome.exe 106 PID 4540 wrote to memory of 780 4540 chrome.exe 106 PID 4540 wrote to memory of 780 4540 chrome.exe 106 PID 4540 wrote to memory of 780 4540 chrome.exe 106 PID 4540 wrote to memory of 780 4540 chrome.exe 106 PID 4540 wrote to memory of 780 4540 chrome.exe 106 PID 4540 wrote to memory of 780 4540 chrome.exe 106 PID 4540 wrote to memory of 780 4540 chrome.exe 106 PID 4540 wrote to memory of 780 4540 chrome.exe 106 PID 4540 wrote to memory of 780 4540 chrome.exe 106 PID 4540 wrote to memory of 780 4540 chrome.exe 106 PID 4540 wrote to memory of 780 4540 chrome.exe 106 PID 4540 wrote to memory of 780 4540 chrome.exe 106 PID 4540 wrote to memory of 780 4540 chrome.exe 106 PID 4540 wrote to memory of 780 4540 chrome.exe 106 PID 4540 wrote to memory of 780 4540 chrome.exe 106 PID 4540 wrote to memory of 780 4540 chrome.exe 106 PID 4540 wrote to memory of 780 4540 chrome.exe 106 PID 4540 wrote to memory of 780 4540 chrome.exe 106 PID 4540 wrote to memory of 780 4540 chrome.exe 106 PID 4540 wrote to memory of 4992 4540 chrome.exe 107 PID 4540 wrote to memory of 4992 4540 chrome.exe 107 PID 4540 wrote to memory of 3468 4540 chrome.exe 108 PID 4540 wrote to memory of 3468 4540 chrome.exe 108 PID 4540 wrote to memory of 3468 4540 chrome.exe 108 PID 4540 wrote to memory of 3468 4540 chrome.exe 108 PID 4540 wrote to memory of 3468 4540 chrome.exe 108 PID 4540 wrote to memory of 3468 4540 chrome.exe 108 PID 4540 wrote to memory of 3468 4540 chrome.exe 108 PID 4540 wrote to memory of 3468 4540 chrome.exe 108 PID 4540 wrote to memory of 3468 4540 chrome.exe 108 PID 4540 wrote to memory of 3468 4540 chrome.exe 108 PID 4540 wrote to memory of 3468 4540 chrome.exe 108 PID 4540 wrote to memory of 3468 4540 chrome.exe 108 PID 4540 wrote to memory of 3468 4540 chrome.exe 108 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\1007229001\cae73009c1.exe"C:\Users\Admin\AppData\Local\Temp\1007229001\cae73009c1.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2676
-
-
C:\Users\Admin\AppData\Local\Temp\1007230001\148ff9a59f.exe"C:\Users\Admin\AppData\Local\Temp\1007230001\148ff9a59f.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffc194dcc40,0x7ffc194dcc4c,0x7ffc194dcc585⤵PID:3684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1904,i,11950384805540542967,13145982841567671929,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1900 /prefetch:25⤵PID:780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2132,i,11950384805540542967,13145982841567671929,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2164 /prefetch:35⤵PID:4992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2228,i,11950384805540542967,13145982841567671929,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2432 /prefetch:85⤵PID:3468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3152,i,11950384805540542967,13145982841567671929,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3160 /prefetch:15⤵
- Uses browser remote debugging
PID:2052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3180,i,11950384805540542967,13145982841567671929,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3200 /prefetch:15⤵
- Uses browser remote debugging
PID:4296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4164,i,11950384805540542967,13145982841567671929,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3604 /prefetch:15⤵
- Uses browser remote debugging
PID:2460
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4432 -s 14844⤵
- Program crash
PID:5772
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007231001\a2abe0afbc.exe"C:\Users\Admin\AppData\Local\Temp\1007231001\a2abe0afbc.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1728
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1156
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4224
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3908
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2376
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:3172
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1076 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1968 -parentBuildID 20240401114208 -prefsHandle 1896 -prefMapHandle 1888 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e2ac819c-da5e-4759-b903-607479791622} 1076 "\\.\pipe\gecko-crash-server-pipe.1076" gpu6⤵PID:4872
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2420 -parentBuildID 20240401114208 -prefsHandle 2396 -prefMapHandle 2392 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0dd26f1b-8b8d-4d8b-bfe6-2deb45ab7c51} 1076 "\\.\pipe\gecko-crash-server-pipe.1076" socket6⤵PID:868
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3084 -childID 1 -isForBrowser -prefsHandle 3076 -prefMapHandle 2780 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1176 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e7428bb9-d7a3-4751-9eac-24359afa3767} 1076 "\\.\pipe\gecko-crash-server-pipe.1076" tab6⤵PID:1852
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4140 -childID 2 -isForBrowser -prefsHandle 4132 -prefMapHandle 4128 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1176 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f091d526-660f-4c04-a418-9ad1f42271d2} 1076 "\\.\pipe\gecko-crash-server-pipe.1076" tab6⤵PID:1516
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4876 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4624 -prefMapHandle 2736 -prefsLen 29197 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7a008629-8604-44f1-8498-c09dff199e61} 1076 "\\.\pipe\gecko-crash-server-pipe.1076" utility6⤵
- Checks processor information in registry
PID:5504
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5164 -childID 3 -isForBrowser -prefsHandle 5124 -prefMapHandle 5140 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1176 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f6b9365c-e405-4daf-be8f-cfcd33bc6c40} 1076 "\\.\pipe\gecko-crash-server-pipe.1076" tab6⤵PID:6048
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5384 -childID 4 -isForBrowser -prefsHandle 5304 -prefMapHandle 5308 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1176 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f7898e72-fa24-46bb-846c-f31bb2a33223} 1076 "\\.\pipe\gecko-crash-server-pipe.1076" tab6⤵PID:6080
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5496 -childID 5 -isForBrowser -prefsHandle 5580 -prefMapHandle 5576 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1176 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4274ea03-f95f-4a34-a4f5-ef485e84fb96} 1076 "\\.\pipe\gecko-crash-server-pipe.1076" tab6⤵PID:6092
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007232001\c1bf51f724.exe"C:\Users\Admin\AppData\Local\Temp\1007232001\c1bf51f724.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3092
-
-
C:\Users\Admin\AppData\Local\Temp\1007233001\b54307d149.exe"C:\Users\Admin\AppData\Local\Temp\1007233001\b54307d149.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5812
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4432 -ip 44321⤵PID:5708
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5216
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4324
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\activity-stream.discovery_stream.json
Filesize19KB
MD5e617c2dee71a10dfa4063bf12019eabd
SHA12ac4d29949eb114d02fc19f4ac4076c95d776493
SHA25633b07b940732a5a0f36608954ab0e99c20a72859b9099bd64e452bc93e9b5596
SHA512c31e83402fc1640956df9f0d730faeeab5193a19773214b19adbd17aa0bb843acd15d7273774c399801f56e13112531eac17a795f1da42399e48b6cac25ee376
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD576caaae97ff13bf73a44e40076347f3c
SHA19c64b41f05808c0dba054e3fb0e20937a013cbbe
SHA2562cfbdf347a14c90452204ea290bce892577b27802b4613920a0edb3f43a49aaf
SHA5127faf0e4e6ffb73c8c743072433f399d95eaad3f6cf56c8dcfd41ed70c3993f20002f65d10582e5f7c4ea5e32dd86814cd45338d6158233267b7bb75e7d7fc3d7
-
Filesize
1.8MB
MD50ddcd6763d9c2104f94916ad73e8e3dc
SHA1f8b8cc9c9e7ac5d74241a7ea87a5a8f22a1dc4a9
SHA2566416d9d75910685b7906b1c59a7d58686ab2a662db443a1aecb2057e66cfde6a
SHA512ee12c0253de7874824e5eaf3e97d80e6a78d3022425821298f6624602b3c4e783e9f388119ca7431635ac7447f473412e31880b6931d1ca0896db095e9a32d39
-
Filesize
1.8MB
MD52f595e9186b87cd4870ea38f16393d8f
SHA14db3549b4dd7c93d8b795e8b194c8f3a105a2b6b
SHA256f8b9bc1fd2af3813bfc5c6197a0d20448c21c86f703835782701092d10a1615a
SHA512e1f8de211fb23c8e492dbf43301267f5712c886657c758b189594de80f9bf23f7428d235ad1672101989f544fa8d0185fd2cc70d78cf17a24649b6a59b5fdfc3
-
Filesize
900KB
MD54b11625a1a51dea74c7dec7f2936dc38
SHA1fc8a89d3ed48bee0ca63e81f6452c90598919a84
SHA25683d6a2b7ea5cd7251ebb679caf3f34cc98c1d6950ed83d6111eaf9610523c317
SHA512c0699960a923eff1fd4a3e0700b5d8b19754eb0b56d7538ab670eef5765d7e202c4c94f47eb0e11b518dfa1642600723ef08adb30c0befaff36bef65d4830d16
-
Filesize
2.7MB
MD5b88c844bf623b8dac6d76610452878d8
SHA17f9dfa7dab8c266a9b53c4b8cc0dbb7f41de42c2
SHA256142e770fba99572a14821f9230e35e51278e667a49e23d2bc571fbb2946bcdd4
SHA51293d72273047ee5355c1c1bd9b7560510d4468c5fa8f959706c9802bd97930d7f7bde165b880be85e5c67b9c1d51be95ff816f19ad74071216bf5696604520e86
-
Filesize
4.2MB
MD5f1b25767284aa3dbb2ee4b14cf43af3f
SHA144880c3fc6dcace137118790a40d1a1a449d8fbc
SHA256738978c433edb4c822b92cd4c9c07c760174f5ac6826c90dd1a80c26e5f431b6
SHA512f4973caa1c10835a483ddf41fb9b6367d2ca74ea90de9156f340ec54f72529726e55bcefc51552542698d320a85cf515c8a6ee7774a186752ab07f1736803a4b
-
Filesize
1.8MB
MD5ffc4509537ae91b049189c9f7bc777e0
SHA1d07824e044eaea5c875d4c234eccdcfb46676720
SHA25673dedcc630ebd68669c7ee7befac513271f3a06b39ba6e20f4a4cb585ea726ad
SHA51261a8271bc25878faa2a012ab7fd1dc60043db8a8bbcf2b16cb396d6ce21732b83f44bbd64eeca887c2227409c3b52683123681803687a3faf6d6677089ed784f
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin
Filesize6KB
MD5d8c142588db2e1b5d9cc0926dafce122
SHA10d653bf65c7b77d9395ed9ee25025d9bfcbeca8a
SHA25677cbbc32990ceb144e8b79eab96a7cdd35225a2268db92095f20ab1b40f8d61e
SHA512a53cde62e437e347e0c47a517b0194477e810b8f5275d0684459f602a1c0ab3c6c5d307f35b82431e87056afae807c70e47f4959cb3a9632ffea4bc91d00f7d0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin
Filesize18KB
MD5d33e4ae8cb396ca4c5e8fda60f6fef14
SHA1bc99169518d2f14c053d221a6f10e3bdb9ea8f96
SHA2561d34dea2e105851bdbbf46f46b09ca032c353ec1efb42ef28fd94b25b1169bf8
SHA5122b20a2f3fa80eb6bb7e3e5291cbb5c33d0ef7f4eedb9e41b4b66263a1a3ecd6fc0f4ff8e2d276dfc2c025ceb03096b2832ac76e6b1825292b882695c6c2fff8d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin
Filesize8KB
MD50b28836bdd48a0743cd8737a4a39d639
SHA1e8fea289eab7a7fd6b59cb0b742e7ad00083813b
SHA256c2322085757e85f69adb2097d81bc8aec61575a98dcace8b88babefc2f022603
SHA5122ad447831f289980f3a1d723c7debfeb7f24119b1da569a7ab2380a5f57a0cf4f77059f30616fee501fae8221d613720ea44f63f01b4231b679b77e331b98aa3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin
Filesize13KB
MD5f03b7cb72bbec1fe108d7e222095f406
SHA19f0c0ff395e9b61f96e89dbd666caccadc15266c
SHA25628c5950ba9042108c195351b4f3286136888eac4da0b685a2bbdcb9e1d82068f
SHA5120534fe45c4b8af4276b0dd8bcd493ee8bb148af1b8c5ec241b94e3a4a640192d329fae8529a87f93bc33abe3ce8c32bc00e247ef7ef96b346c1544784dbcfe46
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5751aefae1051e85057b6550d36354489
SHA1fa51d3e4c232cfd101ed8a38a8ab37fa3630897c
SHA2564975d9ba3fbf1cea99a342aa7fdb5dcb991434866cb238b25732b73efb66e603
SHA512d6b401c91fcd8500e5debe36ec107a697cfe590b0aaff2975c8634fa3984a9c5500142a5b08fad300297d18100e587ec10af01c28ba73095abb79e935918d8b9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5c2d10d487d4681d75d5c96a2aa549725
SHA1a70f4826b7d483a7a55d53593ef6d13e630e5335
SHA2567c35ff611d7633ce3c7fd1b28521a7415d7978ee81573dda4db678aaf4d084ce
SHA51247aa39159c7da478f44c1a4454bee4c6987ce96848e0d388e47b938237d90a35ae50999e0a3af60f6616e8a016bda22f509c973603e5ecd45d8185e29ceadeb4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD52d07f237a7f7de3024d08de25cee0a9d
SHA1d3d1c0543eebac451245e6778db41c871f7a8532
SHA25653d15fe3730fb330383b51532eb7aa9179159f38096aa520dbafae12a097bd52
SHA5129969eabf370b04bb30e024ca46cec2a7548360905fad77b608f87ee9ddf84d4edb6fb7d8ac6fb5f292e2a15fc8f1084a1abdb06df9a6f99bdcc88d75f6466907
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\432d0ccf-1cba-4b52-96df-51cdc1ac9dce
Filesize982B
MD51a6eb0221868f4610c7aede0f8384e65
SHA100471b032797e20e83f670d7f67c40823af2f12f
SHA2564b16feea6708d2eedcd6e28f5f25abf1a711d8a431f8427a5f47faff0738bcfa
SHA512b123a0ced63b39c4c893c70d916e2d988fa107d9ed258c7f925dabc666856e7cf9d4f48ebabcf3837bda69e69a6ee2b019659964e2ba6bf83e489fea44317cbb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\ca3e89b8-5e86-49b9-ad8c-9648d83cf3c3
Filesize671B
MD56f4b144ad929e0c29289467100f85e1b
SHA1fc872c887e3eceb53858c5db92e909fb465c9557
SHA2560ffceadb02d7a49510cdd088a54b83607e1d7236762dd193967d8e04ba37cb2c
SHA512f413321225a22c7fa7eac642ac3b0adf9a1e18d139a7c6c5218a270871ba6ca42b184ef4210b5a0e5871e06fca886c483c81eb421c94037b61bcc4c267cd6e91
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\ce3d376d-0a81-4381-adc8-0b375994b0b1
Filesize26KB
MD5261f43ba9ea874618ae7c70f64610172
SHA1fffca10e089cdc3df3f356ce26e2141908fa94ec
SHA2569321ea00893f2773660639715295d099d7b44abe85ac0fc57dffc1bd9cf559a8
SHA512b85f6657c16ebf893d2ae102d8653a8981a609150f9c9d7959380c41c810e299346030c0c13bcc88eda1470f3b5b590d4d71fa22d669a12fdce69ceda5e0a1f2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
11KB
MD5ffedf3f88c6912ceac786ab2914fe8b0
SHA199e48273e1f6886ec58d83f3af9f57c59fe43574
SHA2568b06536c15fc9362d227c015fa8c8c481dd02381d054d77bf6b57a8637d58a9f
SHA51234d88ba1f8d745208ff29f0ab93e0a55cbb0b5f858e8082de96feb246fc49ea99d76c7cbe73ea57ff82d62b262141364e0ef5f96a1ba0aff86666a6a6524ebfe
-
Filesize
11KB
MD59ad41453f4594c058d499cf2288e0e39
SHA19394395ca944485f6f9609968180943c264cc465
SHA25626be1fc7a4f17cd5bb1ba4bafc63dacc4b8e5e4e0092f4c4399e35c9467d92b4
SHA512c6d3cbbc61305b622e5f905cdce7ad80d01f66466945d33272b76f524405b1d5790d16395f9e6aaf0917cd7988043ca43ac587f5a317e4d09ba8f70265552722
-
Filesize
16KB
MD5ea6a30f75d698bca3e933c20e8b03268
SHA1a9eee0d6dcf1aa6007a50a7122fcc6d707cb5e48
SHA256656bf3372fa4ef4735e9387a5907afd5436daca50f47ef1c501710a7e12bb200
SHA5126b9c152c1a9e3fc2f9d7c019a484281154347073f5190705e0d7271e73a42fe909f68819ab8e1db6e102111acfaf6da1e386fbefb725a70c19a94070fb91a990
-
Filesize
10KB
MD557ecd88e753088e0fad7e84f9d419cb6
SHA1fc3a3f06572cfb72b37d6dcc16d1c8d9608b278d
SHA25664a7849cfce6a117fc08a9d5911f8e113afc03d9dca831cf09b9f48a968bde50
SHA512ea377fbef5245f95b0da669746f820cc9fd9da6091de4dc921eb66488f472dd375076418c652161785a7498139c6d5a0545602bf9c970c522d88250d5fb8697c