Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-11-2024 09:03
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240903-en
General
-
Target
file.exe
-
Size
1.8MB
-
MD5
1b80b47dce750b56636e05526c3335f5
-
SHA1
f59b0dddf4f7e0b105946bf697440305c0a46998
-
SHA256
36bb93f4ce8de7c518e5c8f574aff6c385d597d0d357fa12294c41b4cdd2926a
-
SHA512
d1a23fd292538ba5beb16e8590f276b2f0cd941158aef2f1ff70c12418441189ddddff84cfd50a6c1b5b22f8a654679098c27a7d0fbac2cf755f96dedbfdfffa
-
SSDEEP
49152:G9EeR/Onr598rIpzua/Q3g5CwgbtSwarNMrAiVQ9L:GRR08rIYa/ytxA7iVM
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://processhol.sbs/api
https://p10tgrace.sbs/api
https://peepburry828.sbs/api
https://3xp3cts1aim.sbs/api
https://p3ar11fter.sbs/api
Signatures
-
Amadey family
-
Cryptbot family
-
Detects CryptBot payload 1 IoCs
CryptBot is a C++ stealer distributed widely in bundle with other software.
Processes:
resource yara_rule behavioral2/memory/3576-562-0x0000000069CC0000-0x000000006A71B000-memory.dmp family_cryptbot_v3 -
Lumma family
-
Processes:
2cf1f40724.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 2cf1f40724.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 2cf1f40724.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 2cf1f40724.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 2cf1f40724.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 2cf1f40724.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 2cf1f40724.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
Processes:
a6e4bfc21c.exe20bf3aa6ae.exe2cf1f40724.exeskotes.exeskotes.exefile.exeskotes.exec3fe191b42.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a6e4bfc21c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 20bf3aa6ae.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2cf1f40724.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c3fe191b42.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
Processes:
chrome.exechrome.exechrome.exechrome.exepid Process 5820 chrome.exe 1416 chrome.exe 3992 chrome.exe 5956 chrome.exe -
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
a6e4bfc21c.exe20bf3aa6ae.exec3fe191b42.exe2cf1f40724.exeskotes.exeskotes.exeskotes.exefile.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a6e4bfc21c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 20bf3aa6ae.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c3fe191b42.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2cf1f40724.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a6e4bfc21c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 20bf3aa6ae.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2cf1f40724.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c3fe191b42.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
file.exeskotes.exec3fe191b42.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation file.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation c3fe191b42.exe -
Executes dropped EXE 10 IoCs
Processes:
skotes.exec3fe191b42.exea6e4bfc21c.exe20bf3aa6ae.exef492a154d8.exe2cf1f40724.exeskotes.exeservice123.exeskotes.exeservice123.exepid Process 1228 skotes.exe 3576 c3fe191b42.exe 896 a6e4bfc21c.exe 1008 20bf3aa6ae.exe 5108 f492a154d8.exe 2748 2cf1f40724.exe 5416 skotes.exe 5748 service123.exe 4928 skotes.exe 5616 service123.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
skotes.exeskotes.exefile.exeskotes.exec3fe191b42.exea6e4bfc21c.exe20bf3aa6ae.exe2cf1f40724.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine file.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine c3fe191b42.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine a6e4bfc21c.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine 20bf3aa6ae.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine 2cf1f40724.exe -
Loads dropped DLL 2 IoCs
Processes:
service123.exeservice123.exepid Process 5748 service123.exe 5616 service123.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
2cf1f40724.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 2cf1f40724.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 2cf1f40724.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
skotes.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\a6e4bfc21c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007368001\\a6e4bfc21c.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\20bf3aa6ae.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007369001\\20bf3aa6ae.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\f492a154d8.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007370001\\f492a154d8.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2cf1f40724.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007371001\\2cf1f40724.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/files/0x000a000000023b91-80.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
Processes:
file.exeskotes.exec3fe191b42.exea6e4bfc21c.exe20bf3aa6ae.exe2cf1f40724.exeskotes.exeskotes.exepid Process 232 file.exe 1228 skotes.exe 3576 c3fe191b42.exe 896 a6e4bfc21c.exe 1008 20bf3aa6ae.exe 2748 2cf1f40724.exe 5416 skotes.exe 4928 skotes.exe -
Drops file in Windows directory 1 IoCs
Processes:
file.exedescription ioc Process File created C:\Windows\Tasks\skotes.job file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 1616 3576 WerFault.exe 92 -
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
c3fe191b42.exe2cf1f40724.exefile.exeskotes.exea6e4bfc21c.exetaskkill.exeservice123.exeschtasks.exef492a154d8.exetaskkill.exetaskkill.exe20bf3aa6ae.exetaskkill.exetaskkill.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c3fe191b42.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2cf1f40724.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a6e4bfc21c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f492a154d8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20bf3aa6ae.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exec3fe191b42.exefirefox.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 c3fe191b42.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString c3fe191b42.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Kills process with taskkill 5 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid Process 2016 taskkill.exe 4632 taskkill.exe 1664 taskkill.exe 4464 taskkill.exe 112 taskkill.exe -
Modifies registry class 1 IoCs
Processes:
firefox.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 26 IoCs
Processes:
file.exeskotes.exec3fe191b42.exea6e4bfc21c.exe20bf3aa6ae.exef492a154d8.exe2cf1f40724.exeskotes.exechrome.exeskotes.exepid Process 232 file.exe 232 file.exe 1228 skotes.exe 1228 skotes.exe 3576 c3fe191b42.exe 3576 c3fe191b42.exe 896 a6e4bfc21c.exe 896 a6e4bfc21c.exe 1008 20bf3aa6ae.exe 1008 20bf3aa6ae.exe 5108 f492a154d8.exe 5108 f492a154d8.exe 2748 2cf1f40724.exe 2748 2cf1f40724.exe 5108 f492a154d8.exe 5108 f492a154d8.exe 2748 2cf1f40724.exe 2748 2cf1f40724.exe 2748 2cf1f40724.exe 5416 skotes.exe 5416 skotes.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 4928 skotes.exe 4928 skotes.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid Process 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exefirefox.exe2cf1f40724.exechrome.exedescription pid Process Token: SeDebugPrivilege 2016 taskkill.exe Token: SeDebugPrivilege 4632 taskkill.exe Token: SeDebugPrivilege 1664 taskkill.exe Token: SeDebugPrivilege 4464 taskkill.exe Token: SeDebugPrivilege 112 taskkill.exe Token: SeDebugPrivilege 540 firefox.exe Token: SeDebugPrivilege 540 firefox.exe Token: SeDebugPrivilege 2748 2cf1f40724.exe Token: SeShutdownPrivilege 5820 chrome.exe Token: SeCreatePagefilePrivilege 5820 chrome.exe Token: SeShutdownPrivilege 5820 chrome.exe Token: SeCreatePagefilePrivilege 5820 chrome.exe Token: SeDebugPrivilege 540 firefox.exe Token: SeDebugPrivilege 540 firefox.exe Token: SeDebugPrivilege 540 firefox.exe -
Suspicious use of FindShellTrayWindow 58 IoCs
Processes:
file.exef492a154d8.exefirefox.exechrome.exepid Process 232 file.exe 5108 f492a154d8.exe 5108 f492a154d8.exe 5108 f492a154d8.exe 5108 f492a154d8.exe 5108 f492a154d8.exe 5108 f492a154d8.exe 5108 f492a154d8.exe 540 firefox.exe 540 firefox.exe 540 firefox.exe 540 firefox.exe 540 firefox.exe 540 firefox.exe 540 firefox.exe 540 firefox.exe 540 firefox.exe 540 firefox.exe 540 firefox.exe 540 firefox.exe 540 firefox.exe 540 firefox.exe 540 firefox.exe 540 firefox.exe 540 firefox.exe 540 firefox.exe 540 firefox.exe 540 firefox.exe 540 firefox.exe 5108 f492a154d8.exe 5108 f492a154d8.exe 5108 f492a154d8.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe -
Suspicious use of SendNotifyMessage 30 IoCs
Processes:
f492a154d8.exefirefox.exepid Process 5108 f492a154d8.exe 5108 f492a154d8.exe 5108 f492a154d8.exe 5108 f492a154d8.exe 5108 f492a154d8.exe 5108 f492a154d8.exe 5108 f492a154d8.exe 540 firefox.exe 540 firefox.exe 540 firefox.exe 540 firefox.exe 540 firefox.exe 540 firefox.exe 540 firefox.exe 540 firefox.exe 540 firefox.exe 540 firefox.exe 540 firefox.exe 540 firefox.exe 540 firefox.exe 540 firefox.exe 540 firefox.exe 540 firefox.exe 540 firefox.exe 540 firefox.exe 540 firefox.exe 540 firefox.exe 5108 f492a154d8.exe 5108 f492a154d8.exe 5108 f492a154d8.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
firefox.exepid Process 540 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
file.exeskotes.exef492a154d8.exefirefox.exefirefox.exedescription pid Process procid_target PID 232 wrote to memory of 1228 232 file.exe 86 PID 232 wrote to memory of 1228 232 file.exe 86 PID 232 wrote to memory of 1228 232 file.exe 86 PID 1228 wrote to memory of 3576 1228 skotes.exe 92 PID 1228 wrote to memory of 3576 1228 skotes.exe 92 PID 1228 wrote to memory of 3576 1228 skotes.exe 92 PID 1228 wrote to memory of 896 1228 skotes.exe 95 PID 1228 wrote to memory of 896 1228 skotes.exe 95 PID 1228 wrote to memory of 896 1228 skotes.exe 95 PID 1228 wrote to memory of 1008 1228 skotes.exe 96 PID 1228 wrote to memory of 1008 1228 skotes.exe 96 PID 1228 wrote to memory of 1008 1228 skotes.exe 96 PID 1228 wrote to memory of 5108 1228 skotes.exe 97 PID 1228 wrote to memory of 5108 1228 skotes.exe 97 PID 1228 wrote to memory of 5108 1228 skotes.exe 97 PID 5108 wrote to memory of 2016 5108 f492a154d8.exe 98 PID 5108 wrote to memory of 2016 5108 f492a154d8.exe 98 PID 5108 wrote to memory of 2016 5108 f492a154d8.exe 98 PID 5108 wrote to memory of 4632 5108 f492a154d8.exe 100 PID 5108 wrote to memory of 4632 5108 f492a154d8.exe 100 PID 5108 wrote to memory of 4632 5108 f492a154d8.exe 100 PID 5108 wrote to memory of 1664 5108 f492a154d8.exe 102 PID 5108 wrote to memory of 1664 5108 f492a154d8.exe 102 PID 5108 wrote to memory of 1664 5108 f492a154d8.exe 102 PID 5108 wrote to memory of 4464 5108 f492a154d8.exe 104 PID 5108 wrote to memory of 4464 5108 f492a154d8.exe 104 PID 5108 wrote to memory of 4464 5108 f492a154d8.exe 104 PID 5108 wrote to memory of 112 5108 f492a154d8.exe 106 PID 5108 wrote to memory of 112 5108 f492a154d8.exe 106 PID 5108 wrote to memory of 112 5108 f492a154d8.exe 106 PID 5108 wrote to memory of 4728 5108 f492a154d8.exe 108 PID 5108 wrote to memory of 4728 5108 f492a154d8.exe 108 PID 4728 wrote to memory of 540 4728 firefox.exe 109 PID 4728 wrote to memory of 540 4728 firefox.exe 109 PID 4728 wrote to memory of 540 4728 firefox.exe 109 PID 4728 wrote to memory of 540 4728 firefox.exe 109 PID 4728 wrote to memory of 540 4728 firefox.exe 109 PID 4728 wrote to memory of 540 4728 firefox.exe 109 PID 4728 wrote to memory of 540 4728 firefox.exe 109 PID 4728 wrote to memory of 540 4728 firefox.exe 109 PID 4728 wrote to memory of 540 4728 firefox.exe 109 PID 4728 wrote to memory of 540 4728 firefox.exe 109 PID 4728 wrote to memory of 540 4728 firefox.exe 109 PID 540 wrote to memory of 2736 540 firefox.exe 110 PID 540 wrote to memory of 2736 540 firefox.exe 110 PID 540 wrote to memory of 2736 540 firefox.exe 110 PID 540 wrote to memory of 2736 540 firefox.exe 110 PID 540 wrote to memory of 2736 540 firefox.exe 110 PID 540 wrote to memory of 2736 540 firefox.exe 110 PID 540 wrote to memory of 2736 540 firefox.exe 110 PID 540 wrote to memory of 2736 540 firefox.exe 110 PID 540 wrote to memory of 2736 540 firefox.exe 110 PID 540 wrote to memory of 2736 540 firefox.exe 110 PID 540 wrote to memory of 2736 540 firefox.exe 110 PID 540 wrote to memory of 2736 540 firefox.exe 110 PID 540 wrote to memory of 2736 540 firefox.exe 110 PID 540 wrote to memory of 2736 540 firefox.exe 110 PID 540 wrote to memory of 2736 540 firefox.exe 110 PID 540 wrote to memory of 2736 540 firefox.exe 110 PID 540 wrote to memory of 2736 540 firefox.exe 110 PID 540 wrote to memory of 2736 540 firefox.exe 110 PID 540 wrote to memory of 2736 540 firefox.exe 110 PID 540 wrote to memory of 2736 540 firefox.exe 110 PID 540 wrote to memory of 2736 540 firefox.exe 110 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Users\Admin\AppData\Local\Temp\1007363001\c3fe191b42.exe"C:\Users\Admin\AppData\Local\Temp\1007363001\c3fe191b42.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:3576 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5820 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fff5734cc40,0x7fff5734cc4c,0x7fff5734cc585⤵PID:5832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2012,i,18041641767796838183,16100993573856735651,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2004 /prefetch:25⤵PID:5168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1860,i,18041641767796838183,16100993573856735651,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2284 /prefetch:35⤵PID:5192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2292,i,18041641767796838183,16100993573856735651,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2664 /prefetch:85⤵PID:5160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3188,i,18041641767796838183,16100993573856735651,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3204 /prefetch:15⤵
- Uses browser remote debugging
PID:1416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3208,i,18041641767796838183,16100993573856735651,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3492 /prefetch:15⤵
- Uses browser remote debugging
PID:3992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4276,i,18041641767796838183,16100993573856735651,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4524 /prefetch:15⤵
- Uses browser remote debugging
PID:5956
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5748
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4816
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3576 -s 15044⤵
- Program crash
PID:1616
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007368001\a6e4bfc21c.exe"C:\Users\Admin\AppData\Local\Temp\1007368001\a6e4bfc21c.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:896
-
-
C:\Users\Admin\AppData\Local\Temp\1007369001\20bf3aa6ae.exe"C:\Users\Admin\AppData\Local\Temp\1007369001\20bf3aa6ae.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1008
-
-
C:\Users\Admin\AppData\Local\Temp\1007370001\f492a154d8.exe"C:\Users\Admin\AppData\Local\Temp\1007370001\f492a154d8.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2016
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4632
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1664
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4464
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:112
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1980 -parentBuildID 20240401114208 -prefsHandle 1900 -prefMapHandle 1892 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {4e8ee97b-e074-4e77-8c3c-21349fce9184} 540 "\\.\pipe\gecko-crash-server-pipe.540" gpu6⤵PID:2736
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2436 -parentBuildID 20240401114208 -prefsHandle 2428 -prefMapHandle 2424 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0bb2eb2f-24e3-4815-bed9-7efac60a61d8} 540 "\\.\pipe\gecko-crash-server-pipe.540" socket6⤵PID:4804
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3168 -childID 1 -isForBrowser -prefsHandle 3156 -prefMapHandle 2912 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1220 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a176a20a-5efd-4b1c-a483-962115cb6094} 540 "\\.\pipe\gecko-crash-server-pipe.540" tab6⤵PID:1052
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3812 -childID 2 -isForBrowser -prefsHandle 3800 -prefMapHandle 3796 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1220 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ea4e86a4-d34c-46db-8558-155bf7c9157b} 540 "\\.\pipe\gecko-crash-server-pipe.540" tab6⤵PID:1652
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4528 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4728 -prefMapHandle 4544 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {56d050ab-855f-4351-9e36-f24d500a0cc4} 540 "\\.\pipe\gecko-crash-server-pipe.540" utility6⤵
- Checks processor information in registry
PID:5632
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5224 -childID 3 -isForBrowser -prefsHandle 5248 -prefMapHandle 5220 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1220 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {be226552-d538-4a0e-9288-bff5f24d469b} 540 "\\.\pipe\gecko-crash-server-pipe.540" tab6⤵PID:6088
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5380 -childID 4 -isForBrowser -prefsHandle 5400 -prefMapHandle 4108 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1220 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7e2a1741-35ac-40a4-bb10-caceef175220} 540 "\\.\pipe\gecko-crash-server-pipe.540" tab6⤵PID:6104
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5596 -childID 5 -isForBrowser -prefsHandle 5592 -prefMapHandle 5600 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1220 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {43e8a37c-f756-4cf9-8124-daebeb3ba14e} 540 "\\.\pipe\gecko-crash-server-pipe.540" tab6⤵PID:6124
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007371001\2cf1f40724.exe"C:\Users\Admin\AppData\Local\Temp\1007371001\2cf1f40724.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2748
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5416
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:5992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3576 -ip 35761⤵PID:3356
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4928
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5616
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\n4zftpal.default-release\activity-stream.discovery_stream.json.tmp
Filesize21KB
MD5d447ce8516130cce0026c32a8c09ed75
SHA1f3d8b07e94bf1258e7f21e2dd0386c104530217b
SHA256714c91fe460ed9e19b903d00af04d7031b44fbfa887ff0e809585da66b841b31
SHA5125efb018cdeaee9e4bfced2f48600c26a06e7b9525ab808b2faaf8075299a3b5c3a66ed9d887b8bd1b65a3059b2c565cf8e713fc4ef8273b3cc87186560b98731
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\n4zftpal.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD57249126c9e104c39d60b6236033acb39
SHA17f0dfd676e7edacd6fb5467cd21beb399f953f1d
SHA25685f1bd10ec7d26e51be262d59e7844063f78f76e5c99e8a1ebd5938d60b2e93d
SHA51297ff62f8f89edccb757f453745ae123908629589c57db8804f9351bc5bf4d6d430b00839fa88ac9986a4fb2de97fee2f40c46bccc74b7005b9f5bba495bc56bf
-
Filesize
4.2MB
MD58a650e31804b47bd65f97f71897ecee4
SHA143698b9e15d9d2a198bbefca8d29c989a7af3b45
SHA2562a6e81a997ee42091e15bad50f499dac926a76f2b5ce407455e3e8c5ce741e2f
SHA5122fc486b852e177ce56232890f9697d43cacce4b3047083f256b202f014f153179d932ab2a00175234c8be7c6b875632f4800e916e8a3222582ce5d19a204aacb
-
Filesize
1.8MB
MD5ab570c48878466ff154f152c5cb9a751
SHA1e5415a17919980dd02a619441f4152e369d35c8a
SHA256ebfbf583bd7b3c1199f735161fb3f5c705c2466fefcef918d61e99561cf7da64
SHA5126eff29aaf375089ef53cbe537d37d23f44c7e766659c2b901716894d9775680ada8f71e357044e5008a012d63337556f3041a05d96302bbabcf87c1f11b994bc
-
Filesize
1.7MB
MD53d3ba378bfd3cec1aed3867dada094f8
SHA16821b812edf15bf748914b8b0a0da63da43306ca
SHA25637e7ad79d3ae5ed757ce28561bf2111f0ac264c2f862c41085e516fa1f867258
SHA51279166f423454a71461a7d568ac9e462ab947f7bc4bc45783e11dc04460b97308426a3ce806d2f5185f9605534aca1c82cdbbb73fc0ed57df98f02b61c6a96984
-
Filesize
901KB
MD51c49e5e5aa8c27878d1a053aeeb5b39d
SHA1bd193f53f744539086bf38ff81479e84111313fa
SHA256390b8e377e474a0b1c0d334bbafcf6d789aa7adb46203c970dbb167109edbc5e
SHA5129707f66feaf7e9bc99ff187746afebe91477988a5e914ce9eef7c05dc712022679db89d5754898d87c0f6870d2614d0aa4317242a17b4bff272b88cbbd7a1323
-
Filesize
2.7MB
MD57894e45bd4076d6f2f2093a24726985c
SHA16f0d44e7e74f63eab81dd41721d7c376fb13bb5f
SHA2566a2714cf330fcf0f0e2093fe742e33cc7b5f914ffef91af58088bfe5fbedb921
SHA512e6ca6c4a5b725bb312c3b6388db962bac26d1de508c06245a06c60c4ad0ae8af02b15f362f1a48e4815d05623fa6cf1f01c4f3af5298216831bbb775b80e2985
-
Filesize
1.8MB
MD51b80b47dce750b56636e05526c3335f5
SHA1f59b0dddf4f7e0b105946bf697440305c0a46998
SHA25636bb93f4ce8de7c518e5c8f574aff6c385d597d0d357fa12294c41b4cdd2926a
SHA512d1a23fd292538ba5beb16e8590f276b2f0cd941158aef2f1ff70c12418441189ddddff84cfd50a6c1b5b22f8a654679098c27a7d0fbac2cf755f96dedbfdfffa
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\AlternateServices.bin
Filesize6KB
MD5034fda7df2b8c78c43a2c03986a90f89
SHA18b1acba7b6e4d2312e3af9dda3ded3e1a6506123
SHA256630c763fed7975789dd1209b189cf80d48e36c071f27cf7a79e7f116bdf34728
SHA512140c4aa3834f8bc9b1f46c24a5fee49910d45e6625b9e4d2fb44044d20f0cad16698ec111b908d70cd62d7063d141dedc78f999d6163d3998555f7e5a78b127f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\AlternateServices.bin
Filesize7KB
MD5030a45b4c95cd1039a9cfaba1757fba8
SHA1d8010dbe23a2cac568a20ef6669c9340adedce6f
SHA256751c5d22551e5d367c0ed3365acc718d0e04a077f48d5076b67fed536e7541d0
SHA512153a313f1f2ff0d1c644ff80d9bc722754ac8ae2dd7fc3cd833ad52561ff0a2a626aedadd51c7f0954b4709055c898361cab6f1189ea27c302c98d815c540241
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\AlternateServices.bin
Filesize12KB
MD5b905c3391059fe21b0cba44db933b0f8
SHA179ea300c527b49dc85f5bcff40667cf64e9c4151
SHA256c127faecc78129907f3702ded7938af210a4389133c7eabdb19dbc0ac4411d17
SHA51280c0dbce2ec5f254001cb7fcf0599ba93eb8a3526888fcf02ba7b57a2a40ec19618a186f411227a5ee424f93701d51ea16dc78ccbb2959f4f1b0401cdef5665f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD50b1b662c61e17e699924deed61b69b1e
SHA1fe8570dac9b56eafe544375d34c162de82a4b2ad
SHA2562a1937b7366f171cd3bc2fb8b919fd2cdf26cc6996bdc96ff9a950af19fb6e20
SHA512e4aecf8d75532cb6494b4ce08b769feba0ae4d2cb65b516367d20d2c347aacc28e7e711de3c92fe12e84791ba2332fa9f09f31530bfe884f79dd674eec819146
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5bdfd82b5c55b7bc1f06e663dc8e80505
SHA1eb4fce35c0d20aa89f8d7f74203e3f9a113cb54a
SHA2569bcfd3c406578612ae914ccc0c623dcd29c07a9d87030ead600e793ddeb5c1ce
SHA5123d5bed1ccd1890d29d3f39e5e5666291dc5700fd427255fbf4acaafb605b887d22ffdc21f4998bf87af7a859adfebb4bd6c387a533e57244677d54d477759c2e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\pending_pings\0e18a96a-cc15-483e-a382-d1fe815c2a34
Filesize982B
MD53b28ff6516c8a0250a1d41ca3a3ee763
SHA1af35ca24c469acc46b54e8fe93ff3dedc305a9ae
SHA25637f23025aa30241a057ce8d050e42ab8f4eb5f594751437955714dda2305c8d1
SHA5127037039ac6f61bfa727542573a1fb79d393e6e08c8665fad089d2b2810674c61b3099197f21d1aade0ed4a75f65ec695d15f2318e099cfca46e91229d75010f7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\pending_pings\ba1a9e78-be50-4450-980c-747e20dff674
Filesize25KB
MD523d53b78463d386a86a85025da586b6a
SHA124545dc5dc297b987def80270bd85f3c648a3001
SHA2566e220e439d530cc2540023c1c858038aa87d57121be9c0515ae7049098680011
SHA5128f9e0de6a2ee64e293dadaf6cf9906e57782ebd51b7877cbb3de5e5b4e3a00d877050cc3b094e1f53b2deb6e2908f54130dbd7a71155b7e0888899c79c44729b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\pending_pings\c24ec91d-fa8b-43d6-87f1-918e4a57301f
Filesize671B
MD52c6dadef7dd30b70f41b241a531e63b7
SHA1d05e292874269e904f2c9862ebc4a48633272d26
SHA256bbe551afc832d328108314f4db89562b0f3911557e1f30c145d1c51c1b1d42af
SHA512df379053a0d4dcb0b7f8540e0dde80ac08848d25f20c7584a96ecbe8640ea9617559260d9fd9dac462819331162bad619c7b8e13349431d3c99da5338964a762
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
11KB
MD5e6c4523c4a28ac2b67953ba77975384f
SHA173d802419640be1b0be8a2b3eee79232aa6541d0
SHA25654a5bb1c8e6bb3d7d924d200ddb333331aae01aaf8931dcbf88e259df04ca27b
SHA512b9e4c1ae09b58399efe94994677ecb66196cf9f5a8a8561c03dba82ca69f29ffec539f6f44fbb3e034e62901a919eb0484b59850642d889fb95009c01c3c2873
-
Filesize
16KB
MD597b1872250f96e9d12928372c69dc074
SHA1c482605f236725152269ac13e14b213e639bd3dd
SHA25632ebc909b4b3967b33ac364ffa7fa115d6a4c07fc99e8b88f954e872d9209e8a
SHA512df0da3cf34a5c5709634dc1f260bb2540f3c95a249601f10b91da5bce4e58e73fa435b6adf5fb8ab122aa4cd9a67c4f62dc8550e414d7f7e1a6eedb49647650b
-
Filesize
10KB
MD57c45274e0a90dc040f5ac578d500840d
SHA1349b20a7ed782ec91130f897c30299c27565225e
SHA256e56574abeaf8aa9c03beadc8e305707f5d67daf0b5f2ab20c95bd2181bc67d58
SHA512e790065b4634d0f19083efaaaf79d2ba6631c8762ebe191c0200860505f571acc6fda932b5077a8b85a89cd63c5ddc4ccd4ffc13c9236c10dd6d5485b392ce56
-
Filesize
11KB
MD50676e9e502826957a9ca6195c4361de7
SHA15cf5f10465c1cf2ebd7e80e27a41c6c9b8ab496f
SHA256aafcda5b086f678f496176e62da8c8a2f6352e4cf542670848276b45064f5f1e
SHA512bc02958b4e8959b7841dfe4c52e8ae800695fcd4d7f1c355fe1a1e341f476ab10fda7020a74d65663481904c6e3fa408e82058aa0bb49bbe75a47327c35d9be8
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e