Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-11-2024 13:04
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240729-en
General
-
Target
file.exe
-
Size
1.8MB
-
MD5
7be2cc687eef8d6dd4b4e7d94daf7450
-
SHA1
ece181376be01b7acdef5563c63e339ccd1b52ec
-
SHA256
03359670d8c82b48d50c6c70fa6444ea6fac4094fad0813cea78126ad7f1324c
-
SHA512
584a6ccec981fc891beb47b54449a9cd03f63b48e4f7feaef3daaf6c176f4d4d79de333f11f934ec5516f1d94618c4ccb83796d5a7b8a7ea2a5a4041a13ef42a
-
SSDEEP
24576:9bUrK9XjlfMDRJ0sJ2h7EbPAoGl4UXN47WeG4W8jm4goiI1tLxM2mbDzznPE3U37:9bpdBMDDlJA+TRmejLxPmbPcuL1lBb
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://peepburry828.sbs/api
https://processhol.sbs/api
https://p10tgrace.sbs/api
https://3xp3cts1aim.sbs/api
https://p3ar11fter.sbs/api
Signatures
-
Amadey family
-
Cryptbot family
-
Detects CryptBot payload 1 IoCs
CryptBot is a C++ stealer distributed widely in bundle with other software.
resource yara_rule behavioral2/memory/2388-514-0x0000000069CC0000-0x000000006A71B000-memory.dmp family_cryptbot_v3 -
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 3d295144a6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 3d295144a6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 3d295144a6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 3d295144a6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 3d295144a6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 3d295144a6.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rodda.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6fc0f5caa4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1b11438f91.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c1e12f03f9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3d295144a6.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 4216 chrome.exe 5508 chrome.exe 3332 chrome.exe 5164 chrome.exe -
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1b11438f91.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c1e12f03f9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c1e12f03f9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3d295144a6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rodda.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6fc0f5caa4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1b11438f91.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3d295144a6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rodda.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6fc0f5caa4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation file.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 6fc0f5caa4.exe -
Executes dropped EXE 11 IoCs
pid Process 1456 skotes.exe 1932 rodda.exe 2388 6fc0f5caa4.exe 764 1b11438f91.exe 3640 c1e12f03f9.exe 1936 763ff80a67.exe 4696 3d295144a6.exe 5268 skotes.exe 6112 service123.exe 1068 skotes.exe 6028 service123.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine file.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine rodda.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 6fc0f5caa4.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 1b11438f91.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine c1e12f03f9.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 3d295144a6.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe -
Loads dropped DLL 2 IoCs
pid Process 6112 service123.exe 6028 service123.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 3d295144a6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 3d295144a6.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\1b11438f91.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007409001\\1b11438f91.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\c1e12f03f9.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007410001\\c1e12f03f9.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\763ff80a67.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007411001\\763ff80a67.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\3d295144a6.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007412001\\3d295144a6.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000a000000023b82-98.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 4192 file.exe 1456 skotes.exe 1932 rodda.exe 2388 6fc0f5caa4.exe 764 1b11438f91.exe 3640 c1e12f03f9.exe 4696 3d295144a6.exe 5268 skotes.exe 1068 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 764 2388 WerFault.exe 99 -
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rodda.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 763ff80a67.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1b11438f91.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3d295144a6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6fc0f5caa4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c1e12f03f9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 6fc0f5caa4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 6fc0f5caa4.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 5 IoCs
pid Process 1068 taskkill.exe 4616 taskkill.exe 4560 taskkill.exe 5044 taskkill.exe 2088 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3228 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 4192 file.exe 4192 file.exe 1456 skotes.exe 1456 skotes.exe 1932 rodda.exe 1932 rodda.exe 2388 6fc0f5caa4.exe 2388 6fc0f5caa4.exe 764 1b11438f91.exe 764 1b11438f91.exe 3640 c1e12f03f9.exe 3640 c1e12f03f9.exe 1936 763ff80a67.exe 1936 763ff80a67.exe 4696 3d295144a6.exe 4696 3d295144a6.exe 4696 3d295144a6.exe 4696 3d295144a6.exe 4696 3d295144a6.exe 1936 763ff80a67.exe 1936 763ff80a67.exe 5268 skotes.exe 5268 skotes.exe 4216 chrome.exe 4216 chrome.exe 1068 skotes.exe 1068 skotes.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 5044 taskkill.exe Token: SeDebugPrivilege 2088 taskkill.exe Token: SeDebugPrivilege 1068 taskkill.exe Token: SeDebugPrivilege 4616 taskkill.exe Token: SeDebugPrivilege 4560 taskkill.exe Token: SeDebugPrivilege 1736 firefox.exe Token: SeDebugPrivilege 1736 firefox.exe Token: SeDebugPrivilege 4696 3d295144a6.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe -
Suspicious use of FindShellTrayWindow 59 IoCs
pid Process 4192 file.exe 1936 763ff80a67.exe 1936 763ff80a67.exe 1936 763ff80a67.exe 1936 763ff80a67.exe 1936 763ff80a67.exe 1936 763ff80a67.exe 1936 763ff80a67.exe 1936 763ff80a67.exe 1736 firefox.exe 1736 firefox.exe 1736 firefox.exe 1736 firefox.exe 1736 firefox.exe 1736 firefox.exe 1736 firefox.exe 1736 firefox.exe 1736 firefox.exe 1736 firefox.exe 1736 firefox.exe 1736 firefox.exe 1736 firefox.exe 1736 firefox.exe 1736 firefox.exe 1736 firefox.exe 1736 firefox.exe 1736 firefox.exe 1736 firefox.exe 1736 firefox.exe 1736 firefox.exe 1936 763ff80a67.exe 1936 763ff80a67.exe 1936 763ff80a67.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 1936 763ff80a67.exe 1936 763ff80a67.exe 1936 763ff80a67.exe 1936 763ff80a67.exe 1936 763ff80a67.exe 1936 763ff80a67.exe 1936 763ff80a67.exe 1936 763ff80a67.exe 1736 firefox.exe 1736 firefox.exe 1736 firefox.exe 1736 firefox.exe 1736 firefox.exe 1736 firefox.exe 1736 firefox.exe 1736 firefox.exe 1736 firefox.exe 1736 firefox.exe 1736 firefox.exe 1736 firefox.exe 1736 firefox.exe 1736 firefox.exe 1736 firefox.exe 1736 firefox.exe 1736 firefox.exe 1736 firefox.exe 1736 firefox.exe 1736 firefox.exe 1936 763ff80a67.exe 1936 763ff80a67.exe 1936 763ff80a67.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1736 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4192 wrote to memory of 1456 4192 file.exe 86 PID 4192 wrote to memory of 1456 4192 file.exe 86 PID 4192 wrote to memory of 1456 4192 file.exe 86 PID 1456 wrote to memory of 1932 1456 skotes.exe 92 PID 1456 wrote to memory of 1932 1456 skotes.exe 92 PID 1456 wrote to memory of 1932 1456 skotes.exe 92 PID 1456 wrote to memory of 2388 1456 skotes.exe 99 PID 1456 wrote to memory of 2388 1456 skotes.exe 99 PID 1456 wrote to memory of 2388 1456 skotes.exe 99 PID 1456 wrote to memory of 764 1456 skotes.exe 100 PID 1456 wrote to memory of 764 1456 skotes.exe 100 PID 1456 wrote to memory of 764 1456 skotes.exe 100 PID 1456 wrote to memory of 3640 1456 skotes.exe 102 PID 1456 wrote to memory of 3640 1456 skotes.exe 102 PID 1456 wrote to memory of 3640 1456 skotes.exe 102 PID 1456 wrote to memory of 1936 1456 skotes.exe 103 PID 1456 wrote to memory of 1936 1456 skotes.exe 103 PID 1456 wrote to memory of 1936 1456 skotes.exe 103 PID 1936 wrote to memory of 5044 1936 763ff80a67.exe 104 PID 1936 wrote to memory of 5044 1936 763ff80a67.exe 104 PID 1936 wrote to memory of 5044 1936 763ff80a67.exe 104 PID 1936 wrote to memory of 2088 1936 763ff80a67.exe 106 PID 1936 wrote to memory of 2088 1936 763ff80a67.exe 106 PID 1936 wrote to memory of 2088 1936 763ff80a67.exe 106 PID 1936 wrote to memory of 1068 1936 763ff80a67.exe 108 PID 1936 wrote to memory of 1068 1936 763ff80a67.exe 108 PID 1936 wrote to memory of 1068 1936 763ff80a67.exe 108 PID 1936 wrote to memory of 4616 1936 763ff80a67.exe 110 PID 1936 wrote to memory of 4616 1936 763ff80a67.exe 110 PID 1936 wrote to memory of 4616 1936 763ff80a67.exe 110 PID 1936 wrote to memory of 4560 1936 763ff80a67.exe 112 PID 1936 wrote to memory of 4560 1936 763ff80a67.exe 112 PID 1936 wrote to memory of 4560 1936 763ff80a67.exe 112 PID 1456 wrote to memory of 4696 1456 skotes.exe 114 PID 1456 wrote to memory of 4696 1456 skotes.exe 114 PID 1456 wrote to memory of 4696 1456 skotes.exe 114 PID 1936 wrote to memory of 3064 1936 763ff80a67.exe 115 PID 1936 wrote to memory of 3064 1936 763ff80a67.exe 115 PID 3064 wrote to memory of 1736 3064 firefox.exe 116 PID 3064 wrote to memory of 1736 3064 firefox.exe 116 PID 3064 wrote to memory of 1736 3064 firefox.exe 116 PID 3064 wrote to memory of 1736 3064 firefox.exe 116 PID 3064 wrote to memory of 1736 3064 firefox.exe 116 PID 3064 wrote to memory of 1736 3064 firefox.exe 116 PID 3064 wrote to memory of 1736 3064 firefox.exe 116 PID 3064 wrote to memory of 1736 3064 firefox.exe 116 PID 3064 wrote to memory of 1736 3064 firefox.exe 116 PID 3064 wrote to memory of 1736 3064 firefox.exe 116 PID 3064 wrote to memory of 1736 3064 firefox.exe 116 PID 1736 wrote to memory of 3772 1736 firefox.exe 117 PID 1736 wrote to memory of 3772 1736 firefox.exe 117 PID 1736 wrote to memory of 3772 1736 firefox.exe 117 PID 1736 wrote to memory of 3772 1736 firefox.exe 117 PID 1736 wrote to memory of 3772 1736 firefox.exe 117 PID 1736 wrote to memory of 3772 1736 firefox.exe 117 PID 1736 wrote to memory of 3772 1736 firefox.exe 117 PID 1736 wrote to memory of 3772 1736 firefox.exe 117 PID 1736 wrote to memory of 3772 1736 firefox.exe 117 PID 1736 wrote to memory of 3772 1736 firefox.exe 117 PID 1736 wrote to memory of 3772 1736 firefox.exe 117 PID 1736 wrote to memory of 3772 1736 firefox.exe 117 PID 1736 wrote to memory of 3772 1736 firefox.exe 117 PID 1736 wrote to memory of 3772 1736 firefox.exe 117 PID 1736 wrote to memory of 3772 1736 firefox.exe 117 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\1007319001\rodda.exe"C:\Users\Admin\AppData\Local\Temp\1007319001\rodda.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1932
-
-
C:\Users\Admin\AppData\Local\Temp\1007403001\6fc0f5caa4.exe"C:\Users\Admin\AppData\Local\Temp\1007403001\6fc0f5caa4.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2388 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4216 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffdd38ecc40,0x7ffdd38ecc4c,0x7ffdd38ecc585⤵PID:2012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2004,i,5537887875993065036,3694730209161758725,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2000 /prefetch:25⤵PID:4736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1804,i,5537887875993065036,3694730209161758725,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2400 /prefetch:35⤵PID:1060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2136,i,5537887875993065036,3694730209161758725,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2536 /prefetch:85⤵PID:4488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3148,i,5537887875993065036,3694730209161758725,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3228 /prefetch:15⤵
- Uses browser remote debugging
PID:5508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3156,i,5537887875993065036,3694730209161758725,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3380 /prefetch:15⤵
- Uses browser remote debugging
PID:3332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4240,i,5537887875993065036,3694730209161758725,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4396 /prefetch:15⤵
- Uses browser remote debugging
PID:5164
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:6112
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3228
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2388 -s 18164⤵
- Program crash
PID:764
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007409001\1b11438f91.exe"C:\Users\Admin\AppData\Local\Temp\1007409001\1b11438f91.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:764
-
-
C:\Users\Admin\AppData\Local\Temp\1007410001\c1e12f03f9.exe"C:\Users\Admin\AppData\Local\Temp\1007410001\c1e12f03f9.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3640
-
-
C:\Users\Admin\AppData\Local\Temp\1007411001\763ff80a67.exe"C:\Users\Admin\AppData\Local\Temp\1007411001\763ff80a67.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5044
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2088
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1068
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4616
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4560
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1940 -parentBuildID 20240401114208 -prefsHandle 1880 -prefMapHandle 1872 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {1fbcbc0e-cd5d-4cb8-b7ad-cab043d3afb9} 1736 "\\.\pipe\gecko-crash-server-pipe.1736" gpu6⤵PID:3772
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2464 -parentBuildID 20240401114208 -prefsHandle 2456 -prefMapHandle 2452 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8eaecbd7-a31b-46b9-93e5-d849116312fe} 1736 "\\.\pipe\gecko-crash-server-pipe.1736" socket6⤵PID:1532
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3028 -childID 1 -isForBrowser -prefsHandle 3164 -prefMapHandle 2736 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e76654ac-d7ad-4c88-a4f1-4db7b49e81a9} 1736 "\\.\pipe\gecko-crash-server-pipe.1736" tab6⤵PID:1856
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3136 -childID 2 -isForBrowser -prefsHandle 3500 -prefMapHandle 3496 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {28f0917c-6d37-489b-b34f-2811160e47be} 1736 "\\.\pipe\gecko-crash-server-pipe.1736" tab6⤵PID:3520
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4452 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4444 -prefMapHandle 4440 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ace9e1b8-a11b-4f91-8005-786429628e4f} 1736 "\\.\pipe\gecko-crash-server-pipe.1736" utility6⤵
- Checks processor information in registry
PID:5576
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5572 -childID 3 -isForBrowser -prefsHandle 5564 -prefMapHandle 5552 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9995849c-9ce0-419f-aab8-79bbbfcb8826} 1736 "\\.\pipe\gecko-crash-server-pipe.1736" tab6⤵PID:760
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5760 -childID 4 -isForBrowser -prefsHandle 5836 -prefMapHandle 5832 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {859b3d22-81ce-46cf-b88e-48e2e72e3479} 1736 "\\.\pipe\gecko-crash-server-pipe.1736" tab6⤵PID:3188
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6016 -childID 5 -isForBrowser -prefsHandle 5936 -prefMapHandle 5940 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {73a8501e-818d-423d-a544-39bf993e55f6} 1736 "\\.\pipe\gecko-crash-server-pipe.1736" tab6⤵PID:4252
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007412001\3d295144a6.exe"C:\Users\Admin\AppData\Local\Temp\1007412001\3d295144a6.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4696
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5268
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2388 -ip 23881⤵PID:5304
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1068
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:6028
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ws2kncw.default-release\activity-stream.discovery_stream.json
Filesize21KB
MD5f8795f4d31629f3b023ce10a378cb6da
SHA168a974bff4fc2bd853535d826b70ba8dbc04b781
SHA256c588f8aff769d7c9331ee696b0468348d94c115046815651270a3013346cfb8d
SHA512449a4ccec29eef64b0718135a95cbf153249f172c07b563f9308598f659887a41e71d83147d3f140112863b35f72868c656381fa1a7dcde11b31060a3417145f
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ws2kncw.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD55fbd0f75adcfc3ac2ec862eb3c007e8c
SHA14a979e7ce64e60a67109b725c033f81c8702b4f4
SHA2569045ff1b194b451bcc5c3a807d5bb2ed637a21aed089867bea43753f7938e5e6
SHA5127240808a76e75c31b8cc07a526b3f798850c5b735455f58fa794294db4aae0341a39437fe74f7f58aa924f5ee0327d90e0e07fe7d282ceb705811310e4a835ce
-
Filesize
1.8MB
MD586a5d7f66a6aa908260e684c97079ef3
SHA1cc3beab7c38ee4a341bce58937eb8433e4b30990
SHA256b4c6b9f9f3bd55090817a9a10fec28be0db3d90578f6c1cc89a9cce3363a2f91
SHA512bb5087e5729cf2ad204de2259c93ff77fa051212759aae0cd67530211409c205f0bec6cc2eac855fb35515af6fb444f6c1d2c1a42abc6aa4d4d455f1665c62de
-
Filesize
4.2MB
MD546a5f6eb5c061a6c8999c6a3c9cd94b5
SHA1601bec022812bb831ba6416bb55af390b6871cfc
SHA2567696b18fe38e3ab65ae8399367be364777bf685af9f63c22936e4f9c68b42488
SHA512d337bf28b870c1160d102a7a599fac2dcd3a5643e9c5cc71a69600ed81b5b7ef25a03bc7db7a5f8ba2bfeeb0c60ba953fedb44224ddae4c60324a835746d558b
-
Filesize
1.8MB
MD56f312c1be161d6c4ad74eacf45dbedaa
SHA11b4bc727785fdd3866beba78f9bfb23aa3c24b68
SHA256cabfa6f56edf1a06d0d3cf5307376b3ef9ced0dc302359f58419a21a2fb35ce9
SHA51282cd197930a772e0037b85233a65e2f2e1449923810ae9d0371e9b35e80c9a606be7e568cada7050ceddbac10d35ae007c668edc4423b158dc61eaedc474ae31
-
Filesize
1.7MB
MD51d402acdafdb238795c8a55ab5bbc13e
SHA195e793211110e987d921c3dddb8d1e2171824be9
SHA2562550273e781b4c50a35a935a5697e181d310bd6c227cdd5b43d811e7ac1ca14d
SHA512bba8b91139e5127685673b2fa8cfca9688bfe9a62e4645779b964cc82ec9b62e2fd7081894731ff79acef33daf7dbe676c3ef01c39261adb0400c1d9e70faa76
-
Filesize
900KB
MD53debbf2046e946c490b7bbf8f51a160e
SHA1493facbcdcf523588c93e237da53db57c9025845
SHA25634c4f67fae691a6abfca5e375d1a841a8d85d40799d0a5306651e0517d099350
SHA5125efb4b4759c12ae03d099ff58b0e7214f0d474cb520306190c36cacbd9bef7eb503cdc363c69b12c3fe59f4fa58c6aa076fcf9722b74e377c66e19e8d1930dc6
-
Filesize
2.6MB
MD508b77cf45f063be3e81db579d9d03651
SHA15d9a3884b6535b1afcbc4399e032d6c44fdaebb8
SHA2561bc29c66ed96555988b54e4b16bda83e7018d6eb903e734bfc71a3f9b7fa35c2
SHA5122f4a6a7b766a0dc572d6e2acdf3d266f944a57b91727454c9a1f9ced269b86a05e7cb250662e64187c4c55b49e0f8aef04d9667017308ce2c54f630738543bda
-
Filesize
1.8MB
MD57be2cc687eef8d6dd4b4e7d94daf7450
SHA1ece181376be01b7acdef5563c63e339ccd1b52ec
SHA25603359670d8c82b48d50c6c70fa6444ea6fac4094fad0813cea78126ad7f1324c
SHA512584a6ccec981fc891beb47b54449a9cd03f63b48e4f7feaef3daaf6c176f4d4d79de333f11f934ec5516f1d94618c4ccb83796d5a7b8a7ea2a5a4041a13ef42a
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin
Filesize6KB
MD542ceb00038b583d4b29de4c311689397
SHA1a7c7836190799892a5515bccb48b6a499d4b89d8
SHA25640a4952c9c8669d3fa2849284688272d82d419c0ff0f497ac53a3755badf6a62
SHA5126f9d370ebfab2b325967bc23b486fcc0e0cfed0d1cbaf4e1c625fb8ef9361d3c9aa0fb6b65e474403e69b719490fc5d7205fd68d1939b226a61e925c0d1a685c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin
Filesize8KB
MD5cb5844add5b535cdd01556c4df6ee4fa
SHA10e2f7bd067efb7d5989af630ca594f1b7f7be419
SHA2560ff58786861867881ceb8dd5c6d9192279808f99915088f1ed32f21e0a580e00
SHA512ee4e85dc3f540dd786781dbe2dee79446e335968f724a946c3bfddfe82294d5c51a4d15e9518974a4b299903834fb4ec49cc1083f2243a677828bda9d15639b5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin
Filesize13KB
MD56d4d9ac2fc5c973ee896ff4235c03f01
SHA102fcb044e66c73aee26f0669449b0716ed839601
SHA256432dd0450320c6914b78c6739be19db5364c056f1cee1bf4740a5a81bd1f7415
SHA512a06708762c529682ad5c29d196b56ca8b9779e21a621babfc98af79b889591daa3ed80f5795887b4babfcc45413afb0e6f174e1f5c63c17969aa1d9cf6274a5b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5b245b2e104123042163bc5f8d7e8eee9
SHA1a9d70ff54d3f973147266a4d7333c6db0bed8bae
SHA256122fe02128b49c51785a46fd9a9a53f25c2930b86dfdcd585e7f67f4732c8d04
SHA512d82bbd01e422abeea27e831955f11fc2400f7d11e0161b23ab6c661f3aa1096013d976a19563be8eaf8d7fec4719dd4c4415ee71448702115c4fe85b73f60c5d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5a1c4f42f31c085fe90ce4a1fddb2401c
SHA174b3a8f7e472b10154c4c90108f764ad5ed8827b
SHA25680e2c15aebe6b615dfc44c06475234057aa61419cb5e6d8d2cd3faaf9cda9c30
SHA512d6983d8418aab9bcac943e167a030125461d57c471eda72a342923600523a839acda39dc8a69eabfa4d78864cabb9704100e44e2f17207f18dcf9724c395e09b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD521ef0fa5ab0df742ceab2de3eaa7fc87
SHA1386ec3b524dcf265ad9d41e68fabbd9fff783b31
SHA25675d9e79673f2e5e3fff5813da0c35c77a9f02bc61fe34d566b40e45e2bb6981c
SHA512bb8464e429f46f6d7a9937d1442c78991cde667f40be2c064d5ddd3e5aaea572ae536e26f83bcadd90448fe3502e6d230c4191379cd033487d4d0a4288817ddb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\35182d01-ee35-49bd-89f6-c1d25529e669
Filesize671B
MD5901d51c1f6bb2c15c5ad47859bd0c4e9
SHA13ff0a1b543b9857d2eee2fd6a97d5bb913da136c
SHA25639650736f125cc34ef1243f9aa45c8e04ce7728aa2ffd54efa5a7349ec3417d8
SHA512e33e3612f6230261fe4470d73a734c1e6b5ba5529f108eb0e5f2c66e1651f06b81f125cf8cd996c785bebcb9447042bb367fdaee2c18878a66b37b7ad6d3afad
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\56cf164e-414c-4350-b5f2-f7850879a21e
Filesize26KB
MD5e3640eebfa628b35afc0884c3fcf2ae3
SHA10e90636346d33852d4bffb8d392264f1d13fe55a
SHA25658b21d2955ae95ba7a2d0aedeeaf71f2a87e8bbe2b79feada5ec3aaef97cfa80
SHA512918b537ab37ca01b616c76afde8a6056e1575eee2b53e1043e9d39f1c072513f57a6a462ce5ad4a5b2c0c11a151cddc50ea7504f2b9879a1db84758d47e68ed8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\bbc46808-b30c-4529-b9a4-1a20ec34db42
Filesize982B
MD5093ff8a593de0e73772a19809bd33b4b
SHA1c4a6989c75c5d9d8f6db0dcb9fb37d9b7a8eff46
SHA256aa5559b2423aae0cd76ce154b15cb53f41138e8691dcda5e32ea35abc2cfd53a
SHA512a0025d2fc0ba208a2ffa368adc7a553981092e110ae4fd17dbebfbe3a6d90a21765051cb948820d099cf716b68cce4f859809fdcacda9ee65dcf4efa200041e3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
11KB
MD502c6f635a1ae48d12f310c29dcdd165f
SHA1050543ae27a368d4c16d55ea70be448379a7858b
SHA25673f316ec9afae28db2d6022005f1fe4caae4cd73d7d54f248f0e6af9cee7b93d
SHA5129bfa92ecd05abdcbd37288e169a96b28566c201d9ba62042b55bdae1b6b6819fde943bda97d2a1851e630331d8a4bf25ff397d2d593ec4108f7f70706e843b01
-
Filesize
16KB
MD566c90573d8ced58e3bc8c4166d07d59b
SHA199e1a05b03221b0c24e62423b325d510b744ed7a
SHA2566c8058a5f4559a2ecae9225c208563c7677ba0313bcfdc9cbbe983738dd35eea
SHA5123fbab8d8d85733f4ce56ddea99715b4796de45509790ae8a407f95517642666fc93688f5f861a67469249c75b7895cebc79975bf540438253b5c4afbbfc8e4de
-
Filesize
10KB
MD57faa905067782f84647de79dc062bc7d
SHA15317a2a920ef1a1d8f1101f69338f28fac71f082
SHA256c54c3ff817179bf7b272ac930422cec019806dde161919f9d60caee3a220eaf4
SHA512d81c7d42ab642b0ea4983787365d0feba0396ccfa5128e0baaaf95e8b1ee413c5c5bbb0eeeb7cda90d85656bd7148e8006d11df36208b6d09f15f31d7e98575c