Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-11-2024 08:00
Static task
static1
Behavioral task
behavioral1
Sample
c08b1f361fd32addbd45b3fd1154596867a49d23a14860af276944257d5b28e6.exe
Resource
win7-20240903-en
General
-
Target
c08b1f361fd32addbd45b3fd1154596867a49d23a14860af276944257d5b28e6.exe
-
Size
1.9MB
-
MD5
2d9f202b9cfe0024b27b1bde39039432
-
SHA1
33a8fb6cab2ea38c20df5be160df53a2a8768f6c
-
SHA256
c08b1f361fd32addbd45b3fd1154596867a49d23a14860af276944257d5b28e6
-
SHA512
e083b496b394b653e7f758f86aae40b1cfdecd88b2e98cf23d905b0051b07c84412e3a31cffabae471a0417014773ce240afd583c0b796d241356d474367f252
-
SSDEEP
49152:DDj/gXSixGKKuuDVgL4OfZCc/muT0JdD49APk2OxqRX:DcNQKSpgL4iCbuTudaok2OxqB
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Cryptbot family
-
Detects CryptBot payload 1 IoCs
CryptBot is a C++ stealer distributed widely in bundle with other software.
resource yara_rule behavioral1/memory/1816-88-0x0000000069CC0000-0x000000006A71B000-memory.dmp family_cryptbot_v3 -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 97fb886c0d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 97fb886c0d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 97fb886c0d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 97fb886c0d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 97fb886c0d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 97fb886c0d.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c08b1f361fd32addbd45b3fd1154596867a49d23a14860af276944257d5b28e6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 24ac0aa8bc.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4797216e8b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 257ed7f6a7.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 97fb886c0d.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 3336 chrome.exe 1620 chrome.exe 3496 chrome.exe 3152 chrome.exe -
Checks BIOS information in registry 2 TTPs 12 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 24ac0aa8bc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 257ed7f6a7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 97fb886c0d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c08b1f361fd32addbd45b3fd1154596867a49d23a14860af276944257d5b28e6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4797216e8b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 257ed7f6a7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 97fb886c0d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c08b1f361fd32addbd45b3fd1154596867a49d23a14860af276944257d5b28e6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 24ac0aa8bc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4797216e8b.exe -
Executes dropped EXE 8 IoCs
pid Process 2764 skotes.exe 1816 24ac0aa8bc.exe 1708 4797216e8b.exe 448 257ed7f6a7.exe 2080 e93c44ac2a.exe 2704 97fb886c0d.exe 1672 service123.exe 1968 service123.exe -
Identifies Wine through registry keys 2 TTPs 6 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine 97fb886c0d.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine c08b1f361fd32addbd45b3fd1154596867a49d23a14860af276944257d5b28e6.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine 24ac0aa8bc.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine 4797216e8b.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine 257ed7f6a7.exe -
Loads dropped DLL 16 IoCs
pid Process 2384 c08b1f361fd32addbd45b3fd1154596867a49d23a14860af276944257d5b28e6.exe 2764 skotes.exe 2764 skotes.exe 2764 skotes.exe 2764 skotes.exe 2764 skotes.exe 2764 skotes.exe 2764 skotes.exe 2764 skotes.exe 1816 24ac0aa8bc.exe 1816 24ac0aa8bc.exe 3380 WerFault.exe 3380 WerFault.exe 3380 WerFault.exe 1672 service123.exe 1968 service123.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 97fb886c0d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 97fb886c0d.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\97fb886c0d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007616001\\97fb886c0d.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\4797216e8b.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007613001\\4797216e8b.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\257ed7f6a7.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007614001\\257ed7f6a7.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\e93c44ac2a.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007615001\\e93c44ac2a.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x00050000000195c5-106.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 2384 c08b1f361fd32addbd45b3fd1154596867a49d23a14860af276944257d5b28e6.exe 2764 skotes.exe 1816 24ac0aa8bc.exe 1708 4797216e8b.exe 448 257ed7f6a7.exe 2704 97fb886c0d.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job c08b1f361fd32addbd45b3fd1154596867a49d23a14860af276944257d5b28e6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3380 1816 WerFault.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 24ac0aa8bc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4797216e8b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 257ed7f6a7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e93c44ac2a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c08b1f361fd32addbd45b3fd1154596867a49d23a14860af276944257d5b28e6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 97fb886c0d.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 24ac0aa8bc.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 24ac0aa8bc.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 5 IoCs
pid Process 2072 taskkill.exe 2156 taskkill.exe 1680 taskkill.exe 1052 taskkill.exe 2904 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1620 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2384 c08b1f361fd32addbd45b3fd1154596867a49d23a14860af276944257d5b28e6.exe 2764 skotes.exe 1816 24ac0aa8bc.exe 1708 4797216e8b.exe 448 257ed7f6a7.exe 2080 e93c44ac2a.exe 2704 97fb886c0d.exe 2704 97fb886c0d.exe 2080 e93c44ac2a.exe 2080 e93c44ac2a.exe 3336 chrome.exe 3336 chrome.exe 2704 97fb886c0d.exe 2704 97fb886c0d.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 2156 taskkill.exe Token: SeDebugPrivilege 1680 taskkill.exe Token: SeDebugPrivilege 1052 taskkill.exe Token: SeDebugPrivilege 2904 taskkill.exe Token: SeDebugPrivilege 2072 taskkill.exe Token: SeDebugPrivilege 2496 firefox.exe Token: SeDebugPrivilege 2496 firefox.exe Token: SeShutdownPrivilege 3336 chrome.exe Token: SeShutdownPrivilege 3336 chrome.exe Token: SeDebugPrivilege 2704 97fb886c0d.exe -
Suspicious use of FindShellTrayWindow 49 IoCs
pid Process 2384 c08b1f361fd32addbd45b3fd1154596867a49d23a14860af276944257d5b28e6.exe 2080 e93c44ac2a.exe 2080 e93c44ac2a.exe 2080 e93c44ac2a.exe 2080 e93c44ac2a.exe 2080 e93c44ac2a.exe 2080 e93c44ac2a.exe 2496 firefox.exe 2496 firefox.exe 2496 firefox.exe 2496 firefox.exe 2080 e93c44ac2a.exe 2080 e93c44ac2a.exe 2080 e93c44ac2a.exe 2080 e93c44ac2a.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe -
Suspicious use of SendNotifyMessage 13 IoCs
pid Process 2080 e93c44ac2a.exe 2080 e93c44ac2a.exe 2080 e93c44ac2a.exe 2080 e93c44ac2a.exe 2080 e93c44ac2a.exe 2080 e93c44ac2a.exe 2496 firefox.exe 2496 firefox.exe 2496 firefox.exe 2080 e93c44ac2a.exe 2080 e93c44ac2a.exe 2080 e93c44ac2a.exe 2080 e93c44ac2a.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2384 wrote to memory of 2764 2384 c08b1f361fd32addbd45b3fd1154596867a49d23a14860af276944257d5b28e6.exe 30 PID 2384 wrote to memory of 2764 2384 c08b1f361fd32addbd45b3fd1154596867a49d23a14860af276944257d5b28e6.exe 30 PID 2384 wrote to memory of 2764 2384 c08b1f361fd32addbd45b3fd1154596867a49d23a14860af276944257d5b28e6.exe 30 PID 2384 wrote to memory of 2764 2384 c08b1f361fd32addbd45b3fd1154596867a49d23a14860af276944257d5b28e6.exe 30 PID 2764 wrote to memory of 1816 2764 skotes.exe 32 PID 2764 wrote to memory of 1816 2764 skotes.exe 32 PID 2764 wrote to memory of 1816 2764 skotes.exe 32 PID 2764 wrote to memory of 1816 2764 skotes.exe 32 PID 2764 wrote to memory of 1708 2764 skotes.exe 34 PID 2764 wrote to memory of 1708 2764 skotes.exe 34 PID 2764 wrote to memory of 1708 2764 skotes.exe 34 PID 2764 wrote to memory of 1708 2764 skotes.exe 34 PID 2764 wrote to memory of 448 2764 skotes.exe 35 PID 2764 wrote to memory of 448 2764 skotes.exe 35 PID 2764 wrote to memory of 448 2764 skotes.exe 35 PID 2764 wrote to memory of 448 2764 skotes.exe 35 PID 2764 wrote to memory of 2080 2764 skotes.exe 36 PID 2764 wrote to memory of 2080 2764 skotes.exe 36 PID 2764 wrote to memory of 2080 2764 skotes.exe 36 PID 2764 wrote to memory of 2080 2764 skotes.exe 36 PID 2080 wrote to memory of 2156 2080 e93c44ac2a.exe 37 PID 2080 wrote to memory of 2156 2080 e93c44ac2a.exe 37 PID 2080 wrote to memory of 2156 2080 e93c44ac2a.exe 37 PID 2080 wrote to memory of 2156 2080 e93c44ac2a.exe 37 PID 2080 wrote to memory of 1680 2080 e93c44ac2a.exe 40 PID 2080 wrote to memory of 1680 2080 e93c44ac2a.exe 40 PID 2080 wrote to memory of 1680 2080 e93c44ac2a.exe 40 PID 2080 wrote to memory of 1680 2080 e93c44ac2a.exe 40 PID 2080 wrote to memory of 1052 2080 e93c44ac2a.exe 42 PID 2080 wrote to memory of 1052 2080 e93c44ac2a.exe 42 PID 2080 wrote to memory of 1052 2080 e93c44ac2a.exe 42 PID 2080 wrote to memory of 1052 2080 e93c44ac2a.exe 42 PID 2080 wrote to memory of 2904 2080 e93c44ac2a.exe 44 PID 2080 wrote to memory of 2904 2080 e93c44ac2a.exe 44 PID 2080 wrote to memory of 2904 2080 e93c44ac2a.exe 44 PID 2080 wrote to memory of 2904 2080 e93c44ac2a.exe 44 PID 2080 wrote to memory of 2072 2080 e93c44ac2a.exe 46 PID 2080 wrote to memory of 2072 2080 e93c44ac2a.exe 46 PID 2080 wrote to memory of 2072 2080 e93c44ac2a.exe 46 PID 2080 wrote to memory of 2072 2080 e93c44ac2a.exe 46 PID 2080 wrote to memory of 2336 2080 e93c44ac2a.exe 48 PID 2080 wrote to memory of 2336 2080 e93c44ac2a.exe 48 PID 2080 wrote to memory of 2336 2080 e93c44ac2a.exe 48 PID 2080 wrote to memory of 2336 2080 e93c44ac2a.exe 48 PID 2336 wrote to memory of 2496 2336 firefox.exe 49 PID 2336 wrote to memory of 2496 2336 firefox.exe 49 PID 2336 wrote to memory of 2496 2336 firefox.exe 49 PID 2336 wrote to memory of 2496 2336 firefox.exe 49 PID 2336 wrote to memory of 2496 2336 firefox.exe 49 PID 2336 wrote to memory of 2496 2336 firefox.exe 49 PID 2336 wrote to memory of 2496 2336 firefox.exe 49 PID 2336 wrote to memory of 2496 2336 firefox.exe 49 PID 2336 wrote to memory of 2496 2336 firefox.exe 49 PID 2336 wrote to memory of 2496 2336 firefox.exe 49 PID 2336 wrote to memory of 2496 2336 firefox.exe 49 PID 2336 wrote to memory of 2496 2336 firefox.exe 49 PID 2496 wrote to memory of 2696 2496 firefox.exe 50 PID 2496 wrote to memory of 2696 2496 firefox.exe 50 PID 2496 wrote to memory of 2696 2496 firefox.exe 50 PID 2496 wrote to memory of 2592 2496 firefox.exe 51 PID 2496 wrote to memory of 2592 2496 firefox.exe 51 PID 2496 wrote to memory of 2592 2496 firefox.exe 51 PID 2496 wrote to memory of 2592 2496 firefox.exe 51 PID 2496 wrote to memory of 2592 2496 firefox.exe 51 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\c08b1f361fd32addbd45b3fd1154596867a49d23a14860af276944257d5b28e6.exe"C:\Users\Admin\AppData\Local\Temp\c08b1f361fd32addbd45b3fd1154596867a49d23a14860af276944257d5b28e6.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Users\Admin\AppData\Local\Temp\1007612001\24ac0aa8bc.exe"C:\Users\Admin\AppData\Local\Temp\1007612001\24ac0aa8bc.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1816 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3336 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef49b9758,0x7fef49b9768,0x7fef49b97785⤵PID:3352
-
-
C:\Windows\system32\ctfmon.exectfmon.exe5⤵PID:3084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1140 --field-trial-handle=1092,i,13756192747047984546,18233742185818203117,131072 /prefetch:25⤵PID:3172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1504 --field-trial-handle=1092,i,13756192747047984546,18233742185818203117,131072 /prefetch:85⤵PID:3188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1600 --field-trial-handle=1092,i,13756192747047984546,18233742185818203117,131072 /prefetch:85⤵PID:3208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2072 --field-trial-handle=1092,i,13756192747047984546,18233742185818203117,131072 /prefetch:15⤵
- Uses browser remote debugging
PID:1620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2080 --field-trial-handle=1092,i,13756192747047984546,18233742185818203117,131072 /prefetch:15⤵
- Uses browser remote debugging
PID:3496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1376 --field-trial-handle=1092,i,13756192747047984546,18233742185818203117,131072 /prefetch:25⤵PID:2108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9222 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2220 --field-trial-handle=1092,i,13756192747047984546,18233742185818203117,131072 /prefetch:15⤵
- Uses browser remote debugging
PID:3152
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1672
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1620
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1816 -s 9524⤵
- Loads dropped DLL
- Program crash
PID:3380
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007613001\4797216e8b.exe"C:\Users\Admin\AppData\Local\Temp\1007613001\4797216e8b.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1708
-
-
C:\Users\Admin\AppData\Local\Temp\1007614001\257ed7f6a7.exe"C:\Users\Admin\AppData\Local\Temp\1007614001\257ed7f6a7.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:448
-
-
C:\Users\Admin\AppData\Local\Temp\1007615001\e93c44ac2a.exe"C:\Users\Admin\AppData\Local\Temp\1007615001\e93c44ac2a.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2156
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1680
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1052
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2904
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2072
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2496.0.164166871\1242164588" -parentBuildID 20221007134813 -prefsHandle 1252 -prefMapHandle 1120 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a726cd42-d071-4517-927d-764d9b2443e2} 2496 "\\.\pipe\gecko-crash-server-pipe.2496" 1356 112f6b58 gpu6⤵PID:2696
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2496.1.1167689229\1995472121" -parentBuildID 20221007134813 -prefsHandle 1516 -prefMapHandle 1512 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {bba65fa2-6183-436d-b3c0-9e25ada4e700} 2496 "\\.\pipe\gecko-crash-server-pipe.2496" 1528 40f9b58 socket6⤵PID:2592
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2496.2.689444181\136457480" -childID 1 -isForBrowser -prefsHandle 2288 -prefMapHandle 2284 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 824 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a32ad206-2aeb-4709-a903-edfcad7fa90a} 2496 "\\.\pipe\gecko-crash-server-pipe.2496" 2300 11259b58 tab6⤵PID:1736
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2496.3.1047987112\994105125" -childID 2 -isForBrowser -prefsHandle 2812 -prefMapHandle 2808 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 824 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ad8e4fad-8483-47ce-b6cf-5e4dd89b6199} 2496 "\\.\pipe\gecko-crash-server-pipe.2496" 2824 d5d258 tab6⤵PID:2156
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2496.4.604977024\1407459333" -childID 3 -isForBrowser -prefsHandle 3812 -prefMapHandle 3352 -prefsLen 26356 -prefMapSize 233444 -jsInitHandle 824 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {2115230f-7969-4e0b-ba5c-849e367459de} 2496 "\\.\pipe\gecko-crash-server-pipe.2496" 3824 1eed2158 tab6⤵PID:3620
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2496.5.2060134209\1007338523" -childID 4 -isForBrowser -prefsHandle 3956 -prefMapHandle 3960 -prefsLen 26356 -prefMapSize 233444 -jsInitHandle 824 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c67cce5d-4bbb-4d75-bb34-8057ba834414} 2496 "\\.\pipe\gecko-crash-server-pipe.2496" 3944 1f0cf458 tab6⤵PID:3632
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2496.6.380503917\587387439" -childID 5 -isForBrowser -prefsHandle 4156 -prefMapHandle 4160 -prefsLen 26356 -prefMapSize 233444 -jsInitHandle 824 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e5610b0b-356b-44d5-a754-c767b9f5aedf} 2496 "\\.\pipe\gecko-crash-server-pipe.2496" 4144 1f0cee58 tab6⤵PID:3640
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007616001\97fb886c0d.exe"C:\Users\Admin\AppData\Local\Temp\1007616001\97fb886c0d.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2704
-
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3660
-
C:\Windows\system32\taskeng.exetaskeng.exe {67A54EEB-F8D3-4631-B897-A6D598962CCB} S-1-5-21-2872745919-2748461613-2989606286-1000:CCJBVTGQ\Admin:Interactive:[1]1⤵PID:2868
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1968
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\activity-stream.discovery_stream.json.tmp
Filesize29KB
MD5fb57b2738ed9ec2e1980eb33ea103239
SHA1f85b275d9ed9431c03663aed599d71e564d43d20
SHA256701d9d628054a90f1fa8f7586e9af1857ee0fe1f084d0424c9080f5a9d079f0f
SHA512ce74c3b928c6c6ef2c7da4530c9124a9d1c336f27c51a2d7abcd6ddb0b657690370117d286faa290f1065cb2512d2a7b62833fa1827db73ade6c48613b326852
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize13KB
MD5f99b4984bd93547ff4ab09d35b9ed6d5
SHA173bf4d313cb094bb6ead04460da9547106794007
SHA256402571262fd1f6dca336f822ceb0ec2a368a25dfe2f4bfa13b45c983e88b6069
SHA512cd0ed84a24d3faae94290aca1b5ef65eef4cfba8a983da9f88ee3268fc611484a72bd44ca0947c0ca8de174619debae4604e15e4b2c364e636424ba1d37e1759
-
Filesize
4.2MB
MD586dce43872ffd26d6225323bf7f0c76f
SHA19bee03858ee62de271b3b29b0144b27892927a13
SHA2562eeba583715e37c4f8632f58d1c49a6d0ef7fdf6815d4bc7593c492a45aca663
SHA5123768ec45560096f81b6071c201a6bb52f19c294051d2399cd77a6a915e91fa4243d031856321cead807a22f8c71c7bb9c4e1cee1bae70d5d4b9c956abddaa290
-
Filesize
1.8MB
MD57a1f4e4b815b73f671f80a09012fe4f6
SHA1e6cee5745cdc3c66d619a3a9721d32884f6eb348
SHA256b5acc9bfb7c8193548ef6d69fde0e68b7645c9fb55a7d13c5fba56becb830358
SHA512f94343417608e824af93ac0e77a0a6ccaa2db0a71c338c0d9a3eff1859d90e3e53a4fdcefeabe3c7da599b0349a595a8291806d688fe0a2f8e0a211e048dd72e
-
Filesize
1.7MB
MD5c543b2872840d40556cb383bd113cb5f
SHA136a4cf336fab929637a23e5a7c541c1397e775cf
SHA2560cf722b0faacd95724ff91530727c4236da45027fe06882f7485c4ea160ebfb7
SHA512f7b57287f27a8119b1d0c8a5ec4afdc751e1b5574125a5ca3bc973108f8ba53c931708589a5c73c2afd358ef8245d30a21dcecdba7ccb6fd0bc038bb5cee853e
-
Filesize
900KB
MD58c0ecab1bfb7b72e454ccb604d9b01b1
SHA18eb0311bfd146d6c4cec42622c4d3001bef548dc
SHA2560676a41db2bebcb07161a3240c0ad432c5e34acf87c305d5fcbc9ca5bf810696
SHA51296befb3937d66841e0e58151f064e79e121429d2d34f217b47ea8e26fdbb6a54507cf23425646a972aee94c4312facbc5a4fcb170594d72c293474dd8d123c51
-
Filesize
2.7MB
MD56ac52e3a9a029fceeb211529a6c15eaa
SHA1943adba70ce4cd0fc3ccf97978da2b5b507dcfeb
SHA256c4d6ec26e110419eeefeb8121f9be4f059a798d3746e40546d32136e5a12e981
SHA5122188b93600af285097bd412b383234719b875a1b45d8246833a496cde4f06c1cc58e31cff4f441bb5b313bbe61e46b7929b2ed288b13aab99164ec4512fe71d6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
1.9MB
MD52d9f202b9cfe0024b27b1bde39039432
SHA133a8fb6cab2ea38c20df5be160df53a2a8768f6c
SHA256c08b1f361fd32addbd45b3fd1154596867a49d23a14860af276944257d5b28e6
SHA512e083b496b394b653e7f758f86aae40b1cfdecd88b2e98cf23d905b0051b07c84412e3a31cffabae471a0417014773ce240afd583c0b796d241356d474367f252
-
Filesize
442KB
MD585430baed3398695717b0263807cf97c
SHA1fffbee923cea216f50fce5d54219a188a5100f41
SHA256a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA51206511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1
-
Filesize
8.0MB
MD5a01c5ecd6108350ae23d2cddf0e77c17
SHA1c6ac28a2cd979f1f9a75d56271821d5ff665e2b6
SHA256345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42
SHA512b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD565ebfd9fcf397e22df2b2e082a6cbbdd
SHA157e3e62e061474d4a907a03da8c5b14fd321a2fd
SHA2562852030d77fea00530116c43485607762194496c2af056e854c93c0c4a1324d8
SHA512d8ec3af3a301fb9ee4e74d6020c6e75d18418f7ea79e4f6aa33c94663707f513dedf3063426738de7b9ee86f7a0b28b67e2da017dfb52084ded54c566452a71f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\datareporting\glean\pending_pings\2365469d-d056-492f-b92d-f423484a5e5c
Filesize745B
MD5ebe16b3d8ca80103592a4622655c82af
SHA19eaec89a9d831f4abe2da965432e84302db7c1aa
SHA2567fdf333097e3281f446874b297199d546b7e3d9367ad759106e824ae9f532850
SHA512aea51cdab78e2a72c91973e715f58c9debc2793e66e2c0ca7c7b561ab5ea91e82c857f863b4d8cdf574624d381c32f118bc48e0917baddf5e3e8422bdb9a7d0c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\datareporting\glean\pending_pings\de8520b5-ce6f-4be5-b022-9fa15cfad21a
Filesize12KB
MD558d06385adb30b630908a50cb8d20c6e
SHA18140cf4d2373ce2a395397f3814298de15f08dbf
SHA256d4678b980018bae69cf5cbdf4ac51e4a0c17f18c3bf970a41b784b24dd4030a8
SHA5128c0bd30d20a0687566889a3ab07a166927813cf190d5aec1a7dde16ce5af2a4e93a618bca55b426d6262c8b05e3c81a5b100e91856e7bcfeba0e21dad5b44104
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll
Filesize997KB
MD5fe3355639648c417e8307c6d051e3e37
SHA1f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA2561ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA5128f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info
Filesize116B
MD53d33cdc0b3d281e67dd52e14435dd04f
SHA14db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json
Filesize372B
MD58be33af717bb1b67fbd61c3f4b807e9e
SHA17cf17656d174d951957ff36810e874a134dd49e0
SHA256e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd
SHA5126125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll
Filesize11.8MB
MD533bf7b0439480effb9fb212efce87b13
SHA1cee50f2745edc6dc291887b6075ca64d716f495a
SHA2568ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e
SHA512d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig
Filesize1KB
MD5937326fead5fd401f6cca9118bd9ade9
SHA14526a57d4ae14ed29b37632c72aef3c408189d91
SHA25668a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81
SHA512b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2
-
Filesize
7KB
MD5cefd656996d66ca6a333e09ce4e0492d
SHA17f23369bb14be473db3007c3a3304e4feadf5448
SHA2562109964f5fa8d01ae7e9a4e8a8954d34b9bd1394fff5e101f9610055ef0b4b63
SHA5124bac90bb4d6bffd9d22a7f9c410fab34ca7c1ca9993d3db3fada386f7b33cdabfdcaf7d9e39b254f68af94c13b0d524f8eefeec701058c0941bc1499a13b991d
-
Filesize
7KB
MD5a9be14258123e5bdb608ce899363840c
SHA182ebf6f282371210e9f71c8a0487eb9081f88eec
SHA256d45672eb84cbc8c5ace6298bc988050a80d3dbe3d9326d92912d1d6913d319db
SHA5126287a0d623c6afd96d8eee478c08ea5ac2f6032ea5b986b4b35768e690c0c01dc764951c5b9e2ddc8ad07d63407ceec4bc2cc92641ef4202b79d34536c218697
-
Filesize
6KB
MD589d337bf1aa476c04adfae1e1b122fcc
SHA1d8133cd38ab02d69655960b331d5514df2cf63df
SHA256489f484351b8d627b8d8e76b5c7db86ce3611f54b0fb1349e079ef539401411c
SHA512bac76b5e83dbe20e8461f370a1e128d65b08537377a015c879a63734bb96d688f985708d715c639769fbdc4f26ca3e3e0d41a878ef47580ee6a0b3721719c03e
-
Filesize
6KB
MD5f8e5e6383355efa974f1fdee73fc8569
SHA1d559030cdbc44b1ec3531a577203521b21669809
SHA2568a13123f7b432ee73be273d0c59abc83818f0814f5c963b3265d7d3c60f679fa
SHA51206b6a3db3b22c81bc139c8526e0fc79f79d633258ba5a8a903433e33a9c0bbd5438c70f4796f6dafda9fd5504bd2e8b430e2b5c1431f758f1ea40076578091b3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD512f1fecd4b157e00aa0376d87a2fe8cd
SHA13b2725a70593db78765c9fb657459a456f2a056d
SHA2565a0277f2348b7effc1558906b3291ddcff2abedcbeeacb859d353a6ebb1d8326
SHA5127aa8399fed79834d999c8fb1712663ce122a67f158442391809a47a7e208b2ac814846a5c2199c4bd1841e0ebe751dabf899fadf95c859c11c61336726eec98c