Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 08:21
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240729-en
General
-
Target
file.exe
-
Size
1.8MB
-
MD5
46ab0dfcc0d7963fb73bec088b2e576c
-
SHA1
3300d08f1bb7663295961861bd51abe2a85ff5c6
-
SHA256
2eb9ac7a217fdd500e26a8ad53d15f5a458a79240e58cb31348e820d338138ed
-
SHA512
637feffec1fb32c4c7e97a8184797b0df8c590eb83e2d2e659ff70b331510dcaedd186e18cb4bac00245cfbbf8a1f283f0bb290c0cc541f508476532687d7709
-
SSDEEP
49152:dr1+ox7lz+GcT2/2PlVULOrTECkun1W0Ro7:dh7nzWc2PWKkunc6o
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Cryptbot family
-
Detects CryptBot payload 1 IoCs
CryptBot is a C++ stealer distributed widely in bundle with other software.
resource yara_rule behavioral2/memory/8-59-0x0000000069CC0000-0x000000006A71B000-memory.dmp family_cryptbot_v3 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 9c6db71921.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 9c6db71921.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 9c6db71921.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 9c6db71921.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 9c6db71921.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 9c6db71921.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7206a608fb.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d9ba0a734f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c1d193054b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9c6db71921.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 5584 chrome.exe 5456 chrome.exe 5488 chrome.exe 5920 chrome.exe -
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d9ba0a734f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c1d193054b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c1d193054b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9c6db71921.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7206a608fb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9c6db71921.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7206a608fb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d9ba0a734f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation file.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7206a608fb.exe -
Executes dropped EXE 10 IoCs
pid Process 4856 skotes.exe 8 7206a608fb.exe 1848 d9ba0a734f.exe 1112 c1d193054b.exe 1688 4a164d71eb.exe 2396 9c6db71921.exe 5124 skotes.exe 1060 service123.exe 5880 skotes.exe 2436 service123.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine file.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine 7206a608fb.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine d9ba0a734f.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine c1d193054b.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine 9c6db71921.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine skotes.exe -
Loads dropped DLL 2 IoCs
pid Process 1060 service123.exe 2436 service123.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 9c6db71921.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 9c6db71921.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\d9ba0a734f.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007887001\\d9ba0a734f.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\c1d193054b.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007888001\\c1d193054b.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\4a164d71eb.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007889001\\4a164d71eb.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\9c6db71921.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007890001\\9c6db71921.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0009000000023bbc-93.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 3744 file.exe 4856 skotes.exe 8 7206a608fb.exe 1848 d9ba0a734f.exe 1112 c1d193054b.exe 2396 9c6db71921.exe 5124 skotes.exe 5880 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4784 8 WerFault.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9c6db71921.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d9ba0a734f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4a164d71eb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7206a608fb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c1d193054b.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 7206a608fb.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 7206a608fb.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 5 IoCs
pid Process 2700 taskkill.exe 3620 taskkill.exe 4836 taskkill.exe 1060 taskkill.exe 3896 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2360 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 3744 file.exe 3744 file.exe 4856 skotes.exe 4856 skotes.exe 8 7206a608fb.exe 8 7206a608fb.exe 1848 d9ba0a734f.exe 1848 d9ba0a734f.exe 1112 c1d193054b.exe 1112 c1d193054b.exe 1688 4a164d71eb.exe 1688 4a164d71eb.exe 2396 9c6db71921.exe 2396 9c6db71921.exe 1688 4a164d71eb.exe 1688 4a164d71eb.exe 5584 chrome.exe 5584 chrome.exe 5584 chrome.exe 2396 9c6db71921.exe 2396 9c6db71921.exe 2396 9c6db71921.exe 5124 skotes.exe 5124 skotes.exe 5880 skotes.exe 5880 skotes.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 5584 chrome.exe 5584 chrome.exe 5584 chrome.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeDebugPrivilege 3896 taskkill.exe Token: SeDebugPrivilege 2700 taskkill.exe Token: SeDebugPrivilege 3620 taskkill.exe Token: SeDebugPrivilege 4836 taskkill.exe Token: SeDebugPrivilege 1060 taskkill.exe Token: SeDebugPrivilege 1732 firefox.exe Token: SeDebugPrivilege 1732 firefox.exe Token: SeShutdownPrivilege 5584 chrome.exe Token: SeCreatePagefilePrivilege 5584 chrome.exe Token: SeDebugPrivilege 2396 9c6db71921.exe Token: SeDebugPrivilege 1732 firefox.exe Token: SeDebugPrivilege 1732 firefox.exe Token: SeDebugPrivilege 1732 firefox.exe -
Suspicious use of FindShellTrayWindow 58 IoCs
pid Process 3744 file.exe 1688 4a164d71eb.exe 1688 4a164d71eb.exe 1688 4a164d71eb.exe 1688 4a164d71eb.exe 1688 4a164d71eb.exe 1688 4a164d71eb.exe 1688 4a164d71eb.exe 1732 firefox.exe 1732 firefox.exe 1732 firefox.exe 1732 firefox.exe 1732 firefox.exe 1732 firefox.exe 1732 firefox.exe 1732 firefox.exe 1732 firefox.exe 1732 firefox.exe 1732 firefox.exe 1732 firefox.exe 1732 firefox.exe 1732 firefox.exe 1732 firefox.exe 1732 firefox.exe 1732 firefox.exe 1732 firefox.exe 1732 firefox.exe 1732 firefox.exe 1732 firefox.exe 1688 4a164d71eb.exe 1688 4a164d71eb.exe 1688 4a164d71eb.exe 5584 chrome.exe 5584 chrome.exe 5584 chrome.exe 5584 chrome.exe 5584 chrome.exe 5584 chrome.exe 5584 chrome.exe 5584 chrome.exe 5584 chrome.exe 5584 chrome.exe 5584 chrome.exe 5584 chrome.exe 5584 chrome.exe 5584 chrome.exe 5584 chrome.exe 5584 chrome.exe 5584 chrome.exe 5584 chrome.exe 5584 chrome.exe 5584 chrome.exe 5584 chrome.exe 5584 chrome.exe 5584 chrome.exe 5584 chrome.exe 5584 chrome.exe 5584 chrome.exe -
Suspicious use of SendNotifyMessage 30 IoCs
pid Process 1688 4a164d71eb.exe 1688 4a164d71eb.exe 1688 4a164d71eb.exe 1688 4a164d71eb.exe 1688 4a164d71eb.exe 1688 4a164d71eb.exe 1688 4a164d71eb.exe 1732 firefox.exe 1732 firefox.exe 1732 firefox.exe 1732 firefox.exe 1732 firefox.exe 1732 firefox.exe 1732 firefox.exe 1732 firefox.exe 1732 firefox.exe 1732 firefox.exe 1732 firefox.exe 1732 firefox.exe 1732 firefox.exe 1732 firefox.exe 1732 firefox.exe 1732 firefox.exe 1732 firefox.exe 1732 firefox.exe 1732 firefox.exe 1732 firefox.exe 1688 4a164d71eb.exe 1688 4a164d71eb.exe 1688 4a164d71eb.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1732 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3744 wrote to memory of 4856 3744 file.exe 82 PID 3744 wrote to memory of 4856 3744 file.exe 82 PID 3744 wrote to memory of 4856 3744 file.exe 82 PID 4856 wrote to memory of 8 4856 skotes.exe 88 PID 4856 wrote to memory of 8 4856 skotes.exe 88 PID 4856 wrote to memory of 8 4856 skotes.exe 88 PID 4856 wrote to memory of 1848 4856 skotes.exe 91 PID 4856 wrote to memory of 1848 4856 skotes.exe 91 PID 4856 wrote to memory of 1848 4856 skotes.exe 91 PID 4856 wrote to memory of 1112 4856 skotes.exe 92 PID 4856 wrote to memory of 1112 4856 skotes.exe 92 PID 4856 wrote to memory of 1112 4856 skotes.exe 92 PID 4856 wrote to memory of 1688 4856 skotes.exe 93 PID 4856 wrote to memory of 1688 4856 skotes.exe 93 PID 4856 wrote to memory of 1688 4856 skotes.exe 93 PID 1688 wrote to memory of 3896 1688 4a164d71eb.exe 94 PID 1688 wrote to memory of 3896 1688 4a164d71eb.exe 94 PID 1688 wrote to memory of 3896 1688 4a164d71eb.exe 94 PID 1688 wrote to memory of 2700 1688 4a164d71eb.exe 96 PID 1688 wrote to memory of 2700 1688 4a164d71eb.exe 96 PID 1688 wrote to memory of 2700 1688 4a164d71eb.exe 96 PID 1688 wrote to memory of 3620 1688 4a164d71eb.exe 98 PID 1688 wrote to memory of 3620 1688 4a164d71eb.exe 98 PID 1688 wrote to memory of 3620 1688 4a164d71eb.exe 98 PID 1688 wrote to memory of 4836 1688 4a164d71eb.exe 100 PID 1688 wrote to memory of 4836 1688 4a164d71eb.exe 100 PID 1688 wrote to memory of 4836 1688 4a164d71eb.exe 100 PID 1688 wrote to memory of 1060 1688 4a164d71eb.exe 102 PID 1688 wrote to memory of 1060 1688 4a164d71eb.exe 102 PID 1688 wrote to memory of 1060 1688 4a164d71eb.exe 102 PID 1688 wrote to memory of 4960 1688 4a164d71eb.exe 104 PID 1688 wrote to memory of 4960 1688 4a164d71eb.exe 104 PID 4960 wrote to memory of 1732 4960 firefox.exe 105 PID 4960 wrote to memory of 1732 4960 firefox.exe 105 PID 4960 wrote to memory of 1732 4960 firefox.exe 105 PID 4960 wrote to memory of 1732 4960 firefox.exe 105 PID 4960 wrote to memory of 1732 4960 firefox.exe 105 PID 4960 wrote to memory of 1732 4960 firefox.exe 105 PID 4960 wrote to memory of 1732 4960 firefox.exe 105 PID 4960 wrote to memory of 1732 4960 firefox.exe 105 PID 4960 wrote to memory of 1732 4960 firefox.exe 105 PID 4960 wrote to memory of 1732 4960 firefox.exe 105 PID 4960 wrote to memory of 1732 4960 firefox.exe 105 PID 1732 wrote to memory of 3380 1732 firefox.exe 106 PID 1732 wrote to memory of 3380 1732 firefox.exe 106 PID 1732 wrote to memory of 3380 1732 firefox.exe 106 PID 1732 wrote to memory of 3380 1732 firefox.exe 106 PID 1732 wrote to memory of 3380 1732 firefox.exe 106 PID 1732 wrote to memory of 3380 1732 firefox.exe 106 PID 1732 wrote to memory of 3380 1732 firefox.exe 106 PID 1732 wrote to memory of 3380 1732 firefox.exe 106 PID 1732 wrote to memory of 3380 1732 firefox.exe 106 PID 1732 wrote to memory of 3380 1732 firefox.exe 106 PID 1732 wrote to memory of 3380 1732 firefox.exe 106 PID 1732 wrote to memory of 3380 1732 firefox.exe 106 PID 1732 wrote to memory of 3380 1732 firefox.exe 106 PID 1732 wrote to memory of 3380 1732 firefox.exe 106 PID 1732 wrote to memory of 3380 1732 firefox.exe 106 PID 1732 wrote to memory of 3380 1732 firefox.exe 106 PID 1732 wrote to memory of 3380 1732 firefox.exe 106 PID 1732 wrote to memory of 3380 1732 firefox.exe 106 PID 1732 wrote to memory of 3380 1732 firefox.exe 106 PID 1732 wrote to memory of 3380 1732 firefox.exe 106 PID 1732 wrote to memory of 3380 1732 firefox.exe 106 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Users\Admin\AppData\Local\Temp\1007882001\7206a608fb.exe"C:\Users\Admin\AppData\Local\Temp\1007882001\7206a608fb.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:8 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5584 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffb828ecc40,0x7ffb828ecc4c,0x7ffb828ecc585⤵PID:5620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2272,i,4963188736954654891,11881064204266156726,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2248 /prefetch:25⤵PID:5140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1716,i,4963188736954654891,11881064204266156726,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2400 /prefetch:35⤵PID:5148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=1848,i,4963188736954654891,11881064204266156726,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2556 /prefetch:85⤵PID:3400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3160,i,4963188736954654891,11881064204266156726,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3224 /prefetch:15⤵
- Uses browser remote debugging
PID:5488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3168,i,4963188736954654891,11881064204266156726,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3248 /prefetch:15⤵
- Uses browser remote debugging
PID:5456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4548,i,4963188736954654891,11881064204266156726,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4476 /prefetch:15⤵
- Uses browser remote debugging
PID:5920
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1060
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2360
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8 -s 12564⤵
- Program crash
PID:4784
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007887001\d9ba0a734f.exe"C:\Users\Admin\AppData\Local\Temp\1007887001\d9ba0a734f.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1848
-
-
C:\Users\Admin\AppData\Local\Temp\1007888001\c1d193054b.exe"C:\Users\Admin\AppData\Local\Temp\1007888001\c1d193054b.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1112
-
-
C:\Users\Admin\AppData\Local\Temp\1007889001\4a164d71eb.exe"C:\Users\Admin\AppData\Local\Temp\1007889001\4a164d71eb.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3896
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2700
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3620
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4836
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1060
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1984 -parentBuildID 20240401114208 -prefsHandle 1912 -prefMapHandle 1904 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b3f9ff9b-dfb0-436f-935d-cf5ea62764f6} 1732 "\\.\pipe\gecko-crash-server-pipe.1732" gpu6⤵PID:3380
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2420 -parentBuildID 20240401114208 -prefsHandle 2412 -prefMapHandle 2408 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {dec411ae-ea4d-44e2-be53-65e54c1f6799} 1732 "\\.\pipe\gecko-crash-server-pipe.1732" socket6⤵PID:3756
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2996 -childID 1 -isForBrowser -prefsHandle 3348 -prefMapHandle 3344 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1204 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1f751376-2a11-4e5e-9773-1ac26da0613e} 1732 "\\.\pipe\gecko-crash-server-pipe.1732" tab6⤵PID:4396
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3392 -childID 2 -isForBrowser -prefsHandle 4004 -prefMapHandle 3996 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1204 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e8519b03-3e43-44d2-8ede-c56bc57778f7} 1732 "\\.\pipe\gecko-crash-server-pipe.1732" tab6⤵PID:4704
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4748 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 2784 -prefMapHandle 4656 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cab29683-a1f3-4b88-88c2-1d92f8535c45} 1732 "\\.\pipe\gecko-crash-server-pipe.1732" utility6⤵
- Checks processor information in registry
PID:5164
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5576 -childID 3 -isForBrowser -prefsHandle 5560 -prefMapHandle 5556 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1204 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {960bad49-e48d-4553-bb0c-abe87072b2fe} 1732 "\\.\pipe\gecko-crash-server-pipe.1732" tab6⤵PID:208
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5588 -childID 4 -isForBrowser -prefsHandle 5580 -prefMapHandle 5572 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1204 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {db370f50-25c2-445e-aa36-9df22e344644} 1732 "\\.\pipe\gecko-crash-server-pipe.1732" tab6⤵PID:2988
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5952 -childID 5 -isForBrowser -prefsHandle 5840 -prefMapHandle 5844 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1204 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {02da2a6e-fd88-40a3-8aa0-47c16fdea865} 1732 "\\.\pipe\gecko-crash-server-pipe.1732" tab6⤵PID:4200
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007890001\9c6db71921.exe"C:\Users\Admin\AppData\Local\Temp\1007890001\9c6db71921.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2396
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:5840
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5124
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 8 -ip 81⤵PID:4152
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5880
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2436
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\n4zftpal.default-release\activity-stream.discovery_stream.json
Filesize21KB
MD5d604247551620608b6b4f1a944b28543
SHA1162c8d2f17d490e7d95496f800c571ebced6b351
SHA256c998e832b2cedf8fd089f289ccbdc64fb9499d1eee1667487aed0ff547a83c56
SHA512ddab7b700a8dbed677a7b6ed0f6d95445c90c1f8d4a07afe08167eb7a3b0b3094c4e13ea4bf390f86af97046cff0cf13ee655fd0a0817ab888da377d41d7f930
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\n4zftpal.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD55eba8dadb572fee61413a742fbb00b6b
SHA1bcfe4df1fc2a6fcb86b9565e3f9ff1cb71d2da48
SHA25613b29f735ae2ad683e49998548330c156295b2e83e12ef02857212eba5df8e91
SHA512a009cf5545a281bea10be90d5343646c2ff6f01687c2704fa526c588bd1b264deb6eb45484eef6cbede8bb9738dc56affef066fd98f4891cd12152db9c2876db
-
Filesize
4.2MB
MD56b7999360a3bba7b9c342b9f362d09b3
SHA1eda0601fbe1be5ea51a1eb5bdb0df667329e7c72
SHA256e58f6a0abd6378434abc6d2284e3ce60a0b177d2a01c3214c321016a02eaea09
SHA51233caca1ab2b0ba80a6e8c8ec8caa109012a258ffb23951f26c301f0085a5699bbc2a58c5f3c90e944ccff88be76aa8bb88cee7a2be8e7c9620fe10aeded5f5e3
-
Filesize
1.8MB
MD5370fc731525b5f7087a7de06e2de56e6
SHA11064c9d0fbbc6a762cf6d3c0639908952af2d3a3
SHA256278ccd58931cdc130118295753d00791559ff374bd6629158c5cb8f7c38097be
SHA5129ab2e45aa23a0c95b5575cf042b21b45ed61b6854d7d41446942b80618bff9bbca8e1485f7cd94854dd2e8fea46183d317387a2e1965b0b524fab1e7f7c74100
-
Filesize
1.7MB
MD5e28eb84120c7318b0f8fa7fc2bd79398
SHA1f4a8dcebc79558c8640ffc6c0471c6a173d4853d
SHA2560a8d7dc28c9ef08e79873c4446878a4f5b8a443fa31b4f454d606c4419a338f5
SHA512cafcb6ca3a05f3b494592ca9fdd58a022befce7bf89786a99e57a3e8df2c86a22481e9a36615147adab3ee0db8a3f55cfecc4050fce9c4921c63a9caddd03b43
-
Filesize
901KB
MD5e0069f2a4d93d9c0e7c155264c27d946
SHA14c78774064bbfa8fd5f401c7b4861e2128da9d05
SHA2565ef88aaea0fe174fd198cc9ca3df10ac21352f011c0556c3a9f9e190943d1196
SHA5123d6eea0e53b471f6a7ff1086e45d46f3832da2ef6a05a87272cae997721c17df90c4e4975a02eaec80a4f75919b9a2c31edb2eddce2e9abc8ecc48751df28b76
-
Filesize
2.7MB
MD5221ec47d716b0b9fd63af32c2b339498
SHA1e9dbcdb2d15e0aa0d61765e87ea1366ae3ddf026
SHA25690701cbd3a9e578dcb6f27683bcd18a190c56257e21b824645c16fddee7c4ef9
SHA512c6c78183bf96c21808c656d0c9536c296206f138a708b80811d67a66aa1a1dd14faf526e4fc575b592029a741ab442abb1264c9d2ff6693be21e61e5eadb4047
-
Filesize
1.8MB
MD546ab0dfcc0d7963fb73bec088b2e576c
SHA13300d08f1bb7663295961861bd51abe2a85ff5c6
SHA2562eb9ac7a217fdd500e26a8ad53d15f5a458a79240e58cb31348e820d338138ed
SHA512637feffec1fb32c4c7e97a8184797b0df8c590eb83e2d2e659ff70b331510dcaedd186e18cb4bac00245cfbbf8a1f283f0bb290c0cc541f508476532687d7709
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\AlternateServices.bin
Filesize6KB
MD517fce4f4dd994b4d7d6405e514852720
SHA102bd89454d6e7d77a1fd49188c067410518a665f
SHA2567ad3a3771bffb36edc21a675556ebe0281a60f43760c84f57ff2bad6e26cb0d2
SHA512e71d3ae86485b6e84cb7a3034ccbbd5be5fa320448d5494590c0b4906a847cffc82384dca326c673d4eb50c610c7fad216f40358b27fdae0f5ed2710a3d3b865
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\AlternateServices.bin
Filesize8KB
MD5df3ed99fb5f9cd0aaaead77675fbaa6a
SHA1d6eaddbcedda9d607947d2030bf155ea293a7244
SHA25616ea6433d9c64362f19af689177615ff53bcc67c31ef701d3cc494a3cca1f9ce
SHA5126f6be097d7ff9ec3d53f2020981a29f1ba8db57b1b8187d171ed5fce23d2e8c4941bab1203c767b5287342c394950ca1ce5b686a9e56d25270cc879501813d78
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\AlternateServices.bin
Filesize10KB
MD510e4165c5294d26cbe512165fbdd57ce
SHA1acdfe9a81b71c4960be0976fb79bae0e4c49be21
SHA256ed2e49a49635130cdef9129feccbf05cdc294aacee33563b587750003e44af64
SHA512a3fe8ec5cb3ef22f744bfc19b72f6dc328cb883673451c45d73e7b48c5a7b8e69dcf502b8871836e3aa26a43334a4761bb4a8fff10c0a8f13e2809c26fac790b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5f4a7b88afb2167eb68ec251f2a34ea57
SHA15683fc588cd324a214b0a4c068a40c62d9725f7a
SHA256c21024799188700f30e1fbed9297dd842ad76ce08e1ec0ec32c88be394527cf2
SHA5120ccf59963c474ea948754ca8fb49f4dcb5025309677fe7cda015b56e0914702344bd427f5db7c66ae4a0f0db8424e240a953dd2a7ea57e114a6608678932d166
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5eefd8682eaf11d0d2ef96cf0f4f92d41
SHA1f130fd7c237fdb0562fb8d5ad5ed218fd07781fe
SHA256addc41268358bc85c195ae7d5d4776b545c4c245ad43878f8df251b5bc44d567
SHA512d8f8fc28af22e449e59efd1d6926a1c0e5f5a7084c37a4a5fd0c3dd5f6cf67265e33a82b04d9744d9215c8a9804342342aa92fbb81920c75c71a7892b4752ff4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5efaa07c98a7b6c5bbb746e626a18e47c
SHA1c1b7e0b4f393d4e2e5c2175136d3f11ea9b056c5
SHA256f70cc0af2bd9c52753eb9780e659df7dd2dd82f6bf30c37c770be364967e699f
SHA512737131400d1de8da51641f591c9a57984a4b8c1d05f57f93e5049226b905202a3bc691ca18b38e869280c7d96f2d9356f4cf732b07200c24d372f8b5e4fe1c57
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\pending_pings\62aa067f-e7bc-4305-b9b4-f1f7e0ff0fbd
Filesize24KB
MD5d0610d97a054b3e397ddd6d1691737af
SHA1c8fceb49f67f1ee16456f0ab2160d9ca4635211f
SHA2566f1a3373450b3120d93456d463416d6c94f104e42cc2baa95870ec86f947ca72
SHA51201712be6ff5a2033c058caac139af39409a7fa4e071423319fab08b230683fc5d569149f30cf350c8867f00cd0e3623309e8561c76dadc94ae82dee452562313
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\pending_pings\b72df952-ecbc-4571-826c-3e4495d5730d
Filesize982B
MD5f3bff5b2f0d7d13a5dfe5c2b925fa721
SHA1e99a6b9dffc71d443fdc0b1dd03e4a27595be239
SHA256fb670ac1c16f068e92333d6873de12b32397b2a4de50574b39a9b762e5fb8de0
SHA512f2cfcee13d111f7195109ac8efa184d65736adf2d1888b6c6a43cd518e89a646e1aeb5df37e6fbb4a17aa2d2bd9da79c6f2fd1b57e27778f400e561966089f14
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\pending_pings\bc9b780a-b1a5-43f3-999d-304c48d8cd21
Filesize671B
MD54ecdeab7691349025f1fc5bf87285c3b
SHA1208e62a39577b226a7eb0dd59dab067e8ff6cba1
SHA2566a06513944111839e69fb005e07db4ea9fad240907c32da1a96a36359b6bcc0a
SHA5124ca9b4970f8d8c4a2fa7c3e14d9c0b67fbcee7cdb78f6b4f2b4b139c7a3755f6d0a6902e9ef46586dafb73238a565e7056b3d49863cb77f98e2597ecd652391e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD576dd83ec5d39480fa84b0519f02289f3
SHA12f109e06eb7c0f41edfd3081240d33cd84e56110
SHA256d9ac1b63917e3efbade61adcace7db1cfa029404c1e8f91f08edaa35436145e3
SHA5126b537a77c8d208104fa4f2eedef1e01d0b7c4cef26c88a1863f6fa0434a8cd9383bd063ec5b6aefa8cd91e26c7039aa8d5140f69404c8b76405d2c0aa71a9651
-
Filesize
15KB
MD52b2ab9d23bdf46d02334082063ab3d4e
SHA197f57611d476c337a9fc60e67109d7b0401995e6
SHA256eca9afde83c56c263072c6100d7187f1253044b14802e7a34645c24f05a74030
SHA51224a84fc5e2a376939f9ff441f540ee345fb1805d6aea74faddf4a2364f43e77fdf7d64109f432e094d387b68d61e03d056f3f26acf3b897f327f133393360918
-
Filesize
11KB
MD5bb3807d2bf1b52eb34f28a925a7acb7d
SHA1094772be5ec8dacf352d33d298e8eec2c0918b7f
SHA256211c9db3a81a1ead4d34c4b28c99a39a66379d3de38facf87155d967f8a1f492
SHA5121ef1302a514406bc63fecd08c587711df42d6e87340b958984e00d22c6fc37b5c88e0307eb38e70b616abc2345fe4920765d0c6a1feb94cdeb2f75c7c08988b3
-
Filesize
10KB
MD58ec3bcb62f02f6ba4d6efb06e023846b
SHA16fce2889959867e5b6e450cdf56eb6d234ba3981
SHA2561f14bb05c63800775bc733dab099f383409faaa192de7b5c68b1536b695cf2b6
SHA5129a000cb741fd1b5b6ad03654eb72b359db96fb99d364bd369cabb4dd82eeaf8556886658f9e0b95aacb63392c32328188f66af0b73f770bdeaa7be7d80906a94
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize1.9MB
MD5f8ce98e6377775fa37f2da9b150ba303
SHA165087b152ab408605fde8258b4749a5c24a6e947
SHA256b4cd3f0935ca44159f64b2f0a721684904a593a4f2585d243bcd9541f954c845
SHA512aafc11863f8733375ec8ad88fbfd7dac4ef2f4f77943945e114510bee31e407afc9aadcf50f21af2f55c6bcb2b1ed772e8f8c67a2aab1836f89c7bf1cf66836b