Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22/11/2024, 07:10
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20241023-en
General
-
Target
file.exe
-
Size
1.8MB
-
MD5
e9032bd6b7f9a11522cedfca03475bd2
-
SHA1
c40aaa57ea60cf8e59eab614e9964e8b918da330
-
SHA256
ea138d7d66a019829246b7a005aeae4a983054dcc7f2785148a8891ecbee03f7
-
SHA512
cd09ea873547c8481efe93b1c22d51c40ab29469d5184a56632b61811c596a5d042349c56473da86066b18c4068dc75cf2a1d3941ee0833f0b51115808f5fbd1
-
SSDEEP
49152:a6FQLJIs5Yt1UfEjICgpaQ3/v+GHRRM3l:hqL0TSv+GxE
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Cryptbot family
-
Detects CryptBot payload 1 IoCs
CryptBot is a C++ stealer distributed widely in bundle with other software.
resource yara_rule behavioral2/memory/2304-2223-0x0000000069CC0000-0x000000006A71B000-memory.dmp family_cryptbot_v3 -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 35316e6fe5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 35316e6fe5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 35316e6fe5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 35316e6fe5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 35316e6fe5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 35316e6fe5.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 35316e6fe5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8f01ec0e49.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5ae929a055.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ea78463cf4.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 5840 chrome.exe 3472 chrome.exe 2992 chrome.exe 716 chrome.exe -
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8f01ec0e49.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5ae929a055.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8f01ec0e49.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ea78463cf4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 35316e6fe5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ea78463cf4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 35316e6fe5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5ae929a055.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 8f01ec0e49.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation file.exe -
Executes dropped EXE 10 IoCs
pid Process 2760 skotes.exe 3756 5ae929a055.exe 4732 ea78463cf4.exe 2324 df685185cc.exe 6012 35316e6fe5.exe 2304 8f01ec0e49.exe 224 skotes.exe 2904 service123.exe 5536 skotes.exe 5836 service123.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 35316e6fe5.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 8f01ec0e49.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine file.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 5ae929a055.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine ea78463cf4.exe -
Loads dropped DLL 2 IoCs
pid Process 2904 service123.exe 5836 service123.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 35316e6fe5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 35316e6fe5.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5ae929a055.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008130001\\5ae929a055.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ea78463cf4.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008131001\\ea78463cf4.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\df685185cc.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008132001\\df685185cc.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\35316e6fe5.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008133001\\35316e6fe5.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000023cc0-65.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 4644 file.exe 2760 skotes.exe 3756 5ae929a055.exe 4732 ea78463cf4.exe 6012 35316e6fe5.exe 2304 8f01ec0e49.exe 224 skotes.exe 5536 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5140 2304 WerFault.exe 114 -
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea78463cf4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language df685185cc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5ae929a055.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8f01ec0e49.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 35316e6fe5.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 8f01ec0e49.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 8f01ec0e49.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 5 IoCs
pid Process 1568 taskkill.exe 4332 taskkill.exe 2468 taskkill.exe 2108 taskkill.exe 2912 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1768 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 4644 file.exe 4644 file.exe 2760 skotes.exe 2760 skotes.exe 3756 5ae929a055.exe 3756 5ae929a055.exe 4732 ea78463cf4.exe 4732 ea78463cf4.exe 2324 df685185cc.exe 2324 df685185cc.exe 6012 35316e6fe5.exe 6012 35316e6fe5.exe 2324 df685185cc.exe 2324 df685185cc.exe 6012 35316e6fe5.exe 6012 35316e6fe5.exe 6012 35316e6fe5.exe 2304 8f01ec0e49.exe 2304 8f01ec0e49.exe 224 skotes.exe 224 skotes.exe 5840 chrome.exe 5840 chrome.exe 5536 skotes.exe 5536 skotes.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 5840 chrome.exe 5840 chrome.exe 5840 chrome.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeDebugPrivilege 1568 taskkill.exe Token: SeDebugPrivilege 4332 taskkill.exe Token: SeDebugPrivilege 2468 taskkill.exe Token: SeDebugPrivilege 2108 taskkill.exe Token: SeDebugPrivilege 2912 taskkill.exe Token: SeDebugPrivilege 4008 firefox.exe Token: SeDebugPrivilege 4008 firefox.exe Token: SeDebugPrivilege 6012 35316e6fe5.exe Token: SeShutdownPrivilege 5840 chrome.exe Token: SeCreatePagefilePrivilege 5840 chrome.exe Token: SeShutdownPrivilege 5840 chrome.exe Token: SeCreatePagefilePrivilege 5840 chrome.exe Token: SeDebugPrivilege 4008 firefox.exe Token: SeDebugPrivilege 4008 firefox.exe Token: SeDebugPrivilege 4008 firefox.exe -
Suspicious use of FindShellTrayWindow 58 IoCs
pid Process 4644 file.exe 2324 df685185cc.exe 2324 df685185cc.exe 2324 df685185cc.exe 2324 df685185cc.exe 2324 df685185cc.exe 2324 df685185cc.exe 4008 firefox.exe 4008 firefox.exe 4008 firefox.exe 4008 firefox.exe 4008 firefox.exe 4008 firefox.exe 4008 firefox.exe 4008 firefox.exe 4008 firefox.exe 4008 firefox.exe 4008 firefox.exe 4008 firefox.exe 4008 firefox.exe 4008 firefox.exe 4008 firefox.exe 4008 firefox.exe 4008 firefox.exe 4008 firefox.exe 4008 firefox.exe 4008 firefox.exe 4008 firefox.exe 2324 df685185cc.exe 2324 df685185cc.exe 2324 df685185cc.exe 2324 df685185cc.exe 5840 chrome.exe 5840 chrome.exe 5840 chrome.exe 5840 chrome.exe 5840 chrome.exe 5840 chrome.exe 5840 chrome.exe 5840 chrome.exe 5840 chrome.exe 5840 chrome.exe 5840 chrome.exe 5840 chrome.exe 5840 chrome.exe 5840 chrome.exe 5840 chrome.exe 5840 chrome.exe 5840 chrome.exe 5840 chrome.exe 5840 chrome.exe 5840 chrome.exe 5840 chrome.exe 5840 chrome.exe 5840 chrome.exe 5840 chrome.exe 5840 chrome.exe 5840 chrome.exe -
Suspicious use of SendNotifyMessage 30 IoCs
pid Process 2324 df685185cc.exe 2324 df685185cc.exe 2324 df685185cc.exe 2324 df685185cc.exe 2324 df685185cc.exe 2324 df685185cc.exe 4008 firefox.exe 4008 firefox.exe 4008 firefox.exe 4008 firefox.exe 4008 firefox.exe 4008 firefox.exe 4008 firefox.exe 4008 firefox.exe 4008 firefox.exe 4008 firefox.exe 4008 firefox.exe 4008 firefox.exe 4008 firefox.exe 4008 firefox.exe 4008 firefox.exe 4008 firefox.exe 4008 firefox.exe 4008 firefox.exe 4008 firefox.exe 4008 firefox.exe 2324 df685185cc.exe 2324 df685185cc.exe 2324 df685185cc.exe 2324 df685185cc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4008 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4644 wrote to memory of 2760 4644 file.exe 82 PID 4644 wrote to memory of 2760 4644 file.exe 82 PID 4644 wrote to memory of 2760 4644 file.exe 82 PID 2760 wrote to memory of 3756 2760 skotes.exe 87 PID 2760 wrote to memory of 3756 2760 skotes.exe 87 PID 2760 wrote to memory of 3756 2760 skotes.exe 87 PID 2760 wrote to memory of 4732 2760 skotes.exe 91 PID 2760 wrote to memory of 4732 2760 skotes.exe 91 PID 2760 wrote to memory of 4732 2760 skotes.exe 91 PID 2760 wrote to memory of 2324 2760 skotes.exe 92 PID 2760 wrote to memory of 2324 2760 skotes.exe 92 PID 2760 wrote to memory of 2324 2760 skotes.exe 92 PID 2324 wrote to memory of 1568 2324 df685185cc.exe 93 PID 2324 wrote to memory of 1568 2324 df685185cc.exe 93 PID 2324 wrote to memory of 1568 2324 df685185cc.exe 93 PID 2324 wrote to memory of 4332 2324 df685185cc.exe 95 PID 2324 wrote to memory of 4332 2324 df685185cc.exe 95 PID 2324 wrote to memory of 4332 2324 df685185cc.exe 95 PID 2324 wrote to memory of 2468 2324 df685185cc.exe 97 PID 2324 wrote to memory of 2468 2324 df685185cc.exe 97 PID 2324 wrote to memory of 2468 2324 df685185cc.exe 97 PID 2324 wrote to memory of 2108 2324 df685185cc.exe 99 PID 2324 wrote to memory of 2108 2324 df685185cc.exe 99 PID 2324 wrote to memory of 2108 2324 df685185cc.exe 99 PID 2324 wrote to memory of 2912 2324 df685185cc.exe 101 PID 2324 wrote to memory of 2912 2324 df685185cc.exe 101 PID 2324 wrote to memory of 2912 2324 df685185cc.exe 101 PID 2324 wrote to memory of 1608 2324 df685185cc.exe 103 PID 2324 wrote to memory of 1608 2324 df685185cc.exe 103 PID 1608 wrote to memory of 4008 1608 firefox.exe 104 PID 1608 wrote to memory of 4008 1608 firefox.exe 104 PID 1608 wrote to memory of 4008 1608 firefox.exe 104 PID 1608 wrote to memory of 4008 1608 firefox.exe 104 PID 1608 wrote to memory of 4008 1608 firefox.exe 104 PID 1608 wrote to memory of 4008 1608 firefox.exe 104 PID 1608 wrote to memory of 4008 1608 firefox.exe 104 PID 1608 wrote to memory of 4008 1608 firefox.exe 104 PID 1608 wrote to memory of 4008 1608 firefox.exe 104 PID 1608 wrote to memory of 4008 1608 firefox.exe 104 PID 1608 wrote to memory of 4008 1608 firefox.exe 104 PID 4008 wrote to memory of 2812 4008 firefox.exe 105 PID 4008 wrote to memory of 2812 4008 firefox.exe 105 PID 4008 wrote to memory of 2812 4008 firefox.exe 105 PID 4008 wrote to memory of 2812 4008 firefox.exe 105 PID 4008 wrote to memory of 2812 4008 firefox.exe 105 PID 4008 wrote to memory of 2812 4008 firefox.exe 105 PID 4008 wrote to memory of 2812 4008 firefox.exe 105 PID 4008 wrote to memory of 2812 4008 firefox.exe 105 PID 4008 wrote to memory of 2812 4008 firefox.exe 105 PID 4008 wrote to memory of 2812 4008 firefox.exe 105 PID 4008 wrote to memory of 2812 4008 firefox.exe 105 PID 4008 wrote to memory of 2812 4008 firefox.exe 105 PID 4008 wrote to memory of 2812 4008 firefox.exe 105 PID 4008 wrote to memory of 2812 4008 firefox.exe 105 PID 4008 wrote to memory of 2812 4008 firefox.exe 105 PID 4008 wrote to memory of 2812 4008 firefox.exe 105 PID 4008 wrote to memory of 2812 4008 firefox.exe 105 PID 4008 wrote to memory of 2812 4008 firefox.exe 105 PID 4008 wrote to memory of 2812 4008 firefox.exe 105 PID 4008 wrote to memory of 2812 4008 firefox.exe 105 PID 4008 wrote to memory of 2812 4008 firefox.exe 105 PID 4008 wrote to memory of 2812 4008 firefox.exe 105 PID 4008 wrote to memory of 2812 4008 firefox.exe 105 PID 4008 wrote to memory of 2812 4008 firefox.exe 105 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\1008130001\5ae929a055.exe"C:\Users\Admin\AppData\Local\Temp\1008130001\5ae929a055.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3756
-
-
C:\Users\Admin\AppData\Local\Temp\1008131001\ea78463cf4.exe"C:\Users\Admin\AppData\Local\Temp\1008131001\ea78463cf4.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4732
-
-
C:\Users\Admin\AppData\Local\Temp\1008132001\df685185cc.exe"C:\Users\Admin\AppData\Local\Temp\1008132001\df685185cc.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1568
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4332
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2468
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2108
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2912
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1968 -parentBuildID 20240401114208 -prefsHandle 1896 -prefMapHandle 1888 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {1a13b2d7-707a-407e-a62a-572ec5a59c33} 4008 "\\.\pipe\gecko-crash-server-pipe.4008" gpu6⤵PID:2812
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2404 -parentBuildID 20240401114208 -prefsHandle 2396 -prefMapHandle 2392 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8854785d-f2b9-4b73-9c05-924f20677f3a} 4008 "\\.\pipe\gecko-crash-server-pipe.4008" socket6⤵PID:1320
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3052 -childID 1 -isForBrowser -prefsHandle 2832 -prefMapHandle 2912 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1288 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5010f4aa-eeb5-493b-a99e-df68ebc87ea9} 4008 "\\.\pipe\gecko-crash-server-pipe.4008" tab6⤵PID:4512
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2592 -childID 2 -isForBrowser -prefsHandle 3920 -prefMapHandle 3916 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1288 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ce6c432e-ed22-4a3d-962a-a60168e540be} 4008 "\\.\pipe\gecko-crash-server-pipe.4008" tab6⤵PID:580
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4908 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4900 -prefMapHandle 4844 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0aacffc0-05c7-401c-bbe2-89a2eac94056} 4008 "\\.\pipe\gecko-crash-server-pipe.4008" utility6⤵
- Checks processor information in registry
PID:708
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5416 -childID 3 -isForBrowser -prefsHandle 5432 -prefMapHandle 5428 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1288 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e43d4d4f-2b45-4848-a030-90dc262a310b} 4008 "\\.\pipe\gecko-crash-server-pipe.4008" tab6⤵PID:5640
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5564 -childID 4 -isForBrowser -prefsHandle 5572 -prefMapHandle 5576 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1288 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {276a6c06-3e65-466c-bd06-2803b7bd8859} 4008 "\\.\pipe\gecko-crash-server-pipe.4008" tab6⤵PID:5652
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5756 -childID 5 -isForBrowser -prefsHandle 5764 -prefMapHandle 5768 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1288 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0dec36b9-d051-400c-8b83-c6093db076a1} 4008 "\\.\pipe\gecko-crash-server-pipe.4008" tab6⤵PID:5664
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1008133001\35316e6fe5.exe"C:\Users\Admin\AppData\Local\Temp\1008133001\35316e6fe5.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6012
-
-
C:\Users\Admin\AppData\Local\Temp\1008134001\8f01ec0e49.exe"C:\Users\Admin\AppData\Local\Temp\1008134001\8f01ec0e49.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2304 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5840 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffc05dacc40,0x7ffc05dacc4c,0x7ffc05dacc585⤵PID:5856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1912,i,12983097968521070539,14722272346081708426,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1908 /prefetch:25⤵PID:5296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1724,i,12983097968521070539,14722272346081708426,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1720 /prefetch:35⤵PID:1728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2264,i,12983097968521070539,14722272346081708426,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2456 /prefetch:85⤵PID:3464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3172,i,12983097968521070539,14722272346081708426,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3180 /prefetch:15⤵
- Uses browser remote debugging
PID:2992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3184,i,12983097968521070539,14722272346081708426,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3220 /prefetch:15⤵
- Uses browser remote debugging
PID:3472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3168,i,12983097968521070539,14722272346081708426,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4440 /prefetch:15⤵
- Uses browser remote debugging
PID:716
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2904
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1768
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2304 -s 18284⤵
- Program crash
PID:5140
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:224
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4532
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2304 -ip 23041⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5536
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5836
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\activity-stream.discovery_stream.json
Filesize28KB
MD5a83f74268926e7613a0e062e74d1c780
SHA1a2083dca5ec5deb71c74c32b3779e39e8cbdc4d5
SHA2563e154ce4d16b78585276ca0013c3d76c71a2478e0bb8c2f0242ffb19f77213ed
SHA51291661d3c9346f0a2a1402715c656280fa7616e3d4d8a6d4057551d7a4a8ec3019dc4aaebbd38ea795b373937934a1e608045d6072126478b8b4749a048a77090
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD52a87c17d889a152b1118b866435c0df7
SHA1e074ba6302a2d9547b94c7dbfa2c78b599ff02af
SHA2560736fd24216fc6a68e57f84c2dfa219e5faba792ce081dd2a2bdd5e6c7e56ceb
SHA5122fe90981c66703ff1f90e9eabfbd09ff833a2a35a2c0b425caf99a8897eb24a4741a71545342dfae3f289fd0d32eb6e649df1d9c853d48336713dee9f96c161a
-
Filesize
1.8MB
MD5d34f17d6aa0d5d4e1c9643a393638b80
SHA15aca7b99b7ab1d900c16fc28ff4be85afcbc1b54
SHA256bd1bc09dba48d5eb9eefd72ba02d47c9bd2684192bcfe733e1faf177d5e1af2d
SHA512fa4905b822b2341055cc7a93b833741b08c956b2a3fed9b35fd4d257dcd691f1068f25b269fe41c88fd56d33aec5bedebaeb833cff39c5de838f83ba94148b65
-
Filesize
1.7MB
MD56edefc0c895756e5e929668b5f804c1f
SHA137cc66db57185d2dd9827f2a5670fe527592d5d2
SHA2564cda37f0fdd836cfebb3df05dc550fff54eab9f7a9959c083ce50d0f049aa0a0
SHA5125f34e6de56f5d86d59ccbb966b1dbff64ef8b2a759bc9cfbadde40e05d6c2924940a6c63329f633d9464ac8ae35dc9ada419ad3436dc787a2b1bfbe7c120b13c
-
Filesize
901KB
MD5781a0148b24f27699d9870c1c081a45f
SHA1e890780bff30ccf6ea3045cbc92be601e18db9ed
SHA256e9c8d89cf714460554b7612b59b588e9524635cfb5def3081f3ce430adaacb97
SHA512c12d55698c1d22f5cf68facaa16e4b4f67e300406c2b0550ded6badc3c91dc96f0b237179b9e23ef96f51b44f0553bb902ebe740290e07decd3b8437df532ac8
-
Filesize
2.6MB
MD5d4f5cffd064699c0e7cc6d22ef93ca47
SHA1ade110656bee4db7f9a7a93be0789b976692ba76
SHA256740550407f1a9199d252d17a72f4f755e8e55505e372ad0437e170762d8fa333
SHA512fc2863f0fbc938922d4b56bc830ab4609cd6c3e5d272242d86d5cbd7eae76f17f332eb099193f4ea37a1567bc09c6e06515b5432c2b9b112678eb352b371a9dd
-
Filesize
4.2MB
MD5455d3e46c7b97c0e6f1ed1072e8ec7b1
SHA1fa1bc295a7f78dce0c28bf9c24a7fe16e8b6bc55
SHA256f5c02d06937793096e56f2acd5b302fe7cdcdfbdf943c9ee269b50037753969f
SHA512ef0b87b68dc6bb80f41d64c94b3e0d1170f9e9e02eaa191748e12bf32c8efe63d94063667a4cc6ec3c72094288b873b9fcb109b1885551111f0e6b59fc01181d
-
Filesize
1.8MB
MD5e9032bd6b7f9a11522cedfca03475bd2
SHA1c40aaa57ea60cf8e59eab614e9964e8b918da330
SHA256ea138d7d66a019829246b7a005aeae4a983054dcc7f2785148a8891ecbee03f7
SHA512cd09ea873547c8481efe93b1c22d51c40ab29469d5184a56632b61811c596a5d042349c56473da86066b18c4068dc75cf2a1d3941ee0833f0b51115808f5fbd1
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\AlternateServices.bin
Filesize8KB
MD55b3b84be9e577845d8bd3635d29d0101
SHA14c1df715beb7b51083755b094e589bcaa43881f7
SHA256a5e3abddbf6139589004c2f38fb319c2278a594f9f223a312bf01ec34b56e4b6
SHA5124c03a10369e4fc714a993aedbf1bbe8ebd9526302ef506c13fbc30713a6563ea29a72063c68cb12cbbd51ba4346ea2e66a20acd5fa4a71ec5d5d8cebfb1a2841
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\AlternateServices.bin
Filesize6KB
MD5c80655c68ab21bd2a955d0119e1e7dd6
SHA1a815d77aa983a42ad59e72b3ab725a51d9fdbcc4
SHA2565d0707bf768ee23b24d1b70324d040b25da7fb328cadb11b28e0e973eafa5553
SHA5124eb18603ae800c15f7be67f67db2e8cefc234f698ff349b0c179061c614af9cdf151bde9e43a0f83795aa0221693909af014698558f3ed2047c5ec125df64339
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD54d220782374662819360cff0fec3a69b
SHA1473b4c5538faef4a0303007188fce46066070764
SHA2565821143a2f6330eeb11bbc4e221acb34b10cced2b3a258f25afe01b07462cfe3
SHA5122f44d9a9caae756156cb900d465e4615dc48ac78338f4b19de2f3d5dd18cdfa0816e973bcbb93ba6aa07f6abaef919ced88d5578c1037575f64d3abf3d62e046
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD511406b83416c8df889f6efa6120dbe75
SHA1c795b548235d1b983212e8999d6eea1807ca5ad1
SHA25638af991e773604e3e4f553050560fd9e1b170ec470aec71ebb1fc289743696c5
SHA5122677d7608784a7daeecb5e613730abf46c714fc89e81bd3a17b7dcaf51b84d3c68c5555be441a959c01c7509d8d8e83637a68316289c2bd18568a738827757b7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5e517a2eca0d20692bc259d1cd023d9bd
SHA10f85619a630afad26cd3f48e784da20b6fbc0d4d
SHA2569c6dadd69f5cbb40acf3ddfb19a7997e6419374f5bbc023daaab8e1211498b05
SHA51209af5ab4d987065d0955055b4ed44d4cca1226cdca2e705d8a3167f360d3778d5a70a2f8b41543985f17b101fe5bf25cc2671a1352087068d6bad7a49c955288
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD53060ad8f7db53eda6a4ba304930b098b
SHA1679cd1c41160733c3b709472776df40f67898df8
SHA2563a2e6a7cbecf015069ceb9977a52eda1b401fe722245624b65cc652a99b7cac6
SHA5127428cd0b89ff4681359b1738b14866baba7248daaca2314304134129e46cbb1bc26f745a53bab3912cabc5f695400d8043dbaee6789a6eaa5c386fa4f03d2870
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\34c9f73e-49ec-424d-a3a3-2f7cd73ecc8c
Filesize26KB
MD54b459682571a990ef0361b9b056a4a90
SHA1409163d154b7e2dae4dc6bb6e6721e86ddbd9e41
SHA2564ecfa6c6ce58d1817938ba7f766862dcf426671feaf966c3712c8a81e5ce5b16
SHA51294fcd59953f5a0d665256a6de9f464a381392666687dd3dcb33c570153ab5c835ffd0f69ba41653698bbad95c1a6ae8b9560ec159a112bbe14328dbe9454feb3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\bb32e98d-7e22-434c-85bf-78a41be53222
Filesize982B
MD591767ec08e8f80cb417f1a4c2155c142
SHA18d2300b4742e7116dc55c985689ffba9ecff8329
SHA2560a0c7eed36b704c79984a46b16942e59e9bffdaa441101ada0ad354009d672d8
SHA51252862cb485cfe9b3daed6ded569a946b6875a094568d60bbb24706e03871e95e560951990131e1e88aaa1c91a7eb43665f216008db9f0f70cea7dd9f431ef040
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\f8d903fd-9ba9-4cf9-87f9-3023c03d2d3d
Filesize671B
MD5008163eeb14de535c2cf62cfe440bafb
SHA1fc5392fc0b443b27e17c2962704dc74152aca134
SHA2561e3661b09ca3ed3dd00720f2e03b286a3153e40f85239ac9576127d184abc811
SHA512fe26f565f7336fcedb422b7a2608b34c29cd49e74b2e7f2e10e88c6c27e99eca801e36a78d3308103e2d2b5b2a9a398cef54802f9ef8d3ebc4dc82c2cea89c67
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD57e8f61c4201f44345b7d77c513e9add6
SHA18aa532346ec3f71b4e854689f232cd93a11b2858
SHA256084ab2b55a6e4f62b30c5ad8da615d286ff1a51be270225ec748b746a70520d4
SHA512dbb139705459ceeb6a7efe490c719605a44ddc555b6eef0c3bdd1e415261302dc71892b04b1024b2279f376f147da68dba7c4d612356fc2ee8a8db393ee5e1d0
-
Filesize
10KB
MD5326bd353343c65d34b75b21e6f169594
SHA1bac6330f4e41f501aad38a415b03eae744deb2d8
SHA2569eb7dfb172f51726d7b4ac86b27a8047c0a80c4bbb07acdf920d244649f95c12
SHA51245eb326106780780e7bd01dc14780568f925cdddfc6b2f40226508f65c9bfe56a53a038250c7e61cba4eb602539e8a66ac0c3878ddb4ec2c9218c2a193e31f20
-
Filesize
11KB
MD5ac1fc4f0fc051b925338cb7b7e679a6d
SHA13e0a871c4c80f1710d05e66a0f20a2e7d10d5fe8
SHA25698fc80ffdda93864703f84c56f84db86d12b199e9a75a5bd2fd8f37f726371ad
SHA5124cd6ecdade972a1274cc66a80425ea7fd0ab9857b341df89899279bc1b2cab345dc02f9d4988ae4bfcf6bcbc44552da8cbc70a4adf3ccca64864d93f98e78f1b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize3.0MB
MD5cc603649dacc283e7a9510ff9702dcbc
SHA165acb0ae8700f695465376d0c70d15b0a8902fbb
SHA256d158d572e7d01f24744638a4c6ee5469ea78c2551c1d814bba7b3dbab4b3c26d
SHA512450e906f9d268c85a7bd480a881c75894b7913887d8fd2b80fc113612d3db94492acaf5d0d70b06abdcb06281bd035c385948969e6e96e71f5e36dd71ec5d24b