Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2024 08:16
Static task
static1
Behavioral task
behavioral1
Sample
aa2f3c30ced1c131fd6d89033382d64ba65f7418ccc5d474dfc3cac3a8745a24.exe
Resource
win7-20241010-en
General
-
Target
aa2f3c30ced1c131fd6d89033382d64ba65f7418ccc5d474dfc3cac3a8745a24.exe
-
Size
1.8MB
-
MD5
a2f731c5822fa7448931b56450350130
-
SHA1
7b1694de7710ecfc7cf30863f2c173e88838b311
-
SHA256
aa2f3c30ced1c131fd6d89033382d64ba65f7418ccc5d474dfc3cac3a8745a24
-
SHA512
c35b34117c8dce2c175da6403b48ddf109897708bd2d56a4e7513cf77cc94a7a34a66e8296d2c629b6b6d43006508ade059fdb8d4af27218a782dc77e19ba89e
-
SSDEEP
49152:ouQbXZhAkVEfQcncuwxgFU2Gya/NIFQMn7ePxc8OjT:o1rZCoEfQcncBgFUnjFtv5Ev
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Cryptbot family
-
Detects CryptBot payload 1 IoCs
CryptBot is a C++ stealer distributed widely in bundle with other software.
resource yara_rule behavioral2/memory/2496-832-0x0000000069CC0000-0x000000006A71B000-memory.dmp family_cryptbot_v3 -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection f719101a41.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" f719101a41.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" f719101a41.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" f719101a41.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" f719101a41.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" f719101a41.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f719101a41.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ aa2f3c30ced1c131fd6d89033382d64ba65f7418ccc5d474dfc3cac3a8745a24.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a997698ad9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6035121ccc.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ad509a841b.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 4296 chrome.exe 3392 chrome.exe 1856 chrome.exe 4260 chrome.exe -
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6035121ccc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ad509a841b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion aa2f3c30ced1c131fd6d89033382d64ba65f7418ccc5d474dfc3cac3a8745a24.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a997698ad9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f719101a41.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a997698ad9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6035121ccc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ad509a841b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f719101a41.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion aa2f3c30ced1c131fd6d89033382d64ba65f7418ccc5d474dfc3cac3a8745a24.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation aa2f3c30ced1c131fd6d89033382d64ba65f7418ccc5d474dfc3cac3a8745a24.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation a997698ad9.exe -
Executes dropped EXE 10 IoCs
pid Process 2000 skotes.exe 2496 a997698ad9.exe 4604 6035121ccc.exe 1840 ad509a841b.exe 2836 7480f8387d.exe 3708 f719101a41.exe 5280 skotes.exe 396 service123.exe 3544 skotes.exe 5868 service123.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine a997698ad9.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 6035121ccc.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine ad509a841b.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine f719101a41.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine aa2f3c30ced1c131fd6d89033382d64ba65f7418ccc5d474dfc3cac3a8745a24.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe -
Loads dropped DLL 2 IoCs
pid Process 396 service123.exe 5868 service123.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features f719101a41.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" f719101a41.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\f719101a41.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008147001\\f719101a41.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\6035121ccc.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008144001\\6035121ccc.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ad509a841b.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008145001\\ad509a841b.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\7480f8387d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008146001\\7480f8387d.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0009000000023bc2-83.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 4980 aa2f3c30ced1c131fd6d89033382d64ba65f7418ccc5d474dfc3cac3a8745a24.exe 2000 skotes.exe 2496 a997698ad9.exe 4604 6035121ccc.exe 1840 ad509a841b.exe 3708 f719101a41.exe 5280 skotes.exe 3544 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job aa2f3c30ced1c131fd6d89033382d64ba65f7418ccc5d474dfc3cac3a8745a24.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4388 2496 WerFault.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a997698ad9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad509a841b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7480f8387d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aa2f3c30ced1c131fd6d89033382d64ba65f7418ccc5d474dfc3cac3a8745a24.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f719101a41.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6035121ccc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 a997698ad9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString a997698ad9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 5 IoCs
pid Process 3452 taskkill.exe 576 taskkill.exe 1704 taskkill.exe 1752 taskkill.exe 3480 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3892 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 4980 aa2f3c30ced1c131fd6d89033382d64ba65f7418ccc5d474dfc3cac3a8745a24.exe 4980 aa2f3c30ced1c131fd6d89033382d64ba65f7418ccc5d474dfc3cac3a8745a24.exe 2000 skotes.exe 2000 skotes.exe 2496 a997698ad9.exe 2496 a997698ad9.exe 4604 6035121ccc.exe 4604 6035121ccc.exe 1840 ad509a841b.exe 1840 ad509a841b.exe 2836 7480f8387d.exe 2836 7480f8387d.exe 3708 f719101a41.exe 3708 f719101a41.exe 3708 f719101a41.exe 3708 f719101a41.exe 3708 f719101a41.exe 2836 7480f8387d.exe 2836 7480f8387d.exe 5280 skotes.exe 5280 skotes.exe 4260 chrome.exe 4260 chrome.exe 3544 skotes.exe 3544 skotes.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeDebugPrivilege 1704 taskkill.exe Token: SeDebugPrivilege 1752 taskkill.exe Token: SeDebugPrivilege 3480 taskkill.exe Token: SeDebugPrivilege 3452 taskkill.exe Token: SeDebugPrivilege 576 taskkill.exe Token: SeDebugPrivilege 3112 firefox.exe Token: SeDebugPrivilege 3112 firefox.exe Token: SeDebugPrivilege 3708 f719101a41.exe Token: SeShutdownPrivilege 4260 chrome.exe Token: SeCreatePagefilePrivilege 4260 chrome.exe Token: SeDebugPrivilege 3112 firefox.exe Token: SeDebugPrivilege 3112 firefox.exe Token: SeDebugPrivilege 3112 firefox.exe -
Suspicious use of FindShellTrayWindow 60 IoCs
pid Process 4980 aa2f3c30ced1c131fd6d89033382d64ba65f7418ccc5d474dfc3cac3a8745a24.exe 2836 7480f8387d.exe 2836 7480f8387d.exe 2836 7480f8387d.exe 2836 7480f8387d.exe 2836 7480f8387d.exe 2836 7480f8387d.exe 2836 7480f8387d.exe 2836 7480f8387d.exe 3112 firefox.exe 3112 firefox.exe 3112 firefox.exe 3112 firefox.exe 2836 7480f8387d.exe 3112 firefox.exe 3112 firefox.exe 3112 firefox.exe 3112 firefox.exe 3112 firefox.exe 3112 firefox.exe 3112 firefox.exe 3112 firefox.exe 3112 firefox.exe 3112 firefox.exe 3112 firefox.exe 3112 firefox.exe 3112 firefox.exe 3112 firefox.exe 3112 firefox.exe 3112 firefox.exe 3112 firefox.exe 2836 7480f8387d.exe 2836 7480f8387d.exe 2836 7480f8387d.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2836 7480f8387d.exe 2836 7480f8387d.exe 2836 7480f8387d.exe 2836 7480f8387d.exe 2836 7480f8387d.exe 2836 7480f8387d.exe 2836 7480f8387d.exe 2836 7480f8387d.exe 3112 firefox.exe 3112 firefox.exe 3112 firefox.exe 3112 firefox.exe 2836 7480f8387d.exe 3112 firefox.exe 3112 firefox.exe 3112 firefox.exe 3112 firefox.exe 3112 firefox.exe 3112 firefox.exe 3112 firefox.exe 3112 firefox.exe 3112 firefox.exe 3112 firefox.exe 3112 firefox.exe 3112 firefox.exe 3112 firefox.exe 3112 firefox.exe 3112 firefox.exe 3112 firefox.exe 2836 7480f8387d.exe 2836 7480f8387d.exe 2836 7480f8387d.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3112 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4980 wrote to memory of 2000 4980 aa2f3c30ced1c131fd6d89033382d64ba65f7418ccc5d474dfc3cac3a8745a24.exe 82 PID 4980 wrote to memory of 2000 4980 aa2f3c30ced1c131fd6d89033382d64ba65f7418ccc5d474dfc3cac3a8745a24.exe 82 PID 4980 wrote to memory of 2000 4980 aa2f3c30ced1c131fd6d89033382d64ba65f7418ccc5d474dfc3cac3a8745a24.exe 82 PID 2000 wrote to memory of 2496 2000 skotes.exe 88 PID 2000 wrote to memory of 2496 2000 skotes.exe 88 PID 2000 wrote to memory of 2496 2000 skotes.exe 88 PID 2000 wrote to memory of 4604 2000 skotes.exe 91 PID 2000 wrote to memory of 4604 2000 skotes.exe 91 PID 2000 wrote to memory of 4604 2000 skotes.exe 91 PID 2000 wrote to memory of 1840 2000 skotes.exe 92 PID 2000 wrote to memory of 1840 2000 skotes.exe 92 PID 2000 wrote to memory of 1840 2000 skotes.exe 92 PID 2000 wrote to memory of 2836 2000 skotes.exe 93 PID 2000 wrote to memory of 2836 2000 skotes.exe 93 PID 2000 wrote to memory of 2836 2000 skotes.exe 93 PID 2836 wrote to memory of 1704 2836 7480f8387d.exe 94 PID 2836 wrote to memory of 1704 2836 7480f8387d.exe 94 PID 2836 wrote to memory of 1704 2836 7480f8387d.exe 94 PID 2836 wrote to memory of 1752 2836 7480f8387d.exe 96 PID 2836 wrote to memory of 1752 2836 7480f8387d.exe 96 PID 2836 wrote to memory of 1752 2836 7480f8387d.exe 96 PID 2836 wrote to memory of 3480 2836 7480f8387d.exe 98 PID 2836 wrote to memory of 3480 2836 7480f8387d.exe 98 PID 2836 wrote to memory of 3480 2836 7480f8387d.exe 98 PID 2836 wrote to memory of 3452 2836 7480f8387d.exe 100 PID 2836 wrote to memory of 3452 2836 7480f8387d.exe 100 PID 2836 wrote to memory of 3452 2836 7480f8387d.exe 100 PID 2836 wrote to memory of 576 2836 7480f8387d.exe 102 PID 2836 wrote to memory of 576 2836 7480f8387d.exe 102 PID 2836 wrote to memory of 576 2836 7480f8387d.exe 102 PID 2000 wrote to memory of 3708 2000 skotes.exe 103 PID 2000 wrote to memory of 3708 2000 skotes.exe 103 PID 2000 wrote to memory of 3708 2000 skotes.exe 103 PID 2836 wrote to memory of 4484 2836 7480f8387d.exe 105 PID 2836 wrote to memory of 4484 2836 7480f8387d.exe 105 PID 4484 wrote to memory of 3112 4484 firefox.exe 106 PID 4484 wrote to memory of 3112 4484 firefox.exe 106 PID 4484 wrote to memory of 3112 4484 firefox.exe 106 PID 4484 wrote to memory of 3112 4484 firefox.exe 106 PID 4484 wrote to memory of 3112 4484 firefox.exe 106 PID 4484 wrote to memory of 3112 4484 firefox.exe 106 PID 4484 wrote to memory of 3112 4484 firefox.exe 106 PID 4484 wrote to memory of 3112 4484 firefox.exe 106 PID 4484 wrote to memory of 3112 4484 firefox.exe 106 PID 4484 wrote to memory of 3112 4484 firefox.exe 106 PID 4484 wrote to memory of 3112 4484 firefox.exe 106 PID 3112 wrote to memory of 1208 3112 firefox.exe 107 PID 3112 wrote to memory of 1208 3112 firefox.exe 107 PID 3112 wrote to memory of 1208 3112 firefox.exe 107 PID 3112 wrote to memory of 1208 3112 firefox.exe 107 PID 3112 wrote to memory of 1208 3112 firefox.exe 107 PID 3112 wrote to memory of 1208 3112 firefox.exe 107 PID 3112 wrote to memory of 1208 3112 firefox.exe 107 PID 3112 wrote to memory of 1208 3112 firefox.exe 107 PID 3112 wrote to memory of 1208 3112 firefox.exe 107 PID 3112 wrote to memory of 1208 3112 firefox.exe 107 PID 3112 wrote to memory of 1208 3112 firefox.exe 107 PID 3112 wrote to memory of 1208 3112 firefox.exe 107 PID 3112 wrote to memory of 1208 3112 firefox.exe 107 PID 3112 wrote to memory of 1208 3112 firefox.exe 107 PID 3112 wrote to memory of 1208 3112 firefox.exe 107 PID 3112 wrote to memory of 1208 3112 firefox.exe 107 PID 3112 wrote to memory of 1208 3112 firefox.exe 107 PID 3112 wrote to memory of 1208 3112 firefox.exe 107 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa2f3c30ced1c131fd6d89033382d64ba65f7418ccc5d474dfc3cac3a8745a24.exe"C:\Users\Admin\AppData\Local\Temp\aa2f3c30ced1c131fd6d89033382d64ba65f7418ccc5d474dfc3cac3a8745a24.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\1008143001\a997698ad9.exe"C:\Users\Admin\AppData\Local\Temp\1008143001\a997698ad9.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2496 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4260 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x40,0x9c,0xe0,0xac,0x104,0x7ffcf62bcc40,0x7ffcf62bcc4c,0x7ffcf62bcc585⤵PID:4808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1992,i,9776049990865900461,771718161435208833,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1984 /prefetch:25⤵PID:5772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1916,i,9776049990865900461,771718161435208833,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2440 /prefetch:35⤵PID:5836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=1744,i,9776049990865900461,771718161435208833,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2548 /prefetch:85⤵PID:5852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3172,i,9776049990865900461,771718161435208833,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3192 /prefetch:15⤵
- Uses browser remote debugging
PID:4296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3212,i,9776049990865900461,771718161435208833,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3232 /prefetch:15⤵
- Uses browser remote debugging
PID:3392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4412,i,9776049990865900461,771718161435208833,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3744 /prefetch:15⤵
- Uses browser remote debugging
PID:1856
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:396
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3892
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2496 -s 13204⤵
- Program crash
PID:4388
-
-
-
C:\Users\Admin\AppData\Local\Temp\1008144001\6035121ccc.exe"C:\Users\Admin\AppData\Local\Temp\1008144001\6035121ccc.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4604
-
-
C:\Users\Admin\AppData\Local\Temp\1008145001\ad509a841b.exe"C:\Users\Admin\AppData\Local\Temp\1008145001\ad509a841b.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1840
-
-
C:\Users\Admin\AppData\Local\Temp\1008146001\7480f8387d.exe"C:\Users\Admin\AppData\Local\Temp\1008146001\7480f8387d.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1704
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1752
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3480
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3452
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:576
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2028 -parentBuildID 20240401114208 -prefsHandle 1944 -prefMapHandle 1936 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {93e23dc8-1130-445d-9680-2721efc830ab} 3112 "\\.\pipe\gecko-crash-server-pipe.3112" gpu6⤵PID:1208
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2468 -parentBuildID 20240401114208 -prefsHandle 2460 -prefMapHandle 2456 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7677d405-82d7-488b-9bc8-f2c44c0c07ec} 3112 "\\.\pipe\gecko-crash-server-pipe.3112" socket6⤵PID:3188
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3124 -childID 1 -isForBrowser -prefsHandle 3104 -prefMapHandle 3100 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 992 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {03db5f92-6fd6-43a5-9075-b990298b7579} 3112 "\\.\pipe\gecko-crash-server-pipe.3112" tab6⤵PID:636
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3928 -childID 2 -isForBrowser -prefsHandle 3920 -prefMapHandle 3916 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 992 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4c70723f-27b4-4230-b928-012a7c922da3} 3112 "\\.\pipe\gecko-crash-server-pipe.3112" tab6⤵PID:4116
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4676 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4648 -prefMapHandle 4684 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {dc8ca495-e724-45f7-8c8e-f22013d8a3f6} 3112 "\\.\pipe\gecko-crash-server-pipe.3112" utility6⤵
- Checks processor information in registry
PID:5404
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5588 -childID 3 -isForBrowser -prefsHandle 5568 -prefMapHandle 5556 -prefsLen 26998 -prefMapSize 244658 -jsInitHandle 992 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {06736788-2937-4053-b24d-e13638276173} 3112 "\\.\pipe\gecko-crash-server-pipe.3112" tab6⤵PID:5936
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5556 -childID 4 -isForBrowser -prefsHandle 4676 -prefMapHandle 5516 -prefsLen 26998 -prefMapSize 244658 -jsInitHandle 992 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {60bd9374-2e53-4a09-9938-44027a3fadf8} 3112 "\\.\pipe\gecko-crash-server-pipe.3112" tab6⤵PID:5972
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5892 -childID 5 -isForBrowser -prefsHandle 5812 -prefMapHandle 5816 -prefsLen 26998 -prefMapSize 244658 -jsInitHandle 992 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {184ae9f8-7a6b-4755-b8cd-8e32b7f89864} 3112 "\\.\pipe\gecko-crash-server-pipe.3112" tab6⤵PID:5984
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1008147001\f719101a41.exe"C:\Users\Admin\AppData\Local\Temp\1008147001\f719101a41.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3708
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5280
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2256
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2496 -ip 24961⤵PID:936
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3544
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5868
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\85mw8mk9.default-release\activity-stream.discovery_stream.json
Filesize22KB
MD53d16bc25b24407a156553f843d360ee6
SHA1696f71ab97950733ab2f641e099bc414f8b62ada
SHA25630b85bce9574e52f96f6bbaf926f9911f6bf38a4484c6a6d069d20fbd63165c7
SHA512081eb37e753d4a3d1099b6a8ff0298e203e3e6f3979fc8be7b0d3ba529643bc97bd517239ee951b695862eb7d99fd5aeeb4e566763805eb82eab41fd68f6d028
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\85mw8mk9.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD54fb4e7c8e357990a5d543b50f323c560
SHA1b6dbacd030ea64c473ee5da4db51e289f2a64cfb
SHA256440f32e0a09c47c4e1d77238a9e7c775da4d96138ea7768532c34a4592c97bdb
SHA512793bbf6e957fdd384ec439635446d4b0177b197fd55286b6e31eac870eedf6951175af02ddfb096df96044e12d7d026c635713f695aa311cc17262791a1a4aec
-
Filesize
4.2MB
MD578623a8cad0667f07764baa1c77adc20
SHA1c7887f807d381380279ad131b5828262cff4265e
SHA25616df14cdea17907bbeecb8c9f43486fc7edd4f23093b4043d11d6715921daea2
SHA5120e960fd601a9a4e8814c4c5b37bb069a2f1e0f3862f5dc24ee4a29a641b34fab3ce4994648995890db0586fc244644feb229e805004af990a0a3a1efac85fde9
-
Filesize
1.8MB
MD55356c7fadea27060e683ea467efbc21b
SHA1da9fc2af4e66941e0c0c4b3a93e911a5221032e9
SHA256c334c9de728d4fb29fcab3a7b6774bcdf99f20e42dd527ac766385165768fe39
SHA512a15a6732523fea27f27a487863a4997c2137a7e3b234b4c012adafeb674f8ccefeb47f977d88b37fadcec3f3abe5308854537cf210ea1c2615edb8e2c14c6600
-
Filesize
1.7MB
MD5405dcfb77eb969d356061f551b1d3a1f
SHA128aabbccb4b5f095e4046fbcb5148b9813de756b
SHA256d23c929cadf5890a5afadd25b36e9d73fa8328c0fe7d750578cf59fba2cf72e0
SHA512bb8a4f340a2e3b8b8fe8913da46cf2f7e1887128971ecb94832292f66ca7f00af91d6b1384957788fb11e2d487942a80c1c77515906dba22908627fa20ac0a41
-
Filesize
901KB
MD5e11effb82894fc710818be4c9d212e96
SHA15f51380ef63a2dc38f549aa668d7feb5b6ae61fd
SHA256e5c33b4ba7e111170c2aa54f3eaf726aefbdd0426e2502b440c4a3de8d94aee1
SHA512d5cdb95b126340e827399de8c34cc9222cd18e68345ac290214bc893fe3e75efe8eb09096add35c58bb32dae20b7d13bbe35854b292dcd511a784ca2fabb3454
-
Filesize
2.6MB
MD5fceaf512d5a53cbdc093149c76b6ef99
SHA129776dad9da781817c54d5ab6d3add547382937e
SHA256ba19021aa240c1d2da39065aef88728c164ca358d85eec9f26aafb59e4f9386a
SHA512b799433579da32515553d7bfea61572cee9616cb08a08b6f5eac45b76515db8540454970b11d23482151cba2dba2d0e7b0dc121efd6c55dce4ea9e2a11670a6f
-
Filesize
1.8MB
MD5a2f731c5822fa7448931b56450350130
SHA17b1694de7710ecfc7cf30863f2c173e88838b311
SHA256aa2f3c30ced1c131fd6d89033382d64ba65f7418ccc5d474dfc3cac3a8745a24
SHA512c35b34117c8dce2c175da6403b48ddf109897708bd2d56a4e7513cf77cc94a7a34a66e8296d2c629b6b6d43006508ade059fdb8d4af27218a782dc77e19ba89e
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\AlternateServices.bin
Filesize6KB
MD59665a4d46d6f466925b0d07684b276d5
SHA1d505fed097d9ce8451b2a70084c60078bbf93a78
SHA25618ce62dbfad0004c9c5b0f92199e77d2cfdfc97cc7c5df9f7ee9a38f85de6215
SHA5125a887cf1e4fac44a854917355b7bd7682cb5dcb3c6a141bad831552feda4fc98516a41adaa673be11d0339fb4ba3a29d704afdf6c749f657845ef4b62b626e5b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\AlternateServices.bin
Filesize7KB
MD5d04edbae787896dc41c7673742d1fb2c
SHA11ef4d713904b5a7277d8b1e39ce7b909d8313ed7
SHA256842df9d7a8dbcb571059f38e161947091a7a3bf4ba1bd8b2013f9a8a10068e44
SHA5123513cd00ae5e822f7cbac8957f0d39c5f0ea74f313227f6fd89fee20869d28b503f5db0d925f80f4855bdf64ba0be111af4530f2585e5ec5da1e2d780811d3e2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\AlternateServices.bin
Filesize10KB
MD5d5d536d407b6686165f2e11dfe908505
SHA19a6b6c6c82b81cdb2dae1fe2903948a19251a9c5
SHA2564d57bbca565d293e1852f5ef79cf0f3f465c37ed3ee5029931a7458813b4b35c
SHA512af9368226d53a8cac4aa0fb498329c9695a6e350428c77b67829acb6a63f6945655d5fd9915b4b6d14bbb88d65d444bced3ba8e95d39ec4ad583b476b3a4f875
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5ccb319a0a4ffe90f503304eb6759ecf8
SHA1c7e5aa9b0f66a02cc49f69445bc2ed3a9588b55e
SHA256c68fb7667f0daa8231a8f91c65305def60fd3dfdc2d014de3a3ee233f63db9d4
SHA512f785d60cbf767daf2dbcbc8a09f7be5186da2d6f9a0cd38d372314bc78794947773dd002db554892cd38739432db91ef2747ca9677e9416d5c168e9846edf3bb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5020b8f848fcbdf5b9b33444061f3bcdc
SHA17f707ac7d67c647a50dae1158b3093a9d9276127
SHA2563ba6b833ac2711b22065743c98bc008b233b53ba5b610e1f6034177dcd6156a3
SHA512c499fb991170c2e359aeade5fc41ec99bbfbbad2a91e0b36e6c2f22bdb5c86079cc755fa78b731a74b648ab58594045abaa0fbfb12c07fb62f3c6c5273249a46
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD55b9c360970e06745d1d688da27f05458
SHA1613942b9fad65a127c16daae0f9c04dc1ec1dfee
SHA2564a3d38461ec843f6fa081fd0117236eb7069cbaaab65fe963751ed14b9397e2e
SHA512623c7363955a520eb74c25c53a9247521f8e5e53c4abebe1a8a421f900439104f9322a8d060d768ecad1e898196fcb7cd0eaf9190fb62253afd811a4f39502e8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\pending_pings\4aceab37-9ac0-4eb4-9247-fa1788ca1877
Filesize982B
MD50f739f9beb59842f0e6b38c5f46d0022
SHA1f1fbea9a5a88e1d506d73416f7972ce6e8cef92e
SHA25631c37eca79476d4979526e1bb4362242fadc7362321597dc7aeb0f5c38f55b2e
SHA5125d464a28174d62e098d2ee155509b75bbafa41d7473bea732788580616bc505400f303c903d4bb26c6251aef9da00f0212b318ed2250e5cc7bad4e158db0b501
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\pending_pings\b24c55c3-8e05-4708-95ff-263bbf3b2fc6
Filesize26KB
MD5646f005a6d06b2caa38361c2e09ffcc0
SHA1c5c1d61dd06f171b0f60a74f4d091163ac1b838a
SHA256f13374163c2573a97b078086d84008bdb351df5688257b74f97f3eb73ffdf837
SHA512561c2e49241b5fdc4fed49e7e226e20e68c9c7b1c27e546562bb219e495fa18c337ea68bb30d809fb81407ead60ef654a5482e5c8fa16b28eb52c4b63b9c44dd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\pending_pings\f4205870-9484-46f5-b3e0-c7147345c379
Filesize671B
MD521f77e5d70fccf7100115d228062d246
SHA147d70eeb6cad0a4534ae7616a161e1d8d66cf801
SHA256e5546853926db89b271f1fad7b98c617139225c442d57ee968b9fc43536ce976
SHA512d063dba6ed1173e17972ab2166a9dfb2d9cdc614c76d456e84a88a305601aaba54e7bafdfb852f2aa43a28f3549f7f91146b16049feddcbb7813f34f7b9f2da6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
11KB
MD588eecad74b87ebd3804a9b93efd16515
SHA115b8d69b46d4b9c4b6f43cf6ff632b689ce9c7a4
SHA256dcdf6829e75720074ee6168050c4f681fde34be1480f1a039db827943dbc365d
SHA512a2e6d7d71db1ee444862d8da4fc3dd64511eec61f76c74f1db60cd8bff3a351c5b2e2fd47568c8bc5a58c8afe530d4c871662d3cb02301b8e0de4b7297fdd33b
-
Filesize
15KB
MD56b8295cda3faa1deea62f82cefdd1738
SHA1a8a7553bbe1e7d88d219469e5f2b47d834ca620a
SHA256556b754addfa7d7f5aaf41711f7bc9aa24e88027bbd83db74151f18b6b2d5eac
SHA512de90a218f3aa4c63270297a7f1d9271bde7adda4da0f723e07b3e443bf019d8c21544f581533957e91e87918a6fef12b3cc29eccbd726abd1c38327a3d207643
-
Filesize
10KB
MD5c24cfa12c04c2a51386b08b08d3d25e8
SHA18ae7b50b15df68892e321b7b599e2bf11a7d65c4
SHA2562c44f524ebe8e2b8b3586f57bd9f23f4264528d6758f38b7488199079a66e692
SHA512fc06923ffd09b0120563ab4369f7e5794d77b329a761c7434e62a147d85308ec88e2b818240251e82e9f8d9eab17243121ffee1ad25e1f676ba5c0f515fb2176
-
Filesize
11KB
MD580962bdfee4043f898719a91fb30510d
SHA1b67783609df0ea879214b98f3658a8e14b871089
SHA256c8d32139c280841d2dec812f11adb0a7aca642238ed614bb8662c21756692dcd
SHA512430cc8b25b9efe55caf03770e27504e0ef03bbd0f3a967f550a8756a2c49b4e30d51608b5fab4142c3064fe1f0b29b87036cf258f51083d10400aa3eb4554538