Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2024 16:11
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240903-en
General
-
Target
file.exe
-
Size
1.8MB
-
MD5
9ddbac8aaba1c5bb2f9a22717a60a6ba
-
SHA1
16712810fcf1bb9c7f1940af8e2e59b92f4a7b65
-
SHA256
edec375a0ef3ce9e3067aa661e9e32fee7cba13ff4f3c7ab69d6db8d7b22b03d
-
SHA512
05d112dad0d496f825ed88c18d7c196432994f5ccca9f6f1e098d6376d56c1aa98d8c47e9542acfe2a53672802e89e68257f607b843e4ebdbd38cd44f1ddbddd
-
SSDEEP
49152://TTxdTbrxgYihAr5xkWqG8E/N3SEry5RUuzen3lBsVL9t:/7TxZb0qrd9ucB8
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Cryptbot family
-
Detects CryptBot payload 1 IoCs
CryptBot is a C++ stealer distributed widely in bundle with other software.
resource yara_rule behavioral2/memory/4572-76-0x0000000069CC0000-0x000000006A71B000-memory.dmp family_cryptbot_v3 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 6bea22af89.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 6bea22af89.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 6bea22af89.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 6bea22af89.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 6bea22af89.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 6bea22af89.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ be45d9aa86.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6bea22af89.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Crypt_Medusa.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ cfbeacdd77.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9dae0f0c10.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 5888 chrome.exe 5480 chrome.exe 5492 chrome.exe 5872 chrome.exe -
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Crypt_Medusa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9dae0f0c10.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6bea22af89.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cfbeacdd77.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Crypt_Medusa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cfbeacdd77.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion be45d9aa86.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion be45d9aa86.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9dae0f0c10.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6bea22af89.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation file.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation cfbeacdd77.exe -
Executes dropped EXE 12 IoCs
pid Process 1172 skotes.exe 2984 Crypt_Medusa.exe 4572 cfbeacdd77.exe 676 be45d9aa86.exe 1744 9dae0f0c10.exe 4236 c86fef49a8.exe 2356 6bea22af89.exe 5172 service123.exe 6132 skotes.exe 4948 service123.exe 4940 skotes.exe 1112 service123.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine be45d9aa86.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine 9dae0f0c10.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine file.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine Crypt_Medusa.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine cfbeacdd77.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine 6bea22af89.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine skotes.exe -
Loads dropped DLL 3 IoCs
pid Process 5172 service123.exe 4948 service123.exe 1112 service123.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 6bea22af89.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 6bea22af89.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\be45d9aa86.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008232001\\be45d9aa86.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\9dae0f0c10.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008233001\\9dae0f0c10.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\c86fef49a8.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008234001\\c86fef49a8.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\6bea22af89.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008235001\\6bea22af89.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000a000000023b91-109.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 2228 file.exe 1172 skotes.exe 2984 Crypt_Medusa.exe 4572 cfbeacdd77.exe 676 be45d9aa86.exe 1744 9dae0f0c10.exe 2356 6bea22af89.exe 6132 skotes.exe 4940 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 216 4572 WerFault.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9dae0f0c10.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6bea22af89.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Crypt_Medusa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cfbeacdd77.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c86fef49a8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language be45d9aa86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString cfbeacdd77.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 cfbeacdd77.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 5 IoCs
pid Process 1228 taskkill.exe 4996 taskkill.exe 3904 taskkill.exe 1368 taskkill.exe 3608 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 6104 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 2228 file.exe 2228 file.exe 1172 skotes.exe 1172 skotes.exe 2984 Crypt_Medusa.exe 2984 Crypt_Medusa.exe 4572 cfbeacdd77.exe 4572 cfbeacdd77.exe 676 be45d9aa86.exe 676 be45d9aa86.exe 1744 9dae0f0c10.exe 1744 9dae0f0c10.exe 4236 c86fef49a8.exe 4236 c86fef49a8.exe 5888 chrome.exe 5888 chrome.exe 4236 c86fef49a8.exe 4236 c86fef49a8.exe 2356 6bea22af89.exe 2356 6bea22af89.exe 2356 6bea22af89.exe 2356 6bea22af89.exe 2356 6bea22af89.exe 6132 skotes.exe 6132 skotes.exe 4940 skotes.exe 4940 skotes.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 5888 chrome.exe 5888 chrome.exe 5888 chrome.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeDebugPrivilege 3904 taskkill.exe Token: SeDebugPrivilege 1368 taskkill.exe Token: SeDebugPrivilege 3608 taskkill.exe Token: SeDebugPrivilege 1228 taskkill.exe Token: SeDebugPrivilege 4996 taskkill.exe Token: SeDebugPrivilege 4816 firefox.exe Token: SeDebugPrivilege 4816 firefox.exe Token: SeShutdownPrivilege 5888 chrome.exe Token: SeCreatePagefilePrivilege 5888 chrome.exe Token: SeDebugPrivilege 2356 6bea22af89.exe Token: SeDebugPrivilege 4816 firefox.exe Token: SeDebugPrivilege 4816 firefox.exe Token: SeDebugPrivilege 4816 firefox.exe -
Suspicious use of FindShellTrayWindow 58 IoCs
pid Process 2228 file.exe 4236 c86fef49a8.exe 4236 c86fef49a8.exe 4236 c86fef49a8.exe 4236 c86fef49a8.exe 4236 c86fef49a8.exe 4236 c86fef49a8.exe 4816 firefox.exe 4816 firefox.exe 4816 firefox.exe 4816 firefox.exe 4236 c86fef49a8.exe 4816 firefox.exe 4816 firefox.exe 4816 firefox.exe 4816 firefox.exe 4816 firefox.exe 4816 firefox.exe 4816 firefox.exe 4816 firefox.exe 4816 firefox.exe 4816 firefox.exe 4816 firefox.exe 4816 firefox.exe 4816 firefox.exe 4816 firefox.exe 4816 firefox.exe 4816 firefox.exe 4816 firefox.exe 4236 c86fef49a8.exe 4236 c86fef49a8.exe 5888 chrome.exe 5888 chrome.exe 5888 chrome.exe 5888 chrome.exe 5888 chrome.exe 5888 chrome.exe 5888 chrome.exe 5888 chrome.exe 5888 chrome.exe 5888 chrome.exe 5888 chrome.exe 5888 chrome.exe 5888 chrome.exe 5888 chrome.exe 5888 chrome.exe 5888 chrome.exe 5888 chrome.exe 5888 chrome.exe 5888 chrome.exe 5888 chrome.exe 5888 chrome.exe 5888 chrome.exe 5888 chrome.exe 5888 chrome.exe 5888 chrome.exe 5888 chrome.exe 4236 c86fef49a8.exe -
Suspicious use of SendNotifyMessage 30 IoCs
pid Process 4236 c86fef49a8.exe 4236 c86fef49a8.exe 4236 c86fef49a8.exe 4236 c86fef49a8.exe 4236 c86fef49a8.exe 4236 c86fef49a8.exe 4816 firefox.exe 4816 firefox.exe 4816 firefox.exe 4816 firefox.exe 4236 c86fef49a8.exe 4816 firefox.exe 4816 firefox.exe 4816 firefox.exe 4816 firefox.exe 4816 firefox.exe 4816 firefox.exe 4816 firefox.exe 4816 firefox.exe 4816 firefox.exe 4816 firefox.exe 4816 firefox.exe 4816 firefox.exe 4816 firefox.exe 4816 firefox.exe 4816 firefox.exe 4816 firefox.exe 4236 c86fef49a8.exe 4236 c86fef49a8.exe 4236 c86fef49a8.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4816 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2228 wrote to memory of 1172 2228 file.exe 82 PID 2228 wrote to memory of 1172 2228 file.exe 82 PID 2228 wrote to memory of 1172 2228 file.exe 82 PID 1172 wrote to memory of 2984 1172 skotes.exe 87 PID 1172 wrote to memory of 2984 1172 skotes.exe 87 PID 1172 wrote to memory of 2984 1172 skotes.exe 87 PID 1172 wrote to memory of 4572 1172 skotes.exe 91 PID 1172 wrote to memory of 4572 1172 skotes.exe 91 PID 1172 wrote to memory of 4572 1172 skotes.exe 91 PID 1172 wrote to memory of 676 1172 skotes.exe 92 PID 1172 wrote to memory of 676 1172 skotes.exe 92 PID 1172 wrote to memory of 676 1172 skotes.exe 92 PID 1172 wrote to memory of 1744 1172 skotes.exe 93 PID 1172 wrote to memory of 1744 1172 skotes.exe 93 PID 1172 wrote to memory of 1744 1172 skotes.exe 93 PID 1172 wrote to memory of 4236 1172 skotes.exe 94 PID 1172 wrote to memory of 4236 1172 skotes.exe 94 PID 1172 wrote to memory of 4236 1172 skotes.exe 94 PID 4236 wrote to memory of 3904 4236 c86fef49a8.exe 95 PID 4236 wrote to memory of 3904 4236 c86fef49a8.exe 95 PID 4236 wrote to memory of 3904 4236 c86fef49a8.exe 95 PID 4236 wrote to memory of 1368 4236 c86fef49a8.exe 97 PID 4236 wrote to memory of 1368 4236 c86fef49a8.exe 97 PID 4236 wrote to memory of 1368 4236 c86fef49a8.exe 97 PID 4236 wrote to memory of 3608 4236 c86fef49a8.exe 99 PID 4236 wrote to memory of 3608 4236 c86fef49a8.exe 99 PID 4236 wrote to memory of 3608 4236 c86fef49a8.exe 99 PID 4236 wrote to memory of 1228 4236 c86fef49a8.exe 101 PID 4236 wrote to memory of 1228 4236 c86fef49a8.exe 101 PID 4236 wrote to memory of 1228 4236 c86fef49a8.exe 101 PID 4236 wrote to memory of 4996 4236 c86fef49a8.exe 103 PID 4236 wrote to memory of 4996 4236 c86fef49a8.exe 103 PID 4236 wrote to memory of 4996 4236 c86fef49a8.exe 103 PID 4236 wrote to memory of 3628 4236 c86fef49a8.exe 105 PID 4236 wrote to memory of 3628 4236 c86fef49a8.exe 105 PID 3628 wrote to memory of 4816 3628 firefox.exe 106 PID 3628 wrote to memory of 4816 3628 firefox.exe 106 PID 3628 wrote to memory of 4816 3628 firefox.exe 106 PID 3628 wrote to memory of 4816 3628 firefox.exe 106 PID 3628 wrote to memory of 4816 3628 firefox.exe 106 PID 3628 wrote to memory of 4816 3628 firefox.exe 106 PID 3628 wrote to memory of 4816 3628 firefox.exe 106 PID 3628 wrote to memory of 4816 3628 firefox.exe 106 PID 3628 wrote to memory of 4816 3628 firefox.exe 106 PID 3628 wrote to memory of 4816 3628 firefox.exe 106 PID 3628 wrote to memory of 4816 3628 firefox.exe 106 PID 4816 wrote to memory of 1588 4816 firefox.exe 107 PID 4816 wrote to memory of 1588 4816 firefox.exe 107 PID 4816 wrote to memory of 1588 4816 firefox.exe 107 PID 4816 wrote to memory of 1588 4816 firefox.exe 107 PID 4816 wrote to memory of 1588 4816 firefox.exe 107 PID 4816 wrote to memory of 1588 4816 firefox.exe 107 PID 4816 wrote to memory of 1588 4816 firefox.exe 107 PID 4816 wrote to memory of 1588 4816 firefox.exe 107 PID 4816 wrote to memory of 1588 4816 firefox.exe 107 PID 4816 wrote to memory of 1588 4816 firefox.exe 107 PID 4816 wrote to memory of 1588 4816 firefox.exe 107 PID 4816 wrote to memory of 1588 4816 firefox.exe 107 PID 4816 wrote to memory of 1588 4816 firefox.exe 107 PID 4816 wrote to memory of 1588 4816 firefox.exe 107 PID 4816 wrote to memory of 1588 4816 firefox.exe 107 PID 4816 wrote to memory of 1588 4816 firefox.exe 107 PID 4816 wrote to memory of 1588 4816 firefox.exe 107 PID 4816 wrote to memory of 1588 4816 firefox.exe 107 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Users\Admin\AppData\Local\Temp\1008207001\Crypt_Medusa.exe"C:\Users\Admin\AppData\Local\Temp\1008207001\Crypt_Medusa.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2984
-
-
C:\Users\Admin\AppData\Local\Temp\1008231001\cfbeacdd77.exe"C:\Users\Admin\AppData\Local\Temp\1008231001\cfbeacdd77.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4572 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5888 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffc7c3ecc40,0x7ffc7c3ecc4c,0x7ffc7c3ecc585⤵PID:5928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2264,i,14098458017284165236,17241560821348455101,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2256 /prefetch:25⤵PID:5152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1716,i,14098458017284165236,17241560821348455101,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1600 /prefetch:35⤵PID:5160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=1836,i,14098458017284165236,17241560821348455101,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2464 /prefetch:85⤵PID:5168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3172,i,14098458017284165236,17241560821348455101,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3180 /prefetch:15⤵
- Uses browser remote debugging
PID:5480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3188,i,14098458017284165236,17241560821348455101,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3456 /prefetch:15⤵
- Uses browser remote debugging
PID:5492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4492,i,14098458017284165236,17241560821348455101,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4516 /prefetch:15⤵
- Uses browser remote debugging
PID:5872
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5172
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:6104
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4572 -s 13084⤵
- Program crash
PID:216
-
-
-
C:\Users\Admin\AppData\Local\Temp\1008232001\be45d9aa86.exe"C:\Users\Admin\AppData\Local\Temp\1008232001\be45d9aa86.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:676
-
-
C:\Users\Admin\AppData\Local\Temp\1008233001\9dae0f0c10.exe"C:\Users\Admin\AppData\Local\Temp\1008233001\9dae0f0c10.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1744
-
-
C:\Users\Admin\AppData\Local\Temp\1008234001\c86fef49a8.exe"C:\Users\Admin\AppData\Local\Temp\1008234001\c86fef49a8.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3904
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1368
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3608
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1228
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4996
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2028 -parentBuildID 20240401114208 -prefsHandle 1944 -prefMapHandle 1936 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {96dd435f-10a8-4ea2-8961-12f716025ad3} 4816 "\\.\pipe\gecko-crash-server-pipe.4816" gpu6⤵PID:1588
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2468 -parentBuildID 20240401114208 -prefsHandle 2376 -prefMapHandle 2384 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {967491af-3935-4b41-8e16-f056b74fa4a1} 4816 "\\.\pipe\gecko-crash-server-pipe.4816" socket6⤵PID:2180
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1520 -childID 1 -isForBrowser -prefsHandle 3008 -prefMapHandle 3028 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1072 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {aa50727c-be0e-4946-8c95-9e6a3df8e1ca} 4816 "\\.\pipe\gecko-crash-server-pipe.4816" tab6⤵PID:1256
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2820 -childID 2 -isForBrowser -prefsHandle 4028 -prefMapHandle 4024 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1072 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a2adff78-0105-42e2-881f-e055fb91a671} 4816 "\\.\pipe\gecko-crash-server-pipe.4816" tab6⤵PID:1960
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4752 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4744 -prefMapHandle 4724 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {80a1f457-c9ed-412e-921b-16bf0b77da72} 4816 "\\.\pipe\gecko-crash-server-pipe.4816" utility6⤵
- Checks processor information in registry
PID:5392
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5032 -childID 3 -isForBrowser -prefsHandle 5156 -prefMapHandle 4220 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1072 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {47f28ebb-8149-475b-96cb-c3a52fa7d0f3} 4816 "\\.\pipe\gecko-crash-server-pipe.4816" tab6⤵PID:6048
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5296 -childID 4 -isForBrowser -prefsHandle 5304 -prefMapHandle 5280 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1072 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d5caef0d-ef9b-4b8c-92ca-cba992f93b2a} 4816 "\\.\pipe\gecko-crash-server-pipe.4816" tab6⤵PID:6064
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5520 -childID 5 -isForBrowser -prefsHandle 5596 -prefMapHandle 5592 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1072 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ffe30559-5b23-4353-ad93-b150e3f10b41} 4816 "\\.\pipe\gecko-crash-server-pipe.4816" tab6⤵PID:6076
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1008235001\6bea22af89.exe"C:\Users\Admin\AppData\Local\Temp\1008235001\6bea22af89.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2356
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:5864
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4572 -ip 45721⤵PID:1136
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6132
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4948
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4940
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1112
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\n4zftpal.default-release\activity-stream.discovery_stream.json
Filesize23KB
MD59c5bf5648b974b544864d3dfa824fd62
SHA1eec1c2aa7ce0c2815ee936ed88ad6f8d7fa83f22
SHA256491d9b7374e82cb50ab1aa1f6e3de707cd3bb6a6e4b334756b6d10cea05d5452
SHA5120da94fe0b694e0f11b4169e5bffbc8b785eb4e468bf6a73c9fc9b42e0e88e009b1ceeb2c4afce9c790ec502df9be5656a07ef4382f798c4b60f9fac14e883203
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\n4zftpal.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD52e9e9f8e72300fb14befba08b518bc95
SHA1a2029318b8c6147effb627fabd623005f7957aee
SHA256d31bfc40788dff4e1e71dffb1719f9fdd4f78c96eb847aa2d8168100c2cdb504
SHA5121f487a8855b0dcc491525b3acb8651e83c48bc776aaf86da53b163c4d2e9efa855357f98b3b2b1b89d600a2a8c0d5c8548475c43472501911ef4da37d311913a
-
Filesize
1.8MB
MD52f1f5a83cde7780e78bf374eff93dfb8
SHA10f15632195b9193e78dbbc4f5eac3d767ff5e26a
SHA2565058ba217aa198969ab25e11959ec8c7aaa544674903b6ae674f54e73b77b0b9
SHA512d7af239e2bfcf64c8f3e5955be8bdd129a2c5f49aefcdc501e362a2de817c357417c5b2c9aeb47a4e22d4f0793b52a8b0d0b25806b08bf48414b718bf8a88b3c
-
Filesize
4.2MB
MD50dabff043e7ec45a107a3dd50ed20aeb
SHA158ee3becedf826ea02c7d3ef5048f62b3ced3c66
SHA256e0e0f020cdeef9cf0cb33b23d4fdcb7b74bdfda03a1916e7e79c40d71d0f1e51
SHA512a8c6c913af8f03fcd9c1a5a6379d257e98516072f10d483768c787153fa60b1a1be268bd9f00c1957488c3c36cc0db50de22848de30cdee97a9ea90af2401a56
-
Filesize
1.8MB
MD56d4e1d2500dc2733f8f3ceb2815df08b
SHA14fd3d112e5fcbcf6862d72df4cf071a7bae9d0b7
SHA25648cc3a2b111fcdcd5e1fa49d3f80881b41a02840bc67d297dd6dc8228d9b1e0a
SHA512c92628410b1198608cc1da28177dd68f56cf1140b33dae4439e7fa58ada9de9f2913e76052f720c1ce20b31f5602438cb5bad74b3ff8e63d1892ec2e5b8b9f65
-
Filesize
1.7MB
MD5c80d723528ed0121eef557cc31bd4c87
SHA1150ec423edbfb73989a525fc3b553d06f411ece7
SHA256fa8380534c7876773e1315360225f92d30fc4ff6c4cdf70bebaf16e5f450d6f5
SHA5123ae11b656d242e891881b5833781a1431d0dde16de66a21b775613a7d02e098a68ad41301fa85f5cf3bd0bb7561c1ab784fd0d3c4940a45d66aa67f10b475da8
-
Filesize
901KB
MD5c72402184ff4b1d75d9893d6b2bc6be4
SHA16b84b9f3c7fcb0d17ec9327b6d59ab8b9ac2522b
SHA256edb36a19aaa5ff001641a1a8daa7e430511a82ebd0d22d72a26c4311299d5bf9
SHA5122e3f72ea7da591fabf7e3b3fb30e8455bbfdbb5156274383cde3ca1769bc0625a1838e13f33d2cb0a05e7ee9faa5adc31180e1898ebf8d7d5e1613093a970948
-
Filesize
2.7MB
MD59cb310eaaba4f310d47c1b4d401c06b2
SHA1e1fd02abe8f284002f1287b223cf713c1bf18044
SHA256e15196f67a2f619908439e73fc2972850234696b0a0eaa84291dc788ebb70cbd
SHA512583f3f0374c2705eb411b0738e299b5a305508511fddb70868daa953089eb283149d4ff0dfd63ac53b0d513e6623e095881af34945271e1ed3b5b9f293950f52
-
Filesize
1.8MB
MD59ddbac8aaba1c5bb2f9a22717a60a6ba
SHA116712810fcf1bb9c7f1940af8e2e59b92f4a7b65
SHA256edec375a0ef3ce9e3067aa661e9e32fee7cba13ff4f3c7ab69d6db8d7b22b03d
SHA51205d112dad0d496f825ed88c18d7c196432994f5ccca9f6f1e098d6376d56c1aa98d8c47e9542acfe2a53672802e89e68257f607b843e4ebdbd38cd44f1ddbddd
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\AlternateServices.bin
Filesize8KB
MD5ab9d5adc8e57d81a246ae0ffd894c3c3
SHA1ba85035a476014dcef19d2e0618a6e715696d443
SHA2566d45cf591f82185500b0adcd8bb950fe4cbc771ae0d149aab13c061e2592343a
SHA51273aebab7f7763d9a4842f36097b6a8b6fc08fe4cb7e7bc3b51d83084510ef59b82b7fcd8933b8b235294b58220e73cc836d16cc2330e64e7d49dbc5389bd8693
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\AlternateServices.bin
Filesize13KB
MD5b417fb33c8a147c854b497f6dbe92029
SHA1101dcdea5d8f53058a7ae4e790ed221c2764f38d
SHA256ea10a5b411d7ac9a11cce071571d7d9eb8b18e6da4c281709dde1a5dd4303a02
SHA512e0e4c1cb28f27d3fbce872e37b4b1d9a5b8d2915e412d379fee4e3a818c67a4d24a6984bd4f8df85c0ccc88d332b364b26fa89036357ac4884755e5f807d69af
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD50b8070b0783019197683979a616f2746
SHA1cc57e68f953b30d1d063dad0d8c91e92fa58db50
SHA2567b24ad20214a129a44c98e8896bf7acd570430b36c69123fe8c202f3e45da0c0
SHA5122faaf449ba49a22a6d7a06782d20a5bf710978645f1081b97c9d897a6fa32957b14edb559388f60b01c65d21951d7d699361520b730055d83e6538bc0663e32f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD512e57b0018c22f0a2fbde478d9c257ce
SHA11d7593436c240e9b0274927831d5aaa96db57718
SHA2561b00d21451f4788b8735e8e9c912785ae91991866747240a4d51116e7f1ab6e9
SHA51275fa2c4338ebbc6ec0cc63a69123829d8ec3d621bdb543a927a8758d8ae22a8abe61ed2f7a5aa1363df5532c8932b3cb7aa2710e324ef95dd5a1dd428487c22a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5d41969eec04ea2bb1744846ab7df2514
SHA1fd55350079ee1bda7e26eec3165b309b906375b9
SHA256bfa3cc526d941a89104f8e4d566b8abd0c8be2c7a04d99d82b7df355ab51a6cc
SHA51221a8a3eb7130160de9502fc5f6662b25d1765d98aa6aa18607be03fde60e35207f8fe5bccdf74ecddfe158a23d6f9db78ada039ff99ec6e30cf627871b80feb8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD55fd2224d2ab16c8a9423fa9936e743c2
SHA1a0e0d54dbed8621e8941b61c3beddfce3ab1f590
SHA256c3ead1d752cfde57a23eb575fec6e5a14c5247e2b7edee11e71a793c758659f0
SHA512bb2daeb2b78ccf706d3bf913e0435425999b348e6cfe2685ebd914657aba9a88cd47c78ba567fd97272306aec789361c2b6ecb58378a8ad7724dd2acaca81c1d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\pending_pings\5f4b35d4-0489-4274-af5c-8e106dc3f78c
Filesize24KB
MD524a6792962c0049f64e086a5981fcd9f
SHA155bf8855c424d14fcb8abf04662da4e6a122cb95
SHA256b2caf1f81a1185b3bb976a3f7c7bfea4e27945aa625eb436129780ca5fca2249
SHA5126ec754eb155cfe9f09340b6f4e0f1f158454559be6de7e2b9dd829d01217c43981e3ce2850f28488d2ba89cf3fdbf3814a0fd3bf6bb6256816264ad029a98427
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\pending_pings\627c4153-63b0-4496-8399-3ab10945ff58
Filesize671B
MD55d262e0ff5b3c33793490b5d275b3fcf
SHA1b3c1fe5feeb931bb260023a34d56e5b6e853be96
SHA256b0b8f6d9db03166835eaefa3526615714c2a10403e3bcd10084660d0c6682da5
SHA512ab0c043d5338330722dc4de33aca6e62d00da32015f57410632da3a7b7e1f7c14e72acedbbbe61dfc719301109e770d77d8e745a82a78f68c74dcc4ebab28e47
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\pending_pings\70f17104-268c-469a-b54b-7e9b7f50549f
Filesize982B
MD540d3b12a341f47bc8f45007ee9f831cf
SHA18d7dd44c321584603a4a81ac1207f282113621a7
SHA25637d1d9c4e9566e73c6df75544212f35824e4d07a5dddf2161bca95227bf54531
SHA5129f70d877338fc8da7c42463281f289c4e5039fcd6b4bb6131147acf1da0b2c9781811194d80460888528be43be8bb50bf153af9d9c3b171c13deb6f093d3a91b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
11KB
MD5034c52f811be8e2845f462c076b53bea
SHA14bd880386998740424df1b2218eb7f06e701aab3
SHA2560fef4111a55ccdd2fa25a19194833c29c8cb264969ff9016bea289a7bcf28c27
SHA5121b09934de6ec5b99f88db75dfafd60eee78dd876eda717e2d75982f3708c31c9ef5667e56971903ed7179a65c7840b69166ebbc660012b4d94b4526856311127
-
Filesize
10KB
MD5211448cbee2d7e5aba44398047440e48
SHA186e43af1a7e92dc36f78bdd1cfb7857876e6e5a0
SHA256aa748a0f722369f2c96f43d8c896e8fb32cc01a2ecba7324b286e14f0585adea
SHA512dd8fe3ef678a0903b73a55f5d2e4f13f968490b83c1da6640a3303fa58494213e4101e0afe375c6d1096a95be3987d161ac5abc43ae3ecac5abf8d140332dec5
-
Filesize
15KB
MD5dfc1e995386392b1c2ed37b7323ff77c
SHA1e4f92d23076a73a735e67b404030da8a0a444683
SHA2565542fb5d37a7e7ef0339c6f0b00dd32ac3c1931360224458436284b73480804c
SHA51208fa50c815d2f677d847b343625fceb9f214a1a4706072fd4933c74c7d98aa2e0542a9328ed1a30712fd28d6784af3c16147f11ebe7de4389a4000cb1bf878c9
-
Filesize
11KB
MD543e8ac58c9a859cccdff72f5129bd5d8
SHA15b6600b3e5f01d1010b503364de0221e28440999
SHA25668d0c4e873cf5e050f0da82901bcf958d8c00effa5c7adaaf5f5cbfd75390701
SHA512e878044ab2989c6e0339cf486af7a9fe3e5e0ec513f569366e297d147fe70add53e7dab93f09a06dfec41ca7ea6cdf7775c90620a49ef088329ba208927d38c9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize800KB
MD599fb590caea1d2fdc5d846c025c89685
SHA15e54d2da6919869d167a5a09fd791cbd706aa04a
SHA2564328f9f75af17fc1531fd863f16d9beb5570639cf5136ab0d79d1a3d329d5894
SHA512146be9e5acc84fce960cf6374f3e303ac4881a30709c06515db551749f35a3a54002dcec01cd2d9572c97a2ba174937ae1d7c8873158bcaacb96ed44b5c1e4e7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize3.0MB
MD546b8e27454296c920c91aa8556c51618
SHA167653ab5874217ca4a5d4138a21c1fe134beb588
SHA2563f8294b6807ca850104a0ca51d5dc8d549e1f407baf5654e2b5aa4a173f5a433
SHA512804afe7889893901b5f28f698f0eb3763fddfde3332d6da5b6a1f0cbc680c6c3e4af4b3e9cf74708119bb5a66edea3826a974ce849032a9dd25d3f9453304d94