Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23/11/2024, 23:21
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240903-en
General
-
Target
file.exe
-
Size
1.8MB
-
MD5
e91bdd398e42904cbc56344331953c6a
-
SHA1
c755e1f2c0c5de38eb5029a60129cd86ad7846ed
-
SHA256
52783df94ea5aa0f1b29c4a9ea15ecadb2c469886a02030ee86a2da56a8b43e9
-
SHA512
03e79400ecd6d50f9d7f694fe651235e1f7f3f6ecb632a94e719519a52c63c81cb7512510ed4c67dd207cfc65db457e9dff5ea147e18ceda2ebac241f405d9fe
-
SSDEEP
49152:eE0/kh6mnC75ciMnJ5H9Fnxd5QhLTGDDG5tx0GefNZCKY3:WKCiiMbH9FnyhXa20Gi6T
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Cryptbot family
-
Detects CryptBot payload 1 IoCs
CryptBot is a C++ stealer distributed widely in bundle with other software.
resource yara_rule behavioral2/memory/3276-506-0x0000000069CC0000-0x000000006A71B000-memory.dmp family_cryptbot_v3 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 8f6776c40a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 8f6776c40a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 8f6776c40a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 8f6776c40a.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 8f6776c40a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 8f6776c40a.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a0186cdef7.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8f6776c40a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 21ca88b845.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 625ec1abdf.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 2728 chrome.exe 5732 chrome.exe 5512 chrome.exe 848 chrome.exe -
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8f6776c40a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 21ca88b845.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 625ec1abdf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a0186cdef7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 21ca88b845.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 625ec1abdf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a0186cdef7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8f6776c40a.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation file.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 21ca88b845.exe -
Executes dropped EXE 10 IoCs
pid Process 4572 skotes.exe 3276 21ca88b845.exe 1516 625ec1abdf.exe 2532 a0186cdef7.exe 952 ca396b0e18.exe 4604 8f6776c40a.exe 5832 skotes.exe 5844 service123.exe 5336 skotes.exe 5436 service123.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine file.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 21ca88b845.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 625ec1abdf.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine a0186cdef7.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 8f6776c40a.exe -
Loads dropped DLL 2 IoCs
pid Process 5844 service123.exe 5436 service123.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 8f6776c40a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 8f6776c40a.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ca396b0e18.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008548001\\ca396b0e18.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\8f6776c40a.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008549001\\8f6776c40a.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\625ec1abdf.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008546001\\625ec1abdf.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\a0186cdef7.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008547001\\a0186cdef7.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000a000000023b84-83.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 4480 file.exe 4572 skotes.exe 3276 21ca88b845.exe 1516 625ec1abdf.exe 2532 a0186cdef7.exe 4604 8f6776c40a.exe 5832 skotes.exe 5336 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2192 3276 WerFault.exe 93 -
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 21ca88b845.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8f6776c40a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a0186cdef7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ca396b0e18.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 625ec1abdf.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 21ca88b845.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 21ca88b845.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 5 IoCs
pid Process 4724 taskkill.exe 4556 taskkill.exe 3740 taskkill.exe 4456 taskkill.exe 1952 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 6044 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 4480 file.exe 4480 file.exe 4572 skotes.exe 4572 skotes.exe 3276 21ca88b845.exe 3276 21ca88b845.exe 1516 625ec1abdf.exe 1516 625ec1abdf.exe 2532 a0186cdef7.exe 2532 a0186cdef7.exe 952 ca396b0e18.exe 952 ca396b0e18.exe 4604 8f6776c40a.exe 4604 8f6776c40a.exe 4604 8f6776c40a.exe 4604 8f6776c40a.exe 4604 8f6776c40a.exe 952 ca396b0e18.exe 952 ca396b0e18.exe 5732 chrome.exe 5732 chrome.exe 5832 skotes.exe 5832 skotes.exe 5336 skotes.exe 5336 skotes.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 5732 chrome.exe 5732 chrome.exe 5732 chrome.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeDebugPrivilege 1952 taskkill.exe Token: SeDebugPrivilege 4724 taskkill.exe Token: SeDebugPrivilege 4556 taskkill.exe Token: SeDebugPrivilege 3740 taskkill.exe Token: SeDebugPrivilege 4456 taskkill.exe Token: SeDebugPrivilege 2452 firefox.exe Token: SeDebugPrivilege 2452 firefox.exe Token: SeDebugPrivilege 4604 8f6776c40a.exe Token: SeShutdownPrivilege 5732 chrome.exe Token: SeCreatePagefilePrivilege 5732 chrome.exe Token: SeShutdownPrivilege 5732 chrome.exe Token: SeCreatePagefilePrivilege 5732 chrome.exe Token: SeDebugPrivilege 2452 firefox.exe Token: SeDebugPrivilege 2452 firefox.exe Token: SeDebugPrivilege 2452 firefox.exe -
Suspicious use of FindShellTrayWindow 60 IoCs
pid Process 4480 file.exe 952 ca396b0e18.exe 952 ca396b0e18.exe 952 ca396b0e18.exe 952 ca396b0e18.exe 952 ca396b0e18.exe 952 ca396b0e18.exe 952 ca396b0e18.exe 952 ca396b0e18.exe 2452 firefox.exe 2452 firefox.exe 2452 firefox.exe 2452 firefox.exe 2452 firefox.exe 2452 firefox.exe 2452 firefox.exe 2452 firefox.exe 2452 firefox.exe 2452 firefox.exe 2452 firefox.exe 2452 firefox.exe 2452 firefox.exe 2452 firefox.exe 2452 firefox.exe 2452 firefox.exe 2452 firefox.exe 2452 firefox.exe 2452 firefox.exe 2452 firefox.exe 2452 firefox.exe 952 ca396b0e18.exe 952 ca396b0e18.exe 952 ca396b0e18.exe 952 ca396b0e18.exe 5732 chrome.exe 5732 chrome.exe 5732 chrome.exe 5732 chrome.exe 5732 chrome.exe 5732 chrome.exe 5732 chrome.exe 5732 chrome.exe 5732 chrome.exe 5732 chrome.exe 5732 chrome.exe 5732 chrome.exe 5732 chrome.exe 5732 chrome.exe 5732 chrome.exe 5732 chrome.exe 5732 chrome.exe 5732 chrome.exe 5732 chrome.exe 5732 chrome.exe 5732 chrome.exe 5732 chrome.exe 5732 chrome.exe 5732 chrome.exe 5732 chrome.exe 5732 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 952 ca396b0e18.exe 952 ca396b0e18.exe 952 ca396b0e18.exe 952 ca396b0e18.exe 952 ca396b0e18.exe 952 ca396b0e18.exe 952 ca396b0e18.exe 952 ca396b0e18.exe 2452 firefox.exe 2452 firefox.exe 2452 firefox.exe 2452 firefox.exe 2452 firefox.exe 2452 firefox.exe 2452 firefox.exe 2452 firefox.exe 2452 firefox.exe 2452 firefox.exe 2452 firefox.exe 2452 firefox.exe 2452 firefox.exe 2452 firefox.exe 2452 firefox.exe 2452 firefox.exe 2452 firefox.exe 2452 firefox.exe 2452 firefox.exe 2452 firefox.exe 952 ca396b0e18.exe 952 ca396b0e18.exe 952 ca396b0e18.exe 952 ca396b0e18.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2452 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4480 wrote to memory of 4572 4480 file.exe 83 PID 4480 wrote to memory of 4572 4480 file.exe 83 PID 4480 wrote to memory of 4572 4480 file.exe 83 PID 4572 wrote to memory of 3276 4572 skotes.exe 93 PID 4572 wrote to memory of 3276 4572 skotes.exe 93 PID 4572 wrote to memory of 3276 4572 skotes.exe 93 PID 4572 wrote to memory of 1516 4572 skotes.exe 98 PID 4572 wrote to memory of 1516 4572 skotes.exe 98 PID 4572 wrote to memory of 1516 4572 skotes.exe 98 PID 4572 wrote to memory of 2532 4572 skotes.exe 100 PID 4572 wrote to memory of 2532 4572 skotes.exe 100 PID 4572 wrote to memory of 2532 4572 skotes.exe 100 PID 4572 wrote to memory of 952 4572 skotes.exe 101 PID 4572 wrote to memory of 952 4572 skotes.exe 101 PID 4572 wrote to memory of 952 4572 skotes.exe 101 PID 952 wrote to memory of 1952 952 ca396b0e18.exe 102 PID 952 wrote to memory of 1952 952 ca396b0e18.exe 102 PID 952 wrote to memory of 1952 952 ca396b0e18.exe 102 PID 952 wrote to memory of 4724 952 ca396b0e18.exe 104 PID 952 wrote to memory of 4724 952 ca396b0e18.exe 104 PID 952 wrote to memory of 4724 952 ca396b0e18.exe 104 PID 952 wrote to memory of 4556 952 ca396b0e18.exe 106 PID 952 wrote to memory of 4556 952 ca396b0e18.exe 106 PID 952 wrote to memory of 4556 952 ca396b0e18.exe 106 PID 952 wrote to memory of 3740 952 ca396b0e18.exe 108 PID 952 wrote to memory of 3740 952 ca396b0e18.exe 108 PID 952 wrote to memory of 3740 952 ca396b0e18.exe 108 PID 952 wrote to memory of 4456 952 ca396b0e18.exe 110 PID 952 wrote to memory of 4456 952 ca396b0e18.exe 110 PID 952 wrote to memory of 4456 952 ca396b0e18.exe 110 PID 4572 wrote to memory of 4604 4572 skotes.exe 112 PID 4572 wrote to memory of 4604 4572 skotes.exe 112 PID 4572 wrote to memory of 4604 4572 skotes.exe 112 PID 952 wrote to memory of 2904 952 ca396b0e18.exe 113 PID 952 wrote to memory of 2904 952 ca396b0e18.exe 113 PID 2904 wrote to memory of 2452 2904 firefox.exe 114 PID 2904 wrote to memory of 2452 2904 firefox.exe 114 PID 2904 wrote to memory of 2452 2904 firefox.exe 114 PID 2904 wrote to memory of 2452 2904 firefox.exe 114 PID 2904 wrote to memory of 2452 2904 firefox.exe 114 PID 2904 wrote to memory of 2452 2904 firefox.exe 114 PID 2904 wrote to memory of 2452 2904 firefox.exe 114 PID 2904 wrote to memory of 2452 2904 firefox.exe 114 PID 2904 wrote to memory of 2452 2904 firefox.exe 114 PID 2904 wrote to memory of 2452 2904 firefox.exe 114 PID 2904 wrote to memory of 2452 2904 firefox.exe 114 PID 2452 wrote to memory of 1792 2452 firefox.exe 115 PID 2452 wrote to memory of 1792 2452 firefox.exe 115 PID 2452 wrote to memory of 1792 2452 firefox.exe 115 PID 2452 wrote to memory of 1792 2452 firefox.exe 115 PID 2452 wrote to memory of 1792 2452 firefox.exe 115 PID 2452 wrote to memory of 1792 2452 firefox.exe 115 PID 2452 wrote to memory of 1792 2452 firefox.exe 115 PID 2452 wrote to memory of 1792 2452 firefox.exe 115 PID 2452 wrote to memory of 1792 2452 firefox.exe 115 PID 2452 wrote to memory of 1792 2452 firefox.exe 115 PID 2452 wrote to memory of 1792 2452 firefox.exe 115 PID 2452 wrote to memory of 1792 2452 firefox.exe 115 PID 2452 wrote to memory of 1792 2452 firefox.exe 115 PID 2452 wrote to memory of 1792 2452 firefox.exe 115 PID 2452 wrote to memory of 1792 2452 firefox.exe 115 PID 2452 wrote to memory of 1792 2452 firefox.exe 115 PID 2452 wrote to memory of 1792 2452 firefox.exe 115 PID 2452 wrote to memory of 1792 2452 firefox.exe 115 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Users\Admin\AppData\Local\Temp\1008541001\21ca88b845.exe"C:\Users\Admin\AppData\Local\Temp\1008541001\21ca88b845.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:3276 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5732 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffde1ebcc40,0x7ffde1ebcc4c,0x7ffde1ebcc585⤵PID:5756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2104,i,4482630471973514639,3524070792843134046,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1772 /prefetch:25⤵PID:6036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1924,i,4482630471973514639,3524070792843134046,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2140 /prefetch:35⤵PID:6040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2264,i,4482630471973514639,3524070792843134046,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2452 /prefetch:85⤵PID:4700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3164,i,4482630471973514639,3524070792843134046,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3184 /prefetch:15⤵
- Uses browser remote debugging
PID:5512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3272,i,4482630471973514639,3524070792843134046,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3428 /prefetch:15⤵
- Uses browser remote debugging
PID:848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4412,i,4482630471973514639,3524070792843134046,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4156 /prefetch:15⤵
- Uses browser remote debugging
PID:2728
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5844
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:6044
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3276 -s 12924⤵
- Program crash
PID:2192
-
-
-
C:\Users\Admin\AppData\Local\Temp\1008546001\625ec1abdf.exe"C:\Users\Admin\AppData\Local\Temp\1008546001\625ec1abdf.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1516
-
-
C:\Users\Admin\AppData\Local\Temp\1008547001\a0186cdef7.exe"C:\Users\Admin\AppData\Local\Temp\1008547001\a0186cdef7.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2532
-
-
C:\Users\Admin\AppData\Local\Temp\1008548001\ca396b0e18.exe"C:\Users\Admin\AppData\Local\Temp\1008548001\ca396b0e18.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1952
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4724
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4556
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3740
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4456
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1980 -parentBuildID 20240401114208 -prefsHandle 1896 -prefMapHandle 1888 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {be591c3b-ff01-49da-8033-b22c1b987229} 2452 "\\.\pipe\gecko-crash-server-pipe.2452" gpu6⤵PID:1792
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2464 -parentBuildID 20240401114208 -prefsHandle 2440 -prefMapHandle 2396 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2c71f18a-51fc-4eda-810b-b57770bd2b4b} 2452 "\\.\pipe\gecko-crash-server-pipe.2452" socket6⤵PID:4752
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2824 -childID 1 -isForBrowser -prefsHandle 3100 -prefMapHandle 1504 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1140 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {18e0c6c4-3b7e-41ee-a98c-f0c46cf9dc94} 2452 "\\.\pipe\gecko-crash-server-pipe.2452" tab6⤵PID:4912
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4012 -childID 2 -isForBrowser -prefsHandle 4004 -prefMapHandle 4000 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1140 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cd07fb37-3255-4777-9579-f5c8246726b0} 2452 "\\.\pipe\gecko-crash-server-pipe.2452" tab6⤵PID:3464
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4688 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4728 -prefMapHandle 4724 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {eecc3306-4a5d-4b5c-a272-28c362fdc28d} 2452 "\\.\pipe\gecko-crash-server-pipe.2452" utility6⤵
- Checks processor information in registry
PID:5372
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4704 -childID 3 -isForBrowser -prefsHandle 5264 -prefMapHandle 5260 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1140 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {36cb6ec6-788d-4036-80ba-77ffd416f1ed} 2452 "\\.\pipe\gecko-crash-server-pipe.2452" tab6⤵PID:5860
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5392 -childID 4 -isForBrowser -prefsHandle 5472 -prefMapHandle 5468 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1140 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9938d444-53fe-4814-aa9d-5b31fe240254} 2452 "\\.\pipe\gecko-crash-server-pipe.2452" tab6⤵PID:5876
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5276 -childID 5 -isForBrowser -prefsHandle 5368 -prefMapHandle 5372 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1140 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0e55d274-fb0c-4ba4-9208-b157d4aebf6c} 2452 "\\.\pipe\gecko-crash-server-pipe.2452" tab6⤵PID:5892
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1008549001\8f6776c40a.exe"C:\Users\Admin\AppData\Local\Temp\1008549001\8f6776c40a.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4604
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4628
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5832
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3276 -ip 32761⤵PID:1796
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5336
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5436
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ws2kncw.default-release\activity-stream.discovery_stream.json.tmp
Filesize19KB
MD534ed64b01a8268f9d7106fa6109ba442
SHA1832e1ba3f4c9f5229db29cbed2b5e1178a62cd8a
SHA256a55759cb277822f34c5284d1a3cf4f737fe51d14dbb5fc78aee8dc18725e16a8
SHA5124242a1150b269a28d1d33365aeb0015dcf636bd0890522602429d57f8ca23ec772bf9f26671e66ca12125c79a4cb589094fcc792fa1ffa74d1372cfb03ccd737
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ws2kncw.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD566b23bc8a36ec444b1df138f48bb5d9d
SHA18f10f0dd47796a704289f1e2e505d56e7ac3b1b8
SHA25653dcbdaaea6a4242e02676fe9c33495b579ffd6970b83e3b4b169da9d6daf7d1
SHA5129a0beffe037f9f9f2e70e47b387915bc7f542da2824414da119e92638a7f7e2cf243eb0659e41314eab86d97c150c56c6f0d139b8736bca3046e6b18447b5ac9
-
Filesize
4.2MB
MD5e4ce436577c61894061cb66d79ff104c
SHA1f9fefdd313f0418ddf9d143bf66566c2932cc0b5
SHA256f9445c47bc1b7580e4a81cda77fe412ffad705411ab1cc28d164250d275a3017
SHA5126d3ead9324b8061e32f1e4dc133e6a1e129d24cd17d147595fe8aeb445c462b39a696edb5c4fa005d4fb86113b7183f37103b0e10648490ed87302fc423fb222
-
Filesize
1.8MB
MD5dcc6d9e989871c3db2a1285b745242de
SHA11a7bb23a86e5c7c3128094067240748db0dc5ff6
SHA256ee41591cc85c94552c3e4404da58ef295323da39a7d8236b30e705e512a829ce
SHA512895d319679156d4bc0ef75433d547bdee7e0f3847aa7b318f756033005937e2c5b47456c34cdface4a682667fdc812a6521087b7e8552b7a27a6476120f20eaa
-
Filesize
1.7MB
MD54bad8287c5a86eece84ae3eeef0e3ece
SHA1241ff4e835e0a51700838430a596e197259b3ee2
SHA256d605ba8b1c39b46eb25930d626732370bc4fbe2552a047fad1db96c2f7086d58
SHA5129e4e47dd222e5076d7384b395b8af7586536aa7358b576fb7813e59b4a6b7ca90da74a58702b68160cb01b2ba0b6c354509df8dad2dde5d10ac17fdebf2c21ea
-
Filesize
900KB
MD538ab4002098bc179bd76dbacbe791994
SHA11a4d0d6bf4890c0f59ae6c065d2b5265e3a0753d
SHA25695bae9c537a5eecd7e8e0caa5b63099b4abf43342d05a64a073264075829688e
SHA512ae48ab47c0042a4d00e5d21b3a2d72f49ae2eb633e786667697497af862a58d371d5774fc5af5115097325cd4aa48cbe164367579cdec825311e25cd8f37b7d3
-
Filesize
2.6MB
MD52239c165ff7fc50f9fba6ef646b0ea20
SHA137858e5886a9b568f400b9ceb17feadfe0685893
SHA256d38fcfed960cb297de89549c147a3c031ec527aa9978222abb9623da72ea91cf
SHA5128eede3843e8771043c1d74593c9ec60230277570cd108d81b1c6f38a3255663272b69600a516870150d4b8c41b3164d470759e31587878219a8f9d918bcfa715
-
Filesize
1.8MB
MD5e91bdd398e42904cbc56344331953c6a
SHA1c755e1f2c0c5de38eb5029a60129cd86ad7846ed
SHA25652783df94ea5aa0f1b29c4a9ea15ecadb2c469886a02030ee86a2da56a8b43e9
SHA51203e79400ecd6d50f9d7f694fe651235e1f7f3f6ecb632a94e719519a52c63c81cb7512510ed4c67dd207cfc65db457e9dff5ea147e18ceda2ebac241f405d9fe
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin
Filesize6KB
MD542ceb00038b583d4b29de4c311689397
SHA1a7c7836190799892a5515bccb48b6a499d4b89d8
SHA25640a4952c9c8669d3fa2849284688272d82d419c0ff0f497ac53a3755badf6a62
SHA5126f9d370ebfab2b325967bc23b486fcc0e0cfed0d1cbaf4e1c625fb8ef9361d3c9aa0fb6b65e474403e69b719490fc5d7205fd68d1939b226a61e925c0d1a685c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin
Filesize18KB
MD524f580b9708a36ac689151a5a48db1e9
SHA1afe6536ba55b0ea865967f08fc14b793d8b3d9f4
SHA25670cd660896c9dec3c4f13016310fde37f12eecd86e43d208a402c102cb505c5f
SHA512e215d5cf0dc0a8f6383b717eaf21cc1d704c2dec6575246013d65ef898f89fe8fbe97308ea210ec81dcd66ce9a590b65cdb83c3738bbfa2b2757026bdc09c9dd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin
Filesize10KB
MD595af8efe44538bb245c43a2c03026de2
SHA1fdb718eb87dd659392f9bc794a2ec79105a6957d
SHA2561ad8c4ba584f668b6df24014d1b0273bf34646b71f126e90ad8d70436396ac36
SHA512df0dd17db9929b131f3e511aea273590ea97e3beb6c3e9a99f78784f1ca530c9d4be9aa4505bf676e0c4c3289a10a316c179bf684788f344d9e8ed78dbfc80b9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin
Filesize10KB
MD53b3f0784aa6a8a9704975cc7906fd1c9
SHA148584c6cca38d2f0f0522253801db02bfa0db4cd
SHA256e13d010bd5f6baeb4910fb1f19d3a08a306534afbdbfab2a93216d70b2615f10
SHA5129b9993c11db4d3d0cb11c9dd089384e87bc53a4b5b2a9478a6c72b3f7781a208ac51be0d9d777626f339a6d47fb6bad2866dabf193b77d6a54b8f35ca4b813db
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5415d9debd8af312993e73db07328cb12
SHA1dc61f1434427540f1292f879166768bfbdd3af1a
SHA256b686c96716d6c9ce3658b4f81e8a86a35ab257cc183ccdfc43c5c3d850b12525
SHA5122142e0f711485a6ae9eff3c714e00641247aee2d929369ab401b191d968587fda601024ba79ba24a342008cfc59622ae82d9c29bb406a79149ff3eb1f793cf4c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD574ced7027f20904f9b2c2474cdec49f5
SHA11c1a2dbc3e243e391d37dc97fcb23cb57b0e4322
SHA25665ffc709cb0a736ebf2b57c06922a3f17f1c2d87374b69a362efd8190dc4db92
SHA5123cc092631fa5d901c7edd0cb3fc33744e72bdaace4aaabf6aee0e67b5c8e41bff36e1ef133c7285730784c6ce1be8fbfc23bbbb70fdc36f79fd13d87b6e8fb07
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\39df0670-e656-4f92-82d7-d0ee0b97207c
Filesize671B
MD552d853deecd1e4e52fa4f2b35650bd73
SHA1a88edd0b106457a487ddc95675823e5c10ecf96c
SHA256647b05e4597564626765db86550897b1b977114bd53910d3210edc8e95ed6387
SHA512e13a39185a0c878488d5d8fcc45b8c7cf3250c7d946d843ad38177035a83d3b78c02fee82407726948e0c1747314069db37193ff11bb0670e8a97853fc329665
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\4c69c46d-4290-4ccb-8451-e1a7a6462b0f
Filesize26KB
MD580ae37dc4328c353940657649ea80d65
SHA1d6446f9fa9b0445cb2355844ae119cb9612aa1dd
SHA256e2d4e265335b696ac57b8b46f9022e34e642fa7351c360cb2fc52ce694e97293
SHA512910e2c6bc763e4522b524429dc89ca6587840b56d53719de2517183a1cb10875ba5e8b1db0b5a78d39dc95e19ee428937367a65c975f559163a5a65fd5f9328d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\67bf9166-4329-4b14-b3b4-b928866c2da8
Filesize982B
MD5ccbf4ded5ef6bc730e89cc2649fefd60
SHA1639288df7f165464f66c6e465c738009638d7f47
SHA25649a010cbb07f38fa176d6008fb60237e89b5e92383ab4faef3278ac506fa56b4
SHA5125fabc036402395eec5d7f567f83b15cbb68c74c85e24193a3cee3ca125faa334d609a3183cb1b7cb004738752c3663c3f878551a3167ee98d10dc5ec3642ce26
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD5467744e70ba0a03db8b25c88aab72e0b
SHA13df6b9d2b8c6879746eb573239ad86b65b5988db
SHA256670222a707f81d264ac671699ac69fb94f9f6909904be2ea704b724c365dcd45
SHA5129237cce101218529948a50352e26c0e1a5cf8293f55ad6f45f05cc2d6326e62647ea30702547570f6f026da31844e074c532ebcbc754f29368ba2046e3eed774
-
Filesize
11KB
MD59c914b732272a7d5a5138fb5af845b96
SHA1db72462e314909a2b9f1b659d4791c711f106176
SHA256ea4453d3319fd55a2ceaccb0840fbe3037457e7f624109f0196b71957585fddf
SHA5123a9e0993a2ed513fe82a992e95416387eaf0885664d859b762cee8049129e1742047b9abd5e27d578a54ccddf8e4e01c2c1684ca85f6ed9df5f220c381788076
-
Filesize
11KB
MD53f02112d04574e9bdb79fb0f9db89b45
SHA1b6e0ca8dcf19e6e9b0885708bb756022b8676ea8
SHA256c9c4084f9a1dfceb0421b3c80ad4a5e2edb4e060fbaf8a006e79aeed50ddb2bc
SHA512879b35397d5e1b45554c5529d78c2deaf2e0e2de77f33a569c9d68bcf4aeb880c07cf46157dcfed1e3c08e4da7e4152108c916cdcb13fb01c5e56715109aed3f
-
Filesize
15KB
MD5f5f9e20a23c04a09e8807b18cafd3bfd
SHA1d68589f8a9e0e47c196164749a68afee6c26f345
SHA25689222bcc11556e8bcc06c148597653822e076c9551672cbabd5298c71b55f7b4
SHA51294adbee084e6287fbb7ba435194ee23a58810aba7a75a8a5d6315ac088493cabb74019d49105dc538c4b85814fd660e923a2cbbef2e9135e66c91c315af70749
-
Filesize
15KB
MD5bfc4d3fed44bb6a7e37a3b8bf5c7e85a
SHA189726c27a4c382e6fa318c332d8492d1764be77b
SHA256cdda95ca70f7544da19341fa08958085668beae53c8d49a4366de59aa3c3a40a
SHA5127ae56ed5d2e593b57b14d6933bd9f8997841d6243c76e0b29440646bf02605dfe88ddc5da2faf55e7107171993cd7f42e90677bce9b496d189cd84fdd6ad315b