Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2024 02:42
Static task
static1
Behavioral task
behavioral1
Sample
94a2471c4477560421cd9fb3ff6cba275c459499c11d92436e88d1c11fc56cd1.exe
Resource
win7-20240708-en
General
-
Target
94a2471c4477560421cd9fb3ff6cba275c459499c11d92436e88d1c11fc56cd1.exe
-
Size
1.8MB
-
MD5
09109fbe23b94bd3dc2605d7ab550ce3
-
SHA1
3720744b4f909c4d98756c822c33ffa1f9f77b8b
-
SHA256
94a2471c4477560421cd9fb3ff6cba275c459499c11d92436e88d1c11fc56cd1
-
SHA512
843535d1720736a7325bdf77f46184d8c0c0ff5f45c8e42b2517e021d370a51d4ca91847fc454c1dcf411126449d8e96741b1965861992d5344caf636d5f6ce1
-
SSDEEP
49152:xrUNrzMgD26tRCQfktF4r43FSnP/MroaSYKCSltdDFBjn:upD26t0WkFq4VGMroaS3CitdvD
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Cryptbot family
-
Detects CryptBot payload 1 IoCs
CryptBot is a C++ stealer distributed widely in bundle with other software.
resource yara_rule behavioral2/memory/4828-102-0x0000000069CC0000-0x000000006A71B000-memory.dmp family_cryptbot_v3 -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection ae69b4edb3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" ae69b4edb3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" ae69b4edb3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" ae69b4edb3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" ae69b4edb3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" ae69b4edb3.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 94a2471c4477560421cd9fb3ff6cba275c459499c11d92436e88d1c11fc56cd1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ea700e39f0.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d1fa64984e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ae69b4edb3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 19aee2fa4c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 6056 chrome.exe 5216 chrome.exe 4440 chrome.exe 5668 chrome.exe -
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 94a2471c4477560421cd9fb3ff6cba275c459499c11d92436e88d1c11fc56cd1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d1fa64984e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 94a2471c4477560421cd9fb3ff6cba275c459499c11d92436e88d1c11fc56cd1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ea700e39f0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 19aee2fa4c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ae69b4edb3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ea700e39f0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d1fa64984e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 19aee2fa4c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ae69b4edb3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation ea700e39f0.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 94a2471c4477560421cd9fb3ff6cba275c459499c11d92436e88d1c11fc56cd1.exe -
Executes dropped EXE 12 IoCs
pid Process 448 skotes.exe 1456 skotes.exe 4828 ea700e39f0.exe 1056 d1fa64984e.exe 4532 19aee2fa4c.exe 2296 cb1271106a.exe 3616 ae69b4edb3.exe 5528 service123.exe 3972 skotes.exe 3996 service123.exe 1388 skotes.exe 1240 service123.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine ea700e39f0.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine d1fa64984e.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 19aee2fa4c.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine ae69b4edb3.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 94a2471c4477560421cd9fb3ff6cba275c459499c11d92436e88d1c11fc56cd1.exe -
Loads dropped DLL 3 IoCs
pid Process 5528 service123.exe 3996 service123.exe 1240 service123.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features ae69b4edb3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" ae69b4edb3.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\d1fa64984e.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008327001\\d1fa64984e.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\19aee2fa4c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008328001\\19aee2fa4c.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cb1271106a.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008329001\\cb1271106a.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ae69b4edb3.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008330001\\ae69b4edb3.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000023cdb-87.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 3596 94a2471c4477560421cd9fb3ff6cba275c459499c11d92436e88d1c11fc56cd1.exe 448 skotes.exe 1456 skotes.exe 4828 ea700e39f0.exe 1056 d1fa64984e.exe 4532 19aee2fa4c.exe 3616 ae69b4edb3.exe 3972 skotes.exe 1388 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 94a2471c4477560421cd9fb3ff6cba275c459499c11d92436e88d1c11fc56cd1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5532 4828 WerFault.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 94a2471c4477560421cd9fb3ff6cba275c459499c11d92436e88d1c11fc56cd1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d1fa64984e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 19aee2fa4c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea700e39f0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cb1271106a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ae69b4edb3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ea700e39f0.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ea700e39f0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Kills process with taskkill 5 IoCs
pid Process 3556 taskkill.exe 2932 taskkill.exe 2404 taskkill.exe 2484 taskkill.exe 440 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3732 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 3596 94a2471c4477560421cd9fb3ff6cba275c459499c11d92436e88d1c11fc56cd1.exe 3596 94a2471c4477560421cd9fb3ff6cba275c459499c11d92436e88d1c11fc56cd1.exe 448 skotes.exe 448 skotes.exe 1456 skotes.exe 1456 skotes.exe 4828 ea700e39f0.exe 4828 ea700e39f0.exe 1056 d1fa64984e.exe 1056 d1fa64984e.exe 4532 19aee2fa4c.exe 4532 19aee2fa4c.exe 2296 cb1271106a.exe 2296 cb1271106a.exe 3616 ae69b4edb3.exe 3616 ae69b4edb3.exe 2296 cb1271106a.exe 2296 cb1271106a.exe 3616 ae69b4edb3.exe 3616 ae69b4edb3.exe 3616 ae69b4edb3.exe 5216 chrome.exe 5216 chrome.exe 3972 skotes.exe 3972 skotes.exe 1388 skotes.exe 1388 skotes.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 3556 taskkill.exe Token: SeDebugPrivilege 2932 taskkill.exe Token: SeDebugPrivilege 2404 taskkill.exe Token: SeDebugPrivilege 2484 taskkill.exe Token: SeDebugPrivilege 440 taskkill.exe Token: SeDebugPrivilege 1900 firefox.exe Token: SeDebugPrivilege 1900 firefox.exe Token: SeDebugPrivilege 3616 ae69b4edb3.exe Token: SeShutdownPrivilege 5216 chrome.exe Token: SeCreatePagefilePrivilege 5216 chrome.exe Token: SeShutdownPrivilege 5216 chrome.exe Token: SeCreatePagefilePrivilege 5216 chrome.exe -
Suspicious use of FindShellTrayWindow 61 IoCs
pid Process 3596 94a2471c4477560421cd9fb3ff6cba275c459499c11d92436e88d1c11fc56cd1.exe 2296 cb1271106a.exe 2296 cb1271106a.exe 2296 cb1271106a.exe 2296 cb1271106a.exe 2296 cb1271106a.exe 2296 cb1271106a.exe 2296 cb1271106a.exe 2296 cb1271106a.exe 2296 cb1271106a.exe 1900 firefox.exe 1900 firefox.exe 1900 firefox.exe 1900 firefox.exe 2296 cb1271106a.exe 1900 firefox.exe 1900 firefox.exe 1900 firefox.exe 1900 firefox.exe 1900 firefox.exe 1900 firefox.exe 1900 firefox.exe 1900 firefox.exe 1900 firefox.exe 1900 firefox.exe 1900 firefox.exe 1900 firefox.exe 1900 firefox.exe 1900 firefox.exe 1900 firefox.exe 1900 firefox.exe 1900 firefox.exe 2296 cb1271106a.exe 2296 cb1271106a.exe 2296 cb1271106a.exe 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe 5216 chrome.exe -
Suspicious use of SendNotifyMessage 33 IoCs
pid Process 2296 cb1271106a.exe 2296 cb1271106a.exe 2296 cb1271106a.exe 2296 cb1271106a.exe 2296 cb1271106a.exe 2296 cb1271106a.exe 2296 cb1271106a.exe 2296 cb1271106a.exe 2296 cb1271106a.exe 1900 firefox.exe 1900 firefox.exe 1900 firefox.exe 1900 firefox.exe 2296 cb1271106a.exe 1900 firefox.exe 1900 firefox.exe 1900 firefox.exe 1900 firefox.exe 1900 firefox.exe 1900 firefox.exe 1900 firefox.exe 1900 firefox.exe 1900 firefox.exe 1900 firefox.exe 1900 firefox.exe 1900 firefox.exe 1900 firefox.exe 1900 firefox.exe 1900 firefox.exe 1900 firefox.exe 2296 cb1271106a.exe 2296 cb1271106a.exe 2296 cb1271106a.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1900 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3596 wrote to memory of 448 3596 94a2471c4477560421cd9fb3ff6cba275c459499c11d92436e88d1c11fc56cd1.exe 82 PID 3596 wrote to memory of 448 3596 94a2471c4477560421cd9fb3ff6cba275c459499c11d92436e88d1c11fc56cd1.exe 82 PID 3596 wrote to memory of 448 3596 94a2471c4477560421cd9fb3ff6cba275c459499c11d92436e88d1c11fc56cd1.exe 82 PID 448 wrote to memory of 4828 448 skotes.exe 89 PID 448 wrote to memory of 4828 448 skotes.exe 89 PID 448 wrote to memory of 4828 448 skotes.exe 89 PID 448 wrote to memory of 1056 448 skotes.exe 92 PID 448 wrote to memory of 1056 448 skotes.exe 92 PID 448 wrote to memory of 1056 448 skotes.exe 92 PID 448 wrote to memory of 4532 448 skotes.exe 93 PID 448 wrote to memory of 4532 448 skotes.exe 93 PID 448 wrote to memory of 4532 448 skotes.exe 93 PID 448 wrote to memory of 2296 448 skotes.exe 94 PID 448 wrote to memory of 2296 448 skotes.exe 94 PID 448 wrote to memory of 2296 448 skotes.exe 94 PID 2296 wrote to memory of 3556 2296 cb1271106a.exe 95 PID 2296 wrote to memory of 3556 2296 cb1271106a.exe 95 PID 2296 wrote to memory of 3556 2296 cb1271106a.exe 95 PID 2296 wrote to memory of 2932 2296 cb1271106a.exe 97 PID 2296 wrote to memory of 2932 2296 cb1271106a.exe 97 PID 2296 wrote to memory of 2932 2296 cb1271106a.exe 97 PID 2296 wrote to memory of 2404 2296 cb1271106a.exe 99 PID 2296 wrote to memory of 2404 2296 cb1271106a.exe 99 PID 2296 wrote to memory of 2404 2296 cb1271106a.exe 99 PID 2296 wrote to memory of 2484 2296 cb1271106a.exe 101 PID 2296 wrote to memory of 2484 2296 cb1271106a.exe 101 PID 2296 wrote to memory of 2484 2296 cb1271106a.exe 101 PID 2296 wrote to memory of 440 2296 cb1271106a.exe 103 PID 2296 wrote to memory of 440 2296 cb1271106a.exe 103 PID 2296 wrote to memory of 440 2296 cb1271106a.exe 103 PID 2296 wrote to memory of 544 2296 cb1271106a.exe 105 PID 2296 wrote to memory of 544 2296 cb1271106a.exe 105 PID 544 wrote to memory of 1900 544 firefox.exe 106 PID 544 wrote to memory of 1900 544 firefox.exe 106 PID 544 wrote to memory of 1900 544 firefox.exe 106 PID 544 wrote to memory of 1900 544 firefox.exe 106 PID 544 wrote to memory of 1900 544 firefox.exe 106 PID 544 wrote to memory of 1900 544 firefox.exe 106 PID 544 wrote to memory of 1900 544 firefox.exe 106 PID 544 wrote to memory of 1900 544 firefox.exe 106 PID 544 wrote to memory of 1900 544 firefox.exe 106 PID 544 wrote to memory of 1900 544 firefox.exe 106 PID 544 wrote to memory of 1900 544 firefox.exe 106 PID 448 wrote to memory of 3616 448 skotes.exe 107 PID 448 wrote to memory of 3616 448 skotes.exe 107 PID 448 wrote to memory of 3616 448 skotes.exe 107 PID 1900 wrote to memory of 2992 1900 firefox.exe 108 PID 1900 wrote to memory of 2992 1900 firefox.exe 108 PID 1900 wrote to memory of 2992 1900 firefox.exe 108 PID 1900 wrote to memory of 2992 1900 firefox.exe 108 PID 1900 wrote to memory of 2992 1900 firefox.exe 108 PID 1900 wrote to memory of 2992 1900 firefox.exe 108 PID 1900 wrote to memory of 2992 1900 firefox.exe 108 PID 1900 wrote to memory of 2992 1900 firefox.exe 108 PID 1900 wrote to memory of 2992 1900 firefox.exe 108 PID 1900 wrote to memory of 2992 1900 firefox.exe 108 PID 1900 wrote to memory of 2992 1900 firefox.exe 108 PID 1900 wrote to memory of 2992 1900 firefox.exe 108 PID 1900 wrote to memory of 2992 1900 firefox.exe 108 PID 1900 wrote to memory of 2992 1900 firefox.exe 108 PID 1900 wrote to memory of 2992 1900 firefox.exe 108 PID 1900 wrote to memory of 2992 1900 firefox.exe 108 PID 1900 wrote to memory of 2992 1900 firefox.exe 108 PID 1900 wrote to memory of 2992 1900 firefox.exe 108 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\94a2471c4477560421cd9fb3ff6cba275c459499c11d92436e88d1c11fc56cd1.exe"C:\Users\Admin\AppData\Local\Temp\94a2471c4477560421cd9fb3ff6cba275c459499c11d92436e88d1c11fc56cd1.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Users\Admin\AppData\Local\Temp\1008326001\ea700e39f0.exe"C:\Users\Admin\AppData\Local\Temp\1008326001\ea700e39f0.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4828 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5216 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x104,0x108,0x10c,0xd8,0x110,0x7ff81f9acc40,0x7ff81f9acc4c,0x7ff81f9acc585⤵PID:5232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1928,i,1649354052089337481,1622136441307806522,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1924 /prefetch:25⤵PID:5396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2172,i,1649354052089337481,1622136441307806522,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2184 /prefetch:35⤵PID:5488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2280,i,1649354052089337481,1622136441307806522,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2232 /prefetch:85⤵PID:5500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3188,i,1649354052089337481,1622136441307806522,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3208 /prefetch:15⤵
- Uses browser remote debugging
PID:5668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3216,i,1649354052089337481,1622136441307806522,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3248 /prefetch:15⤵
- Uses browser remote debugging
PID:4440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3648,i,1649354052089337481,1622136441307806522,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3192 /prefetch:15⤵
- Uses browser remote debugging
PID:6056
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5528
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4828 -s 12804⤵
- Program crash
PID:5532
-
-
-
C:\Users\Admin\AppData\Local\Temp\1008327001\d1fa64984e.exe"C:\Users\Admin\AppData\Local\Temp\1008327001\d1fa64984e.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1056
-
-
C:\Users\Admin\AppData\Local\Temp\1008328001\19aee2fa4c.exe"C:\Users\Admin\AppData\Local\Temp\1008328001\19aee2fa4c.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4532
-
-
C:\Users\Admin\AppData\Local\Temp\1008329001\cb1271106a.exe"C:\Users\Admin\AppData\Local\Temp\1008329001\cb1271106a.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3556
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2932
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2404
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2484
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:440
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1968 -parentBuildID 20240401114208 -prefsHandle 1884 -prefMapHandle 1876 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {acff6aa9-40e4-4ddb-83fe-f5ed62bdb996} 1900 "\\.\pipe\gecko-crash-server-pipe.1900" gpu6⤵PID:2992
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2464 -parentBuildID 20240401114208 -prefsHandle 2444 -prefMapHandle 2432 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {929f73f1-0da2-4196-aaf0-e9815a1e6bf6} 1900 "\\.\pipe\gecko-crash-server-pipe.1900" socket6⤵PID:3724
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3052 -childID 1 -isForBrowser -prefsHandle 2768 -prefMapHandle 3088 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 900 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {863713be-833f-496e-babe-5e97ad0bd484} 1900 "\\.\pipe\gecko-crash-server-pipe.1900" tab6⤵PID:5032
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4240 -childID 2 -isForBrowser -prefsHandle 4252 -prefMapHandle 4248 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 900 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3d8a8e39-b3fe-4459-bb5c-c6aee46b56f3} 1900 "\\.\pipe\gecko-crash-server-pipe.1900" tab6⤵PID:1804
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4796 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4748 -prefMapHandle 4740 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6d9e1219-27d2-4e91-9fbd-3c4cc47c1776} 1900 "\\.\pipe\gecko-crash-server-pipe.1900" utility6⤵
- Checks processor information in registry
PID:5412
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4204 -childID 3 -isForBrowser -prefsHandle 5316 -prefMapHandle 5324 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 900 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {563a49a8-5b0c-4bda-a681-25a3bf89190f} 1900 "\\.\pipe\gecko-crash-server-pipe.1900" tab6⤵PID:768
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5448 -childID 4 -isForBrowser -prefsHandle 5500 -prefMapHandle 5508 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 900 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {dc6a843f-327e-4bdc-b128-cb164ccc6207} 1900 "\\.\pipe\gecko-crash-server-pipe.1900" tab6⤵PID:2828
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5752 -childID 5 -isForBrowser -prefsHandle 5672 -prefMapHandle 5676 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 900 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {aed0e2f5-2250-4057-b472-9b1078d0539e} 1900 "\\.\pipe\gecko-crash-server-pipe.1900" tab6⤵PID:2284
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1008330001\ae69b4edb3.exe"C:\Users\Admin\AppData\Local\Temp\1008330001\ae69b4edb3.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3616
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1456
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:5940
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4828 -ip 48281⤵PID:3968
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3972
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3996
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1388
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1240
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\85mw8mk9.default-release\activity-stream.discovery_stream.json
Filesize28KB
MD58c7a2be13f0e19920ef630834c9a6482
SHA1fb8d8145eae3eb1d9d2567dacbb555d4a1350a3a
SHA256195409a0d2c361654786e778b3542c18810bbdb129a0e742a320d93f949b525e
SHA512696cb1e4870716437b3d228004ebe45d23e4c521f62377e417e7466d6d3e8738c22af582121a79f9c16d8468ca98b4bd7cbedd380b3f97dac8da6a799d654486
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\85mw8mk9.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD5ba12ac9d834f9cbbb0d141ac7f177736
SHA1a28af5fe99165ebb85d5c187a7ea00deabf64738
SHA256db5739193decfa7240ad763bb8a236f377fc9474aaf687fb27639acaad532b42
SHA5120b3945be9e3faf79a48ba8948e603b3fa4d22257c83e18da5e7c3ef29a8bb0408b938b0a6d7168743b42ff2c9fe8c1ddbfb8bf6be1787de1e5c6544bf4f8dd41
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\85mw8mk9.default-release\cache2\entries\F8CBD54DDA10F4286A41EC6A537240712D6C2308
Filesize9KB
MD5ca2931d8bfe699ecb1e0c9ee8207140d
SHA17ecff7ef54602c5da28676229a02e3d73525d419
SHA256486f6da9988ad36660a47e2e0673bdd4140e2f4a3e287ddceee4ea16e95b904f
SHA51211b5754ae7bf68bb60058a87b5ee4feb1ba9c68ba299d3a2a711d41b2a1b2342fb6e83fcaed668228f05c724aa8d180f015d72873efbfc71fbe60dc6371be5c3
-
Filesize
4.2MB
MD50b6b622de253d8ebab387a924f7735d2
SHA12922b01435ec24a0090eb9266051ec714cdbd431
SHA256e5f29348bc07584a7e370c5adafa376137382bfbfd5b5ee042e5ca27d013adf0
SHA512bb1e138a025aae83698af5513783ab67109978cb1619ab13a1bf177f9c0403c2e315d74c16a5f8a9fa8326e46824f728f0ef2fe1eac43e093719db14c96f3738
-
Filesize
1.8MB
MD5b70b1671baa5d6caaace25d7ddcd78fe
SHA12fed77301f8006ff0ee3470e2f6f0ddb6bc0f9af
SHA256a713de5a8e8414518a7927adae9edced07692a6428fef2fffd7f379de58cb83b
SHA512789051f3bbb5f5b2cb27340600d80939aba6162bef43be37490de2b517e825a2684a66fa9c0d800dea9d6a30f96d969c7b98a777a9bddafc0ee9c6cf10c6579a
-
Filesize
1.7MB
MD5c39eb549a7dc6f9f6eeababcaea602dc
SHA133c34ab34eb843e347694db102e68ae0b59d9c29
SHA256ebd45bb1a1f3c24ca2c7c4d9c30efe71eea9b8246a750bd5722043703013af99
SHA5128702781d879c22ef45362e0e539015670c3365724b519881ee6a7e10b241540080c196ddd52003b8395c338dbf8448485703b076e43c17e8466e41f41dc40ee4
-
Filesize
900KB
MD5013c3fb391228f0ae96123aafd47f414
SHA12e7c08f94b126b86e10315dab1106bc8f5adb543
SHA256fe3127cbef22a34c43d015948d1297044b01c8b8ed5a78169659ec5c83df92ae
SHA51294f8f33c6f37c0a2c2caabff912eed69854a0bae633075b5c3a598d9f8586983d9a14914c01a3586535f414311b262b7dad297b0a56e7ae80d74e0a559902c76
-
Filesize
2.6MB
MD53a635fef14102b754410ece391685b93
SHA1b427cb065492e71710d14e5c3fe04b5806bef5f6
SHA256467ae373cafb2e87b04974ff1ee6480931784e057bcd1e1a125b6a57e3e0ab2a
SHA5122ddcdfdad502065bb765de70021884429e7f6d1fb83f5981a7b714d4a0bd6b0bca345f9d555da6efc134df23b8f47b6eaec67e3a8542d7fc11b812ed94a84822
-
Filesize
1.8MB
MD509109fbe23b94bd3dc2605d7ab550ce3
SHA13720744b4f909c4d98756c822c33ffa1f9f77b8b
SHA25694a2471c4477560421cd9fb3ff6cba275c459499c11d92436e88d1c11fc56cd1
SHA512843535d1720736a7325bdf77f46184d8c0c0ff5f45c8e42b2517e021d370a51d4ca91847fc454c1dcf411126449d8e96741b1965861992d5344caf636d5f6ce1
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\AlternateServices.bin
Filesize10KB
MD529f31b51e989e59885d7528b7a1388d1
SHA14c51179e0c5f4bd41da7f8b39a47acca53833d2c
SHA25654ada2ae37cf66dd601d50c83e7e31aae33c4f0bd10a2edd1c94139124e9d0ee
SHA512569e57aab873dcb374aa784903367a53f23cbb634f65d03d495dd91658eb3fce194c36870a3325687ed6371d9287e417118d4c0fae6e395b9753fb2a1a45a04b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp
Filesize20KB
MD5f29f9735447bfd4c02630d0c140e0348
SHA1f14b82c7d989e515c353f1d64c1879d7e6a1b04b
SHA256fc003a6eed81c965034a051a1571c1b556d0ed2520120574f4224894e7ee3c0b
SHA512abba7ef8009001991924ea75881e9673d1a0f4c4003f30592447e5b5ec4356e5d8e4866e1747fa56740b64241cc3d49490bd261b83b16585253b244cc8d5e787
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp
Filesize24KB
MD5785d3b4cf294c329662063201e7ad692
SHA1a7788fb3a7219437f107526c2a1834ec184f098d
SHA2562dc807437fecae60e88304e38884f7d6f688ea89f09294fbd8c7015c1cefbc80
SHA51237d595b422020c1bf71ad22af240f5c32477fa5b9787bad32a1ca436d2ff5a93b7e68b817e4bfadbc1fd572b91605d8b6057f2fcc5e46845fe5217846bdb7ab4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp
Filesize21KB
MD56f01d93974582ca45c4540b64d3a7c22
SHA1c0a3c03328640db34e674051b92a7a51b649a886
SHA256b43f1fc951e5535c4b363f718d6425613301f7c286c713583b0e3c60e19ca139
SHA5128532b13038b0f5ba90b19593837709c2afa63e88dff7dea1b994b033298866a904c83a826da452c255056cb987951f4f90769869b774f662fb8ad586fab71ca8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp
Filesize24KB
MD5206f4ce1141b4018302c86f8b56d9904
SHA17f993a5d06545374f7246b9e0bb4f0df958433ad
SHA25665c894ad88549723512734c99b33451ab45a4570822310581e5395509a1c499f
SHA512858cfaeee98cd3c66ae6499a2cc77e62a4aa37e3bcd5e0d08bb21c95c1094eeb3ae25a0f02f2038f3c66c9f7646cc281cbc491f64e4f6451f7dc4b4df30268c2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\pending_pings\161af625-8826-4dd3-bcd5-d03f4a7a1956
Filesize659B
MD5964a6861f6a0a08ace36a9e58e81c8c3
SHA1099c014ddfc0208c8e749694c9076cfa0f8374c1
SHA2567218136a839138e95606ef0c50f439fbae0a7289ef616ddbf26bec5c370fb4ca
SHA512e3f692586bd7424c01e6842c5c0421b52bd6fe8ce9709e57f5c041d4727bc90d8b4651ef298676f1998564665c77df5732cf63905f55bc5d4df210a376e1d4b8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\pending_pings\1aee78fd-da6f-44a2-a084-fdd470e9272e
Filesize982B
MD5f90aafec0ccf43755b4efe91a29c05c2
SHA14032d5e58459d19f6913ef62166f37a4dbed07f5
SHA2560970163432b1ef209c245d06375462f8c50a15a31bbe696a3ac927b13c1980c1
SHA51231f574fc82df226e6c127d710949953b8c980256ee7d51bdc09f300730cd7bd919c473f493deac631a14b1cc1508c662295410482d85d6a70ea17d86980aa2c7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD50e9495089b2641ea94acbce26e94cc22
SHA1d6ef71aa59c46eb5078586cfbde77d1733f9926f
SHA256c98b3be9240cbddefc12608c3bd311c32c517baf8ba088fe4bc1932922c6503b
SHA512d50a5de9b8187f903db4210e79dad7cdc0561b81e75e0ee7a57d5fc49619282a247d094b2d0dcdd0a4e9cbf94a4127159fa585a629bf9e2a818ca7792cc7f456
-
Filesize
15KB
MD57154963e43ef428fbf4fa5c836821941
SHA1892fabff127af68fbd26ac9109012982ad4ce03c
SHA256011fee694a6901b9ccb5340040556bc27d179fa563414db951ae42c85797a43a
SHA512d9e48b9674db4f6ddf33f430c8245a8245e33854ea5acdeec08a049777fa71a61ee70a3656fc4124ccf36bbf13003be0341ed60c0c9b9ab66f56141b92b5a162
-
Filesize
11KB
MD542c948ba44375a13c7fc9c4d01a2a1a9
SHA10b3adf6c1b7762b1d6e3250152143b14d88d81bc
SHA2565b718872efc32e7e034de605d331f7c6dd90fd280353925bd8b0cec1c757cd8e
SHA5122522d4e2109f6ca152c7fa3e1df47246dd0e7205196a3d7dbff35ebe04b8ad04987ae5030b6cedb9397c7e83d0147be1e16d15bd3220a3b1647c625f31117351
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize1.5MB
MD5387e154aa7a4ce8f64097926d49a9cfc
SHA123f7561e27e2afc8c8db96e5a62d1cc751c29aaa
SHA256a4444a43a5190d53d15d94c38653bd8028cb0b0bb3ed2ac587c5abefdc6b23f3
SHA512f5587810fd38805396b6acb4f55828ca13d8e0a9e514a2c955390787be86eb2dfc507e5b372c5c6a282126853735bf3bcb5b8506c077c91a9ab3c5bdbd2d6c24