Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2024 09:22
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20241023-en
General
-
Target
file.exe
-
Size
1.8MB
-
MD5
bd3c9426f58b0aa58a0622b721f7c17f
-
SHA1
aadbfb4fcc6a8c76b8cc15a62d8e2d7d139a09f6
-
SHA256
715223f9d8cbff4640796f95054a54aaba8a06c7215d167a13d9f1ebf8bc1f17
-
SHA512
9de240534deb097953f8971bc716384c9e4118d4fbd7de5bf943408c9a92e610542538b2f9396d8bf3fab679837d22a8201cad3973fa07d44664a882d8a02c15
-
SSDEEP
49152:f2WQLeJOxsLgCUbwqBgOlr3LaaQsxkw6k3Jb9Agk0B8r:+leJO6gDbwqBj5+LokRk3Jb9e
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Cryptbot family
-
Detects CryptBot payload 1 IoCs
CryptBot is a C++ stealer distributed widely in bundle with other software.
resource yara_rule behavioral2/memory/4428-62-0x0000000069CC0000-0x000000006A71B000-memory.dmp family_cryptbot_v3 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" e85f627338.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection e85f627338.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" e85f627338.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" e85f627338.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" e85f627338.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" e85f627338.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 771ed6d7d9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2b619249a4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d040f41cb4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e85f627338.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 4968 chrome.exe 2904 chrome.exe 4240 chrome.exe 3960 chrome.exe -
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 771ed6d7d9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2b619249a4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e85f627338.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d040f41cb4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 771ed6d7d9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2b619249a4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d040f41cb4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e85f627338.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation file.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 771ed6d7d9.exe -
Executes dropped EXE 11 IoCs
pid Process 2672 skotes.exe 4428 771ed6d7d9.exe 864 2b619249a4.exe 2456 d040f41cb4.exe 2784 8ba977f288.exe 5384 e85f627338.exe 1668 service123.exe 3596 skotes.exe 2176 service123.exe 2156 skotes.exe 2992 service123.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine file.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 771ed6d7d9.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 2b619249a4.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine d040f41cb4.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine e85f627338.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe -
Loads dropped DLL 3 IoCs
pid Process 1668 service123.exe 2176 service123.exe 2992 service123.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features e85f627338.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" e85f627338.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\d040f41cb4.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008719001\\d040f41cb4.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\8ba977f288.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008720001\\8ba977f288.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e85f627338.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008721001\\e85f627338.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2b619249a4.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008718001\\2b619249a4.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000a000000023b84-97.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 4076 file.exe 2672 skotes.exe 4428 771ed6d7d9.exe 864 2b619249a4.exe 2456 d040f41cb4.exe 5384 e85f627338.exe 3596 skotes.exe 2156 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3448 4428 WerFault.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8ba977f288.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2b619249a4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d040f41cb4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e85f627338.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 771ed6d7d9.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 771ed6d7d9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 771ed6d7d9.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 5 IoCs
pid Process 540 taskkill.exe 4784 taskkill.exe 1464 taskkill.exe 3960 taskkill.exe 3668 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2328 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 4076 file.exe 4076 file.exe 2672 skotes.exe 2672 skotes.exe 4428 771ed6d7d9.exe 4428 771ed6d7d9.exe 864 2b619249a4.exe 864 2b619249a4.exe 2456 d040f41cb4.exe 2456 d040f41cb4.exe 2784 8ba977f288.exe 2784 8ba977f288.exe 2904 chrome.exe 2904 chrome.exe 2784 8ba977f288.exe 2784 8ba977f288.exe 5384 e85f627338.exe 5384 e85f627338.exe 5384 e85f627338.exe 5384 e85f627338.exe 5384 e85f627338.exe 3596 skotes.exe 3596 skotes.exe 2156 skotes.exe 2156 skotes.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeDebugPrivilege 3960 taskkill.exe Token: SeDebugPrivilege 3668 taskkill.exe Token: SeDebugPrivilege 540 taskkill.exe Token: SeDebugPrivilege 4784 taskkill.exe Token: SeDebugPrivilege 1464 taskkill.exe Token: SeDebugPrivilege 316 firefox.exe Token: SeDebugPrivilege 316 firefox.exe Token: SeShutdownPrivilege 2904 chrome.exe Token: SeCreatePagefilePrivilege 2904 chrome.exe Token: SeShutdownPrivilege 2904 chrome.exe Token: SeCreatePagefilePrivilege 2904 chrome.exe Token: SeDebugPrivilege 5384 e85f627338.exe Token: SeDebugPrivilege 316 firefox.exe Token: SeDebugPrivilege 316 firefox.exe Token: SeDebugPrivilege 316 firefox.exe -
Suspicious use of FindShellTrayWindow 57 IoCs
pid Process 2784 8ba977f288.exe 2784 8ba977f288.exe 2784 8ba977f288.exe 2784 8ba977f288.exe 2784 8ba977f288.exe 2784 8ba977f288.exe 316 firefox.exe 316 firefox.exe 316 firefox.exe 316 firefox.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 316 firefox.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 316 firefox.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 316 firefox.exe 316 firefox.exe 316 firefox.exe 316 firefox.exe 316 firefox.exe 316 firefox.exe 2904 chrome.exe 316 firefox.exe 316 firefox.exe 316 firefox.exe 316 firefox.exe 316 firefox.exe 316 firefox.exe 316 firefox.exe 316 firefox.exe 316 firefox.exe 2784 8ba977f288.exe 2784 8ba977f288.exe 2784 8ba977f288.exe 2784 8ba977f288.exe -
Suspicious use of SendNotifyMessage 30 IoCs
pid Process 2784 8ba977f288.exe 2784 8ba977f288.exe 2784 8ba977f288.exe 2784 8ba977f288.exe 2784 8ba977f288.exe 2784 8ba977f288.exe 316 firefox.exe 316 firefox.exe 316 firefox.exe 316 firefox.exe 316 firefox.exe 316 firefox.exe 316 firefox.exe 316 firefox.exe 316 firefox.exe 316 firefox.exe 316 firefox.exe 316 firefox.exe 316 firefox.exe 316 firefox.exe 316 firefox.exe 316 firefox.exe 316 firefox.exe 316 firefox.exe 316 firefox.exe 316 firefox.exe 2784 8ba977f288.exe 2784 8ba977f288.exe 2784 8ba977f288.exe 2784 8ba977f288.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 316 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4076 wrote to memory of 2672 4076 file.exe 82 PID 4076 wrote to memory of 2672 4076 file.exe 82 PID 4076 wrote to memory of 2672 4076 file.exe 82 PID 2672 wrote to memory of 4428 2672 skotes.exe 88 PID 2672 wrote to memory of 4428 2672 skotes.exe 88 PID 2672 wrote to memory of 4428 2672 skotes.exe 88 PID 2672 wrote to memory of 864 2672 skotes.exe 91 PID 2672 wrote to memory of 864 2672 skotes.exe 91 PID 2672 wrote to memory of 864 2672 skotes.exe 91 PID 2672 wrote to memory of 2456 2672 skotes.exe 92 PID 2672 wrote to memory of 2456 2672 skotes.exe 92 PID 2672 wrote to memory of 2456 2672 skotes.exe 92 PID 2672 wrote to memory of 2784 2672 skotes.exe 93 PID 2672 wrote to memory of 2784 2672 skotes.exe 93 PID 2672 wrote to memory of 2784 2672 skotes.exe 93 PID 2784 wrote to memory of 3960 2784 8ba977f288.exe 94 PID 2784 wrote to memory of 3960 2784 8ba977f288.exe 94 PID 2784 wrote to memory of 3960 2784 8ba977f288.exe 94 PID 2784 wrote to memory of 3668 2784 8ba977f288.exe 96 PID 2784 wrote to memory of 3668 2784 8ba977f288.exe 96 PID 2784 wrote to memory of 3668 2784 8ba977f288.exe 96 PID 2784 wrote to memory of 540 2784 8ba977f288.exe 98 PID 2784 wrote to memory of 540 2784 8ba977f288.exe 98 PID 2784 wrote to memory of 540 2784 8ba977f288.exe 98 PID 2784 wrote to memory of 4784 2784 8ba977f288.exe 100 PID 2784 wrote to memory of 4784 2784 8ba977f288.exe 100 PID 2784 wrote to memory of 4784 2784 8ba977f288.exe 100 PID 2784 wrote to memory of 1464 2784 8ba977f288.exe 102 PID 2784 wrote to memory of 1464 2784 8ba977f288.exe 102 PID 2784 wrote to memory of 1464 2784 8ba977f288.exe 102 PID 2784 wrote to memory of 1140 2784 8ba977f288.exe 104 PID 2784 wrote to memory of 1140 2784 8ba977f288.exe 104 PID 1140 wrote to memory of 316 1140 firefox.exe 105 PID 1140 wrote to memory of 316 1140 firefox.exe 105 PID 1140 wrote to memory of 316 1140 firefox.exe 105 PID 1140 wrote to memory of 316 1140 firefox.exe 105 PID 1140 wrote to memory of 316 1140 firefox.exe 105 PID 1140 wrote to memory of 316 1140 firefox.exe 105 PID 1140 wrote to memory of 316 1140 firefox.exe 105 PID 1140 wrote to memory of 316 1140 firefox.exe 105 PID 1140 wrote to memory of 316 1140 firefox.exe 105 PID 1140 wrote to memory of 316 1140 firefox.exe 105 PID 1140 wrote to memory of 316 1140 firefox.exe 105 PID 4428 wrote to memory of 2904 4428 771ed6d7d9.exe 106 PID 4428 wrote to memory of 2904 4428 771ed6d7d9.exe 106 PID 2904 wrote to memory of 4664 2904 chrome.exe 107 PID 2904 wrote to memory of 4664 2904 chrome.exe 107 PID 316 wrote to memory of 3436 316 firefox.exe 108 PID 316 wrote to memory of 3436 316 firefox.exe 108 PID 316 wrote to memory of 3436 316 firefox.exe 108 PID 316 wrote to memory of 3436 316 firefox.exe 108 PID 316 wrote to memory of 3436 316 firefox.exe 108 PID 316 wrote to memory of 3436 316 firefox.exe 108 PID 316 wrote to memory of 3436 316 firefox.exe 108 PID 316 wrote to memory of 3436 316 firefox.exe 108 PID 316 wrote to memory of 3436 316 firefox.exe 108 PID 316 wrote to memory of 3436 316 firefox.exe 108 PID 316 wrote to memory of 3436 316 firefox.exe 108 PID 316 wrote to memory of 3436 316 firefox.exe 108 PID 316 wrote to memory of 3436 316 firefox.exe 108 PID 316 wrote to memory of 3436 316 firefox.exe 108 PID 316 wrote to memory of 3436 316 firefox.exe 108 PID 316 wrote to memory of 3436 316 firefox.exe 108 PID 316 wrote to memory of 3436 316 firefox.exe 108 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\1008713001\771ed6d7d9.exe"C:\Users\Admin\AppData\Local\Temp\1008713001\771ed6d7d9.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xdc,0xe0,0xd4,0xd8,0x104,0x7ffa87bacc40,0x7ffa87bacc4c,0x7ffa87bacc585⤵PID:4664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1760,i,14047147429192748711,5112270642094443549,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1712 /prefetch:25⤵PID:1396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2160,i,14047147429192748711,5112270642094443549,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2228 /prefetch:35⤵PID:3836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2252,i,14047147429192748711,5112270642094443549,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2264 /prefetch:85⤵PID:1596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3104,i,14047147429192748711,5112270642094443549,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3168 /prefetch:15⤵
- Uses browser remote debugging
PID:3960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3112,i,14047147429192748711,5112270642094443549,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3192 /prefetch:15⤵
- Uses browser remote debugging
PID:4240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4492,i,14047147429192748711,5112270642094443549,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4644 /prefetch:15⤵
- Uses browser remote debugging
PID:4968
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1668
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2328
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4428 -s 12924⤵
- Program crash
PID:3448
-
-
-
C:\Users\Admin\AppData\Local\Temp\1008718001\2b619249a4.exe"C:\Users\Admin\AppData\Local\Temp\1008718001\2b619249a4.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:864
-
-
C:\Users\Admin\AppData\Local\Temp\1008719001\d040f41cb4.exe"C:\Users\Admin\AppData\Local\Temp\1008719001\d040f41cb4.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2456
-
-
C:\Users\Admin\AppData\Local\Temp\1008720001\8ba977f288.exe"C:\Users\Admin\AppData\Local\Temp\1008720001\8ba977f288.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3960
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3668
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:540
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4784
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1464
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1952 -parentBuildID 20240401114208 -prefsHandle 1892 -prefMapHandle 1884 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {2bc2c0cb-f921-4792-8f39-94a8ef94501a} 316 "\\.\pipe\gecko-crash-server-pipe.316" gpu6⤵PID:3436
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2444 -parentBuildID 20240401114208 -prefsHandle 2436 -prefMapHandle 2432 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8ec92c61-5d5b-4fe0-abbe-de278befb8b2} 316 "\\.\pipe\gecko-crash-server-pipe.316" socket6⤵PID:5104
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3220 -childID 1 -isForBrowser -prefsHandle 3212 -prefMapHandle 3208 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c7d6000a-2738-45bd-add3-2a3e48ea39d3} 316 "\\.\pipe\gecko-crash-server-pipe.316" tab6⤵PID:3456
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3636 -childID 2 -isForBrowser -prefsHandle 3712 -prefMapHandle 1768 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {96067a28-e8d3-4996-a362-a8ef9650dfdd} 316 "\\.\pipe\gecko-crash-server-pipe.316" tab6⤵PID:3064
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4084 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4120 -prefMapHandle 4124 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6fff1127-669a-42b0-b16b-99d0914fd76a} 316 "\\.\pipe\gecko-crash-server-pipe.316" utility6⤵
- Checks processor information in registry
PID:2816
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5668 -childID 3 -isForBrowser -prefsHandle 5660 -prefMapHandle 5656 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c1ead075-dd42-4a79-a68a-3c1a246324f7} 316 "\\.\pipe\gecko-crash-server-pipe.316" tab6⤵PID:5812
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5820 -childID 4 -isForBrowser -prefsHandle 5896 -prefMapHandle 5892 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {61aeb4e5-78d6-40db-a098-c3064823d00a} 316 "\\.\pipe\gecko-crash-server-pipe.316" tab6⤵PID:5776
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6088 -childID 5 -isForBrowser -prefsHandle 6100 -prefMapHandle 6104 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {10150e7e-4e8e-4ad8-99ad-ca268e477be4} 316 "\\.\pipe\gecko-crash-server-pipe.316" tab6⤵PID:6020
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1008721001\e85f627338.exe"C:\Users\Admin\AppData\Local\Temp\1008721001\e85f627338.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5384
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4428 -ip 44281⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3596
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2176
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2156
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2992
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\activity-stream.discovery_stream.json
Filesize27KB
MD5222245a6553625484f03a6502c4e5bb1
SHA10318ce93ce7f294c289424c442c7b4f7a509bef5
SHA25665771bb25110cb5162dd941a412dd63ed91d4a78122b3a7bafb259c3f4500b54
SHA512c60de03eac8f9eb7b075ee185da53184658b1fdad18afc0ea362dd498045906f3ee0190bfdf19f15956ba6a0cf78c6b222d86587c7a39289643c237dec575e1e
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD5643717aa3847c0c77ad2bf40f4d20ea2
SHA1219613ea792857b8e0877eab4147f25cf89aaa78
SHA25606c8b5f4095b7cb123953a333533acad2984b2032d8d7790176ea7ca9ac568b1
SHA5125b9cfea4d506856ee19cb67644cf324da82f12753916641c0579735e7dd565cfb395df38c0fdfad4ac0a6a3cacd853f6eee665f48d7e9c9e942674d63be82542
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\cache2\entries\F8CBD54DDA10F4286A41EC6A537240712D6C2308
Filesize9KB
MD5fd67482e3570a3a4188d790cd3cb3a32
SHA1427ee6a29a79135b7537c18110791a68ff99a747
SHA256785e2d852330cf99f909666ee5f0b7ead3accea48dd386ec543621ac31084605
SHA5128a57b65565c5595b4ceb4bf7adbe5abe4d7e6f0a914adbb4e70e559ddfe3365c20045a05e013079d3e570fb0ae95d78e58d90dfd403810dddfabec64fa7a1910
-
Filesize
4.1MB
MD53de87de137ed1adcde5de7897a8c2c3f
SHA1389fe91d75a961e11296f7c45acc9264ed581965
SHA25692edd16fc04624fc69b9be59155def1c28600e9d1bb8c804df61fc4f1422e017
SHA51272df63c38f986c018da256058e67814dbede64f1339e863cc51b74d4af6c2b6cc1e51eb186908d5b2b8c49ef8abd5e8dbe8fe8d26b1ace81ce7a620c303a00ec
-
Filesize
1.8MB
MD50a75820b356a011e9fa427d658f1e3c0
SHA1a57469622af0b25fc3a07d071dcbe1526c41881f
SHA2566f064372869eee9be9b504a086011c8beb3d7c753a87bd0a28c44ee5a22c6ffc
SHA51237641be0b9191f3688c9dd539da7ad20729b6e1fbac770e08868e8ad3226138a58fe95390ed28cb10ec478eec44065e68b4a8c5136b5d9a638db17767f75cecb
-
Filesize
1.7MB
MD5cb78b3cf97d74f0540679225a564e8b0
SHA195b72e4eb9f28a6534e1d902f802f2988ad6735f
SHA2563427282a0e679abf14880c48f47728c97e1c3f870d1bf3bc0116736f3abde675
SHA51288f693df96058aa6f91ba582ce5c213e9c7761eeb1379b8993c4de83b106632083cd90bbd3eba98a4038b6b951adf81f7f64e7bab903eba431ee4497abd5cde6
-
Filesize
901KB
MD5fe36444d62aa278a9165d824f20590e4
SHA186110a64b51bf3005ad2c23e41a8146b992d28ee
SHA256a2072bb2dee51b788f2f3b0adc7a316abc3c41754affb00aa40068d300c39419
SHA5126cbbf342efb96b108587118def74e43aeb080642ba1b89fd15ca2f5baefa6bd1752102be17507ae0c76a4f754a37cf9278acec6c5752cbf6d3d75cc1a8b83f95
-
Filesize
2.7MB
MD5f8c7e8376a3d8b22affd98f1ce37ad40
SHA1cdb6712157abf20c004727e9a3a318c226331bc5
SHA256ac875e32c67120a2f55ce2120782aa50edb5bca31fc9767dd808882df740091f
SHA512818f8f6f18705399a2f13a3a8a828a23ae818f095996bd03e8cced23693899c7a157e672e2d17314265fb7c70a8c6ec782f66656362d73aeedc208687a7ebb45
-
Filesize
1.8MB
MD5bd3c9426f58b0aa58a0622b721f7c17f
SHA1aadbfb4fcc6a8c76b8cc15a62d8e2d7d139a09f6
SHA256715223f9d8cbff4640796f95054a54aaba8a06c7215d167a13d9f1ebf8bc1f17
SHA5129de240534deb097953f8971bc716384c9e4118d4fbd7de5bf943408c9a92e610542538b2f9396d8bf3fab679837d22a8201cad3973fa07d44664a882d8a02c15
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\AlternateServices.bin
Filesize6KB
MD513883508038c3fb138b5eda346063595
SHA146b45d3bcf0cbcae339b39c642de3d697777970e
SHA256d910aba4971eb2591186c8ec1465ddf412ccef49721eb852878a7b3ba229ef92
SHA5121d0f9c62d2fbb2db0019fd9041ddd81b66370bd47806298fb453014080a69f596be8923bc80ca4e91bf2dd1e181c3b5ac08157c7d60ebb2d88b8d568e67394ad
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\AlternateServices.bin
Filesize8KB
MD56aa51eeadf50fb8c35974b63f215219e
SHA1a6f9ae106e0276911161f3e6cad7bf5aa00acc0e
SHA256ca30961f4b4444dd9d866861eb98445cb5263edf70897fdbe5257ae2752b52e3
SHA5125479a176574ca627ffa6cee55fb9f01eeeda38d74a38e453e5cf482b2f4959698aca9474f7b0a4670f05cad19f18f9e12181697f5dd2789bf3f8c0e01ff08208
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5099d99cfc64ead7449d91ee09ec63107
SHA1f6752bfdfc5a8eca0e3f38fea619d53b47f03e69
SHA2563815518789da24af41f10965a13add4956f3194c78d4ef37762b5c9056aa3477
SHA512842cce3366f7e06baa3047c26b3d0e6446fb92c39041da26d0aa9fbab08163a5dc45ea1fdd73fe8e55e837ce37f6d9fded2cffe60765451e5eb8d72c0a61f972
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp
Filesize4KB
MD5b83664a554a99360301cb7c27638fe7c
SHA14cb0f188b66e61be91b9de08d83e268dbe464f4d
SHA2563dfba902f949fc19b518666fa1ba29508accd0aa88e1248c65ff4a782fba9a4a
SHA512dea6adb47c24cebcbff01bdb5e862aab1254f6ac468d5003c8cc7b4936e2f61e6a24f3643ca5699239b7c9cba3fe6fef0c7f86c69e0f025c5629ba6e187e6d7d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD51d2cb6c62688d3266335d7cae7fbcdac
SHA12c0fe2237b212dfece355e9fe912bbed425d0c21
SHA256750254a76a89fc0246692a322f3402e569ed0e2b91875a6c8685cc18b0f6ab91
SHA5123167be458604cebf81a3f90a6aa4ccca61205e1ba34d3287fe05752642d0bed81876d3cf31610506b59a49ff6c8c623ad2585509c782a78d7ed0f087cc75da98
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5ca26797fbc290f1a62b25a6e3e3bfbc9
SHA17d058cf6a4d278f2face3478941da5116595901b
SHA256229b36e72e4b4691295b304fc065e4756f8680cc8ce51b2655e8c015e871bc24
SHA51231189d6e52301ea0787911eebae4db7610969361518724f57b330aa24fb86728d0091e07ce144f2613a384c96282a98044184729e20072037e41e3da8c061b2d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\60066058-ada0-4a98-901a-14b97b082206
Filesize982B
MD5bcd24f79fe5d604cde696e95ca2a6e17
SHA1578ef1b6ddad8cfef65e34d62e3330fcc08b5cd7
SHA2568a6db1125d46074a4e25b97019a8161ec8222aae4699eef4f21390d529bdcd1c
SHA51272c9123117ca51870b7e6002f37af5bf660a7f2e04b828d35d1c3b8db8e41392d86c37f6a3b27615b21dc27aadf9f79172ee6243382ba611f798c3263f28e4ea
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\68e23d72-045e-4bf7-a927-65dded097e8a
Filesize25KB
MD59c1f29e1d91ebf6622b8c6b8e566755e
SHA1c80ecd24fcc695b65a3b17e11395b3e69e4d8286
SHA2569ca2e1a2f3d193737b665016399fafd27e969a1db6f6bacbbf83fd32e7aca09a
SHA51294a3791d349f7abddebb6c80054d5815edc355463d36ef3798ceecf16f6b2637579131fdaa954ab5515f6a9a22a1c405f5d9f5d9a8a32c14bd7374dce4bd709e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\dddad8ac-556c-462d-ae0b-fedafd9648a4
Filesize671B
MD551b1915ef63da1e1620ba2d3548a4caa
SHA108c6f4db5e304ffe02bcce5dc7ffdf98a8fb5086
SHA256d981eb9ceb89803c1ad41d684bb093afe987c390f893d2d56216ec54d728b5dd
SHA512269414d1b0ba9809f2961a80ae2ba81f3a2600207cf75f47f3f795e0fd8b0ef3acd825f96bb8d621a8345170f3411078398c20dad40fe80bc0006013fc45b664
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
11KB
MD55ca95dc9ac64a843055dab240e81a161
SHA14a2f0758af60c192e7bcbf86cd3a4c3997ed235f
SHA2560a4ef545b61f71c75c035e0ae9ef368f6b7ee19e40c1e5e7054aed77e56d62d9
SHA51266a7d9b9a4850d71d9d3a1930120d09ff2e071b3b1e0e892fcfb6a759f638caed2fc51c7b39446c9c34136867d6b75efd445175c74c414ebdb18b635ed4ec673