Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2024 19:26
Static task
static1
Behavioral task
behavioral1
Sample
7d332ab5030675d5e7e9bc263f854c9d2486ec916f71253dd85a87405cb1f4c4.exe
Resource
win7-20240903-en
General
-
Target
7d332ab5030675d5e7e9bc263f854c9d2486ec916f71253dd85a87405cb1f4c4.exe
-
Size
1.8MB
-
MD5
7806ab5c893804e35735bc477434c564
-
SHA1
eb83c08a45b9e15829fa4b7133734cef20bbdeb5
-
SHA256
7d332ab5030675d5e7e9bc263f854c9d2486ec916f71253dd85a87405cb1f4c4
-
SHA512
78023aff7436404479b92e6265594a84793985665db41ad7ec8c615b194fdc4539d888b7a80070bd09a7a8e7344df0923861c3a78e60b82b6cfabe85b68c9c80
-
SSDEEP
49152:xAU53TCLMJGI1nAsIVWqPedD03P4nMOHyMuSW:xH3mLZI1nAzV3eRjMOHyMDW
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Cryptbot family
-
Detects CryptBot payload 1 IoCs
CryptBot is a C++ stealer distributed widely in bundle with other software.
resource yara_rule behavioral2/memory/2564-461-0x0000000069CC0000-0x000000006A71B000-memory.dmp family_cryptbot_v3 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 5777470c76.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 5777470c76.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 5777470c76.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 5777470c76.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 5777470c76.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 5777470c76.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 983559c3f0.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2f6afb5f39.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5777470c76.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7d332ab5030675d5e7e9bc263f854c9d2486ec916f71253dd85a87405cb1f4c4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 970425b90f.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 5748 chrome.exe 1700 chrome.exe 2068 chrome.exe 2664 chrome.exe -
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 983559c3f0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2f6afb5f39.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7d332ab5030675d5e7e9bc263f854c9d2486ec916f71253dd85a87405cb1f4c4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 970425b90f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5777470c76.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 983559c3f0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2f6afb5f39.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5777470c76.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7d332ab5030675d5e7e9bc263f854c9d2486ec916f71253dd85a87405cb1f4c4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 970425b90f.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 970425b90f.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 7d332ab5030675d5e7e9bc263f854c9d2486ec916f71253dd85a87405cb1f4c4.exe -
Executes dropped EXE 10 IoCs
pid Process 2904 skotes.exe 2564 970425b90f.exe 2396 983559c3f0.exe 844 2f6afb5f39.exe 2068 81f07dd366.exe 2344 5777470c76.exe 5364 skotes.exe 5260 service123.exe 4740 skotes.exe 4148 service123.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 5777470c76.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 7d332ab5030675d5e7e9bc263f854c9d2486ec916f71253dd85a87405cb1f4c4.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 970425b90f.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 983559c3f0.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 2f6afb5f39.exe -
Loads dropped DLL 2 IoCs
pid Process 5260 service123.exe 4148 service123.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 5777470c76.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 5777470c76.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\983559c3f0.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009101001\\983559c3f0.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2f6afb5f39.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009102001\\2f6afb5f39.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\81f07dd366.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009103001\\81f07dd366.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5777470c76.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009104001\\5777470c76.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000a000000023b7a-83.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 5096 7d332ab5030675d5e7e9bc263f854c9d2486ec916f71253dd85a87405cb1f4c4.exe 2904 skotes.exe 2564 970425b90f.exe 2396 983559c3f0.exe 844 2f6afb5f39.exe 2344 5777470c76.exe 5364 skotes.exe 4740 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 7d332ab5030675d5e7e9bc263f854c9d2486ec916f71253dd85a87405cb1f4c4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 6140 2564 WerFault.exe 93 -
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7d332ab5030675d5e7e9bc263f854c9d2486ec916f71253dd85a87405cb1f4c4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2f6afb5f39.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 81f07dd366.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 970425b90f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 983559c3f0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5777470c76.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 970425b90f.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 970425b90f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 5 IoCs
pid Process 3520 taskkill.exe 5000 taskkill.exe 1700 taskkill.exe 4892 taskkill.exe 2808 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4460 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 5096 7d332ab5030675d5e7e9bc263f854c9d2486ec916f71253dd85a87405cb1f4c4.exe 5096 7d332ab5030675d5e7e9bc263f854c9d2486ec916f71253dd85a87405cb1f4c4.exe 2904 skotes.exe 2904 skotes.exe 2564 970425b90f.exe 2564 970425b90f.exe 2396 983559c3f0.exe 2396 983559c3f0.exe 844 2f6afb5f39.exe 844 2f6afb5f39.exe 2068 81f07dd366.exe 2068 81f07dd366.exe 2344 5777470c76.exe 2344 5777470c76.exe 2068 81f07dd366.exe 2068 81f07dd366.exe 2344 5777470c76.exe 2344 5777470c76.exe 2344 5777470c76.exe 5748 chrome.exe 5748 chrome.exe 5748 chrome.exe 5364 skotes.exe 5364 skotes.exe 4740 skotes.exe 4740 skotes.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 5748 chrome.exe 5748 chrome.exe 5748 chrome.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeDebugPrivilege 3520 taskkill.exe Token: SeDebugPrivilege 5000 taskkill.exe Token: SeDebugPrivilege 1700 taskkill.exe Token: SeDebugPrivilege 4892 taskkill.exe Token: SeDebugPrivilege 2808 taskkill.exe Token: SeDebugPrivilege 4172 firefox.exe Token: SeDebugPrivilege 4172 firefox.exe Token: SeDebugPrivilege 2344 5777470c76.exe Token: SeShutdownPrivilege 5748 chrome.exe Token: SeCreatePagefilePrivilege 5748 chrome.exe Token: SeShutdownPrivilege 5748 chrome.exe Token: SeCreatePagefilePrivilege 5748 chrome.exe Token: SeDebugPrivilege 4172 firefox.exe Token: SeDebugPrivilege 4172 firefox.exe Token: SeDebugPrivilege 4172 firefox.exe -
Suspicious use of FindShellTrayWindow 59 IoCs
pid Process 5096 7d332ab5030675d5e7e9bc263f854c9d2486ec916f71253dd85a87405cb1f4c4.exe 2068 81f07dd366.exe 2068 81f07dd366.exe 2068 81f07dd366.exe 2068 81f07dd366.exe 2068 81f07dd366.exe 2068 81f07dd366.exe 2068 81f07dd366.exe 4172 firefox.exe 4172 firefox.exe 4172 firefox.exe 4172 firefox.exe 4172 firefox.exe 4172 firefox.exe 4172 firefox.exe 4172 firefox.exe 4172 firefox.exe 4172 firefox.exe 4172 firefox.exe 4172 firefox.exe 4172 firefox.exe 4172 firefox.exe 4172 firefox.exe 4172 firefox.exe 4172 firefox.exe 4172 firefox.exe 4172 firefox.exe 4172 firefox.exe 4172 firefox.exe 2068 81f07dd366.exe 2068 81f07dd366.exe 2068 81f07dd366.exe 2068 81f07dd366.exe 5748 chrome.exe 5748 chrome.exe 5748 chrome.exe 5748 chrome.exe 5748 chrome.exe 5748 chrome.exe 5748 chrome.exe 5748 chrome.exe 5748 chrome.exe 5748 chrome.exe 5748 chrome.exe 5748 chrome.exe 5748 chrome.exe 5748 chrome.exe 5748 chrome.exe 5748 chrome.exe 5748 chrome.exe 5748 chrome.exe 5748 chrome.exe 5748 chrome.exe 5748 chrome.exe 5748 chrome.exe 5748 chrome.exe 5748 chrome.exe 5748 chrome.exe 5748 chrome.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 2068 81f07dd366.exe 2068 81f07dd366.exe 2068 81f07dd366.exe 2068 81f07dd366.exe 2068 81f07dd366.exe 2068 81f07dd366.exe 2068 81f07dd366.exe 4172 firefox.exe 4172 firefox.exe 4172 firefox.exe 4172 firefox.exe 4172 firefox.exe 4172 firefox.exe 4172 firefox.exe 4172 firefox.exe 4172 firefox.exe 4172 firefox.exe 4172 firefox.exe 4172 firefox.exe 4172 firefox.exe 4172 firefox.exe 4172 firefox.exe 4172 firefox.exe 4172 firefox.exe 4172 firefox.exe 4172 firefox.exe 4172 firefox.exe 2068 81f07dd366.exe 2068 81f07dd366.exe 2068 81f07dd366.exe 2068 81f07dd366.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4172 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5096 wrote to memory of 2904 5096 7d332ab5030675d5e7e9bc263f854c9d2486ec916f71253dd85a87405cb1f4c4.exe 83 PID 5096 wrote to memory of 2904 5096 7d332ab5030675d5e7e9bc263f854c9d2486ec916f71253dd85a87405cb1f4c4.exe 83 PID 5096 wrote to memory of 2904 5096 7d332ab5030675d5e7e9bc263f854c9d2486ec916f71253dd85a87405cb1f4c4.exe 83 PID 2904 wrote to memory of 2564 2904 skotes.exe 93 PID 2904 wrote to memory of 2564 2904 skotes.exe 93 PID 2904 wrote to memory of 2564 2904 skotes.exe 93 PID 2904 wrote to memory of 2396 2904 skotes.exe 98 PID 2904 wrote to memory of 2396 2904 skotes.exe 98 PID 2904 wrote to memory of 2396 2904 skotes.exe 98 PID 2904 wrote to memory of 844 2904 skotes.exe 100 PID 2904 wrote to memory of 844 2904 skotes.exe 100 PID 2904 wrote to memory of 844 2904 skotes.exe 100 PID 2904 wrote to memory of 2068 2904 skotes.exe 101 PID 2904 wrote to memory of 2068 2904 skotes.exe 101 PID 2904 wrote to memory of 2068 2904 skotes.exe 101 PID 2068 wrote to memory of 3520 2068 81f07dd366.exe 102 PID 2068 wrote to memory of 3520 2068 81f07dd366.exe 102 PID 2068 wrote to memory of 3520 2068 81f07dd366.exe 102 PID 2068 wrote to memory of 5000 2068 81f07dd366.exe 104 PID 2068 wrote to memory of 5000 2068 81f07dd366.exe 104 PID 2068 wrote to memory of 5000 2068 81f07dd366.exe 104 PID 2068 wrote to memory of 1700 2068 81f07dd366.exe 106 PID 2068 wrote to memory of 1700 2068 81f07dd366.exe 106 PID 2068 wrote to memory of 1700 2068 81f07dd366.exe 106 PID 2068 wrote to memory of 4892 2068 81f07dd366.exe 108 PID 2068 wrote to memory of 4892 2068 81f07dd366.exe 108 PID 2068 wrote to memory of 4892 2068 81f07dd366.exe 108 PID 2068 wrote to memory of 2808 2068 81f07dd366.exe 110 PID 2068 wrote to memory of 2808 2068 81f07dd366.exe 110 PID 2068 wrote to memory of 2808 2068 81f07dd366.exe 110 PID 2068 wrote to memory of 4560 2068 81f07dd366.exe 112 PID 2068 wrote to memory of 4560 2068 81f07dd366.exe 112 PID 4560 wrote to memory of 4172 4560 firefox.exe 113 PID 4560 wrote to memory of 4172 4560 firefox.exe 113 PID 4560 wrote to memory of 4172 4560 firefox.exe 113 PID 4560 wrote to memory of 4172 4560 firefox.exe 113 PID 4560 wrote to memory of 4172 4560 firefox.exe 113 PID 4560 wrote to memory of 4172 4560 firefox.exe 113 PID 4560 wrote to memory of 4172 4560 firefox.exe 113 PID 4560 wrote to memory of 4172 4560 firefox.exe 113 PID 4560 wrote to memory of 4172 4560 firefox.exe 113 PID 4560 wrote to memory of 4172 4560 firefox.exe 113 PID 4560 wrote to memory of 4172 4560 firefox.exe 113 PID 4172 wrote to memory of 1468 4172 firefox.exe 114 PID 4172 wrote to memory of 1468 4172 firefox.exe 114 PID 4172 wrote to memory of 1468 4172 firefox.exe 114 PID 4172 wrote to memory of 1468 4172 firefox.exe 114 PID 4172 wrote to memory of 1468 4172 firefox.exe 114 PID 4172 wrote to memory of 1468 4172 firefox.exe 114 PID 4172 wrote to memory of 1468 4172 firefox.exe 114 PID 4172 wrote to memory of 1468 4172 firefox.exe 114 PID 4172 wrote to memory of 1468 4172 firefox.exe 114 PID 4172 wrote to memory of 1468 4172 firefox.exe 114 PID 4172 wrote to memory of 1468 4172 firefox.exe 114 PID 4172 wrote to memory of 1468 4172 firefox.exe 114 PID 4172 wrote to memory of 1468 4172 firefox.exe 114 PID 4172 wrote to memory of 1468 4172 firefox.exe 114 PID 4172 wrote to memory of 1468 4172 firefox.exe 114 PID 4172 wrote to memory of 1468 4172 firefox.exe 114 PID 4172 wrote to memory of 1468 4172 firefox.exe 114 PID 4172 wrote to memory of 1468 4172 firefox.exe 114 PID 4172 wrote to memory of 1468 4172 firefox.exe 114 PID 4172 wrote to memory of 1468 4172 firefox.exe 114 PID 4172 wrote to memory of 1468 4172 firefox.exe 114 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d332ab5030675d5e7e9bc263f854c9d2486ec916f71253dd85a87405cb1f4c4.exe"C:\Users\Admin\AppData\Local\Temp\7d332ab5030675d5e7e9bc263f854c9d2486ec916f71253dd85a87405cb1f4c4.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\1009096001\970425b90f.exe"C:\Users\Admin\AppData\Local\Temp\1009096001\970425b90f.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2564 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5748 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff98a41cc40,0x7ff98a41cc4c,0x7ff98a41cc585⤵PID:5764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1976,i,1544265978312645231,17750153209190536204,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1972 /prefetch:25⤵PID:6024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1652,i,1544265978312645231,17750153209190536204,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2388 /prefetch:35⤵PID:5980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2144,i,1544265978312645231,17750153209190536204,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2396 /prefetch:85⤵PID:5992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3172,i,1544265978312645231,17750153209190536204,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3184 /prefetch:15⤵
- Uses browser remote debugging
PID:1700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3204,i,1544265978312645231,17750153209190536204,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3348 /prefetch:15⤵
- Uses browser remote debugging
PID:2068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4428,i,1544265978312645231,17750153209190536204,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3636 /prefetch:15⤵
- Uses browser remote debugging
PID:2664
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5260
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4460
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2564 -s 17964⤵
- Program crash
PID:6140
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009101001\983559c3f0.exe"C:\Users\Admin\AppData\Local\Temp\1009101001\983559c3f0.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2396
-
-
C:\Users\Admin\AppData\Local\Temp\1009102001\2f6afb5f39.exe"C:\Users\Admin\AppData\Local\Temp\1009102001\2f6afb5f39.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:844
-
-
C:\Users\Admin\AppData\Local\Temp\1009103001\81f07dd366.exe"C:\Users\Admin\AppData\Local\Temp\1009103001\81f07dd366.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3520
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5000
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1700
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4892
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2808
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2028 -parentBuildID 20240401114208 -prefsHandle 1956 -prefMapHandle 1948 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {28c03a3d-4ec7-4aec-b82c-ed1eca2085fd} 4172 "\\.\pipe\gecko-crash-server-pipe.4172" gpu6⤵PID:1468
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2464 -parentBuildID 20240401114208 -prefsHandle 2456 -prefMapHandle 2444 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {da4848fd-9c31-47e5-a4a5-76550755b64f} 4172 "\\.\pipe\gecko-crash-server-pipe.4172" socket6⤵PID:4596
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3396 -childID 1 -isForBrowser -prefsHandle 2788 -prefMapHandle 3432 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1276 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5585ea3c-a9de-4503-843f-bbf19e761d7a} 4172 "\\.\pipe\gecko-crash-server-pipe.4172" tab6⤵PID:5068
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3724 -childID 2 -isForBrowser -prefsHandle 3716 -prefMapHandle 3628 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1276 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {12bf1bf9-36bc-4171-9691-8f6f3e14192a} 4172 "\\.\pipe\gecko-crash-server-pipe.4172" tab6⤵PID:968
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4088 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4012 -prefMapHandle 4144 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1004f270-87db-4744-b369-bb781c497f41} 4172 "\\.\pipe\gecko-crash-server-pipe.4172" utility6⤵
- Checks processor information in registry
PID:5352
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5472 -childID 3 -isForBrowser -prefsHandle 4284 -prefMapHandle 4084 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1276 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7bf389b5-5f53-4d8a-b391-380f13d5fb91} 4172 "\\.\pipe\gecko-crash-server-pipe.4172" tab6⤵PID:1348
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5484 -childID 4 -isForBrowser -prefsHandle 5724 -prefMapHandle 5616 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1276 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b3c327f0-5fba-4d2c-8889-022a040d69d9} 4172 "\\.\pipe\gecko-crash-server-pipe.4172" tab6⤵PID:1792
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5904 -childID 5 -isForBrowser -prefsHandle 5984 -prefMapHandle 5980 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1276 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0070e0e2-dd8e-4928-9232-0f4f6d4bceed} 4172 "\\.\pipe\gecko-crash-server-pipe.4172" tab6⤵PID:1936
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009104001\5777470c76.exe"C:\Users\Admin\AppData\Local\Temp\1009104001\5777470c76.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2344
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2384
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5364
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2564 -ip 25641⤵PID:6096
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4740
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4148
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ws2kncw.default-release\activity-stream.discovery_stream.json
Filesize22KB
MD5b5510e816a0894b0a31ea214dbb1fb6c
SHA1e8775c653b4ddbc0df7e8ee55a67016118b278ee
SHA2565a0a6eab15a20ade4f9edee452088b33d602f6f076597093cd6548bf4098fd8d
SHA512ea8b6a3c9ce361000a98a69f49bf7a70dd7a2fc49f4c48cd8d3589071cacded2436cdf5c47b566a224cf6585537cf9750f9faf7b0831cba1908e677b358e178d
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ws2kncw.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD5ed92c5246b357966abb2a3803b4b61c8
SHA12bc80c50d4c694a4543177eb575489231802080d
SHA2565a6ccbf3bf835f742431c95ea5be79b4ca95be8f9222cc4c0adb948e730af631
SHA51237ccc80b35dc802a5d65a06bcf951ce60b2f23fa2c5adbf6d112ab6bc3e4296c2742673056b1c0a7e7a37eff9993fc275b13f29ec0388aca75acc88c7f203f60
-
Filesize
4.2MB
MD50e6a28f3dee9cb4df195327184fc0227
SHA196ebb30be7ee04eb4491128fdc193000d6a05d74
SHA2560d1436daa022833897022dbf4486a009a6a1938a434b3ae00eb84a6a362a5170
SHA5121cb0163fe35751238a2cee3589ee7713b6f4b655803804f28162cf790dd65cfeaf357c457448b855f55aa32145c7708187343e7c11c14644046f24127bf405c6
-
Filesize
1.8MB
MD53ca87e2a8989b24bffdd2a2f95b16585
SHA10c7ad940b6b0f50e9e7b6a3fdc19bae929bab6f3
SHA2568b904d7e94549459baf5e36c36674a51c0aaf16af03c363ae4068c017c31fa52
SHA51225621dd6d85486d566e59119f3d55c8844badcebc7b9f3ce01a48467765c6c64382e7e773ebff1963d07b10bd3f7e1813f42fbe2b5c06c3fd9fd5365890cf1a4
-
Filesize
1.7MB
MD5f708db72debd0f96b90862172295df33
SHA120305d4d1dc93d30fc6624b95cdb477a2cc9aa2a
SHA2568ede74d54199ec4a0b5f7b0a837f734344970f8521f5a115e8160b52b4e89fae
SHA51209b8bf328315cf2547f94758003d2d2654e302304a29f326b89d7145aaf0bc3f753d438c615381b11dd5c9c25e523cd7733ce95b0c5d20ce2e0d192290233674
-
Filesize
901KB
MD53add5a1a6f0235a959501f89d3e16242
SHA1126448447379b70593d3b074b295cefcf43a5c3f
SHA256c4dd5e0c0b5d47ce6077df70ee5922c3bfc56fada6e41f2015ae0815b0396f89
SHA512b6e8a938e10da4c5a5a2d5195551b839c82a87a225a6a41ea99f87ab33369e7498f229637d2aa9273b68c4e20f30b5f84381d83a54459988fe6e2cda7155039e
-
Filesize
2.7MB
MD5688ca5c58ab17e657450e7217ce23f4e
SHA1f0d82216bab44b77fdd7963d052c13b75ecc8ba8
SHA256d043fdb3833fe1d2a546df47a2853b1f303c2554b710eab1105e56e86d4a954d
SHA512f2d4b9a4eaa93edfa979873a3d34e0a9da2c859899dcb21884d089535014727c68e238a3b9c56cae73d8addac6bba4b8b46d257f8475a3e4fe08ef89f71ad098
-
Filesize
1.8MB
MD57806ab5c893804e35735bc477434c564
SHA1eb83c08a45b9e15829fa4b7133734cef20bbdeb5
SHA2567d332ab5030675d5e7e9bc263f854c9d2486ec916f71253dd85a87405cb1f4c4
SHA51278023aff7436404479b92e6265594a84793985665db41ad7ec8c615b194fdc4539d888b7a80070bd09a7a8e7344df0923861c3a78e60b82b6cfabe85b68c9c80
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin
Filesize18KB
MD5b6c5a63b8311fb6c8d7a98fcd5397fb6
SHA1d19e2a4127a3743841b0e90a26ffcfb46a1363e1
SHA256f65064832777de9fc26c96a8be2c28b63e71b5a0a6dc5ad9eea9955e5a076f0b
SHA512e04c9bc32ad9c93952554158d12628aad453d042282cd2653b7ad1841a4b69b5aa03a84bc6fcde108f218c9440ce0ace2d8e2f691982d28a041cde2098c385da
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin
Filesize6KB
MD5edf9f631d041f246524f7915e506dbd8
SHA11990769590f8354fabfe336d917a3ee59f275365
SHA2569f63e76a020b045b56a26ccc5e3b71ef190b2e533ee6428a52a5d8aa2e8f14f7
SHA51248f0dbc12918a88d9571b3c21130eaf8ea709d5086a6b754f59db184e46b474d6e0d82fdbbc2662b494b6175c7eb7009fd546c4ac9b762c1c38fca02b54e8a3f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin
Filesize8KB
MD5ea22dd81c70477e8a3e50df8b55a63d3
SHA198d35284bffb115619b099af01337118c89a9c7d
SHA2567e035ef2d32c2e20dbd491c8dc49024a8115f15b6ab5a7d0014453a26aae96d1
SHA5120e4b866e2b0faf21aec22aed7e1c6add85e81cb8286b89c8886fd6e315210d2f5917fb645c9bc1c1fe72d9181b1ce60355ec1aeaabb3ec4c0b22d8d1f6dff2a9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin
Filesize13KB
MD5d226279930933667d6e88dba8a0081bc
SHA159d74b79177ab895a091a7649594d263d4bad534
SHA256d8b371929e74139c42277f6bd61f67d6ac53fcc25b38783d84f421c19e38d440
SHA51254fa6487532f4fd916209795d9c01bd4344cc48947fdeb32c5cf9098330ae5be12370f26954b3e40bf474a98a0ea66e0b5f90f20afffa69be4929395b8e9cd97
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD55e98fbc0f5088a9466deecae247f465f
SHA11d47e94d992aec71955d5e592d96352b1f17fb97
SHA2565b3c43fb410871c1c3bfa3c4c7eddcdd7f21eb7f4e8297449e62fb918d201b9a
SHA51269e4bba7b5eb86f72ac5ec52280b4cc4c73b9cc796f095683da6379538501fe9f50ca18eb5989a297b196a5d6bdfd3c8ef0131e614fb814c23ee1e21a95b9845
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5858dd4235cc4b5fca961035cc774a015
SHA16af5f49e41414823f6967e255e59365d153919d9
SHA256f55c47b865897dbe37ff78a3571eab5accf741c4882a4a2f342f0398c99631a2
SHA5121f17ae5c8b0c418e2b997ac602c4b4cb88e7be5051805f068364383e9f3289572680eaf3dd204b60586baf8cb0c6be900b787e913e43ccd4c753b0a1e8e7abf3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD57febaa61efd0522941ed60f34fbcc8f7
SHA19e3b71531c1c9e2a3b252e5ed35ac1f3a790d20a
SHA256a68e31953055a38962df150a17d4c12e7bbcca8af5ccedb8149b00b160b9a161
SHA512760492c71d399708591324698c2f853babcffc308dabc15dfaa4f0ca4c4084dd443b9c90773ef9b50390c72127672f59d84f2f0c8d85ee47ad45cfbbbb07401d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\019408f1-e811-45b7-99e8-6dc2a696d149
Filesize26KB
MD5f346543dd5cf5b76c83cdae6f704f057
SHA104d4e29150aae797c92f576e0dd9acefc879548c
SHA2561b63910ccaf32568b350b57c7ad9462f5a459cedc05743e28cf33c77b64dd102
SHA512cbd791cb938bb3aa3517abd26d53fe2207fc69c42ea1b58f963f6bfa96e73bb95da57de5834a9574b9bd72d906fc3e871b63eeae5961392d873587c7ba4733bb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\273f7d3a-2f8b-46b3-b3fe-22f26bc18d7d
Filesize982B
MD578c929774c3117aff08999313589a115
SHA1a8ebc86f2ec9e8a00439bb7552011395dc016ce3
SHA2567d0c1784d7e093cde006bb60b12943372f56c45c0f392fcb30e55c1b9fcf0fb4
SHA512f3cc0ab3efa4353994800d50f1dd6892490f63550e5ac0a99d31214e31e6dbd99fe00f85b5300c73e2328634372b5dead44b696ea69e14ca7cc4bd3ce2fe0799
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\c92741c4-b6bf-4b2c-a5fe-77b62cbe84bb
Filesize671B
MD5a98ebcf76a44eada049829a014df2c8f
SHA16ec3b10e9563dccb9c89ee9d3d3928549e425b11
SHA256d8f4ec550b0b99959fb5e90ed38f1f1b14ab630107407626bde24c13d63d6c1e
SHA512f85bafa8584762959b0eefca8d3d4a9aa5b6000ddd3cb06aefe4e52732a619af168563411227ed7a2eefd67928b8c51cc4ab6ea712e7bd6340464cf256c86d82
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD5eddbb8a3226815f198677ba6c655eeee
SHA1c5b327f981e73279417ef09b744387b09c010a87
SHA256ca751a50e3c4f8981d62980edeb3d05801fe7265fa803e1e8126349d0b334e38
SHA512904d980d9fc617c8d48f565faa9dcfa3841822d77a6bfaf411cb4180c6a26e3bd02e0dd0cdc4c71d61079b3ebe59a09e128c153d4f9075aee9312c2730debba6
-
Filesize
15KB
MD564c76e05f1e78754730ba20ebc9615d7
SHA187540dd051f996b8d5b607af71584d89a2243950
SHA256891972141e128b13bbda49b3ec54c12ae1ce4b5709d0597e3ba2af6fc4887660
SHA5128a76df62c5f791643915cb2b5d4135c6175b2c5d7e3c2a7098e38bcb42fb21326ffe6d585d7f4e5e4e11e882fb7e00a62c56094e130a31e16f0658768eb0fcfc
-
Filesize
10KB
MD58a5197c01a80b4f0f308fa197aa81882
SHA1c29d9678faf34e537ee6d26053564398d6c33c5e
SHA256ad952230075d76794736997731c538c77a8eeb36a6b8f6d93ed8cc60074d92bb
SHA5121e616968d9c9c2ddd8c5d559f4d55a24c86b5697c0937d1fb6a19183b6c90673ad8e327998e9a399743aef5770ffc5d53d3145e6ce47637603b0e6986d9cf704
-
Filesize
11KB
MD5f79f50ca554949022bc4aae9a12b15b8
SHA17b7137a5f320c665ac49318d0e95631e7507e18a
SHA2561c609335b53a46fed00cac3e7af8be7d905e06e4d32245aa74cefc2000ab6e22
SHA512461a4e2678e0e6cfa4d655b3fee80bdd63e1cd179da3ab5b68643731b8d18c9e219c957acf4f9d2231931adfb3b21140acdfb62ee41d29eed898b520bcc32c78