Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2024 01:33
Static task
static1
General
-
Target
aafc4aab87dc557e55b78d0f15c7eb79df667d65dae05b4ff154a72642046ee5.exe
-
Size
6.1MB
-
MD5
09c1652101fd9c0ee4ec171cb770112d
-
SHA1
39f3589a2228096edee6bac58834cb0a5d7f7a6a
-
SHA256
aafc4aab87dc557e55b78d0f15c7eb79df667d65dae05b4ff154a72642046ee5
-
SHA512
391105468d97ffc0a1514c0b6d9ff049ef234b417278d7e0a87adfcf6843b5fc98f0b04b84e96b69d953308ce5f333e2d5aee020de5a355786b041e4992756d1
-
SSDEEP
196608:t550usfRGwcctXFzi7gi5eUmxPxg5WwQq3e:tTscwLxxPsWwQ3
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Extracted
lumma
https://navygenerayk.store/api
Signatures
-
Amadey family
-
Lumma family
-
Processes:
e3a05c83e1.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" e3a05c83e1.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection e3a05c83e1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" e3a05c83e1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" e3a05c83e1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" e3a05c83e1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" e3a05c83e1.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
Processes:
e3a05c83e1.exeskotes.exeskotes.exe2l3440.exe021aa8c6c4.exefb320440f2.execdf3d4c9c0.exe1e56i7.exeskotes.exe3S37U.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e3a05c83e1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2l3440.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 021aa8c6c4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ fb320440f2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ cdf3d4c9c0.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1e56i7.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3S37U.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 20 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
skotes.exe021aa8c6c4.execdf3d4c9c0.exeskotes.exe3S37U.exefb320440f2.exee3a05c83e1.exeskotes.exe1e56i7.exe2l3440.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 021aa8c6c4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cdf3d4c9c0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3S37U.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3S37U.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 021aa8c6c4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion fb320440f2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e3a05c83e1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1e56i7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1e56i7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2l3440.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion fb320440f2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cdf3d4c9c0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e3a05c83e1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2l3440.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
1e56i7.exe3S37U.exeskotes.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 1e56i7.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 3S37U.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 13 IoCs
Processes:
K4p12.exeP1l94.exe1e56i7.exeskotes.exe2l3440.exe3S37U.exe4X271C.exe021aa8c6c4.exefb320440f2.execdf3d4c9c0.exee3a05c83e1.exeskotes.exeskotes.exepid process 3308 K4p12.exe 1404 P1l94.exe 2712 1e56i7.exe 264 skotes.exe 1932 2l3440.exe 3816 3S37U.exe 3688 4X271C.exe 384 021aa8c6c4.exe 5744 fb320440f2.exe 6028 cdf3d4c9c0.exe 3988 e3a05c83e1.exe 5776 skotes.exe 6208 skotes.exe -
Identifies Wine through registry keys 2 TTPs 10 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
021aa8c6c4.exefb320440f2.execdf3d4c9c0.exee3a05c83e1.exeskotes.exe1e56i7.exeskotes.exe3S37U.exe2l3440.exeskotes.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 021aa8c6c4.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine fb320440f2.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine cdf3d4c9c0.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine e3a05c83e1.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 1e56i7.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 3S37U.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 2l3440.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe -
Loads dropped DLL 1 IoCs
Processes:
3S37U.exepid process 3816 3S37U.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Processes:
e3a05c83e1.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features e3a05c83e1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" e3a05c83e1.exe -
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
K4p12.exeP1l94.exeskotes.exeaafc4aab87dc557e55b78d0f15c7eb79df667d65dae05b4ff154a72642046ee5.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" K4p12.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" P1l94.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fb320440f2.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1005191001\\fb320440f2.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cdf3d4c9c0.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1005192001\\cdf3d4c9c0.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e3a05c83e1.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1005194001\\e3a05c83e1.exe" skotes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" aafc4aab87dc557e55b78d0f15c7eb79df667d65dae05b4ff154a72642046ee5.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4X271C.exe autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
Processes:
1e56i7.exeskotes.exe2l3440.exe3S37U.exe021aa8c6c4.exefb320440f2.execdf3d4c9c0.exee3a05c83e1.exeskotes.exeskotes.exepid process 2712 1e56i7.exe 264 skotes.exe 1932 2l3440.exe 3816 3S37U.exe 384 021aa8c6c4.exe 5744 fb320440f2.exe 6028 cdf3d4c9c0.exe 3988 e3a05c83e1.exe 5776 skotes.exe 6208 skotes.exe -
Drops file in Windows directory 1 IoCs
Processes:
1e56i7.exedescription ioc process File created C:\Windows\Tasks\skotes.job 1e56i7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 19 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
taskkill.exetaskkill.exeaafc4aab87dc557e55b78d0f15c7eb79df667d65dae05b4ff154a72642046ee5.exe1e56i7.exe4X271C.exetimeout.exetaskkill.exeK4p12.exe3S37U.execmd.exe021aa8c6c4.exetaskkill.exefb320440f2.execdf3d4c9c0.exeP1l94.exeskotes.exe2l3440.exetaskkill.exee3a05c83e1.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aafc4aab87dc557e55b78d0f15c7eb79df667d65dae05b4ff154a72642046ee5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1e56i7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4X271C.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language K4p12.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3S37U.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 021aa8c6c4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fb320440f2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cdf3d4c9c0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language P1l94.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2l3440.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e3a05c83e1.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exefirefox.exe3S37U.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3S37U.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3S37U.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 4364 timeout.exe -
Kills process with taskkill 5 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 3380 taskkill.exe 452 taskkill.exe 1808 taskkill.exe 1364 taskkill.exe 4992 taskkill.exe -
Modifies registry class 1 IoCs
Processes:
firefox.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 29 IoCs
Processes:
1e56i7.exeskotes.exe2l3440.exe3S37U.exe4X271C.exe021aa8c6c4.exefb320440f2.execdf3d4c9c0.exee3a05c83e1.exeskotes.exeskotes.exepid process 2712 1e56i7.exe 2712 1e56i7.exe 264 skotes.exe 264 skotes.exe 1932 2l3440.exe 1932 2l3440.exe 3816 3S37U.exe 3816 3S37U.exe 3816 3S37U.exe 3816 3S37U.exe 3688 4X271C.exe 3688 4X271C.exe 384 021aa8c6c4.exe 384 021aa8c6c4.exe 3688 4X271C.exe 3688 4X271C.exe 5744 fb320440f2.exe 5744 fb320440f2.exe 6028 cdf3d4c9c0.exe 6028 cdf3d4c9c0.exe 3988 e3a05c83e1.exe 3988 e3a05c83e1.exe 3988 e3a05c83e1.exe 3988 e3a05c83e1.exe 3988 e3a05c83e1.exe 5776 skotes.exe 5776 skotes.exe 6208 skotes.exe 6208 skotes.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exefirefox.exee3a05c83e1.exedescription pid process Token: SeDebugPrivilege 1808 taskkill.exe Token: SeDebugPrivilege 1364 taskkill.exe Token: SeDebugPrivilege 4992 taskkill.exe Token: SeDebugPrivilege 3380 taskkill.exe Token: SeDebugPrivilege 452 taskkill.exe Token: SeDebugPrivilege 988 firefox.exe Token: SeDebugPrivilege 988 firefox.exe Token: SeDebugPrivilege 3988 e3a05c83e1.exe Token: SeDebugPrivilege 988 firefox.exe Token: SeDebugPrivilege 988 firefox.exe Token: SeDebugPrivilege 988 firefox.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
Processes:
1e56i7.exe4X271C.exefirefox.exepid process 2712 1e56i7.exe 3688 4X271C.exe 3688 4X271C.exe 3688 4X271C.exe 3688 4X271C.exe 3688 4X271C.exe 3688 4X271C.exe 3688 4X271C.exe 988 firefox.exe 988 firefox.exe 988 firefox.exe 988 firefox.exe 3688 4X271C.exe 988 firefox.exe 988 firefox.exe 988 firefox.exe 988 firefox.exe 988 firefox.exe 988 firefox.exe 988 firefox.exe 988 firefox.exe 988 firefox.exe 988 firefox.exe 988 firefox.exe 988 firefox.exe 988 firefox.exe 988 firefox.exe 988 firefox.exe 988 firefox.exe 988 firefox.exe 3688 4X271C.exe 3688 4X271C.exe 3688 4X271C.exe -
Suspicious use of SendNotifyMessage 31 IoCs
Processes:
4X271C.exefirefox.exepid process 3688 4X271C.exe 3688 4X271C.exe 3688 4X271C.exe 3688 4X271C.exe 3688 4X271C.exe 3688 4X271C.exe 3688 4X271C.exe 988 firefox.exe 988 firefox.exe 988 firefox.exe 988 firefox.exe 3688 4X271C.exe 988 firefox.exe 988 firefox.exe 988 firefox.exe 988 firefox.exe 988 firefox.exe 988 firefox.exe 988 firefox.exe 988 firefox.exe 988 firefox.exe 988 firefox.exe 988 firefox.exe 988 firefox.exe 988 firefox.exe 988 firefox.exe 988 firefox.exe 988 firefox.exe 3688 4X271C.exe 3688 4X271C.exe 3688 4X271C.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
firefox.exepid process 988 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
aafc4aab87dc557e55b78d0f15c7eb79df667d65dae05b4ff154a72642046ee5.exeK4p12.exeP1l94.exe1e56i7.exe3S37U.execmd.exe4X271C.exeskotes.exefirefox.exefirefox.exedescription pid process target process PID 4604 wrote to memory of 3308 4604 aafc4aab87dc557e55b78d0f15c7eb79df667d65dae05b4ff154a72642046ee5.exe K4p12.exe PID 4604 wrote to memory of 3308 4604 aafc4aab87dc557e55b78d0f15c7eb79df667d65dae05b4ff154a72642046ee5.exe K4p12.exe PID 4604 wrote to memory of 3308 4604 aafc4aab87dc557e55b78d0f15c7eb79df667d65dae05b4ff154a72642046ee5.exe K4p12.exe PID 3308 wrote to memory of 1404 3308 K4p12.exe P1l94.exe PID 3308 wrote to memory of 1404 3308 K4p12.exe P1l94.exe PID 3308 wrote to memory of 1404 3308 K4p12.exe P1l94.exe PID 1404 wrote to memory of 2712 1404 P1l94.exe 1e56i7.exe PID 1404 wrote to memory of 2712 1404 P1l94.exe 1e56i7.exe PID 1404 wrote to memory of 2712 1404 P1l94.exe 1e56i7.exe PID 2712 wrote to memory of 264 2712 1e56i7.exe skotes.exe PID 2712 wrote to memory of 264 2712 1e56i7.exe skotes.exe PID 2712 wrote to memory of 264 2712 1e56i7.exe skotes.exe PID 1404 wrote to memory of 1932 1404 P1l94.exe 2l3440.exe PID 1404 wrote to memory of 1932 1404 P1l94.exe 2l3440.exe PID 1404 wrote to memory of 1932 1404 P1l94.exe 2l3440.exe PID 3308 wrote to memory of 3816 3308 K4p12.exe 3S37U.exe PID 3308 wrote to memory of 3816 3308 K4p12.exe 3S37U.exe PID 3308 wrote to memory of 3816 3308 K4p12.exe 3S37U.exe PID 3816 wrote to memory of 4528 3816 3S37U.exe cmd.exe PID 3816 wrote to memory of 4528 3816 3S37U.exe cmd.exe PID 3816 wrote to memory of 4528 3816 3S37U.exe cmd.exe PID 4604 wrote to memory of 3688 4604 aafc4aab87dc557e55b78d0f15c7eb79df667d65dae05b4ff154a72642046ee5.exe 4X271C.exe PID 4604 wrote to memory of 3688 4604 aafc4aab87dc557e55b78d0f15c7eb79df667d65dae05b4ff154a72642046ee5.exe 4X271C.exe PID 4604 wrote to memory of 3688 4604 aafc4aab87dc557e55b78d0f15c7eb79df667d65dae05b4ff154a72642046ee5.exe 4X271C.exe PID 4528 wrote to memory of 4364 4528 cmd.exe timeout.exe PID 4528 wrote to memory of 4364 4528 cmd.exe timeout.exe PID 4528 wrote to memory of 4364 4528 cmd.exe timeout.exe PID 3688 wrote to memory of 1808 3688 4X271C.exe taskkill.exe PID 3688 wrote to memory of 1808 3688 4X271C.exe taskkill.exe PID 3688 wrote to memory of 1808 3688 4X271C.exe taskkill.exe PID 3688 wrote to memory of 1364 3688 4X271C.exe taskkill.exe PID 3688 wrote to memory of 1364 3688 4X271C.exe taskkill.exe PID 3688 wrote to memory of 1364 3688 4X271C.exe taskkill.exe PID 3688 wrote to memory of 4992 3688 4X271C.exe taskkill.exe PID 3688 wrote to memory of 4992 3688 4X271C.exe taskkill.exe PID 3688 wrote to memory of 4992 3688 4X271C.exe taskkill.exe PID 264 wrote to memory of 384 264 skotes.exe 021aa8c6c4.exe PID 264 wrote to memory of 384 264 skotes.exe 021aa8c6c4.exe PID 264 wrote to memory of 384 264 skotes.exe 021aa8c6c4.exe PID 3688 wrote to memory of 3380 3688 4X271C.exe taskkill.exe PID 3688 wrote to memory of 3380 3688 4X271C.exe taskkill.exe PID 3688 wrote to memory of 3380 3688 4X271C.exe taskkill.exe PID 3688 wrote to memory of 452 3688 4X271C.exe taskkill.exe PID 3688 wrote to memory of 452 3688 4X271C.exe taskkill.exe PID 3688 wrote to memory of 452 3688 4X271C.exe taskkill.exe PID 3688 wrote to memory of 4044 3688 4X271C.exe firefox.exe PID 3688 wrote to memory of 4044 3688 4X271C.exe firefox.exe PID 4044 wrote to memory of 988 4044 firefox.exe firefox.exe PID 4044 wrote to memory of 988 4044 firefox.exe firefox.exe PID 4044 wrote to memory of 988 4044 firefox.exe firefox.exe PID 4044 wrote to memory of 988 4044 firefox.exe firefox.exe PID 4044 wrote to memory of 988 4044 firefox.exe firefox.exe PID 4044 wrote to memory of 988 4044 firefox.exe firefox.exe PID 4044 wrote to memory of 988 4044 firefox.exe firefox.exe PID 4044 wrote to memory of 988 4044 firefox.exe firefox.exe PID 4044 wrote to memory of 988 4044 firefox.exe firefox.exe PID 4044 wrote to memory of 988 4044 firefox.exe firefox.exe PID 4044 wrote to memory of 988 4044 firefox.exe firefox.exe PID 988 wrote to memory of 1468 988 firefox.exe firefox.exe PID 988 wrote to memory of 1468 988 firefox.exe firefox.exe PID 988 wrote to memory of 1468 988 firefox.exe firefox.exe PID 988 wrote to memory of 1468 988 firefox.exe firefox.exe PID 988 wrote to memory of 1468 988 firefox.exe firefox.exe PID 988 wrote to memory of 1468 988 firefox.exe firefox.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\aafc4aab87dc557e55b78d0f15c7eb79df667d65dae05b4ff154a72642046ee5.exe"C:\Users\Admin\AppData\Local\Temp\aafc4aab87dc557e55b78d0f15c7eb79df667d65dae05b4ff154a72642046ee5.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\K4p12.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\K4p12.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\P1l94.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\P1l94.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1e56i7.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1e56i7.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:264 -
C:\Users\Admin\AppData\Local\Temp\1005094001\021aa8c6c4.exe"C:\Users\Admin\AppData\Local\Temp\1005094001\021aa8c6c4.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:384
-
-
C:\Users\Admin\AppData\Local\Temp\1005191001\fb320440f2.exe"C:\Users\Admin\AppData\Local\Temp\1005191001\fb320440f2.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5744
-
-
C:\Users\Admin\AppData\Local\Temp\1005192001\cdf3d4c9c0.exe"C:\Users\Admin\AppData\Local\Temp\1005192001\cdf3d4c9c0.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:6028
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"6⤵PID:6264
-
-
C:\Users\Admin\AppData\Local\Temp\1005194001\e3a05c83e1.exe"C:\Users\Admin\AppData\Local\Temp\1005194001\e3a05c83e1.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3988
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2l3440.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2l3440.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1932
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3S37U.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3S37U.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3816 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3S37U.exe" & del "C:\ProgramData\*.dll"" & exit4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Windows\SysWOW64\timeout.exetimeout /t 55⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4364
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4X271C.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4X271C.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1808
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1364
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4992
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3380
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:452
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking3⤵
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking4⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2072 -parentBuildID 20240401114208 -prefsHandle 2000 -prefMapHandle 1996 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5bd2a5ca-9ece-4f8a-8ba4-cc09ca7665e0} 988 "\\.\pipe\gecko-crash-server-pipe.988" gpu5⤵PID:1468
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2508 -parentBuildID 20240401114208 -prefsHandle 2500 -prefMapHandle 2440 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {961d5a19-2fe4-454d-b840-45d8d12e3a6c} 988 "\\.\pipe\gecko-crash-server-pipe.988" socket5⤵PID:1132
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3364 -childID 1 -isForBrowser -prefsHandle 3408 -prefMapHandle 3416 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1112 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {276c90af-b9b5-4cb5-b9ec-12bcc54e39e3} 988 "\\.\pipe\gecko-crash-server-pipe.988" tab5⤵PID:3816
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4152 -childID 2 -isForBrowser -prefsHandle 4132 -prefMapHandle 4144 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1112 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8c3994ae-e3c0-4ffe-9194-fa2e40b6c486} 988 "\\.\pipe\gecko-crash-server-pipe.988" tab5⤵PID:1220
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4944 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4940 -prefMapHandle 4324 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8f14faec-6bd8-4491-81b0-cb5f2d2b49eb} 988 "\\.\pipe\gecko-crash-server-pipe.988" utility5⤵
- Checks processor information in registry
PID:6688
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5288 -childID 3 -isForBrowser -prefsHandle 5304 -prefMapHandle 5344 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1112 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b245ca0d-1f4d-4681-90bc-4a295b118c43} 988 "\\.\pipe\gecko-crash-server-pipe.988" tab5⤵PID:2016
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5436 -childID 4 -isForBrowser -prefsHandle 5516 -prefMapHandle 5512 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1112 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ce93b195-87a1-41ef-8379-3a6d81c1c150} 988 "\\.\pipe\gecko-crash-server-pipe.988" tab5⤵PID:5028
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5640 -childID 5 -isForBrowser -prefsHandle 5716 -prefMapHandle 5712 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1112 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {eb31dfda-6f91-4d02-8e4d-16990f2b24aa} 988 "\\.\pipe\gecko-crash-server-pipe.988" tab5⤵PID:4772
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5776
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6208
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
676KB
MD5eda18948a989176f4eebb175ce806255
SHA1ff22a3d5f5fb705137f233c36622c79eab995897
SHA25681a4f37c5495800b7cc46aea6535d9180dadb5c151db6f1fd1968d1cd8c1eeb4
SHA512160ed9990c37a4753fc0f5111c94414568654afbedc05308308197df2a99594f2d5d8fe511fd2279543a869ed20248e603d88a0b9b8fb119e8e6131b0c52ff85
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\activity-stream.discovery_stream.json
Filesize21KB
MD58e78f0fc6e8c8b9dcf3897b46d169948
SHA1512e1598e5688ff398104ce52327b06c77753dbb
SHA25601cfafb8a9aad3cbc0abfacd2b4524a140b95ef8a97d701cb2c2e8f1f863f005
SHA512fbfbe9c1f216b67ec9966504c9c1da0fe44fd8c41568d1a20ed0932ad4c91332d07bff84e85205e73b7719377734c95317098bf84c59b7de7b2ae3e048213a44
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\cache2\entries\D500AD994A7515157BB2A6ADD5B18B754E4D2F99
Filesize13KB
MD5eb06089d464dc90192ead655f74fdf31
SHA1812da2ef0e17ea3d1d500ab475293f540b1ddf27
SHA256673a98079ab0fe18ba5f8044f962af091f4387ef255a7278c298cd85c72c21db
SHA512530be7661eff8f29d1e63f1a54ca1083fe894445e489f17f5ce94a81e3683efd4254ea214b63deaa3503fa5f9d1cdce9d0d4edef3a62951e825d4a0cd937b707
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\cache2\entries\F8CBD54DDA10F4286A41EC6A537240712D6C2308
Filesize9KB
MD562b0d22c95368d72ffbb6dde9bded965
SHA1b568d22baa9251941c94fc77ecafdacbef0d3c90
SHA25671524cad84d9d9cb8d162f5bbef1256309f81736533ae4798aa1b48999a42c93
SHA5127a885787e0d207753d8f5734535a033ec4319e69d5cb3ccd59c0b2a06b2a6df8033f730513bd15cfaf20cdf74f61dec41aab7a2e3630f36ada08db2ac7bded4b
-
Filesize
4.2MB
MD57391642526bf8b664f23312c4a8468ea
SHA11d3f259dab15505cbd90c4c08a95d16ed3148da9
SHA2560d3141560ca1e293597d20822fce393602a54a8f7035691bf54de0d37f05ad57
SHA5120ccc0f02925ea156b54f751b2d20a9dea4fdf6dfce8d2fd9efadfb29af7c12bef8bee8976c2550a492f26dbcc7728e680462e6831025489047c674e3749bc256
-
Filesize
3.1MB
MD5b56d921b39c2e9e142efd96a4c8a16d1
SHA1851421b89676cae4d0a1b957e1f7d1f7b8b27cc1
SHA2567666247d4f7b2528f6263b053e50d67b0ece64ea5d7e10d20129b42a5d65e875
SHA51264ae8d586ecfaff246dc23c1b902489542808dfd0a6b212208ee888351995f02ac8f68bff1e25b09f12f5af850e487ad192e15285cb702aa3cd73a3b524f28aa
-
Filesize
1.7MB
MD5c6b7d9cf26d05b59b136a1d20faebb75
SHA17d7c41e60e3b420b46e8c22182fecb3d7d66d739
SHA256bd86925da14f3ea50ec4c989333ab710e71e93beefda89014e849d8afc492ae0
SHA5128b3a8aaa4fc4635f0f00f773d97c92561df1c039cfa000d44938355a801c9b5aaaaf4c9839832cdf545c9d94ad5bf445cf4baa1a519ea6f49f53c7ea0063bf21
-
Filesize
2.7MB
MD5c01e0e2aa41d996164dab455a39d71cd
SHA1c96330acc5235af013b62c500d6fe30eb28b107f
SHA256ba7a38b7579f3f3bea7a9a1759f6d3930f933a8d5cb652322623b5808f6a7d88
SHA512d658f9b57f9626f4fbe21de4b6c141dd88b8b5692fa912ce20ac1ad5ba28fb97629fb5903b178684aa7c362ea98a5cd21d27779581a2a5313092bc939153f4c4
-
Filesize
898KB
MD57451b48ea5d704a8502f1bfd859333d9
SHA1a7b758a3500f67e358349ed55f76d8d0177e206f
SHA256e60a13d92b7a73c0f403bb2c2a6e1cd7cb401772146376fa6393f0e8a0a69de9
SHA512d2d842128e8383b4b09c2d300b7c815e119a2890cc3540392d39b3e1e6104824c3a438e53b7162ac3662955f1b8f76a7fe24163e2ff2cdf78edaf0b54941569d
-
Filesize
5.6MB
MD599ef44893aad22b77f0325d109ffae06
SHA11e81ee9db68ac568b53039f64f89ca761ccfb6b0
SHA256275c6f2f526ddd4472febf4760bc161fca2047c6231c978f6218ca3b1f1d15ce
SHA512f719ccba0a23689de1fe0296e9b2e23a28c40c7a1793bbca2fb4083e98c6dd3c22c2b700cff90cc3aa14a8c0a2a1fd6d68cae71a23c20755368f1013cb99eab1
-
Filesize
2.1MB
MD53c217d03436985a1b3e9c03f442f19f6
SHA1bcc1959d1d8c76c69a306cf4b319fdeb5e841856
SHA2567b4ab66f63fbcdef6a7be43b9a1f7f4ca6e8145a08562a71d631b891e5e651b3
SHA512c9ff189d08497428c4810c35d1ad6a2bd4d5dea2ede58af3756a7dc16f836d46357db85412115ba313c6b169afcca048024ff06f4fa6febe4286ed5eab76e56d
-
Filesize
3.4MB
MD575068994b0665b27397c21b6bd531497
SHA1e9f9cbb221358f2562dfc6602667d948a70c76a8
SHA25602be334beff7d602deca48c69aee13a2ce6b20317d745e3672b8d112110ec6f8
SHA512eca2430dee1f2ef165168ade59200a1db85d7d794381542c481a4c459ca55265b6ed96d78f416ff53c59cf49c011705e18182583acd9f92667ad07b058bd48db
-
Filesize
3.1MB
MD5442c16db4785ae63bbe04951c745873a
SHA1671535f893593cbeb917e495109568f9eb31a7ec
SHA256016d36bc0fc84ddd2b2a8ddb833f29cd3e27292f6fa5e9bc03af9f3e618ff0ef
SHA512ac18d5218ba1ba065adce163ad854cdcdc48610d35b8da0b6e95e3ee485aeaf13e12e05260f1020e55e21d1f769a36f6bbbddcb9bcc7ec787b646233f6d382b5
-
Filesize
3.0MB
MD5d26887131da61f2a274a7069339f4fb3
SHA10a6f68fe7c7c3de9ead38a8a49c8987fd1e42784
SHA2569c00a5ec392ae47891f7befe7724c54d45a21ff6bd1bfeff8676c8f9ad4c670a
SHA512e2061990fb43fc48123321628d12c05d43f64f2027730a3c4e10526a14ff50e87305a21788551f33cb7f7c5928f43293de246ac3205e9e481fbb16c3ce683319
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin
Filesize8KB
MD5fa609647072a7ba1ec266e22300ae8c5
SHA10cd2951baafae67a2184a8085d18fd6beff086dd
SHA2567517129107d7f5b3f88a8ee99ef149c475ac6b3bc8165aca501299bdf8dea38a
SHA51289ec000872f08a53d2687679b6950fb4bc03cb880217c43c61a6bf4d0691b3e13585be92f691a97844b28905e726fbbf1c40abe90ede3d9c4b215576e44ee2e2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.bin
Filesize23KB
MD5c875d0a5dba9eca850217da80a27c808
SHA1ecabaed8832d727c69df1d5009d3d4dab7e25a82
SHA256f029316a9ec35399fb257292011d7b8a86709deb352b29ff465a73892728f477
SHA51274d420cc0b1e5b8716495c0b9a15928a2317e9cb7c034fa290dc767fc1580d4fd35af7a59e3541f55594e90e91d1cedfad70c3a643dea55c663497aeedd5ae7c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.bin
Filesize24KB
MD59eba0e119ba492bc30993a498341179a
SHA1a35d662b7683645dee89f1cf11640a5d3956bc18
SHA25601286a1b274419e06fa219cd9fb503278c63fc31f5eae97275c1a52064833e1b
SHA5129507227f905ac48be8292e463fff348c43b30510d33ad9725b396be3fa6ab5385b2aff04f7ae9ff893c5667f528c285cc9050849cb23fa72cef82194e9fc704e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.bin
Filesize22KB
MD5af3bb31dac9f8077923fb15db981013b
SHA101042b5310b485ebb0254404cda43a360620b3eb
SHA256ea404de3c507bf3c4efa167c56fc981dfb254ee1c463d205fb137e340a789fb4
SHA512ade347f30aa2639631d143eb1d665dea9fd7eb3001e31ad2c6e6e01f41e0224cedb2c8661e5638fc1071a1fd6c98916566add863576f5dd45b9a8b052b6bd836
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.bin
Filesize24KB
MD57f6a884f3df84865c980fa33515ace2c
SHA1de8a02bdd3bdb8c422c3a8c4210b62c6f402be22
SHA256da19850854f17ec64aa96a413d2979d43eb442f8022d983869cf40cce50b1e78
SHA5125dc6d7eaa9d731679ac6d0c1ae268a8c3dd1b5547c2312339a13a80ee348876e8a6ff687c46829b4357ea2a1adc016cadd6f63668106adcd8bc1170d8fc00e76
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.bin
Filesize24KB
MD5cad26db77960edefe7f84f766825839c
SHA10dd73757865ca636d960d23ec06a7050655f14af
SHA25684b3a7d9cd69fa091cfe5834685d841d9a5aaa5a16a14e8994f428f78052a4e0
SHA512c17fa40f35d83ca7234ac5d473264090e7f35a3bd6cbaf26717e7fa7c2eba414003010d278d3a633472a1ae0cf76d22fcea3b0a3edbe3e801a33ca3052667aa9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD51c81935c010640efff9ea51e6025a4af
SHA165045fe55a2dcaf011384cdbba94e1d2426e496e
SHA256a5b8cc206f4112a3bdc661cd3deb0909b9f776864a8bfb257a5c320276444d87
SHA5124d7a03a94619499ff029ab5c1b1853cf918a86af5d75c5eb73b395eb0604e34a58a17e5fdb1e6aa1918b11b8e306ea71ddb52f5fcd8c74d4986a66177f0e8d69
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize24KB
MD50eb29a76f9b04ca28dbf6c87246b44d5
SHA1284444185154fddb9940c90afa1cee937cf226d3
SHA2568055f17eb63dc8144210b487a91bcdc242aaa51446a1b85715390fcc5d9e90ce
SHA512637687ddbe77b960fbd7f7d5a8a8bb57fc8f65a59af29f036f89ce0212223367737f6d95b5f393391e610836958470ace31dc45a3de38ec229dd103a2642eae1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize24KB
MD5f7d089c8f90b751ca84bd66cd144cf32
SHA1a48326cd1d17d08ca64b2aa5e7b25f53f1248b52
SHA2560a3b899f710f10566f6bf0398ebbd82488efd71615843ab3357d2c9e63cb49a1
SHA512f543ef805ab5b279dba037f9d5f5daa4a27a666aa3d5c59943deb44ef8e8ab7a3914528da2bce91109fdc53f15629552879e3fe1f18a8e4f28f98a323de26c2a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD51ae971f2c815663825e2c7c24004140a
SHA1b6073e1cd33b8ab7e2438e2f1b235ed6c6d55bb9
SHA256602512c489e13845d89b146ed5b1c6b3d7ec1e56cff2d7601228274e2de4647f
SHA5126d5dba6df3feb92c175520ce9d33d70c7a52b7249ec2fbb6917eb5d39a0a80d04f1bb3cfdfb0d063ce9ba1bde7c7a9af7381091719a2524010b4293ac63a15e3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD53cc35127fab884380b2940cc9584222d
SHA111a12bfdfd271ee096f00948a36110f1f6fd669d
SHA256d2ff5510090caedf1e59441c14c8df499c873288c90b1ecc1ce6fb14f278c169
SHA5126cecdf4506bae4f8d4b438f99b7af88322ad739a7b0d9bcc235943a7763c351eb01ccb79542ec2805f1895742e13595f5c0b990ad5df5b1d956f5525b329dc79
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD591808620c027259bd1366f8fee70191d
SHA187c225faa542e49f3127f90858925e122ade0fd5
SHA25638aab12c5839f0b5d652ef7a9c24f09870ca9b3b079c6c387c54dcc8537b7767
SHA512faa9d20c7ca7fbbeb7790dd91d548da293c490ec75e5d40d840a8fa0ac4cf8d49526c39633b4f930293e8c25339a7400c667a072255a27cadd2fe90fdfe5c545
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize24KB
MD5ac0efaee07cb7c7a1cb16520b40006a4
SHA1381b61e9f661857fce33e72c036d7faeeeb0852b
SHA2561f6b7f04018e4add73c311007cf5fe8d8a259b5cb3947622ef330b4d35ffe936
SHA5129492a664d8f7c8a53afe82bd3d287c28e2a3c5ed931ab13ce1c0ee783a91f8fc4765bf12fc5b846b8d456d467728ba60e123a387790ecd7b32f7909c44e1a22c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\129f3d92-f107-46fe-b466-982b938c957a
Filesize982B
MD5b17d0b9c676f9ff32d718a20896f00e4
SHA10dc32974577ffc86f4697aff5901f24b9270e87a
SHA2568bec7ba8e1425de18a5f094bba8f47adf2bc52592fe03bc8010fd50a6279611a
SHA51235b7cc6c3cf2b7e62e65c31e49abec08e04bf7edcc8cc4f767673769944aeb1aaac81e05a7ad1037f6dd72c55c082ca0cc9596e8b1a96d9a2ab449b91acd718d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\f838cf1e-f0d1-4711-ac1c-f2875a052281
Filesize659B
MD5461123a0c045cab443767ee99111ea85
SHA1c8532fe42f109f13219584ce619e06345aa6f5e4
SHA2560132983d1954cb7c8f5a84fda2c1533236c106a3b8543ed021cd0b098d6d092e
SHA512e140da614d21ed9305c7c3087ac83a1f1fa31ae0cb329e7d649ad721a2da7288edc23e258ab39e4b14f5663bc33a222297879c7da86f26372dc54773a8af13ef
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD5ce158edb0cf7e88bed6224bb0acf58b8
SHA19f57b7fd4fc7f13297f5b782ca97e0158c537274
SHA256abe75b617517fbe90de710c34b6f356fea00a637a73de5965eaa04ce37e07521
SHA5124beec706eafeb2ba6f329f17ad192935f2cebed0e07d436bec1ce106368f47fbad60396cbaf1a97ff55f65ef97156d6f407d2dd0079c86fb9de5ae4e49e2ca2a
-
Filesize
15KB
MD5ade3bdc23b70c44c5ae91116d9656bce
SHA105ee8b8f61e1f9c05e5a9018545258b63aab968c
SHA256921bd82a742eeb02882f11e177f8aa59d453ae77bb0009aa6ad63a74a0de8c4e
SHA512c204fa913291e2ad58bc50fbe20b8aba621e35edcf9478f444bc8d672e6cfddc210fa9eb72f4a98282c3ed68e9352c0145a64dfd242b061101d05b08455ae545
-
Filesize
11KB
MD55e9b2283bf896a9d43bdaa4b5c462823
SHA15d6e0821a9aba61680cce2384fda15c03c61169b
SHA256c8e8086b18573c88904262dcd7b64fb85664f64f07d91304cf2f1bf6fdb44f08
SHA5129289e46caa424397198bac2c58cb734d59693217d9f24d078d1078b6806c492932fb5570784390094921ce2a4718c344b488beb60356d8d09f3f116e87537301
-
Filesize
10KB
MD531c65dc61aad43f0528c8715980f72df
SHA1365a87823196ff7a23c82b1032e2a014789f77d4
SHA256d0ed625f24510ca93183347576568c8a2232651bc057f4044564ad564322ed7b
SHA512479e8782a390a59f8e67495d28f1e6653f9d7b91f3b29827d8e53a8da34ec90770307006f7e6bc6936e72595e0f58df263ea8eb7751145be07223d05e7d46140
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize1.7MB
MD590c02775d671f3c1fd8e81ce17ad4082
SHA1a08a7677d6c34950d565836277efc89c10c1ac8c
SHA256840b506069415fdcea67425f5c4b4222b2f1eed75a59f91b7d3ed3d66bb7b56b
SHA512db1af00e078ee54f5ef09b116960e617372f730993d6d8ca7315ca88a3588c6f212ad337bcd442ff5769bf1d2c7e85b50dee6c6142751b45075d7bbc5a396050