Analysis
-
max time kernel
145s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-11-2024 08:05
Static task
static1
General
-
Target
b82e64bc0902a467825086a42a6c3efeaa92c0360f932d41678154571cc6a405.exe
-
Size
7.0MB
-
MD5
b22d7dc245c64ec55d7c22885be00f1e
-
SHA1
89c2ab9c1bac2c71b642f098495787ee592bec06
-
SHA256
b82e64bc0902a467825086a42a6c3efeaa92c0360f932d41678154571cc6a405
-
SHA512
681d366c165a1c4ec196999bfce678a4c7161bb5d371bef6ff7123f45517f5020ec10ac8d0e5383211ebef3c71710c90db0e3878bb7320bf4d8e5b6b0ed81f5c
-
SSDEEP
196608:9meq5oE3CgyCZo12Oo0v9+uU+YUHYPAo0Bpg:9meq5kRCT/0v9+uU+YUHqAtpg
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://processhol.sbs/api
https://p10tgrace.sbs/api
https://peepburry828.sbs/api
https://3xp3cts1aim.sbs/api
https://p3ar11fter.sbs/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4r232K.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4r232K.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 7f6eb7b1c6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 7f6eb7b1c6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 7f6eb7b1c6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4r232K.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4r232K.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4r232K.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4r232K.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 7f6eb7b1c6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 7f6eb7b1c6.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3s39D.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4r232K.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0800b71fab.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8860afffaa.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1Z41F9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7f6eb7b1c6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7d2f889603.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2x8082.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 22 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8860afffaa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7d2f889603.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1Z41F9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2x8082.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7d2f889603.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0800b71fab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0800b71fab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4r232K.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8860afffaa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7f6eb7b1c6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7f6eb7b1c6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2x8082.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3s39D.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4r232K.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1Z41F9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3s39D.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 1Z41F9.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 14 IoCs
pid Process 3716 N9T65.exe 1976 Q5w16.exe 3216 1Z41F9.exe 1248 skotes.exe 1616 2x8082.exe 3848 3s39D.exe 2836 4r232K.exe 4408 0800b71fab.exe 3188 8860afffaa.exe 1332 f77980414b.exe 2068 7f6eb7b1c6.exe 5496 7d2f889603.exe 5204 skotes.exe 6296 skotes.exe -
Identifies Wine through registry keys 2 TTPs 11 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 7d2f889603.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 1Z41F9.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 2x8082.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 3s39D.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 8860afffaa.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 4r232K.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 0800b71fab.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 7f6eb7b1c6.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4r232K.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4r232K.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 7f6eb7b1c6.exe -
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b82e64bc0902a467825086a42a6c3efeaa92c0360f932d41678154571cc6a405.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" N9T65.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Q5w16.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\0800b71fab.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007104001\\0800b71fab.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\8860afffaa.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007105001\\8860afffaa.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\f77980414b.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007106001\\f77980414b.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\7f6eb7b1c6.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007107001\\7f6eb7b1c6.exe" skotes.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0007000000023cde-99.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
pid Process 3216 1Z41F9.exe 1616 2x8082.exe 1248 skotes.exe 3848 3s39D.exe 2836 4r232K.exe 4408 0800b71fab.exe 3188 8860afffaa.exe 2068 7f6eb7b1c6.exe 5496 7d2f889603.exe 5204 skotes.exe 6296 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1Z41F9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 18 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7f6eb7b1c6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4r232K.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b82e64bc0902a467825086a42a6c3efeaa92c0360f932d41678154571cc6a405.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3s39D.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0800b71fab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7d2f889603.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language N9T65.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Q5w16.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8860afffaa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f77980414b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1Z41F9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2x8082.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 3968 taskkill.exe 2904 taskkill.exe 2256 taskkill.exe 1944 taskkill.exe 3892 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 3216 1Z41F9.exe 3216 1Z41F9.exe 1616 2x8082.exe 1616 2x8082.exe 1248 skotes.exe 1248 skotes.exe 3848 3s39D.exe 3848 3s39D.exe 2836 4r232K.exe 2836 4r232K.exe 2836 4r232K.exe 2836 4r232K.exe 4408 0800b71fab.exe 4408 0800b71fab.exe 3188 8860afffaa.exe 3188 8860afffaa.exe 1332 f77980414b.exe 1332 f77980414b.exe 2068 7f6eb7b1c6.exe 2068 7f6eb7b1c6.exe 1332 f77980414b.exe 1332 f77980414b.exe 2068 7f6eb7b1c6.exe 2068 7f6eb7b1c6.exe 2068 7f6eb7b1c6.exe 5496 7d2f889603.exe 5496 7d2f889603.exe 5204 skotes.exe 5204 skotes.exe 6296 skotes.exe 6296 skotes.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 2836 4r232K.exe Token: SeDebugPrivilege 3968 taskkill.exe Token: SeDebugPrivilege 2904 taskkill.exe Token: SeDebugPrivilege 2256 taskkill.exe Token: SeDebugPrivilege 1944 taskkill.exe Token: SeDebugPrivilege 3892 taskkill.exe Token: SeDebugPrivilege 1504 firefox.exe Token: SeDebugPrivilege 1504 firefox.exe Token: SeDebugPrivilege 2068 7f6eb7b1c6.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 3216 1Z41F9.exe 1332 f77980414b.exe 1332 f77980414b.exe 1332 f77980414b.exe 1332 f77980414b.exe 1332 f77980414b.exe 1332 f77980414b.exe 1332 f77980414b.exe 1332 f77980414b.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 1332 f77980414b.exe 1332 f77980414b.exe 1332 f77980414b.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 1332 f77980414b.exe 1332 f77980414b.exe 1332 f77980414b.exe 1332 f77980414b.exe 1332 f77980414b.exe 1332 f77980414b.exe 1332 f77980414b.exe 1332 f77980414b.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 1504 firefox.exe 1332 f77980414b.exe 1332 f77980414b.exe 1332 f77980414b.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1504 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2932 wrote to memory of 3716 2932 b82e64bc0902a467825086a42a6c3efeaa92c0360f932d41678154571cc6a405.exe 84 PID 2932 wrote to memory of 3716 2932 b82e64bc0902a467825086a42a6c3efeaa92c0360f932d41678154571cc6a405.exe 84 PID 2932 wrote to memory of 3716 2932 b82e64bc0902a467825086a42a6c3efeaa92c0360f932d41678154571cc6a405.exe 84 PID 3716 wrote to memory of 1976 3716 N9T65.exe 86 PID 3716 wrote to memory of 1976 3716 N9T65.exe 86 PID 3716 wrote to memory of 1976 3716 N9T65.exe 86 PID 1976 wrote to memory of 3216 1976 Q5w16.exe 87 PID 1976 wrote to memory of 3216 1976 Q5w16.exe 87 PID 1976 wrote to memory of 3216 1976 Q5w16.exe 87 PID 3216 wrote to memory of 1248 3216 1Z41F9.exe 89 PID 3216 wrote to memory of 1248 3216 1Z41F9.exe 89 PID 3216 wrote to memory of 1248 3216 1Z41F9.exe 89 PID 1976 wrote to memory of 1616 1976 Q5w16.exe 90 PID 1976 wrote to memory of 1616 1976 Q5w16.exe 90 PID 1976 wrote to memory of 1616 1976 Q5w16.exe 90 PID 3716 wrote to memory of 3848 3716 N9T65.exe 95 PID 3716 wrote to memory of 3848 3716 N9T65.exe 95 PID 3716 wrote to memory of 3848 3716 N9T65.exe 95 PID 2932 wrote to memory of 2836 2932 b82e64bc0902a467825086a42a6c3efeaa92c0360f932d41678154571cc6a405.exe 99 PID 2932 wrote to memory of 2836 2932 b82e64bc0902a467825086a42a6c3efeaa92c0360f932d41678154571cc6a405.exe 99 PID 2932 wrote to memory of 2836 2932 b82e64bc0902a467825086a42a6c3efeaa92c0360f932d41678154571cc6a405.exe 99 PID 1248 wrote to memory of 4408 1248 skotes.exe 100 PID 1248 wrote to memory of 4408 1248 skotes.exe 100 PID 1248 wrote to memory of 4408 1248 skotes.exe 100 PID 1248 wrote to memory of 3188 1248 skotes.exe 101 PID 1248 wrote to memory of 3188 1248 skotes.exe 101 PID 1248 wrote to memory of 3188 1248 skotes.exe 101 PID 1248 wrote to memory of 1332 1248 skotes.exe 103 PID 1248 wrote to memory of 1332 1248 skotes.exe 103 PID 1248 wrote to memory of 1332 1248 skotes.exe 103 PID 1332 wrote to memory of 3968 1332 f77980414b.exe 104 PID 1332 wrote to memory of 3968 1332 f77980414b.exe 104 PID 1332 wrote to memory of 3968 1332 f77980414b.exe 104 PID 1332 wrote to memory of 2904 1332 f77980414b.exe 107 PID 1332 wrote to memory of 2904 1332 f77980414b.exe 107 PID 1332 wrote to memory of 2904 1332 f77980414b.exe 107 PID 1332 wrote to memory of 2256 1332 f77980414b.exe 109 PID 1332 wrote to memory of 2256 1332 f77980414b.exe 109 PID 1332 wrote to memory of 2256 1332 f77980414b.exe 109 PID 1332 wrote to memory of 1944 1332 f77980414b.exe 111 PID 1332 wrote to memory of 1944 1332 f77980414b.exe 111 PID 1332 wrote to memory of 1944 1332 f77980414b.exe 111 PID 1332 wrote to memory of 3892 1332 f77980414b.exe 113 PID 1332 wrote to memory of 3892 1332 f77980414b.exe 113 PID 1332 wrote to memory of 3892 1332 f77980414b.exe 113 PID 1332 wrote to memory of 876 1332 f77980414b.exe 115 PID 1332 wrote to memory of 876 1332 f77980414b.exe 115 PID 876 wrote to memory of 1504 876 firefox.exe 116 PID 876 wrote to memory of 1504 876 firefox.exe 116 PID 876 wrote to memory of 1504 876 firefox.exe 116 PID 876 wrote to memory of 1504 876 firefox.exe 116 PID 876 wrote to memory of 1504 876 firefox.exe 116 PID 876 wrote to memory of 1504 876 firefox.exe 116 PID 876 wrote to memory of 1504 876 firefox.exe 116 PID 876 wrote to memory of 1504 876 firefox.exe 116 PID 876 wrote to memory of 1504 876 firefox.exe 116 PID 876 wrote to memory of 1504 876 firefox.exe 116 PID 876 wrote to memory of 1504 876 firefox.exe 116 PID 1504 wrote to memory of 3280 1504 firefox.exe 117 PID 1504 wrote to memory of 3280 1504 firefox.exe 117 PID 1504 wrote to memory of 3280 1504 firefox.exe 117 PID 1504 wrote to memory of 3280 1504 firefox.exe 117 PID 1504 wrote to memory of 3280 1504 firefox.exe 117 PID 1504 wrote to memory of 3280 1504 firefox.exe 117 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\b82e64bc0902a467825086a42a6c3efeaa92c0360f932d41678154571cc6a405.exe"C:\Users\Admin\AppData\Local\Temp\b82e64bc0902a467825086a42a6c3efeaa92c0360f932d41678154571cc6a405.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\N9T65.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\N9T65.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Q5w16.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Q5w16.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1Z41F9.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1Z41F9.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Users\Admin\AppData\Local\Temp\1007104001\0800b71fab.exe"C:\Users\Admin\AppData\Local\Temp\1007104001\0800b71fab.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4408
-
-
C:\Users\Admin\AppData\Local\Temp\1007105001\8860afffaa.exe"C:\Users\Admin\AppData\Local\Temp\1007105001\8860afffaa.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3188
-
-
C:\Users\Admin\AppData\Local\Temp\1007106001\f77980414b.exe"C:\Users\Admin\AppData\Local\Temp\1007106001\f77980414b.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3968
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2904
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2256
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1944
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3892
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2028 -parentBuildID 20240401114208 -prefsHandle 1956 -prefMapHandle 1948 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {eec0fea9-f9b5-4cf9-8d1c-25cb4da673c7} 1504 "\\.\pipe\gecko-crash-server-pipe.1504" gpu9⤵PID:3280
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2452 -parentBuildID 20240401114208 -prefsHandle 2436 -prefMapHandle 2432 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9d06a347-579a-4d19-b630-e52798a6f88a} 1504 "\\.\pipe\gecko-crash-server-pipe.1504" socket9⤵PID:4912
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3268 -childID 1 -isForBrowser -prefsHandle 3140 -prefMapHandle 3136 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1176 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1d148da9-2189-4d32-9c53-8447ae7809ef} 1504 "\\.\pipe\gecko-crash-server-pipe.1504" tab9⤵PID:4408
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4204 -childID 2 -isForBrowser -prefsHandle 4196 -prefMapHandle 4192 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1176 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b8a5334e-a844-405a-aa30-d95ce47a4c42} 1504 "\\.\pipe\gecko-crash-server-pipe.1504" tab9⤵PID:1372
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5128 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 5108 -prefMapHandle 5116 -prefsLen 29197 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {942b660b-df07-4459-b138-0611b2ae99df} 1504 "\\.\pipe\gecko-crash-server-pipe.1504" utility9⤵
- Checks processor information in registry
PID:6924
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5476 -childID 3 -isForBrowser -prefsHandle 5392 -prefMapHandle 5256 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1176 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7a83525a-4689-44b3-b764-2efee6e910ed} 1504 "\\.\pipe\gecko-crash-server-pipe.1504" tab9⤵PID:4936
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5600 -childID 4 -isForBrowser -prefsHandle 5680 -prefMapHandle 5676 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1176 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fc2b90fb-0b8d-4e7e-9747-4cdc8d72d3e9} 1504 "\\.\pipe\gecko-crash-server-pipe.1504" tab9⤵PID:1448
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5876 -childID 5 -isForBrowser -prefsHandle 5796 -prefMapHandle 5804 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1176 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {643f90d1-55c2-4ac4-9fb4-5e8b6de14bda} 1504 "\\.\pipe\gecko-crash-server-pipe.1504" tab9⤵PID:3600
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007107001\7f6eb7b1c6.exe"C:\Users\Admin\AppData\Local\Temp\1007107001\7f6eb7b1c6.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2068
-
-
C:\Users\Admin\AppData\Local\Temp\1007108001\7d2f889603.exe"C:\Users\Admin\AppData\Local\Temp\1007108001\7d2f889603.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5496
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2x8082.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2x8082.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1616
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3s39D.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3s39D.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3848
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4r232K.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4r232K.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2836
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5204
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6296
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\activity-stream.discovery_stream.json
Filesize19KB
MD53db28919e663b21f564d949d0420b3fd
SHA1a37dd1cdf6501193f25b807ef795cd41bb555a55
SHA256e1c3b261c8e45bc492accd0ebecda86f226b7ac014279601854eb324b0d5f278
SHA512e4160832c39b754fd1ac22751cb2cbb552301096d4738ae3e73ac1bfe26cc55c1bc45c48c3401425542a9930e65aace5e59df4406479687121ee67d437b3310a
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD5ccb55d2444c784a17a47999ed88d62bc
SHA1d66a84e1fa3c4233a0f70874ea9b7282ea179a07
SHA256b6c5734b51bdbfbce0da580263253e7456869dd9afc83fe78133a7d978fd4e41
SHA5124e8bc646e4cdd41c5533fbc9b1c75092d095a32800c4799bbb31392e48f37134b22d6c7a594199d45b6af1021c24ff746a72bf666ab8696f9b39f2119892bb74
-
Filesize
1.8MB
MD51c9baba3863eb6e2cd1fcfcb0fb31d1f
SHA1d3d44d8c18d93be08804bdc8a98d82c791d9487a
SHA2568be06ad676b76e25164e3c83e1f5bc69c0cb5417bceeee1dc03799b9c7261653
SHA512eb0a3e427cf28c5b41b6ecc63dd133290ab94cfed98f7774c02fd684b7f00633a847dadfe668680b7f6545d63e9a5073b51b4ce6bc820124dfcd5ede3db8097f
-
Filesize
1.7MB
MD5bed918183c456251eb2def949e77e958
SHA118cd870f1fe9729e2ca7040c94ae96cb5a06d54f
SHA25685765fad0f7110797e87c8765fdba37475435c1e1ac17096d58badc90c555acc
SHA5129f544f637cc7aef92fdbee0775bc3eec6c763bbcea1800711f93eb781bd775726a060b45fe5fb931eb885e04a0abdebb7d31f1c4b4325d42e0de9b989991b3ba
-
Filesize
900KB
MD5b651212b079aaae7a41a35932178135f
SHA11aab44c321fb93bfdc8c46d2e51a5354bb8d2e08
SHA256e4141cc09eb998a186001be4fc7fecba5e718476e6540ad9046cb99fe64fddac
SHA512c75c57cbf0f9cc9103514938ef07b7d79aeebe3509cc6f0addec868f1993423102098b15993bee1741df71dcf48d142b2ce7501106d4e1f7101d00006541b10a
-
Filesize
2.6MB
MD5aba8b7461f83484c491609ed50a23ccb
SHA1ff0cdc64aff545d168dec8508c1a7dc1c81a78a7
SHA256f98d8e6aa8d6bdf79c13ce7408520431f23938f40d559cbcb41b2be0fe109057
SHA5123e1cce23cf7720b9c6a157366470898b6261ef350bd3118a66f52a2e5c5c06307ab07b877cdf8233e96c90ddda24262806b8b38cba93197375a5cda9272156de
-
Filesize
4.2MB
MD5ecbc8e5795841534da310554cf558564
SHA14f5c4a459c679a613083fb8ebeaf6b72a62099c4
SHA2564ba3a14b8848a345ee40fe5e6c9a08a3bf7ecfaff176350082871a35a90973ea
SHA5124f74e57b352d9e64ea7abacf59a44159640a5607dd405ecf70dfe1fc71701d70d696d08e2c58846528b6e2e7931b4edb6b12467fd22c54c38b7fb060ffe2685c
-
Filesize
2.7MB
MD5bb8a6bf17f4508b049fa89d6e9c32901
SHA120ed514d85328510e008c0d6d17004e74c01745e
SHA25620d0fda98664988be3ff79e706af18c213c447e460923250392820a2a63a3b5e
SHA51286feca5e5f4524a37d199abb6346ab1cc2f953067782b324608529cad260d3db545a9fafca32834f0b961cb2f4f82400d96973bb9ccc04fd2f6663e5fbece994
-
Filesize
5.5MB
MD52c0c288455a963382cb054beb6f82507
SHA1a641268db67fa6ecb4916f5f79b4e4a01408f580
SHA25689e33a23c9e695d47e2b9a7ae58afcdcfa8f54c881dd87534a0c59d5f92b10de
SHA51208a17f72733950f8870ae8456470fa1ff517dadf6b9c66de24d2c5b826743dcfa855a9c24ca34626ac88b052e1b44bb8e7e5c9e5db0d3c6713c4dd02c6bedceb
-
Filesize
1.7MB
MD5ce37daa25d9c1f8b92ba51c7b2710061
SHA13a8f492102d2860bd14cbc68babb18c2bb9b2d76
SHA256ecbc507946a694aed41cfb1817e17796fbacfb8b553a633413d6979cb74c47b9
SHA512b71e4227ce94e08be256970c4aa219de9f3e3ba78e40b32f11b9563c83b8db8b42b78c237bc4fec0d16de3e39174869009eb9d703cea5259e5a88037bfeef78a
-
Filesize
3.7MB
MD5a1df25025645bf25a7f4c7feb4a4e2e7
SHA11b1e48dc0327d70de896daf1ee0c3566cf540757
SHA2560d1390e279ba6733e43bd6fae5cedf3076615129d9db5bf6c66a42ba106377db
SHA512c9ea6b7d7f3609eea8d1152bea9eec1dd7e7ec031fb71b29d543d11aa01a5636a3baff514d7b57ba2fe838bc95eb63bd59974c6f41af7e2ae248627cc99f2060
-
Filesize
1.8MB
MD59ce512a9fcc574ea43d69c6d4391719e
SHA1b0abf8c9807b8c8f7d4351b5cd86761896b377d7
SHA256dabdedec7a97d39dacd1cafc50d9682a5b16f4b3c1ec19ad0457cdd8c34ba422
SHA512d0b8daac6fac43f0413cdf908252ce79681541486c745f8df1d73c05eb9a42c6e8320949511a239664b6e152ea3f6e9bbb609ee5d6c067c8ccf349c7c466db3a
-
Filesize
1.8MB
MD51eb8c694c08ad5e6a7554d954ce3b7df
SHA176ed2916a8b9efe93b8b2e5cc29d232b6e5b8b93
SHA2562587bee40a1bc2b122d521a5068a01b7a02b13333da8b164874a93165e2b603f
SHA512e58a5cf646f2651682cd2571fe7b316205071ca7ba48b5085a97c8ff44a1167058f258b5b91edb0445d581ed08bbca00d388c647dc82b4d691b058beac3457ee
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin
Filesize6KB
MD532c6073546434d08c20efc44f8514f3c
SHA1c998eabf7eafce10599be2b1d160b4d7a0ed8430
SHA2562ebf8f8976d6853d4c4041058707fc72d35d3b14762bba62bb9350b513ff552f
SHA5126e5c9f53945896d59ac70e325669739d30713d4a684a8b1230af7faad1281235da54519d629ee4eb9a14295cb84df6989d919909ef36b172347a9829a98bb2bb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin
Filesize13KB
MD5d28cee451874f3cf1d0231dc4b3b9bfa
SHA1ab52e5e551a8e172634480cfe11cab4fb91ea415
SHA256c87d8737933feb536370afaefc0cb1ba0305004fe084732e33b98857ca10de81
SHA51280d3c9a70cf668fae8abc2ce898dcecf9893c12ef8cff0cacb5ec241176f06765c861b9f35a7cb595613f85a24e27b36c8b8588247a86c741a58930e5e71f62e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.bin
Filesize15KB
MD5c71c6a3e47a852bc51db2f44447a371c
SHA11de0d48c4b3734cf6e7f5d327e7c8f33e8342dd3
SHA256b092994d5f306ffbed6ef48c3389de68b8465f1d7ca2d1281f340965b2f3084d
SHA51243d57b692e772c7089ee367543a182ca830ea812ffe4fd28e2bfd4b00db7f9ae8f6a9151ea48212e7f831309838977b908735eee9a2a69ec69fdbdba4c744ac4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.bin
Filesize15KB
MD58a39474f31bee29afbbc13f5a9858f63
SHA1fa9190b7ab3dae4a2b403671ff2f47f875b9615d
SHA2564fa1f870caa4b67a13cd26ac4e5f40b5911b5900d0faab0ca7399a552fb3ba21
SHA512bc745bac59345b66a2857db1c566c1c1187170ca43f056b9959969ba1cda1599102bb9f474ce77178e253dc22f893403edddb50527cfcda4d56099a2d5d290ee
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.bin
Filesize22KB
MD5a5cd23858bd29741df49a33074831629
SHA1e6986bdfb2ab8505fbf04a46c21868dfe7f4c53f
SHA2562e6c9f6e940fdc570ab909904e9027829f8540efe22ecdbc01ab6072373d133b
SHA51226589c8222d8e2ae27787a774cefa23003d4b95453077d985bf9e3e583ce078b0c423239d23301f88de2d4ecf44ce232b559787f496ba220bbb939fe7932070c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.bin
Filesize6KB
MD516470189b68747152d99acdf26e31197
SHA132cacdc9d0ddc116b1fbe238abb11afac7803a6a
SHA2561339130a1f5a9c3e595f0cb95f08dd6bea9853354539dc64900fee47a1f4851d
SHA51289413fa395b3c4e245e0f221e8b6b1bd9177cd67b6f1f8820bc8f2fbeec87b0bd75fddfea2ff4ccca2be7bb7b2508b85cfc97c5ca10307da74fa46caf8d0f031
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5d343f2b4a40a2512c52a3ffe86956e0c
SHA1f2feae618fd9e9c5d9480bbf66de7c415206496b
SHA256dc852fecf9dd545e58e84ad9cb89f9762c0c784d12d36f3eff3f34becc798564
SHA5127e3e0da0f701499a32095376eb9d67d2d2c0fcf526096337a05cb4bf21cd0949935d5d48c102a62c75ac4d3d825a64d02aca9c9d717bc0b747b922a8498fc930
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5cb130ab01f83821e91772bb1cbcd88a2
SHA1b3095e0912d47bf3caabbd0e47080d52f2cc9eb5
SHA2566125adbe0058c5d718116362bd044f303c71ececeabd307d682336ed94c7507f
SHA51215ef38e2aac55aa37911798daee07fdf63ea7d614fd70b26cbce4edb6160f98b5f9b519497ddd4eae6b70bfcc8b747957fd5facd59235cb5a202dc5bc6a88ced
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD515c2c99680e86117789635cc7996c3e3
SHA1fb1d18b33c8f4b82bc253f726eddb884d342f7ef
SHA256764e17c13a8feedbb73246770f6c5c7a6ceca68cc92e16d219373ceb977679a7
SHA512d747047717a1dd4eb3b78395427bba687b1adbe4749679e169e1f607a396a1bf20ad8bab9a9b80fc0ea995f27474e9df40cb81992d03012fa397d81a1cf7a1d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD52cda79d6e7ec415bf73e1941faa3a3cb
SHA10a38f242361caf7e8b528889f87f00ef5b998e48
SHA25659be95d2efa6d3739f3756638d57082fdec4df16da129f2670a222073657e0e9
SHA5120bd39a796b104fd304cbc34b7f75c1989a1ed5fbcbf02745ab03de7a92f2cdf5491f1a66f4032eaf4f75733f705bcf7330673e7e0d01f25ce5e307ed34600fd5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD51ee19f3cfb1dfd2bea69dc8a40724cbd
SHA1c6b95f4d62e4da2034260e90fe2a22eea8938d0b
SHA2567ea6efd306e11378e47d27fc21e137c484a7dd73cea4d220ab7f98d868dcde8f
SHA512c200439f27c716f60b4ac00f53ffc56f8055773e07c2c112593ef024337f5eb23e08dc4a6fe356577d560f6e99e7e2bb99349d2ff810d4dc8ac916768d7e6484
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\731269d4-5bbd-46e5-8860-36f65f9ec451
Filesize671B
MD5287b9bf3760a75fb43b3af9684ba14c8
SHA1c733a9687762fba2301eb4a6e2184c4d1b98cd95
SHA256dc9106192209cf8e247a6aedef9bf6f2fb422ab767dcef5dd0885a4932030522
SHA512b5677d1a9e369b82417688896d02d6ae82d5836a06f62ec5041205826230788a06c483596a231af47b0e1af649255d044a8233fac75e20031b333feec03a0e3a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\82add0f2-46b5-4829-9df3-b027ae58593e
Filesize27KB
MD58997d30c51161d3a68a7f350eb5a5ed2
SHA15f285f5920a128e0a59f2de3bdb3be2988610f0d
SHA2564ebc3a8deccf308823922e07f9604e5e4d80afb19607e472f4d2ff564b893887
SHA5127dbedb2c9ac0b7ea07376e3643297b93f9caf5af188d970b206d05f5e9102d88ce865be6be50755e099de3818cba7d357ac0d42b0900e4537426ebb02de1edc0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\f71cd2d9-5cb4-4ca5-bbe0-f72db2835001
Filesize982B
MD5c317e644235cbfc54f671219354166f6
SHA16041abc60ddb0f3bc63f5c6124cb81a46c429c2b
SHA256d7b2ab18c44944742690e4cb1c97806deee65a384f16d212a1e11570ab5c4fdc
SHA512e8d259ebc7c62e66083fba9d0052246e59848dae4d0928ced25a4958f5172d8a8b4848d257a6ff29be07fb527dba0a0c778c7d5394b8180801ae18453e2753b9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
11KB
MD56326b5d81cb783083cbee28609d21e23
SHA1bb6f9710c8ceb9239b22a38bdc504fc5191d6246
SHA2564cb7ba48f7ca5057b217de16bf9323cf3d87e99897fdc12fcbb9e6e1592d71ca
SHA512a287ae3ec38423c7768b6523588d6c528af1f4f897f5249ed78767f039ebecf3f00fdcb5ca4bba32c89cbb913a943c651e0ff6114b3302cd1ed3f9a28d4a9d0b
-
Filesize
12KB
MD58e450fbf30970ffe8e822ffff7ab6858
SHA15b0ddb5271e1e9ae94695434136639ffbcb9e190
SHA256f1e8319ce9b6a037332d215d6ec8d9f75aaa797d0aaa51c526871deed6baf491
SHA512dba32331ab4c7f06d077d7aa5f69b6e15c04e10018940643eb4637f8effc9ea084b0ca7f9c657e78098cae3733eaa177b30db5cd87e68d90d30da3ad85474136
-
Filesize
16KB
MD5724a8917c49f291af2b3056fb735c5e2
SHA1a2b419efcee086bf2e6b0417d20b18ebbf6d8b11
SHA25630a3a5c57cfea159d653051df2c24bcd40103c9e4427881b7adc865d786fa334
SHA5128f7f32a30e444a6f956b79cccdaf13caed535d65ead0616c7ffc4bfa54a560fff3e0109cfd0b23708e0bb5a62acde698ff0c9444cf8661ab91dc7394da711cd5
-
Filesize
11KB
MD5b4fb5ab8a9198cee6b372dea1c796dc4
SHA118d440361cb1df733fcf17b448819673ac2636a8
SHA256b34bc5f11e7fe79969ab38720749f3ea86dd40cd494968bc4e4e666bb22b2a9e
SHA512149e8c038b1faf2c049f3f8c02deb011cd0068114b623761766ac6b1165317b549bfbbf6acf0b2f9d5ef58db6f776469bca9cad25e575d3e562ae4324869d7ee
-
Filesize
10KB
MD5b95a73700a52c8ed0717e8c1d82326f1
SHA1e8f88ef51837856ac9bf2b64a4d3b00844fb0052
SHA256c00df0e32276e02c55f0f447ed4a3c7c0bf5ab03e9c2d1740e541e74ef92d4d0
SHA512ba1232213fbd17c387f2c1d944f3ebe548d6046bcdf881c0dbe1ef7c78979f2d8541a4c0feb7a126582c4fb6c5d89dd640cb7a281960c4e18e619a155d4823ee