Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-11-2024 04:49
Static task
static1
Behavioral task
behavioral1
Sample
73dedcc630ebd68669c7ee7befac513271f3a06b39ba6e20f4a4cb585ea726ad.exe
Resource
win7-20240708-en
General
-
Target
73dedcc630ebd68669c7ee7befac513271f3a06b39ba6e20f4a4cb585ea726ad.exe
-
Size
1.8MB
-
MD5
ffc4509537ae91b049189c9f7bc777e0
-
SHA1
d07824e044eaea5c875d4c234eccdcfb46676720
-
SHA256
73dedcc630ebd68669c7ee7befac513271f3a06b39ba6e20f4a4cb585ea726ad
-
SHA512
61a8271bc25878faa2a012ab7fd1dc60043db8a8bbcf2b16cb396d6ce21732b83f44bbd64eeca887c2227409c3b52683123681803687a3faf6d6677089ed784f
-
SSDEEP
49152:DKE1DKkbmqi/HJOvnpW98yK/hol3CHNtZy:mE1DV0ov098Rpo9CHw
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://peepburry828.sbs/api
https://processhol.sbs/api
https://p10tgrace.sbs/api
https://3xp3cts1aim.sbs/api
https://p3ar11fter.sbs/api
Signatures
-
Amadey family
-
Cryptbot family
-
Detects CryptBot payload 1 IoCs
CryptBot is a C++ stealer distributed widely in bundle with other software.
resource yara_rule behavioral2/memory/5072-3700-0x0000000069CC0000-0x000000006A71B000-memory.dmp family_cryptbot_v3 -
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" bcff7f000d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" bcff7f000d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" bcff7f000d.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection bcff7f000d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" bcff7f000d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" bcff7f000d.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 73dedcc630ebd68669c7ee7befac513271f3a06b39ba6e20f4a4cb585ea726ad.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 333fb3e014.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ab174b2098.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rodda.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 99830d3122.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ bcff7f000d.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 5460 chrome.exe 5456 chrome.exe 5860 chrome.exe 5296 chrome.exe -
Checks BIOS information in registry 2 TTPs 20 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 333fb3e014.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rodda.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 99830d3122.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ab174b2098.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 73dedcc630ebd68669c7ee7befac513271f3a06b39ba6e20f4a4cb585ea726ad.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rodda.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 333fb3e014.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 99830d3122.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ab174b2098.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion bcff7f000d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 73dedcc630ebd68669c7ee7befac513271f3a06b39ba6e20f4a4cb585ea726ad.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion bcff7f000d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 73dedcc630ebd68669c7ee7befac513271f3a06b39ba6e20f4a4cb585ea726ad.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 10 IoCs
pid Process 3360 skotes.exe 1952 skotes.exe 5072 333fb3e014.exe 2460 rodda.exe 2800 99830d3122.exe 4100 ab174b2098.exe 3224 6064432959.exe 4408 bcff7f000d.exe 5424 skotes.exe 5968 skotes.exe -
Identifies Wine through registry keys 2 TTPs 10 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 333fb3e014.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine ab174b2098.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 99830d3122.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine bcff7f000d.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 73dedcc630ebd68669c7ee7befac513271f3a06b39ba6e20f4a4cb585ea726ad.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine rodda.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features bcff7f000d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" bcff7f000d.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\99830d3122.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007324001\\99830d3122.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ab174b2098.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007325001\\ab174b2098.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\6064432959.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007326001\\6064432959.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bcff7f000d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007327001\\bcff7f000d.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0008000000023bdc-110.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
pid Process 3456 73dedcc630ebd68669c7ee7befac513271f3a06b39ba6e20f4a4cb585ea726ad.exe 3360 skotes.exe 1952 skotes.exe 5072 333fb3e014.exe 2460 rodda.exe 2800 99830d3122.exe 4100 ab174b2098.exe 4408 bcff7f000d.exe 5424 skotes.exe 5968 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 73dedcc630ebd68669c7ee7befac513271f3a06b39ba6e20f4a4cb585ea726ad.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rodda.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 99830d3122.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bcff7f000d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 73dedcc630ebd68669c7ee7befac513271f3a06b39ba6e20f4a4cb585ea726ad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 333fb3e014.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ab174b2098.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6064432959.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 333fb3e014.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 333fb3e014.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 5 IoCs
pid Process 3836 taskkill.exe 4792 taskkill.exe 2216 taskkill.exe 4456 taskkill.exe 4164 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 3456 73dedcc630ebd68669c7ee7befac513271f3a06b39ba6e20f4a4cb585ea726ad.exe 3456 73dedcc630ebd68669c7ee7befac513271f3a06b39ba6e20f4a4cb585ea726ad.exe 3360 skotes.exe 3360 skotes.exe 1952 skotes.exe 1952 skotes.exe 5072 333fb3e014.exe 5072 333fb3e014.exe 2460 rodda.exe 2460 rodda.exe 2800 99830d3122.exe 2800 99830d3122.exe 4100 ab174b2098.exe 4100 ab174b2098.exe 3224 6064432959.exe 3224 6064432959.exe 4408 bcff7f000d.exe 4408 bcff7f000d.exe 3224 6064432959.exe 3224 6064432959.exe 4408 bcff7f000d.exe 4408 bcff7f000d.exe 4408 bcff7f000d.exe 5424 skotes.exe 5424 skotes.exe 5968 skotes.exe 5968 skotes.exe 5296 chrome.exe 5296 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 5296 chrome.exe 5296 chrome.exe 5296 chrome.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 3836 taskkill.exe Token: SeDebugPrivilege 4792 taskkill.exe Token: SeDebugPrivilege 2216 taskkill.exe Token: SeDebugPrivilege 4456 taskkill.exe Token: SeDebugPrivilege 4164 taskkill.exe Token: SeDebugPrivilege 5092 firefox.exe Token: SeDebugPrivilege 5092 firefox.exe Token: SeDebugPrivilege 4408 bcff7f000d.exe Token: SeShutdownPrivilege 5296 chrome.exe Token: SeCreatePagefilePrivilege 5296 chrome.exe Token: SeShutdownPrivilege 5296 chrome.exe Token: SeCreatePagefilePrivilege 5296 chrome.exe -
Suspicious use of FindShellTrayWindow 59 IoCs
pid Process 3456 73dedcc630ebd68669c7ee7befac513271f3a06b39ba6e20f4a4cb585ea726ad.exe 3224 6064432959.exe 3224 6064432959.exe 3224 6064432959.exe 3224 6064432959.exe 3224 6064432959.exe 3224 6064432959.exe 3224 6064432959.exe 5092 firefox.exe 5092 firefox.exe 5092 firefox.exe 5092 firefox.exe 3224 6064432959.exe 5092 firefox.exe 5092 firefox.exe 5092 firefox.exe 5092 firefox.exe 5092 firefox.exe 5092 firefox.exe 5092 firefox.exe 5092 firefox.exe 5092 firefox.exe 5092 firefox.exe 5092 firefox.exe 5092 firefox.exe 5092 firefox.exe 5092 firefox.exe 5092 firefox.exe 5092 firefox.exe 5092 firefox.exe 3224 6064432959.exe 3224 6064432959.exe 3224 6064432959.exe 5296 chrome.exe 5296 chrome.exe 5296 chrome.exe 5296 chrome.exe 5296 chrome.exe 5296 chrome.exe 5296 chrome.exe 5296 chrome.exe 5296 chrome.exe 5296 chrome.exe 5296 chrome.exe 5296 chrome.exe 5296 chrome.exe 5296 chrome.exe 5296 chrome.exe 5296 chrome.exe 5296 chrome.exe 5296 chrome.exe 5296 chrome.exe 5296 chrome.exe 5296 chrome.exe 5296 chrome.exe 5296 chrome.exe 5296 chrome.exe 5296 chrome.exe 5296 chrome.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 3224 6064432959.exe 3224 6064432959.exe 3224 6064432959.exe 3224 6064432959.exe 3224 6064432959.exe 3224 6064432959.exe 3224 6064432959.exe 5092 firefox.exe 5092 firefox.exe 5092 firefox.exe 5092 firefox.exe 3224 6064432959.exe 5092 firefox.exe 5092 firefox.exe 5092 firefox.exe 5092 firefox.exe 5092 firefox.exe 5092 firefox.exe 5092 firefox.exe 5092 firefox.exe 5092 firefox.exe 5092 firefox.exe 5092 firefox.exe 5092 firefox.exe 5092 firefox.exe 5092 firefox.exe 5092 firefox.exe 5092 firefox.exe 3224 6064432959.exe 3224 6064432959.exe 3224 6064432959.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5092 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3456 wrote to memory of 3360 3456 73dedcc630ebd68669c7ee7befac513271f3a06b39ba6e20f4a4cb585ea726ad.exe 86 PID 3456 wrote to memory of 3360 3456 73dedcc630ebd68669c7ee7befac513271f3a06b39ba6e20f4a4cb585ea726ad.exe 86 PID 3456 wrote to memory of 3360 3456 73dedcc630ebd68669c7ee7befac513271f3a06b39ba6e20f4a4cb585ea726ad.exe 86 PID 3360 wrote to memory of 5072 3360 skotes.exe 93 PID 3360 wrote to memory of 5072 3360 skotes.exe 93 PID 3360 wrote to memory of 5072 3360 skotes.exe 93 PID 3360 wrote to memory of 2460 3360 skotes.exe 96 PID 3360 wrote to memory of 2460 3360 skotes.exe 96 PID 3360 wrote to memory of 2460 3360 skotes.exe 96 PID 3360 wrote to memory of 2800 3360 skotes.exe 97 PID 3360 wrote to memory of 2800 3360 skotes.exe 97 PID 3360 wrote to memory of 2800 3360 skotes.exe 97 PID 3360 wrote to memory of 4100 3360 skotes.exe 98 PID 3360 wrote to memory of 4100 3360 skotes.exe 98 PID 3360 wrote to memory of 4100 3360 skotes.exe 98 PID 3360 wrote to memory of 3224 3360 skotes.exe 99 PID 3360 wrote to memory of 3224 3360 skotes.exe 99 PID 3360 wrote to memory of 3224 3360 skotes.exe 99 PID 3224 wrote to memory of 3836 3224 6064432959.exe 100 PID 3224 wrote to memory of 3836 3224 6064432959.exe 100 PID 3224 wrote to memory of 3836 3224 6064432959.exe 100 PID 3224 wrote to memory of 4792 3224 6064432959.exe 102 PID 3224 wrote to memory of 4792 3224 6064432959.exe 102 PID 3224 wrote to memory of 4792 3224 6064432959.exe 102 PID 3224 wrote to memory of 2216 3224 6064432959.exe 104 PID 3224 wrote to memory of 2216 3224 6064432959.exe 104 PID 3224 wrote to memory of 2216 3224 6064432959.exe 104 PID 3224 wrote to memory of 4456 3224 6064432959.exe 106 PID 3224 wrote to memory of 4456 3224 6064432959.exe 106 PID 3224 wrote to memory of 4456 3224 6064432959.exe 106 PID 3224 wrote to memory of 4164 3224 6064432959.exe 108 PID 3224 wrote to memory of 4164 3224 6064432959.exe 108 PID 3224 wrote to memory of 4164 3224 6064432959.exe 108 PID 3224 wrote to memory of 3984 3224 6064432959.exe 110 PID 3224 wrote to memory of 3984 3224 6064432959.exe 110 PID 3984 wrote to memory of 5092 3984 firefox.exe 111 PID 3984 wrote to memory of 5092 3984 firefox.exe 111 PID 3984 wrote to memory of 5092 3984 firefox.exe 111 PID 3984 wrote to memory of 5092 3984 firefox.exe 111 PID 3984 wrote to memory of 5092 3984 firefox.exe 111 PID 3984 wrote to memory of 5092 3984 firefox.exe 111 PID 3984 wrote to memory of 5092 3984 firefox.exe 111 PID 3984 wrote to memory of 5092 3984 firefox.exe 111 PID 3984 wrote to memory of 5092 3984 firefox.exe 111 PID 3984 wrote to memory of 5092 3984 firefox.exe 111 PID 3984 wrote to memory of 5092 3984 firefox.exe 111 PID 5092 wrote to memory of 1396 5092 firefox.exe 112 PID 5092 wrote to memory of 1396 5092 firefox.exe 112 PID 5092 wrote to memory of 1396 5092 firefox.exe 112 PID 5092 wrote to memory of 1396 5092 firefox.exe 112 PID 5092 wrote to memory of 1396 5092 firefox.exe 112 PID 5092 wrote to memory of 1396 5092 firefox.exe 112 PID 5092 wrote to memory of 1396 5092 firefox.exe 112 PID 5092 wrote to memory of 1396 5092 firefox.exe 112 PID 5092 wrote to memory of 1396 5092 firefox.exe 112 PID 5092 wrote to memory of 1396 5092 firefox.exe 112 PID 5092 wrote to memory of 1396 5092 firefox.exe 112 PID 5092 wrote to memory of 1396 5092 firefox.exe 112 PID 5092 wrote to memory of 1396 5092 firefox.exe 112 PID 5092 wrote to memory of 1396 5092 firefox.exe 112 PID 5092 wrote to memory of 1396 5092 firefox.exe 112 PID 5092 wrote to memory of 1396 5092 firefox.exe 112 PID 5092 wrote to memory of 1396 5092 firefox.exe 112 PID 5092 wrote to memory of 1396 5092 firefox.exe 112 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\73dedcc630ebd68669c7ee7befac513271f3a06b39ba6e20f4a4cb585ea726ad.exe"C:\Users\Admin\AppData\Local\Temp\73dedcc630ebd68669c7ee7befac513271f3a06b39ba6e20f4a4cb585ea726ad.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Users\Admin\AppData\Local\Temp\1007318001\333fb3e014.exe"C:\Users\Admin\AppData\Local\Temp\1007318001\333fb3e014.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:5072 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5296 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x108,0x10c,0x110,0xe4,0x114,0x7ffe0a69cc40,0x7ffe0a69cc4c,0x7ffe0a69cc585⤵PID:1808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1972,i,16758433874946811527,5927055734160084491,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1960 /prefetch:25⤵PID:3244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2172,i,16758433874946811527,5927055734160084491,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2168 /prefetch:35⤵PID:2928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2244,i,16758433874946811527,5927055734160084491,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2420 /prefetch:85⤵PID:4260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3176,i,16758433874946811527,5927055734160084491,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3196 /prefetch:15⤵
- Uses browser remote debugging
PID:5456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3220,i,16758433874946811527,5927055734160084491,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3236 /prefetch:15⤵
- Uses browser remote debugging
PID:5460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4536,i,16758433874946811527,5927055734160084491,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3900 /prefetch:15⤵
- Uses browser remote debugging
PID:5860
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007319001\rodda.exe"C:\Users\Admin\AppData\Local\Temp\1007319001\rodda.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2460
-
-
C:\Users\Admin\AppData\Local\Temp\1007324001\99830d3122.exe"C:\Users\Admin\AppData\Local\Temp\1007324001\99830d3122.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2800
-
-
C:\Users\Admin\AppData\Local\Temp\1007325001\ab174b2098.exe"C:\Users\Admin\AppData\Local\Temp\1007325001\ab174b2098.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4100
-
-
C:\Users\Admin\AppData\Local\Temp\1007326001\6064432959.exe"C:\Users\Admin\AppData\Local\Temp\1007326001\6064432959.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3836
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4792
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2216
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4456
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4164
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2012 -parentBuildID 20240401114208 -prefsHandle 1940 -prefMapHandle 1932 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {f02218b9-7b28-42eb-867a-c9aae655776a} 5092 "\\.\pipe\gecko-crash-server-pipe.5092" gpu6⤵PID:1396
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2472 -parentBuildID 20240401114208 -prefsHandle 2456 -prefMapHandle 2452 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e748c888-8c5a-4cf3-a6c7-9597d057cced} 5092 "\\.\pipe\gecko-crash-server-pipe.5092" socket6⤵PID:2756
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3412 -childID 1 -isForBrowser -prefsHandle 2932 -prefMapHandle 2928 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1264 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {71edcf00-8524-4479-946a-9eb42fa55f68} 5092 "\\.\pipe\gecko-crash-server-pipe.5092" tab6⤵PID:3436
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3960 -childID 2 -isForBrowser -prefsHandle 3952 -prefMapHandle 3948 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1264 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b0ba9eb9-7cdd-4bed-8a9c-aed615ec682a} 5092 "\\.\pipe\gecko-crash-server-pipe.5092" tab6⤵PID:2368
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4520 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4532 -prefMapHandle 4516 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a4459ec9-13fd-4614-9584-7a789a7815db} 5092 "\\.\pipe\gecko-crash-server-pipe.5092" utility6⤵
- Checks processor information in registry
PID:5572
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5496 -childID 3 -isForBrowser -prefsHandle 5280 -prefMapHandle 5468 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1264 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2cee6d39-04e5-43c1-b4ef-bdafb71d7e1e} 5092 "\\.\pipe\gecko-crash-server-pipe.5092" tab6⤵PID:4012
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5640 -childID 4 -isForBrowser -prefsHandle 5720 -prefMapHandle 5716 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1264 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {dd5a9477-85f2-4af6-bc0d-d2d5e669fc5c} 5092 "\\.\pipe\gecko-crash-server-pipe.5092" tab6⤵PID:2788
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5628 -childID 5 -isForBrowser -prefsHandle 5856 -prefMapHandle 5860 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1264 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f860d57c-5e13-4413-a26c-fe122b84cdb6} 5092 "\\.\pipe\gecko-crash-server-pipe.5092" tab6⤵PID:1952
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007327001\bcff7f000d.exe"C:\Users\Admin\AppData\Local\Temp\1007327001\bcff7f000d.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4408
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1952
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5424
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5968
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4284
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\activity-stream.discovery_stream.json
Filesize27KB
MD5e1474747754ee765e9df536f0cdbac32
SHA1fc995c8faba96514139865b8044a14d439ac180e
SHA256ad258b409c72deb8991e6c6dcc6006a981439aff1a0ce0a6f4f21647464be26f
SHA512fc3c809bb98b65bd89b946a65a6e872fe9b8feac54d3502797d4aea006070bcf6370f1367af601e4448679b25a3753c774bce79b39161c1939409dff07101406
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD5a04d072889f7d057cc7154c741d629fd
SHA150ca7d704d1a2dc839621ad73c39bfb367ecdd52
SHA256e917ec1aec0f48b1c2ed5d5cd33a3091d247413aa6f69fe9a2d8be6bfa8628a5
SHA512a8da7cfc8aad66f07c696981a00e6e316e06c416287d7ee0b2b6e7b1efed1387711b81b535010286ec1231229a0d6627b4244ba14862995d6e4d9270df8f9d0d
-
Filesize
4.2MB
MD50bd6fb5f0ba4460ad6f658894adb9874
SHA15eec17725b6bf038c21b15b9c5e3c81f09b25ead
SHA25619de4e31f35bc0e2876217eb616667a91ec02f94207740e66a556e3eae2e4ae3
SHA512c014c8083f66efe22b4cf5e868709bc1b8b063d438c53c0843fbcfe67bcccdd5bc26ede47276ad41eb65dbcc0a02550032da4ed73a5145896674dd885c83b176
-
Filesize
1.8MB
MD586a5d7f66a6aa908260e684c97079ef3
SHA1cc3beab7c38ee4a341bce58937eb8433e4b30990
SHA256b4c6b9f9f3bd55090817a9a10fec28be0db3d90578f6c1cc89a9cce3363a2f91
SHA512bb5087e5729cf2ad204de2259c93ff77fa051212759aae0cd67530211409c205f0bec6cc2eac855fb35515af6fb444f6c1d2c1a42abc6aa4d4d455f1665c62de
-
Filesize
1.8MB
MD519faedc02458f41fb7c0986549272244
SHA12644491369af64c1f04b08e473dde9de731d8c0a
SHA256ae79304205cb35166204f9ff1f49cea793937300f2cae1001dc706b6fae29a47
SHA5128a6dc5e33280312a80fde5453fd4e003dc04c6f7c95c3637abf05e91763fc7cfae6905a44b5a519a16226ded7de809390b4311ca93942e817a56dd13280e3ec2
-
Filesize
1.7MB
MD55e1a762aee8cdd0024a07b2b4cd776b8
SHA124697336c8c02d1c18787b16bb63e71798d27f93
SHA2564941447d19c770c63e441745710e13205f8a7f7b9b43fbddd4ae10b9de9790a5
SHA51257f2ca527c275d7215f813ded65dffe4b1b2b6b785ea81517d93c02903eb2d8b8ff0cb8eaba1d7a3bfa6c60880ad035a581b0b0b7d087e63f8203c0ba0163c93
-
Filesize
900KB
MD553d5f674fbbc6f8f98099284c3cb6a3e
SHA148d9ceedafe01d2aa33694001a2c1ce1dc6f1242
SHA2569c23e1863a1e40ec7feafce2df1960b4783dff7ed796d7c4679f1c3cc2c662ca
SHA512f262c0d358357b5bc4192fb9f906d10fccdb86d2a5c000e21ab63e659ea0008d1754434ec9d68b29458fe06e77ce264c0053559530dd57dd6b8c94b4f0e264ad
-
Filesize
2.6MB
MD5314216458ba7d870d632109fdf05918e
SHA17f0ead3fecf412fcc0f9cf58c03c73a393cc7050
SHA256d6a6c96260859c1fc3e99041b3314176349cc54991b5195ce4f0bd50819f50b8
SHA512737577a953f95929d73efe55bca502a060a906a4546b43f5571f6b52c3381dd8442aadbecd25d5dce114fe9671a74f1d8df46854b11ef3373d37bcc0b47f9b9e
-
Filesize
1.8MB
MD5ffc4509537ae91b049189c9f7bc777e0
SHA1d07824e044eaea5c875d4c234eccdcfb46676720
SHA25673dedcc630ebd68669c7ee7befac513271f3a06b39ba6e20f4a4cb585ea726ad
SHA51261a8271bc25878faa2a012ab7fd1dc60043db8a8bbcf2b16cb396d6ce21732b83f44bbd64eeca887c2227409c3b52683123681803687a3faf6d6677089ed784f
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin
Filesize6KB
MD5c677c74beb479d311255fba5d06594f1
SHA1a8d91f9a8ba085e457350e3a9931f2e9821ac954
SHA2563193ad5ca3bb8a13d6a2c0a1d9a599a4e08c010eda1b32765adc2bc1b5a1354a
SHA512f3d4ccd8d8d3296c2c0f706c35950eb7649c8d57137cd93a5f96f6effb8c9c3ec9b180de403d688a996be80ebc200139c0925b1fe92293e797894f8772c34f66
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin
Filesize8KB
MD5c245744ae194015ee4c8920b93e28b6b
SHA1275a46466641587fc593957fc6162ac2f1ef7cc5
SHA256d2e8d16442319fc493a3badec602e0a6eb43f94c23035382045c3d7d81a1297f
SHA512fce25505db6c183567f71567d6867e00e1b13e80fd960ae9ffee6e4b106c9ffd13d30cb85a696fd562c375cd174c02844c42f2c09476f4dba293861500bceec2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD57cd0c712ef6543effddf234606171f83
SHA18eb2d9a4da3472ed1623ea41786fd55e6c5ccf2d
SHA25646821c18df38a5fabcf8ec3bf2d757069f970cf52eb1ad75561f0726fa148a6c
SHA5127f08821084b9f6de8755d579ce22b7e938187069d2f87818399eed9e6caa4852fbf7e29d78dc155cf54878982e5d0fbf25709cf55f8d986bc0521ae2118fc383
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD58a3d2fa914ead0f2a17cb556af3e1ce1
SHA13cda1f1747d9e28c00b2005a0d9136ec62394e51
SHA256aa96c33caf7cd972ec1c3ad13dbfe65d96093f0f60c9899d46c95ed0a05cdde8
SHA51297357a6a95526c57a067db5e7d026eee799aa2fa7fb65d2a26af82a08d65f6dc3ee67aac7a104f1ca73d06994325fb80a5523a1b4c97e796a1b0b91f2986c5f9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD52848d1d4fdeedec316d7c0a4e6f39527
SHA17f0aeca4a5ad9a1edd5aa4e84b5cfd1f01871824
SHA256f04fdfc13bdc462fa878297598f2ae5db5793364d6f0ec8bd0d4c4650bf4ec32
SHA51287c50e1f46c99dbcf3f426c95cc09234b7d1f5eea805a64fbbfde427b4768decb4fa6231007d3965de219c3a6073f73e94df2cbafa36a797f45c7e0cde686730
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5e0fd8167984e9e3f5d1a7cb95d5ab923
SHA1e8ba96602bf67356d20a93bf6c0a9361e66212fc
SHA256f4e936aa244977106ab58798690ebcd028fc10b7c74738205f6d4606d35e1df9
SHA5129a2a7754edd0098a4775cd38cc244064d5719f9767e4eaf97a06459d97969792ee7e9ff24b77d6b5259e6b09f5a18e41635aae4d9011e1498706b3e0c24be3bc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD599b68462e2fa2cba677bd1c4aaa3d627
SHA1bf6b2be67426139040169e05b3d49c00a6493c86
SHA2564d9f14d8cbbb56a2432eb8f9ba73bda999c952d503f93f480d1200942a8042d6
SHA5122976e8f592aa81f899a738ad47fa71d6b004cf86f8fc9f852704bc2371417f691d4867a67fef837173883eb2c51df71a57f85e2777c642b11ba34b412ea9f783
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\33f9193d-37b7-40de-a495-70671bb70177
Filesize982B
MD5c163eba73921e5575f0de34434ba0c29
SHA12c3c447daaac9003abec9c028137b417a41541c1
SHA256684239af5ce9e9a88ecafe47ef1aa9388d9e54ab2ae513f05da937e6aab73cf8
SHA512e0e3871bf4bcbd2e176a5505c7e73a25b5e5c0e1900bab9a57c7116588ddefc5ab7acf8ad66bd67bd0026ae5f7139f19f45794464f23cc297aeca1cc389b9376
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\b2a4a937-986e-48b2-85f0-c5587406b839
Filesize671B
MD51922dd33f54836498ea38d094c50b5bc
SHA11eb7af64fbb068bec38197ec94c11e407d384499
SHA256fcdcd9bf0120a990982dd89838fa64fba6022c3621fa13f43ee70f400d55350a
SHA512a1c5d2124fcdec9a937eb9108c3f385130744c097352a7512e07cecfad24802c80856d635e987374e9057f1299319b84836ee0ff9fcb9eb23af7bb3ad1fdb4f0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\b99ebc2f-9219-4385-9c6d-221ea87702ce
Filesize26KB
MD5eda67d2068277760941700246b59f897
SHA12495b2aa02dbca4ed1ac6d32d1c64c4a28d20eb3
SHA256aad3ffba51dee9210413ae27c6f8a7800d5a48232218eaed2bbd3e22180c27b1
SHA51273b57cf4ae1c172ed2ce615fa37745a2a731e82d93efae7524752a050c137dfc26957006e51de781b5adb41d83510453fd2ed05cc996f466b181ce4969c67e75
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
11KB
MD57899b6f11507d0fbdafcbe6284291a73
SHA1208564b7d3b37d2b8db4290982b1382bc54211c9
SHA256bac9df0f1ef7f308da13544e3cdc19117abb601df4caa3b4fe93775e8a1f1b51
SHA512fb00acfa65f9fdd0a338927de6950c542464ba5714294a7c53dac3b8c1a2190883527ab4d1ec020fc8882353d829ae46ccbd1484b95b076974d25c892f3e24cf
-
Filesize
12KB
MD56be271a667f919393cdcef4d5af3e7f0
SHA1f8e55bcdb83b3c4d69af6f7f5c3f8d1e0c22fe6c
SHA256e4f830a50fe5cfa8728925b9909bf69579efff4aae3aac756e8cf2aefade5fcd
SHA51247dba988a26324c89922e1b136ca6326d4964778e9f5a8969eddf7963e792327124a28c99b7e08b7344755e88b1ce24b6fad50fef4481a2372149a89b0507a89
-
Filesize
15KB
MD50dafd1f1a2ebed408186b2292ae02ebd
SHA11600cc5bf989c91707a63dd197702450142c10a4
SHA256893a0d3c51ce647a07c32ab80b49bc563deb71aaf9235add8681977f3ffd0123
SHA51244177af954e3b93447d353e3665f06b83e7b29e23a838a66c0e394fcbb635118d41520a79bc3a4dccce43828d75da413b12386837da18995c37427283a4f3cd9
-
Filesize
10KB
MD55a3f033cf0d8d17781550bbd7bd42fdc
SHA12aaedded64992d317e48c9f5b220d4a41d58304f
SHA2566c105543191bff728cbe3704c571528078b5d19376c8f5dd585871d4bade090c
SHA512b20b947ac3d3aedd74a75bb57c33f990c022fa26f4a117e88095d31978b405fba9a3df62680625c4db556c4ab06eeec59fb96c010ad08ef0f17803c7de2670a4