Analysis
-
max time kernel
114s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-11-2024 06:44
Static task
static1
General
-
Target
cc350f283ce4871e62c8102decd5a0b723b521dab3f7a7e9b5ce6ef7e5b029da.exe
-
Size
5.5MB
-
MD5
7f28f09f0ce053b30fa0b990989f997e
-
SHA1
6f19928954931b86e8127c5873d2d7b31ea8a136
-
SHA256
cc350f283ce4871e62c8102decd5a0b723b521dab3f7a7e9b5ce6ef7e5b029da
-
SHA512
6ea74de43ecd20f8b1893c18f4482302bda10479e04c1c51811fc171f171487c3f06e19101bbd5d0659d83586807c1d7321683b59365ebc8f192c7763521e03c
-
SSDEEP
98304:i8cPAgkZ99LhHXx1IrQguPcuORR3qujPy2N5IIwOiIDIRB9oBPzR4N9kBSghfyUt:UPAXRLhHMl5uORR3qCjZwOi9vu7R4Dgj
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://scriptyprefej.store
https://navygenerayk.store
https://founpiuer.store
https://necklacedmny.store
https://thumbystriw.store
https://fadehairucw.store
https://crisiwarny.store
https://presticitpo.store
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://peepburry828.sbs/api
https://processhol.sbs/api
https://p10tgrace.sbs/api
https://3xp3cts1aim.sbs/api
https://p3ar11fter.sbs/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection be9903da27.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" be9903da27.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" be9903da27.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" be9903da27.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" be9903da27.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" be9903da27.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 36b2575ce7.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dc8e8a4de2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ be9903da27.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1A08r6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2i5625.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3d40g.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rodda.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 087c858045.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 22 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3d40g.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rodda.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rodda.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 36b2575ce7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dc8e8a4de2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion be9903da27.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2i5625.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3d40g.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 36b2575ce7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dc8e8a4de2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion be9903da27.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1A08r6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1A08r6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2i5625.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 087c858045.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 087c858045.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 1A08r6.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 3d40g.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 13 IoCs
pid Process 3860 W4C59.exe 4740 1A08r6.exe 1872 skotes.exe 1236 2i5625.exe 540 3d40g.exe 4588 rodda.exe 2764 087c858045.exe 1488 36b2575ce7.exe 2172 dc8e8a4de2.exe 1800 81e7f28188.exe 1528 be9903da27.exe 5216 skotes.exe 5236 skotes.exe -
Identifies Wine through registry keys 2 TTPs 11 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine dc8e8a4de2.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine be9903da27.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 2i5625.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 3d40g.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine rodda.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 087c858045.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 1A08r6.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 36b2575ce7.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe -
Loads dropped DLL 1 IoCs
pid Process 540 3d40g.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features be9903da27.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" be9903da27.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" W4C59.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\36b2575ce7.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007342001\\36b2575ce7.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dc8e8a4de2.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007343001\\dc8e8a4de2.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\81e7f28188.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007344001\\81e7f28188.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\be9903da27.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007345001\\be9903da27.exe" skotes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cc350f283ce4871e62c8102decd5a0b723b521dab3f7a7e9b5ce6ef7e5b029da.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000a000000023b97-130.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
pid Process 4740 1A08r6.exe 1872 skotes.exe 1236 2i5625.exe 540 3d40g.exe 4588 rodda.exe 2764 087c858045.exe 1488 36b2575ce7.exe 2172 dc8e8a4de2.exe 1528 be9903da27.exe 5216 skotes.exe 5236 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1A08r6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 19 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cc350f283ce4871e62c8102decd5a0b723b521dab3f7a7e9b5ce6ef7e5b029da.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 81e7f28188.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dc8e8a4de2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language be9903da27.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2i5625.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rodda.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 087c858045.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language W4C59.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1A08r6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3d40g.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 36b2575ce7.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3d40g.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3d40g.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4004 timeout.exe -
Kills process with taskkill 5 IoCs
pid Process 1292 taskkill.exe 3176 taskkill.exe 4084 taskkill.exe 3332 taskkill.exe 4380 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 4740 1A08r6.exe 4740 1A08r6.exe 1872 skotes.exe 1872 skotes.exe 1236 2i5625.exe 1236 2i5625.exe 540 3d40g.exe 540 3d40g.exe 540 3d40g.exe 540 3d40g.exe 4588 rodda.exe 4588 rodda.exe 2764 087c858045.exe 2764 087c858045.exe 1488 36b2575ce7.exe 1488 36b2575ce7.exe 2172 dc8e8a4de2.exe 2172 dc8e8a4de2.exe 1800 81e7f28188.exe 1800 81e7f28188.exe 1528 be9903da27.exe 1528 be9903da27.exe 1528 be9903da27.exe 1528 be9903da27.exe 1528 be9903da27.exe 1800 81e7f28188.exe 1800 81e7f28188.exe 5216 skotes.exe 5216 skotes.exe 5236 skotes.exe 5236 skotes.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 1292 taskkill.exe Token: SeDebugPrivilege 3176 taskkill.exe Token: SeDebugPrivilege 4084 taskkill.exe Token: SeDebugPrivilege 3332 taskkill.exe Token: SeDebugPrivilege 4380 taskkill.exe Token: SeDebugPrivilege 1208 firefox.exe Token: SeDebugPrivilege 1208 firefox.exe Token: SeDebugPrivilege 1528 be9903da27.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 4740 1A08r6.exe 1800 81e7f28188.exe 1800 81e7f28188.exe 1800 81e7f28188.exe 1800 81e7f28188.exe 1800 81e7f28188.exe 1800 81e7f28188.exe 1800 81e7f28188.exe 1800 81e7f28188.exe 1208 firefox.exe 1208 firefox.exe 1208 firefox.exe 1208 firefox.exe 1208 firefox.exe 1208 firefox.exe 1208 firefox.exe 1208 firefox.exe 1208 firefox.exe 1208 firefox.exe 1208 firefox.exe 1208 firefox.exe 1208 firefox.exe 1208 firefox.exe 1208 firefox.exe 1208 firefox.exe 1208 firefox.exe 1208 firefox.exe 1208 firefox.exe 1208 firefox.exe 1208 firefox.exe 1800 81e7f28188.exe 1800 81e7f28188.exe 1800 81e7f28188.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 1800 81e7f28188.exe 1800 81e7f28188.exe 1800 81e7f28188.exe 1800 81e7f28188.exe 1800 81e7f28188.exe 1800 81e7f28188.exe 1800 81e7f28188.exe 1800 81e7f28188.exe 1208 firefox.exe 1208 firefox.exe 1208 firefox.exe 1208 firefox.exe 1208 firefox.exe 1208 firefox.exe 1208 firefox.exe 1208 firefox.exe 1208 firefox.exe 1208 firefox.exe 1208 firefox.exe 1208 firefox.exe 1208 firefox.exe 1208 firefox.exe 1208 firefox.exe 1208 firefox.exe 1208 firefox.exe 1208 firefox.exe 1208 firefox.exe 1208 firefox.exe 1800 81e7f28188.exe 1800 81e7f28188.exe 1800 81e7f28188.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1208 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1824 wrote to memory of 3860 1824 cc350f283ce4871e62c8102decd5a0b723b521dab3f7a7e9b5ce6ef7e5b029da.exe 83 PID 1824 wrote to memory of 3860 1824 cc350f283ce4871e62c8102decd5a0b723b521dab3f7a7e9b5ce6ef7e5b029da.exe 83 PID 1824 wrote to memory of 3860 1824 cc350f283ce4871e62c8102decd5a0b723b521dab3f7a7e9b5ce6ef7e5b029da.exe 83 PID 3860 wrote to memory of 4740 3860 W4C59.exe 86 PID 3860 wrote to memory of 4740 3860 W4C59.exe 86 PID 3860 wrote to memory of 4740 3860 W4C59.exe 86 PID 4740 wrote to memory of 1872 4740 1A08r6.exe 88 PID 4740 wrote to memory of 1872 4740 1A08r6.exe 88 PID 4740 wrote to memory of 1872 4740 1A08r6.exe 88 PID 3860 wrote to memory of 1236 3860 W4C59.exe 89 PID 3860 wrote to memory of 1236 3860 W4C59.exe 89 PID 3860 wrote to memory of 1236 3860 W4C59.exe 89 PID 1824 wrote to memory of 540 1824 cc350f283ce4871e62c8102decd5a0b723b521dab3f7a7e9b5ce6ef7e5b029da.exe 95 PID 1824 wrote to memory of 540 1824 cc350f283ce4871e62c8102decd5a0b723b521dab3f7a7e9b5ce6ef7e5b029da.exe 95 PID 1824 wrote to memory of 540 1824 cc350f283ce4871e62c8102decd5a0b723b521dab3f7a7e9b5ce6ef7e5b029da.exe 95 PID 540 wrote to memory of 4036 540 3d40g.exe 98 PID 540 wrote to memory of 4036 540 3d40g.exe 98 PID 540 wrote to memory of 4036 540 3d40g.exe 98 PID 1872 wrote to memory of 4588 1872 skotes.exe 100 PID 1872 wrote to memory of 4588 1872 skotes.exe 100 PID 1872 wrote to memory of 4588 1872 skotes.exe 100 PID 4036 wrote to memory of 4004 4036 cmd.exe 101 PID 4036 wrote to memory of 4004 4036 cmd.exe 101 PID 4036 wrote to memory of 4004 4036 cmd.exe 101 PID 1872 wrote to memory of 2764 1872 skotes.exe 107 PID 1872 wrote to memory of 2764 1872 skotes.exe 107 PID 1872 wrote to memory of 2764 1872 skotes.exe 107 PID 1872 wrote to memory of 1488 1872 skotes.exe 108 PID 1872 wrote to memory of 1488 1872 skotes.exe 108 PID 1872 wrote to memory of 1488 1872 skotes.exe 108 PID 1872 wrote to memory of 2172 1872 skotes.exe 110 PID 1872 wrote to memory of 2172 1872 skotes.exe 110 PID 1872 wrote to memory of 2172 1872 skotes.exe 110 PID 1872 wrote to memory of 1800 1872 skotes.exe 111 PID 1872 wrote to memory of 1800 1872 skotes.exe 111 PID 1872 wrote to memory of 1800 1872 skotes.exe 111 PID 1800 wrote to memory of 1292 1800 81e7f28188.exe 112 PID 1800 wrote to memory of 1292 1800 81e7f28188.exe 112 PID 1800 wrote to memory of 1292 1800 81e7f28188.exe 112 PID 1800 wrote to memory of 3176 1800 81e7f28188.exe 114 PID 1800 wrote to memory of 3176 1800 81e7f28188.exe 114 PID 1800 wrote to memory of 3176 1800 81e7f28188.exe 114 PID 1800 wrote to memory of 4084 1800 81e7f28188.exe 116 PID 1800 wrote to memory of 4084 1800 81e7f28188.exe 116 PID 1800 wrote to memory of 4084 1800 81e7f28188.exe 116 PID 1800 wrote to memory of 3332 1800 81e7f28188.exe 118 PID 1800 wrote to memory of 3332 1800 81e7f28188.exe 118 PID 1800 wrote to memory of 3332 1800 81e7f28188.exe 118 PID 1800 wrote to memory of 4380 1800 81e7f28188.exe 120 PID 1800 wrote to memory of 4380 1800 81e7f28188.exe 120 PID 1800 wrote to memory of 4380 1800 81e7f28188.exe 120 PID 1872 wrote to memory of 1528 1872 skotes.exe 122 PID 1872 wrote to memory of 1528 1872 skotes.exe 122 PID 1872 wrote to memory of 1528 1872 skotes.exe 122 PID 1800 wrote to memory of 1684 1800 81e7f28188.exe 123 PID 1800 wrote to memory of 1684 1800 81e7f28188.exe 123 PID 1684 wrote to memory of 1208 1684 firefox.exe 125 PID 1684 wrote to memory of 1208 1684 firefox.exe 125 PID 1684 wrote to memory of 1208 1684 firefox.exe 125 PID 1684 wrote to memory of 1208 1684 firefox.exe 125 PID 1684 wrote to memory of 1208 1684 firefox.exe 125 PID 1684 wrote to memory of 1208 1684 firefox.exe 125 PID 1684 wrote to memory of 1208 1684 firefox.exe 125 PID 1684 wrote to memory of 1208 1684 firefox.exe 125 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc350f283ce4871e62c8102decd5a0b723b521dab3f7a7e9b5ce6ef7e5b029da.exe"C:\Users\Admin\AppData\Local\Temp\cc350f283ce4871e62c8102decd5a0b723b521dab3f7a7e9b5ce6ef7e5b029da.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\W4C59.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\W4C59.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3860 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1A08r6.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1A08r6.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Users\Admin\AppData\Local\Temp\1007319001\rodda.exe"C:\Users\Admin\AppData\Local\Temp\1007319001\rodda.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4588
-
-
C:\Users\Admin\AppData\Local\Temp\1007341001\087c858045.exe"C:\Users\Admin\AppData\Local\Temp\1007341001\087c858045.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2764
-
-
C:\Users\Admin\AppData\Local\Temp\1007342001\36b2575ce7.exe"C:\Users\Admin\AppData\Local\Temp\1007342001\36b2575ce7.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1488
-
-
C:\Users\Admin\AppData\Local\Temp\1007343001\dc8e8a4de2.exe"C:\Users\Admin\AppData\Local\Temp\1007343001\dc8e8a4de2.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2172
-
-
C:\Users\Admin\AppData\Local\Temp\1007344001\81e7f28188.exe"C:\Users\Admin\AppData\Local\Temp\1007344001\81e7f28188.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1292
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3176
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4084
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3332
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4380
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking6⤵
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking7⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1208 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2028 -parentBuildID 20240401114208 -prefsHandle 1944 -prefMapHandle 1936 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c221cf2a-29d4-4bd4-ad7b-4417f46d60a6} 1208 "\\.\pipe\gecko-crash-server-pipe.1208" gpu8⤵PID:3224
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2500 -parentBuildID 20240401114208 -prefsHandle 2492 -prefMapHandle 2488 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {949e0aaa-4fda-4721-b8c7-5c2570e8ec69} 1208 "\\.\pipe\gecko-crash-server-pipe.1208" socket8⤵PID:3128
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3076 -childID 1 -isForBrowser -prefsHandle 3080 -prefMapHandle 3160 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4bf8f0ab-1092-40bd-b323-c2006f81ea19} 1208 "\\.\pipe\gecko-crash-server-pipe.1208" tab8⤵PID:3408
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4236 -childID 2 -isForBrowser -prefsHandle 4228 -prefMapHandle 4116 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2a3ddfd1-93e9-40a2-816e-5ebf2e61dc65} 1208 "\\.\pipe\gecko-crash-server-pipe.1208" tab8⤵PID:1536
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4864 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4860 -prefMapHandle 4856 -prefsLen 29144 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {dd720594-cfe7-4299-99da-cc44613d3f4b} 1208 "\\.\pipe\gecko-crash-server-pipe.1208" utility8⤵
- Checks processor information in registry
PID:5828
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5124 -childID 3 -isForBrowser -prefsHandle 4860 -prefMapHandle 5100 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {392f9b11-f3c2-4441-8d87-382352ed3e37} 1208 "\\.\pipe\gecko-crash-server-pipe.1208" tab8⤵PID:7400
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5188 -childID 4 -isForBrowser -prefsHandle 5180 -prefMapHandle 5176 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4968ec4a-cf2b-4c73-8510-0f261514efb1} 1208 "\\.\pipe\gecko-crash-server-pipe.1208" tab8⤵PID:7416
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5456 -childID 5 -isForBrowser -prefsHandle 5328 -prefMapHandle 5344 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d9b3cd0b-36b1-4c58-9607-6484d5a28fbd} 1208 "\\.\pipe\gecko-crash-server-pipe.1208" tab8⤵PID:7464
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007345001\be9903da27.exe"C:\Users\Admin\AppData\Local\Temp\1007345001\be9903da27.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1528
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2i5625.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2i5625.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1236
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3d40g.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3d40g.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3d40g.exe" & del "C:\ProgramData\*.dll"" & exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Windows\SysWOW64\timeout.exetimeout /t 54⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4004
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5216
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5236
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
676KB
MD5eda18948a989176f4eebb175ce806255
SHA1ff22a3d5f5fb705137f233c36622c79eab995897
SHA25681a4f37c5495800b7cc46aea6535d9180dadb5c151db6f1fd1968d1cd8c1eeb4
SHA512160ed9990c37a4753fc0f5111c94414568654afbedc05308308197df2a99594f2d5d8fe511fd2279543a869ed20248e603d88a0b9b8fb119e8e6131b0c52ff85
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\activity-stream.discovery_stream.json
Filesize27KB
MD5efe6b94ac10493be0a1b5b56d7729d43
SHA13fc44b843f18c23aa8181d5992ad43d61db714af
SHA25663397bce7246a5fac9c11d2badcbb35da19ffeca7f238c2e14470aad02244663
SHA51268b8552b1728329f548a965972f20029e30d757ec96c5f992aff3debdd70bdeac6b408700f0a16031e35dc98aa91f11abfb04fc05374badd7649a929a29353a8
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD5263eee79d4338b16f4eac53ab37d1308
SHA1b4f009c21d4d1b4a42e07fdc2a496c1ffd019c8e
SHA2564c928139a9a788219c352860f4be7b3978df396bd347fd638532e7c25d95f35d
SHA512d16bff418c8e82fb930bda895bd2c67e7161e9387cc15e4ef47082a96962c517c4d1fcb9b0335337822aeb9cc38c8eefc0d3ace4b5aee8d5e65e254d85cd578d
-
Filesize
1.8MB
MD586a5d7f66a6aa908260e684c97079ef3
SHA1cc3beab7c38ee4a341bce58937eb8433e4b30990
SHA256b4c6b9f9f3bd55090817a9a10fec28be0db3d90578f6c1cc89a9cce3363a2f91
SHA512bb5087e5729cf2ad204de2259c93ff77fa051212759aae0cd67530211409c205f0bec6cc2eac855fb35515af6fb444f6c1d2c1a42abc6aa4d4d455f1665c62de
-
Filesize
4.2MB
MD5ddc37e97b7f6f293fd3249dde8626b60
SHA14408410263886ec4e02dc3eea37f8c89c361db49
SHA2561e54e10e7d664fbe488c896545d9a706551f83c1b765ef96d9e511850b256039
SHA5125743a4eb15854402873ec8fb8dfdd9fb5cc94a45f958180beb8678e24a726b1e35a6fc38055abc3ea17ef86975650d53e7d7dc5419747b191e680b80868f4366
-
Filesize
1.8MB
MD50052b3199e0f2d283c8589e137f861b9
SHA1890e0ec166ff2a4bc5815a6cdb7db006c1dbed3f
SHA25629fc9219bf04bc8af576e3e972b250dca95c518b912ef2e4b97b2253f876447a
SHA5124d19391bc8ee0072e4aee9c45d5d748ca87c648b1b006116b17ea2c62e04316ef9e0aed2a3e96e695bebba038498ba7e5754a4fa169cb2d36a4e8b4943c4851c
-
Filesize
1.7MB
MD597de1d3cfa763a50d7195d5bd0c3594c
SHA13429706674f3a675e916097140d46b4e75706367
SHA25690070e4b5115c14092fc257bb696d71025d6da274a339913d9f66da915dada16
SHA512ab16e913bed783d50c3fa0f3a385c71cb5e197d0c3b3facfe45821ad0ee52c78879b2fccb587967c87488eca4accc587a2825ecd5c8e340a7f5030e5736feb63
-
Filesize
900KB
MD58497a1a62a06f49fb7da020a2ac7cb51
SHA108f097ad043bc698a4a8a142587edcab55bb4a9c
SHA256437ffdd5f9fd171113b2e13401b127b21d2c8f95d47feb897cabd9d4a04bf437
SHA512e2bb47cd34330337b1620c1e853ab6397b42335bbecec45513080eea0c2c575b96aed521a29285e33b60f4ac6a6e91866e4ab1f5d2a31adae9062c3a77214cad
-
Filesize
2.7MB
MD59ac8445cce2c068f85de4e97c38041a1
SHA131f85847064c2181505e9e8b0cb018f480ffadb0
SHA2562a06994be891b47d92c40b83e4b33ec355b587bbd00c7c49c2ae266f1e06c621
SHA5126d3a6893269032921bb643188644ce7af79603ced800dce380a42d150948063393d92a2c055dd6707e156346047714408e8ae2964117548a5002826c08771183
-
Filesize
2.0MB
MD563364970c363a97db9a7537d028dfd38
SHA149e87e6a9f730c1352f1144f9165c13ba2e59e10
SHA256b0720ccaae74e2f41641172ae0d35cf6264d1f3f8ba0abe471af12a0aa96db11
SHA512239d553ec7ae23aab2ffe86777ac9b9fdd128c86bae55dd49c55384d7e947942f79d5dc382adfe15ddb6b0a87c49cdc0793d159b1e3dd877f044b95713baa3a6
-
Filesize
3.4MB
MD5c9f4c0c855a968638d1ddd47e8e7a65e
SHA16c4b44412d6c7fef7e60be10251d7268ffc6cea3
SHA256e3a1b845d5c2f2c444a11df2eb9fa4ef87217accea64da04993fed012b13e874
SHA512924f75c70b9bc493751a20acd3849a821a87d95d7d3f84eb12645091c9323ae1d961bc17f2f4b380d485226bac7191fedb5f2b52fa0feb3f29790ebd7955ffad
-
Filesize
3.1MB
MD53f5ea966cf748b7e3f6e69970dba2207
SHA1aaaaab07a74f4645b82911f6c9718f6c595e489d
SHA25664db5764d5c5860de63696cc96e86c6bc4fc0803c9541eac656b4e5673c39e13
SHA512d9285751a7fe1cabb22ce3d40be85c2644d894c2f8bc3ca4b750a70486a11433d46a7be8ba7317d55aa6572c6283e07035c3040886a75e64cfe727be60fe2fe8
-
Filesize
3.0MB
MD5834e58d1789b7d59c88578530fc6b452
SHA131350b2ec4937c1d8d2d186becefa8e4a4ab1314
SHA256ffbb393aec8fb88bc1161e44be4a2a574d35cd96b7c853f7f884b7b1e36cf08a
SHA5128d17a96f1c0842536a53725359f03fd1bc72644a132f02e45583adef388b01f75d07b1a95886c98ee140c3b639bbfbee6c2769b241cb3f6026c214825901796a
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin
Filesize6KB
MD5ca3d7b8eaa8cc9dc1bd0445cf3a52bb8
SHA184635596867e1fa1262877b95b99829621c34f17
SHA256275e794dcb3aab84da1cf1902ff6283aeef53610c5e0d97c91af98e613c87aba
SHA512b49193adecd6787c821e4e268fa6bc27d98345bb66952253f7e2124b65bddbb3f32c2131b9198ed6047b493c185ec0fd0e547a2ee74e96a9ab5ef9d3b00e5c5e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin
Filesize7KB
MD5ddffac493b275a700141f83a37f9b237
SHA1d99e267fe8d18c1a92041cd298192c4e9c134f82
SHA256741580842635d05b89288e0ce698b0b16aff4d3abf43fb516b670bfd1eccd18f
SHA51259ed6d9a2cf309d89996e397a24a52563005141cca9c4074aa077a88565cb212e2ce08552db7b94d6c3afa00b8ab95c3f0489db3512672554e4f768a5d23b1b0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin
Filesize10KB
MD5bf49d0b142fe0d0c4ea2b2de80484f4e
SHA1fa0ad37744e90b3c08cc5f70d932eb1f5e388bfc
SHA256b882b75785801c9008177a60fa9a1c3ab0b089dc1b40f7ee7726afd25846c140
SHA512378acf3e671336b8539e5ab98a881bc176ea37d4654cc3c90d80c5277e8f416e850974b80bbcd1acfc3a58ea94dff457283f0b826d19088610c0265ab711c92d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.bin
Filesize15KB
MD526531a77b335fb600d779011c222a198
SHA1716413303072e365abd9edf8f37974e4173ba125
SHA256004df6c1765515b6498567f05bf0df5224b634f59dc6a7e93dfb24ecfaa8e8c4
SHA51266e964c4a4ceeaeb12cdef2c72e8d6748e9fd266c24416fb2f4f32ad20885c9c70ac2e691c0f4004439ec7ec643c43f0ffcc5a54841dd7c6a910267e56a06bbb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.bin
Filesize15KB
MD5645319521bb4f6bcb764a4690054aa5f
SHA1844da7157dc26afab56a727daf9900cee174cb38
SHA256dd3f79f3a575304d771d4168e574545598265866ceb9117b75dfba9c333324b8
SHA51273b9f57ab50ab35ff7bb026b24fa55c89f9267521f433e7f863885ee403e12735674cea916468a712830e75dee227318115dbe5e3acf10c1b9fa28ecaf0f1b6f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.bin
Filesize23KB
MD5f77fb3e1ded4063a49511384c8215aae
SHA125ab414317c2b44801d9003ef946c91d54f3c104
SHA256046db6122a1328dc2ccefa465eb8fca57133316b5e20f3157a4f17c3b91fdcbf
SHA51284a514f6cf64c2b4bedbe5361779dea5084a310b0f12a304b838216052bf202264b2d805943d184f4cee7709459172a18671997249dc95945e153c57a9dbb26e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.bin
Filesize6KB
MD586fed8233e392db1792081da57116c8e
SHA15094541b1856af06c060eb69406ed2680723256f
SHA2562b2f4d372a86ba9c651e08ae35e3b48cc768571d932480ed54f49cd0f61714d1
SHA51269be0d148e565af810b5be4192367cff0424b3dd3a3f8a0efdf57424e00e6c3ae5926f7dd1918a9237cf88d9780a3cafb2bf21f5493f85f0ab8befd03f41ecca
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.bin
Filesize15KB
MD591f56b31a47c3233278ad4f55ff40574
SHA1e80c09c43794d58bf65a2ca782814c0c47849db4
SHA2566842e75f40550de023372ed2c9575e98a98b40ad22b4dc939c7cf52698b68d82
SHA5121e709477382056d3278f632bb9da2e4fb5efdc82b328c76b195408664eb646bbba544e7735ab40dea808ef4c22cd079dade3708675934bfe0c66d023e73a24a1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5f046c0f46d8a57234a147436b4d6bee1
SHA14888fad80715dca8e9c6ca3b5163af51103d5ab1
SHA256cb7d3659a0ef5eb7b9495cc3bd5e6c883664173d9063348548485b92f572132d
SHA51250af663cbdbc4a400b95cf86b01517253ec37075e5e220ab63f3fcac87087960f1c144c0943cf3ac10eba3ac39bc1165f5ad69bd66662dcc6b10445f706f88f2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5128b81f32c5c6858fcc0b3950cc6ab65
SHA1ae8e7d47af539eabb7d288850d789ec0907ccd4c
SHA256ba3acae9292d8bc9e522152eb3f86e775d5a41c35dffb5e18f9a0ed46a55bc37
SHA512847b109cdad6d6f1a0417ec45c90ca1c8bf69c37d3d969445ab48bee8054ad2ced5e4126e8adfc4a8f6f0cba1712e176653dacb5716915704f3b557c00ae1de7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5aa8804d39854a8e4926b3fc89501e8b7
SHA1e32d97a43324948b3b4b952f8c6cc9d9b9fdf5b7
SHA256670a96a7797fc7d9f2a36d6e2bf691951fdccf94450778bff3e188b01c877a38
SHA512d0af5ae2a2043b060f3658ef1cfadd41fe7d8c1cbc5e2cf961bb17164c28f097fa609b53ce4c8d319c53674a7527c057e9437a25958d253c6f2f818394c9ed8d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD54e18b1e4aafbe3c6884a9547d00d05f8
SHA1022d2a1c7e28f7b07555ec67c98dee6fb5df48ea
SHA25646a9c34b4216ad6d8a7a0df1fbce03b6cc95ec62de92d1d1cf56029985494f73
SHA512099f82a95ff4ceb40bec6b4537fe0a575b35279ea99d1c51ba83ae2bea764d59973cee9bbe1c01ec7cc6f74c9cd09bab2bb600ba5f30f8953ba6d7254d1e56d6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD54b22569638680af699d4c906979b4f4e
SHA119d25c17bd0aecbe196bfa4a77dbb5cf0c5ebbc7
SHA256624a12129ccdcc008192c791591a2181e504057eaad668adac8a58937567c35d
SHA512b336b260daab99c86e99874ac404bb41dd265046a95a67c629d520b487afd9e7af1ebe1f5f8d931a50ba739982a3ec4d963e23c60c2139c41048f0112166273c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\906fef5f-fb6c-4fcf-bfcb-2ffda8c604fc
Filesize25KB
MD5dcb21185b5030b20998e633eec6df54d
SHA19b098e295b52de1cf5e37d32cf173f4acb6b9fc2
SHA25637eb626c94cb92a7f927529ee0044ca1439020f092741cedcbd6c7457682e414
SHA512ac280c087c096d0a38e7985ac3f66546e7a7520daca640c97ecb72c1937d2829d7140a5335e918e9595e560b725dce2ccae0ef05098b5aa1d5af5edee02779b5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\9a710813-ff5e-4e5d-b811-cdf96dce5227
Filesize982B
MD54308ea3159b0b35850abf23cb452139c
SHA1e1875f25f5c60443565fb3d30d426f0bd63303d0
SHA25695b8638d51395f1771d2a984e9983e34e12bf05aeb003d0d528482e872ac3ac6
SHA512843ca173d18087f71d1ada0b5a707ca08da596acbc3cc4321dbd8756ccf3dc2318c3df895cd412b3d73f1b08640b74824b7cb04455302ad52a10058acfb2635a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\b5f00602-6fd8-49f1-8051-4cadb274446e
Filesize671B
MD5297ebe06a407679435a7ed1dae127e1e
SHA1c47a84d0d695225a2a36761ca37bc367eb9f1a6e
SHA2567e33d45c2ffa8aeb619b64baccb1d8a9f924441ffa1ffc30b95242d48fb215f1
SHA5128e6f6216223d18d94fb05d46d05962a8bd25c3c1f8288082f5c3d08900087e9f09643951ae8d3ddc76adcc20cb9a5abfa531b1de751a79a2acbc5a7a26dabff8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
11KB
MD5dab5bccc021eefd7a8abe38b39d8e061
SHA1deddef73ea23cf29fdf15ccfeba05661a9d09eaa
SHA256f1e1934d1640676df6936713416796a619bbbb171aa63524c59e70009e962800
SHA512d1a4dca6f5b6c9b4622e7d16cf50f909c5ad578596fe93ead6e306dffe88befa600dc12a2f9ba72f56e448bc89bf1b4fc821d12ac84729248015d69ab531fe75
-
Filesize
16KB
MD58f30b31e40c276a03cf586b6abc6648f
SHA12acaff0af67d5837ec4377994af48a1078877002
SHA2562484dd079355f1030d2c32b33171ee8d7d3ca21c478ae769131470772230f119
SHA5128935f65c9c978578bd16e17a1c2ad02bd27f1206443d2c1e2b1e53e6aa642e169523ca0951bf00a2f9e358f57ba74b0455e099e0812801808ed9ac45cfb7fd1c
-
Filesize
11KB
MD52f60f7749d4469806f3319f27cb6505d
SHA1f80b9fcfc5df5dc3ed7ea5a78017d16957274ae5
SHA256e5f04fdc5fa51d661bddfd88aa2fd762ba3ee701422e84976aafb6fca4ccea45
SHA512fa020aa4d7e87c1d466d47643ca064df50b5769190af7ccbcfb52c093f52c114851ae9a171366c4dbbeedeb59ce1928256c7df57123ca8939499101ee6b17e67
-
Filesize
10KB
MD54748b36ec7aa8d24e5dd5d6d2beddaf1
SHA1e387e98f3b9cf54adf7e92c67d45374101c960b9
SHA256f9b4ce869a84c4b8562f3e763e499931c6c05ee4ee1b24e4dbbd1037a59af41f
SHA51273380eb3a5aff5e8ff806cc2d5bd37f2a978309e3b62bdbf477e7b435815a41cfaefb7eb2ea58207077ea0992dc2ea3771242a1b0d531ea6ee47625c50d9632c