Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2024 22:19
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20241010-en
General
-
Target
file.exe
-
Size
1.8MB
-
MD5
642a88e4846a4148e7a4bed5a1f988a2
-
SHA1
1e02b5843578247066ca9017b345ecb511bdc3ba
-
SHA256
7b98dd28b55e84671d52943a82b7919967c4c825ac6bd69c2dfdadfccb986747
-
SHA512
e82a2d6bd293de9775ab69a0ecbb68e152dd2c1c12ac324503351c942709599ea7741259903e3ad2f6532bf54f4328ef22d47aef3137465375bb585ff15564d3
-
SSDEEP
49152:8tuhGDlAAtP2OTwRY+n9EK74Mzmu3uEeKo6m:quEGY+n9EKGKo6m
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Cryptbot family
-
Detects CryptBot payload 1 IoCs
CryptBot is a C++ stealer distributed widely in bundle with other software.
resource yara_rule behavioral2/memory/5244-1991-0x0000000069CC0000-0x000000006A71B000-memory.dmp family_cryptbot_v3 -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 78a8c51928.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 78a8c51928.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 78a8c51928.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 78a8c51928.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 78a8c51928.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 78a8c51928.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Lumma55.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dfa2388867.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5f2a2f4a3b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3a59669062.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 78a8c51928.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 4676 chrome.exe 5968 chrome.exe 3320 chrome.exe 2300 chrome.exe -
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3a59669062.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5f2a2f4a3b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Lumma55.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dfa2388867.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3a59669062.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 78a8c51928.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Lumma55.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dfa2388867.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 78a8c51928.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5f2a2f4a3b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation file.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 5f2a2f4a3b.exe -
Executes dropped EXE 11 IoCs
pid Process 4336 skotes.exe 1604 Lumma55.exe 5020 dfa2388867.exe 1956 3a59669062.exe 3460 3c2a2149db.exe 5176 78a8c51928.exe 5244 5f2a2f4a3b.exe 3980 skotes.exe 1172 service123.exe 4948 skotes.exe 3244 service123.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine dfa2388867.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 5f2a2f4a3b.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine file.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine Lumma55.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 3a59669062.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 78a8c51928.exe -
Loads dropped DLL 2 IoCs
pid Process 1172 service123.exe 3244 service123.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 78a8c51928.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 78a8c51928.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dfa2388867.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008281001\\dfa2388867.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\3a59669062.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008282001\\3a59669062.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\3c2a2149db.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008283001\\3c2a2149db.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\78a8c51928.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008284001\\78a8c51928.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000a000000023b90-82.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 628 file.exe 4336 skotes.exe 1604 Lumma55.exe 5020 dfa2388867.exe 1956 3a59669062.exe 5176 78a8c51928.exe 5244 5f2a2f4a3b.exe 3980 skotes.exe 4948 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5588 5244 WerFault.exe 129 -
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3a59669062.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 78a8c51928.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5f2a2f4a3b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dfa2388867.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3c2a2149db.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lumma55.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 5f2a2f4a3b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 5f2a2f4a3b.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 5 IoCs
pid Process 4724 taskkill.exe 220 taskkill.exe 3084 taskkill.exe 4808 taskkill.exe 2764 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1040 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 628 file.exe 628 file.exe 4336 skotes.exe 4336 skotes.exe 1604 Lumma55.exe 1604 Lumma55.exe 5020 dfa2388867.exe 5020 dfa2388867.exe 1956 3a59669062.exe 1956 3a59669062.exe 3460 3c2a2149db.exe 3460 3c2a2149db.exe 5176 78a8c51928.exe 5176 78a8c51928.exe 3460 3c2a2149db.exe 3460 3c2a2149db.exe 5176 78a8c51928.exe 5176 78a8c51928.exe 5176 78a8c51928.exe 5244 5f2a2f4a3b.exe 5244 5f2a2f4a3b.exe 3980 skotes.exe 3980 skotes.exe 4676 chrome.exe 4676 chrome.exe 4948 skotes.exe 4948 skotes.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeDebugPrivilege 4724 taskkill.exe Token: SeDebugPrivilege 220 taskkill.exe Token: SeDebugPrivilege 3084 taskkill.exe Token: SeDebugPrivilege 4808 taskkill.exe Token: SeDebugPrivilege 2764 taskkill.exe Token: SeDebugPrivilege 5100 firefox.exe Token: SeDebugPrivilege 5100 firefox.exe Token: SeDebugPrivilege 5176 78a8c51928.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeDebugPrivilege 5100 firefox.exe Token: SeDebugPrivilege 5100 firefox.exe Token: SeDebugPrivilege 5100 firefox.exe -
Suspicious use of FindShellTrayWindow 59 IoCs
pid Process 628 file.exe 3460 3c2a2149db.exe 3460 3c2a2149db.exe 3460 3c2a2149db.exe 3460 3c2a2149db.exe 3460 3c2a2149db.exe 3460 3c2a2149db.exe 3460 3c2a2149db.exe 5100 firefox.exe 5100 firefox.exe 5100 firefox.exe 5100 firefox.exe 5100 firefox.exe 5100 firefox.exe 5100 firefox.exe 5100 firefox.exe 5100 firefox.exe 5100 firefox.exe 5100 firefox.exe 5100 firefox.exe 5100 firefox.exe 5100 firefox.exe 5100 firefox.exe 5100 firefox.exe 5100 firefox.exe 5100 firefox.exe 5100 firefox.exe 5100 firefox.exe 5100 firefox.exe 3460 3c2a2149db.exe 3460 3c2a2149db.exe 3460 3c2a2149db.exe 3460 3c2a2149db.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 3460 3c2a2149db.exe 3460 3c2a2149db.exe 3460 3c2a2149db.exe 3460 3c2a2149db.exe 3460 3c2a2149db.exe 3460 3c2a2149db.exe 3460 3c2a2149db.exe 5100 firefox.exe 5100 firefox.exe 5100 firefox.exe 5100 firefox.exe 5100 firefox.exe 5100 firefox.exe 5100 firefox.exe 5100 firefox.exe 5100 firefox.exe 5100 firefox.exe 5100 firefox.exe 5100 firefox.exe 5100 firefox.exe 5100 firefox.exe 5100 firefox.exe 5100 firefox.exe 5100 firefox.exe 5100 firefox.exe 5100 firefox.exe 5100 firefox.exe 3460 3c2a2149db.exe 3460 3c2a2149db.exe 3460 3c2a2149db.exe 3460 3c2a2149db.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5100 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 628 wrote to memory of 4336 628 file.exe 84 PID 628 wrote to memory of 4336 628 file.exe 84 PID 628 wrote to memory of 4336 628 file.exe 84 PID 4336 wrote to memory of 1604 4336 skotes.exe 92 PID 4336 wrote to memory of 1604 4336 skotes.exe 92 PID 4336 wrote to memory of 1604 4336 skotes.exe 92 PID 4336 wrote to memory of 5020 4336 skotes.exe 100 PID 4336 wrote to memory of 5020 4336 skotes.exe 100 PID 4336 wrote to memory of 5020 4336 skotes.exe 100 PID 4336 wrote to memory of 1956 4336 skotes.exe 102 PID 4336 wrote to memory of 1956 4336 skotes.exe 102 PID 4336 wrote to memory of 1956 4336 skotes.exe 102 PID 4336 wrote to memory of 3460 4336 skotes.exe 103 PID 4336 wrote to memory of 3460 4336 skotes.exe 103 PID 4336 wrote to memory of 3460 4336 skotes.exe 103 PID 3460 wrote to memory of 4724 3460 3c2a2149db.exe 104 PID 3460 wrote to memory of 4724 3460 3c2a2149db.exe 104 PID 3460 wrote to memory of 4724 3460 3c2a2149db.exe 104 PID 3460 wrote to memory of 220 3460 3c2a2149db.exe 106 PID 3460 wrote to memory of 220 3460 3c2a2149db.exe 106 PID 3460 wrote to memory of 220 3460 3c2a2149db.exe 106 PID 3460 wrote to memory of 3084 3460 3c2a2149db.exe 108 PID 3460 wrote to memory of 3084 3460 3c2a2149db.exe 108 PID 3460 wrote to memory of 3084 3460 3c2a2149db.exe 108 PID 3460 wrote to memory of 4808 3460 3c2a2149db.exe 110 PID 3460 wrote to memory of 4808 3460 3c2a2149db.exe 110 PID 3460 wrote to memory of 4808 3460 3c2a2149db.exe 110 PID 3460 wrote to memory of 2764 3460 3c2a2149db.exe 112 PID 3460 wrote to memory of 2764 3460 3c2a2149db.exe 112 PID 3460 wrote to memory of 2764 3460 3c2a2149db.exe 112 PID 3460 wrote to memory of 728 3460 3c2a2149db.exe 114 PID 3460 wrote to memory of 728 3460 3c2a2149db.exe 114 PID 728 wrote to memory of 5100 728 firefox.exe 115 PID 728 wrote to memory of 5100 728 firefox.exe 115 PID 728 wrote to memory of 5100 728 firefox.exe 115 PID 728 wrote to memory of 5100 728 firefox.exe 115 PID 728 wrote to memory of 5100 728 firefox.exe 115 PID 728 wrote to memory of 5100 728 firefox.exe 115 PID 728 wrote to memory of 5100 728 firefox.exe 115 PID 728 wrote to memory of 5100 728 firefox.exe 115 PID 728 wrote to memory of 5100 728 firefox.exe 115 PID 728 wrote to memory of 5100 728 firefox.exe 115 PID 728 wrote to memory of 5100 728 firefox.exe 115 PID 5100 wrote to memory of 4924 5100 firefox.exe 116 PID 5100 wrote to memory of 4924 5100 firefox.exe 116 PID 5100 wrote to memory of 4924 5100 firefox.exe 116 PID 5100 wrote to memory of 4924 5100 firefox.exe 116 PID 5100 wrote to memory of 4924 5100 firefox.exe 116 PID 5100 wrote to memory of 4924 5100 firefox.exe 116 PID 5100 wrote to memory of 4924 5100 firefox.exe 116 PID 5100 wrote to memory of 4924 5100 firefox.exe 116 PID 5100 wrote to memory of 4924 5100 firefox.exe 116 PID 5100 wrote to memory of 4924 5100 firefox.exe 116 PID 5100 wrote to memory of 4924 5100 firefox.exe 116 PID 5100 wrote to memory of 4924 5100 firefox.exe 116 PID 5100 wrote to memory of 4924 5100 firefox.exe 116 PID 5100 wrote to memory of 4924 5100 firefox.exe 116 PID 5100 wrote to memory of 4924 5100 firefox.exe 116 PID 5100 wrote to memory of 4924 5100 firefox.exe 116 PID 5100 wrote to memory of 4924 5100 firefox.exe 116 PID 5100 wrote to memory of 4924 5100 firefox.exe 116 PID 5100 wrote to memory of 4924 5100 firefox.exe 116 PID 5100 wrote to memory of 4924 5100 firefox.exe 116 PID 5100 wrote to memory of 4924 5100 firefox.exe 116 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Users\Admin\AppData\Local\Temp\1008276001\Lumma55.exe"C:\Users\Admin\AppData\Local\Temp\1008276001\Lumma55.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1604
-
-
C:\Users\Admin\AppData\Local\Temp\1008281001\dfa2388867.exe"C:\Users\Admin\AppData\Local\Temp\1008281001\dfa2388867.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5020
-
-
C:\Users\Admin\AppData\Local\Temp\1008282001\3a59669062.exe"C:\Users\Admin\AppData\Local\Temp\1008282001\3a59669062.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1956
-
-
C:\Users\Admin\AppData\Local\Temp\1008283001\3c2a2149db.exe"C:\Users\Admin\AppData\Local\Temp\1008283001\3c2a2149db.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4724
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:220
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3084
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4808
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2764
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:728 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1984 -parentBuildID 20240401114208 -prefsHandle 1912 -prefMapHandle 1904 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {3b8520c8-f557-4f10-9bac-a864b0828d38} 5100 "\\.\pipe\gecko-crash-server-pipe.5100" gpu6⤵PID:4924
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2420 -parentBuildID 20240401114208 -prefsHandle 2412 -prefMapHandle 2408 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {98237b17-eb27-4b6e-a704-8af3bc07b962} 5100 "\\.\pipe\gecko-crash-server-pipe.5100" socket6⤵PID:4812
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3228 -childID 1 -isForBrowser -prefsHandle 3192 -prefMapHandle 3260 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1128 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d310cc36-3183-4790-89c4-1642f88178da} 5100 "\\.\pipe\gecko-crash-server-pipe.5100" tab6⤵PID:1776
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1236 -childID 2 -isForBrowser -prefsHandle 3868 -prefMapHandle 3856 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1128 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {128e31fb-acbf-4714-ac57-a72f2170e676} 5100 "\\.\pipe\gecko-crash-server-pipe.5100" tab6⤵PID:540
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4656 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4676 -prefMapHandle 4672 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a5f077fd-f36d-4824-b478-60d5565d4939} 5100 "\\.\pipe\gecko-crash-server-pipe.5100" utility6⤵
- Checks processor information in registry
PID:3708
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5244 -childID 3 -isForBrowser -prefsHandle 5236 -prefMapHandle 5044 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1128 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4a6ea570-f5e6-42f1-9846-af9a7492232c} 5100 "\\.\pipe\gecko-crash-server-pipe.5100" tab6⤵PID:5788
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5416 -childID 4 -isForBrowser -prefsHandle 5276 -prefMapHandle 5032 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1128 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {53c03959-7060-4f5a-8342-02aee94f655e} 5100 "\\.\pipe\gecko-crash-server-pipe.5100" tab6⤵PID:5800
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5652 -childID 5 -isForBrowser -prefsHandle 5548 -prefMapHandle 5552 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1128 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {448e69cb-b711-4c7c-a5d8-26710f770643} 5100 "\\.\pipe\gecko-crash-server-pipe.5100" tab6⤵PID:5816
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1008284001\78a8c51928.exe"C:\Users\Admin\AppData\Local\Temp\1008284001\78a8c51928.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5176
-
-
C:\Users\Admin\AppData\Local\Temp\1008285001\5f2a2f4a3b.exe"C:\Users\Admin\AppData\Local\Temp\1008285001\5f2a2f4a3b.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:5244 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4676 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffeffcacc40,0x7ffeffcacc4c,0x7ffeffcacc585⤵PID:4720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2012,i,924903984296127186,13576251767405901154,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2008 /prefetch:25⤵PID:1896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1900,i,924903984296127186,13576251767405901154,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2020 /prefetch:35⤵PID:512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2272,i,924903984296127186,13576251767405901154,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2284 /prefetch:85⤵PID:5636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3148,i,924903984296127186,13576251767405901154,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3188 /prefetch:15⤵
- Uses browser remote debugging
PID:3320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3156,i,924903984296127186,13576251767405901154,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3216 /prefetch:15⤵
- Uses browser remote debugging
PID:5968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4484,i,924903984296127186,13576251767405901154,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4496 /prefetch:15⤵
- Uses browser remote debugging
PID:2300
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1172
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1040
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5244 -s 12764⤵
- Program crash
PID:5588
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3980
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:6036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 5244 -ip 52441⤵PID:4264
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4948
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3244
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a9f39008113a9408fdd581f8d9ac3274
SHA1b030633146020991d344cd9c2df0408895299a2f
SHA2568d1771c40447734ed29133d1d07368eb22bae98ff275a4772acc1e8308dcf2f6
SHA5121fd32b785f27a1b34f21c8ac3b4bac9a06357c935248bde0c4f109e0c6ad570be2f891f9ab6b8d7c398c1d35f4a679c385fcc3ecc2a4ba14b43f2f6655c777fb
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\activity-stream.discovery_stream.json
Filesize25KB
MD5d622636a5e8020b5a12e773290363dc5
SHA1c03cdb0ce9d2237a590c5d5d9bab18837b428dd2
SHA2567e5a5940bb5c71a8b2589bedf4ed73a60b8451c0c24c0ddcf1b78ae49cab62b3
SHA512e81ecf6768f8d1bf47817477832b1dd6f455d4175e284686c0d52ac8dde3c76d9946df2b3c9fa47a765a5801906b3f62c17d1550c1c403f27af8d7de15804366
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD5b004767bf012b66a49171a9d69d00e90
SHA13ed9986ca638a9b14212e72d062f87757b4e1bb1
SHA2561489cb692bda25a044b579f73ef13623f49e2f4a3db47767251d2ef2437c24c7
SHA5124363c5fa07b42f364ba720cd8e77f42fa6634c596a7c408bcd8307cea31375ca856ae552c87de3f0a275a4fa8306c31b2c2b25b829520c3b724d95e78f8002a6
-
Filesize
1.8MB
MD58d5f9df92d2fb9c40125d06c7e3c66be
SHA10e90f85e420a9231cefbf51d9cf6f9dddfb42aa7
SHA25632ffca83244f63bde5db2ae85aa691a68a2725199ffc4abbcbdab29b9fda8707
SHA51289c7c2269776d24f5dc109de9d3a072a87111bfa3cd7900882d7dc01e1ddc790534f4493e19898d02d8284ab80914641faec2acd735bbc5de44738f239fbe422
-
Filesize
1.8MB
MD528eec1f233fa603a73733f421f9f694c
SHA13060dd53aee77c2ab730e5d226f283583964ca21
SHA2568ce4d7610874498b34eab78b1859c8997397635f48c9621aaba8786251cb1acc
SHA5123dfb1f3565fe06db37e200314e40d4d66f7aaf3afd5b50b7813ce5b4a1b1b3750f2dd05e90124c5d2d38f6789013bf7cdaf9b6a9d807067328e75484945dac2d
-
Filesize
1.7MB
MD5e0907cecf84597ff5476178c7addd920
SHA1d8deb30212420bf1ef69199146d869cf5408e836
SHA25608dc99ba8da04f16d328f32f11c7721366ecfaafd04c21e7b3c0a3a2eb794dae
SHA5128c51b90d7aef29a5f3e7fe4410035fbdc876d4a4966e119cecdef672fa6abe652762faec5d214cd210ed9c185083718946a8434a0d0fe24a20ac9793339f1336
-
Filesize
901KB
MD50210208e406ea302650eab31b53b0899
SHA10ad8b1f35a09217afda13e206f97bd8a33b5202f
SHA256e6db06bcfcaf429031075ecec2b1e18238dd5410c99307ea8eb4839a45b01c02
SHA512854ce954545e299600bdee717d32f51a6ede40477a25c07dd3a2ffd2b9902bfd4bb9578de2a6d2cc8acce1198744a2d71bb638dd4b1c16723132d9a25b188af7
-
Filesize
2.6MB
MD510e805250d9b4f6094aeae0c93f4279a
SHA10e89ae4fcfd91571c37a5e059c07f02c64941dde
SHA2562f209c823b7ac5953201ab20d871bc8cb520f5ebb4e1dcc1595bc575d0b05753
SHA512fbbc0974e83c2eec00d4abb2a802126726bb76bc19eb6be4ef0f7f9aadbd029bf93e84856365f6ad9dad5d87fa39ecebf245ae4e6d7cbad08ae0029ce422f101
-
Filesize
4.2MB
MD5bc7728211118c8205e3e731e353be4eb
SHA158c807907f5384a26a02ee042e2a8ac779acec53
SHA256408c1e0d4128dd79da38e0685f991f260ed155a0c391dcea710b893c138fa65e
SHA5129da4b443fbda39f21c3dd896da5df4e9b601553ee2e8705ea998efa6e57cd24aee44109314c57a0771e705ad45fe607e71522d07402a9eb59f6d82c83eca1c2a
-
Filesize
1.8MB
MD5642a88e4846a4148e7a4bed5a1f988a2
SHA11e02b5843578247066ca9017b345ecb511bdc3ba
SHA2567b98dd28b55e84671d52943a82b7919967c4c825ac6bd69c2dfdadfccb986747
SHA512e82a2d6bd293de9775ab69a0ecbb68e152dd2c1c12ac324503351c942709599ea7741259903e3ad2f6532bf54f4328ef22d47aef3137465375bb585ff15564d3
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin
Filesize10KB
MD512219b4aaf9240bcc8439912243003b0
SHA12aac098c4b4e91a0dae4fa9f08dc0e773eadf242
SHA256babd01bf6e818ab6042e84002ee0f5816c655b67299b221550c245d9d58a90cc
SHA51281488f9ad79a086ff1a215fd94cde71216057fd207b4f0f20c4ecb520697f1e673807e14210432d5d5e3fbba8bfa9970fe75a3b485e9aa1e3f29047a0fc49feb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin
Filesize10KB
MD524e04db4ca1bb70a6caaca9c140e9aac
SHA144cdb4e5f57e3d2260a3d7494114337b50155bc6
SHA256831093766dbda8991d8358a7b5402d409bb68a7d1da5d4a97fea9c382b8323c0
SHA512153db33df09399336f2097213f268581f1d32a8ff0bdceb18e3e72aab8e74fe984d5bb74d6f4bf1c3a964f3fdbdc96aa2c56c90dc19da8f96b9d6068e7efa8a7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD57b3004d2a559fed3f7ff0191410dd14b
SHA1d11eea4552b2dd91e7adc7032df188f02b634507
SHA256a2b40dbaa250614ecdb42fdefb5516ff9b73e22a0a38429260575d6676900c12
SHA512d946baf776451a4145e7f84485ee2044cc0b56cd0454642918afbc3659660d9a484d2c95cb17097749a018fa98316049e3d05131e7d514283338785d81e711f8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD51d93d861f7761f1ec9950ef7b917d9cb
SHA1e62bcfa2482329f30e78db4b275ebc87f4de3f36
SHA256cf75d1cb25b58a8c508f1bcf95755bff2819d10e3b620f57024b2e5aeea09bbb
SHA5125c6fdc2c7048e56ffacdb6dfd426bb1a024898be8d2460260963660a13de2400135c36f4e996e4ad1d7664bf7ab6dce82affb7fa1c8536ae92f8421ab7970a2b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5030af9336640ed29e5a11c8a76156146
SHA12dff0af58b54e21365b44e575e4fd9569be621d9
SHA25660f0f5e22bbc73d9305a444ef34bacb8d156921192dbd3a1093985d766a6fa3d
SHA5127a949e47eaa2db246aac285c32e5bff7a94c898e415b481bb848be75f2159b85537a313962556490283eb3b22a086b90e657daa18b42a86a35dadbe0b8350201
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5d25c458621c7d3ffec2dee6c4c0a4f56
SHA1ae381fbbc0d375e6e19b3b396f5d9182ea60e506
SHA256313bc172b0a5e1d63841e703192b43f3e34fbf0e2d518f77d46f7e2040915c20
SHA5128567f1e098312c734c2324ece33fa94a027d031348aac4ab09366a276f8791b28436bbdc84437f31ffdf17fba50299bf98b432ad2488d72e9e262c2defecf8c4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD520521fb5a68d8227fea5108582704c30
SHA1b6cb470b2b80a80b67a9bf9d97f98ff62399be67
SHA256f4752946735c12d11c5681968301d14c13f17fea383378f4a8e03e0104625c4c
SHA512b97b4d5b0ce64b45a6153e8c657e1b90ca91815ae3052dd4de15d10ee8bdd6ff41f5895045fd39943447fc8ce72f13ccf392dfe886892ff4f3fdc05013fe5ece
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\3d9f06f8-3118-484b-9363-26bfc3af7b82
Filesize24KB
MD5da0733e1205a04b64680b227179973d2
SHA1ebaa700f9f6f0a8df2e5bd161f89170ec25193ad
SHA25606bf3fa434dcb533cdf528372dfc78f523e4e3505c2094d14a4d809da29af396
SHA5129a182733a1eaea090de185e54ab82dec5483b59220e965e7493215fdaaa85a7fdd811580d0a6a192691bd79dd51d539f13f29ead74a1b767809c47950d47a6a6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\48b82a4c-5585-4b9e-b941-0307a77ec8a1
Filesize982B
MD502aa2d9e4fca064fe2f6aa83ed888a61
SHA19a167b483706d593bdaa1da96d3bea12261c82cd
SHA2562d43ae6ce6761fc9ce0e2cc486dd8bd6684f0993dbbdc8f9744fd0bfa5bd7006
SHA512e2feb0b511f0366cb0fac150bd4c967962b9cf17edcb542ba40bdc4728b5626a6b61a7b3bd2e7dfd0056a0a9d8ccd2c39e6cf0d0f8a3f3418cd1febca988402c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\b7685596-14ab-484c-abb7-86ed63c83d29
Filesize671B
MD54952446b81d3d4bca9a3455505a62288
SHA1a862c85455323da91c3fb2761cddae90d7cda213
SHA2569463bb69dd4aab0e0868c50d269ed4766853ad83cd7646d3367dfdad6564c96a
SHA51207127466e4c74c4acf9524c7a4ab427604f123e9591d0d57701e4fd88b732b5a2a93636f2fae73e2375f28f091d893c1ebc31bb8b08b62967dfcb70e6fd0de5d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
15KB
MD5ce5cff777ffd38557d429d1815da9f8e
SHA1f1ad574d17d005b2b5c00dafd7b41cb9a69ea331
SHA256099d364f4b2470b969e63a86465fcf9c78fff548b37f94419701d01a9a67d4d4
SHA5129c08e416eae7fc2702b81bc4ddf4e394db90227876e7819636282edfe2f803aa50155782c4f64d0a1630d0b2dfe5cce734f4de70507e96142c53847fff2216c0
-
Filesize
10KB
MD5de86fb59a37cc5863ef064d3687add10
SHA1d7ec291b15f4014f2366e69ecb75712cb8e2ebea
SHA256d41b3b6a398ba3d4de7859e630cb31061fc4fc0db88dfa9c8accb27799ad4d67
SHA51248f3f76343df1387466ff5d6e510abb3a4de8159462b301c9b34ce0e50b6023f5761adae65cb9f8509ebcbd2b0e2d7590d56ea84161fc57151f7acfd7c92aebc
-
Filesize
10KB
MD579a3cf2a04092c3cffc9c0f0dd8cc291
SHA109dc614b2dbcf4ea0b0bc2db9fe7d67f51d391c8
SHA2565cd8da5383c691f5e650cfe87a74c288004117dde653abba1ae701b682b374a6
SHA512e87799b0eca710cf56270612ffe9b56937bcbb64d0f6a40f7d1dd4fa965b7f22c990a6cd9021caa7a1f128756dd42d29a2149c9dbcfbdbc563b29762ffeb0013
-
Filesize
11KB
MD54ad7c9a1e0cd6deaa538bd3f6e5e5167
SHA1a3c0f425e2a99fda566cb961c9ad4de4df4c83a7
SHA256beec9db352a6948ae3b2245253f3ac6e089435d7f22ac0688115da8ea3b459b1
SHA512a5049a47ae97f7f31d899b01552dcbcd66a56cf569ff3879999f58680b5f617a30cc6ff1465c46a4c6f51d867b20ea50853fa2a5965eff4f86d54de4db8ba8ef