Analysis
-
max time kernel
112s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2024 15:08
Static task
static1
Behavioral task
behavioral1
Sample
2f66b770e77265722c0de698db8c61e8dcb8c8883100a9f16f5d4b92067c1667N.exe
Resource
win7-20241010-en
General
-
Target
2f66b770e77265722c0de698db8c61e8dcb8c8883100a9f16f5d4b92067c1667N.exe
-
Size
1.9MB
-
MD5
15e30b215f9ffa75cb1b5286ab26b6d0
-
SHA1
80b925698720de26222a4d7415d7a3fd711168e6
-
SHA256
2f66b770e77265722c0de698db8c61e8dcb8c8883100a9f16f5d4b92067c1667
-
SHA512
07671ee48bcad3227533758762185fbc7e2368eebd1466360946679cb0a47ce62c0f9b8fbc4c0f06b293bf539b9cf46d82f1b12821b4f0e1f218f61464153311
-
SSDEEP
49152:SYoLk1jvI12b/7453Q6eRjtw4Vp3D7ZIETY9Axyh7r:9nIz3xKjW4uETY9AY5
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://powerful-avoids.sbs
https://motion-treesz.sbs
https://disobey-curly.sbs
https://leg-sate-boat.sbs
https://story-tense-faz.sbs
https://blade-govern.sbs
https://occupy-blushi.sbs
https://frogs-severz.sbs
https://push-hook.cyou
https://property-imper.sbs
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://push-hook.cyou/api
https://occupy-blushi.sbs/api
https://blade-govern.sbs/api
https://story-tense-faz.sbs/api
https://disobey-curly.sbs/api
https://motion-treesz.sbs/api
https://powerful-avoids.sbs/api
Signatures
-
Amadey family
-
Lumma family
-
Processes:
1a38779201.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 1a38779201.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 1a38779201.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 1a38779201.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 1a38779201.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 1a38779201.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 1a38779201.exe -
Stealc family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
AddInProcess32.exedescription pid Process procid_target PID 5668 created 2568 5668 AddInProcess32.exe 44 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
Processes:
skotes.exeskotes.exe2f66b770e77265722c0de698db8c61e8dcb8c8883100a9f16f5d4b92067c1667N.exeskotes.exe401160669a.exe68e4b58c76.exe1a38779201.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2f66b770e77265722c0de698db8c61e8dcb8c8883100a9f16f5d4b92067c1667N.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 401160669a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 68e4b58c76.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1a38779201.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
skotes.exeskotes.exeskotes.exe2f66b770e77265722c0de698db8c61e8dcb8c8883100a9f16f5d4b92067c1667N.exe401160669a.exe68e4b58c76.exe1a38779201.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2f66b770e77265722c0de698db8c61e8dcb8c8883100a9f16f5d4b92067c1667N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 401160669a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 68e4b58c76.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2f66b770e77265722c0de698db8c61e8dcb8c8883100a9f16f5d4b92067c1667N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 401160669a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 68e4b58c76.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1a38779201.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1a38779201.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
2f66b770e77265722c0de698db8c61e8dcb8c8883100a9f16f5d4b92067c1667N.exeskotes.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 2f66b770e77265722c0de698db8c61e8dcb8c8883100a9f16f5d4b92067c1667N.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 13 IoCs
Processes:
skotes.exex4lburt.execomputerlead.exevg9qcBa.exevg9qcBa.exeDPQSEDd.exeDPQSEDd.exe401160669a.exe68e4b58c76.exe10e50a21db.exe1a38779201.exeskotes.exeskotes.exepid Process 5084 skotes.exe 1944 x4lburt.exe 2720 computerlead.exe 4772 vg9qcBa.exe 2492 vg9qcBa.exe 840 DPQSEDd.exe 2512 DPQSEDd.exe 3448 401160669a.exe 4536 68e4b58c76.exe 764 10e50a21db.exe 2916 1a38779201.exe 5140 skotes.exe 4892 skotes.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
skotes.exe401160669a.exe68e4b58c76.exe1a38779201.exeskotes.exeskotes.exe2f66b770e77265722c0de698db8c61e8dcb8c8883100a9f16f5d4b92067c1667N.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 401160669a.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 68e4b58c76.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 1a38779201.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 2f66b770e77265722c0de698db8c61e8dcb8c8883100a9f16f5d4b92067c1667N.exe -
Processes:
1a38779201.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 1a38779201.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 1a38779201.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
skotes.exex4lburt.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\10e50a21db.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009316001\\10e50a21db.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\1a38779201.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009317001\\1a38779201.exe" skotes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" x4lburt.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\401160669a.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009314001\\401160669a.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\68e4b58c76.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009315001\\68e4b58c76.exe" skotes.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/files/0x0007000000023ca0-128.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
Processes:
2f66b770e77265722c0de698db8c61e8dcb8c8883100a9f16f5d4b92067c1667N.exeskotes.exe401160669a.exe68e4b58c76.exe1a38779201.exeskotes.exeskotes.exepid Process 1536 2f66b770e77265722c0de698db8c61e8dcb8c8883100a9f16f5d4b92067c1667N.exe 5084 skotes.exe 3448 401160669a.exe 4536 68e4b58c76.exe 2916 1a38779201.exe 5140 skotes.exe 4892 skotes.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
vg9qcBa.exeDPQSEDd.execomputerlead.exedescription pid Process procid_target PID 4772 set thread context of 2492 4772 vg9qcBa.exe 95 PID 840 set thread context of 2512 840 DPQSEDd.exe 103 PID 2720 set thread context of 5668 2720 computerlead.exe 134 -
Drops file in Windows directory 1 IoCs
Processes:
2f66b770e77265722c0de698db8c61e8dcb8c8883100a9f16f5d4b92067c1667N.exedescription ioc Process File created C:\Windows\Tasks\skotes.job 2f66b770e77265722c0de698db8c61e8dcb8c8883100a9f16f5d4b92067c1667N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 4280 5668 WerFault.exe 134 -
System Location Discovery: System Language Discovery 1 TTPs 18 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
taskkill.exeskotes.exevg9qcBa.exeDPQSEDd.exetaskkill.exetaskkill.exe10e50a21db.exetaskkill.exe1a38779201.exeAddInProcess32.execomputerlead.exefontdrvhost.exetaskkill.exe2f66b770e77265722c0de698db8c61e8dcb8c8883100a9f16f5d4b92067c1667N.exevg9qcBa.exeDPQSEDd.exe401160669a.exe68e4b58c76.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vg9qcBa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DPQSEDd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 10e50a21db.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1a38779201.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language computerlead.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fontdrvhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2f66b770e77265722c0de698db8c61e8dcb8c8883100a9f16f5d4b92067c1667N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vg9qcBa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DPQSEDd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 401160669a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 68e4b58c76.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exefirefox.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Kills process with taskkill 5 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid Process 4232 taskkill.exe 1672 taskkill.exe 876 taskkill.exe 3304 taskkill.exe 4624 taskkill.exe -
Modifies registry class 1 IoCs
Processes:
firefox.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
Processes:
2f66b770e77265722c0de698db8c61e8dcb8c8883100a9f16f5d4b92067c1667N.exeskotes.execomputerlead.exe401160669a.exe68e4b58c76.exe10e50a21db.exe1a38779201.exeskotes.exeAddInProcess32.exefontdrvhost.exeskotes.exepid Process 1536 2f66b770e77265722c0de698db8c61e8dcb8c8883100a9f16f5d4b92067c1667N.exe 1536 2f66b770e77265722c0de698db8c61e8dcb8c8883100a9f16f5d4b92067c1667N.exe 5084 skotes.exe 5084 skotes.exe 2720 computerlead.exe 2720 computerlead.exe 2720 computerlead.exe 3448 401160669a.exe 3448 401160669a.exe 4536 68e4b58c76.exe 4536 68e4b58c76.exe 764 10e50a21db.exe 764 10e50a21db.exe 764 10e50a21db.exe 764 10e50a21db.exe 2916 1a38779201.exe 2916 1a38779201.exe 2916 1a38779201.exe 2916 1a38779201.exe 2916 1a38779201.exe 5140 skotes.exe 5140 skotes.exe 5668 AddInProcess32.exe 5668 AddInProcess32.exe 5668 AddInProcess32.exe 5668 AddInProcess32.exe 2052 fontdrvhost.exe 2052 fontdrvhost.exe 2052 fontdrvhost.exe 2052 fontdrvhost.exe 4892 skotes.exe 4892 skotes.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
Processes:
computerlead.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exefirefox.exe1a38779201.exedescription pid Process Token: SeDebugPrivilege 2720 computerlead.exe Token: SeDebugPrivilege 4624 taskkill.exe Token: SeDebugPrivilege 4232 taskkill.exe Token: SeDebugPrivilege 1672 taskkill.exe Token: SeDebugPrivilege 876 taskkill.exe Token: SeDebugPrivilege 3304 taskkill.exe Token: SeDebugPrivilege 4236 firefox.exe Token: SeDebugPrivilege 4236 firefox.exe Token: SeDebugPrivilege 2916 1a38779201.exe -
Suspicious use of FindShellTrayWindow 32 IoCs
Processes:
2f66b770e77265722c0de698db8c61e8dcb8c8883100a9f16f5d4b92067c1667N.exe10e50a21db.exefirefox.exepid Process 1536 2f66b770e77265722c0de698db8c61e8dcb8c8883100a9f16f5d4b92067c1667N.exe 764 10e50a21db.exe 764 10e50a21db.exe 764 10e50a21db.exe 764 10e50a21db.exe 764 10e50a21db.exe 764 10e50a21db.exe 4236 firefox.exe 4236 firefox.exe 4236 firefox.exe 4236 firefox.exe 4236 firefox.exe 4236 firefox.exe 4236 firefox.exe 4236 firefox.exe 4236 firefox.exe 4236 firefox.exe 4236 firefox.exe 4236 firefox.exe 4236 firefox.exe 4236 firefox.exe 4236 firefox.exe 4236 firefox.exe 4236 firefox.exe 4236 firefox.exe 4236 firefox.exe 4236 firefox.exe 4236 firefox.exe 764 10e50a21db.exe 764 10e50a21db.exe 764 10e50a21db.exe 764 10e50a21db.exe -
Suspicious use of SendNotifyMessage 30 IoCs
Processes:
10e50a21db.exefirefox.exepid Process 764 10e50a21db.exe 764 10e50a21db.exe 764 10e50a21db.exe 764 10e50a21db.exe 764 10e50a21db.exe 764 10e50a21db.exe 4236 firefox.exe 4236 firefox.exe 4236 firefox.exe 4236 firefox.exe 4236 firefox.exe 4236 firefox.exe 4236 firefox.exe 4236 firefox.exe 4236 firefox.exe 4236 firefox.exe 4236 firefox.exe 4236 firefox.exe 4236 firefox.exe 4236 firefox.exe 4236 firefox.exe 4236 firefox.exe 4236 firefox.exe 4236 firefox.exe 4236 firefox.exe 4236 firefox.exe 764 10e50a21db.exe 764 10e50a21db.exe 764 10e50a21db.exe 764 10e50a21db.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
firefox.exepid Process 4236 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2f66b770e77265722c0de698db8c61e8dcb8c8883100a9f16f5d4b92067c1667N.exeskotes.exex4lburt.exevg9qcBa.exeDPQSEDd.exe10e50a21db.exefirefox.exedescription pid Process procid_target PID 1536 wrote to memory of 5084 1536 2f66b770e77265722c0de698db8c61e8dcb8c8883100a9f16f5d4b92067c1667N.exe 82 PID 1536 wrote to memory of 5084 1536 2f66b770e77265722c0de698db8c61e8dcb8c8883100a9f16f5d4b92067c1667N.exe 82 PID 1536 wrote to memory of 5084 1536 2f66b770e77265722c0de698db8c61e8dcb8c8883100a9f16f5d4b92067c1667N.exe 82 PID 5084 wrote to memory of 1944 5084 skotes.exe 89 PID 5084 wrote to memory of 1944 5084 skotes.exe 89 PID 1944 wrote to memory of 2720 1944 x4lburt.exe 90 PID 1944 wrote to memory of 2720 1944 x4lburt.exe 90 PID 1944 wrote to memory of 2720 1944 x4lburt.exe 90 PID 5084 wrote to memory of 4772 5084 skotes.exe 93 PID 5084 wrote to memory of 4772 5084 skotes.exe 93 PID 5084 wrote to memory of 4772 5084 skotes.exe 93 PID 4772 wrote to memory of 2492 4772 vg9qcBa.exe 95 PID 4772 wrote to memory of 2492 4772 vg9qcBa.exe 95 PID 4772 wrote to memory of 2492 4772 vg9qcBa.exe 95 PID 4772 wrote to memory of 2492 4772 vg9qcBa.exe 95 PID 4772 wrote to memory of 2492 4772 vg9qcBa.exe 95 PID 4772 wrote to memory of 2492 4772 vg9qcBa.exe 95 PID 4772 wrote to memory of 2492 4772 vg9qcBa.exe 95 PID 4772 wrote to memory of 2492 4772 vg9qcBa.exe 95 PID 4772 wrote to memory of 2492 4772 vg9qcBa.exe 95 PID 4772 wrote to memory of 2492 4772 vg9qcBa.exe 95 PID 5084 wrote to memory of 840 5084 skotes.exe 101 PID 5084 wrote to memory of 840 5084 skotes.exe 101 PID 5084 wrote to memory of 840 5084 skotes.exe 101 PID 840 wrote to memory of 2512 840 DPQSEDd.exe 103 PID 840 wrote to memory of 2512 840 DPQSEDd.exe 103 PID 840 wrote to memory of 2512 840 DPQSEDd.exe 103 PID 840 wrote to memory of 2512 840 DPQSEDd.exe 103 PID 840 wrote to memory of 2512 840 DPQSEDd.exe 103 PID 840 wrote to memory of 2512 840 DPQSEDd.exe 103 PID 840 wrote to memory of 2512 840 DPQSEDd.exe 103 PID 840 wrote to memory of 2512 840 DPQSEDd.exe 103 PID 840 wrote to memory of 2512 840 DPQSEDd.exe 103 PID 840 wrote to memory of 2512 840 DPQSEDd.exe 103 PID 5084 wrote to memory of 3448 5084 skotes.exe 105 PID 5084 wrote to memory of 3448 5084 skotes.exe 105 PID 5084 wrote to memory of 3448 5084 skotes.exe 105 PID 5084 wrote to memory of 4536 5084 skotes.exe 107 PID 5084 wrote to memory of 4536 5084 skotes.exe 107 PID 5084 wrote to memory of 4536 5084 skotes.exe 107 PID 5084 wrote to memory of 764 5084 skotes.exe 108 PID 5084 wrote to memory of 764 5084 skotes.exe 108 PID 5084 wrote to memory of 764 5084 skotes.exe 108 PID 764 wrote to memory of 4624 764 10e50a21db.exe 109 PID 764 wrote to memory of 4624 764 10e50a21db.exe 109 PID 764 wrote to memory of 4624 764 10e50a21db.exe 109 PID 764 wrote to memory of 4232 764 10e50a21db.exe 111 PID 764 wrote to memory of 4232 764 10e50a21db.exe 111 PID 764 wrote to memory of 4232 764 10e50a21db.exe 111 PID 764 wrote to memory of 1672 764 10e50a21db.exe 113 PID 764 wrote to memory of 1672 764 10e50a21db.exe 113 PID 764 wrote to memory of 1672 764 10e50a21db.exe 113 PID 764 wrote to memory of 876 764 10e50a21db.exe 115 PID 764 wrote to memory of 876 764 10e50a21db.exe 115 PID 764 wrote to memory of 876 764 10e50a21db.exe 115 PID 764 wrote to memory of 3304 764 10e50a21db.exe 117 PID 764 wrote to memory of 3304 764 10e50a21db.exe 117 PID 764 wrote to memory of 3304 764 10e50a21db.exe 117 PID 764 wrote to memory of 4436 764 10e50a21db.exe 119 PID 764 wrote to memory of 4436 764 10e50a21db.exe 119 PID 4436 wrote to memory of 4236 4436 firefox.exe 120 PID 4436 wrote to memory of 4236 4436 firefox.exe 120 PID 4436 wrote to memory of 4236 4436 firefox.exe 120 PID 4436 wrote to memory of 4236 4436 firefox.exe 120 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2568
-
C:\Windows\SysWOW64\fontdrvhost.exe"C:\Windows\System32\fontdrvhost.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2052
-
-
C:\Users\Admin\AppData\Local\Temp\2f66b770e77265722c0de698db8c61e8dcb8c8883100a9f16f5d4b92067c1667N.exe"C:\Users\Admin\AppData\Local\Temp\2f66b770e77265722c0de698db8c61e8dcb8c8883100a9f16f5d4b92067c1667N.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\1009118001\x4lburt.exe"C:\Users\Admin\AppData\Local\Temp\1009118001\x4lburt.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\computerlead.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\computerlead.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2720 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"5⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5668 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5668 -s 2926⤵
- Program crash
PID:4280
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009238001\vg9qcBa.exe"C:\Users\Admin\AppData\Local\Temp\1009238001\vg9qcBa.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Users\Admin\AppData\Local\Temp\1009238001\vg9qcBa.exe"C:\Users\Admin\AppData\Local\Temp\1009238001\vg9qcBa.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2492
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009278001\DPQSEDd.exe"C:\Users\Admin\AppData\Local\Temp\1009278001\DPQSEDd.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Users\Admin\AppData\Local\Temp\1009278001\DPQSEDd.exe"C:\Users\Admin\AppData\Local\Temp\1009278001\DPQSEDd.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2512
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009314001\401160669a.exe"C:\Users\Admin\AppData\Local\Temp\1009314001\401160669a.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3448
-
-
C:\Users\Admin\AppData\Local\Temp\1009315001\68e4b58c76.exe"C:\Users\Admin\AppData\Local\Temp\1009315001\68e4b58c76.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4536
-
-
C:\Users\Admin\AppData\Local\Temp\1009316001\10e50a21db.exe"C:\Users\Admin\AppData\Local\Temp\1009316001\10e50a21db.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4624
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4232
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1672
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:876
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3304
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4236 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2028 -parentBuildID 20240401114208 -prefsHandle 1956 -prefMapHandle 1948 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {f911d735-3377-4f4c-b479-2a526d0c151d} 4236 "\\.\pipe\gecko-crash-server-pipe.4236" gpu6⤵PID:3092
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2448 -parentBuildID 20240401114208 -prefsHandle 2440 -prefMapHandle 2396 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8142cc8e-76fb-4c3d-88d9-2da6006b8a68} 4236 "\\.\pipe\gecko-crash-server-pipe.4236" socket6⤵PID:3392
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3080 -childID 1 -isForBrowser -prefsHandle 3068 -prefMapHandle 3028 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {464178a1-668b-4d0e-9ad9-36b57c9ecdb3} 4236 "\\.\pipe\gecko-crash-server-pipe.4236" tab6⤵PID:4808
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3892 -childID 2 -isForBrowser -prefsHandle 3884 -prefMapHandle 912 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f8cf7442-b145-4928-bd53-0fa8ea4c0b42} 4236 "\\.\pipe\gecko-crash-server-pipe.4236" tab6⤵PID:3592
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4528 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4544 -prefMapHandle 4540 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f24004a4-cd38-4071-baca-04e9e85ce3dc} 4236 "\\.\pipe\gecko-crash-server-pipe.4236" utility6⤵
- Checks processor information in registry
PID:5208
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5632 -childID 3 -isForBrowser -prefsHandle 5660 -prefMapHandle 5656 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6f1197e1-9c64-4d31-8ce9-6caa3ede1226} 4236 "\\.\pipe\gecko-crash-server-pipe.4236" tab6⤵PID:4100
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5776 -childID 4 -isForBrowser -prefsHandle 5852 -prefMapHandle 5848 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {53b56240-c406-4fec-b03a-fd48fa7d9557} 4236 "\\.\pipe\gecko-crash-server-pipe.4236" tab6⤵PID:1500
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5852 -childID 5 -isForBrowser -prefsHandle 6020 -prefMapHandle 5964 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3b0819c1-d77b-4ed6-86b7-a731bd44a46b} 4236 "\\.\pipe\gecko-crash-server-pipe.4236" tab6⤵PID:4016
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009317001\1a38779201.exe"C:\Users\Admin\AppData\Local\Temp\1009317001\1a38779201.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2916
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5140
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 5668 -ip 56681⤵PID:5244
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4892
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\activity-stream.discovery_stream.json
Filesize19KB
MD582deb1b915e3ecac44965a5f0bc3ad69
SHA1ad53741aa1b9ad91308abd631ff23ce51f55f4c7
SHA256327c0badd79ea51f268aab0fb769a7d30872da2232a4c1a546e85c50f3e3ad45
SHA512aabd99732aaa5000b56b785677e44d4faf7a8b9a8eba8bf7280d0e96719a2e317a10a80f6060132f1adb440a0e35b12e617c614c64e8c13dac4f49fee9c5bbfc
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD5f43997cdc61d284bae5c077f80eee8dd
SHA103f43ec2c1012c717278c7b11f6e5464d710b68c
SHA256cbd372ff0ea5e605f1396811618844b6e0c7f50adef6c059e7eb8ee9e3aacbee
SHA512768442d80422adc6cfa8ef154702398269645448cbb486335ade486c8c2081d7d89ce620fe908474260184157307ddcaa6f4502d37130cad6891e26ce9c8547d
-
Filesize
932KB
MD596a7b754ca8e8f35ae9e2b88b9f25658
SHA1ed24a27a726b87c1d5bf1da60527e5801603bb8e
SHA25621d262741b3661b4bf1569f744dc5b5e6119cfa4f0748b9c0fa240f75442cc50
SHA512facb2e44f5a506349710e9b2d29f6664357d057444a6bd994cf3901dee7bea471247b47496cc4480f1ad2fac4b1867117072ea7a0bfa83d55ced4e00dda96745
-
Filesize
460KB
MD520160349422aeb131ed9da71a82eb7ab
SHA1bb01e4225a1e1797c9b5858d0edf063d5f8bc44f
SHA256d8f6ce51eba058276c4722747655b68711682afc5654414e8c195ada38fdc0ea
SHA512907f3f61ac9ebeda534b3a330fd8673e8d09b243847b6a7a8d8d30f74ba8c699eafb8338a8d4f36824871609c1f226cb4db1e4a931fdf312f0e4331e7110c6b8
-
Filesize
458KB
MD5666df1d57e2a047b9edc5a7ad3525ea0
SHA192b4144346f873d5afc2e528f914afa6c7323fef
SHA256fcff3ae0e71747322f9c628736788ceb419c9f04bdfa8a5bdb3a628e8d91af6e
SHA5123a114e0c3412c8396f40191ebc24d44733f8ebf35b72ad3a4ed26691174de5292fe4213b72d1034262ff16616d5cf01703058a61c4a578773d16f728db082b1d
-
Filesize
1.8MB
MD5eebcc9dcc7640b92a0939d1cc2449160
SHA12993ca642310a1c6b4f72fef7093aae28eafed53
SHA25634df64b26f3c69ef710eb56dd0204eaf3c4e083c74c038265a81700e7d07e459
SHA5121dc304eee1204367af8e33e5338758ac397a015a6eb8a77d9731b20017a7b08c63058281e08d4dcdab7e5ea0984ec7cdc1d4f3bd5a08d46e2c8ae97b9ef99e08
-
Filesize
1.7MB
MD564b338585dbfa03abd0d056c668375ba
SHA1ecf60ae902b85e5e68a913774ab2cf2d300c507e
SHA256d7437cf57a90ada56742dbc193145939cc53cc9acad092ddd080b5fb183601a4
SHA51243a6408444313f20c69d771945578eef3eaecd80533529a5b2d94c66f8a840cbbb3bad26b22d23a2b68d1a0a5bd95a09737b2f7db505484535eef718021e63a7
-
Filesize
900KB
MD5ac41cf28659caae22b160a1c07b221ee
SHA1b3c2808236f16d7112feb27741b3148c8736913c
SHA2569746111f4e793e87a571bf778c8f9ce365e2044fd8257bdb6584eff2937050c9
SHA512587b9c7f4c87923e5774969fc35de4aec2240add6fd46f90ee97126c64808d868c26027f36a41e2ba8fc07a8530a207d3efb9f79308fb8535daae5f07c9a1b45
-
Filesize
2.7MB
MD51565dcdf39bddfb22608cff777bb7516
SHA138b01cc35643883a67634f280eb18d0813ae2f4a
SHA256b4c16b750b3f578ac3dcb03ab0c885adbe2213d56bef1bbd38bd6ea33c975513
SHA512759c4a702d20ef438d7a61a26167ffb4e2b91f911b02001b4e92a8794782c87de82a107c6210f3c2c6d0feee0f73ce3d4d40861189cc5c3eef4a1db2f1e0d51b
-
Filesize
1.1MB
MD52354e800eefc681a7d60f3b6b28acfd9
SHA110b6a3d9d2283b5f98c9924fa1fca6da79edb720
SHA256d3c21f6c3892f0c444ffb4b06f962caddf68d2c3938bbd399a3056db255007e3
SHA5120395737b77891d8cf7761266c2b3d594deb8e742bd5f12f15f58b2c161c242356b953ebf8cd1f41924a917b2c1332bd2e05ef275efd2419a6134a60729195354
-
Filesize
1.9MB
MD515e30b215f9ffa75cb1b5286ab26b6d0
SHA180b925698720de26222a4d7415d7a3fd711168e6
SHA2562f66b770e77265722c0de698db8c61e8dcb8c8883100a9f16f5d4b92067c1667
SHA51207671ee48bcad3227533758762185fbc7e2368eebd1466360946679cb0a47ce62c0f9b8fbc4c0f06b293bf539b9cf46d82f1b12821b4f0e1f218f61464153311
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\AlternateServices.bin
Filesize6KB
MD5119812b72ae91b3ef5158d184d6f6a57
SHA18ad058ded0184e99be2d1d4d8c072db76dd133fb
SHA2565703f46815e4154cab1e77f99fafdefb37af898e2c39899ec08269bedaeb80fc
SHA512d12d5982af17dcc6dc8282a02f2c88f51883bda29e16a07c7f5fde109968fa6841c38bd31b02729d175672922249cbf30f8901a7828be04bca5c9d7c452a5e85
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\AlternateServices.bin
Filesize10KB
MD5c772b992d5c962a6b31caec6bf902635
SHA12bc2051ce97767c7754a62e315c18f5ce29868ca
SHA25641f00988c9dba001d39366a2bf85e7d741111c6783c98b6df12141fdc6f34e71
SHA512d911dea9a3938c6cd712c46a9531328efbfcfa02ab1643cdef4a3b21e4517ecbea2ef195e83c638b64c13bb4109e4f78d54af8b871cd4bed38734b050bb9886b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5309948b21e0935a714427f88676e0d4d
SHA1ac01cd3c2681411775b97a7474890aa922e4a678
SHA25694711e834418bbf86009dcf064ba564e7ba50b5b17d1d1b1b88bbe6cd2c7072f
SHA5127d158fa9383fd8241dd17c8d7bbce38345b80bf1ae84992874936cdb0719e57dd11639b11d69c7e947f4dac656796a69de072f8e0dd3e03dc21138084e58d76a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD59e1256fc21fa0e6a2c59a965ac286088
SHA120cb96319fd1cc4191afbf570498feb467300298
SHA25610318eac3846b64ccc57538fc7a91a6b5180909f03193f3194b495afa12f992e
SHA5122f2cee9ddf86964a8c0064ac999a02ac0c2b058799666d458a0d878451ef135a8f33e3303a5adefee4473c91fb001ce6dd72cc1c6220d49ba0eb48c7b442b794
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5ad999f7fe72c1796ddead5f6f91bc551
SHA13763c79a74281c85dfcba91b5a79e98a72c2555a
SHA25661b8d4a9d0feec753d985b5382a956640174489d20538b7f61d3a4c1a93da76c
SHA5129501786240d56b4c6775285c7c916b45fccc63fca438d52fa44cdb8aa180084d47084f5b01af86f345daca4514b07b6d2701f7f7c889db963646211f5ad6c66d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\b5f0b320-3557-497b-8b5b-0f925c7cd8e3
Filesize671B
MD5dbf88f93c8f384b7e29e3e022eeadf7a
SHA130d9ef31eb88ebea5655fcf09675e608a5515d79
SHA256999b5e16007e72285c3ddeb74ce874230de726e80c95b201d95c3b195559fd88
SHA5121bcf91137a41318fd836a1cc53693d9a65cfd16307d4f20469607a4cf4b157a78cda42ecbc581db1b29f5f6e4dc1d26840e64094cfb8cd36026df1d0e354de41
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\d02a5d5f-b52f-4dfa-a1b9-527f3a12db2c
Filesize25KB
MD59784dbcf85a3b6c61bd853645567dac3
SHA1c411331a54564f870aba7e4c39560aab2c7be2c4
SHA256b05f03a25657d9141d3ede172e69f47a2ff6676229da9e5a73098115bb1bfa45
SHA512948a844afc5200887e0d5770809b4396470938b4d8a51aacbc6d4faf646f37909a6fd33c48cd4fd45979ca1bf4dbe421f281d555433bc5fecac9d3ac31017280
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\de4c941f-851c-4ac0-ac80-c1056b41d6d2
Filesize982B
MD59ac7b465fb56ae086db4172ba50dd925
SHA11b2142ac39bc0d57221268432bf2169ef028d4de
SHA25669d7f62dd88e5f0a0b2dc61eb23a22f195d3ed7ee7435b34f4b1023a39c00371
SHA51211b04232a10f4c47b86fcbadf828347fdca5a6d1f55c81a82bb2189e8f8af84ce77ea806ead92be6677cf7536e814789fc1d7d3b5aae5cef91e15cca1a64c11a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD55b070b20afac28ff3929f2b90a1fdc44
SHA123d112a2b8ee25d0d566cd25fa4e0c7acbc98b30
SHA25663edc79ff973cc0abdac2054a9fda1b26c5621bc97391d44615306828c773913
SHA5125070110d0d73d5986f86dc610237077154d9cba2b0382c2b2835418240ad208c2109bae0b4843c31e0a390ee4408bcf94b6f046a78eb6d9d7016bec3e86ae2d4
-
Filesize
15KB
MD51a003f7eb59c9490fd167363b1f4b370
SHA18adbcaa6511189cedb91ddaccfd9e544d8d31983
SHA256429127dbe7132f3f46f0ba5bdaa5c62d0f79fad959a336a2d45664fa16d37b7b
SHA512106e34b292d8d374cc085041076bda16b14ef683481c83ed7b36c4ce7f8ec61afbbd189e3d804d397aa1df88f53094f4ed9aea19af3ab87b7a3f8fa4e638abaa
-
Filesize
10KB
MD57bbf3bbb8df4118be58e7004d7a3e8a3
SHA1e6e64f3c05d85b29dfda35032148ef5446b63d87
SHA2564db16e4ec153a950ccc7f6631e6b3af98299406faf292075aa479dc98470a9b5
SHA512524e85dc89dd4f433b20091fbd981fbd1e29a3547a7e4ba8e3df2829378435ede48c875d487b19c2bb224d0423b39cfedad11a2e57d65d2927c21448cfd245d5