Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2024 16:11
Static task
static1
Behavioral task
behavioral1
Sample
b6b60bd3ddc21ed2c937294489ac83897d4ebf48dd0fe899de5ea663ed76e2ca.exe
Resource
win7-20240903-en
General
-
Target
b6b60bd3ddc21ed2c937294489ac83897d4ebf48dd0fe899de5ea663ed76e2ca.exe
-
Size
1.8MB
-
MD5
0ddb99672f84838c7f3b1eb1e9225563
-
SHA1
de9e457953d0eae83e664d40833f02aa59341c25
-
SHA256
b6b60bd3ddc21ed2c937294489ac83897d4ebf48dd0fe899de5ea663ed76e2ca
-
SHA512
4f18fe2a151ebe958cffd15727d37712330a998328d4ad38d87c0c6479b95f9070dafbacc5e1ed4aec4796abab8f1fc61510df72dad13bc4e32518ea60c1f6dd
-
SSDEEP
49152:xXpvix0xI3ljvekDUdu1AM/dsF3GaNEc/p3Yx0:x5aexI3ljvnD+ueM1K3GuEme0
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://powerful-avoids.sbs
https://motion-treesz.sbs
https://disobey-curly.sbs
https://leg-sate-boat.sbs
https://story-tense-faz.sbs
https://blade-govern.sbs
https://occupy-blushi.sbs
https://frogs-severz.sbs
https://push-hook.cyou
https://property-imper.sbs
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://push-hook.cyou/api
https://blade-govern.sbs/api
https://story-tense-faz.sbs/api
https://disobey-curly.sbs/api
https://motion-treesz.sbs/api
https://powerful-avoids.sbs/api
Signatures
-
Amadey family
-
Lumma family
-
Processes:
255fa693f0.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 255fa693f0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 255fa693f0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 255fa693f0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 255fa693f0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 255fa693f0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 255fa693f0.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
Processes:
skotes.exeb6b60bd3ddc21ed2c937294489ac83897d4ebf48dd0fe899de5ea663ed76e2ca.exeskotes.exeskotes.exe6e8827e102.exe656db2e7c0.exe255fa693f0.exeskotes.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b6b60bd3ddc21ed2c937294489ac83897d4ebf48dd0fe899de5ea663ed76e2ca.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6e8827e102.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 656db2e7c0.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 255fa693f0.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
b6b60bd3ddc21ed2c937294489ac83897d4ebf48dd0fe899de5ea663ed76e2ca.exeskotes.exe656db2e7c0.exe6e8827e102.exe255fa693f0.exeskotes.exeskotes.exeskotes.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b6b60bd3ddc21ed2c937294489ac83897d4ebf48dd0fe899de5ea663ed76e2ca.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 656db2e7c0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6e8827e102.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 656db2e7c0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 255fa693f0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 255fa693f0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b6b60bd3ddc21ed2c937294489ac83897d4ebf48dd0fe899de5ea663ed76e2ca.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6e8827e102.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
b6b60bd3ddc21ed2c937294489ac83897d4ebf48dd0fe899de5ea663ed76e2ca.exeskotes.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation b6b60bd3ddc21ed2c937294489ac83897d4ebf48dd0fe899de5ea663ed76e2ca.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 12 IoCs
Processes:
skotes.exevg9qcBa.exevg9qcBa.exeDPQSEDd.exeDPQSEDd.exeskotes.exe6e8827e102.exe656db2e7c0.exe3a76a0191a.exe255fa693f0.exeskotes.exeskotes.exepid Process 4160 skotes.exe 4036 vg9qcBa.exe 852 vg9qcBa.exe 4668 DPQSEDd.exe 1924 DPQSEDd.exe 3016 skotes.exe 3316 6e8827e102.exe 1748 656db2e7c0.exe 5016 3a76a0191a.exe 2304 255fa693f0.exe 324 skotes.exe 696 skotes.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
skotes.exeskotes.exe6e8827e102.exe656db2e7c0.exe255fa693f0.exeskotes.exeskotes.exeb6b60bd3ddc21ed2c937294489ac83897d4ebf48dd0fe899de5ea663ed76e2ca.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 6e8827e102.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 656db2e7c0.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 255fa693f0.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine b6b60bd3ddc21ed2c937294489ac83897d4ebf48dd0fe899de5ea663ed76e2ca.exe -
Processes:
255fa693f0.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 255fa693f0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 255fa693f0.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
skotes.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\6e8827e102.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009322001\\6e8827e102.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\656db2e7c0.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009323001\\656db2e7c0.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\3a76a0191a.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009324001\\3a76a0191a.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\255fa693f0.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009325001\\255fa693f0.exe" skotes.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/files/0x0007000000023c9e-107.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
Processes:
b6b60bd3ddc21ed2c937294489ac83897d4ebf48dd0fe899de5ea663ed76e2ca.exeskotes.exeskotes.exe6e8827e102.exe656db2e7c0.exe255fa693f0.exeskotes.exeskotes.exepid Process 716 b6b60bd3ddc21ed2c937294489ac83897d4ebf48dd0fe899de5ea663ed76e2ca.exe 4160 skotes.exe 3016 skotes.exe 3316 6e8827e102.exe 1748 656db2e7c0.exe 2304 255fa693f0.exe 324 skotes.exe 696 skotes.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
vg9qcBa.exeDPQSEDd.exedescription pid Process procid_target PID 4036 set thread context of 852 4036 vg9qcBa.exe 94 PID 4668 set thread context of 1924 4668 DPQSEDd.exe 98 -
Drops file in Windows directory 1 IoCs
Processes:
b6b60bd3ddc21ed2c937294489ac83897d4ebf48dd0fe899de5ea663ed76e2ca.exedescription ioc Process File created C:\Windows\Tasks\skotes.job b6b60bd3ddc21ed2c937294489ac83897d4ebf48dd0fe899de5ea663ed76e2ca.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
vg9qcBa.exetaskkill.exetaskkill.exeb6b60bd3ddc21ed2c937294489ac83897d4ebf48dd0fe899de5ea663ed76e2ca.exevg9qcBa.exe6e8827e102.exetaskkill.exeDPQSEDd.exe656db2e7c0.exe3a76a0191a.exeskotes.exeDPQSEDd.exetaskkill.exetaskkill.exe255fa693f0.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vg9qcBa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b6b60bd3ddc21ed2c937294489ac83897d4ebf48dd0fe899de5ea663ed76e2ca.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vg9qcBa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6e8827e102.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DPQSEDd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 656db2e7c0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3a76a0191a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DPQSEDd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 255fa693f0.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exefirefox.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Kills process with taskkill 5 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid Process 2024 taskkill.exe 4688 taskkill.exe 3876 taskkill.exe 536 taskkill.exe 3992 taskkill.exe -
Modifies registry class 1 IoCs
Processes:
firefox.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
Processes:
b6b60bd3ddc21ed2c937294489ac83897d4ebf48dd0fe899de5ea663ed76e2ca.exeskotes.exeskotes.exe6e8827e102.exe656db2e7c0.exe3a76a0191a.exe255fa693f0.exeskotes.exeskotes.exepid Process 716 b6b60bd3ddc21ed2c937294489ac83897d4ebf48dd0fe899de5ea663ed76e2ca.exe 716 b6b60bd3ddc21ed2c937294489ac83897d4ebf48dd0fe899de5ea663ed76e2ca.exe 4160 skotes.exe 4160 skotes.exe 3016 skotes.exe 3016 skotes.exe 3316 6e8827e102.exe 3316 6e8827e102.exe 1748 656db2e7c0.exe 1748 656db2e7c0.exe 5016 3a76a0191a.exe 5016 3a76a0191a.exe 2304 255fa693f0.exe 2304 255fa693f0.exe 5016 3a76a0191a.exe 5016 3a76a0191a.exe 2304 255fa693f0.exe 2304 255fa693f0.exe 2304 255fa693f0.exe 324 skotes.exe 324 skotes.exe 696 skotes.exe 696 skotes.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exefirefox.exe255fa693f0.exedescription pid Process Token: SeDebugPrivilege 536 taskkill.exe Token: SeDebugPrivilege 3992 taskkill.exe Token: SeDebugPrivilege 2024 taskkill.exe Token: SeDebugPrivilege 4688 taskkill.exe Token: SeDebugPrivilege 3876 taskkill.exe Token: SeDebugPrivilege 3836 firefox.exe Token: SeDebugPrivilege 3836 firefox.exe Token: SeDebugPrivilege 2304 255fa693f0.exe Token: SeDebugPrivilege 3836 firefox.exe Token: SeDebugPrivilege 3836 firefox.exe Token: SeDebugPrivilege 3836 firefox.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
Processes:
b6b60bd3ddc21ed2c937294489ac83897d4ebf48dd0fe899de5ea663ed76e2ca.exe3a76a0191a.exefirefox.exepid Process 716 b6b60bd3ddc21ed2c937294489ac83897d4ebf48dd0fe899de5ea663ed76e2ca.exe 5016 3a76a0191a.exe 5016 3a76a0191a.exe 5016 3a76a0191a.exe 5016 3a76a0191a.exe 5016 3a76a0191a.exe 5016 3a76a0191a.exe 5016 3a76a0191a.exe 3836 firefox.exe 3836 firefox.exe 3836 firefox.exe 3836 firefox.exe 5016 3a76a0191a.exe 3836 firefox.exe 3836 firefox.exe 3836 firefox.exe 3836 firefox.exe 3836 firefox.exe 3836 firefox.exe 3836 firefox.exe 3836 firefox.exe 3836 firefox.exe 3836 firefox.exe 3836 firefox.exe 3836 firefox.exe 3836 firefox.exe 3836 firefox.exe 3836 firefox.exe 3836 firefox.exe 3836 firefox.exe 5016 3a76a0191a.exe 5016 3a76a0191a.exe 5016 3a76a0191a.exe -
Suspicious use of SendNotifyMessage 31 IoCs
Processes:
3a76a0191a.exefirefox.exepid Process 5016 3a76a0191a.exe 5016 3a76a0191a.exe 5016 3a76a0191a.exe 5016 3a76a0191a.exe 5016 3a76a0191a.exe 5016 3a76a0191a.exe 5016 3a76a0191a.exe 3836 firefox.exe 3836 firefox.exe 3836 firefox.exe 3836 firefox.exe 5016 3a76a0191a.exe 3836 firefox.exe 3836 firefox.exe 3836 firefox.exe 3836 firefox.exe 3836 firefox.exe 3836 firefox.exe 3836 firefox.exe 3836 firefox.exe 3836 firefox.exe 3836 firefox.exe 3836 firefox.exe 3836 firefox.exe 3836 firefox.exe 3836 firefox.exe 3836 firefox.exe 3836 firefox.exe 5016 3a76a0191a.exe 5016 3a76a0191a.exe 5016 3a76a0191a.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
firefox.exepid Process 3836 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
b6b60bd3ddc21ed2c937294489ac83897d4ebf48dd0fe899de5ea663ed76e2ca.exeskotes.exevg9qcBa.exeDPQSEDd.exe3a76a0191a.exefirefox.exedescription pid Process procid_target PID 716 wrote to memory of 4160 716 b6b60bd3ddc21ed2c937294489ac83897d4ebf48dd0fe899de5ea663ed76e2ca.exe 83 PID 716 wrote to memory of 4160 716 b6b60bd3ddc21ed2c937294489ac83897d4ebf48dd0fe899de5ea663ed76e2ca.exe 83 PID 716 wrote to memory of 4160 716 b6b60bd3ddc21ed2c937294489ac83897d4ebf48dd0fe899de5ea663ed76e2ca.exe 83 PID 4160 wrote to memory of 4036 4160 skotes.exe 90 PID 4160 wrote to memory of 4036 4160 skotes.exe 90 PID 4160 wrote to memory of 4036 4160 skotes.exe 90 PID 4036 wrote to memory of 852 4036 vg9qcBa.exe 94 PID 4036 wrote to memory of 852 4036 vg9qcBa.exe 94 PID 4036 wrote to memory of 852 4036 vg9qcBa.exe 94 PID 4036 wrote to memory of 852 4036 vg9qcBa.exe 94 PID 4036 wrote to memory of 852 4036 vg9qcBa.exe 94 PID 4036 wrote to memory of 852 4036 vg9qcBa.exe 94 PID 4036 wrote to memory of 852 4036 vg9qcBa.exe 94 PID 4036 wrote to memory of 852 4036 vg9qcBa.exe 94 PID 4036 wrote to memory of 852 4036 vg9qcBa.exe 94 PID 4036 wrote to memory of 852 4036 vg9qcBa.exe 94 PID 4160 wrote to memory of 4668 4160 skotes.exe 96 PID 4160 wrote to memory of 4668 4160 skotes.exe 96 PID 4160 wrote to memory of 4668 4160 skotes.exe 96 PID 4668 wrote to memory of 1924 4668 DPQSEDd.exe 98 PID 4668 wrote to memory of 1924 4668 DPQSEDd.exe 98 PID 4668 wrote to memory of 1924 4668 DPQSEDd.exe 98 PID 4668 wrote to memory of 1924 4668 DPQSEDd.exe 98 PID 4668 wrote to memory of 1924 4668 DPQSEDd.exe 98 PID 4668 wrote to memory of 1924 4668 DPQSEDd.exe 98 PID 4668 wrote to memory of 1924 4668 DPQSEDd.exe 98 PID 4668 wrote to memory of 1924 4668 DPQSEDd.exe 98 PID 4668 wrote to memory of 1924 4668 DPQSEDd.exe 98 PID 4668 wrote to memory of 1924 4668 DPQSEDd.exe 98 PID 4160 wrote to memory of 3316 4160 skotes.exe 104 PID 4160 wrote to memory of 3316 4160 skotes.exe 104 PID 4160 wrote to memory of 3316 4160 skotes.exe 104 PID 4160 wrote to memory of 1748 4160 skotes.exe 106 PID 4160 wrote to memory of 1748 4160 skotes.exe 106 PID 4160 wrote to memory of 1748 4160 skotes.exe 106 PID 4160 wrote to memory of 5016 4160 skotes.exe 107 PID 4160 wrote to memory of 5016 4160 skotes.exe 107 PID 4160 wrote to memory of 5016 4160 skotes.exe 107 PID 5016 wrote to memory of 536 5016 3a76a0191a.exe 108 PID 5016 wrote to memory of 536 5016 3a76a0191a.exe 108 PID 5016 wrote to memory of 536 5016 3a76a0191a.exe 108 PID 5016 wrote to memory of 3992 5016 3a76a0191a.exe 110 PID 5016 wrote to memory of 3992 5016 3a76a0191a.exe 110 PID 5016 wrote to memory of 3992 5016 3a76a0191a.exe 110 PID 5016 wrote to memory of 2024 5016 3a76a0191a.exe 112 PID 5016 wrote to memory of 2024 5016 3a76a0191a.exe 112 PID 5016 wrote to memory of 2024 5016 3a76a0191a.exe 112 PID 5016 wrote to memory of 4688 5016 3a76a0191a.exe 114 PID 5016 wrote to memory of 4688 5016 3a76a0191a.exe 114 PID 5016 wrote to memory of 4688 5016 3a76a0191a.exe 114 PID 5016 wrote to memory of 3876 5016 3a76a0191a.exe 116 PID 5016 wrote to memory of 3876 5016 3a76a0191a.exe 116 PID 5016 wrote to memory of 3876 5016 3a76a0191a.exe 116 PID 5016 wrote to memory of 4460 5016 3a76a0191a.exe 118 PID 5016 wrote to memory of 4460 5016 3a76a0191a.exe 118 PID 4460 wrote to memory of 3836 4460 firefox.exe 119 PID 4460 wrote to memory of 3836 4460 firefox.exe 119 PID 4460 wrote to memory of 3836 4460 firefox.exe 119 PID 4460 wrote to memory of 3836 4460 firefox.exe 119 PID 4460 wrote to memory of 3836 4460 firefox.exe 119 PID 4460 wrote to memory of 3836 4460 firefox.exe 119 PID 4460 wrote to memory of 3836 4460 firefox.exe 119 PID 4460 wrote to memory of 3836 4460 firefox.exe 119 PID 4460 wrote to memory of 3836 4460 firefox.exe 119 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\b6b60bd3ddc21ed2c937294489ac83897d4ebf48dd0fe899de5ea663ed76e2ca.exe"C:\Users\Admin\AppData\Local\Temp\b6b60bd3ddc21ed2c937294489ac83897d4ebf48dd0fe899de5ea663ed76e2ca.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:716 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Users\Admin\AppData\Local\Temp\1009238001\vg9qcBa.exe"C:\Users\Admin\AppData\Local\Temp\1009238001\vg9qcBa.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Users\Admin\AppData\Local\Temp\1009238001\vg9qcBa.exe"C:\Users\Admin\AppData\Local\Temp\1009238001\vg9qcBa.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:852
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009278001\DPQSEDd.exe"C:\Users\Admin\AppData\Local\Temp\1009278001\DPQSEDd.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Users\Admin\AppData\Local\Temp\1009278001\DPQSEDd.exe"C:\Users\Admin\AppData\Local\Temp\1009278001\DPQSEDd.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1924
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009322001\6e8827e102.exe"C:\Users\Admin\AppData\Local\Temp\1009322001\6e8827e102.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3316
-
-
C:\Users\Admin\AppData\Local\Temp\1009323001\656db2e7c0.exe"C:\Users\Admin\AppData\Local\Temp\1009323001\656db2e7c0.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1748
-
-
C:\Users\Admin\AppData\Local\Temp\1009324001\3a76a0191a.exe"C:\Users\Admin\AppData\Local\Temp\1009324001\3a76a0191a.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:536
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3992
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2024
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4688
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3876
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3836 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1980 -parentBuildID 20240401114208 -prefsHandle 1896 -prefMapHandle 1888 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {3976c6e1-d9df-4530-a366-64b9e3986ea2} 3836 "\\.\pipe\gecko-crash-server-pipe.3836" gpu6⤵PID:3124
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2412 -parentBuildID 20240401114208 -prefsHandle 2392 -prefMapHandle 2380 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b936a723-d0a1-4485-877a-dbe86cbdb595} 3836 "\\.\pipe\gecko-crash-server-pipe.3836" socket6⤵PID:1968
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3304 -childID 1 -isForBrowser -prefsHandle 3396 -prefMapHandle 3264 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a9d68e6a-9355-4da4-9470-17f534aef732} 3836 "\\.\pipe\gecko-crash-server-pipe.3836" tab6⤵PID:2336
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3324 -childID 2 -isForBrowser -prefsHandle 3824 -prefMapHandle 3820 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d00e80c8-0c4a-4f19-a7b7-7794adf7c30f} 3836 "\\.\pipe\gecko-crash-server-pipe.3836" tab6⤵PID:3980
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4284 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4288 -prefMapHandle 4292 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d7a84aec-c9d6-49cf-a539-321b6573e77e} 3836 "\\.\pipe\gecko-crash-server-pipe.3836" utility6⤵
- Checks processor information in registry
PID:5168
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5548 -childID 3 -isForBrowser -prefsHandle 5540 -prefMapHandle 5536 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ba49d5e5-c039-424b-a886-0a5f57e52bc7} 3836 "\\.\pipe\gecko-crash-server-pipe.3836" tab6⤵PID:6028
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5692 -childID 4 -isForBrowser -prefsHandle 5768 -prefMapHandle 5764 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e7cf2ac4-7e30-4373-b490-2e728085b2cf} 3836 "\\.\pipe\gecko-crash-server-pipe.3836" tab6⤵PID:6052
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5880 -childID 5 -isForBrowser -prefsHandle 5960 -prefMapHandle 5956 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3a7a5166-0ba1-4811-ad5b-678727af711e} 3836 "\\.\pipe\gecko-crash-server-pipe.3836" tab6⤵PID:6064
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009325001\255fa693f0.exe"C:\Users\Admin\AppData\Local\Temp\1009325001\255fa693f0.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2304
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3016
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:324
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:696
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ws2kncw.default-release\activity-stream.discovery_stream.json
Filesize19KB
MD5a72682d1f48e573e3321294216bff047
SHA13261910c45c04eeb3ed3c7585e12b2158e9e4894
SHA2567a97e537e15034ae290e09372bcf861952d585cb49374626dd766914ab2a2bad
SHA512e8c29e6fa23fcd4a40c3ad399fec0564040d5b07f6b1e6c4aa5cd6235d97f16c0c3ac8cfb767db8399608d3444ea7ddfd4ff39be00ec1085c5ed3e1fc5d1e0d9
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ws2kncw.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD5afc8b29b91f64b9cda7b5ca020d9319e
SHA19e31175fbd7db891a503bb5b02b7522db660f4bf
SHA2563a3ca6c518d34632bc5349d51e1aa7e5486fa15d3f7d72cd5048226003c6c503
SHA512ba62a3c8cc5e2005501ecddd454eaee533ae7cd422ebce9d97c7cba3d511b46f051d171484f6f4995a688e95dda368a73502aae78e90c292b526a3371ce49363
-
Filesize
460KB
MD520160349422aeb131ed9da71a82eb7ab
SHA1bb01e4225a1e1797c9b5858d0edf063d5f8bc44f
SHA256d8f6ce51eba058276c4722747655b68711682afc5654414e8c195ada38fdc0ea
SHA512907f3f61ac9ebeda534b3a330fd8673e8d09b243847b6a7a8d8d30f74ba8c699eafb8338a8d4f36824871609c1f226cb4db1e4a931fdf312f0e4331e7110c6b8
-
Filesize
458KB
MD5666df1d57e2a047b9edc5a7ad3525ea0
SHA192b4144346f873d5afc2e528f914afa6c7323fef
SHA256fcff3ae0e71747322f9c628736788ceb419c9f04bdfa8a5bdb3a628e8d91af6e
SHA5123a114e0c3412c8396f40191ebc24d44733f8ebf35b72ad3a4ed26691174de5292fe4213b72d1034262ff16616d5cf01703058a61c4a578773d16f728db082b1d
-
Filesize
1.7MB
MD5d8e74acf219910b5202a9b4f1dfde49f
SHA133c3c2a7540164c84d4c5dad7ac9a1724f1ad623
SHA256c6ed5b0c3b1661e82fd4159de963944dbe68380fff5db681d55bb5e9fbde3d70
SHA512d6bcf32b78f0c9923e14e73fecec254faca29b009142012d69fe1e44c20ba29b677afe4ae8a449e1a567794a5da1c9014814023230dd8f92c1182dbe00dc9e30
-
Filesize
1.7MB
MD5e6360ebf4fbd15fd1bdf0088eb78ca22
SHA1b174a406b9305eed8f81e382960085a45a283fd5
SHA2564010093c111ec0be1515414d06b8c33bbe67c1d7a95b10da70efe79860e17116
SHA5125965c1002c3c833b183a65f55ed8be44f1faca8b7ec9dd7adf3996d6162f2b5a60d1859d3b4e04aa6e38a8826503ae514d24d2f1149168723029bdbab0befa2e
-
Filesize
901KB
MD571ba5683d7ca32e6f749128d64d09e0a
SHA18a3499f7d1733288d9bbb01938b118f27030a6f2
SHA2565e1ce6da827cf06403a1c0cbaf519ab97a11fc1dc31d03cd4403959bbadfca13
SHA5122d4cfa545f7ad1021ad9518e2686d7ad378eb23df833cf392bb6398b29c9eb100f186f537703ae69752753d7bb4852cb0f2b30ee32fd012fe532f54935360ad7
-
Filesize
2.7MB
MD551bf0eb329518b7c2bf58d495458257c
SHA16ff472f161e0cea1ea5b40796dad605175bfd422
SHA256ed56b2dd50ee59f47cfd7337521d2fce0c7220bf1a85b4e39c8e65fd5f297f06
SHA51245b322cbdd68d85417e13b0b471433ea037447de5dbbdb0b747d283756461a2678b88246bc59f222d4890fb1e97df3ce5ab3d96cf511cfd07a9323846d43613f
-
Filesize
1.8MB
MD50ddb99672f84838c7f3b1eb1e9225563
SHA1de9e457953d0eae83e664d40833f02aa59341c25
SHA256b6b60bd3ddc21ed2c937294489ac83897d4ebf48dd0fe899de5ea663ed76e2ca
SHA5124f18fe2a151ebe958cffd15727d37712330a998328d4ad38d87c0c6479b95f9070dafbacc5e1ed4aec4796abab8f1fc61510df72dad13bc4e32518ea60c1f6dd
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin
Filesize18KB
MD5dbef923fbaf034a80d85c8c6e781e630
SHA16dd6d63653e84f781e152ee35eada4aebf4aae1e
SHA25688fbccae64e8ee1370b9a33f45f5fbf27d3a86fb1596f7beddfda039db81e9f2
SHA512cb7f2803aa2a158bbc1bfeb4cc9d5ce0de38c4357e46edefb6863013e32dbfe08c684c40bdfc1301d88d82b8fc4b5e8351af989d6ab511816873d11812ff5891
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin
Filesize6KB
MD5b2988dac828ad5467c17527de70903ef
SHA1ec832f67b34dfda7c2e530d67fe4d20cd6616041
SHA256201df92808cf70e9b2aedaac7353a03faafe609d521fc79af667aea08ec29a24
SHA512d2e3d345f802eaee5d051a9bfb223e9577d536a4bf917312d2922a066ec99d003aca0fe30cbf73058d5d71687892dbe3e314737a607b6c78d11dd29e0560651e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin
Filesize8KB
MD58694c9fc05b1525991ec0214804a016a
SHA139934641ddc794ac40b517796943474cc1e76b28
SHA2567fd923c8d38bdd0c3dee6e9af85303f0c08c63139da0662831f5b7cced7fa91c
SHA512e15a19a072b73c30f0c4a2719bb74b101106bd2d2c532bfdb5423998e5545beb24370259ac7b81aa54928be8dd8ed2e8feb29357a24c2eb035b5d8fa7bc1b03e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin
Filesize12KB
MD576b07bb4ea443def38f211a898e14157
SHA1066a1be04983a6ada6a6717fe51cbafcd3ed6741
SHA25615b89ae17553dabad70adbfc96fcff74e84c99c081127ac4b756845c45d163ea
SHA51285925062c8cd046f0787c84513ab9a104a5a5319bed5e716b647c80ea5c974be5800ff4dbfab9241d94e1999937592481fb211ee71dace876532630d873ad141
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD57b3ce41ab114812f9a6daa8565cf2c1d
SHA1c3fcdf374e64bab446876d79b19d51191c3e96a9
SHA25639885f2b2ced7d7b158e24606cef81b9534e6257ca37453b107d7235b949bf91
SHA512673b4caa6fbdbcb2f53dbdc0cf16c50ab85ea4e4a61a841d017042035c60d0901ce30b7d640916a5884b210d50415adb379ee97c8e380831106ce3832f05f4ba
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD55b8b5796093bbfb31fce62dd0ca463ce
SHA102bbf31eefbaa5c34dd572b935c62246b93074b5
SHA256a0ca1f14d413475284bd6833b079eafe60e614f4f54e5ce0ee34b0d75aea3235
SHA51201479c0323cc7a0650ca51a529bf438dd8b6f663b84eccaaf16d8cb440eba53dbe48c44bbed93761f6b05a59ab5de62175fd14c5de30739737dd7e014c55ff8a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD562c29ab8fad0b72afc37ac35aa6ffd08
SHA1af55962bc0501c9c636cc98c1f6e4b677746d7b6
SHA25699b3c9040f6744a5ffc223b4e4601477c1477c89896236df4e6d0a741cf1dd2d
SHA512b22750c6a2664206532a5085bc7f90d479f5bd6f1dc10fd5e38daebf07b89fe9d4cd01186c455bd3fff9097242b698eafc1c56dcb4808daab22185c93614d295
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD50168afb4ad3002bb028cc988d2fdfd99
SHA1f0014f89e96329769cfc956b140cbf763d908ee4
SHA256a6ec595dbf3e724feee4c3f56f8db131e45f82a7525512a56b6f289d161a6835
SHA512f844482d7031c82535bc4c9b11811e3866a561a079fea0080d996c01903f8c19068a03729035eceb9f854265042d4d883cefd23bf5fc001b64f8dd5ebc3e4db5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5655470e0e53e591b86a1c7c49a380b5d
SHA17dc0bf811d898a7f8d057994419d272fd46dccd5
SHA25635be20b3ff754c9ff3ba181b4985addc64ba069c91262d1d439c787dfe7346bf
SHA5126d0869147a87656d3f8489f4b5a3a2bc9b34f9b5cec10e168ab54fd46de7d9b5fef482e56f0b36b602495be2896ba211e30f28480c8c87d51ed0cbf15f0e91f6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\95f8784f-21e7-4402-b9fd-bdc4609554d7
Filesize982B
MD55b19c21c47f25053c8d4a20c8314e1b9
SHA155396979965258cee8427f965de4e2241ad4f2b4
SHA256888a8172a93dfcc61e7dd3590ac73e70a09a8ec7a8af00a232946d62a52ea621
SHA5127cb37cc4c3efd61305ae0af668cb9d904c0a240a16c5cfd7f94d63677468afcc9101c2fb91ea482c3e85a1adb6c095726eaac5170d392e243337de05a1bf0773
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\99492c6a-2094-42d4-8151-97da19dea20b
Filesize25KB
MD58277ad7c8c91ce0144409a3209c4d065
SHA159135be29ac58429f8247e6e28e989ab1484b0c4
SHA2566956b7dc5b62f030c39e6096404bf94229a796f89b9e6e4c5ea85a90102a0bad
SHA51261c8ab2572aed0879cfc6e6408def9153b6cff9fea9d321df494fd15241b06247230f494b88cdb17c91081c870513f84f11cc273370bc693d04b5784839c63c5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\9c5ad89a-7233-4f35-b732-f787ef789323
Filesize671B
MD57f601f487f442d563864e70f377923b9
SHA111165ef91fcc037db12d6599944fd560a897cc8d
SHA256aaefcce96180c8fc80d46ccefda307322fea44bcbd4bc8b414f8163d63a3ad4f
SHA512489109118dafe522014d4b18e131d8f480ae391371afbfd8aafc36437d234b458e250db88bb6d76230a7bbf95387c8637c2dec3c1b1665b7a893cf6dd190b75f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
11KB
MD5ece1832becd57d910f890164bd49cc1b
SHA1309ff07d41a822d5051a54d3ac7e338e6a262bdf
SHA25645ff73a13a7be2fdaa7d9b54f81f05f68ca9de2c4a80d36d980f93d700e05879
SHA512c03f75a72a524a48ef88c9275d4991d465b7b02858844bfadfe6a969098d40aa2ff1c0e79fbb5dcdf0f94903cc518c30379aa66b852904932386c0ae6ae22921
-
Filesize
15KB
MD5ce702499354ffd3f183f544cdeec4f9a
SHA18b412b153fedb79a342a5f818e16ac52d489e93e
SHA256edd8b24f5fde14c4baf61aee698fee6d52123f0e9f2a776b1bb8ee503df587e2
SHA512c90a296d3302f5a932223110c1dac0bbdfdb6d09af78a54d8c2d56e8d54b3108bd4c91b9276ad73aacf79f0cad1f5850be35d35455cc34102847178b4a88e71c
-
Filesize
10KB
MD5acca8418d70aae4530e6df72be7799cf
SHA10be3ca4ed314e6775fcb67d6b34040b9bc10547e
SHA25621032d2796ce2e6b44ea88307087fc9e2800f5e44d1a4aefb908cd4bc5b9e540
SHA512afcf686a958f159d9f460b215e92caeced55e0a94e45c57768e72b36ced611701e76bf3909d406e6d01998261d49fe2de757037a1ef3883aba9e10e6b9fc84b2