Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26/11/2024, 17:07
Static task
static1
General
-
Target
f40d9a4267f73854840191aec7eb764ff892fc06d47f3c4608f2ec876b444227.exe
-
Size
5.5MB
-
MD5
5cbee7963382b8ff04664bf04ba4a49f
-
SHA1
b45bd9004130d3b6e259128336d1ece75b4885e7
-
SHA256
f40d9a4267f73854840191aec7eb764ff892fc06d47f3c4608f2ec876b444227
-
SHA512
b7e07dcf3ea9c35d91235402e1b686b324a427878ecb0c76277e01a1bc653b396633ed4b1f001b725f5db4eddfd9abb3518ca0535af08ec56faf906e14d375c4
-
SSDEEP
98304:dW0ZpiuO2oB8H1pHTI3/2RKwHsxlekeC1WB/rjVKs7raJ0F:dKi11pz2cKwHKlzYrjl7raJ0F
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://p3ar11fter.sbs
https://3xp3cts1aim.sbs
https://owner-vacat10n.sbs
https://peepburry828.sbs
https://p10tgrace.sbs
https://befall-sm0ker.sbs
https://librari-night.sbs
https://processhol.sbs
https://cook-rain.sbs
https://powerful-avoids.sbs
https://motion-treesz.sbs
https://disobey-curly.sbs
https://leg-sate-boat.sbs
https://story-tense-faz.sbs
https://blade-govern.sbs
https://occupy-blushi.sbs
https://frogs-severz.sbs
https://push-hook.cyou
https://property-imper.sbs
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://cook-rain.sbs/api
https://push-hook.cyou/api
https://blade-govern.sbs/api
https://story-tense-faz.sbs/api
https://disobey-curly.sbs/api
https://motion-treesz.sbs/api
https://powerful-avoids.sbs/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 73c6395000.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 73c6395000.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 73c6395000.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 73c6395000.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 73c6395000.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 73c6395000.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2O2007.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 72576969b8.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 73c6395000.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1T38u2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3L39A.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f8355b4f4c.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3L39A.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 72576969b8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2O2007.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3L39A.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 72576969b8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 73c6395000.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1T38u2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1T38u2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f8355b4f4c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2O2007.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f8355b4f4c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 73c6395000.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 1T38u2.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 15 IoCs
pid Process 1540 S2u96.exe 4360 1T38u2.exe 5040 skotes.exe 3192 2O2007.exe 1884 3L39A.exe 2528 vg9qcBa.exe 3212 vg9qcBa.exe 1876 DPQSEDd.exe 3512 DPQSEDd.exe 3940 72576969b8.exe 3508 f8355b4f4c.exe 5104 f10eb7e19e.exe 1836 73c6395000.exe 5304 skotes.exe 5692 skotes.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 1T38u2.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 3L39A.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine f8355b4f4c.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 2O2007.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 72576969b8.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 73c6395000.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 73c6395000.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 73c6395000.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\72576969b8.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009330001\\72576969b8.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\f8355b4f4c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009331001\\f8355b4f4c.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\f10eb7e19e.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009332001\\f10eb7e19e.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\73c6395000.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009333001\\73c6395000.exe" skotes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f40d9a4267f73854840191aec7eb764ff892fc06d47f3c4608f2ec876b444227.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" S2u96.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000a000000023b9f-124.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 4360 1T38u2.exe 5040 skotes.exe 3192 2O2007.exe 1884 3L39A.exe 3940 72576969b8.exe 3508 f8355b4f4c.exe 1836 73c6395000.exe 5304 skotes.exe 5692 skotes.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2528 set thread context of 3212 2528 vg9qcBa.exe 99 PID 1876 set thread context of 3512 1876 DPQSEDd.exe 106 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1T38u2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 19 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DPQSEDd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f8355b4f4c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 73c6395000.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1T38u2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f10eb7e19e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vg9qcBa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3L39A.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DPQSEDd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f40d9a4267f73854840191aec7eb764ff892fc06d47f3c4608f2ec876b444227.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2O2007.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vg9qcBa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 72576969b8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language S2u96.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 4828 taskkill.exe 2472 taskkill.exe 4112 taskkill.exe 4536 taskkill.exe 1316 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 4360 1T38u2.exe 4360 1T38u2.exe 5040 skotes.exe 5040 skotes.exe 3192 2O2007.exe 3192 2O2007.exe 1884 3L39A.exe 1884 3L39A.exe 3940 72576969b8.exe 3940 72576969b8.exe 3508 f8355b4f4c.exe 3508 f8355b4f4c.exe 5104 f10eb7e19e.exe 5104 f10eb7e19e.exe 1836 73c6395000.exe 1836 73c6395000.exe 5104 f10eb7e19e.exe 5104 f10eb7e19e.exe 1836 73c6395000.exe 1836 73c6395000.exe 1836 73c6395000.exe 5304 skotes.exe 5304 skotes.exe 5692 skotes.exe 5692 skotes.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 4828 taskkill.exe Token: SeDebugPrivilege 2472 taskkill.exe Token: SeDebugPrivilege 4112 taskkill.exe Token: SeDebugPrivilege 4536 taskkill.exe Token: SeDebugPrivilege 1316 taskkill.exe Token: SeDebugPrivilege 3860 firefox.exe Token: SeDebugPrivilege 3860 firefox.exe Token: SeDebugPrivilege 1836 73c6395000.exe Token: SeDebugPrivilege 3860 firefox.exe Token: SeDebugPrivilege 3860 firefox.exe Token: SeDebugPrivilege 3860 firefox.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 4360 1T38u2.exe 5104 f10eb7e19e.exe 5104 f10eb7e19e.exe 5104 f10eb7e19e.exe 5104 f10eb7e19e.exe 5104 f10eb7e19e.exe 5104 f10eb7e19e.exe 5104 f10eb7e19e.exe 5104 f10eb7e19e.exe 3860 firefox.exe 3860 firefox.exe 3860 firefox.exe 3860 firefox.exe 3860 firefox.exe 3860 firefox.exe 3860 firefox.exe 3860 firefox.exe 3860 firefox.exe 3860 firefox.exe 3860 firefox.exe 3860 firefox.exe 3860 firefox.exe 3860 firefox.exe 3860 firefox.exe 3860 firefox.exe 3860 firefox.exe 3860 firefox.exe 3860 firefox.exe 3860 firefox.exe 3860 firefox.exe 5104 f10eb7e19e.exe 5104 f10eb7e19e.exe 5104 f10eb7e19e.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 5104 f10eb7e19e.exe 5104 f10eb7e19e.exe 5104 f10eb7e19e.exe 5104 f10eb7e19e.exe 5104 f10eb7e19e.exe 5104 f10eb7e19e.exe 5104 f10eb7e19e.exe 5104 f10eb7e19e.exe 3860 firefox.exe 3860 firefox.exe 3860 firefox.exe 3860 firefox.exe 3860 firefox.exe 3860 firefox.exe 3860 firefox.exe 3860 firefox.exe 3860 firefox.exe 3860 firefox.exe 3860 firefox.exe 3860 firefox.exe 3860 firefox.exe 3860 firefox.exe 3860 firefox.exe 3860 firefox.exe 3860 firefox.exe 3860 firefox.exe 3860 firefox.exe 3860 firefox.exe 5104 f10eb7e19e.exe 5104 f10eb7e19e.exe 5104 f10eb7e19e.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3860 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4904 wrote to memory of 1540 4904 f40d9a4267f73854840191aec7eb764ff892fc06d47f3c4608f2ec876b444227.exe 83 PID 4904 wrote to memory of 1540 4904 f40d9a4267f73854840191aec7eb764ff892fc06d47f3c4608f2ec876b444227.exe 83 PID 4904 wrote to memory of 1540 4904 f40d9a4267f73854840191aec7eb764ff892fc06d47f3c4608f2ec876b444227.exe 83 PID 1540 wrote to memory of 4360 1540 S2u96.exe 84 PID 1540 wrote to memory of 4360 1540 S2u96.exe 84 PID 1540 wrote to memory of 4360 1540 S2u96.exe 84 PID 4360 wrote to memory of 5040 4360 1T38u2.exe 85 PID 4360 wrote to memory of 5040 4360 1T38u2.exe 85 PID 4360 wrote to memory of 5040 4360 1T38u2.exe 85 PID 1540 wrote to memory of 3192 1540 S2u96.exe 86 PID 1540 wrote to memory of 3192 1540 S2u96.exe 86 PID 1540 wrote to memory of 3192 1540 S2u96.exe 86 PID 4904 wrote to memory of 1884 4904 f40d9a4267f73854840191aec7eb764ff892fc06d47f3c4608f2ec876b444227.exe 94 PID 4904 wrote to memory of 1884 4904 f40d9a4267f73854840191aec7eb764ff892fc06d47f3c4608f2ec876b444227.exe 94 PID 4904 wrote to memory of 1884 4904 f40d9a4267f73854840191aec7eb764ff892fc06d47f3c4608f2ec876b444227.exe 94 PID 5040 wrote to memory of 2528 5040 skotes.exe 97 PID 5040 wrote to memory of 2528 5040 skotes.exe 97 PID 5040 wrote to memory of 2528 5040 skotes.exe 97 PID 2528 wrote to memory of 3212 2528 vg9qcBa.exe 99 PID 2528 wrote to memory of 3212 2528 vg9qcBa.exe 99 PID 2528 wrote to memory of 3212 2528 vg9qcBa.exe 99 PID 2528 wrote to memory of 3212 2528 vg9qcBa.exe 99 PID 2528 wrote to memory of 3212 2528 vg9qcBa.exe 99 PID 2528 wrote to memory of 3212 2528 vg9qcBa.exe 99 PID 2528 wrote to memory of 3212 2528 vg9qcBa.exe 99 PID 2528 wrote to memory of 3212 2528 vg9qcBa.exe 99 PID 2528 wrote to memory of 3212 2528 vg9qcBa.exe 99 PID 2528 wrote to memory of 3212 2528 vg9qcBa.exe 99 PID 5040 wrote to memory of 1876 5040 skotes.exe 104 PID 5040 wrote to memory of 1876 5040 skotes.exe 104 PID 5040 wrote to memory of 1876 5040 skotes.exe 104 PID 1876 wrote to memory of 3512 1876 DPQSEDd.exe 106 PID 1876 wrote to memory of 3512 1876 DPQSEDd.exe 106 PID 1876 wrote to memory of 3512 1876 DPQSEDd.exe 106 PID 1876 wrote to memory of 3512 1876 DPQSEDd.exe 106 PID 1876 wrote to memory of 3512 1876 DPQSEDd.exe 106 PID 1876 wrote to memory of 3512 1876 DPQSEDd.exe 106 PID 1876 wrote to memory of 3512 1876 DPQSEDd.exe 106 PID 1876 wrote to memory of 3512 1876 DPQSEDd.exe 106 PID 1876 wrote to memory of 3512 1876 DPQSEDd.exe 106 PID 1876 wrote to memory of 3512 1876 DPQSEDd.exe 106 PID 5040 wrote to memory of 3940 5040 skotes.exe 108 PID 5040 wrote to memory of 3940 5040 skotes.exe 108 PID 5040 wrote to memory of 3940 5040 skotes.exe 108 PID 5040 wrote to memory of 3508 5040 skotes.exe 110 PID 5040 wrote to memory of 3508 5040 skotes.exe 110 PID 5040 wrote to memory of 3508 5040 skotes.exe 110 PID 5040 wrote to memory of 5104 5040 skotes.exe 111 PID 5040 wrote to memory of 5104 5040 skotes.exe 111 PID 5040 wrote to memory of 5104 5040 skotes.exe 111 PID 5104 wrote to memory of 4828 5104 f10eb7e19e.exe 112 PID 5104 wrote to memory of 4828 5104 f10eb7e19e.exe 112 PID 5104 wrote to memory of 4828 5104 f10eb7e19e.exe 112 PID 5104 wrote to memory of 2472 5104 f10eb7e19e.exe 114 PID 5104 wrote to memory of 2472 5104 f10eb7e19e.exe 114 PID 5104 wrote to memory of 2472 5104 f10eb7e19e.exe 114 PID 5104 wrote to memory of 4112 5104 f10eb7e19e.exe 116 PID 5104 wrote to memory of 4112 5104 f10eb7e19e.exe 116 PID 5104 wrote to memory of 4112 5104 f10eb7e19e.exe 116 PID 5104 wrote to memory of 4536 5104 f10eb7e19e.exe 118 PID 5104 wrote to memory of 4536 5104 f10eb7e19e.exe 118 PID 5104 wrote to memory of 4536 5104 f10eb7e19e.exe 118 PID 5104 wrote to memory of 1316 5104 f10eb7e19e.exe 120 PID 5104 wrote to memory of 1316 5104 f10eb7e19e.exe 120 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\f40d9a4267f73854840191aec7eb764ff892fc06d47f3c4608f2ec876b444227.exe"C:\Users\Admin\AppData\Local\Temp\f40d9a4267f73854840191aec7eb764ff892fc06d47f3c4608f2ec876b444227.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\S2u96.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\S2u96.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1T38u2.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1T38u2.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\1009238001\vg9qcBa.exe"C:\Users\Admin\AppData\Local\Temp\1009238001\vg9qcBa.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Users\Admin\AppData\Local\Temp\1009238001\vg9qcBa.exe"C:\Users\Admin\AppData\Local\Temp\1009238001\vg9qcBa.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3212
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009278001\DPQSEDd.exe"C:\Users\Admin\AppData\Local\Temp\1009278001\DPQSEDd.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Users\Admin\AppData\Local\Temp\1009278001\DPQSEDd.exe"C:\Users\Admin\AppData\Local\Temp\1009278001\DPQSEDd.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3512
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009330001\72576969b8.exe"C:\Users\Admin\AppData\Local\Temp\1009330001\72576969b8.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3940
-
-
C:\Users\Admin\AppData\Local\Temp\1009331001\f8355b4f4c.exe"C:\Users\Admin\AppData\Local\Temp\1009331001\f8355b4f4c.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3508
-
-
C:\Users\Admin\AppData\Local\Temp\1009332001\f10eb7e19e.exe"C:\Users\Admin\AppData\Local\Temp\1009332001\f10eb7e19e.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4828
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2472
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4112
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4536
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1316
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking6⤵PID:3556
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking7⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3860 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2024 -parentBuildID 20240401114208 -prefsHandle 1940 -prefMapHandle 1924 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {f4b080f4-2a4b-4051-b359-ed6b9e33b34d} 3860 "\\.\pipe\gecko-crash-server-pipe.3860" gpu8⤵PID:3212
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2372 -parentBuildID 20240401114208 -prefsHandle 2448 -prefMapHandle 2444 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b0cdda56-5f7c-47bf-a38d-7b42966f0d04} 3860 "\\.\pipe\gecko-crash-server-pipe.3860" socket8⤵PID:3536
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2820 -childID 1 -isForBrowser -prefsHandle 3024 -prefMapHandle 2880 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1348 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6915771e-f855-49da-9c8b-1f8e9f0f4de8} 3860 "\\.\pipe\gecko-crash-server-pipe.3860" tab8⤵PID:1436
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4212 -childID 2 -isForBrowser -prefsHandle 4204 -prefMapHandle 4200 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1348 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f53b8ed3-876b-4285-805c-b0d90b2a24bd} 3860 "\\.\pipe\gecko-crash-server-pipe.3860" tab8⤵PID:4904
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4948 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4940 -prefMapHandle 4936 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9701a060-4442-48dd-af1e-c438504dccdf} 3860 "\\.\pipe\gecko-crash-server-pipe.3860" utility8⤵
- Checks processor information in registry
PID:6716
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5280 -childID 3 -isForBrowser -prefsHandle 5416 -prefMapHandle 5324 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1348 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cf3c911d-eac7-4d74-968b-805d70ddb82e} 3860 "\\.\pipe\gecko-crash-server-pipe.3860" tab8⤵PID:5228
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5672 -childID 4 -isForBrowser -prefsHandle 5592 -prefMapHandle 5596 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1348 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {73de2ef5-6b7d-4459-b01e-de51d9265197} 3860 "\\.\pipe\gecko-crash-server-pipe.3860" tab8⤵PID:5244
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5804 -childID 5 -isForBrowser -prefsHandle 5812 -prefMapHandle 5820 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1348 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6c47300d-c2ac-4f94-a5b8-50f066661e45} 3860 "\\.\pipe\gecko-crash-server-pipe.3860" tab8⤵PID:5252
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009333001\73c6395000.exe"C:\Users\Admin\AppData\Local\Temp\1009333001\73c6395000.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1836
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2O2007.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2O2007.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3192
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3L39A.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3L39A.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1884
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5304
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5692
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\activity-stream.discovery_stream.json
Filesize19KB
MD51f0849542e323d26bc0a3d33a51e9607
SHA13753a11000a35f03c31292ff5921d43d8e56a448
SHA256f9c1c41ec406380e610744b9d004584e3c12c9f4ec4a3fc15e4de7a519fd051f
SHA512955b7ff2c01c7b1680035cce3c0922ec86efbe244a8dd0b37e22ef06f7771e4e4febf086773486623aafe42edb53082794fe80a545b494c4d4cfe524d9dbaeb8
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD5ca06e22660538176084a072f681f4d19
SHA1cb812ef13730eec0993af16bf3b4ab09b11f4b0c
SHA2569acdccc6f5bbc646bc6ff6eccd6f866d8eb29d70b39e3f42d31c493175ffe5ba
SHA5123e805da73cffcdb56be30313d043de637eeb6241fcf7dd8b5f44dbb29ac80c5d71893a43e6b19a8e7839294cfeab23bf2bdba832447885cf03676ec49cdc7560
-
Filesize
460KB
MD520160349422aeb131ed9da71a82eb7ab
SHA1bb01e4225a1e1797c9b5858d0edf063d5f8bc44f
SHA256d8f6ce51eba058276c4722747655b68711682afc5654414e8c195ada38fdc0ea
SHA512907f3f61ac9ebeda534b3a330fd8673e8d09b243847b6a7a8d8d30f74ba8c699eafb8338a8d4f36824871609c1f226cb4db1e4a931fdf312f0e4331e7110c6b8
-
Filesize
454KB
MD5cc6b5731656f98ad704116a9fe2273a9
SHA103613e84b097dd060ebbc08f6607dbc3f3b9f8ab
SHA2567eed6c0395e80b99b3c44c3b8c0ad67195889d352440a5064e37c1f0335b2047
SHA512b97f03b854483c395e516031b65f4a0524f83afbbc81bb4b28f664b918dbc774a201692a1e8db976ec0dc779d218a537096c939bc560e2e9ddd51d94f1ed8f78
-
Filesize
1.8MB
MD5cdd5f94d07f51880aac7820d436dbfb0
SHA11788017509acc93f8acc5be6c03bb0c05905d0ad
SHA25659492c239987c11dac31153e0588926b4262589e19da4288915cc49a09a7b43e
SHA512eeb077e5f834ce539240c5a778d00f7dcbfb01ef46784ccb370bdcd56266f1bb538beff359cd8cdd6bcaa04585378a827b103c5187ea3f6f4d851a8139d3e137
-
Filesize
1.7MB
MD5f43db48ebbb2d24d306982493e1b1e37
SHA1dd542a47ed05c36174441b94d9f5adf540a0b13e
SHA256d83effe6c4258c6f20a3ea796d9595ed0fccfa1e3eb27cb549a193e2ccc284d0
SHA5127121e4ab05a49666aabc4be3a0fe38f136727e8ac3bea0850810f3fc92255f5be08b4225e820a485800f1067396514f47618a37c641c0498ebcf772dd66b3bb6
-
Filesize
901KB
MD571ba5683d7ca32e6f749128d64d09e0a
SHA18a3499f7d1733288d9bbb01938b118f27030a6f2
SHA2565e1ce6da827cf06403a1c0cbaf519ab97a11fc1dc31d03cd4403959bbadfca13
SHA5122d4cfa545f7ad1021ad9518e2686d7ad378eb23df833cf392bb6398b29c9eb100f186f537703ae69752753d7bb4852cb0f2b30ee32fd012fe532f54935360ad7
-
Filesize
2.7MB
MD551bf0eb329518b7c2bf58d495458257c
SHA16ff472f161e0cea1ea5b40796dad605175bfd422
SHA256ed56b2dd50ee59f47cfd7337521d2fce0c7220bf1a85b4e39c8e65fd5f297f06
SHA51245b322cbdd68d85417e13b0b471433ea037447de5dbbdb0b747d283756461a2678b88246bc59f222d4890fb1e97df3ce5ab3d96cf511cfd07a9323846d43613f
-
Filesize
1.7MB
MD50c50a08dffa73cfbb9ee5ba4382bdefc
SHA1b21d45218d280416859c21b9c628315d6d71690f
SHA256ea7617b4a5571a89a06ef9bb195dc92a178ea4e0a6a514030eb288f54d26f0a3
SHA512529275d8e96270c711ecee981bb07a3e70eab1a01e3550898449cc9cf2da57b0e823d36fcbfca92f006ebd2b47dd1e9d7dbf2367baf14e010f179e521eeabeea
-
Filesize
3.7MB
MD529a62784cda56e409f57eee2eb2db50f
SHA1e6eb1e4025c159c444711b0967d00fd06efe8abe
SHA256ae245e1de56ffc9204fe237fae917cb017ce8261eab806b35f408374354ed6ed
SHA5125b9d756bfcb1837616d1a1874805c435e1b7cdb124de5137801fa89087bc18b69d24b84333e210a6fc88b2cf89157c94185372503d30a7d56fc50e070a1c341e
-
Filesize
1.8MB
MD59026ca6bc267a2ac0e092e352cb39dfe
SHA1081dbb285587965762103b87f260f1371af58087
SHA256e2b42da09ca84002f6f77f31c1ed5c2d14346aa5984ffe8a494ff1e69c35a68d
SHA512f03a4ff06faa9c32f1ddfa39da15c315bc12edfc04199f48a88c6fb7cc3c74612580668fc51d2303d24a70d11075bff48e148a21c17244adb7435ad12aa91cdf
-
Filesize
1.8MB
MD5d428ba15ff307879562142d3b642619b
SHA108b51350fe8cf5acf85a1716cbde1a607b8b6ca0
SHA25623b3e65432828bc9913c5a1407a726a21ea9c8e4ca69bba65fc554d8475542f8
SHA51231b1d27b326f7ecf9f45fd57a1cee66e443c4d4cc5294fda201bf8d6062c1865e82d2096b83c33cc9d85ecb75fb617daf658cfc128ce1ea46d9934ff382f9ffc
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin
Filesize8KB
MD5042f3d882d00acf1332cab48c7f2954b
SHA1fbf21ad76c39eb751bef313dc2e9bfb9a8208f78
SHA25683ac7ffd7714185f90dc519468537536b98e2e0ca735b57f92a69f6aa195b601
SHA5123b2b8e4c6072c8118221efba7fd33f598c17eb17bf5feb7437146d790b05e6b042a3ba81cef3bda75a30b96b10c306c88f6f658a18a7ac2c34a6c88b58697d83
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin
Filesize10KB
MD53418f45a72abfccd1a94097ccd7f5e12
SHA1ec1fd9c4eb1d941e06008cf2872b3e2d7dead506
SHA256ea31d08635c6f35a45ec8fa7f4005fa5409c0162ebd99bd18c38ce5da8677495
SHA5126cf9fb7a01be5a725628bc2ad3cf02e40ff146870cc491f970af15fad44072bbf18c43abef5385ef88c509ca81fa48233cbdaac09c4e98823ed5134caf1001b2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin
Filesize13KB
MD5b19a7027697b3e01d3d5b82e0bec645c
SHA1716c2c92b90f280cda522d987f58a0f2c8f09dcb
SHA2562470f912e0f3d628f8d92636efe28b7ed5e2cd71809c3173a040648771f3e074
SHA512cd3f63fa7aebb2428a0525138fe900914473df3c6d3283e26683ba629713d4acfe00f70c358cb91e3136cbf37c6c11d2cf55334dee772fdbd58d5f0644481a4b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.bin
Filesize23KB
MD5819f58ebb723612dbe4541ca86f12afa
SHA1754854b3250791a6152d0e3ab4ec0b8d7ee228fe
SHA25673b457d46f433e238acad5fac5188f62587657ff003f9dd43aa56b004ba9e865
SHA51262388e27c2d376639d71019c93c816b8a1e1616cc3a75965adb367c4db40a5b2f17e1182f35fe6252df1d55273ae9c904dc304ad8c0bdffb44e5bcab099b2e20
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.bin
Filesize6KB
MD5a267795f891f5f4cd66d7472ef44f5e3
SHA10cd06944243572dfa710c850209ec2768df30f4a
SHA256cc45f03117259b775bbd620ce6ad93ef9bbbe8a3d95c697778077f18aeb00223
SHA512c889134246abb3de1b00a69b23b565fd0150a541e02be22d0b6f5f48c592be48b4baebcaff35e12ee28680a8e383ba43a73d8998847307b3fbeb1c68d0d82c60
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.bin
Filesize15KB
MD5d0e5f9b25bf2bdbf19e59ab8ad228621
SHA17891db850fefba6c8bf1d7722f5563ac3e162113
SHA25624cfd1dc50d64d0f252a99d8a53d8d8144e0904d191fc64a492a56ace97d9dab
SHA512375a63bf66c309d48561cf2f7d08da8198a1386e8072e59526eba21d46ac1c5e31831be1d650f25652b029514edbbe5afaca392c695642f851d04e1cc7ed53e4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.bin
Filesize5KB
MD5060199123bab6a3126e33db010dc52ed
SHA18b1fdc94885ed61f2abf096440c0ef7fd17979d3
SHA2562a60392073915da5ca282ba92f23a52e8a74fc1b838837f6755bc836b7a92c4e
SHA512628363e11cd77b1a3646be6f2e5238b3b5583f8054de0518ee5e1d5077ec7e0a1bf5acbb51f448ef7805d8593c7c24acfb2240ae4d4ff2b3ffda33d0f16f68cc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5f7c67c564ed0ea452802c2b9001c6037
SHA12104741dcc120c8047110f7029b787ce7d99c22c
SHA25685116da5df406eab26e36757eea824340f884729ba0bdbf7ce26b6f6454b92ac
SHA5127e881466695669e4853cc92fb938558ddd9c13f63422f2ddf73babc0fdaacdf97ed6410cddf4b11b62f7a9a0095232af0bd8aea16244261611f2f84cb389b1b7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5b28ceefe7e2661123487a4d7cfa07db4
SHA181a4bc4a69e439e402c0fa0f70b64220fa9a48f4
SHA256c65779b118081beddbdbbd970fbb529fe2d8ddceb15fbb72505a173887d78baa
SHA51264e366d731f16ab9bfdc766c54cc0d677ee906c5dbfa566ea85e0a761e5e445eaf46890e534a89a3c7c7dd86385f01643f384ee5a08fff5e967eee2496b62440
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5a95ed29193e1bef0122a94713d42e5a0
SHA16e8bb9659dd692a8af917b4833005cede611990b
SHA256ec27683e36ee6ba0bb229e2c947b1c304d25cb67e2e104a864b2cc1792e28038
SHA512c67f759d85f336255bc74532392aea240e4689680aef8588d662a3a7b4ba264514b86aa126a3f60705a4207bb3bbb2b9ef1aec3e4ceb77eab54372a805fe292e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5c387a612dbda57c079c82f8f0307c366
SHA1af652963d32db7422778c61c88c99a38e58bd0d8
SHA256a3f622dc625747be711c7baf17716de4b51efdd78084fb90c5255b3e85f1e6bb
SHA512cc9477f5094c2309e762a57e093649b7ab418a13f7aefba73ecc2b29c53e12f375bd0d9ece705a90b862e221d8a5d1b2bd83c21238d28b3960ebcab74dc95a0a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5ec27b5aa1c87336814b708a96aa781c0
SHA13bbd1e8665f51269763dce6e08c725b1d84fab9d
SHA25639d61bf887c499298dfff3f8d88d264469b32f7094734ac963c32175db75d7ea
SHA512f51d12bdafce1227978945371df55170e66af91be274a8dca5ce8aa067acc2ee3579b852763428783a493e155f8620f5bec9bf74865e61670765b7ae06f0b490
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\3538e379-4bca-45e9-b243-fed4583d636a
Filesize671B
MD5f40d940631ab0f5714ca1ffc8d7ca48b
SHA1aaf8b60cd13a92d2edef01d04a2bde8fdf494bdc
SHA25650308ec2440dd61e8a7f21fa24d8f179c0bf83abbebfa8b517ce3e90ab3101b0
SHA512301dc7c91c39bd7d6672fb7acc8103dc7f3335f588a84055d5b860ecd7f63463d8d1506c5d604f235c7b2965da4b2024128b0d7243b32564cb2f89df58417d31
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\95e4739b-8c2c-48b0-b4b9-5fb1ba25a923
Filesize25KB
MD54815477672aab2928bfc4f428457b9b1
SHA17e6aeac6317586fc89853bd5ab4087abed2bad72
SHA256752d0ec1aa77fac5340d317b6e2a8f7a9631d9aa1a2e0d72ccda64614968cbb5
SHA512a3362f195d5fb367e8ec071e7af8b02fb1bdc01224ec7e5334249d41ad6d1bf49e6880005fe62da14bad47ae576d95230cd5a86afeca53521bb8770c61952971
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\fb7ea174-2340-4d37-99dd-fc47b3e1f926
Filesize982B
MD5debf96fb021ed26aeec10c76f874fca5
SHA189a24f42060984fad2bdefc7d42354cbf0edff30
SHA25655fdee39b9dcf656910d228f649438226bc9b9503b17c2372110a72f946a0805
SHA51209b25200a6e660157b8df844eb9fbcb90d358d90c81fb816511e0e187503aeff1c01bc9dc8de5a32c32babecca1759a420a37a7f3a96720cce4a5fbc9c2269b7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
11KB
MD5029ca177dc32549483524f94b7591dda
SHA146320936db7cfb9457b227b1f986eb54400daa4a
SHA2569cb9f084775018c5088578b66416636cead72836ac2424b3c85d6f94ae626901
SHA5124afee80b648823bae3950506532d0ef72efd92e88fd9dafddbd00082d9f040520dfca83e086ae3e2fd8f9113814de81b376cf7e3e1d9d62580e54ed4bace5fa6
-
Filesize
15KB
MD5bd7dc5554192aff87f0f45affde5d8e9
SHA1c1e9f5d626782e88b4c06d2e64cc91ce46f1554e
SHA256d15fb57b87a76e98fe40d0e2c2f1008e24fe57fa06f767e3448520728e9aaf93
SHA51240775e1423374715178007857495ede94ec123d342957dc52da1d6704832b5ea678843aa2b84dfc3bda97b4881c77e67140befa8655dfa3b3eaece2e6fd54226
-
Filesize
10KB
MD5dc307b2a940db63c3de2690062ba9911
SHA1fed5f9b50058053cf4c88be66d970c777493f5c3
SHA256fe89fc3f4fb99f109e1b46ce01ad5cac4b1be72d071b4b903f9a10490fe180ae
SHA5125a0db1ffc11baf64c7a119803339cd664806b0a0b0e6de01add451bf6586d0b03209d1c1097acf145554c8241b0b194fbc5a76489474a7ba413669f752cb5d2f