Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26/11/2024, 18:43
Static task
static1
General
-
Target
cd0973917f80520e71b932aa1c2ac651794b4da6ba5cb85de4e8910783d35690.exe
-
Size
1.9MB
-
MD5
ee9c5875f526c3f44381beb36b6eaa62
-
SHA1
423ea51703796def5f3449b68c8bc62298187766
-
SHA256
cd0973917f80520e71b932aa1c2ac651794b4da6ba5cb85de4e8910783d35690
-
SHA512
516a491737a3983832e22659f2df44f88d2dd172fa142bf41282c2b56d12b7ac90147b6786491a0dbb77d18c71d1ae6b24bd0236530671e866b9a9fbdd12ee86
-
SSDEEP
49152:A1t85yCgjs/XJlrig6LfarKLYoorkGNlaK1C4:1Ajsv/rigDrKxorpna3
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://powerful-avoids.sbs
https://motion-treesz.sbs
https://disobey-curly.sbs
https://leg-sate-boat.sbs
https://story-tense-faz.sbs
https://blade-govern.sbs
https://occupy-blushi.sbs
https://frogs-severz.sbs
https://push-hook.cyou
https://property-imper.sbs
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://push-hook.cyou/api
https://blade-govern.sbs/api
https://story-tense-faz.sbs/api
https://disobey-curly.sbs/api
https://motion-treesz.sbs/api
https://powerful-avoids.sbs/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 59a55e3bd6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 59a55e3bd6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 59a55e3bd6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 59a55e3bd6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 59a55e3bd6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 59a55e3bd6.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ cd0973917f80520e71b932aa1c2ac651794b4da6ba5cb85de4e8910783d35690.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ cfc35c9f15.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 77f9761990.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 59a55e3bd6.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 2384 chrome.exe 896 chrome.exe 1700 chrome.exe 3052 chrome.exe -
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cd0973917f80520e71b932aa1c2ac651794b4da6ba5cb85de4e8910783d35690.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 77f9761990.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cd0973917f80520e71b932aa1c2ac651794b4da6ba5cb85de4e8910783d35690.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cfc35c9f15.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cfc35c9f15.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 77f9761990.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 59a55e3bd6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 59a55e3bd6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Executes dropped EXE 10 IoCs
pid Process 2920 skotes.exe 1132 vg9qcBa.exe 2892 vg9qcBa.exe 484 DPQSEDd.exe 2196 DPQSEDd.exe 1372 VBVEd6f.exe 2772 cfc35c9f15.exe 2420 77f9761990.exe 568 7cab0556f4.exe 796 59a55e3bd6.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine cd0973917f80520e71b932aa1c2ac651794b4da6ba5cb85de4e8910783d35690.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine cfc35c9f15.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine 77f9761990.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine 59a55e3bd6.exe -
Loads dropped DLL 14 IoCs
pid Process 2176 cd0973917f80520e71b932aa1c2ac651794b4da6ba5cb85de4e8910783d35690.exe 2176 cd0973917f80520e71b932aa1c2ac651794b4da6ba5cb85de4e8910783d35690.exe 2920 skotes.exe 2920 skotes.exe 1132 vg9qcBa.exe 2920 skotes.exe 2920 skotes.exe 484 DPQSEDd.exe 2920 skotes.exe 2920 skotes.exe 2920 skotes.exe 2920 skotes.exe 2920 skotes.exe 2920 skotes.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 59a55e3bd6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 59a55e3bd6.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\59a55e3bd6.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009350001\\59a55e3bd6.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\cfc35c9f15.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009347001\\cfc35c9f15.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\77f9761990.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009348001\\77f9761990.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\7cab0556f4.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009349001\\7cab0556f4.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000700000001659b-365.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 2176 cd0973917f80520e71b932aa1c2ac651794b4da6ba5cb85de4e8910783d35690.exe 2920 skotes.exe 2772 cfc35c9f15.exe 2420 77f9761990.exe 796 59a55e3bd6.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1132 set thread context of 2892 1132 vg9qcBa.exe 34 PID 484 set thread context of 2196 484 DPQSEDd.exe 37 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job cd0973917f80520e71b932aa1c2ac651794b4da6ba5cb85de4e8910783d35690.exe -
pid Process 3448 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 19 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cd0973917f80520e71b932aa1c2ac651794b4da6ba5cb85de4e8910783d35690.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vg9qcBa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cfc35c9f15.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7cab0556f4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vg9qcBa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DPQSEDd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VBVEd6f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 77f9761990.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DPQSEDd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 59a55e3bd6.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 VBVEd6f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString VBVEd6f.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4040 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Kills process with taskkill 5 IoCs
pid Process 2560 taskkill.exe 2100 taskkill.exe 1636 taskkill.exe 484 taskkill.exe 1672 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_Classes\Local Settings firefox.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 190000000100000010000000ba4f3972e7aed9dccdc210db59da13c90300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc251d00000001000000100000008f76b981d528ad4770088245e2031b630b0000000100000012000000440069006700690043006500720074000000140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc35300000001000000230000003021301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703080f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a82000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a DPQSEDd.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 DPQSEDd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 DPQSEDd.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 DPQSEDd.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 2176 cd0973917f80520e71b932aa1c2ac651794b4da6ba5cb85de4e8910783d35690.exe 2920 skotes.exe 2772 cfc35c9f15.exe 1372 VBVEd6f.exe 1372 VBVEd6f.exe 2420 77f9761990.exe 2384 chrome.exe 2384 chrome.exe 568 7cab0556f4.exe 1372 VBVEd6f.exe 796 59a55e3bd6.exe 568 7cab0556f4.exe 796 59a55e3bd6.exe 796 59a55e3bd6.exe 3448 powershell.exe -
Suspicious use of AdjustPrivilegeToken 21 IoCs
description pid Process Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeDebugPrivilege 484 taskkill.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeDebugPrivilege 1672 taskkill.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeDebugPrivilege 2560 taskkill.exe Token: SeDebugPrivilege 2100 taskkill.exe Token: SeDebugPrivilege 1636 taskkill.exe Token: SeDebugPrivilege 2084 firefox.exe Token: SeDebugPrivilege 2084 firefox.exe Token: SeDebugPrivilege 796 59a55e3bd6.exe Token: SeDebugPrivilege 3448 powershell.exe -
Suspicious use of FindShellTrayWindow 50 IoCs
pid Process 2176 cd0973917f80520e71b932aa1c2ac651794b4da6ba5cb85de4e8910783d35690.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 568 7cab0556f4.exe 568 7cab0556f4.exe 568 7cab0556f4.exe 568 7cab0556f4.exe 568 7cab0556f4.exe 568 7cab0556f4.exe 568 7cab0556f4.exe 568 7cab0556f4.exe 568 7cab0556f4.exe 2084 firefox.exe 2084 firefox.exe 2084 firefox.exe 2084 firefox.exe 568 7cab0556f4.exe 568 7cab0556f4.exe -
Suspicious use of SendNotifyMessage 14 IoCs
pid Process 568 7cab0556f4.exe 568 7cab0556f4.exe 568 7cab0556f4.exe 568 7cab0556f4.exe 568 7cab0556f4.exe 568 7cab0556f4.exe 568 7cab0556f4.exe 568 7cab0556f4.exe 568 7cab0556f4.exe 2084 firefox.exe 2084 firefox.exe 2084 firefox.exe 568 7cab0556f4.exe 568 7cab0556f4.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2176 wrote to memory of 2920 2176 cd0973917f80520e71b932aa1c2ac651794b4da6ba5cb85de4e8910783d35690.exe 30 PID 2176 wrote to memory of 2920 2176 cd0973917f80520e71b932aa1c2ac651794b4da6ba5cb85de4e8910783d35690.exe 30 PID 2176 wrote to memory of 2920 2176 cd0973917f80520e71b932aa1c2ac651794b4da6ba5cb85de4e8910783d35690.exe 30 PID 2176 wrote to memory of 2920 2176 cd0973917f80520e71b932aa1c2ac651794b4da6ba5cb85de4e8910783d35690.exe 30 PID 2920 wrote to memory of 1132 2920 skotes.exe 32 PID 2920 wrote to memory of 1132 2920 skotes.exe 32 PID 2920 wrote to memory of 1132 2920 skotes.exe 32 PID 2920 wrote to memory of 1132 2920 skotes.exe 32 PID 1132 wrote to memory of 2892 1132 vg9qcBa.exe 34 PID 1132 wrote to memory of 2892 1132 vg9qcBa.exe 34 PID 1132 wrote to memory of 2892 1132 vg9qcBa.exe 34 PID 1132 wrote to memory of 2892 1132 vg9qcBa.exe 34 PID 1132 wrote to memory of 2892 1132 vg9qcBa.exe 34 PID 1132 wrote to memory of 2892 1132 vg9qcBa.exe 34 PID 1132 wrote to memory of 2892 1132 vg9qcBa.exe 34 PID 1132 wrote to memory of 2892 1132 vg9qcBa.exe 34 PID 1132 wrote to memory of 2892 1132 vg9qcBa.exe 34 PID 1132 wrote to memory of 2892 1132 vg9qcBa.exe 34 PID 1132 wrote to memory of 2892 1132 vg9qcBa.exe 34 PID 2920 wrote to memory of 484 2920 skotes.exe 35 PID 2920 wrote to memory of 484 2920 skotes.exe 35 PID 2920 wrote to memory of 484 2920 skotes.exe 35 PID 2920 wrote to memory of 484 2920 skotes.exe 35 PID 484 wrote to memory of 2196 484 DPQSEDd.exe 37 PID 484 wrote to memory of 2196 484 DPQSEDd.exe 37 PID 484 wrote to memory of 2196 484 DPQSEDd.exe 37 PID 484 wrote to memory of 2196 484 DPQSEDd.exe 37 PID 484 wrote to memory of 2196 484 DPQSEDd.exe 37 PID 484 wrote to memory of 2196 484 DPQSEDd.exe 37 PID 484 wrote to memory of 2196 484 DPQSEDd.exe 37 PID 484 wrote to memory of 2196 484 DPQSEDd.exe 37 PID 484 wrote to memory of 2196 484 DPQSEDd.exe 37 PID 484 wrote to memory of 2196 484 DPQSEDd.exe 37 PID 484 wrote to memory of 2196 484 DPQSEDd.exe 37 PID 2920 wrote to memory of 1372 2920 skotes.exe 38 PID 2920 wrote to memory of 1372 2920 skotes.exe 38 PID 2920 wrote to memory of 1372 2920 skotes.exe 38 PID 2920 wrote to memory of 1372 2920 skotes.exe 38 PID 2920 wrote to memory of 2772 2920 skotes.exe 40 PID 2920 wrote to memory of 2772 2920 skotes.exe 40 PID 2920 wrote to memory of 2772 2920 skotes.exe 40 PID 2920 wrote to memory of 2772 2920 skotes.exe 40 PID 1372 wrote to memory of 2384 1372 VBVEd6f.exe 41 PID 1372 wrote to memory of 2384 1372 VBVEd6f.exe 41 PID 1372 wrote to memory of 2384 1372 VBVEd6f.exe 41 PID 1372 wrote to memory of 2384 1372 VBVEd6f.exe 41 PID 2920 wrote to memory of 2420 2920 skotes.exe 42 PID 2920 wrote to memory of 2420 2920 skotes.exe 42 PID 2920 wrote to memory of 2420 2920 skotes.exe 42 PID 2920 wrote to memory of 2420 2920 skotes.exe 42 PID 2384 wrote to memory of 1588 2384 chrome.exe 43 PID 2384 wrote to memory of 1588 2384 chrome.exe 43 PID 2384 wrote to memory of 1588 2384 chrome.exe 43 PID 2384 wrote to memory of 2400 2384 chrome.exe 44 PID 2384 wrote to memory of 2400 2384 chrome.exe 44 PID 2384 wrote to memory of 2400 2384 chrome.exe 44 PID 2384 wrote to memory of 2432 2384 chrome.exe 46 PID 2384 wrote to memory of 2432 2384 chrome.exe 46 PID 2384 wrote to memory of 2432 2384 chrome.exe 46 PID 2384 wrote to memory of 2432 2384 chrome.exe 46 PID 2384 wrote to memory of 2432 2384 chrome.exe 46 PID 2384 wrote to memory of 2432 2384 chrome.exe 46 PID 2384 wrote to memory of 2432 2384 chrome.exe 46 PID 2384 wrote to memory of 2432 2384 chrome.exe 46 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\cd0973917f80520e71b932aa1c2ac651794b4da6ba5cb85de4e8910783d35690.exe"C:\Users\Admin\AppData\Local\Temp\cd0973917f80520e71b932aa1c2ac651794b4da6ba5cb85de4e8910783d35690.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\1009238001\vg9qcBa.exe"C:\Users\Admin\AppData\Local\Temp\1009238001\vg9qcBa.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Users\Admin\AppData\Local\Temp\1009238001\vg9qcBa.exe"C:\Users\Admin\AppData\Local\Temp\1009238001\vg9qcBa.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2892
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009278001\DPQSEDd.exe"C:\Users\Admin\AppData\Local\Temp\1009278001\DPQSEDd.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:484 -
C:\Users\Admin\AppData\Local\Temp\1009278001\DPQSEDd.exe"C:\Users\Admin\AppData\Local\Temp\1009278001\DPQSEDd.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies system certificate store
PID:2196
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009342001\VBVEd6f.exe"C:\Users\Admin\AppData\Local\Temp\1009342001\VBVEd6f.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7b29758,0x7fef7b29768,0x7fef7b297785⤵PID:1588
-
-
C:\Windows\system32\ctfmon.exectfmon.exe5⤵PID:2400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1084 --field-trial-handle=1140,i,16051129509288299659,4497317525837561109,131072 /prefetch:25⤵PID:2432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1484 --field-trial-handle=1140,i,16051129509288299659,4497317525837561109,131072 /prefetch:85⤵PID:2456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1524 --field-trial-handle=1140,i,16051129509288299659,4497317525837561109,131072 /prefetch:85⤵PID:1772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2336 --field-trial-handle=1140,i,16051129509288299659,4497317525837561109,131072 /prefetch:15⤵
- Uses browser remote debugging
PID:896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2348 --field-trial-handle=1140,i,16051129509288299659,4497317525837561109,131072 /prefetch:15⤵
- Uses browser remote debugging
PID:1700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1152 --field-trial-handle=1140,i,16051129509288299659,4497317525837561109,131072 /prefetch:25⤵PID:1272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9223 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1428 --field-trial-handle=1140,i,16051129509288299659,4497317525837561109,131072 /prefetch:15⤵
- Uses browser remote debugging
PID:3052
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\1009342001\VBVEd6f.exe" & rd /s /q "C:\ProgramData\BAECFCAAECBG" & exit4⤵
- System Location Discovery: System Language Discovery
PID:4004 -
C:\Windows\SysWOW64\timeout.exetimeout /t 105⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4040
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009347001\cfc35c9f15.exe"C:\Users\Admin\AppData\Local\Temp\1009347001\cfc35c9f15.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2772
-
-
C:\Users\Admin\AppData\Local\Temp\1009348001\77f9761990.exe"C:\Users\Admin\AppData\Local\Temp\1009348001\77f9761990.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2420
-
-
C:\Users\Admin\AppData\Local\Temp\1009349001\7cab0556f4.exe"C:\Users\Admin\AppData\Local\Temp\1009349001\7cab0556f4.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:568 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:484
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1672
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2560
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2100
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1636
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:2092
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2084 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2084.0.366250621\150694296" -parentBuildID 20221007134813 -prefsHandle 1216 -prefMapHandle 1208 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {540c6a22-2b91-45ad-bbd7-49d21d88208d} 2084 "\\.\pipe\gecko-crash-server-pipe.2084" 1296 4cd7b58 gpu6⤵PID:2588
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2084.1.105204649\583192666" -parentBuildID 20221007134813 -prefsHandle 1484 -prefMapHandle 1480 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {6d1cadc1-dff6-40e3-bf73-8359631fdd94} 2084 "\\.\pipe\gecko-crash-server-pipe.2084" 1496 47f9258 socket6⤵PID:2028
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2084.2.1670735498\737598524" -childID 1 -isForBrowser -prefsHandle 1972 -prefMapHandle 1968 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 804 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {716662ea-1e30-4f37-8640-5cd3fb74f444} 2084 "\\.\pipe\gecko-crash-server-pipe.2084" 1984 18c56458 tab6⤵PID:2228
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2084.3.2107100814\2077616179" -childID 2 -isForBrowser -prefsHandle 2808 -prefMapHandle 2804 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 804 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {30d3044a-b873-4281-b544-3da17f67e330} 2084 "\\.\pipe\gecko-crash-server-pipe.2084" 2820 e63258 tab6⤵PID:604
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2084.4.1057605138\1737539783" -childID 3 -isForBrowser -prefsHandle 3516 -prefMapHandle 3632 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 804 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a3a03a03-1a05-4784-b44e-87c427edb177} 2084 "\\.\pipe\gecko-crash-server-pipe.2084" 3652 1b69f858 tab6⤵PID:1308
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2084.5.1474057963\1993082842" -childID 4 -isForBrowser -prefsHandle 3900 -prefMapHandle 3844 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 804 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {1566866c-42d1-42de-923b-da5f76e72243} 2084 "\\.\pipe\gecko-crash-server-pipe.2084" 3888 1edfac58 tab6⤵PID:2912
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2084.6.668019255\1452645665" -childID 5 -isForBrowser -prefsHandle 3944 -prefMapHandle 3948 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 804 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {db05b35f-dd7b-4137-a73d-7970c51a8b27} 2084 "\\.\pipe\gecko-crash-server-pipe.2084" 3932 1f7f5158 tab6⤵PID:1012
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009350001\59a55e3bd6.exe"C:\Users\Admin\AppData\Local\Temp\1009350001\59a55e3bd6.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:796
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1009351041\PeRVAzl.ps1"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3448
-
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2868
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5923ac9c28f23db397197bf1ccca0f998
SHA16d998e49c8ba7ecef16b30a18c76d9abc8a47afe
SHA2561dd79dfcd6847b91dabbbb9645fe1c18b275e4a2e768678b7159977143646881
SHA51271ef4b99c3760843fd9b455cf666202e8e4467d0c21b2fee88276fb8f78426d4e90dad45db13184273994c478f87d79bc281e5e66a0e88da9beb590e71de9958
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\1009pdhg.default-release\activity-stream.discovery_stream.json.tmp
Filesize23KB
MD57df51c54ec99a834d55ede81dbb8e760
SHA1565f3461820443482de478370d1b49671f1ee395
SHA256bad96f51881c8b9c47de947e1d1364b851f7a11a68598613356ff4ee008107db
SHA512bffd7d4cffce4b07d8f76fb25f6e618e1117f04ea1eea1ac9d4a985e954d32e8deb4b4496b24d29ab1b979b10f37cc03ef27648b8e3596f84dbd37175ddc57cc
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\1009pdhg.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize13KB
MD5f99b4984bd93547ff4ab09d35b9ed6d5
SHA173bf4d313cb094bb6ead04460da9547106794007
SHA256402571262fd1f6dca336f822ceb0ec2a368a25dfe2f4bfa13b45c983e88b6069
SHA512cd0ed84a24d3faae94290aca1b5ef65eef4cfba8a983da9f88ee3268fc611484a72bd44ca0947c0ca8de174619debae4604e15e4b2c364e636424ba1d37e1759
-
Filesize
460KB
MD520160349422aeb131ed9da71a82eb7ab
SHA1bb01e4225a1e1797c9b5858d0edf063d5f8bc44f
SHA256d8f6ce51eba058276c4722747655b68711682afc5654414e8c195ada38fdc0ea
SHA512907f3f61ac9ebeda534b3a330fd8673e8d09b243847b6a7a8d8d30f74ba8c699eafb8338a8d4f36824871609c1f226cb4db1e4a931fdf312f0e4331e7110c6b8
-
Filesize
454KB
MD5cc6b5731656f98ad704116a9fe2273a9
SHA103613e84b097dd060ebbc08f6607dbc3f3b9f8ab
SHA2567eed6c0395e80b99b3c44c3b8c0ad67195889d352440a5064e37c1f0335b2047
SHA512b97f03b854483c395e516031b65f4a0524f83afbbc81bb4b28f664b918dbc774a201692a1e8db976ec0dc779d218a537096c939bc560e2e9ddd51d94f1ed8f78
-
Filesize
409KB
MD54ea576c1e8f58201fd4219a86665eaa9
SHA1efaf3759b04ee0216254cf07095d52b110c7361f
SHA256d94206d9509cc47cae22c94d32658b31cf65c37b1b15ce035ffaa5ce5872ad2f
SHA5120c7462bc590d06f0ead37246f189d4d56e1d62ff73f67bf7e2ce9c653d8c56812a5f1306fb504168f7e33b87485c3465ea921a36f1ba5b458d7763e45c649494
-
Filesize
1.8MB
MD5b7f493cfc8681282fffbb4ed0813a470
SHA17886d311595a551786307a1542fbef74265ba88a
SHA2563cffd3d15cacfae9a60ad6bf2ddde8468f07a852402004d3bc8043b2489f7953
SHA512535073ab85d9a46a8addd6027e79d4778fa1453f6d903763e18e429b1cb513de1b60fb410bc320d7de1a91f8c36ed68a9037b87300b4f8900f74523e971410cc
-
Filesize
1.7MB
MD57b61c4450718e164ef24eeaa347876b3
SHA17dd322d0cbd66ba5732421c0829b9de2ca93c3a8
SHA25612118dc0b2fdfab013e7bb8c8d2f8525fe09d738f82277811cb8ba6515b9c012
SHA5126b0e3e61fb0dcada99996b3a30a6880c18b9a222a95d46a9008fd1fb6a7c5df8a43fd430fd4c0880a0422ec1d0ec29fd28e566f13e24ccbf3c027fd2306be6ee
-
Filesize
900KB
MD5a0d1214ba1254d5dca56019d11a0a976
SHA130d3ff7e65692cd508b405f1d77e96f1966ae136
SHA2567e946b1e07623c3ac39a2817005ba210e03eaf73915fb7ce9154b173b4ec2952
SHA512f3009d805052dba31b37416e1d9240f4346b2fdd6837cb88e83fc7290e93bfb051d4082ac9d932c822ca9123e0b3a0474b0b3539388597c3b4bfe8cca6338317
-
Filesize
2.7MB
MD5001dc471304f4f1354481eacb1031ea3
SHA1baca1efe61f33f844e0caa8358530145a06552eb
SHA2567a6a153188b87ecfb8522cf13e699ef379771ab90e3228f99a09900517680e42
SHA512bc52a593234d443a06f2bd8f5405a07ba0daeb6f59c66efb332b7e9a90a210ab2ce5b3ea6b99fed7022f87256cb4a768a36e4f3d1b54387847fd5a6c75d59bd3
-
Filesize
3.0MB
MD52b918bf4566595e88a664111ce48b161
SHA1e32fbdf64bb71dc870bfad9bbd571f11c6a723f4
SHA25648492827286d403668996ae3814b2216b3b616f2fb4af2022bf3d2fc3f979a26
SHA512e3d58adbe13befe91fb950cc52b16d6d2fcb8f6d65bab4020222713207b07ce78b76e2e2532cf3de23149e934ba1e1cb9046a95a18424a668bfa4a355af6f44a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
442KB
MD585430baed3398695717b0263807cf97c
SHA1fffbee923cea216f50fce5d54219a188a5100f41
SHA256a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA51206511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1
-
Filesize
8.0MB
MD5a01c5ecd6108350ae23d2cddf0e77c17
SHA1c6ac28a2cd979f1f9a75d56271821d5ff665e2b6
SHA256345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42
SHA512b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD5b884f81706e9e3aab13eda55d05f9656
SHA1d9d5551b8c50b4e6147b99c576fa60305b9feb9f
SHA2561bd8ec140f3b6f2d27a73a059677d33cd5888d7e3d83ecff4e9c2ea9b2285f24
SHA512de99b34288a2e06130805b6ee848be0f794d3fee69cc1956da49436bc56d27b77404bebacfb7fe6c634ef25fc7bec8b69f222f9c969c872ad157af13b63aa851
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\datareporting\glean\pending_pings\af14ee2b-0b8a-45ff-9140-b9eebe6f026e
Filesize10KB
MD53d0769bea8d4118d9ce40e4f043aad9d
SHA1c36ae7cfe41f90b4badea58b5ceaa7d84f772f91
SHA25650f0118fd4f8c6d0d2faa0405934793964e73420be9d95c60aaad28511553281
SHA5123c491c6dcdc469b593ad41845a1d727ed9c9b3436c15dd9d2aecc17bd59b2f9ab7f527a21fdedc927f5c49d43e0dbe009eff29337806dd1de9396d284cfb5636
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\datareporting\glean\pending_pings\e5762875-346d-48b1-99c3-0afb9d451b15
Filesize745B
MD53c216a8bfa112aeef56337784842557c
SHA131d29d531b0a42acefade9d1a4bbdcd4c9083b00
SHA256a24ed90c3577f40ac5994816e9a5e5c3a3f558384c8c2d14325224acac472b1c
SHA512aaf0e94a64d113e8fb7d2326d7282e892b991ab8b2ebc2d7d79e4ecf75c266453eac97590cfadf81651e2f051e7a3b1483b4e42a5336fa82c98cf19cb6e157e9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll
Filesize997KB
MD5fe3355639648c417e8307c6d051e3e37
SHA1f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA2561ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA5128f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info
Filesize116B
MD53d33cdc0b3d281e67dd52e14435dd04f
SHA14db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json
Filesize372B
MD58be33af717bb1b67fbd61c3f4b807e9e
SHA17cf17656d174d951957ff36810e874a134dd49e0
SHA256e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd
SHA5126125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll
Filesize11.8MB
MD533bf7b0439480effb9fb212efce87b13
SHA1cee50f2745edc6dc291887b6075ca64d716f495a
SHA2568ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e
SHA512d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig
Filesize1KB
MD5937326fead5fd401f6cca9118bd9ade9
SHA14526a57d4ae14ed29b37632c72aef3c408189d91
SHA25668a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81
SHA512b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2
-
Filesize
7KB
MD58352a84dbbb4938dbaad6bc15da72b14
SHA1dc7559cf3e6eee1a55e00ae70cb2d8199b1cdb1d
SHA2562f9828b69c6a4f86f4351284e994668c96c84e8942f09e7a2e3640ef73557a0c
SHA512f7d94a19c446977f2c060f5f443164727bbb7b6fddda005fbc934cb7e744daded6979b427d012ae65f4aa5831dcda7a61503005af8b6d8d67a0e333a98b9e738
-
Filesize
7KB
MD53d31ca634f27b0d51b33d8c0595a1b00
SHA1d7da54afc95dd9a8880ba8ded06560f328623de8
SHA25610c0ac9af844efe397fb66e99009279cd86496cf789d160870b71dcffef9b7d1
SHA5124408af781cf1cb65a67732fd684605b6caebd0da2bb62bdd361c2c6fb8b6a3cbe0adafb230a68ef7db8819470ec3410d0458edb5374796c71f31804bec326090
-
Filesize
6KB
MD5771b21068ad78a414d0369a902e01541
SHA1fc5425a231de6ed169f45dbbe66b71184b53448f
SHA2563a628bb2287a0cc6743c6387b5b64c47585c0da01f82656611b4c87b3ee180ff
SHA5123f308586b32e7ec468defba6b6f2f3091f20353cd7fb4b00e39631904f546e93100bc625de091a3ca3b169a531d62b4ba65e81cc4ea4b1c93f9f9e1a6a71cdb7
-
Filesize
6KB
MD51354327e5b0713a9fa7f788d538f0ad5
SHA10021a25f982911c553d7ed8a9f8aadd2b6657c36
SHA256ed1786ff1731e824542e509f8faf0bab9adb0caeb4238f224ac55d0d60b680cc
SHA51219a81b797f7570b72bf38c926b04d0b77bde727de129b2ee6a19a03471e58fc73b9c1f5d4fd61974e9008c4630191f6599b2cc106e9e2ebc8dddc504ccfc74bb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD59971c152c1008d6a2ae9f99af86a0adb
SHA12dac27bc24dd3701033c4a5d899c9185957c6577
SHA25619b387f32ef02afe32db25e5ca9c3179e7a2fc50d473482f1ac63a1ceb9ae7e8
SHA512b7bdb975a1a75ca9b6d88f58b383b85a5d308fb863d48784d693a8d611a024a95a1c24190155aac6e9d06791cb871cc9d720661637f78bf797067e5ea5795bc0
-
Filesize
1.9MB
MD5ee9c5875f526c3f44381beb36b6eaa62
SHA1423ea51703796def5f3449b68c8bc62298187766
SHA256cd0973917f80520e71b932aa1c2ac651794b4da6ba5cb85de4e8910783d35690
SHA512516a491737a3983832e22659f2df44f88d2dd172fa142bf41282c2b56d12b7ac90147b6786491a0dbb77d18c71d1ae6b24bd0236530671e866b9a9fbdd12ee86