Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2024 09:51
Static task
static1
General
-
Target
5a67aaf20520d4c44b4dc31004ca6aeb05a96e6052e147e72a51e4b2a90b0fbb.exe
-
Size
7.2MB
-
MD5
e46dab6fa287a83e3580dafe8eb2d793
-
SHA1
c2665aed14674a0efb6a4558335677a0e8aff237
-
SHA256
5a67aaf20520d4c44b4dc31004ca6aeb05a96e6052e147e72a51e4b2a90b0fbb
-
SHA512
730088055183022af708bf9329a06d1247d86f43a66698bba17e009b8dbc9aaa94a2774630179cb6108e6e14179c56c107448afd9f04bafa206f0f083bcddb63
-
SSDEEP
196608:TmKkLsYQNi+njWa1TAOf9FaUzFkYfy/1ByksDgjiMHH7E4PonSWj4:TmZwHnCSTAOiUpvy/ryzgjhHH7E4QSW8
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://powerful-avoids.sbs
https://motion-treesz.sbs
https://disobey-curly.sbs
https://leg-sate-boat.sbs
https://story-tense-faz.sbs
https://blade-govern.sbs
https://occupy-blushi.sbs
https://frogs-severz.sbs
https://property-imper.sbs
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4T069G.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4T069G.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4T069G.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 29382b6c24.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 29382b6c24.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 29382b6c24.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4T069G.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4T069G.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4T069G.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 29382b6c24.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 29382b6c24.exe -
Stealc family
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF b2e082daae.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4T069G.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 410fd0b273.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 29382b6c24.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1q87o2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2L3031.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3Q87E.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b2e082daae.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8a4c0d085a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 22 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4T069G.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b2e082daae.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 29382b6c24.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1q87o2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2L3031.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3Q87E.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4T069G.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 410fd0b273.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8a4c0d085a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 29382b6c24.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1q87o2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3Q87E.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b2e082daae.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 410fd0b273.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8a4c0d085a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2L3031.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 1q87o2.exe -
Executes dropped EXE 14 IoCs
pid Process 3800 A8k29.exe 2748 u4m08.exe 1380 1q87o2.exe 4808 skotes.exe 2404 2L3031.exe 3676 3Q87E.exe 1824 4T069G.exe 1384 b2e082daae.exe 4644 410fd0b273.exe 2024 8a4c0d085a.exe 3876 434bd91cc4.exe 6796 29382b6c24.exe 3516 skotes.exe 5372 skotes.exe -
Identifies Wine through registry keys 2 TTPs 11 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine 2L3031.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine b2e082daae.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine 410fd0b273.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine 1q87o2.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine 4T069G.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine 8a4c0d085a.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine 29382b6c24.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine 3Q87E.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4T069G.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4T069G.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 29382b6c24.exe -
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" A8k29.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" u4m08.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\410fd0b273.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009575001\\410fd0b273.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\8a4c0d085a.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009576001\\8a4c0d085a.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\434bd91cc4.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009577001\\434bd91cc4.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\29382b6c24.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009578001\\29382b6c24.exe" skotes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5a67aaf20520d4c44b4dc31004ca6aeb05a96e6052e147e72a51e4b2a90b0fbb.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000b000000023b76-114.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
pid Process 1380 1q87o2.exe 4808 skotes.exe 2404 2L3031.exe 3676 3Q87E.exe 1824 4T069G.exe 1384 b2e082daae.exe 4644 410fd0b273.exe 2024 8a4c0d085a.exe 6796 29382b6c24.exe 3516 skotes.exe 5372 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1q87o2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 18 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2L3031.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4T069G.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b2e082daae.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language u4m08.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1q87o2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 29382b6c24.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A8k29.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 434bd91cc4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3Q87E.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8a4c0d085a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5a67aaf20520d4c44b4dc31004ca6aeb05a96e6052e147e72a51e4b2a90b0fbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 410fd0b273.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 3236 taskkill.exe 5016 taskkill.exe 3084 taskkill.exe 1332 taskkill.exe 3516 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 39 IoCs
pid Process 1380 1q87o2.exe 1380 1q87o2.exe 4808 skotes.exe 4808 skotes.exe 2404 2L3031.exe 2404 2L3031.exe 3676 3Q87E.exe 3676 3Q87E.exe 1824 4T069G.exe 1824 4T069G.exe 1824 4T069G.exe 1824 4T069G.exe 1384 b2e082daae.exe 1384 b2e082daae.exe 1384 b2e082daae.exe 1384 b2e082daae.exe 1384 b2e082daae.exe 1384 b2e082daae.exe 1384 b2e082daae.exe 1384 b2e082daae.exe 1384 b2e082daae.exe 1384 b2e082daae.exe 4644 410fd0b273.exe 4644 410fd0b273.exe 2024 8a4c0d085a.exe 2024 8a4c0d085a.exe 3876 434bd91cc4.exe 3876 434bd91cc4.exe 6796 29382b6c24.exe 6796 29382b6c24.exe 3876 434bd91cc4.exe 3876 434bd91cc4.exe 6796 29382b6c24.exe 6796 29382b6c24.exe 6796 29382b6c24.exe 3516 skotes.exe 3516 skotes.exe 5372 skotes.exe 5372 skotes.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 1824 4T069G.exe Token: SeDebugPrivilege 3236 taskkill.exe Token: SeDebugPrivilege 5016 taskkill.exe Token: SeDebugPrivilege 3084 taskkill.exe Token: SeDebugPrivilege 1332 taskkill.exe Token: SeDebugPrivilege 3516 taskkill.exe Token: SeDebugPrivilege 5004 firefox.exe Token: SeDebugPrivilege 5004 firefox.exe Token: SeDebugPrivilege 6796 29382b6c24.exe Token: SeDebugPrivilege 5004 firefox.exe Token: SeDebugPrivilege 5004 firefox.exe Token: SeDebugPrivilege 5004 firefox.exe -
Suspicious use of FindShellTrayWindow 32 IoCs
pid Process 1380 1q87o2.exe 3876 434bd91cc4.exe 3876 434bd91cc4.exe 3876 434bd91cc4.exe 3876 434bd91cc4.exe 3876 434bd91cc4.exe 3876 434bd91cc4.exe 5004 firefox.exe 5004 firefox.exe 5004 firefox.exe 5004 firefox.exe 5004 firefox.exe 5004 firefox.exe 5004 firefox.exe 5004 firefox.exe 5004 firefox.exe 5004 firefox.exe 5004 firefox.exe 5004 firefox.exe 5004 firefox.exe 5004 firefox.exe 5004 firefox.exe 5004 firefox.exe 5004 firefox.exe 5004 firefox.exe 5004 firefox.exe 5004 firefox.exe 5004 firefox.exe 3876 434bd91cc4.exe 3876 434bd91cc4.exe 3876 434bd91cc4.exe 3876 434bd91cc4.exe -
Suspicious use of SendNotifyMessage 30 IoCs
pid Process 3876 434bd91cc4.exe 3876 434bd91cc4.exe 3876 434bd91cc4.exe 3876 434bd91cc4.exe 3876 434bd91cc4.exe 3876 434bd91cc4.exe 5004 firefox.exe 5004 firefox.exe 5004 firefox.exe 5004 firefox.exe 5004 firefox.exe 5004 firefox.exe 5004 firefox.exe 5004 firefox.exe 5004 firefox.exe 5004 firefox.exe 5004 firefox.exe 5004 firefox.exe 5004 firefox.exe 5004 firefox.exe 5004 firefox.exe 5004 firefox.exe 5004 firefox.exe 5004 firefox.exe 5004 firefox.exe 5004 firefox.exe 3876 434bd91cc4.exe 3876 434bd91cc4.exe 3876 434bd91cc4.exe 3876 434bd91cc4.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5004 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2348 wrote to memory of 3800 2348 5a67aaf20520d4c44b4dc31004ca6aeb05a96e6052e147e72a51e4b2a90b0fbb.exe 82 PID 2348 wrote to memory of 3800 2348 5a67aaf20520d4c44b4dc31004ca6aeb05a96e6052e147e72a51e4b2a90b0fbb.exe 82 PID 2348 wrote to memory of 3800 2348 5a67aaf20520d4c44b4dc31004ca6aeb05a96e6052e147e72a51e4b2a90b0fbb.exe 82 PID 3800 wrote to memory of 2748 3800 A8k29.exe 83 PID 3800 wrote to memory of 2748 3800 A8k29.exe 83 PID 3800 wrote to memory of 2748 3800 A8k29.exe 83 PID 2748 wrote to memory of 1380 2748 u4m08.exe 84 PID 2748 wrote to memory of 1380 2748 u4m08.exe 84 PID 2748 wrote to memory of 1380 2748 u4m08.exe 84 PID 1380 wrote to memory of 4808 1380 1q87o2.exe 85 PID 1380 wrote to memory of 4808 1380 1q87o2.exe 85 PID 1380 wrote to memory of 4808 1380 1q87o2.exe 85 PID 2748 wrote to memory of 2404 2748 u4m08.exe 86 PID 2748 wrote to memory of 2404 2748 u4m08.exe 86 PID 2748 wrote to memory of 2404 2748 u4m08.exe 86 PID 3800 wrote to memory of 3676 3800 A8k29.exe 89 PID 3800 wrote to memory of 3676 3800 A8k29.exe 89 PID 3800 wrote to memory of 3676 3800 A8k29.exe 89 PID 2348 wrote to memory of 1824 2348 5a67aaf20520d4c44b4dc31004ca6aeb05a96e6052e147e72a51e4b2a90b0fbb.exe 92 PID 2348 wrote to memory of 1824 2348 5a67aaf20520d4c44b4dc31004ca6aeb05a96e6052e147e72a51e4b2a90b0fbb.exe 92 PID 2348 wrote to memory of 1824 2348 5a67aaf20520d4c44b4dc31004ca6aeb05a96e6052e147e72a51e4b2a90b0fbb.exe 92 PID 4808 wrote to memory of 1384 4808 skotes.exe 94 PID 4808 wrote to memory of 1384 4808 skotes.exe 94 PID 4808 wrote to memory of 1384 4808 skotes.exe 94 PID 4808 wrote to memory of 4644 4808 skotes.exe 97 PID 4808 wrote to memory of 4644 4808 skotes.exe 97 PID 4808 wrote to memory of 4644 4808 skotes.exe 97 PID 4808 wrote to memory of 2024 4808 skotes.exe 98 PID 4808 wrote to memory of 2024 4808 skotes.exe 98 PID 4808 wrote to memory of 2024 4808 skotes.exe 98 PID 4808 wrote to memory of 3876 4808 skotes.exe 99 PID 4808 wrote to memory of 3876 4808 skotes.exe 99 PID 4808 wrote to memory of 3876 4808 skotes.exe 99 PID 3876 wrote to memory of 3236 3876 434bd91cc4.exe 100 PID 3876 wrote to memory of 3236 3876 434bd91cc4.exe 100 PID 3876 wrote to memory of 3236 3876 434bd91cc4.exe 100 PID 3876 wrote to memory of 5016 3876 434bd91cc4.exe 102 PID 3876 wrote to memory of 5016 3876 434bd91cc4.exe 102 PID 3876 wrote to memory of 5016 3876 434bd91cc4.exe 102 PID 3876 wrote to memory of 3084 3876 434bd91cc4.exe 104 PID 3876 wrote to memory of 3084 3876 434bd91cc4.exe 104 PID 3876 wrote to memory of 3084 3876 434bd91cc4.exe 104 PID 3876 wrote to memory of 1332 3876 434bd91cc4.exe 106 PID 3876 wrote to memory of 1332 3876 434bd91cc4.exe 106 PID 3876 wrote to memory of 1332 3876 434bd91cc4.exe 106 PID 3876 wrote to memory of 3516 3876 434bd91cc4.exe 108 PID 3876 wrote to memory of 3516 3876 434bd91cc4.exe 108 PID 3876 wrote to memory of 3516 3876 434bd91cc4.exe 108 PID 3876 wrote to memory of 788 3876 434bd91cc4.exe 110 PID 3876 wrote to memory of 788 3876 434bd91cc4.exe 110 PID 788 wrote to memory of 5004 788 firefox.exe 111 PID 788 wrote to memory of 5004 788 firefox.exe 111 PID 788 wrote to memory of 5004 788 firefox.exe 111 PID 788 wrote to memory of 5004 788 firefox.exe 111 PID 788 wrote to memory of 5004 788 firefox.exe 111 PID 788 wrote to memory of 5004 788 firefox.exe 111 PID 788 wrote to memory of 5004 788 firefox.exe 111 PID 788 wrote to memory of 5004 788 firefox.exe 111 PID 788 wrote to memory of 5004 788 firefox.exe 111 PID 788 wrote to memory of 5004 788 firefox.exe 111 PID 788 wrote to memory of 5004 788 firefox.exe 111 PID 5004 wrote to memory of 1604 5004 firefox.exe 112 PID 5004 wrote to memory of 1604 5004 firefox.exe 112 PID 5004 wrote to memory of 1604 5004 firefox.exe 112 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a67aaf20520d4c44b4dc31004ca6aeb05a96e6052e147e72a51e4b2a90b0fbb.exe"C:\Users\Admin\AppData\Local\Temp\5a67aaf20520d4c44b4dc31004ca6aeb05a96e6052e147e72a51e4b2a90b0fbb.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\A8k29.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\A8k29.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u4m08.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u4m08.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1q87o2.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1q87o2.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\1009574001\b2e082daae.exe"C:\Users\Admin\AppData\Local\Temp\1009574001\b2e082daae.exe"6⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1384
-
-
C:\Users\Admin\AppData\Local\Temp\1009575001\410fd0b273.exe"C:\Users\Admin\AppData\Local\Temp\1009575001\410fd0b273.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4644
-
-
C:\Users\Admin\AppData\Local\Temp\1009576001\8a4c0d085a.exe"C:\Users\Admin\AppData\Local\Temp\1009576001\8a4c0d085a.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2024
-
-
C:\Users\Admin\AppData\Local\Temp\1009577001\434bd91cc4.exe"C:\Users\Admin\AppData\Local\Temp\1009577001\434bd91cc4.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3236
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5016
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3084
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1332
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3516
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵
- Suspicious use of WriteProcessMemory
PID:788 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2060 -parentBuildID 20240401114208 -prefsHandle 1984 -prefMapHandle 1976 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {54138fa6-a684-4db0-974a-2d6abd1ce816} 5004 "\\.\pipe\gecko-crash-server-pipe.5004" gpu9⤵PID:1604
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2492 -parentBuildID 20240401114208 -prefsHandle 2468 -prefMapHandle 2444 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d1e15673-848a-4673-8344-ba5dcb3c5b15} 5004 "\\.\pipe\gecko-crash-server-pipe.5004" socket9⤵PID:1868
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3272 -childID 1 -isForBrowser -prefsHandle 3252 -prefMapHandle 3256 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1300 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {75db523d-af85-43c4-977e-0674fbaf1f30} 5004 "\\.\pipe\gecko-crash-server-pipe.5004" tab9⤵PID:3964
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3032 -childID 2 -isForBrowser -prefsHandle 3688 -prefMapHandle 3684 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1300 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {face52c3-fffd-4a7f-9a66-0f222f04bdfb} 5004 "\\.\pipe\gecko-crash-server-pipe.5004" tab9⤵PID:1056
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4524 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4564 -prefMapHandle 4560 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9b2f592f-f09c-4d7c-b0e8-19a68a7a29a5} 5004 "\\.\pipe\gecko-crash-server-pipe.5004" utility9⤵
- Checks processor information in registry
PID:5732
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5416 -childID 3 -isForBrowser -prefsHandle 5404 -prefMapHandle 5428 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1300 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {37cd9d52-e7f5-447b-8d1a-42ed7d8f7418} 5004 "\\.\pipe\gecko-crash-server-pipe.5004" tab9⤵PID:6876
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5572 -childID 4 -isForBrowser -prefsHandle 5580 -prefMapHandle 5588 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1300 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cd11f9d5-2827-4500-8129-10fdb0c4c5c5} 5004 "\\.\pipe\gecko-crash-server-pipe.5004" tab9⤵PID:6888
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5764 -childID 5 -isForBrowser -prefsHandle 5772 -prefMapHandle 5780 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1300 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {007808cb-5c6a-4005-8a6b-a8f278dc4b5a} 5004 "\\.\pipe\gecko-crash-server-pipe.5004" tab9⤵PID:6900
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009578001\29382b6c24.exe"C:\Users\Admin\AppData\Local\Temp\1009578001\29382b6c24.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6796
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2L3031.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2L3031.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2404
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3Q87E.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3Q87E.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3676
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4T069G.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4T069G.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1824
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3516
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5372
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
3Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\n4zftpal.default-release\activity-stream.discovery_stream.json
Filesize24KB
MD57534cfdeb356663bc50f12521c73a489
SHA1668c7e5bfd133430f677a1ed2231274b87615f7f
SHA256e6f871cfc17ca84fb7b1d498b9166f98f21be33848203b3e29391bf29bb002fc
SHA512f57275bdeb143514ad26afe945ef760702e205a2731578c3b3a2bf8a795ab00feaf7b574060f96733bd07cfa6706cb88c90fe4ee5d433d9c1aa7dfaee06acd9f
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\n4zftpal.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD542f992216f7ad8db3086adea2a9fc4e0
SHA1c9dbddb642f67d77e4ebce7e23bd757936b01b28
SHA256a414234780b5acfbe6c3c39801a48c4d873bb97b7ad6fc73ef294f3f5a18a416
SHA51207ecc9943179e295128992b12ddc421aae69e30a508edeb1ecf7c20e42fb49feb329bcd4935a3c2eca3caa871f645cfed256e4c0cc84cb047f843319272bb89e
-
Filesize
4.2MB
MD53beab4cdfbfc8f7b3dee6ca2e71a7ebd
SHA19035de067ce4ead5c1a680f6dee46e74f7c2e785
SHA256adaf3c05363dec98316d49d41baccc7087de4a3571bd6cbf37461a3c2da142ca
SHA512437af0ee3ae26a555e88ac33591acc779f751cbc6ed3b80743b36c465c5ec2e96b46a303d3ad789a2b5772216c68410201b60852147296126ddedb7e84d7ded4
-
Filesize
1.8MB
MD59993cb8165c832f8a679afbf89237282
SHA1ab6daa8019bcb4bd94f5585a7e8bcbd1428f0cb3
SHA2564572d447052d29a23b288818b4b95d75e09c336113b1b559401466c74532b35d
SHA512006554a56e8686326e282ab7014dd34be6bd15552abdd7216e64cd237435202fa7371b8d7bcda3109054a826ffb1a30cc52cba7ebbf303703d563a24cc9a0e32
-
Filesize
1.7MB
MD506eb5d34841732a3544f528a7104c8f0
SHA19394e0c739b7d6e8380d43b6c3294771ad8aa9e3
SHA256aabd9d200a715850ec381524917c7703e64953cbbe1943b7fe8f6addb9160472
SHA512c6ef36f2dc80990d263d686cf7e7097b2236a8f274c837f838442a14aeebb21f07e878f27dd50b8d3d10f9df64f2b5e73ce4ecca50a09fdf26c54f4e09237d80
-
Filesize
900KB
MD53722b50487a66361d37b198bdecd9b11
SHA146a338d3e13647da4762cae0b7f5e34b8371aa63
SHA2564da6430654c68b7546e639135f17fa06b7e3ab7cc430e08cd15158b91efa8e07
SHA51263035a3a84ca87f5d5dcbee65aa411a955082a66876c2e10c559b29ad0a61c499c23ae7a1e5d8cab8115273135d17c667a8e8704f048b0f3210bb33d7e40e1ac
-
Filesize
2.7MB
MD510242299d1383786f5e34850f3c31ae5
SHA169dce844013952312698af8d5b1712d586b362a1
SHA25651f021a60d2cef6f1abd1a8c3ec6fb8e9de465b3ed423f02ebbf0f505353bce6
SHA512eec10b23ab5313472ce36aade1c512389303b698a4b021356063b1798bf5924eea8c86734bb616002e6486e88befb4500237f8074d2125cffc1e19773eb041c6
-
Filesize
2.7MB
MD59ec7150c51a4d30753fbab8a457121ee
SHA15a18ca834905608395d17b6ac0e3c90fd982a67c
SHA25627574e7abdb7c3ee82ac007aa592e907b1c101b58e16263a629750be72c978d2
SHA5120ee554a5a05536fc59ad14f339e374d324ee0b5ea2b17cc3621d9e83422aa0b745471eeac47409d8295fa46c30b866c3f5987f2e63d170e91998ae739e9a5197
-
Filesize
5.6MB
MD5f9e92fb3e0da4fecb366d0aa2364406c
SHA1a4f18cce13cd5f9931a67cd90a81642c64ba3b5a
SHA256b09ca13dc03f42da5c8dce5e99760eb836e281919f0a19a8fddec80d33eaaece
SHA512e61922a168bc1c0b6075ccc49dd1e7afe2493a937724f29573770cd4b82d355c053dcfd4684be2c25b5c3c70bbfbb146bdfa3792cde8d1f58fbbd1471b70f06b
-
Filesize
1.8MB
MD540fbf66fe2c47dcd8d2de9191b48b355
SHA1eb7260a1cf345b9a225fa6250727db32e391ffd6
SHA256c5723c29a13feb389fd9e72e6e81d914c0693d9846c2810d1d0bad4e3307eb78
SHA5122d4328dea1251bd7694c4f1b42f7bf5efad6b8712364bd42db6f8ba612dffd430b6e4bc158756c5e68d9aa24b0904cdff7ac7fde06cdf2826f062077415d0690
-
Filesize
3.8MB
MD5224a16f230b22ca51afe531f59513f0a
SHA1600feb7df74979a1dada7ac45f0a53f4ba948abe
SHA2561f4d2cd6682d02c21ef49f19c48c43ed7b19ca2e752314ff433dc6e25fa1b3c6
SHA5127581d80fd5908698fba1830286ad03e7bd6729c4138e6291f57850cd88308b765e8cc2b2cda380558bec999713f29402134b3738c6e2cd9480262baf96bc09f2
-
Filesize
1.9MB
MD5fa098b363f56394eb669a96201d3521d
SHA176ecc170b800c1ec06e738a7b5e36e71233f8f2a
SHA25640fc948cd1a58cb92a7a43d066fd250ef34ad52984efb82950c20bd60e7cf21f
SHA5120c16d78ab94169f9b82dbbe5fabba0a1b4d8dc7294bb8cd7186334cd9e324a1b09d12bc40c10e661101247f85fdae1c1a409750d4d906b1a54ec59b9a030b66f
-
Filesize
1.8MB
MD52c82b5398fb301bc2a2b3a9716e214ef
SHA1540d9ac0bdba4130643627dbb578004a71b68302
SHA256ae0615aebbe333c96a367f391103f4079076aba81341abf0081247addbb5c208
SHA51204f8e6fa29b442642bbea31e8759472f6faabf61a038ec0579401599bc123cc3bbf3f8376df44045ad0a8b721a916723ee4d35e5d4701cdb49828e1ede57ef65
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\AlternateServices.bin
Filesize6KB
MD5034fda7df2b8c78c43a2c03986a90f89
SHA18b1acba7b6e4d2312e3af9dda3ded3e1a6506123
SHA256630c763fed7975789dd1209b189cf80d48e36c071f27cf7a79e7f116bdf34728
SHA512140c4aa3834f8bc9b1f46c24a5fee49910d45e6625b9e4d2fb44044d20f0cad16698ec111b908d70cd62d7063d141dedc78f999d6163d3998555f7e5a78b127f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\AlternateServices.bin
Filesize7KB
MD52c298b493090a0b7edb3f16068da98d5
SHA10f4cce6db5644030a9a55aa7d28d489c852681bc
SHA256cd4926645398daa4cd2b89c162d4fe5b476547777d8fd459ee5362f995d82d58
SHA51236a89ba69ad833df649c2e5f80415fffacfc833f32640618db294631c6eea9dadf1570ab696e08a375c1c4f2e5a361146eaea03faf925acc18457055e85e7661
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\AlternateServices.bin
Filesize10KB
MD5f9c091d6c9aaf29769c8da47790d3808
SHA13305e7fda395da1bdbafed89e1ecd6203032a744
SHA256a0e9213faf2bc4aba7e444438efa7df0b5252df8334599d130a8e49ab4f4e6e8
SHA512596e503673276c1e192209ab4bd7491078cda017d13541df2f66288164a6c46c63a4b958b7e0b8d7b1cdb8f949ff55969a6d235f53e3a587c0c977827996c4db
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\AlternateServices.bin
Filesize11KB
MD5d97af7ac5e6db8ca408ddd6f85c54245
SHA1a7fe44b24edf4e5e3086878716cb7ef15dd15a2c
SHA2569d5f4642f90e6dae39c0ffa4abec925826798eb0a65b979b23eed181dfe83521
SHA51209c9a47de95ca1bcee6bccb6c0c9fba0500358b50b0ae6e244f0f66973f5ca4812fa67c1d260cec7548307c7016dad7ea4df0334cf0b4a8cdbaf33052b252d5d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.bin
Filesize23KB
MD525721b5156ec0848c8ff9f60cb28b2f6
SHA1971c2200f1bb62df07137d1e5c796673bdcb3669
SHA256756aafaa34f359735119688f9f6196b0352704cb5b5d9165da88ba06e2470abc
SHA512280187798c8da32800d4c5fc9b7b16cd345ac1381e29850ea881726ea80d61f606a617cc6b9ec263e765aae3ee94f3c363842adbcb62e38ed4787b83667cf1e0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.bin
Filesize15KB
MD5b26a5b249c9526839d7f59cbc2d4f346
SHA16737ee6ea513de964c4ec8671fbb75f2a5defdc6
SHA256aa02ef84236838135c449f10ff428f05cbb1ad3ce7d4ead5c0af1b634cd029e4
SHA51228270f34769c239df7641daaba88ea13e0d1ce897e747ff538a0be9c7afd1642579942c51f38b992a3292fecc22adc9645d171e687b6642aaadddd6162d6381a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.bin
Filesize5KB
MD571744cb8c63e527d3e6caa9b94669f8d
SHA1ac623f52123df859dd0c9e2fdef001ba8f6c850d
SHA256c56eb4e9eebc40dd28ce437604b474faa8b70c6d5d45765cb8219d4d43d03676
SHA512f411fa5cc6827d83a2afbb98ac828e5c5e35367b5a2cd0327809bec9aac3dbeb529cfedd51404e44c96a6300cc66a30c7f41cda75ba4941c3c94c4d0feb817a7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.bin
Filesize14KB
MD50d47e96c634138b77850fb9cdaa38b65
SHA11eca7dd9466fca4e4bf0d00bac71a34c39fbbfe2
SHA25653ab3671c42f1a3e8347d3e3289903bf88f0a55d054b4f363599581e434cb562
SHA5129f354368ab6d137a493846d82e230f36bea56e9905fa0ab3f72890eece176f131427c3166aeec833333d7f11f0dbe7e2dc98395eef605672e1fe65df2000310f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD54fd8fba58838f1a9f22a6f0521b3dafb
SHA1511797f28004408017b7c043c704c2373f2f847c
SHA2560ae2cd4a1d9708b685440bd788eb8366aa5ea84958beb4784570828890918ca3
SHA512c31f4eb99cbd7f4266d94b23540619e761be51c461e03d91d3a1fc2d51af7166ae5babd0491c74a220e2e57c25ea80953d05512e379cbc61aa3f90f13c8e64c5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD57f74c269ff7ddcd255260892f897a36c
SHA13ba93ee163beef5584615fcbb939b51c03bba486
SHA2563fc386f0ff324a3e3642cc0b48e18a3bc7b7669f46aab1eb9c6d374616b2c1fd
SHA512f7d9d0d4f9fe629f478f13c4ac0caf7dcf489f20fac2783416b630b330e02aac0df63f1996bf1e60251b09d2e7bd430b80bae967804b0b5ec2058a9af901f4dd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.tmp
Filesize14KB
MD58bf47572ad66f0f86f5353f28860dc4f
SHA174ce1a46a12b3a99f79612089085a95e17327ecd
SHA256d951fa5b0da7ce2752ef20ea970ca76b52a01605a29c8fb132fbf0e02e4a72c5
SHA512ec09a8195b4f6bb28860aacdc838fc15c6d2b56feba40bbb204d82cd46ac4ef61ad62ddfb339af5d88ea6197152bc3d8511ab3b0a75f4368c485a41017af94d4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD551334f4bccaf23361ae3b1455185cf0f
SHA1c51935dcc3450888caf81d47c729c7e44abd3970
SHA256094b0ef925291b3dea6b5160ec71c85c271018e78b31faaa578e3353d2b27b22
SHA5129e6453e1c6ee32ed4dce6d24c4ee85270592716b474baddb2de8ebfa9379fa569cf602b768e9e13bb93893dc5445e85a2dd328bffd0f8bd68b1c820bc8930efd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD57b07ff06a2e70052bebdd882ad6c3efe
SHA10916886b8df8f19b5a6fa5ff58a9b385241d0a45
SHA2563f034f868d1467e2ea0aa1d9f4a78d81fd7d71db0797098f3ca4ac41c0fbf311
SHA512a6fcbb5067631a8623f1834057118440d216d5007dc8c021f9bfbdf47abd1ab3a513e76cd6fbc14a9238cd596b935cb59d2fcb7674d5505e0d1b65855a7ede33
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\pending_pings\06242212-e319-4b34-bf61-a5ebed800fac
Filesize25KB
MD52fe462058ade58b500a6aa94f24298ff
SHA1017839501518cb1bdec3d0142a0c0835829e40b9
SHA256e8240a398ebc0ae85103552c01c26b4de7381bd67ebd8e43cd2427c2ecdc822e
SHA51271d9dcd6cb0376bfbdfab2822c8c48874964b955583bd6196746b74d19822e4629447606c37fb61258282270f33dc692c7a11cf3195325e0f7b6e18646daaf79
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\pending_pings\92eee661-dc28-4a12-82d5-a36916046c3c
Filesize671B
MD51322b01ab11b0bd9d8ec596558fac0d1
SHA1b98461ab1ec96acf9e632a268dec7a5409e566c9
SHA256b945a6223718a2b48490f03e9bca513bc9cbc73cd7e69f831a83e59f240a58b6
SHA51207aebe29ac619d721c053f81fe170755cbafe997dcdfd2601656507f66f14941cb0609078654bfee71caebb48d763bacfb62f63d81cf8beeb1d84636f3b1dea9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\pending_pings\f1fd3277-4769-4369-8fb7-d7e440153432
Filesize982B
MD52bc1cff9093d9d900fdfa641880efe50
SHA1dac41334ca79a7a8a2cccd721c3fe86758a4521a
SHA256b52763e0873ec41e2b304fcf25c1553207fd48600311d9ffdf6cbbca1e7f35e8
SHA512b00e0fc494d6b265d15271ef870a6a17588c7893ec00d2fd0f2991498e50bfff049c41c6fb13d940cb8551b09e5ddea84f043d05bdedbb0ac6792a7d6dcda924
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
11KB
MD5ff9912c233eaabf94374f0a1653d3e77
SHA17af4a6b30166116c9c584848e8ec6f51f4f2402e
SHA256bd462fe84a55cbcfdafdaf65c0523a596bc7f5861757984699ded7acc504e730
SHA51237aafe5bbfc3d7c8af3b9a29ec3d63b1dd48fb2ca2f2b42ee21657a91fd4dae786eb8e4778aab1b80a3a3ade45f08b4aba2c9648676dbbee973ebdfb58bd5b57
-
Filesize
15KB
MD580a64c15f0e28a48ab662a518384ddda
SHA14c69d64db2c3f1a700632c8fee7c4b62798fdc4f
SHA256ffdc119e7373c4872fb7380c720a4551c440ee5ef1df18d52cd558cf3920fcd2
SHA51212dbc5232f355fe76d9f47fa45ba400ec508a1a2f5fdc10ae72326c30006dbf794d6e360491c2900c1c035fdc8e2ff7fa58f085f6c0ceb34092d359f0ca3a5ed
-
Filesize
10KB
MD57c45274e0a90dc040f5ac578d500840d
SHA1349b20a7ed782ec91130f897c30299c27565225e
SHA256e56574abeaf8aa9c03beadc8e305707f5d67daf0b5f2ab20c95bd2181bc67d58
SHA512e790065b4634d0f19083efaaaf79d2ba6631c8762ebe191c0200860505f571acc6fda932b5077a8b85a89cd63c5ddc4ccd4ffc13c9236c10dd6d5485b392ce56