Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2024, 21:36
Static task
static1
General
-
Target
3202c12f7965343261b5f1fcec2c902e1661ea044f5969a855170557fb6be682.exe
-
Size
7.0MB
-
MD5
ea18bcb7f6c37b798d30ebc5a4f40dbf
-
SHA1
e196573255cedda746d948c9645266468571f715
-
SHA256
3202c12f7965343261b5f1fcec2c902e1661ea044f5969a855170557fb6be682
-
SHA512
fff1663194af2756e5f5d599164cc5617e87c3b07ee9fd89d54dfc454371558a0c82b80571baa5d9611e377dafbcc5cde36175365e722ca131c908a7fe8f815d
-
SSDEEP
196608:G+YFu0Zv4xoY6Mg0UDB+O0BQF710yY7UYcSSuCoHYg6:G+st48Mg0M10yY7UBu1Hl6
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
Extracted
stealc
drum
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c69d06aaa8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c69d06aaa8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c69d06aaa8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c69d06aaa8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4X774f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4X774f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4X774f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4X774f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c69d06aaa8.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4X774f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4X774f.exe -
Stealc family
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF 1f572f390f.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 12 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1d50D0.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2B3446.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6e83f73eaa.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2b50a87d17.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3Q74W.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4X774f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1f572f390f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d4619ec83c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c69d06aaa8.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 24 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6e83f73eaa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4X774f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4X774f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6e83f73eaa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d4619ec83c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1d50D0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1d50D0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2B3446.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2B3446.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d4619ec83c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2b50a87d17.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2b50a87d17.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3Q74W.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1f572f390f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3Q74W.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1f572f390f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c69d06aaa8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c69d06aaa8.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 1d50D0.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 16 IoCs
pid Process 1524 l8m11.exe 2012 l9Y83.exe 456 1d50D0.exe 4044 skotes.exe 3020 2B3446.exe 2844 N67fLgN.exe 2924 3Q74W.exe 3076 6e83f73eaa.exe 4984 4X774f.exe 912 1f572f390f.exe 264 d4619ec83c.exe 2816 2b50a87d17.exe 2888 ada0463bf5.exe 4616 skotes.exe 3020 c69d06aaa8.exe 3680 skotes.exe -
Identifies Wine through registry keys 2 TTPs 12 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine c69d06aaa8.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 3Q74W.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 1f572f390f.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine d4619ec83c.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 6e83f73eaa.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 4X774f.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 2b50a87d17.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 1d50D0.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 2B3446.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4X774f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c69d06aaa8.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4X774f.exe -
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ada0463bf5.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1011071001\\ada0463bf5.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\c69d06aaa8.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1011072001\\c69d06aaa8.exe" skotes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3202c12f7965343261b5f1fcec2c902e1661ea044f5969a855170557fb6be682.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" l8m11.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" l9Y83.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\d4619ec83c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1011069001\\d4619ec83c.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2b50a87d17.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1011070001\\2b50a87d17.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0007000000023cb6-159.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
pid Process 456 1d50D0.exe 4044 skotes.exe 3020 2B3446.exe 2924 3Q74W.exe 3076 6e83f73eaa.exe 4984 4X774f.exe 912 1f572f390f.exe 264 d4619ec83c.exe 2816 2b50a87d17.exe 4616 skotes.exe 3020 c69d06aaa8.exe 3680 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1d50D0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 1464 3020 WerFault.exe 87 5784 264 WerFault.exe 109 5796 264 WerFault.exe 109 -
System Location Discovery: System Language Discovery 1 TTPs 20 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6e83f73eaa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3Q74W.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ada0463bf5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c69d06aaa8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4X774f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1f572f390f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d4619ec83c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2b50a87d17.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1d50D0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language l8m11.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language l9Y83.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2B3446.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language N67fLgN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3202c12f7965343261b5f1fcec2c902e1661ea044f5969a855170557fb6be682.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 2256 taskkill.exe 3640 taskkill.exe 4484 taskkill.exe 4924 taskkill.exe 4984 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 41 IoCs
pid Process 456 1d50D0.exe 456 1d50D0.exe 4044 skotes.exe 4044 skotes.exe 3020 2B3446.exe 3020 2B3446.exe 2924 3Q74W.exe 2924 3Q74W.exe 3076 6e83f73eaa.exe 3076 6e83f73eaa.exe 4984 4X774f.exe 4984 4X774f.exe 4984 4X774f.exe 4984 4X774f.exe 912 1f572f390f.exe 912 1f572f390f.exe 912 1f572f390f.exe 912 1f572f390f.exe 912 1f572f390f.exe 912 1f572f390f.exe 912 1f572f390f.exe 912 1f572f390f.exe 912 1f572f390f.exe 912 1f572f390f.exe 264 d4619ec83c.exe 264 d4619ec83c.exe 2816 2b50a87d17.exe 2816 2b50a87d17.exe 2888 ada0463bf5.exe 2888 ada0463bf5.exe 4616 skotes.exe 4616 skotes.exe 3020 c69d06aaa8.exe 3020 c69d06aaa8.exe 3020 c69d06aaa8.exe 3020 c69d06aaa8.exe 3020 c69d06aaa8.exe 2888 ada0463bf5.exe 2888 ada0463bf5.exe 3680 skotes.exe 3680 skotes.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 4984 4X774f.exe Token: SeDebugPrivilege 2256 taskkill.exe Token: SeDebugPrivilege 3640 taskkill.exe Token: SeDebugPrivilege 4484 taskkill.exe Token: SeDebugPrivilege 4924 taskkill.exe Token: SeDebugPrivilege 4984 taskkill.exe Token: SeDebugPrivilege 3020 c69d06aaa8.exe Token: SeDebugPrivilege 4160 firefox.exe Token: SeDebugPrivilege 4160 firefox.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 456 1d50D0.exe 2888 ada0463bf5.exe 2888 ada0463bf5.exe 2888 ada0463bf5.exe 2888 ada0463bf5.exe 2888 ada0463bf5.exe 2888 ada0463bf5.exe 2888 ada0463bf5.exe 2888 ada0463bf5.exe 2888 ada0463bf5.exe 2888 ada0463bf5.exe 4160 firefox.exe 4160 firefox.exe 4160 firefox.exe 4160 firefox.exe 4160 firefox.exe 4160 firefox.exe 4160 firefox.exe 4160 firefox.exe 4160 firefox.exe 4160 firefox.exe 4160 firefox.exe 4160 firefox.exe 4160 firefox.exe 4160 firefox.exe 4160 firefox.exe 4160 firefox.exe 4160 firefox.exe 4160 firefox.exe 4160 firefox.exe 4160 firefox.exe 4160 firefox.exe 2888 ada0463bf5.exe 2888 ada0463bf5.exe 2888 ada0463bf5.exe -
Suspicious use of SendNotifyMessage 33 IoCs
pid Process 2888 ada0463bf5.exe 2888 ada0463bf5.exe 2888 ada0463bf5.exe 2888 ada0463bf5.exe 2888 ada0463bf5.exe 2888 ada0463bf5.exe 2888 ada0463bf5.exe 2888 ada0463bf5.exe 2888 ada0463bf5.exe 2888 ada0463bf5.exe 4160 firefox.exe 4160 firefox.exe 4160 firefox.exe 4160 firefox.exe 4160 firefox.exe 4160 firefox.exe 4160 firefox.exe 4160 firefox.exe 4160 firefox.exe 4160 firefox.exe 4160 firefox.exe 4160 firefox.exe 4160 firefox.exe 4160 firefox.exe 4160 firefox.exe 4160 firefox.exe 4160 firefox.exe 4160 firefox.exe 4160 firefox.exe 4160 firefox.exe 2888 ada0463bf5.exe 2888 ada0463bf5.exe 2888 ada0463bf5.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4160 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3976 wrote to memory of 1524 3976 3202c12f7965343261b5f1fcec2c902e1661ea044f5969a855170557fb6be682.exe 83 PID 3976 wrote to memory of 1524 3976 3202c12f7965343261b5f1fcec2c902e1661ea044f5969a855170557fb6be682.exe 83 PID 3976 wrote to memory of 1524 3976 3202c12f7965343261b5f1fcec2c902e1661ea044f5969a855170557fb6be682.exe 83 PID 1524 wrote to memory of 2012 1524 l8m11.exe 84 PID 1524 wrote to memory of 2012 1524 l8m11.exe 84 PID 1524 wrote to memory of 2012 1524 l8m11.exe 84 PID 2012 wrote to memory of 456 2012 l9Y83.exe 85 PID 2012 wrote to memory of 456 2012 l9Y83.exe 85 PID 2012 wrote to memory of 456 2012 l9Y83.exe 85 PID 456 wrote to memory of 4044 456 1d50D0.exe 86 PID 456 wrote to memory of 4044 456 1d50D0.exe 86 PID 456 wrote to memory of 4044 456 1d50D0.exe 86 PID 2012 wrote to memory of 3020 2012 l9Y83.exe 87 PID 2012 wrote to memory of 3020 2012 l9Y83.exe 87 PID 2012 wrote to memory of 3020 2012 l9Y83.exe 87 PID 4044 wrote to memory of 2844 4044 skotes.exe 97 PID 4044 wrote to memory of 2844 4044 skotes.exe 97 PID 4044 wrote to memory of 2844 4044 skotes.exe 97 PID 1524 wrote to memory of 2924 1524 l8m11.exe 105 PID 1524 wrote to memory of 2924 1524 l8m11.exe 105 PID 1524 wrote to memory of 2924 1524 l8m11.exe 105 PID 4044 wrote to memory of 3076 4044 skotes.exe 106 PID 4044 wrote to memory of 3076 4044 skotes.exe 106 PID 4044 wrote to memory of 3076 4044 skotes.exe 106 PID 3976 wrote to memory of 4984 3976 3202c12f7965343261b5f1fcec2c902e1661ea044f5969a855170557fb6be682.exe 107 PID 3976 wrote to memory of 4984 3976 3202c12f7965343261b5f1fcec2c902e1661ea044f5969a855170557fb6be682.exe 107 PID 3976 wrote to memory of 4984 3976 3202c12f7965343261b5f1fcec2c902e1661ea044f5969a855170557fb6be682.exe 107 PID 4044 wrote to memory of 912 4044 skotes.exe 108 PID 4044 wrote to memory of 912 4044 skotes.exe 108 PID 4044 wrote to memory of 912 4044 skotes.exe 108 PID 4044 wrote to memory of 264 4044 skotes.exe 109 PID 4044 wrote to memory of 264 4044 skotes.exe 109 PID 4044 wrote to memory of 264 4044 skotes.exe 109 PID 4044 wrote to memory of 2816 4044 skotes.exe 111 PID 4044 wrote to memory of 2816 4044 skotes.exe 111 PID 4044 wrote to memory of 2816 4044 skotes.exe 111 PID 4044 wrote to memory of 2888 4044 skotes.exe 114 PID 4044 wrote to memory of 2888 4044 skotes.exe 114 PID 4044 wrote to memory of 2888 4044 skotes.exe 114 PID 2888 wrote to memory of 2256 2888 ada0463bf5.exe 115 PID 2888 wrote to memory of 2256 2888 ada0463bf5.exe 115 PID 2888 wrote to memory of 2256 2888 ada0463bf5.exe 115 PID 2888 wrote to memory of 3640 2888 ada0463bf5.exe 118 PID 2888 wrote to memory of 3640 2888 ada0463bf5.exe 118 PID 2888 wrote to memory of 3640 2888 ada0463bf5.exe 118 PID 2888 wrote to memory of 4484 2888 ada0463bf5.exe 120 PID 2888 wrote to memory of 4484 2888 ada0463bf5.exe 120 PID 2888 wrote to memory of 4484 2888 ada0463bf5.exe 120 PID 2888 wrote to memory of 4924 2888 ada0463bf5.exe 123 PID 2888 wrote to memory of 4924 2888 ada0463bf5.exe 123 PID 2888 wrote to memory of 4924 2888 ada0463bf5.exe 123 PID 4044 wrote to memory of 3020 4044 skotes.exe 125 PID 4044 wrote to memory of 3020 4044 skotes.exe 125 PID 4044 wrote to memory of 3020 4044 skotes.exe 125 PID 2888 wrote to memory of 4984 2888 ada0463bf5.exe 126 PID 2888 wrote to memory of 4984 2888 ada0463bf5.exe 126 PID 2888 wrote to memory of 4984 2888 ada0463bf5.exe 126 PID 2888 wrote to memory of 3952 2888 ada0463bf5.exe 128 PID 2888 wrote to memory of 3952 2888 ada0463bf5.exe 128 PID 3952 wrote to memory of 4160 3952 firefox.exe 129 PID 3952 wrote to memory of 4160 3952 firefox.exe 129 PID 3952 wrote to memory of 4160 3952 firefox.exe 129 PID 3952 wrote to memory of 4160 3952 firefox.exe 129 PID 3952 wrote to memory of 4160 3952 firefox.exe 129 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\3202c12f7965343261b5f1fcec2c902e1661ea044f5969a855170557fb6be682.exe"C:\Users\Admin\AppData\Local\Temp\3202c12f7965343261b5f1fcec2c902e1661ea044f5969a855170557fb6be682.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l8m11.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l8m11.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l9Y83.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l9Y83.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1d50D0.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1d50D0.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Users\Admin\AppData\Local\Temp\1010920001\N67fLgN.exe"C:\Users\Admin\AppData\Local\Temp\1010920001\N67fLgN.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2844
-
-
C:\Users\Admin\AppData\Local\Temp\1011067001\6e83f73eaa.exe"C:\Users\Admin\AppData\Local\Temp\1011067001\6e83f73eaa.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3076
-
-
C:\Users\Admin\AppData\Local\Temp\1011068001\1f572f390f.exe"C:\Users\Admin\AppData\Local\Temp\1011068001\1f572f390f.exe"6⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:912
-
-
C:\Users\Admin\AppData\Local\Temp\1011069001\d4619ec83c.exe"C:\Users\Admin\AppData\Local\Temp\1011069001\d4619ec83c.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:264 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 264 -s 16927⤵
- Program crash
PID:5784
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 264 -s 17127⤵
- Program crash
PID:5796
-
-
-
C:\Users\Admin\AppData\Local\Temp\1011070001\2b50a87d17.exe"C:\Users\Admin\AppData\Local\Temp\1011070001\2b50a87d17.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2816
-
-
C:\Users\Admin\AppData\Local\Temp\1011071001\ada0463bf5.exe"C:\Users\Admin\AppData\Local\Temp\1011071001\ada0463bf5.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2256
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3640
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4484
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4924
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4984
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4160 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2072 -parentBuildID 20240401114208 -prefsHandle 1988 -prefMapHandle 1980 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c10c6a06-7033-4551-be1b-a39fcd930758} 4160 "\\.\pipe\gecko-crash-server-pipe.4160" gpu9⤵PID:1924
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2488 -parentBuildID 20240401114208 -prefsHandle 2484 -prefMapHandle 2480 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5e3ec678-e498-4413-8da4-8239b735a658} 4160 "\\.\pipe\gecko-crash-server-pipe.4160" socket9⤵PID:3788
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3352 -childID 1 -isForBrowser -prefsHandle 3228 -prefMapHandle 3360 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1132 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d0f0e630-84fe-425d-b4bf-896a81cef632} 4160 "\\.\pipe\gecko-crash-server-pipe.4160" tab9⤵PID:1744
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4208 -childID 2 -isForBrowser -prefsHandle 4204 -prefMapHandle 4196 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1132 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {98ec36ce-8770-4aa2-a1c3-f5c2154c249f} 4160 "\\.\pipe\gecko-crash-server-pipe.4160" tab9⤵PID:2916
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4856 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4808 -prefMapHandle 4804 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {98f72384-b18c-41e5-9e6f-4b123fbb153c} 4160 "\\.\pipe\gecko-crash-server-pipe.4160" utility9⤵
- Checks processor information in registry
PID:5400
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4808 -childID 3 -isForBrowser -prefsHandle 5164 -prefMapHandle 5160 -prefsLen 27097 -prefMapSize 244658 -jsInitHandle 1132 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1d3866ed-ce27-47d6-a464-46ee732aa4eb} 4160 "\\.\pipe\gecko-crash-server-pipe.4160" tab9⤵PID:6964
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5332 -childID 4 -isForBrowser -prefsHandle 4808 -prefMapHandle 5204 -prefsLen 27097 -prefMapSize 244658 -jsInitHandle 1132 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d8a1b221-7f74-4bb9-8d88-10594f4a38b5} 4160 "\\.\pipe\gecko-crash-server-pipe.4160" tab9⤵PID:7036
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5532 -childID 5 -isForBrowser -prefsHandle 5608 -prefMapHandle 5604 -prefsLen 27097 -prefMapSize 244658 -jsInitHandle 1132 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {99715a8d-f7de-4746-9f1b-41e96fd6ac5b} 4160 "\\.\pipe\gecko-crash-server-pipe.4160" tab9⤵PID:7068
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1011072001\c69d06aaa8.exe"C:\Users\Admin\AppData\Local\Temp\1011072001\c69d06aaa8.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3020
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2B3446.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2B3446.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3020 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3020 -s 17125⤵
- Program crash
PID:1464
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3Q74W.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3Q74W.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2924
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4X774f.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4X774f.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4984
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3020 -ip 30201⤵PID:264
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4616
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 264 -ip 2641⤵PID:5700
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 264 -ip 2641⤵PID:5712
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3680
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
3Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\activity-stream.discovery_stream.json
Filesize19KB
MD50e088ba917e792d0b3ecdee4e82916f7
SHA18ba536864ac71239d117f61b213f487155e0fe7f
SHA256e8de53d5b991a7ff69fca8cb5b3a149ca0bd9af335cd439d6580f6daf88667be
SHA512b8127ad7c514780d5a3f3e7773e354b3c1e3bd538442f381cf844b3921aa31e010065d693db96ae1959b0296cb826f91291fe57c5a8d46a9870d00a7c9fd60c9
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD52c32a6d2d8ff487dafa4b5918f5ae8b2
SHA1da217ec8a92268b048bc44f636a9c26496227dcf
SHA256d826a421f6b106589c88207a6fc1aa4ff49f6ccde578251b550e9699f6bba6da
SHA512a21ae806cb8b75546caea33d857ce8f24774ff97bbce04b08fdfa28a184412924685c0ceddce8781726e046091208caec97da9516e61ba5d11054a8957bcaea3
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD5404a3c5ab1a3b082b12da99f24524253
SHA1357ff372d1277a5298bcd1f64b96df164fed7cc4
SHA2565117af313c2b16cf95823bcb3af8550a210d8764a3f16fb35e87af24dfe0697a
SHA512ad99a11dc8159078197fba37528e11377fd3e7a41f2438391a36dfff69a941972c2ad2fe64b811bbf3f27ab13d222d899fc2bc907d62bf3569fd3069e7417147
-
Filesize
5.2MB
MD5974049047492d0a73f8c23e25de924ef
SHA197a726b88efaf70855af7cebb15c7564c45bc43c
SHA2565ca90e9115be40ba7fd2d93b848fd2b0be7eb37115ed96f23d3b8051854981d8
SHA512bf7350536c404b84a25abf91c00f7fa6a78f3e857fe6a0915fff124f121cfa6138001d075858c077d36ef0698b92c040942e4eb539531d7c890be77fdc0b8ec2
-
Filesize
1.8MB
MD5b5b924daa28ce7eb471031a862943d87
SHA14aae84a28a03b6d212bd004f627def909c2a4b2f
SHA2564d7544535ad3268527e5b104fc193cb87daa25350bae773526c06813a422c561
SHA5124c356a21d851998801c71e3ea83c4de5ec1643fdd7bea3d864a33674ab94d9671d2daab334ee9fca319cb6c2be71b75a0c5ea779f3f7ff5e4107ae4e029f6ed9
-
Filesize
4.2MB
MD5f03985dcb8d3b56a81c755d9bc8fe757
SHA15c0bfcdfa9befc8995142de82025bcd1e22c93b0
SHA256637f8140aed64627e2fc8a1f140aa3180ba3253695d359a152806eb9952f3153
SHA512bd8419521b8abe347286ac76c82513a3bf3b33a0479ef777a2fcd3954c8a527df343fe3220e09264aa999454cf011d481a5fcd66d370b34ba4a79e727d50840f
-
Filesize
900KB
MD5328923e816a1a815fa2db941dc63d835
SHA19f3c6478f25add083c673c75622303247ff9b730
SHA2564922cb7e090efae431ed77899946577ae0147a3044c6b3b5cf91f72d298f1bc1
SHA512b9d92330bf72baa89c83b737938fa2ad4cf012382d26df7fc06562acb3b4cbe53f4eb9a012d41caa39b170e30970431decfb5cabf87621e3ed50dcd1da8faa70
-
Filesize
2.7MB
MD595f4703f6896327d520ea668b0f31e34
SHA153742ed49a1932d3e3fe8990c7097026328a2dba
SHA256beff71dc6fbae143b826efa3e02ff7e8e1174231591e8df006545b4b1d4bc7c2
SHA5128bbccd2202f0461057a6c33e03ed6f89e384555c5dcf80df81b6f475d8c030f74ce1b6098c6b080180b08df604964e409a45476ba4fe6a3816b4a7b099c819e8
-
Filesize
5.4MB
MD50803d71aa87adc493e5220770a5aa12d
SHA1aba67f1427f055c395fc48cd1df3e40ab7b22ce8
SHA256fc3da4a82af3693efca321d66b7a1da74fcf87736aff24829c9521a421e4bc31
SHA512319d8f90f3be5289ceacc13a03229125972ecc1275c5043b0cde56750618f43d33d781bd87f330d95b94c6872a0bd0007ca0acb44a9be2642082daca404a47d7
-
Filesize
1.7MB
MD5cfabae0dc0b3e5a60db97cbd9dd3e3ad
SHA112b6af9e093cec7d9dbd322be0c5424be744f061
SHA2563d3bc8c0fda9069a2d5d2ad9aa5ad2934176d114750f392ba0b56cafdd1ec6af
SHA512903de23d5393a070044090f44362a5ab52b99c8d1813db380595261dd117b87e06ac57393a453c00fc5cfa3890425c0e1d0a26f7dee5092e1b403f937bc29bef
-
Filesize
3.6MB
MD5f19d362170ca140d02171a85ed2bf8df
SHA136c67f0d24dbfce56426804705562b44340a67e0
SHA256eaa36070f9e5d641de006f3aa27b09d8ef09aa34431c7b406c4c4c90bf13e8ac
SHA512ccfc092b779ef43938e7150644a36ced198b26d796764320d909fad57020cdaa30291d3f4623480fabef64b87fe791f216d51570f21484238cf0286ce1a7f27a
-
Filesize
1.8MB
MD52894eefa1cfe4c9da74cfc210917d08d
SHA1daf1e60316e62dfd5c260ba73a3d296df2adfa0f
SHA256759b46400882bde702fd3d29a950af609585889a410b025c6f35667153e0264d
SHA512a37e0351393573bc7ec827547560ae8ec70e0cc0a687b67360ededd72e6ebbf616bb0754cee6644028c347f300623268ccd8f7425cfdf23be885ea55140935ca
-
Filesize
1.7MB
MD5d46e6e184bca8b668d080cb34c41e2cd
SHA1607128f864bfb99113192d0fcf6296eceda325bb
SHA2565184155d032e1d8a1cf38e49a91d9a923b7b14d3d10a94419e4d3b0bb95f3ab7
SHA512fa2336a53d388fac7eba8e476f0229a15d21b72771e1e40b4e98d2cd696ef0fa32d47a9dccdf84a7ef2c88cf7f3b0d969daabda7cea87933f8b6c678c62bf864
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\AlternateServices.bin
Filesize12KB
MD5771be1e7084473869f3b7a7cde533c2f
SHA126cea9f3ac7c4318ae7aeae592a7868796a11400
SHA256d9690f37af5f60a47c38cb1a115ab00298eae86f6db6c52bf77817a069c96156
SHA5123313d438df86758c0fdf0fbf157b90642b3de2b9f917497f6a1e9bb9884e9244079f14a301cbf151699494b7f0560eab91b65d1a56ed5112bb036684d28ee20b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.bin
Filesize23KB
MD5c7b5227c302189401d240126c27105c7
SHA1ab7d95ea8d8c6b054d02a7827d3d294f5402f74a
SHA256746748e0bfa246638b9d4973c9f46a968dbec6cffe759ddbe1f32a17d0482269
SHA512a720918d9d409337f96eaddbcde08a3da6277dfc3c7ae28cab679b69a19989e4a2049d4d78b83987d2418bc580526bbb7d7d6da156f005f5f631019c9cc1a6e1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.bin
Filesize15KB
MD5a3113bad237b576a31bf71be5eddd3df
SHA1d21ca86fdb02471df9858e16d336ea0e80c5eed7
SHA2561682f897d25cf9039d22722afc003a973cf0a4424b15e7c28c003ecc735628c2
SHA51276d8831e60a30224db469cb9490a1bf61c1b2375d87ea272cf045fa57cfbdc79f6d09b2548919ac43971de752d4786f5d44c9d755c4ea35d85e8eab1b845d7bf
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5bbf93089c3c30b7fa2bcdd4657cd5e45
SHA1a1a1615ab05f8a60298d34c3e05e90ee5a5d0ecd
SHA25670fc56d91bd3aa07aa167a10a28208244dd7360b57ca1d5f5ebccde756f3054d
SHA5125e05ee52bc164fca641e142f2049c88a4e3e6b5a6840af6b5b66384f47fba0ca46c823774282c25f82d98f11df62b0f05b85d06a5aa0d5d30bfc0c23a42585fa
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD56a0f49954d896a4835c282ae75c6f8b6
SHA1344d3e20131e0294f916a53f1daf1f266d1ee354
SHA256df7f5e39cc10d3bba07f956557f644b660335b0f0731f239484354b7fe15a0f0
SHA512978480dcbc3ab0c0b1fdd4e49f0f76fac6951bed11624630ca5ccf864bef0f9639a4858b46a4e753feb2a274cc163acc9228fdc4a046085999e275ed7263ea5c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5febdc950d4e5e00f75ccffd1a7369ae4
SHA122c978cccda9a42972235939f20d582857bc64a6
SHA256394499afff7b65cd5c1c0d38ee82ece35233431e781b5918294d44bf813b7a13
SHA512c65fd76e3910dc44d6c0dfc89bef8e2f95b8b76e7e676b95afbac1acaa90297fbe4e5559478611e4cea0a210ceace4ff4d3d468522c73e2ca29b096ab36fd7aa
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD59cefbc5be78323709305903b8fefaf9c
SHA1a5bda193fae73c09743f3d5069267654e402f81e
SHA25684f5351fbf9340624e88efc6af2f0fbfcfeeed171738f485257460a2a7d95ad5
SHA5122a60900f2cd55df20b5d6be41010fc0ca4ac3a2a014f6dcd87195c2437a0a94324fedd140599b4b6d4f92aca15b0f936fcc19b85e5f7d76738a7401601be3be8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5580e7e5174a28223c2458a1eb809a285
SHA1ef0db1f07d377e7171090ec85a690a85d0b6778d
SHA256c7de93fe489631c31e204743076e8d446be23151638371ca3714d9660c9091ff
SHA512029a2466fddb9bee044625cba6dbce7e8a0c477b0c25359dd561e6e0b9f54628bb07b752a912e271f0a6bcb23ddaa1cfe3617877d1e3cd899c11e22841b61512
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\pending_pings\e69f994c-4ccd-42be-84fb-fa2b67b8b16a
Filesize671B
MD52e70b79ddea8d397c643f139273c74db
SHA1f12b76678014baff48e8f02062642302bc3b7c96
SHA256f01fda7c28fb2edfd0442ab3c0fb68709541577bc59340cc2fe2b0a0826aaf06
SHA512a1d20e5cb69f6f308d08d4e3eaf9d1fd2378f4369c8d51c7b9915ae813d905194514fe733f1fc3af5cb17ffe28c42ee5be514a9b76929d6591c25a1dccbc0af7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\pending_pings\e9e84b4d-4e30-43a6-b916-71adf6f78fdf
Filesize982B
MD5914cebfdd6f532f752fc93d2518eccff
SHA15f9587f616edc8ccd4123120fa150adfcdc9b3cc
SHA256836402b0df617f10779893ffa4267942766456ee067bff51eb404f01d39a21f0
SHA51216cc312e394c7c244b4a9a84e3512dbcc254271a0309dedd87ca208aa2fc656816be177f35ad8965ee627e7a7ea5fb86ba2e8e5dd80f2f385e88109290808c6a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\pending_pings\f2dea938-a36e-43d0-b126-ef22cb269bf5
Filesize26KB
MD54dd6387e370b4f9f3b1d77c9106f862a
SHA1ef47e5bfb5ea8b7f7124a48cfa25d5b5d7c2401f
SHA256ea45c02d8df780ae899b45ab14be5cec6dc8509086b1778093af7e85bfa291d4
SHA51285501d2d3acd0ff85e5ca06ac11b54d2b37515c99afa77084481e4f82c7b1f838ded003707febddb8b1aace3ea751876a2ab81c01cf35f85e1cbb517d4dfe67c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD5a3cd1faf504d3b84a448bd45afebd8de
SHA199648d6b841a6908595119303aef0ee480939ce7
SHA2562cd65533a3fe89d93f5ea959fad91a2340e272ca5c13f2cd599366f41e04fe6f
SHA512729696180dbbf7583f9df55d2c0dfd92eb057f48a0a59d950733479be4c542cab574e891f41de460d81799c74b1e7b2011bc48e8efd2772a1d835d5efa050ca4
-
Filesize
11KB
MD57553250dc292b7ef6e2b6cca7f0c328d
SHA10ea223c729495f4af92bd5dac32f17632c00b8e9
SHA2566da0936eda1b92a01d902fd6f76ebd3694bfa5417949c75be38593e88925bd4e
SHA512d4c55c1eb855dd01a41c158bcd5eb1a9923037d2e71ec2ed812cf3f4a3a01229b8ffb29d43ec192b94279ee981aceb1c780a6cbc4606b42f21ba16f5d349e0b7
-
Filesize
15KB
MD5a5beda5e0566cc82e6798f5aabf1402c
SHA1ce4efdc31ce3e9da5c89a3b98bc06961356a24a3
SHA256d71b6731746c23899fadad482f0d994944e8851af5550bb3f03eec12d5967ea4
SHA51214221184ac0d7738806a8e93cd778e361c76b858b44c88688fb72a718dc340fcb3af5a7d494a747dd2f1bc33957e82df30e1b5487c589d96a5f06835c6567928
-
Filesize
10KB
MD5525fc666fa1da786e1984d3b97c3aba4
SHA14129e44a9827ed49a029bfd1c2912da311f048ce
SHA256077f4eda7798354a4e06f4541646acf65d37609e21a4a58376a857d412056b34
SHA512b7e8e3cbee2cc696c5ec9a1ca5a0b2af101beecd499b4b278e36551a70ea650ab6bba8e3eeb4a59c5b763c54d2b93c1b9fb20a076d72185b3ae2cad3bf82a048
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\security_state\data.safe.bin
Filesize2.9MB
MD59f35867a0e9f089283a4f2f68560056a
SHA1375630a0073214270ebe3f8d65b31f4cc5189cd5
SHA25658ef003a8495c9d99ad496343b6b63457298c402a3fd32547a72ee5d525f2e14
SHA512381e4c5d9e6dfed7769910213ef0be6314e842eb1e2d82988da1f13ae8ada3bf1f0aae7c4411dcea17c0da5d67664c5d059edde9761b8daf47e8845548944ca3