Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2024, 21:46
Static task
static1
General
-
Target
a7a849b0d2691df31f83d8c8cc4c880b03668afbc72dcd7c21a06bd908e0b93a.exe
-
Size
7.1MB
-
MD5
a9321afb68c5cb1b526cf3c0634781b1
-
SHA1
71952e9780b254e68156ccd528e9d6eaa6b0e9c9
-
SHA256
a7a849b0d2691df31f83d8c8cc4c880b03668afbc72dcd7c21a06bd908e0b93a
-
SHA512
b9e67c778ffccee8dd20cbdaa56b1a8fd4790a41ec4d8327ab0c861f4f87ac091c7f87bdc66e8010b07897830f63e2651cba4e818894439de4bb18c12a9543dd
-
SSDEEP
196608:MwgYOwAvAygkUhbaiYEPjKT8DCP3rCKJBCtSySh:MnvAGU2oWqCP3e6CVSh
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
Extracted
stealc
drum
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4V567k.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4V567k.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4V567k.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4V567k.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c384f1f4fd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c384f1f4fd.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4V567k.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4V567k.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c384f1f4fd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c384f1f4fd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c384f1f4fd.exe -
Stealc family
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF a0eb1585be.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 13 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1r83Q2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2K3647.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3T78i.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4V567k.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7e136857a9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a0eb1585be.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5336d02776.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3a4934b937.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c384f1f4fd.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 26 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7e136857a9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a0eb1585be.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5336d02776.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3a4934b937.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3a4934b937.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2K3647.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4V567k.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7e136857a9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a0eb1585be.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4V567k.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c384f1f4fd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3T78i.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3T78i.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5336d02776.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c384f1f4fd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1r83Q2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1r83Q2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2K3647.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 1r83Q2.exe -
Executes dropped EXE 17 IoCs
pid Process 3376 a3g66.exe 3208 p0q26.exe 4312 1r83Q2.exe 1788 skotes.exe 3368 2K3647.exe 3504 skotes.exe 2244 N67fLgN.exe 3676 3T78i.exe 2832 4V567k.exe 1144 7e136857a9.exe 532 a0eb1585be.exe 1796 5336d02776.exe 4372 3a4934b937.exe 468 044eebfde1.exe 4868 c384f1f4fd.exe 3524 skotes.exe 380 skotes.exe -
Identifies Wine through registry keys 2 TTPs 13 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine a0eb1585be.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine c384f1f4fd.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 2K3647.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 3T78i.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 4V567k.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 7e136857a9.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 5336d02776.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 3a4934b937.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 1r83Q2.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4V567k.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4V567k.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c384f1f4fd.exe -
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a7a849b0d2691df31f83d8c8cc4c880b03668afbc72dcd7c21a06bd908e0b93a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" a3g66.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" p0q26.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5336d02776.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1011069001\\5336d02776.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\3a4934b937.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1011070001\\3a4934b937.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\044eebfde1.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1011071001\\044eebfde1.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\c384f1f4fd.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1011072001\\c384f1f4fd.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0009000000023bc9-165.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 13 IoCs
pid Process 4312 1r83Q2.exe 1788 skotes.exe 3368 2K3647.exe 3504 skotes.exe 3676 3T78i.exe 2832 4V567k.exe 1144 7e136857a9.exe 532 a0eb1585be.exe 1796 5336d02776.exe 4372 3a4934b937.exe 4868 c384f1f4fd.exe 3524 skotes.exe 380 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1r83Q2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 3304 3368 WerFault.exe 86 4572 3368 WerFault.exe 86 2088 1796 WerFault.exe 105 -
System Location Discovery: System Language Discovery 1 TTPs 20 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a0eb1585be.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5336d02776.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3a4934b937.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language p0q26.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3T78i.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4V567k.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7e136857a9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a7a849b0d2691df31f83d8c8cc4c880b03668afbc72dcd7c21a06bd908e0b93a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a3g66.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1r83Q2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2K3647.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language N67fLgN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 044eebfde1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c384f1f4fd.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 4288 taskkill.exe 644 taskkill.exe 3252 taskkill.exe 2216 taskkill.exe 620 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 4312 1r83Q2.exe 4312 1r83Q2.exe 1788 skotes.exe 1788 skotes.exe 3368 2K3647.exe 3368 2K3647.exe 3504 skotes.exe 3504 skotes.exe 3676 3T78i.exe 3676 3T78i.exe 2832 4V567k.exe 2832 4V567k.exe 1144 7e136857a9.exe 1144 7e136857a9.exe 2832 4V567k.exe 2832 4V567k.exe 532 a0eb1585be.exe 532 a0eb1585be.exe 532 a0eb1585be.exe 532 a0eb1585be.exe 532 a0eb1585be.exe 532 a0eb1585be.exe 532 a0eb1585be.exe 532 a0eb1585be.exe 532 a0eb1585be.exe 532 a0eb1585be.exe 1796 5336d02776.exe 1796 5336d02776.exe 4372 3a4934b937.exe 4372 3a4934b937.exe 468 044eebfde1.exe 468 044eebfde1.exe 4868 c384f1f4fd.exe 4868 c384f1f4fd.exe 468 044eebfde1.exe 468 044eebfde1.exe 4868 c384f1f4fd.exe 4868 c384f1f4fd.exe 4868 c384f1f4fd.exe 3524 skotes.exe 3524 skotes.exe 380 skotes.exe 380 skotes.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 2832 4V567k.exe Token: SeDebugPrivilege 644 taskkill.exe Token: SeDebugPrivilege 3252 taskkill.exe Token: SeDebugPrivilege 2216 taskkill.exe Token: SeDebugPrivilege 620 taskkill.exe Token: SeDebugPrivilege 4288 taskkill.exe Token: SeDebugPrivilege 456 firefox.exe Token: SeDebugPrivilege 456 firefox.exe Token: SeDebugPrivilege 4868 c384f1f4fd.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 4312 1r83Q2.exe 468 044eebfde1.exe 468 044eebfde1.exe 468 044eebfde1.exe 468 044eebfde1.exe 468 044eebfde1.exe 468 044eebfde1.exe 468 044eebfde1.exe 456 firefox.exe 456 firefox.exe 456 firefox.exe 456 firefox.exe 456 firefox.exe 456 firefox.exe 456 firefox.exe 456 firefox.exe 456 firefox.exe 456 firefox.exe 456 firefox.exe 456 firefox.exe 456 firefox.exe 456 firefox.exe 456 firefox.exe 456 firefox.exe 456 firefox.exe 468 044eebfde1.exe 456 firefox.exe 456 firefox.exe 456 firefox.exe 456 firefox.exe 468 044eebfde1.exe 468 044eebfde1.exe 468 044eebfde1.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 468 044eebfde1.exe 468 044eebfde1.exe 468 044eebfde1.exe 468 044eebfde1.exe 468 044eebfde1.exe 468 044eebfde1.exe 468 044eebfde1.exe 456 firefox.exe 456 firefox.exe 456 firefox.exe 456 firefox.exe 456 firefox.exe 456 firefox.exe 456 firefox.exe 456 firefox.exe 456 firefox.exe 456 firefox.exe 456 firefox.exe 456 firefox.exe 456 firefox.exe 456 firefox.exe 456 firefox.exe 456 firefox.exe 468 044eebfde1.exe 456 firefox.exe 456 firefox.exe 456 firefox.exe 456 firefox.exe 468 044eebfde1.exe 468 044eebfde1.exe 468 044eebfde1.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 456 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1776 wrote to memory of 3376 1776 a7a849b0d2691df31f83d8c8cc4c880b03668afbc72dcd7c21a06bd908e0b93a.exe 82 PID 1776 wrote to memory of 3376 1776 a7a849b0d2691df31f83d8c8cc4c880b03668afbc72dcd7c21a06bd908e0b93a.exe 82 PID 1776 wrote to memory of 3376 1776 a7a849b0d2691df31f83d8c8cc4c880b03668afbc72dcd7c21a06bd908e0b93a.exe 82 PID 3376 wrote to memory of 3208 3376 a3g66.exe 83 PID 3376 wrote to memory of 3208 3376 a3g66.exe 83 PID 3376 wrote to memory of 3208 3376 a3g66.exe 83 PID 3208 wrote to memory of 4312 3208 p0q26.exe 84 PID 3208 wrote to memory of 4312 3208 p0q26.exe 84 PID 3208 wrote to memory of 4312 3208 p0q26.exe 84 PID 4312 wrote to memory of 1788 4312 1r83Q2.exe 85 PID 4312 wrote to memory of 1788 4312 1r83Q2.exe 85 PID 4312 wrote to memory of 1788 4312 1r83Q2.exe 85 PID 3208 wrote to memory of 3368 3208 p0q26.exe 86 PID 3208 wrote to memory of 3368 3208 p0q26.exe 86 PID 3208 wrote to memory of 3368 3208 p0q26.exe 86 PID 1788 wrote to memory of 2244 1788 skotes.exe 91 PID 1788 wrote to memory of 2244 1788 skotes.exe 91 PID 1788 wrote to memory of 2244 1788 skotes.exe 91 PID 3376 wrote to memory of 3676 3376 a3g66.exe 95 PID 3376 wrote to memory of 3676 3376 a3g66.exe 95 PID 3376 wrote to memory of 3676 3376 a3g66.exe 95 PID 1776 wrote to memory of 2832 1776 a7a849b0d2691df31f83d8c8cc4c880b03668afbc72dcd7c21a06bd908e0b93a.exe 98 PID 1776 wrote to memory of 2832 1776 a7a849b0d2691df31f83d8c8cc4c880b03668afbc72dcd7c21a06bd908e0b93a.exe 98 PID 1776 wrote to memory of 2832 1776 a7a849b0d2691df31f83d8c8cc4c880b03668afbc72dcd7c21a06bd908e0b93a.exe 98 PID 1788 wrote to memory of 1144 1788 skotes.exe 100 PID 1788 wrote to memory of 1144 1788 skotes.exe 100 PID 1788 wrote to memory of 1144 1788 skotes.exe 100 PID 1788 wrote to memory of 532 1788 skotes.exe 102 PID 1788 wrote to memory of 532 1788 skotes.exe 102 PID 1788 wrote to memory of 532 1788 skotes.exe 102 PID 1788 wrote to memory of 1796 1788 skotes.exe 105 PID 1788 wrote to memory of 1796 1788 skotes.exe 105 PID 1788 wrote to memory of 1796 1788 skotes.exe 105 PID 1788 wrote to memory of 4372 1788 skotes.exe 107 PID 1788 wrote to memory of 4372 1788 skotes.exe 107 PID 1788 wrote to memory of 4372 1788 skotes.exe 107 PID 1788 wrote to memory of 468 1788 skotes.exe 110 PID 1788 wrote to memory of 468 1788 skotes.exe 110 PID 1788 wrote to memory of 468 1788 skotes.exe 110 PID 468 wrote to memory of 644 468 044eebfde1.exe 111 PID 468 wrote to memory of 644 468 044eebfde1.exe 111 PID 468 wrote to memory of 644 468 044eebfde1.exe 111 PID 468 wrote to memory of 3252 468 044eebfde1.exe 113 PID 468 wrote to memory of 3252 468 044eebfde1.exe 113 PID 468 wrote to memory of 3252 468 044eebfde1.exe 113 PID 468 wrote to memory of 2216 468 044eebfde1.exe 116 PID 468 wrote to memory of 2216 468 044eebfde1.exe 116 PID 468 wrote to memory of 2216 468 044eebfde1.exe 116 PID 468 wrote to memory of 620 468 044eebfde1.exe 118 PID 468 wrote to memory of 620 468 044eebfde1.exe 118 PID 468 wrote to memory of 620 468 044eebfde1.exe 118 PID 468 wrote to memory of 4288 468 044eebfde1.exe 120 PID 468 wrote to memory of 4288 468 044eebfde1.exe 120 PID 468 wrote to memory of 4288 468 044eebfde1.exe 120 PID 468 wrote to memory of 1568 468 044eebfde1.exe 122 PID 468 wrote to memory of 1568 468 044eebfde1.exe 122 PID 1568 wrote to memory of 456 1568 firefox.exe 123 PID 1568 wrote to memory of 456 1568 firefox.exe 123 PID 1568 wrote to memory of 456 1568 firefox.exe 123 PID 1568 wrote to memory of 456 1568 firefox.exe 123 PID 1568 wrote to memory of 456 1568 firefox.exe 123 PID 1568 wrote to memory of 456 1568 firefox.exe 123 PID 1568 wrote to memory of 456 1568 firefox.exe 123 PID 1568 wrote to memory of 456 1568 firefox.exe 123 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\a7a849b0d2691df31f83d8c8cc4c880b03668afbc72dcd7c21a06bd908e0b93a.exe"C:\Users\Admin\AppData\Local\Temp\a7a849b0d2691df31f83d8c8cc4c880b03668afbc72dcd7c21a06bd908e0b93a.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\a3g66.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\a3g66.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p0q26.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p0q26.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1r83Q2.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1r83Q2.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Users\Admin\AppData\Local\Temp\1010920001\N67fLgN.exe"C:\Users\Admin\AppData\Local\Temp\1010920001\N67fLgN.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2244
-
-
C:\Users\Admin\AppData\Local\Temp\1011067001\7e136857a9.exe"C:\Users\Admin\AppData\Local\Temp\1011067001\7e136857a9.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1144
-
-
C:\Users\Admin\AppData\Local\Temp\1011068001\a0eb1585be.exe"C:\Users\Admin\AppData\Local\Temp\1011068001\a0eb1585be.exe"6⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:532
-
-
C:\Users\Admin\AppData\Local\Temp\1011069001\5336d02776.exe"C:\Users\Admin\AppData\Local\Temp\1011069001\5336d02776.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1796 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1796 -s 17647⤵
- Program crash
PID:2088
-
-
-
C:\Users\Admin\AppData\Local\Temp\1011070001\3a4934b937.exe"C:\Users\Admin\AppData\Local\Temp\1011070001\3a4934b937.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4372
-
-
C:\Users\Admin\AppData\Local\Temp\1011071001\044eebfde1.exe"C:\Users\Admin\AppData\Local\Temp\1011071001\044eebfde1.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:644
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3252
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2216
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:620
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4288
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:456 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2000 -parentBuildID 20240401114208 -prefsHandle 1916 -prefMapHandle 1908 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {bdaf6c81-f6a1-432a-bd23-e2b187268a39} 456 "\\.\pipe\gecko-crash-server-pipe.456" gpu9⤵PID:3932
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2424 -parentBuildID 20240401114208 -prefsHandle 2408 -prefMapHandle 2404 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9261aca2-e52e-4069-b17a-840bef97da03} 456 "\\.\pipe\gecko-crash-server-pipe.456" socket9⤵PID:732
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3172 -childID 1 -isForBrowser -prefsHandle 2712 -prefMapHandle 2716 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {43d4729a-e636-438b-9a89-bd422e7950f0} 456 "\\.\pipe\gecko-crash-server-pipe.456" tab9⤵PID:5060
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4252 -childID 2 -isForBrowser -prefsHandle 4244 -prefMapHandle 4240 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cc9bf6f3-fdfb-47a2-8655-76f152698474} 456 "\\.\pipe\gecko-crash-server-pipe.456" tab9⤵PID:1640
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4772 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 3064 -prefMapHandle 4780 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {84ad7f30-0b2f-4083-a3e9-726bf189f236} 456 "\\.\pipe\gecko-crash-server-pipe.456" utility9⤵
- Checks processor information in registry
PID:6680
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5108 -childID 3 -isForBrowser -prefsHandle 5100 -prefMapHandle 5096 -prefsLen 27097 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {07f5f827-4bdf-4389-b7da-5c92f35d786c} 456 "\\.\pipe\gecko-crash-server-pipe.456" tab9⤵PID:3664
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5264 -childID 4 -isForBrowser -prefsHandle 5272 -prefMapHandle 5276 -prefsLen 27097 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cc8803fe-48fc-44f3-9785-f65d94588dde} 456 "\\.\pipe\gecko-crash-server-pipe.456" tab9⤵PID:6204
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5432 -childID 5 -isForBrowser -prefsHandle 5472 -prefMapHandle 5108 -prefsLen 27097 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c78db48f-52f4-4d92-b891-d1d7f8ed8454} 456 "\\.\pipe\gecko-crash-server-pipe.456" tab9⤵PID:3504
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1011072001\c384f1f4fd.exe"C:\Users\Admin\AppData\Local\Temp\1011072001\c384f1f4fd.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4868
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2K3647.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2K3647.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3368 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3368 -s 17245⤵
- Program crash
PID:3304
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3368 -s 17125⤵
- Program crash
PID:4572
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3T78i.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3T78i.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3676
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4V567k.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4V567k.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2832
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3368 -ip 33681⤵PID:3976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3368 -ip 33681⤵PID:1900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1796 -ip 17961⤵PID:1804
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3524
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:380
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
3Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\activity-stream.discovery_stream.json
Filesize19KB
MD5c294447c1a40a2f5ff54ef1eee5238a5
SHA1243eb81a355461102df5d01daa0c72078fda33bc
SHA2561449c30998a70f9510d5a91e186e0ae94e979ba4b1564c1892cb15a6725e2f2c
SHA5127d3afa308535e0db56047923de031e6e2905879477e06ab5ad85313f6ddc4a23ab7d9c879290a405aed6c794c6f49aeddfd5f0cac5dddb880e51727c3a31b799
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD53b90895cc1b9686c4aa9d4f7af58778c
SHA123015ee28bba41326dff3706b7d4353aabeb7c91
SHA256d2a5fdcf2aa9a8e4fd1ec4043bf1269070de55ef620292abffd18924efd794b2
SHA5122caf57295a506b9dde148a222c5dcbd1a0fadf24b6e98672388d475cf0641bca9626e31c19b6a9733b014d656f04003966f1a74b3cd1c8e7667b1225e5fd913d
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD5a62c2d739a9effab9753327c86c7c499
SHA1bb1ef5ffbb6a2d715b9341544dfc609ab0fe5d6e
SHA256590a7368debf84e89583158d92fe54475c896ce1aa9ca0acab68458b12be4cb3
SHA512740789a4cc5966caaa860e78fdc24207fa1ea6dd7b1e7d49798e8dd1bff5c13170b948cdfbb85ffa0b43334a6084a7344d364dce667ada37c62a69f204727f4c
-
Filesize
5.2MB
MD5974049047492d0a73f8c23e25de924ef
SHA197a726b88efaf70855af7cebb15c7564c45bc43c
SHA2565ca90e9115be40ba7fd2d93b848fd2b0be7eb37115ed96f23d3b8051854981d8
SHA512bf7350536c404b84a25abf91c00f7fa6a78f3e857fe6a0915fff124f121cfa6138001d075858c077d36ef0698b92c040942e4eb539531d7c890be77fdc0b8ec2
-
Filesize
1.8MB
MD5b5b924daa28ce7eb471031a862943d87
SHA14aae84a28a03b6d212bd004f627def909c2a4b2f
SHA2564d7544535ad3268527e5b104fc193cb87daa25350bae773526c06813a422c561
SHA5124c356a21d851998801c71e3ea83c4de5ec1643fdd7bea3d864a33674ab94d9671d2daab334ee9fca319cb6c2be71b75a0c5ea779f3f7ff5e4107ae4e029f6ed9
-
Filesize
4.2MB
MD5f03985dcb8d3b56a81c755d9bc8fe757
SHA15c0bfcdfa9befc8995142de82025bcd1e22c93b0
SHA256637f8140aed64627e2fc8a1f140aa3180ba3253695d359a152806eb9952f3153
SHA512bd8419521b8abe347286ac76c82513a3bf3b33a0479ef777a2fcd3954c8a527df343fe3220e09264aa999454cf011d481a5fcd66d370b34ba4a79e727d50840f
-
Filesize
1.8MB
MD59eacb2dfe937aeab2c9cb9d965c269c1
SHA1717bbd41cb69b0493f73ac4648388e128160ab8f
SHA256371c2c879ba710047e98590fc18f7d44bd1f37c888af70e63231c2ed68f6e8d9
SHA51211d36fe349daa00fda2c9008d912de09a8c66fde695f72b5f9a22537812300adad83b8e8c27f0949a966630aa5e6f6dc8006c3cb5665487183a884759d007bf9
-
Filesize
1.7MB
MD5cfabae0dc0b3e5a60db97cbd9dd3e3ad
SHA112b6af9e093cec7d9dbd322be0c5424be744f061
SHA2563d3bc8c0fda9069a2d5d2ad9aa5ad2934176d114750f392ba0b56cafdd1ec6af
SHA512903de23d5393a070044090f44362a5ab52b99c8d1813db380595261dd117b87e06ac57393a453c00fc5cfa3890425c0e1d0a26f7dee5092e1b403f937bc29bef
-
Filesize
900KB
MD5327ad758220dac40ac243237f865ba3e
SHA1faa5ef84b87d33342a5aa7ff49716f697e84a0c7
SHA25635c9b1e7027eb04d43912e591f1c9e5e27a7d253d160a0a62f5be918d72b58f2
SHA512f2cc186486ff4786b9d1902210051ae5f7b7e45bbd48325b501ff8a0a2b561625344627c59a2fd2f36456e50ef3ce90ae77097091c5a53eb406d2ed9e0a641e2
-
Filesize
2.7MB
MD567466e868b5675802ac6add1995fc334
SHA19e9f90c0807ebf03763fd879bf7f2adacb75ebb7
SHA25626deb5fce54c5f384047c08de98be90fe1163e811b4376dd063e3d06cce33bb5
SHA512454920a1ab4b101aa7f6e89cc51179e04f8240b2fc7166b018ea473f712114a4b112c4dffd2e2bd9ca57654b13a76c3d85846dbc6b4d029e93073498f560f32a
-
Filesize
2.7MB
MD59f5d8f5736c56bf4e105986c45826ee2
SHA197ed9621747e50e6e2b160a877d7284f14936ea7
SHA256cc1a5e5ce9073f537a1ddb8288fc118d89619fc05adada309bc2940672bf1d94
SHA5124eef13dabd0f6ef9b02631cdf3a9e53517c20b0dbad24f95d85d25a81b28e41772effda95f673151336f7e7618f32ca18e7b1b8bf56e089c02459b0b9d0d30f1
-
Filesize
5.5MB
MD50622d244c7bf3eb9619e685ca948aa61
SHA126f4fd31f19950baaf664e2900d169b7f2b15541
SHA256776a281781617c7f8ca04d24b46104be37869c349dc15aabf26922a32cadc330
SHA5127ec2527952e260f117297b761bd8f718fe48ee28fa0b90819ba8c470674ddb04cce60267c9440ee360c2629382078da3693e8f3d9fc5da26fa0e146b11fbb9d1
-
Filesize
1.7MB
MD549810be76078b1e31a42939904408646
SHA1d0618f8f6672d0a0a0129d22fbc27ac78a50d335
SHA2560cf4db03c344e3d8ea7cba18a8f7a7d15aec6eb56925147e040ae89fa114e1c0
SHA5121271f60e6ffe1c671bc897911ef6ffe99fc53adae9a9c863e9275c3f2e2679405430f598be961524e404cc7c9deb277244dfcb4a1d1da0aa3028291afaf1466d
-
Filesize
3.7MB
MD50a1737a201a8864b25e02a282b8dbf98
SHA11e95b7f017c38bc6d54af321106fef97b3e2cfe3
SHA256d227ab639d4dc9c061b33068723f2c3a3c4cae858f25ddddc1d4d3dc7095151b
SHA512d88a696e1ca1e88c2ffee27cb2168b8cc4ed48b54edb2e5504c915c546d239019bf7ef7dcd63b92643036e4094295ad3ac861eb51672c9b59ccff4b2c465dd3b
-
Filesize
1.8MB
MD507c0e876f2705822f3cf62e99dd2673f
SHA11e3a7a5f6e2b44e86d65501a22be50726ffa66cc
SHA2560ee71fb4b00794c51129f484e8e1e4eb60f69e7d385bb772e4f3afc40da586fb
SHA512c5ba13840ea5e7d9a2a6d3c46d5cc131092b7c417de60b7dbf9b1f2b794dad1492eda04a09dee822fb29da8a86062f60efc4dfdf7e4fe8407749ab3e5af75c38
-
Filesize
1.8MB
MD5fa502b1d8b3fd6084a8ac5607ae1a701
SHA1da41f5746a8df16395ba38fa1ca010b3a58b7cb1
SHA256dab3f816539604580361e0f1de4f391c6a643d472220c3c3565033a80afb9c20
SHA512a9c721f4b966d1935fa54c2248fede74d665dbae873da50c87c64fa5ad19f598c623029e56764cfd6c45a331e907be87cd2a1ef47bfe78e2ae22465fea9c5502
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\AlternateServices.bin
Filesize8KB
MD5097924bdc3b682524b5ec9ae49e11b3a
SHA1cc52dc3a1a8ced79974ba24c34fc69ca697cd867
SHA256245fc42e9a2977373a288a2a466459b6aca5bd03f1fad333c0dc45412edf464e
SHA51258a4a688716b449fad5bee490c4b84c8477f247fa90d551ffd695ef662987817895692aea72d18b998220415e6a39695b1d2e8d7b967ede1161634f50fb8403b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.bin
Filesize23KB
MD5965dd5e174ed7940084d1a5aee54cc58
SHA155d77ad6608e2afba4fe4e5b5cf594e020eb7f0c
SHA2566240cbc4e94f01dc7d119e778f3a268632158456645a6e36a162021e5881e552
SHA512e4be98a7b22e86e13117570752881db6f5ac25e1d941f58a280b1947181c7671a34b942667adbfeeabc1036d93b1658405807b7407f1645a7265b408acc5e544
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.bin
Filesize5KB
MD5cab466eb20a1f4212b5d3d052ac8cc0c
SHA12ae6c2e39f1cc81fd0c1e8555f3b277c9ea31fdc
SHA25605b7e561887cf4c6b7c2f42a7b7a2a42d9b7e7df3beca71088530f8d56d332d1
SHA512d4a4247e78dd5926a15776b80c77fa6b26cd199f1c07dbe9c3926f79a0c120847f67e06c8836ada455cbd52ce69a45e2950bbfdc110faa473caeb41123117d26
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.bin
Filesize6KB
MD513d12a1d2040c33f5d63d028d78b3c23
SHA10c68525bd0ef5c749e1c6b150416d9582dac4f0e
SHA256d3cace661a11017a47330589fff94da068b37b0a397b87a9c347289fe92c6db8
SHA512ec75425a152bdb90c388eb75ab3f316f70d2f52251a1b1b3e80ba40f3248244248b1005e22914fa19ca848bd7558b52c24aced5cc1adb298f31e50da380e56ad
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.bin
Filesize15KB
MD5a98f7fed83dc9cf23d3d1520c007ef3e
SHA1b53119932514ad0b68d20ba1a2b1c75fd834529e
SHA256ee1b64c6d67095dac6c49aa74b625ab630414e956ae2413a6fa74b25d671842e
SHA512c2a731d153b9ac61847bc95d6175a4226aa2cafff052c2b838f9b5788f2c921b3a407782313e9d55b8b4ce294ac792122f855a0ba37dc6e347a63f05b13d6acf
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD52d8bde0269e746981ae6ee3a23d94560
SHA19eace6cc87cba6c4e69b7dfb9ea5ec7e7081ccee
SHA256adcc7c7f087de661378cbb42f9fad8786d4a930a7a611e38f78ed2e46a071da4
SHA512adcb19c90a27f7f57b5a53ee204e40f3325ebe791b067a755a96db30b9b9d2e9e5c2b31fbeb2bc7fc206ba596c99fe635bba2dad756f6fb5e9fa1d7da1f5529e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD53591d56be7362af03709727fa4710fa1
SHA140a3366c0b39a073ff4689f2c287f8eef4626e68
SHA256d25fedf8b48987da67db3b287eca144bd68d847a497eef857322ae05199a127c
SHA5127094d7fd999a56c5610617d9acc894833177b80f6741ae4399004d8b7ab78039ed0011452a1ebf6098ca5668c8b99068357515ca932d819b2243d63c301a4da5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD50594ec65e82abdb74993524a68a0842d
SHA194173ee56ce28ec167ec4d0192b77b2e49917bb6
SHA256e750e009922ad33a34ee49348d036efefcb9dd581dde471e9aa397dda1e4b130
SHA51239f62c70c38b2de5b657276f88d55d544e5085ecfd463bc21bad8072bfa9cfb7fa733e0259d5b688e7762441e8196913743311fe3dfee8ea03c1524a636b1559
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD53c775a8dd14f6fd9d2091d2a9223939d
SHA18a28277f6b816dce21852774b98f2e6ce6de787a
SHA2566e5f84200e2a4be39b476592e8ec5b10ddfa3f648f6a282d3b4ab156a22331aa
SHA512fe66cf06521d26bd71cd9fe4fadce2599c07345ad0e190f669a423f2396295e59723d2ba644c15aaa3f055dd9a3013827ab5be79efc67aa6019553d1f69c543c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5e32a82b8abc8000852e437e312aab259
SHA17324f8b77366fa56ce1ccabeb1197abd2c51e2be
SHA25668455571b9a4a0301ea950192a570740df6f71cd2bf529b728904772084c41ff
SHA51263646cc3ce677353fc44c2b9426ff0e328ae01c844cfd273dc764f3c4ddd008ef1fc3624e571cdc59533f54a127a6f4fd1103c5075879fd5e00b33289724650c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5f298b7869f3e8de3e592b95e2b3a0848
SHA1894c604c7fce73d060eecdefb18f472f0368202f
SHA256dc267c3dca4e8f0d06449f14fa8bd9407ac17733c485db302e5c745224b67262
SHA512889183429604e60711da0162e530f70e1c59e0dfe660025199947aa409fd01d537b75e18ce3e6023eb7804e6dcbbdaf7dff5c7de4b822838547fd7085d858e94
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\0de2cc5b-4f6c-4c23-b276-02c61dc8fbdd
Filesize982B
MD518be1c1145f2210b9162e7a353714538
SHA17acc8f2b2fc8b8af26f7f2b1dc3e261faa36a120
SHA2566864eb957847003b03512dc4af4f9e2343b6239f070790bd8419b56731350e8e
SHA51276094193750e0114e72ccd80d4505c447e28fcd74fb30a3bd5d5ca77e3da4ef26c5363751d95a36dbcaa7febf14284cd2477018b0ab451c1938245635adab5b4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\0df07199-9071-454f-8abc-c98a262d6073
Filesize671B
MD5295721e836c0a59a47bc2394d0e8c479
SHA1d856084d23033c673a094f25a823ed964bf93920
SHA256842ff11bb18cf2c7be0fe5eee249be40232b0ea223991f27c3a1f2fd84796928
SHA512f0e0e713b627bc20f2be000a0ae1100084771d083616efa180a86440676e1e4c48f13ac6d60504c4ac5bca7ecebd40f0e445c2ed5ae3959f0daec7db79de26be
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\cc4b0243-66f1-4fd3-9796-0fb722b34e60
Filesize26KB
MD52ea8c555fcfa1024f9b0cfc06ed86342
SHA1f5f771bde13e4b689313b318ba73585c88f8043d
SHA256973a9e52fdc6e94e01a9f0e221aebb2b20ec75bee6fbfbd47d7733dd390815f8
SHA5124415d28a1b5e0e2098c3c4a63403b252fdb659dee4bf67aa9cfe4ac37624a931ccca89896e0e7e870d3be6adc0caf30765c92c1f7425099ae5e4648cd3ff5a35
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD5599769f50fe12d368fd5e82a4b1dfcdc
SHA18dfbc49d241fc9c506f067ce56c31dcbaff7dc86
SHA256405e24c9b7b655e65539a96c2452b98de1d161b1014161e9be15feebe0f8f317
SHA5123de7367ffd967cf2b35285e961525f3251c2ba28954b13c272fe9d1e56bed29c6244a041c0115444d9aa45d7a3f377fe8cffc6175df34188615e254fffd789b1
-
Filesize
10KB
MD54e3785e250f0caeafa947c91e786e7a4
SHA1bd424d9914ce644b25e399f727b8bd99420623e3
SHA256bca65be8f36f2254e1cb8280a3abcb4b99c30d7de011730595047b030b6d6324
SHA5128354add2ac8db4ac8ef6d52275a9292952f8461337e44306debfd5339f9ed8a2b1135317012d9cfc8496cb904ebb1b6fe55b76aec02327f36fd3c2b08ed7cbac
-
Filesize
10KB
MD5315ca388101629010057abbcbae353bc
SHA125eac7ef25ad22e903fa4f00e68ae009b7d79492
SHA25687266d01eb077d44993972a137b6f0bb5dab70a89f1d9c947a6cc72e6c0a2375
SHA512a39f5b946a4ca80541df246a69a8ff1f82b9d0ab60b786ef323a4b2ab2baecc70711323f7db343a451dfdda99d55e8d6ff60ce76033a76ef58c9ebfafb475f0d
-
Filesize
15KB
MD5662d520d103bf120984fec6ba9c15941
SHA13dc15000ceb0d64acc5e2af980dfa689e7652238
SHA256dc735ef4f88cb098f4eca4e20f86296ab88dd553defc219b6fa769780fad78ae
SHA5129025c09da9ef59e97c70bdf53566b28b13e3d3e6c1d87c57eaccb42c0b56873a2133b73648bb41e31d024b7bbed552c40b2338a5cdcc1961068df6ab6834e047
-
Filesize
10KB
MD57cc1957dfcfdeafafbfdc586be21b0e1
SHA111279bf509d075cbf47bd3d04d93ff173622f72b
SHA256a4198e022b3091ffa27102170b558849fffe5934e646356305ffa7e6ab316359
SHA512ea8bbbedb0df5710491aa8610c53b7044529a2043764433f9225878615c75ce52c5bda93117e1e3bbb7cd5828ba75057eaf1011c4d05ffacfec638a97c6ddaaf
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\security_state\data.safe.bin
Filesize2.9MB
MD59f35867a0e9f089283a4f2f68560056a
SHA1375630a0073214270ebe3f8d65b31f4cc5189cd5
SHA25658ef003a8495c9d99ad496343b6b63457298c402a3fd32547a72ee5d525f2e14
SHA512381e4c5d9e6dfed7769910213ef0be6314e842eb1e2d82988da1f13ae8ada3bf1f0aae7c4411dcea17c0da5d67664c5d059edde9761b8daf47e8845548944ca3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize896KB
MD57d1c9f574e4f9c6a62b5760ffaca9447
SHA1f1287e0f9a5568fce6e1540ae895449ee11365b3
SHA2561be1897456f9ab8e7db700b18759f4ef37a90976842cd750ade5e8541798d64a
SHA5124ec5807e450d905d208e3244847bbbbf36aee853b0c58032adf1216bdfdb84a07a06ab8e90e5e979cd2de4e60f4f9d3bc914bf069b934445b6aa04f26a0477dd