Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
113s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2024, 01:55
Static task
static1
General
-
Target
4f5f1c9889431cc75be53e961faaf2ffa52248389edcdb2ceeba9eea2b698a26N.exe
-
Size
5.5MB
-
MD5
431d07331d554406e5ece39efef63100
-
SHA1
7190b3f9486cc3006b3c87a1bd768a5075ce3fec
-
SHA256
4f5f1c9889431cc75be53e961faaf2ffa52248389edcdb2ceeba9eea2b698a26
-
SHA512
c84547e0db3633f732b9475a2b4cc7e458360ce2034d87742c79026920b968ce3821f5bff655817c2b0c39712fb55c3ad38dd1622a039a37cb3c84916cf9db23
-
SSDEEP
98304:DC7U3dqe+9pmBPp7nR13PAtvCALzOvfHLBCeKd/YXCvk4E2OTGIT8z3TiSyq5sFS:cYdL+0BnRWJnOvfEfd/kN72OT7Az3uSR
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://powerful-avoids.sbs
https://motion-treesz.sbs
https://disobey-curly.sbs
https://leg-sate-boat.sbs
https://story-tense-faz.sbs
https://blade-govern.sbs
https://occupy-blushi.sbs
https://frogs-severz.sbs
https://property-imper.sbs
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
stealc
drum
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" e365d6c64c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" e365d6c64c.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection e365d6c64c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" e365d6c64c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" e365d6c64c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" e365d6c64c.exe -
Stealc family
-
Enumerates VirtualBox registry keys 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF deba0aa887.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF 824c892181.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 824c892181.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2e5481.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4862f7d5ff.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ac69a1a299.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e365d6c64c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ deba0aa887.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1V43U5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3c65X.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 22 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion deba0aa887.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion deba0aa887.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 824c892181.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3c65X.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ac69a1a299.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 824c892181.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2e5481.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e365d6c64c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ac69a1a299.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2e5481.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3c65X.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4862f7d5ff.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e365d6c64c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1V43U5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1V43U5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4862f7d5ff.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 1V43U5.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 13 IoCs
pid Process 3796 g5d02.exe 3212 1V43U5.exe 1540 skotes.exe 2136 2e5481.exe 4260 3c65X.exe 4304 4862f7d5ff.exe 3944 ac69a1a299.exe 4104 c439c3579c.exe 5132 e365d6c64c.exe 5656 deba0aa887.exe 6116 skotes.exe 6300 824c892181.exe 6720 skotes.exe -
Identifies Wine through registry keys 2 TTPs 11 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 4862f7d5ff.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine e365d6c64c.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 1V43U5.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 3c65X.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine ac69a1a299.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine deba0aa887.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 824c892181.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 2e5481.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features e365d6c64c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" e365d6c64c.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" g5d02.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\4862f7d5ff.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010844001\\4862f7d5ff.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ac69a1a299.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010845001\\ac69a1a299.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\c439c3579c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010846001\\c439c3579c.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e365d6c64c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010847001\\e365d6c64c.exe" skotes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4f5f1c9889431cc75be53e961faaf2ffa52248389edcdb2ceeba9eea2b698a26N.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0009000000023ca7-82.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
pid Process 3212 1V43U5.exe 1540 skotes.exe 2136 2e5481.exe 4260 3c65X.exe 4304 4862f7d5ff.exe 3944 ac69a1a299.exe 5132 e365d6c64c.exe 5656 deba0aa887.exe 6116 skotes.exe 6300 824c892181.exe 6720 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1V43U5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 3432 2136 WerFault.exe 86 4092 4304 WerFault.exe 95 4676 4304 WerFault.exe 95 -
System Location Discovery: System Language Discovery 1 TTPs 17 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ac69a1a299.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e365d6c64c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language deba0aa887.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 824c892181.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4862f7d5ff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4f5f1c9889431cc75be53e961faaf2ffa52248389edcdb2ceeba9eea2b698a26N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1V43U5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language g5d02.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2e5481.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3c65X.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c439c3579c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 3452 taskkill.exe 232 taskkill.exe 3796 taskkill.exe 4780 taskkill.exe 4632 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 45 IoCs
pid Process 3212 1V43U5.exe 3212 1V43U5.exe 1540 skotes.exe 1540 skotes.exe 2136 2e5481.exe 2136 2e5481.exe 4260 3c65X.exe 4260 3c65X.exe 4304 4862f7d5ff.exe 4304 4862f7d5ff.exe 3944 ac69a1a299.exe 3944 ac69a1a299.exe 4104 c439c3579c.exe 4104 c439c3579c.exe 4104 c439c3579c.exe 4104 c439c3579c.exe 5132 e365d6c64c.exe 5132 e365d6c64c.exe 5132 e365d6c64c.exe 5132 e365d6c64c.exe 5132 e365d6c64c.exe 5656 deba0aa887.exe 5656 deba0aa887.exe 5656 deba0aa887.exe 5656 deba0aa887.exe 5656 deba0aa887.exe 5656 deba0aa887.exe 5656 deba0aa887.exe 5656 deba0aa887.exe 5656 deba0aa887.exe 5656 deba0aa887.exe 6116 skotes.exe 6116 skotes.exe 6300 824c892181.exe 6300 824c892181.exe 6300 824c892181.exe 6300 824c892181.exe 6300 824c892181.exe 6300 824c892181.exe 6300 824c892181.exe 6300 824c892181.exe 6300 824c892181.exe 6300 824c892181.exe 6720 skotes.exe 6720 skotes.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 3452 taskkill.exe Token: SeDebugPrivilege 232 taskkill.exe Token: SeDebugPrivilege 3796 taskkill.exe Token: SeDebugPrivilege 4780 taskkill.exe Token: SeDebugPrivilege 4632 taskkill.exe Token: SeDebugPrivilege 1520 firefox.exe Token: SeDebugPrivilege 1520 firefox.exe Token: SeDebugPrivilege 5132 e365d6c64c.exe -
Suspicious use of FindShellTrayWindow 32 IoCs
pid Process 3212 1V43U5.exe 4104 c439c3579c.exe 4104 c439c3579c.exe 4104 c439c3579c.exe 4104 c439c3579c.exe 4104 c439c3579c.exe 4104 c439c3579c.exe 1520 firefox.exe 1520 firefox.exe 1520 firefox.exe 1520 firefox.exe 4104 c439c3579c.exe 1520 firefox.exe 1520 firefox.exe 1520 firefox.exe 1520 firefox.exe 1520 firefox.exe 1520 firefox.exe 1520 firefox.exe 1520 firefox.exe 1520 firefox.exe 1520 firefox.exe 1520 firefox.exe 1520 firefox.exe 1520 firefox.exe 1520 firefox.exe 1520 firefox.exe 1520 firefox.exe 1520 firefox.exe 4104 c439c3579c.exe 4104 c439c3579c.exe 4104 c439c3579c.exe -
Suspicious use of SendNotifyMessage 30 IoCs
pid Process 4104 c439c3579c.exe 4104 c439c3579c.exe 4104 c439c3579c.exe 4104 c439c3579c.exe 4104 c439c3579c.exe 4104 c439c3579c.exe 1520 firefox.exe 1520 firefox.exe 1520 firefox.exe 1520 firefox.exe 4104 c439c3579c.exe 1520 firefox.exe 1520 firefox.exe 1520 firefox.exe 1520 firefox.exe 1520 firefox.exe 1520 firefox.exe 1520 firefox.exe 1520 firefox.exe 1520 firefox.exe 1520 firefox.exe 1520 firefox.exe 1520 firefox.exe 1520 firefox.exe 1520 firefox.exe 1520 firefox.exe 1520 firefox.exe 4104 c439c3579c.exe 4104 c439c3579c.exe 4104 c439c3579c.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1520 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3148 wrote to memory of 3796 3148 4f5f1c9889431cc75be53e961faaf2ffa52248389edcdb2ceeba9eea2b698a26N.exe 83 PID 3148 wrote to memory of 3796 3148 4f5f1c9889431cc75be53e961faaf2ffa52248389edcdb2ceeba9eea2b698a26N.exe 83 PID 3148 wrote to memory of 3796 3148 4f5f1c9889431cc75be53e961faaf2ffa52248389edcdb2ceeba9eea2b698a26N.exe 83 PID 3796 wrote to memory of 3212 3796 g5d02.exe 84 PID 3796 wrote to memory of 3212 3796 g5d02.exe 84 PID 3796 wrote to memory of 3212 3796 g5d02.exe 84 PID 3212 wrote to memory of 1540 3212 1V43U5.exe 85 PID 3212 wrote to memory of 1540 3212 1V43U5.exe 85 PID 3212 wrote to memory of 1540 3212 1V43U5.exe 85 PID 3796 wrote to memory of 2136 3796 g5d02.exe 86 PID 3796 wrote to memory of 2136 3796 g5d02.exe 86 PID 3796 wrote to memory of 2136 3796 g5d02.exe 86 PID 3148 wrote to memory of 4260 3148 4f5f1c9889431cc75be53e961faaf2ffa52248389edcdb2ceeba9eea2b698a26N.exe 94 PID 3148 wrote to memory of 4260 3148 4f5f1c9889431cc75be53e961faaf2ffa52248389edcdb2ceeba9eea2b698a26N.exe 94 PID 3148 wrote to memory of 4260 3148 4f5f1c9889431cc75be53e961faaf2ffa52248389edcdb2ceeba9eea2b698a26N.exe 94 PID 1540 wrote to memory of 4304 1540 skotes.exe 95 PID 1540 wrote to memory of 4304 1540 skotes.exe 95 PID 1540 wrote to memory of 4304 1540 skotes.exe 95 PID 1540 wrote to memory of 3944 1540 skotes.exe 102 PID 1540 wrote to memory of 3944 1540 skotes.exe 102 PID 1540 wrote to memory of 3944 1540 skotes.exe 102 PID 1540 wrote to memory of 4104 1540 skotes.exe 105 PID 1540 wrote to memory of 4104 1540 skotes.exe 105 PID 1540 wrote to memory of 4104 1540 skotes.exe 105 PID 4104 wrote to memory of 3452 4104 c439c3579c.exe 106 PID 4104 wrote to memory of 3452 4104 c439c3579c.exe 106 PID 4104 wrote to memory of 3452 4104 c439c3579c.exe 106 PID 4104 wrote to memory of 232 4104 c439c3579c.exe 116 PID 4104 wrote to memory of 232 4104 c439c3579c.exe 116 PID 4104 wrote to memory of 232 4104 c439c3579c.exe 116 PID 4104 wrote to memory of 3796 4104 c439c3579c.exe 118 PID 4104 wrote to memory of 3796 4104 c439c3579c.exe 118 PID 4104 wrote to memory of 3796 4104 c439c3579c.exe 118 PID 4104 wrote to memory of 4780 4104 c439c3579c.exe 120 PID 4104 wrote to memory of 4780 4104 c439c3579c.exe 120 PID 4104 wrote to memory of 4780 4104 c439c3579c.exe 120 PID 4104 wrote to memory of 4632 4104 c439c3579c.exe 122 PID 4104 wrote to memory of 4632 4104 c439c3579c.exe 122 PID 4104 wrote to memory of 4632 4104 c439c3579c.exe 122 PID 4104 wrote to memory of 4580 4104 c439c3579c.exe 124 PID 4104 wrote to memory of 4580 4104 c439c3579c.exe 124 PID 4580 wrote to memory of 1520 4580 firefox.exe 125 PID 4580 wrote to memory of 1520 4580 firefox.exe 125 PID 4580 wrote to memory of 1520 4580 firefox.exe 125 PID 4580 wrote to memory of 1520 4580 firefox.exe 125 PID 4580 wrote to memory of 1520 4580 firefox.exe 125 PID 4580 wrote to memory of 1520 4580 firefox.exe 125 PID 4580 wrote to memory of 1520 4580 firefox.exe 125 PID 4580 wrote to memory of 1520 4580 firefox.exe 125 PID 4580 wrote to memory of 1520 4580 firefox.exe 125 PID 4580 wrote to memory of 1520 4580 firefox.exe 125 PID 4580 wrote to memory of 1520 4580 firefox.exe 125 PID 1520 wrote to memory of 2676 1520 firefox.exe 126 PID 1520 wrote to memory of 2676 1520 firefox.exe 126 PID 1520 wrote to memory of 2676 1520 firefox.exe 126 PID 1520 wrote to memory of 2676 1520 firefox.exe 126 PID 1520 wrote to memory of 2676 1520 firefox.exe 126 PID 1520 wrote to memory of 2676 1520 firefox.exe 126 PID 1520 wrote to memory of 2676 1520 firefox.exe 126 PID 1520 wrote to memory of 2676 1520 firefox.exe 126 PID 1520 wrote to memory of 2676 1520 firefox.exe 126 PID 1520 wrote to memory of 2676 1520 firefox.exe 126 PID 1520 wrote to memory of 2676 1520 firefox.exe 126 PID 1520 wrote to memory of 2676 1520 firefox.exe 126 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f5f1c9889431cc75be53e961faaf2ffa52248389edcdb2ceeba9eea2b698a26N.exe"C:\Users\Admin\AppData\Local\Temp\4f5f1c9889431cc75be53e961faaf2ffa52248389edcdb2ceeba9eea2b698a26N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\g5d02.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\g5d02.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1V43U5.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1V43U5.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\1010844001\4862f7d5ff.exe"C:\Users\Admin\AppData\Local\Temp\1010844001\4862f7d5ff.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4304 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4304 -s 17206⤵
- Program crash
PID:4676
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4304 -s 17326⤵
- Program crash
PID:4092
-
-
-
C:\Users\Admin\AppData\Local\Temp\1010845001\ac69a1a299.exe"C:\Users\Admin\AppData\Local\Temp\1010845001\ac69a1a299.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3944
-
-
C:\Users\Admin\AppData\Local\Temp\1010846001\c439c3579c.exe"C:\Users\Admin\AppData\Local\Temp\1010846001\c439c3579c.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3452
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:232
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3796
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4780
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4632
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking6⤵
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking7⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2072 -parentBuildID 20240401114208 -prefsHandle 1996 -prefMapHandle 1936 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {f86965c6-3d27-4667-9d36-f4068725852a} 1520 "\\.\pipe\gecko-crash-server-pipe.1520" gpu8⤵PID:2676
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2504 -parentBuildID 20240401114208 -prefsHandle 2480 -prefMapHandle 2476 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e3b4f65a-d568-40d8-bdd4-e77df07718fa} 1520 "\\.\pipe\gecko-crash-server-pipe.1520" socket8⤵PID:4160
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3128 -childID 1 -isForBrowser -prefsHandle 2876 -prefMapHandle 3352 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {460ee1b7-eb3b-4837-97ba-66b266b0fa02} 1520 "\\.\pipe\gecko-crash-server-pipe.1520" tab8⤵PID:2736
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3656 -childID 2 -isForBrowser -prefsHandle 2996 -prefMapHandle 2700 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0efb5473-9c74-41a1-ad23-f6e315bafdbc} 1520 "\\.\pipe\gecko-crash-server-pipe.1520" tab8⤵PID:380
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4828 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4816 -prefMapHandle 4808 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6af671c1-7f72-4a8b-a3b9-e4eedfc78bd1} 1520 "\\.\pipe\gecko-crash-server-pipe.1520" utility8⤵
- Checks processor information in registry
PID:6088
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4712 -childID 3 -isForBrowser -prefsHandle 5344 -prefMapHandle 5348 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1d73179e-975a-4d2e-ae2e-5158ca65d415} 1520 "\\.\pipe\gecko-crash-server-pipe.1520" tab8⤵PID:6948
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5472 -childID 4 -isForBrowser -prefsHandle 5480 -prefMapHandle 5484 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {844e5edf-391e-462b-a85b-0b1c5aab2471} 1520 "\\.\pipe\gecko-crash-server-pipe.1520" tab8⤵PID:6964
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5688 -childID 5 -isForBrowser -prefsHandle 5648 -prefMapHandle 5456 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {961cf87a-3ab8-45d8-b74d-178d0312535a} 1520 "\\.\pipe\gecko-crash-server-pipe.1520" tab8⤵PID:6976
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1010847001\e365d6c64c.exe"C:\Users\Admin\AppData\Local\Temp\1010847001\e365d6c64c.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5132
-
-
C:\Users\Admin\AppData\Local\Temp\1010848001\deba0aa887.exe"C:\Users\Admin\AppData\Local\Temp\1010848001\deba0aa887.exe"5⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5656
-
-
C:\Users\Admin\AppData\Local\Temp\1010849001\824c892181.exe"C:\Users\Admin\AppData\Local\Temp\1010849001\824c892181.exe"5⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:6300
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2e5481.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2e5481.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2136 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2136 -s 17404⤵
- Program crash
PID:3432
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3c65X.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3c65X.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4260
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2136 -ip 21361⤵PID:3680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4304 -ip 43041⤵PID:5064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4304 -ip 43041⤵PID:2940
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6116
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6720
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
3Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lhmx4teg.default-release\activity-stream.discovery_stream.json.tmp
Filesize24KB
MD541dcc221ee4a1830d48f68c076e90ac3
SHA157e1b6cc6f8c43cce22fd99170c2543fb4fe9fb7
SHA256061a7fe43a6d65f94481be99f7f75c34381a4acf7afde5c954fa770143fc1602
SHA512917d2a4cdbdceda413a3233582eacd2a630c6eeba1b7521ae3ca965d82c81908a50111c4c356a74c96ced0e096324711597e486c94a8438831b74f5d5ddb9a37
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lhmx4teg.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD525c135ee56d1cde8ef43a57f9626ec39
SHA12d8a73a8d6c5e38b33102c35a3a057c39cd2c937
SHA256fd91f6197706ca4f9392f6835a74a3b887148eb256590cf45ccbd77e8d2ec19d
SHA512b7d27fdf0259b07964d670e95ef134907270a7bcd9ea2557fa358d9198ff244b0c2a70a291b0c4bf448e2b3ed07a7cece7c863c51b72c361a9ec48351943899e
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lhmx4teg.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD5280f2692fe898e635bd2df917d52a49b
SHA16cb4300e8b957b17a1c0a6bfc2946bbc30ff5f62
SHA25683b3333a9c1eb1030bde13e9f55323af78d7f3d58179bfa9cf7500efb75f7030
SHA512eaa87d9e78c984b10de9a9857ed0079be4b0246904dce3b59662267d8711b86bc2aab783901165c44fcb6f8a1f8009b0d12e16f59d7ca7306bd1fb7919d1cf82
-
Filesize
1.8MB
MD56d0ed690b55469a36f4d8dd63dc1a849
SHA13af3bdf9c80a8465ad712e848049a44fc45f9048
SHA25691f71afd4b057e2158dcc39103f2f0d5b2dee1d4de548cd7f5d21af079eb6e08
SHA512183ea9c36764e5c57d29cc65aa3102d76d9b7376eb116db47f8b352acf9928a7a6f2dd782125e518b4e1831b4186a2f232d93b1e2efd46ce4355c57e32f6568d
-
Filesize
1.7MB
MD5a3f571eb536a49139b4623a2b9c3163b
SHA173b9dcc58d5689f14e235145c91a0746945f2f5f
SHA256b1a60185968b2a49858789a9b868794509446fbe89b3edc037880ffa8bb5838a
SHA512903c39b06ee797cabff03a3440439ea7844cd3b5ed7aa909f72424065f68efdf0abb9cd530a91310ee70684836d6f143895b9d5e795447aa17b1aee832a8b412
-
Filesize
900KB
MD5de59b05525ad5db28f660aec4be8b308
SHA1a0e74f8a682bda0d6a568b99a94395c3020803fc
SHA256a2d5e85a2f427898a8da82531dd0ee247eb6ced7dd677ea987eb1df03b00e72c
SHA512a6cce45ee3a60319e527d0a51d6b129bc06f7fed4bd954e9f0d2f553a1f7513bbd26af326eb27a9f704b8fffa5f7904aa7d5e247477e25a514c5673f2a54af45
-
Filesize
2.7MB
MD53067cb25365e797d56b69fc5b1705978
SHA1e8943c8d923d835dedc8f251b3ae26c2ad54479a
SHA256d506f842541eef8c371031ea20d86124636de572903c44e086e8e96404e34a20
SHA512d69f85c50a454aceb8f03092704128837487106f9a57b50d1045cb49dda650bee77d0be9fc6d7709eace32ebcb4f081023794c7b997bfdd6b879c0a8746869b6
-
Filesize
4.2MB
MD5c94feb7d4fe260f53cc227b9833c6b7e
SHA18d1f50a705256b9b8b688ed385799ed297ca0138
SHA2569926ea0046fd1472946e4db23cd38e22ceecb5dd384ed91fc105a6c4d266ca1d
SHA512fe606f2006ba996ca9afda8b42c89e297106541ced3b2cef15689c6e2a361b69cd2275fa21ba333031befc5321f7c463e935da0ee7a18b07d12ec4f24d191ce6
-
Filesize
4.3MB
MD5a3b6fc75e9332e814f8068fc74937028
SHA1aacf898df6cdc6b7da5d97b7a5728108a1551a18
SHA256a28d11a71ff174f3f011ec4b94d0c67c6c07a367f165347ad02d7004dae27a26
SHA5123d5db5aab7952acb8bcdf670a4eaa14b606b6518219ba15ab6bc5f2c9b5feb2d0acf3c5146751965d33f5cb93bd87048f2e5f4e3928aa3358143cc682ac0bc84
-
Filesize
1.7MB
MD56ae8d6dbe0f7340866c08c3f7b65978a
SHA1b1afeaa2019c2df5c0be69191ed9c91ba0af72cd
SHA256425637dfc7232d7373898820b23226d268bf36496b766b5e367a06855864549f
SHA512b813ff37f5d50473cc7c874eb35656c1faee5fb21e3f67c235c68553aab7769d87021c1c70efc2259470ce7a2f9399191d7b73c0ccf20bceb2b6946bc5e34961
-
Filesize
3.7MB
MD5c457d150c3d465d46178d421dc715bb5
SHA13a381660d7910b044aab768b036c025b9780676a
SHA256bd77b7a6d25abc25e8e95e37f50b2cc36d5a0bb669086aef8bf88a31eba7cf35
SHA5125128a23b3c72466409daa285f51e938c48a7ee48d979be80f03c1815376fbec73d75da15ff513792336f15eb7fbdd868933de08bafedcffcd9538945ce13b623
-
Filesize
1.8MB
MD59efe8b10651e453ec4ac8f1c92658faa
SHA167df7b838ba3c0dd1048b631fceed24ffc3015ca
SHA25669740625c8837f120cc04135a3e1149cef098c3b1b94eb578cf8d5f5bae41cf0
SHA5126a7aef13e737156c3d6fc0d4ab1d8c4d2aeb4fd831c91d0b26a2329983471d526834cbd0b6983531be015364947b520031f2e5537f4d69c2251e871ef57b942f
-
Filesize
1.8MB
MD56f817d33d580eb1b17c7159cd9e48c6e
SHA171bbb2928b40734b668e2c834f7b99f77400c8cf
SHA25689bdff74d8814a4bf1441de3727d2cc526aa12574aea8bf45cc0441e3b6dd6d8
SHA512688ec59c4eeb6d6945621aef2c4bd8a46c966b91b739099fe88c495129d18ca7a3587852a9ceb0e25955d50a6eaca3b690a04fd57e73ad23337b1adcb1ba97fb
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\AlternateServices.bin
Filesize6KB
MD51c730e4a710bb510299428f8fef03416
SHA1040c8c4577354b529873a277b76609bc17bf0362
SHA256a2c5034d5c81f845e47a741e5ea84a03ebe66d89712fedc0950803138a055dd6
SHA512526079b51a42e667f9159b820d77efe28cc4b21243265fef7d639a163bf4b33471ced848030633d94d419d290759ae83b7c24ed913c489337d75b4701de39f0e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\AlternateServices.bin
Filesize18KB
MD54672238f52bf7970432d375d562c028b
SHA170865e459af433f831a39a6cc02dd342ff6ebf3c
SHA256d5a4539aa16eee7cbe03f2c6e1cd6d2e0a68c3671cdbe184a4f714ef3ba9b199
SHA512da2f6a9d62c09e6ab0d4cb7ed36f9b9fa62b58c920e7a4e3d2a9ba51897e612150ae2cdb4406bd5e4a25fef8aa769fa3ff77b73868d4b60e748cccbc7aa08a02
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\AlternateServices.bin
Filesize8KB
MD55e87064b7ccfbf926d3a90b7bc4b78f6
SHA11f33991f2adcfe4f466821ace22ef09cce12635b
SHA256ab85bb9a9abfc67d5efa230563b7ce8a27198381a5e55695e22b191719355cc5
SHA5124d8ae88ee10fecea00affacfc4eb81187abdd4e52c76d8cc2f0a7499d3c297c3c1553436387c256589fe5aebfabc087ab1b6a22b656fdb9e7eeb00cd751095a9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\AlternateServices.bin
Filesize12KB
MD58d977f2e3511e1d7b208d86be9f1bf07
SHA152d655ae3fabdbe2059dd98b11b720747b16392e
SHA2561459bd20196c3993533be27287f693cc22ad082012a62bc80660de4cbdd9c261
SHA512c46abec6da2505959f205e5ba8d34802f4557981d38bf8c4a8eb62dc095dabf9353f2d426b50c222ec2a147396bd0a794429fff8b4500e59af74f689dce909b5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.bin
Filesize23KB
MD54d9d258052fc0267f70bc2e6a4212e90
SHA120273edf3dc64fb352d0cadcafd5a3005755f1b6
SHA2564de0ef216798a5a6e81753ba1bbfe89738216258f90d9148d32964333976f31d
SHA512fc0878ffac9f4c72c18585a77648d3ecefad29380b5719acb7b3800ff587702f40f8de3e04669421e25fee9d41bfb7ba71ee6c4de173fb0e56ceb30b3c9e7595
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.bin
Filesize22KB
MD56ee746c55cc02cacabdae420d29dc6d5
SHA1d5eb2fe1212fceb1c7bc1df6c2262eec639ac9af
SHA256840c6c75d55bd665f5cb6c04a935bb5fce54904e2e6774990d9114b0471b469a
SHA5129b7a02a30d888cac4d9df90ca4a46077cf2b36c872acd37b737513b42fc7531afd8c65a8ae705f67cb9caee6cdf65f1412bfe2774eb019a5c1df9097d77eebf8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.bin
Filesize32KB
MD5c067ec58bfe80d464e0ede6b63abe622
SHA15253a234626dd343f419972d53a26e8e4181323f
SHA2560a4eea30d0c05e8a4662802cb346ab5fbc54565d41b69cf79953166f597d5c0a
SHA5126929356a3fb991e3abfb3471e34563ae43d27f50d7f73ee2cc35d0efaddab192e5ba388eafbd795fb22ba7f07f4dccf2312ce020a80a206c357c7a395d8a848f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.bin
Filesize31KB
MD59a081f510b70cbb321dd0b356d32daf3
SHA10d985160e85bcc4a3e237c7e3aacd6d499db65b5
SHA256362b8486f4cc3fe62a0a63f3cfe4d21c0523437edae1d31858852eb0e20862a6
SHA512c43dee1cb818cc228af0d3babe4cc69860684d990d246006f85f4574512bf6c0149461323cff704dbcc6f1a784ad1ebf4d952422589d70160573e2a8c40395d5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp
Filesize21KB
MD53d5b9bfc85bdb538cc1f470e128b6be3
SHA1cd513c3b42935aabef651655768440c34dfc8ecb
SHA256b1559a0050ff3ca9bab76d267bd5f0f467bc4db4afcbc978ebd883dca79c9444
SHA5123c265471375c0af1e7e06ca573bf1a1970591f8b4a85cd8d2f8e5babbdc27cb7e3594848f3596000cfbbd51b52b5c999630ff61355e712b6ab86a8723fe27298
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp
Filesize32KB
MD593b7a39aeb8217102ec4ba029a543a7a
SHA1147e87f3499164f27d1613c4217f131843173af6
SHA256c74f1f2af7efc5e729302230dd78018875cfa464f1aece9332861b5cca01c56a
SHA5127e34790b1860f51606095e217ee22414b26f63e2aabaea2821a67e5b29cac19a9dff4ba19f04def4ea96f06dab45b5cceed61888716e39f290206b112d9c092b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp
Filesize32KB
MD5a5225a8a52e094e5730990e74ba38382
SHA137051aed77960043701ea6b9043f1142a57d99a0
SHA256261c8a4af7ee898419394cef57d8d8fd1b5d7ab78dcb134f8e7548ae6ee61ba7
SHA512f92e8f3fceeed8e9756826d994ab66cc5e62690f293c28f30a615c386df18a406018c9ce0b94c98e37085538c80c2b5011f33a6ca53b4b23c214ce30435b6179
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD5e62ab78e7eaedd5a50935301db96f5d6
SHA101b3f4edd792c65cec2cc575f6d043c786958b50
SHA2566adfd1de3827a7e3bd2ba517ebd37b74e3f448c33450ce1f79edf661eee32fd4
SHA512a791af41e9586d6f3aa186a38456115602cc37a2e71ec73fe015d71a2175656bedf45345e5dd6885957065829180b7d5271dea433e2bcd4b1c026414d328cdfc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\pending_pings\68030415-c0db-4d9d-86ec-3afe798d30ee
Filesize982B
MD54c7ee2279558be3fd6ea6005a711b0d3
SHA18b76d5e7f7dfe044a9ccb976613c6f763c4c4865
SHA2561eab78f04b87c6413bf0e2b5f63e671f70f21a70a29c2191c397ff333d253aa7
SHA5123966165028bc5f96398cda3a9d96d0da4999afb5fc0d3d4e537f6bad8475493cc984c11ae9607c704306028f5816441e9ad9c5b01fd9bebfd8a3b556400bc236
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\pending_pings\911c7ffe-d230-4b35-b7e8-c8722f08982c
Filesize659B
MD50a709f5bae2338ae0df474b40a051c0a
SHA130973c6b0bfff3408ff460322dfb76a62591b495
SHA25607f9ab91900df650020dbcf08b1016cc7201313e815a9365459551d000744164
SHA5123ac1dec7a2e707d207cdbd00c039e301a4807861e6dc6008f6b3d31d9ac17c39550f14115a6f56e3e2b49cc127faf3dd858dbb3079d33c82e875561e896d5a18
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD5df2f60f2272ba95a2a709c59a69fa242
SHA149745921d20f6271fdcbd8491ed44df579bf7af9
SHA256149227b1732b2f810141e0afd626e86c7e128c1f97a7354d3224bb30834676f0
SHA51237e06d8fe7483b2319e5506b0b87f82e995cb613a250a9c96287b7bf55d704fdc30484f4158e8a0f8a84df6b59503c3a06f9bbb3d3dbe47220c03f7c0f1c139e
-
Filesize
12KB
MD5316cadc507c201b41500c534926adec5
SHA16bfcecd9c7338e41384cd7ad1f3d2c96d98bdb5d
SHA2563d9bf309ab0b414f844660fb89a4677a6f1c79828a3b9d8a0a1311a806c12476
SHA51285afa4ebfb09f62c3d23b8cbef9f5687098177e6ea2e5057651dff4a9defc307240185e99cb614b619204210fad2c82ab290a6779c21338cf76c69b0ddc7f843
-
Filesize
15KB
MD55d0082d3bf55aea075a00427a7621097
SHA1c65ae8d4570eb39eb8495604ba52483c4210eadd
SHA2560521d258d6e67ba44efffd1a146863b1c9e294afcbd720ef937d5d413720eb6e
SHA51266297107f4ec27906f13e162fc33d4d8e7ab88248ba815bfbed45df6368d86708ffe3179b2483dd54fbd66a345a7b6145dc5fde3aac396844d592e98083114eb
-
Filesize
11KB
MD528e8759dd11cc47532ce2098e6e60a7a
SHA1c53cfaf303454d467c1d26f071eb2fa94d4af900
SHA25653980c530f52f9a8c2a3a9a7d5bd105331e6169e352d0af41acac73522ae4341
SHA512ee68b3895db9266c1fd559538a939c1366c3d70b0255c676973c72470b5001ea9615954c6743a06d64fdcbf7e444bba03bf31bff0409a04d8133b2a352ec7123
-
Filesize
14KB
MD5319f47527fd5265df98d9a63d2adad30
SHA16fa432ec30c0993a09cbf9d8e516f4fb44aee71d
SHA256a8d4846c47fd348c571d0099e9737a65fe99f348924e9fd052aaf59613a09c34
SHA512b22e2c116ab13d59e170e96035becae28b81533bdb1fc0dcc3197659a94c816c939cf0e0a9b0dab55df7d1e4711305afdd77fff612b2010aba30a77b90965c93
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize2.1MB
MD5ec5582bb3174c248dbd4f9bb3a1372c9
SHA1f00fdb8e4da86468c73498e473fba5c2f0553305
SHA2566d654981e7b1a33725c4f94b08295c2ed04dfb4ba3a7e82a362c1fa9ca83c5b6
SHA51266a2200bd4bdbe2adeed5dfa9c9c2a0b6609329f0efa4562275e63cc2e35e613d019095047076dbda16fa573607ab147a9222c0e852cec6a372909816d901617