Analysis
-
max time kernel
142s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-12-2024 09:25
Static task
static1
Behavioral task
behavioral1
Sample
fb08ab4d990067daa56452dad65d4322e5d1bd733e6b0e6a9b326141ef4992b5.exe
Resource
win7-20240903-en
General
-
Target
fb08ab4d990067daa56452dad65d4322e5d1bd733e6b0e6a9b326141ef4992b5.exe
-
Size
1.8MB
-
MD5
ebf798251a9e386cfb6cffcf54542830
-
SHA1
5da641a8ad380d88bd05208339832f4886401d5d
-
SHA256
fb08ab4d990067daa56452dad65d4322e5d1bd733e6b0e6a9b326141ef4992b5
-
SHA512
0a5a2e0075c44997f73c4784936b7407cec2624bbd57917c65b279104f55aa8e84d73fab29e481e8b6c12c67d23432ceff859b6e54bec5f0069d18866bafbcf0
-
SSDEEP
24576:c6aKEeSuuI1l4wI3O0GH7OKDfm5GWJTph4VKXAiXecS6+gNpp9MHoFtlgs7o3/TT:TRKW4wmkSKLmrtCjiXtpKKg31
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
drum
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 39d239c75b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 39d239c75b.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 39d239c75b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 39d239c75b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 39d239c75b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 39d239c75b.exe -
Stealc family
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF 5c6d9b1bc5.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 06454c5a6b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d62007b2ee.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ fb08ab4d990067daa56452dad65d4322e5d1bd733e6b0e6a9b326141ef4992b5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c82859a172.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5c6d9b1bc5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 39d239c75b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 20 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d62007b2ee.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c82859a172.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 06454c5a6b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d62007b2ee.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 39d239c75b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c82859a172.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5c6d9b1bc5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5c6d9b1bc5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion fb08ab4d990067daa56452dad65d4322e5d1bd733e6b0e6a9b326141ef4992b5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 06454c5a6b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 39d239c75b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion fb08ab4d990067daa56452dad65d4322e5d1bd733e6b0e6a9b326141ef4992b5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation fb08ab4d990067daa56452dad65d4322e5d1bd733e6b0e6a9b326141ef4992b5.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 12 IoCs
pid Process 2124 skotes.exe 2132 skotes.exe 1652 HRFuUub.exe 1956 tpZOod0.exe 4828 c82859a172.exe 3692 5c6d9b1bc5.exe 1860 06454c5a6b.exe 4632 d62007b2ee.exe 4900 10cc2566fe.exe 4516 39d239c75b.exe 5660 skotes.exe 3468 skotes.exe -
Identifies Wine through registry keys 2 TTPs 10 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine c82859a172.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 5c6d9b1bc5.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 06454c5a6b.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine d62007b2ee.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine fb08ab4d990067daa56452dad65d4322e5d1bd733e6b0e6a9b326141ef4992b5.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 39d239c75b.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe -
Loads dropped DLL 2 IoCs
pid Process 1652 HRFuUub.exe 1956 tpZOod0.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 39d239c75b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 39d239c75b.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\06454c5a6b.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1011256001\\06454c5a6b.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\d62007b2ee.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1011257001\\d62007b2ee.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\10cc2566fe.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1011258001\\10cc2566fe.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\39d239c75b.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1011259001\\39d239c75b.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000023cc3-174.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
pid Process 1504 fb08ab4d990067daa56452dad65d4322e5d1bd733e6b0e6a9b326141ef4992b5.exe 2124 skotes.exe 2132 skotes.exe 4828 c82859a172.exe 3692 5c6d9b1bc5.exe 1860 06454c5a6b.exe 4632 d62007b2ee.exe 4516 39d239c75b.exe 5660 skotes.exe 3468 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job fb08ab4d990067daa56452dad65d4322e5d1bd733e6b0e6a9b326141ef4992b5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 436 1652 WerFault.exe 86 2812 1956 WerFault.exe 93 -
System Location Discovery: System Language Discovery 1 TTPs 17 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HRFuUub.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d62007b2ee.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fb08ab4d990067daa56452dad65d4322e5d1bd733e6b0e6a9b326141ef4992b5.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 10cc2566fe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 39d239c75b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c82859a172.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 10cc2566fe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 10cc2566fe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tpZOod0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5c6d9b1bc5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06454c5a6b.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 2080 taskkill.exe 224 taskkill.exe 2224 taskkill.exe 3980 taskkill.exe 4548 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 35 IoCs
pid Process 1504 fb08ab4d990067daa56452dad65d4322e5d1bd733e6b0e6a9b326141ef4992b5.exe 1504 fb08ab4d990067daa56452dad65d4322e5d1bd733e6b0e6a9b326141ef4992b5.exe 2124 skotes.exe 2124 skotes.exe 2132 skotes.exe 2132 skotes.exe 4828 c82859a172.exe 4828 c82859a172.exe 3692 5c6d9b1bc5.exe 3692 5c6d9b1bc5.exe 3692 5c6d9b1bc5.exe 3692 5c6d9b1bc5.exe 3692 5c6d9b1bc5.exe 3692 5c6d9b1bc5.exe 3692 5c6d9b1bc5.exe 3692 5c6d9b1bc5.exe 3692 5c6d9b1bc5.exe 3692 5c6d9b1bc5.exe 1860 06454c5a6b.exe 1860 06454c5a6b.exe 4632 d62007b2ee.exe 4632 d62007b2ee.exe 4900 10cc2566fe.exe 4900 10cc2566fe.exe 4516 39d239c75b.exe 4516 39d239c75b.exe 4516 39d239c75b.exe 4516 39d239c75b.exe 4516 39d239c75b.exe 4900 10cc2566fe.exe 4900 10cc2566fe.exe 5660 skotes.exe 5660 skotes.exe 3468 skotes.exe 3468 skotes.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 4548 taskkill.exe Token: SeDebugPrivilege 2080 taskkill.exe Token: SeDebugPrivilege 224 taskkill.exe Token: SeDebugPrivilege 2224 taskkill.exe Token: SeDebugPrivilege 3980 taskkill.exe Token: SeDebugPrivilege 4584 firefox.exe Token: SeDebugPrivilege 4584 firefox.exe Token: SeDebugPrivilege 4516 39d239c75b.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 1504 fb08ab4d990067daa56452dad65d4322e5d1bd733e6b0e6a9b326141ef4992b5.exe 4900 10cc2566fe.exe 4900 10cc2566fe.exe 4900 10cc2566fe.exe 4900 10cc2566fe.exe 4900 10cc2566fe.exe 4900 10cc2566fe.exe 4900 10cc2566fe.exe 4900 10cc2566fe.exe 4900 10cc2566fe.exe 4584 firefox.exe 4584 firefox.exe 4584 firefox.exe 4584 firefox.exe 4584 firefox.exe 4584 firefox.exe 4584 firefox.exe 4584 firefox.exe 4584 firefox.exe 4584 firefox.exe 4584 firefox.exe 4584 firefox.exe 4584 firefox.exe 4584 firefox.exe 4584 firefox.exe 4584 firefox.exe 4584 firefox.exe 4584 firefox.exe 4584 firefox.exe 4584 firefox.exe 4584 firefox.exe 4900 10cc2566fe.exe 4900 10cc2566fe.exe 4900 10cc2566fe.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 4900 10cc2566fe.exe 4900 10cc2566fe.exe 4900 10cc2566fe.exe 4900 10cc2566fe.exe 4900 10cc2566fe.exe 4900 10cc2566fe.exe 4900 10cc2566fe.exe 4900 10cc2566fe.exe 4900 10cc2566fe.exe 4584 firefox.exe 4584 firefox.exe 4584 firefox.exe 4584 firefox.exe 4584 firefox.exe 4584 firefox.exe 4584 firefox.exe 4584 firefox.exe 4584 firefox.exe 4584 firefox.exe 4584 firefox.exe 4584 firefox.exe 4584 firefox.exe 4584 firefox.exe 4584 firefox.exe 4584 firefox.exe 4584 firefox.exe 4584 firefox.exe 4584 firefox.exe 4584 firefox.exe 4900 10cc2566fe.exe 4900 10cc2566fe.exe 4900 10cc2566fe.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4584 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1504 wrote to memory of 2124 1504 fb08ab4d990067daa56452dad65d4322e5d1bd733e6b0e6a9b326141ef4992b5.exe 83 PID 1504 wrote to memory of 2124 1504 fb08ab4d990067daa56452dad65d4322e5d1bd733e6b0e6a9b326141ef4992b5.exe 83 PID 1504 wrote to memory of 2124 1504 fb08ab4d990067daa56452dad65d4322e5d1bd733e6b0e6a9b326141ef4992b5.exe 83 PID 2124 wrote to memory of 1652 2124 skotes.exe 86 PID 2124 wrote to memory of 1652 2124 skotes.exe 86 PID 2124 wrote to memory of 1652 2124 skotes.exe 86 PID 1652 wrote to memory of 4988 1652 HRFuUub.exe 88 PID 1652 wrote to memory of 4988 1652 HRFuUub.exe 88 PID 1652 wrote to memory of 4988 1652 HRFuUub.exe 88 PID 1652 wrote to memory of 4988 1652 HRFuUub.exe 88 PID 1652 wrote to memory of 4988 1652 HRFuUub.exe 88 PID 1652 wrote to memory of 4988 1652 HRFuUub.exe 88 PID 1652 wrote to memory of 4988 1652 HRFuUub.exe 88 PID 1652 wrote to memory of 4988 1652 HRFuUub.exe 88 PID 1652 wrote to memory of 4988 1652 HRFuUub.exe 88 PID 1652 wrote to memory of 4988 1652 HRFuUub.exe 88 PID 1652 wrote to memory of 4988 1652 HRFuUub.exe 88 PID 1652 wrote to memory of 4988 1652 HRFuUub.exe 88 PID 1652 wrote to memory of 4988 1652 HRFuUub.exe 88 PID 1652 wrote to memory of 4988 1652 HRFuUub.exe 88 PID 1652 wrote to memory of 4988 1652 HRFuUub.exe 88 PID 1652 wrote to memory of 4988 1652 HRFuUub.exe 88 PID 1652 wrote to memory of 4988 1652 HRFuUub.exe 88 PID 1652 wrote to memory of 4988 1652 HRFuUub.exe 88 PID 1652 wrote to memory of 4988 1652 HRFuUub.exe 88 PID 1652 wrote to memory of 4988 1652 HRFuUub.exe 88 PID 1652 wrote to memory of 4988 1652 HRFuUub.exe 88 PID 2124 wrote to memory of 1956 2124 skotes.exe 93 PID 2124 wrote to memory of 1956 2124 skotes.exe 93 PID 2124 wrote to memory of 1956 2124 skotes.exe 93 PID 1956 wrote to memory of 2936 1956 tpZOod0.exe 95 PID 1956 wrote to memory of 2936 1956 tpZOod0.exe 95 PID 1956 wrote to memory of 2936 1956 tpZOod0.exe 95 PID 1956 wrote to memory of 2936 1956 tpZOod0.exe 95 PID 1956 wrote to memory of 2936 1956 tpZOod0.exe 95 PID 1956 wrote to memory of 2936 1956 tpZOod0.exe 95 PID 1956 wrote to memory of 2936 1956 tpZOod0.exe 95 PID 1956 wrote to memory of 2936 1956 tpZOod0.exe 95 PID 1956 wrote to memory of 2936 1956 tpZOod0.exe 95 PID 1956 wrote to memory of 2936 1956 tpZOod0.exe 95 PID 1956 wrote to memory of 2936 1956 tpZOod0.exe 95 PID 1956 wrote to memory of 2936 1956 tpZOod0.exe 95 PID 1956 wrote to memory of 2936 1956 tpZOod0.exe 95 PID 1956 wrote to memory of 2936 1956 tpZOod0.exe 95 PID 1956 wrote to memory of 2936 1956 tpZOod0.exe 95 PID 1956 wrote to memory of 2936 1956 tpZOod0.exe 95 PID 1956 wrote to memory of 2936 1956 tpZOod0.exe 95 PID 1956 wrote to memory of 2936 1956 tpZOod0.exe 95 PID 1956 wrote to memory of 2936 1956 tpZOod0.exe 95 PID 1956 wrote to memory of 2936 1956 tpZOod0.exe 95 PID 1956 wrote to memory of 2936 1956 tpZOod0.exe 95 PID 2124 wrote to memory of 4828 2124 skotes.exe 103 PID 2124 wrote to memory of 4828 2124 skotes.exe 103 PID 2124 wrote to memory of 4828 2124 skotes.exe 103 PID 2124 wrote to memory of 3692 2124 skotes.exe 107 PID 2124 wrote to memory of 3692 2124 skotes.exe 107 PID 2124 wrote to memory of 3692 2124 skotes.exe 107 PID 2124 wrote to memory of 1860 2124 skotes.exe 111 PID 2124 wrote to memory of 1860 2124 skotes.exe 111 PID 2124 wrote to memory of 1860 2124 skotes.exe 111 PID 2124 wrote to memory of 4632 2124 skotes.exe 113 PID 2124 wrote to memory of 4632 2124 skotes.exe 113 PID 2124 wrote to memory of 4632 2124 skotes.exe 113 PID 2124 wrote to memory of 4900 2124 skotes.exe 114 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb08ab4d990067daa56452dad65d4322e5d1bd733e6b0e6a9b326141ef4992b5.exe"C:\Users\Admin\AppData\Local\Temp\fb08ab4d990067daa56452dad65d4322e5d1bd733e6b0e6a9b326141ef4992b5.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\1011118001\HRFuUub.exe"C:\Users\Admin\AppData\Local\Temp\1011118001\HRFuUub.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"4⤵PID:4988
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1652 -s 10124⤵
- Program crash
PID:436
-
-
-
C:\Users\Admin\AppData\Local\Temp\1011233001\tpZOod0.exe"C:\Users\Admin\AppData\Local\Temp\1011233001\tpZOod0.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"4⤵PID:2936
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1956 -s 10084⤵
- Program crash
PID:2812
-
-
-
C:\Users\Admin\AppData\Local\Temp\1011250001\c82859a172.exe"C:\Users\Admin\AppData\Local\Temp\1011250001\c82859a172.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4828
-
-
C:\Users\Admin\AppData\Local\Temp\1011255001\5c6d9b1bc5.exe"C:\Users\Admin\AppData\Local\Temp\1011255001\5c6d9b1bc5.exe"3⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3692
-
-
C:\Users\Admin\AppData\Local\Temp\1011256001\06454c5a6b.exe"C:\Users\Admin\AppData\Local\Temp\1011256001\06454c5a6b.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1860
-
-
C:\Users\Admin\AppData\Local\Temp\1011257001\d62007b2ee.exe"C:\Users\Admin\AppData\Local\Temp\1011257001\d62007b2ee.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4632
-
-
C:\Users\Admin\AppData\Local\Temp\1011258001\10cc2566fe.exe"C:\Users\Admin\AppData\Local\Temp\1011258001\10cc2566fe.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4900 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4548
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2080
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:224
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2224
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3980
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:5016
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4584 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1980 -parentBuildID 20240401114208 -prefsHandle 1892 -prefMapHandle 1884 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {2c62913f-1356-47ea-891a-ec850c9a0ee5} 4584 "\\.\pipe\gecko-crash-server-pipe.4584" gpu6⤵PID:2656
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2468 -parentBuildID 20240401114208 -prefsHandle 2460 -prefMapHandle 2456 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2f257051-d14b-420a-8c44-666738bbd730} 4584 "\\.\pipe\gecko-crash-server-pipe.4584" socket6⤵PID:920
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3008 -childID 1 -isForBrowser -prefsHandle 2936 -prefMapHandle 3028 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1244 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {864f4dea-99eb-490d-978e-36f2fdbb4fdc} 4584 "\\.\pipe\gecko-crash-server-pipe.4584" tab6⤵PID:3920
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3952 -childID 2 -isForBrowser -prefsHandle 3964 -prefMapHandle 3960 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1244 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2532364a-2db0-4312-a89a-fc96d345f071} 4584 "\\.\pipe\gecko-crash-server-pipe.4584" tab6⤵PID:4392
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4864 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4860 -prefMapHandle 4856 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {135c6df7-c18d-4587-9190-f4ab4a826217} 4584 "\\.\pipe\gecko-crash-server-pipe.4584" utility6⤵
- Checks processor information in registry
PID:5624
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5248 -childID 3 -isForBrowser -prefsHandle 5292 -prefMapHandle 5288 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1244 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ad92b706-41ee-40fa-a447-520a3e8e39de} 4584 "\\.\pipe\gecko-crash-server-pipe.4584" tab6⤵PID:5648
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5436 -childID 4 -isForBrowser -prefsHandle 5440 -prefMapHandle 5316 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1244 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b7faf078-0207-40e6-b610-df7aecd0c075} 4584 "\\.\pipe\gecko-crash-server-pipe.4584" tab6⤵PID:1476
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5716 -childID 5 -isForBrowser -prefsHandle 5636 -prefMapHandle 5644 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1244 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cb83e5ab-35f0-4356-b1b6-0c2dee33b06d} 4584 "\\.\pipe\gecko-crash-server-pipe.4584" tab6⤵PID:1040
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1011259001\39d239c75b.exe"C:\Users\Admin\AppData\Local\Temp\1011259001\39d239c75b.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4516
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2132
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1652 -ip 16521⤵PID:3620
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1956 -ip 19561⤵PID:4960
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5660
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3468
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\activity-stream.discovery_stream.json
Filesize19KB
MD53e52daea59488f0622bf84357de944b1
SHA18f64c4a0cbd76688c085e9432c00aa65017187aa
SHA256a6ea66d282712d14d03622356df7e36df075e3d1bf8bd56bf67bd50d25dd2069
SHA512ac5fcbbe0be7ed5d66286d86a04dfe1c523977bade6afa895cb9416d4390b5723110c357c42d9cc35ba4520e0fff1eb364b981442ea22d7667590eab1149ff13
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD590753771405455820da7474369b26f67
SHA108084be2262c924ab98aa977076456ff64a846b1
SHA25634cccff3a917ef5098449a88600779c6bb33c2bbd71ca6f1d248d8287b402319
SHA512a78f3e125c4d5c2a573bde87ba26124f2a201af982474bb957ded2c07c3649d9f21e2d40e0f5fb644fd62c619083c6de49ba0f088bfeb40998f09feb4a20da0b
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD57dfe730f4f686b199847de24e0136622
SHA177ed919659677401ae0d9673fc3ec389c1c040cc
SHA256ae44926a556ead759a7fc3c519978450bd7804aac9a061478796711abe16fde8
SHA512f8ba46199d4788c3519e76669c39814ea988e7386e9dc526908deda8cdca6b8ad7405c57288b21deae09abb4931a8e6c6b19a35ab74a10c7227b5a0d94bf12ed
-
Filesize
217KB
MD598da391545b4823ca67e6cc3a927dae9
SHA1d2f66837884d6d65dfe21372501cc7ba1d91ef29
SHA25612862b60140f019b0c251da7be59caf90d93eca6a30d016609cf2ff1da4652a7
SHA51259130547c169768310d57c075f2cec01a71704e9658955ef8eb1c6b2c30a24a801623f189eac14a84357aa597f5d5c96c5c9f8e96ee4ddf7bcf911dcf6bcb7b9
-
Filesize
1.9MB
MD5870c92cf89253baeaf80574aaad15adc
SHA1feefb55fa434ceb4aa10997bedfccd5597852078
SHA25665238eee07b00d608d030a601ebe0878656466084e1f55e9e41258bec1370b59
SHA512fe1cf7efa897c4c4fada01ba67ef38e7491d96870ab32354b0acbf2bb0cfa32faf914d05037d6e813fcc9b1241466acdaa178adeacc2451ea371f1189e7923c6
-
Filesize
4.2MB
MD5818532da27c6ed97768ab94607612f66
SHA199216af849b745434d0e728400a5da9ea0eac96f
SHA2560db9cd98808b856cc4e61818330ff6a1ec46621ab9b30e779078f2fb78feb36c
SHA512ae6d4008ad40a08ad23b7b460c53af287c923171973cd8c090e5abe0b3b67f14aa291f8ece578697405e6c263c3316c5f19c8a94c64a8cbe4b7496dc345b6224
-
Filesize
1.8MB
MD5945ee80ae4700449bfbedab4bb5fa230
SHA1b8352840adc62f39cce6afb800b8e80b558deebf
SHA25615330235cac3dc958d645bd2886543648c6e819a2cb5fd27fb7d1633b51fe521
SHA51269c92c8be41de1af344f7527d553b2f409a028eb6301c4c70529f8594e0ed4b2b59cfc93842a50ecd8855cf1518ab47d12cca7e309b6868133a45f4f4947b9b0
-
Filesize
1.7MB
MD5f9e8c178565263aaa83c1f3bb392bd90
SHA1634e3b6b849af9f8a3f7192fcfd77e761a1b1b11
SHA256bf9612df7ae108f00c42fe875dccee3da8988049d505e1ac08ab848eec5d52c3
SHA512f8569bb10d51c701765e8c1cc381f6231bee273025aceefa6ba7afb088100a21d0ef3a14192c57658b835b86010fb05096e9a9e74104bf5a350712407e58a444
-
Filesize
942KB
MD59206d48cf0de91f248c4b169209b42c2
SHA105a1381c32f39a9036ef81952522034c46ec995f
SHA256322315919b86aae0f76b4c7ff10d5ddd06acea2af3ba2aae8a66eaf5ff621a86
SHA5124f511f0aeda005a64c62bba1c7b8f895202e42e17b09d2079c55c41576f0d8a4775f860f2c40b571d1ca6df47b4afdfdade64eb9d7bba6061b45bcef08887e55
-
Filesize
2.7MB
MD564775ade379430e762af6d894815bd24
SHA1cb8db298ac03464f912a822f6335f9b4bdcdfa4f
SHA256b92243b5b82aa58419dec103e84c63ec7c46149c2fab6520f041ceaf92655c71
SHA512bff1f4e815e35a8bb512fd1dfd223d8caf79847b2d7cb319557c9dffc3090070b71656e819f5350a8c5f8d92034f0cc472e889e207279dfc12c0f0b57204f015
-
Filesize
1.8MB
MD5ebf798251a9e386cfb6cffcf54542830
SHA15da641a8ad380d88bd05208339832f4886401d5d
SHA256fb08ab4d990067daa56452dad65d4322e5d1bd733e6b0e6a9b326141ef4992b5
SHA5120a5a2e0075c44997f73c4784936b7407cec2624bbd57917c65b279104f55aa8e84d73fab29e481e8b6c12c67d23432ceff859b6e54bec5f0069d18866bafbcf0
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin
Filesize18KB
MD5bbd86798b85c3a2e16a9bc2b41c1036b
SHA1bf39e4643253601d95a1165ad7999f823aa388e5
SHA256ad7e53c586540f82f248b15e8fa20ca3a1206d4bda153b0306abe917e39643a0
SHA5121d8ab3b909a22b6bdb27b323a66aa2a225822812eac9fda628745bf6f06245003f68b8f7c342b9809f42018ef4f9c9a73791d50b589ae91448481608c7a8d58e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin
Filesize8KB
MD51bdf3f5ceadc78c910ec5390c6817350
SHA12d3d5e29a1673b7eb6e651da4c89dd7ec5618dfe
SHA256d3671e781e7bf3c11fe562f5b6a30aed9aa93dbd536972a2ba6bf4ddde33878a
SHA51236a4c931dd2f6ba1bb2f378fe52364344b0d745ac8e2b8fb4244dd53968640aaf0d8bbe7eba8d008b047cd665fa88fadbc50cc3d8cddff9861dcd684cb5af358
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin
Filesize11KB
MD59d5b7f6207b42ac2a3fbce2d68ea8e4e
SHA11b62ee4afe84f0800ca617bcde83977ac324b55d
SHA25628db092ad91ad3886bde09303fd5e6b546d7897e276047df8a404a653a5bef7c
SHA512e6a41435927780323baf5bcad96ba9411387de77e68652e9c226584375b0eefc623f226b6cce6dff4356341a41cab16d3828b024f54013bee5203062581b7c81
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD57a65244bf1dc03fd17058733e767a4ac
SHA1c953212796c62d7cb6dd567c4010c3e8e3267adc
SHA2560ae172146bc93c55892f6ff6ae7f57a7d3d20d5af38d2ae9a5a849d22aab296e
SHA51217a3776a5f5a9cc58552b077fdfb67d92972d724a9599de02651513a5c06b832b35e91282352ba2ed2d0dec4b241664729a513aebc13fe9f1e016028fbfed31a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD50ba94364b32a775ad62853e736de1e15
SHA164a2e2c0936e30f9dafccd274e9979f5dc1f567b
SHA25681da0f5cd50e320a07c3dac72cd5aee841ee42dcddf87a14bcda05b5b0d64061
SHA512fca00ccb95f2de365c257ff108f32c70212e4d262ce2c337356126e05187582e5bb5b1a402c428d9c123dc426f9d63fc60df001e67ece174e1b4191c03ff5f94
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5e60dc4f5b84eaecbd5220d98f35c8022
SHA183d57789cd20af0fd28e71c54dacd9c3e2232b66
SHA25637c7cd6a4520d39f5c9746fb636dd01735be1438db40a44dda781ddb8e41c3c4
SHA51281fad7a5fa2cca1187c3651eb504d6910ee34230ab2ca3e330c4b1d1241b6a8fb659709b488f2cae0ffd815d0681bd0693b6673c1d1e20288b7e681eaf68a1e8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD550b691b5dd19b9df194d7521a886a17e
SHA16fb67e8ff431bc14dd973b65bbdafb0317d53721
SHA2565cbdc1ef5c61910e4ad603f7557cc06602cd74c6259241c438111494d58ec74c
SHA5129b277d18d2f34e0ad05163f8d381f683f3aef438fa28481ae99a449eaa9362b49ca32bea897707426bc2f69614bc66ef4de9851bd2e2d76036839def3239b2f7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\0606dccd-bf75-477c-aef2-8b11c535b771
Filesize25KB
MD547e04477d478c2f994c9fc8003969485
SHA1edd893ffef3e44495f13822eceebc01ed1b66fd1
SHA256e22e9cd3f04e7b228d2ecbf569a261e513e7d0741e3654a2a35be518028bbc77
SHA512f056b095b89defd18eb5a72c3d376467d7cc43214df404e6d799a5b7e778a421196e9c1318930dc6d0818bb96f18a6328983296faad4d13b718dd1a28a9380f0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\64ba2185-f005-44b2-b5c5-28b0a8435227
Filesize982B
MD56d061db0e24fb5b7c51bac6e3a409376
SHA10e36fbb3949ea1faebbfb3d937c16af7407d9150
SHA256927066db68f82c0e0d34839ff742c2f0b956df932fa263d2d1360dd22a5ef46c
SHA5120e240ecc0e0169f24bb86bdf2929b0b51f64bf663eb47b6506ecb6998c924a5680522796e5d33c44f6876a98b3ecb31d635b455e1ebb7b87e4006b91af0387d9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\df90f939-f161-4954-baed-94e5c2142f83
Filesize671B
MD53efef496dd3b5366934b5bf3e02317e5
SHA1f463b3797e5a90b528ac7907cd655bcf3ec5b1f2
SHA256d96f12b98a339c30b0d15ab590c3202777867d107be8487bb072a4565bc5ed19
SHA512c4a33ca82ac11d0e18b930cf3ac27c6ce5e2c93dc894ebb253f0d6bdc0df4f3d09acdb9a6a7f95c41a344d98eb53622dc0e4de72c5cb22ab3c3812d2a1bd512a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD5efd68f53f4249512981c6d2c914f0f28
SHA1dd9253ff386a8f688eb506741fef23c13e5cd465
SHA256d93bd39f494d3c9b3950058588535fc07ee0ef075314409f4630b8d413f5d6d4
SHA512ab0e2a7f387824458d211219dc42f520c32c99133d24bbcba41941d1daa53b371f376ffefccd4a3769cdfd0f3c81779dcd4eedeae698435747bec974c0d8b3b7
-
Filesize
10KB
MD564fee164e733e41b828c6035e0f225af
SHA12dc4fe3e14bbaff7257ea37da5b15cc135bf93c0
SHA256081679f2709c7c1664e2c8741e49eecedafbf28f89a25d63306896beae79905b
SHA512988e293b43168fa10bf41c77abf03e094fb4f3bc456d75e25d6f4ce52d698e489cbf541fce72e8470ce074fc83a890b387314ae2bc8f513afecfc053f458c443
-
Filesize
15KB
MD5938f69916bdfbbba840798c9bc94309e
SHA1b1d05d1d02a223193c25942d08bd973861b5ff2b
SHA2566adc5d9b8aa650fa918046cc62f9b5a115eb1c712e68667414575491cd964766
SHA51230f042bd7c2f2d9ad73093c4755276c86275968a82b74908c1754443891694085a101756b061b2a97c17552f8be40974834a8ebc83fb2ad5ef8a01855ed33f51
-
Filesize
126KB
MD5b48e172f02c22894ad766c52303f087a
SHA161da0ff26dfc3759f7cd79696430b52f85073141
SHA256712e46f7a4f9da7fabd0b1acd5e848527bd70b6c4444dc92c8479ac108d71753
SHA5125b8a888a9d87a4ee34f57799d3d6baf69cd556a2d1336afb109adc488a5efa1c7cd094c3785cf9af726a0c41be3a56a0ffac933b7fa7fb5dec9643f3af08bdfd