Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2024 04:28
Static task
static1
Behavioral task
behavioral1
Sample
f30429f1257341aa2012149406181c128ebc53b3fcce11a482ea6266e5a00664.exe
Resource
win7-20241010-en
General
-
Target
f30429f1257341aa2012149406181c128ebc53b3fcce11a482ea6266e5a00664.exe
-
Size
3.1MB
-
MD5
15486167d3ce2f6d927debe5fb800377
-
SHA1
762704e63f652670244fa24b31883104e7df479b
-
SHA256
f30429f1257341aa2012149406181c128ebc53b3fcce11a482ea6266e5a00664
-
SHA512
9fc904cfc59fa81033a032b1fb451da1e5de784d40c1be05afacc65c97a4b71d4bb29b5d858c456d70b2e5ef900bf2e02f540679bf84c2452e515edd8fbd089c
-
SSDEEP
49152:nMuDtQ1Wh5zrjADAErj+BLkfXP/IjgvHxfFZT:MuBQ1Wh5PjADAErlfXPNZDT
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
drum
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://powerful-avoids.sbs
https://motion-treesz.sbs
https://disobey-curly.sbs
https://leg-sate-boat.sbs
https://story-tense-faz.sbs
https://blade-govern.sbs
https://occupy-blushi.sbs
https://frogs-severz.sbs
https://salve-windp.cyou
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a43037c097.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a43037c097.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a43037c097.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a43037c097.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a43037c097.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a43037c097.exe -
Stealc family
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF a1438a8be1.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f30429f1257341aa2012149406181c128ebc53b3fcce11a482ea6266e5a00664.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8716b69a39.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e4da7af280.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rhnew.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a1438a8be1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 13971ea974.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a43037c097.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 22 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 13971ea974.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a43037c097.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8716b69a39.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a1438a8be1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f30429f1257341aa2012149406181c128ebc53b3fcce11a482ea6266e5a00664.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f30429f1257341aa2012149406181c128ebc53b3fcce11a482ea6266e5a00664.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a43037c097.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rhnew.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8716b69a39.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a1438a8be1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e4da7af280.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rhnew.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e4da7af280.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 13971ea974.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation f30429f1257341aa2012149406181c128ebc53b3fcce11a482ea6266e5a00664.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 12 IoCs
pid Process 2620 skotes.exe 2120 GI59vO6.exe 2736 8716b69a39.exe 988 a1438a8be1.exe 4844 skotes.exe 3844 e4da7af280.exe 4124 13971ea974.exe 944 5b9a6e1bbb.exe 5640 a43037c097.exe 5596 rhnew.exe 5896 skotes.exe 5352 skotes.exe -
Identifies Wine through registry keys 2 TTPs 11 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 8716b69a39.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine e4da7af280.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine a1438a8be1.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 13971ea974.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine a43037c097.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine rhnew.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine f30429f1257341aa2012149406181c128ebc53b3fcce11a482ea6266e5a00664.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a43037c097.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a43037c097.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\a43037c097.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1011871001\\a43037c097.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e4da7af280.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1011868001\\e4da7af280.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\13971ea974.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1011869001\\13971ea974.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5b9a6e1bbb.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1011870001\\5b9a6e1bbb.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000023c73-133.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
pid Process 5020 f30429f1257341aa2012149406181c128ebc53b3fcce11a482ea6266e5a00664.exe 2620 skotes.exe 2736 8716b69a39.exe 988 a1438a8be1.exe 4844 skotes.exe 3844 e4da7af280.exe 4124 13971ea974.exe 5640 a43037c097.exe 5596 rhnew.exe 5896 skotes.exe 5352 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job f30429f1257341aa2012149406181c128ebc53b3fcce11a482ea6266e5a00664.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 5 IoCs
pid pid_target Process procid_target 4656 2120 WerFault.exe 84 4844 5596 WerFault.exe 128 3620 5596 WerFault.exe 128 1084 2120 WerFault.exe 84 4724 5596 WerFault.exe 128 -
System Location Discovery: System Language Discovery 1 TTPs 17 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1438a8be1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5b9a6e1bbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rhnew.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f30429f1257341aa2012149406181c128ebc53b3fcce11a482ea6266e5a00664.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8716b69a39.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GI59vO6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 13971ea974.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 5b9a6e1bbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a43037c097.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e4da7af280.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 5b9a6e1bbb.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 3912 taskkill.exe 4656 taskkill.exe 1368 taskkill.exe 4204 taskkill.exe 736 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 39 IoCs
pid Process 5020 f30429f1257341aa2012149406181c128ebc53b3fcce11a482ea6266e5a00664.exe 5020 f30429f1257341aa2012149406181c128ebc53b3fcce11a482ea6266e5a00664.exe 2620 skotes.exe 2620 skotes.exe 2736 8716b69a39.exe 2736 8716b69a39.exe 988 a1438a8be1.exe 988 a1438a8be1.exe 988 a1438a8be1.exe 988 a1438a8be1.exe 988 a1438a8be1.exe 988 a1438a8be1.exe 988 a1438a8be1.exe 988 a1438a8be1.exe 988 a1438a8be1.exe 988 a1438a8be1.exe 4844 skotes.exe 4844 skotes.exe 3844 e4da7af280.exe 3844 e4da7af280.exe 4124 13971ea974.exe 4124 13971ea974.exe 944 5b9a6e1bbb.exe 944 5b9a6e1bbb.exe 5640 a43037c097.exe 5640 a43037c097.exe 944 5b9a6e1bbb.exe 944 5b9a6e1bbb.exe 5640 a43037c097.exe 5640 a43037c097.exe 5640 a43037c097.exe 5596 rhnew.exe 5596 rhnew.exe 2120 GI59vO6.exe 2120 GI59vO6.exe 5896 skotes.exe 5896 skotes.exe 5352 skotes.exe 5352 skotes.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 3912 taskkill.exe Token: SeDebugPrivilege 4656 taskkill.exe Token: SeDebugPrivilege 1368 taskkill.exe Token: SeDebugPrivilege 4204 taskkill.exe Token: SeDebugPrivilege 736 taskkill.exe Token: SeDebugPrivilege 1540 firefox.exe Token: SeDebugPrivilege 1540 firefox.exe Token: SeDebugPrivilege 5640 a43037c097.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 5020 f30429f1257341aa2012149406181c128ebc53b3fcce11a482ea6266e5a00664.exe 944 5b9a6e1bbb.exe 944 5b9a6e1bbb.exe 944 5b9a6e1bbb.exe 944 5b9a6e1bbb.exe 944 5b9a6e1bbb.exe 944 5b9a6e1bbb.exe 944 5b9a6e1bbb.exe 1540 firefox.exe 1540 firefox.exe 1540 firefox.exe 1540 firefox.exe 1540 firefox.exe 1540 firefox.exe 1540 firefox.exe 1540 firefox.exe 1540 firefox.exe 1540 firefox.exe 1540 firefox.exe 1540 firefox.exe 1540 firefox.exe 1540 firefox.exe 1540 firefox.exe 1540 firefox.exe 1540 firefox.exe 1540 firefox.exe 1540 firefox.exe 1540 firefox.exe 1540 firefox.exe 944 5b9a6e1bbb.exe 944 5b9a6e1bbb.exe 944 5b9a6e1bbb.exe 944 5b9a6e1bbb.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 944 5b9a6e1bbb.exe 944 5b9a6e1bbb.exe 944 5b9a6e1bbb.exe 944 5b9a6e1bbb.exe 944 5b9a6e1bbb.exe 944 5b9a6e1bbb.exe 944 5b9a6e1bbb.exe 1540 firefox.exe 1540 firefox.exe 1540 firefox.exe 1540 firefox.exe 1540 firefox.exe 1540 firefox.exe 1540 firefox.exe 1540 firefox.exe 1540 firefox.exe 1540 firefox.exe 1540 firefox.exe 1540 firefox.exe 1540 firefox.exe 1540 firefox.exe 1540 firefox.exe 1540 firefox.exe 1540 firefox.exe 1540 firefox.exe 1540 firefox.exe 1540 firefox.exe 944 5b9a6e1bbb.exe 944 5b9a6e1bbb.exe 944 5b9a6e1bbb.exe 944 5b9a6e1bbb.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1540 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5020 wrote to memory of 2620 5020 f30429f1257341aa2012149406181c128ebc53b3fcce11a482ea6266e5a00664.exe 83 PID 5020 wrote to memory of 2620 5020 f30429f1257341aa2012149406181c128ebc53b3fcce11a482ea6266e5a00664.exe 83 PID 5020 wrote to memory of 2620 5020 f30429f1257341aa2012149406181c128ebc53b3fcce11a482ea6266e5a00664.exe 83 PID 2620 wrote to memory of 2120 2620 skotes.exe 84 PID 2620 wrote to memory of 2120 2620 skotes.exe 84 PID 2620 wrote to memory of 2120 2620 skotes.exe 84 PID 2620 wrote to memory of 2736 2620 skotes.exe 90 PID 2620 wrote to memory of 2736 2620 skotes.exe 90 PID 2620 wrote to memory of 2736 2620 skotes.exe 90 PID 2620 wrote to memory of 988 2620 skotes.exe 96 PID 2620 wrote to memory of 988 2620 skotes.exe 96 PID 2620 wrote to memory of 988 2620 skotes.exe 96 PID 2620 wrote to memory of 3844 2620 skotes.exe 98 PID 2620 wrote to memory of 3844 2620 skotes.exe 98 PID 2620 wrote to memory of 3844 2620 skotes.exe 98 PID 2620 wrote to memory of 4124 2620 skotes.exe 100 PID 2620 wrote to memory of 4124 2620 skotes.exe 100 PID 2620 wrote to memory of 4124 2620 skotes.exe 100 PID 2620 wrote to memory of 944 2620 skotes.exe 101 PID 2620 wrote to memory of 944 2620 skotes.exe 101 PID 2620 wrote to memory of 944 2620 skotes.exe 101 PID 944 wrote to memory of 3912 944 5b9a6e1bbb.exe 103 PID 944 wrote to memory of 3912 944 5b9a6e1bbb.exe 103 PID 944 wrote to memory of 3912 944 5b9a6e1bbb.exe 103 PID 944 wrote to memory of 4656 944 5b9a6e1bbb.exe 107 PID 944 wrote to memory of 4656 944 5b9a6e1bbb.exe 107 PID 944 wrote to memory of 4656 944 5b9a6e1bbb.exe 107 PID 944 wrote to memory of 1368 944 5b9a6e1bbb.exe 109 PID 944 wrote to memory of 1368 944 5b9a6e1bbb.exe 109 PID 944 wrote to memory of 1368 944 5b9a6e1bbb.exe 109 PID 944 wrote to memory of 4204 944 5b9a6e1bbb.exe 111 PID 944 wrote to memory of 4204 944 5b9a6e1bbb.exe 111 PID 944 wrote to memory of 4204 944 5b9a6e1bbb.exe 111 PID 944 wrote to memory of 736 944 5b9a6e1bbb.exe 113 PID 944 wrote to memory of 736 944 5b9a6e1bbb.exe 113 PID 944 wrote to memory of 736 944 5b9a6e1bbb.exe 113 PID 944 wrote to memory of 2312 944 5b9a6e1bbb.exe 115 PID 944 wrote to memory of 2312 944 5b9a6e1bbb.exe 115 PID 2312 wrote to memory of 1540 2312 firefox.exe 116 PID 2312 wrote to memory of 1540 2312 firefox.exe 116 PID 2312 wrote to memory of 1540 2312 firefox.exe 116 PID 2312 wrote to memory of 1540 2312 firefox.exe 116 PID 2312 wrote to memory of 1540 2312 firefox.exe 116 PID 2312 wrote to memory of 1540 2312 firefox.exe 116 PID 2312 wrote to memory of 1540 2312 firefox.exe 116 PID 2312 wrote to memory of 1540 2312 firefox.exe 116 PID 2312 wrote to memory of 1540 2312 firefox.exe 116 PID 2312 wrote to memory of 1540 2312 firefox.exe 116 PID 2312 wrote to memory of 1540 2312 firefox.exe 116 PID 1540 wrote to memory of 1816 1540 firefox.exe 117 PID 1540 wrote to memory of 1816 1540 firefox.exe 117 PID 1540 wrote to memory of 1816 1540 firefox.exe 117 PID 1540 wrote to memory of 1816 1540 firefox.exe 117 PID 1540 wrote to memory of 1816 1540 firefox.exe 117 PID 1540 wrote to memory of 1816 1540 firefox.exe 117 PID 1540 wrote to memory of 1816 1540 firefox.exe 117 PID 1540 wrote to memory of 1816 1540 firefox.exe 117 PID 1540 wrote to memory of 1816 1540 firefox.exe 117 PID 1540 wrote to memory of 1816 1540 firefox.exe 117 PID 1540 wrote to memory of 1816 1540 firefox.exe 117 PID 1540 wrote to memory of 1816 1540 firefox.exe 117 PID 1540 wrote to memory of 1816 1540 firefox.exe 117 PID 1540 wrote to memory of 1816 1540 firefox.exe 117 PID 1540 wrote to memory of 1816 1540 firefox.exe 117 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\f30429f1257341aa2012149406181c128ebc53b3fcce11a482ea6266e5a00664.exe"C:\Users\Admin\AppData\Local\Temp\f30429f1257341aa2012149406181c128ebc53b3fcce11a482ea6266e5a00664.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Users\Admin\AppData\Local\Temp\1011782001\GI59vO6.exe"C:\Users\Admin\AppData\Local\Temp\1011782001\GI59vO6.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2120 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2120 -s 14644⤵
- Program crash
PID:4656
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2120 -s 14764⤵
- Program crash
PID:1084
-
-
-
C:\Users\Admin\AppData\Local\Temp\1011866001\8716b69a39.exe"C:\Users\Admin\AppData\Local\Temp\1011866001\8716b69a39.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2736
-
-
C:\Users\Admin\AppData\Local\Temp\1011867001\a1438a8be1.exe"C:\Users\Admin\AppData\Local\Temp\1011867001\a1438a8be1.exe"3⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:988
-
-
C:\Users\Admin\AppData\Local\Temp\1011868001\e4da7af280.exe"C:\Users\Admin\AppData\Local\Temp\1011868001\e4da7af280.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3844
-
-
C:\Users\Admin\AppData\Local\Temp\1011869001\13971ea974.exe"C:\Users\Admin\AppData\Local\Temp\1011869001\13971ea974.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4124
-
-
C:\Users\Admin\AppData\Local\Temp\1011870001\5b9a6e1bbb.exe"C:\Users\Admin\AppData\Local\Temp\1011870001\5b9a6e1bbb.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3912
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4656
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1368
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4204
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:736
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1944 -parentBuildID 20240401114208 -prefsHandle 1884 -prefMapHandle 1876 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {885a30c2-c5b2-452f-9103-a295b610e92a} 1540 "\\.\pipe\gecko-crash-server-pipe.1540" gpu6⤵PID:1816
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2464 -parentBuildID 20240401114208 -prefsHandle 2440 -prefMapHandle 2436 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {17346d44-4ab2-48da-b7b6-55579e0b5961} 1540 "\\.\pipe\gecko-crash-server-pipe.1540" socket6⤵PID:4896
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3096 -childID 1 -isForBrowser -prefsHandle 3088 -prefMapHandle 3084 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1272 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d7b87b04-b36f-49a2-95b8-e102f443fd77} 1540 "\\.\pipe\gecko-crash-server-pipe.1540" tab6⤵PID:3192
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3916 -childID 2 -isForBrowser -prefsHandle 3908 -prefMapHandle 3904 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1272 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {374e4de7-eed0-4436-bac3-b0d45a93eb6d} 1540 "\\.\pipe\gecko-crash-server-pipe.1540" tab6⤵PID:2868
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4504 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 1416 -prefMapHandle 4392 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1f1b22ca-da3c-40bc-a2af-8aec3837078a} 1540 "\\.\pipe\gecko-crash-server-pipe.1540" utility6⤵
- Checks processor information in registry
PID:5136
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5208 -childID 3 -isForBrowser -prefsHandle 5216 -prefMapHandle 5228 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1272 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d273b5b8-c385-480c-a091-79ccc99ee028} 1540 "\\.\pipe\gecko-crash-server-pipe.1540" tab6⤵PID:5940
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5412 -childID 4 -isForBrowser -prefsHandle 5332 -prefMapHandle 5336 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1272 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {54a83351-21d1-4e4f-bd55-8cf4495ed925} 1540 "\\.\pipe\gecko-crash-server-pipe.1540" tab6⤵PID:6092
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5588 -childID 5 -isForBrowser -prefsHandle 5508 -prefMapHandle 5512 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1272 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2fc70067-107e-4a9e-b25d-991d66e746e1} 1540 "\\.\pipe\gecko-crash-server-pipe.1540" tab6⤵PID:6104
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1011871001\a43037c097.exe"C:\Users\Admin\AppData\Local\Temp\1011871001\a43037c097.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5640
-
-
C:\Users\Admin\AppData\Local\Temp\1011872001\rhnew.exe"C:\Users\Admin\AppData\Local\Temp\1011872001\rhnew.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5596 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5596 -s 15244⤵
- Program crash
PID:4844
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5596 -s 15444⤵
- Program crash
PID:3620
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5596 -s 15444⤵
- Program crash
PID:4724
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4844
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2120 -ip 21201⤵PID:3912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 5596 -ip 55961⤵PID:4560
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 5596 -ip 55961⤵PID:780
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 2120 -ip 21201⤵PID:3044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 5596 -ip 55961⤵PID:3068
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5896
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5352
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
3Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\activity-stream.discovery_stream.json.tmp
Filesize24KB
MD53281dc453d5cafd68f4320b3ca1f260a
SHA103a921856c47975a89b06d174493d967339930d5
SHA256ff753d0c1026cf3d273adc04c492a7b656bc6b225a025c7dfb2857a9607ede60
SHA512770fe625e351f97370e91b3708e85d5932fddb3c5dc6ba901df3b389f61c6bf169d9ebf6515fcfa1d900bcf4035a2e8e40f3e2b747f45eb303f7ac1188338f5d
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
5.0MB
MD571c8588c96e879748f4c320c9b4aeec2
SHA19a5baa7e9b1c6b8b5d3ff674dcae22ae017d8447
SHA256a4bb60772446f2cd2f7629574bbf5702c35ce2afcf6e4b3a3d157281cecc7234
SHA5128ab113c203eab23f4969b45ec4cc3c383e402f5a32dea035032e340bf8b9aacf5c734c259419ebb146cf2426b1f944032ce944cb2d9714255907989f260c5a0e
-
Filesize
1.9MB
MD5c28c75c567bdf6abd9293e0f9cee0040
SHA1d492ad2651bc4ec40a5b410ed8c9691e31ffb701
SHA25631f965407764f0da15f8e28f611fdcca9dc454ec5afe1a047fe24c946867394f
SHA512f8cde788a75b25cc2e140b86faa8526e9ce42a320cb874224ec5d568ad12afcb67b00a79cc423d7113805ea7193e44f787afa3cc54ed6a9cc57801296592cc1b
-
Filesize
4.2MB
MD57bf985aaacf59a561dec4a1b562b9cf3
SHA1dc72606135d941166c0a33d884a7fb20085c6fc5
SHA256c1795280e96fda95735afb7212fe69d6ca9ddd57c3c856c3a91f4379a78e82ce
SHA51288395940143392d48d2fee6056d60eb9da1215c47cb24a15f16fa0facd22928097cf49624f66163bf270f35fc03497e9d813a76b6a9657c276382cc1154acd00
-
Filesize
1.8MB
MD5f532d52cf5e1ad500276cbcaaae7f47a
SHA1a0bf3319bb5d5699be36621ccc5deba56dad49fc
SHA25687c75f422f9a84fd3324694254292bcb6f57c6293ef1c11548bd8c199b0c7f2b
SHA5125fbaf7fb52b9ab4e261bb1e6dbdfc01952791876f6343ef34ea9fe489ca7f738ba01ac711390881edf18657a0ee0fb736a35e803eec2a0786f5c59f4075e257a
-
Filesize
1.8MB
MD59b70c2467c81b55b908a77427288aa46
SHA1eb1868fbb202085231d0296b1844b23361df157b
SHA256293001cf084b8f338989a1f80c8e6315fa99a275525d4897b9be31a1e669021b
SHA512f792839517dddf6cc84ccb4904d53c6ca9f5786ce6224755c7fcb976f7f2691a45c026bb8e3dc5b693a1a4e6610c67f7ffb782d1697fb5d20c4e479f4b03236d
-
Filesize
944KB
MD5ebc6b8ec67602a04a81de5a1c45f3fc2
SHA1db70963e1dbeccc94507567f5019a6b0f3008305
SHA2569394bd6614fce6d3e79fa285412872b501b12cb7c55e38fd38f335fbaf98e00b
SHA512bd8a08c57eb909e2c93125e090f9984cab06f71d0e61aef593434fc1d9f4da920184989205fbc789462a255bb6f0f45016a380ad24b7933abe8d142186fbe0a3
-
Filesize
2.7MB
MD5e37504aa5896bc37872f515cf8d28d84
SHA1dd300d7aeab13fff922751e6a931594f10ccf6d7
SHA25644df9121bb679cd42af8636e69cc566e77d84413eeb0f0a951f4f25d24dd8115
SHA5124269cf7d094d54e88659e3186d6485519d2161d9b49ea0b6cc659e8b9cb02ba1c76c5571eb8b35aa9d866488c1720a2409e557bb64f5868da8a2c40fc79a38c0
-
Filesize
1.8MB
MD5a84456172908e096d0ac6272b9503e08
SHA18b64d38bae9fc390e621323e9e91eb8f7def421c
SHA2564f95dff270ac4172d470789c3fce9ae2c656565a3887afc86507ec49981bd128
SHA5123237f19915957327d3debd46de1c52531622fba5dbb2e06c9685ca336bd4febf19c2f3dd533c5046b0e676d21f10ba10478b3bbe9dbb31823b7dc118a6413800
-
Filesize
3.1MB
MD515486167d3ce2f6d927debe5fb800377
SHA1762704e63f652670244fa24b31883104e7df479b
SHA256f30429f1257341aa2012149406181c128ebc53b3fcce11a482ea6266e5a00664
SHA5129fc904cfc59fa81033a032b1fb451da1e5de784d40c1be05afacc65c97a4b71d4bb29b5d858c456d70b2e5ef900bf2e02f540679bf84c2452e515edd8fbd089c
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin
Filesize10KB
MD5c02692e2bc0c8b8b32654b9eed1c4246
SHA1d473da597191ab4b04be404525618bfe6d59bf53
SHA256b11d04c5107e768b1cf69acafbfd8fdb5aabc2f97d45267bbc6e290031143c9c
SHA512d8409b482dd4a45a7ea910b1eb4f0ba3e333b3e0ee4348256b6e3de981eaf5497b55d6c387b073bc4530df07ec6c1cfc33ab300d7b4c62a2c11443d7f0a4d190
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin
Filesize10KB
MD56db28ce57134c15fffc53ba052cd54d9
SHA188303a572a6b37012e8ac12fbb2bb9a6ab763975
SHA25612d5d9126cef90a103920aa87ce866410af2170381790df9457c68751de8ccc0
SHA512cb8568b351ed7d0174b18ddfda7f66552a8d1dce155a87585ce030c5770f262d2dc82c48aecde583c1cd22d76d43c5ced7a7517615e05b72c40e622590633675
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin
Filesize17KB
MD56e06eba2957db9e581707eb1eeeef366
SHA1df66a42cc26e2cd3c88063e49b5850d3f7a9074b
SHA256115864d742e8ab686936963656bde1384b23ae1c9fad9348abeec127b4eaf92f
SHA51222d1c4c7843cc6a45cc3facedaefbc568120993a538fbef254d24aad8f9d3094043a23f664d304e678d7714f4be3226fe2f9c98ac9d07e41508a1aec9ed1cb8e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5fb9379e1e19514ca4d6b218581e56a31
SHA1e306cb2efc6d52c1bd7d58e7529e3f1b92965323
SHA25669bfce4f1f1008367593a8adfa699f03dac64c643f3656bd1d7431a7e8eba9a1
SHA51256996ace4cafebfb4798d02c3f8220ecf34c31953a202f18824de318a5ab4f6d8816a8fe158b81ae8de1bc18ceae3e18480c10a2a6d048f8b00ae0134aab6d1e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\09290ece-8cf2-41ba-a33d-4fd03b882e3d
Filesize982B
MD520035a2fd8c43e8f714230d8ef41e2b6
SHA174138e40d20206f190d6cbcc30bc2f660dc39096
SHA25647d5e8f1eab2f8e460e50e6105fef4ae72348a150567155e0130f8d9c5a5af6f
SHA512b15a3814959a6f9ee0da12960d5fbe3c9bb6366447f31bce6aef1f8a4441d3d46d49951504fcd724525c000bb5666c89163c4c1bfddab5c720dfa7bb1272dfe0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\26f97708-c8dc-44e0-bb92-61522bd7cadd
Filesize24KB
MD53d90d042be31de7c48b1fb6172740f5f
SHA1fdb9f6a07d13c10885aef2817b914aeedcd9d359
SHA256cd43a8f5121fec72187ee4ea830664355a43fa9f760b898bb23b30bae9331898
SHA5120eb79e7701e448e43462c2bde9b57255076c6cbc49cbe0a39d8351a0eb562803b0ca8a2ba64435ae62d3e53fffbc7d6e518ac0d60de6b5f422d34e93156bc026
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\476efdfc-3268-48a9-ac13-78408fcc0d54
Filesize671B
MD5971638adb2ff070bfb71fcc07bd82202
SHA1ae0ca59697d3ae83e4c9f48c249d38c1f7cc29c8
SHA256d8f81b98cf482cae449ec6f85cb9bcb997b88af29702286c6d25de3b145abda2
SHA5121f1dd7567e01a73ce101d3b5c843fb8d0161894f33adb8842d5d840ccb00229180d055a414fc31bcac94d727e57de492a9bd836e58c03533d61902478c1ac1c5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-widevinecdm\4.10.2710.0\LICENSE.txt.tmp
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD5f05f12eb0bdf92ed98688564d240dea5
SHA199540cf9a3b06b666e54cb29d209c06a80a382a1
SHA2563bc9fdb3fc1c7540e6c8e9dc4b3ec01ccf2a4ce78dc8a4df389aab0a6f30f2fd
SHA5127a520b4636cffb456f0f88f4c05974bf1db833846f7d00c3a8bc690daa40c7b0893d1a8a8fa5b0521d05feba802ce34d107abe84a9b3e8afde21e65556c14d7e
-
Filesize
11KB
MD5467115b19a88160d995dfcdd8448172c
SHA12d9277a45ab5b5f438554041bca6966318ccc8a1
SHA2565e3bd38550f5f77fe0b807315aaa240d9c50c126ac6644d1937bf562d87d36fa
SHA512d33e661952ca2c3f178f9981d3bd5de6bcf4c9ab81ba61fa5b65ae98817ea09d004f5f8499ef7f43c98bbf7b886a6d78a50a17ad4d81c0e9048eb21639b80ec0
-
Filesize
10KB
MD5bb11a822f749791701fcefbdd762cd3b
SHA18abab880fb38d38c850761a43fcf3a7dba020188
SHA256044bf4092ff73910f096b5d6201818d56eaeb439023098074a5aa094af5a601e
SHA512bd1a98620c882d8ef3122a22c86565a9dd01195fd67eb60ef514f4ceca32fb349b6bf4a982568a371c366e038fa7bffc5e57887be41dfa0e985df6ebf6451388
-
Filesize
12KB
MD557347133994dcae7d58743cd59ac3155
SHA1ec89c46f48c4e4b1432601bfd34b13fde2101d13
SHA25687832b64cf6ba40156df8cd54bd944dc5f6b57795306402f7cecf35bd72d1721
SHA5127a392f1be39a41d460e82ff6c8cd36ec27172f8524b0f10ef2e596737d720c49055d44a403db0a048cd45a0381f798e45e91bfa85b55704511268e74431b40bb