Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2024, 15:08
Static task
static1
General
-
Target
61f02c40e31c186fa32a181debbea9143597df8af372229fbda132caa7620eb3.exe
-
Size
6.8MB
-
MD5
307d6ab473d32aec05ec4b6996d065a4
-
SHA1
f9a7a9a7101c7d76bda000c78ef61c921ab762cd
-
SHA256
61f02c40e31c186fa32a181debbea9143597df8af372229fbda132caa7620eb3
-
SHA512
0a8d876ce0c6791906c83cca23e87c6ecf971d14d3f6d3e56750a4041348b76ffce2642132fcd9667832300e30e53fe693200aff9632472773507ba4ecfec44e
-
SSDEEP
98304:SsGoeUE9+4CibjR/idXywdyBoJzJc9YEmBLZT8QsqZK6gRm01wpsbq67RgbkdRm:k+4Cib1/6TdyB2JGYEmB1TBZ9bmm
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
https://atten-supporse.biz/api
Extracted
stealc
drum
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
cryptbot
Extracted
lumma
https://atten-supporse.biz/api
https://se-blurry.biz/api
https://zinc-sneark.biz/api
https://dwell-exclaim.biz/api
Signatures
-
Amadey family
-
Cryptbot family
-
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4m932u.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4m932u.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4m932u.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4m932u.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" f399976071.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" f399976071.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4m932u.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4m932u.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" f399976071.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" f399976071.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" f399976071.exe -
Stealc family
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF 6c937d1f28.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 13 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2Q1578.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ BY5BeYh.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f399976071.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6c937d1f28.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1x91K3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3G26b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4m932u.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2d0502a93d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d27afcf3a1.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 26 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1x91K3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2Q1578.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3G26b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2d0502a93d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f399976071.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion BY5BeYh.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d27afcf3a1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3G26b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4m932u.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f399976071.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1x91K3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2Q1578.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion BY5BeYh.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4m932u.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2d0502a93d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6c937d1f28.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6c937d1f28.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d27afcf3a1.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 1x91K3.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 16 IoCs
pid Process 2160 z4S77.exe 5012 N7h97.exe 3840 1x91K3.exe 2664 skotes.exe 4172 2Q1578.exe 384 skotes.exe 1340 BY5BeYh.exe 2296 d27afcf3a1.exe 4364 3G26b.exe 4252 4m932u.exe 3872 2d0502a93d.exe 3988 71bbaf42b1.exe 4264 f399976071.exe 5452 6c937d1f28.exe 5936 skotes.exe 4452 skotes.exe -
Identifies Wine through registry keys 2 TTPs 13 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine BY5BeYh.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 3G26b.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 4m932u.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 2d0502a93d.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 6c937d1f28.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 1x91K3.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 2Q1578.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine d27afcf3a1.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine f399976071.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" f399976071.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4m932u.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4m932u.exe -
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 61f02c40e31c186fa32a181debbea9143597df8af372229fbda132caa7620eb3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z4S77.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" N7h97.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\d27afcf3a1.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1012724001\\d27afcf3a1.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2d0502a93d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1012725001\\2d0502a93d.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\71bbaf42b1.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1012726001\\71bbaf42b1.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\f399976071.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1012727001\\f399976071.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000a000000023c9f-114.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 13 IoCs
pid Process 3840 1x91K3.exe 2664 skotes.exe 4172 2Q1578.exe 384 skotes.exe 1340 BY5BeYh.exe 2296 d27afcf3a1.exe 4364 3G26b.exe 4252 4m932u.exe 3872 2d0502a93d.exe 4264 f399976071.exe 5452 6c937d1f28.exe 5936 skotes.exe 4452 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1x91K3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 1948 4172 WerFault.exe 87 216 1340 WerFault.exe 90 4680 2296 WerFault.exe 97 -
System Location Discovery: System Language Discovery 1 TTPs 21 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 71bbaf42b1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f399976071.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 61f02c40e31c186fa32a181debbea9143597df8af372229fbda132caa7620eb3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2Q1578.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d27afcf3a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6c937d1f28.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1x91K3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BY5BeYh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language z4S77.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language N7h97.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3G26b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2d0502a93d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4m932u.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 71bbaf42b1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 71bbaf42b1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 2348 taskkill.exe 1568 taskkill.exe 4400 taskkill.exe 1664 taskkill.exe 5088 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 3840 1x91K3.exe 3840 1x91K3.exe 2664 skotes.exe 2664 skotes.exe 4172 2Q1578.exe 4172 2Q1578.exe 384 skotes.exe 384 skotes.exe 1340 BY5BeYh.exe 1340 BY5BeYh.exe 2296 d27afcf3a1.exe 2296 d27afcf3a1.exe 4364 3G26b.exe 4364 3G26b.exe 4252 4m932u.exe 4252 4m932u.exe 4252 4m932u.exe 4252 4m932u.exe 3872 2d0502a93d.exe 3872 2d0502a93d.exe 3988 71bbaf42b1.exe 3988 71bbaf42b1.exe 4264 f399976071.exe 4264 f399976071.exe 4264 f399976071.exe 4264 f399976071.exe 4264 f399976071.exe 3988 71bbaf42b1.exe 3988 71bbaf42b1.exe 5452 6c937d1f28.exe 5452 6c937d1f28.exe 5452 6c937d1f28.exe 5452 6c937d1f28.exe 5452 6c937d1f28.exe 5452 6c937d1f28.exe 5452 6c937d1f28.exe 5452 6c937d1f28.exe 5452 6c937d1f28.exe 5452 6c937d1f28.exe 5936 skotes.exe 5936 skotes.exe 4452 skotes.exe 4452 skotes.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 4252 4m932u.exe Token: SeDebugPrivilege 2348 taskkill.exe Token: SeDebugPrivilege 1568 taskkill.exe Token: SeDebugPrivilege 4400 taskkill.exe Token: SeDebugPrivilege 1664 taskkill.exe Token: SeDebugPrivilege 5088 taskkill.exe Token: SeDebugPrivilege 3964 firefox.exe Token: SeDebugPrivilege 3964 firefox.exe Token: SeDebugPrivilege 4264 f399976071.exe Token: SeDebugPrivilege 3964 firefox.exe Token: SeDebugPrivilege 3964 firefox.exe Token: SeDebugPrivilege 3964 firefox.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 3840 1x91K3.exe 3988 71bbaf42b1.exe 3988 71bbaf42b1.exe 3988 71bbaf42b1.exe 3988 71bbaf42b1.exe 3988 71bbaf42b1.exe 3988 71bbaf42b1.exe 3988 71bbaf42b1.exe 3988 71bbaf42b1.exe 3964 firefox.exe 3964 firefox.exe 3964 firefox.exe 3964 firefox.exe 3964 firefox.exe 3964 firefox.exe 3964 firefox.exe 3964 firefox.exe 3964 firefox.exe 3964 firefox.exe 3964 firefox.exe 3964 firefox.exe 3964 firefox.exe 3964 firefox.exe 3964 firefox.exe 3964 firefox.exe 3964 firefox.exe 3964 firefox.exe 3964 firefox.exe 3964 firefox.exe 3964 firefox.exe 3988 71bbaf42b1.exe 3988 71bbaf42b1.exe 3988 71bbaf42b1.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 3988 71bbaf42b1.exe 3988 71bbaf42b1.exe 3988 71bbaf42b1.exe 3988 71bbaf42b1.exe 3988 71bbaf42b1.exe 3988 71bbaf42b1.exe 3988 71bbaf42b1.exe 3988 71bbaf42b1.exe 3964 firefox.exe 3964 firefox.exe 3964 firefox.exe 3964 firefox.exe 3964 firefox.exe 3964 firefox.exe 3964 firefox.exe 3964 firefox.exe 3964 firefox.exe 3964 firefox.exe 3964 firefox.exe 3964 firefox.exe 3964 firefox.exe 3964 firefox.exe 3964 firefox.exe 3964 firefox.exe 3964 firefox.exe 3964 firefox.exe 3964 firefox.exe 3964 firefox.exe 3988 71bbaf42b1.exe 3988 71bbaf42b1.exe 3988 71bbaf42b1.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3964 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4696 wrote to memory of 2160 4696 61f02c40e31c186fa32a181debbea9143597df8af372229fbda132caa7620eb3.exe 83 PID 4696 wrote to memory of 2160 4696 61f02c40e31c186fa32a181debbea9143597df8af372229fbda132caa7620eb3.exe 83 PID 4696 wrote to memory of 2160 4696 61f02c40e31c186fa32a181debbea9143597df8af372229fbda132caa7620eb3.exe 83 PID 2160 wrote to memory of 5012 2160 z4S77.exe 84 PID 2160 wrote to memory of 5012 2160 z4S77.exe 84 PID 2160 wrote to memory of 5012 2160 z4S77.exe 84 PID 5012 wrote to memory of 3840 5012 N7h97.exe 85 PID 5012 wrote to memory of 3840 5012 N7h97.exe 85 PID 5012 wrote to memory of 3840 5012 N7h97.exe 85 PID 3840 wrote to memory of 2664 3840 1x91K3.exe 86 PID 3840 wrote to memory of 2664 3840 1x91K3.exe 86 PID 3840 wrote to memory of 2664 3840 1x91K3.exe 86 PID 5012 wrote to memory of 4172 5012 N7h97.exe 87 PID 5012 wrote to memory of 4172 5012 N7h97.exe 87 PID 5012 wrote to memory of 4172 5012 N7h97.exe 87 PID 2664 wrote to memory of 1340 2664 skotes.exe 90 PID 2664 wrote to memory of 1340 2664 skotes.exe 90 PID 2664 wrote to memory of 1340 2664 skotes.exe 90 PID 2664 wrote to memory of 2296 2664 skotes.exe 97 PID 2664 wrote to memory of 2296 2664 skotes.exe 97 PID 2664 wrote to memory of 2296 2664 skotes.exe 97 PID 2160 wrote to memory of 4364 2160 z4S77.exe 98 PID 2160 wrote to memory of 4364 2160 z4S77.exe 98 PID 2160 wrote to memory of 4364 2160 z4S77.exe 98 PID 4696 wrote to memory of 4252 4696 61f02c40e31c186fa32a181debbea9143597df8af372229fbda132caa7620eb3.exe 100 PID 4696 wrote to memory of 4252 4696 61f02c40e31c186fa32a181debbea9143597df8af372229fbda132caa7620eb3.exe 100 PID 4696 wrote to memory of 4252 4696 61f02c40e31c186fa32a181debbea9143597df8af372229fbda132caa7620eb3.exe 100 PID 2664 wrote to memory of 3872 2664 skotes.exe 103 PID 2664 wrote to memory of 3872 2664 skotes.exe 103 PID 2664 wrote to memory of 3872 2664 skotes.exe 103 PID 2664 wrote to memory of 3988 2664 skotes.exe 109 PID 2664 wrote to memory of 3988 2664 skotes.exe 109 PID 2664 wrote to memory of 3988 2664 skotes.exe 109 PID 3988 wrote to memory of 2348 3988 71bbaf42b1.exe 113 PID 3988 wrote to memory of 2348 3988 71bbaf42b1.exe 113 PID 3988 wrote to memory of 2348 3988 71bbaf42b1.exe 113 PID 3988 wrote to memory of 1568 3988 71bbaf42b1.exe 116 PID 3988 wrote to memory of 1568 3988 71bbaf42b1.exe 116 PID 3988 wrote to memory of 1568 3988 71bbaf42b1.exe 116 PID 3988 wrote to memory of 4400 3988 71bbaf42b1.exe 118 PID 3988 wrote to memory of 4400 3988 71bbaf42b1.exe 118 PID 3988 wrote to memory of 4400 3988 71bbaf42b1.exe 118 PID 3988 wrote to memory of 1664 3988 71bbaf42b1.exe 120 PID 3988 wrote to memory of 1664 3988 71bbaf42b1.exe 120 PID 3988 wrote to memory of 1664 3988 71bbaf42b1.exe 120 PID 3988 wrote to memory of 5088 3988 71bbaf42b1.exe 122 PID 3988 wrote to memory of 5088 3988 71bbaf42b1.exe 122 PID 3988 wrote to memory of 5088 3988 71bbaf42b1.exe 122 PID 2664 wrote to memory of 4264 2664 skotes.exe 124 PID 2664 wrote to memory of 4264 2664 skotes.exe 124 PID 2664 wrote to memory of 4264 2664 skotes.exe 124 PID 3988 wrote to memory of 5032 3988 71bbaf42b1.exe 125 PID 3988 wrote to memory of 5032 3988 71bbaf42b1.exe 125 PID 5032 wrote to memory of 3964 5032 firefox.exe 126 PID 5032 wrote to memory of 3964 5032 firefox.exe 126 PID 5032 wrote to memory of 3964 5032 firefox.exe 126 PID 5032 wrote to memory of 3964 5032 firefox.exe 126 PID 5032 wrote to memory of 3964 5032 firefox.exe 126 PID 5032 wrote to memory of 3964 5032 firefox.exe 126 PID 5032 wrote to memory of 3964 5032 firefox.exe 126 PID 5032 wrote to memory of 3964 5032 firefox.exe 126 PID 5032 wrote to memory of 3964 5032 firefox.exe 126 PID 5032 wrote to memory of 3964 5032 firefox.exe 126 PID 5032 wrote to memory of 3964 5032 firefox.exe 126 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\61f02c40e31c186fa32a181debbea9143597df8af372229fbda132caa7620eb3.exe"C:\Users\Admin\AppData\Local\Temp\61f02c40e31c186fa32a181debbea9143597df8af372229fbda132caa7620eb3.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4S77.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4S77.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\N7h97.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\N7h97.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1x91K3.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1x91K3.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3840 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\1012713001\BY5BeYh.exe"C:\Users\Admin\AppData\Local\Temp\1012713001\BY5BeYh.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1340 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1340 -s 16167⤵
- Program crash
PID:216
-
-
-
C:\Users\Admin\AppData\Local\Temp\1012724001\d27afcf3a1.exe"C:\Users\Admin\AppData\Local\Temp\1012724001\d27afcf3a1.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2296 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2296 -s 15927⤵
- Program crash
PID:4680
-
-
-
C:\Users\Admin\AppData\Local\Temp\1012725001\2d0502a93d.exe"C:\Users\Admin\AppData\Local\Temp\1012725001\2d0502a93d.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3872
-
-
C:\Users\Admin\AppData\Local\Temp\1012726001\71bbaf42b1.exe"C:\Users\Admin\AppData\Local\Temp\1012726001\71bbaf42b1.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2348
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1568
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4400
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1664
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5088
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3964 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2032 -parentBuildID 20240401114208 -prefsHandle 1936 -prefMapHandle 1912 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {27b5ce98-d1f8-4eb3-b77c-466bb7fb5496} 3964 "\\.\pipe\gecko-crash-server-pipe.3964" gpu9⤵PID:1512
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2488 -parentBuildID 20240401114208 -prefsHandle 2472 -prefMapHandle 2468 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {467cd07b-d8e1-4252-b3c7-b2f0eba93360} 3964 "\\.\pipe\gecko-crash-server-pipe.3964" socket9⤵PID:4920
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2844 -childID 1 -isForBrowser -prefsHandle 3280 -prefMapHandle 3232 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1276 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6d5d2f71-b834-4305-8f10-a76b7177212b} 3964 "\\.\pipe\gecko-crash-server-pipe.3964" tab9⤵PID:2376
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4236 -childID 2 -isForBrowser -prefsHandle 4232 -prefMapHandle 4228 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1276 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {524dd197-e9fd-41e3-a200-45a2a027d922} 3964 "\\.\pipe\gecko-crash-server-pipe.3964" tab9⤵PID:2156
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4896 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4800 -prefMapHandle 4840 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ba17ba1d-8378-41ed-9b52-524a286e7701} 3964 "\\.\pipe\gecko-crash-server-pipe.3964" utility9⤵
- Checks processor information in registry
PID:5660
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5136 -childID 3 -isForBrowser -prefsHandle 5128 -prefMapHandle 5124 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1276 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8c807063-b7ef-40c2-804c-8c8af411be79} 3964 "\\.\pipe\gecko-crash-server-pipe.3964" tab9⤵PID:7028
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5268 -childID 4 -isForBrowser -prefsHandle 5276 -prefMapHandle 5280 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1276 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {24955697-36a0-40a8-8d55-ce35f58ce678} 3964 "\\.\pipe\gecko-crash-server-pipe.3964" tab9⤵PID:7060
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5544 -childID 5 -isForBrowser -prefsHandle 5432 -prefMapHandle 5428 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1276 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3ca1d6a1-f48f-4420-b5a2-873ae64ee892} 3964 "\\.\pipe\gecko-crash-server-pipe.3964" tab9⤵PID:7084
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1012727001\f399976071.exe"C:\Users\Admin\AppData\Local\Temp\1012727001\f399976071.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4264
-
-
C:\Users\Admin\AppData\Local\Temp\1012728001\6c937d1f28.exe"C:\Users\Admin\AppData\Local\Temp\1012728001\6c937d1f28.exe"6⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5452
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2Q1578.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2Q1578.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4172 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4172 -s 16125⤵
- Program crash
PID:1948
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3G26b.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3G26b.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4364
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4m932u.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4m932u.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4252
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:384
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4172 -ip 41721⤵PID:4548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1340 -ip 13401⤵PID:464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2296 -ip 22961⤵PID:1948
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5936
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4452
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
3Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\activity-stream.discovery_stream.json
Filesize19KB
MD5b0c647b4a1b2a20885514c8f0c589481
SHA159111f729e21dc6daea867c8212cf48e5e2c66d3
SHA256ca895b98c83b325d1c37b7606f63adb890e4981e50d49f68f32804f924e34168
SHA51268081624b928e4401ae63c7e19946814cc5c05a568acfdf153af4b1dc68e51a0eed834cc52a79c78393755dd0c622cd6264e473352cef385c31f2e97e0169449
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD53ad5f815985c1bbbe5631dc79545199f
SHA179370837edac83b150d949568cc7290e1e444276
SHA256d9feac0dffb0460d7a7b184e28bd8a2c121aa09d3065254c22d3418b44c1cc2e
SHA51286f1ba99ee08e17c14e597623e1d54e8f31267d793c8387ac010599612c48b7a830cf5b64b03085d2986f6b9913565a6aedc4baefc8f56828ae79cfba170d5c2
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\cache2\entries\F8CBD54DDA10F4286A41EC6A537240712D6C2308
Filesize9KB
MD51ee25a2716f93b2381674acfcdc389b4
SHA15121c1fc0d1ad517a97c5cda0c4861d25b0e4021
SHA2564c167623ed5255e2b56ca9a891b052fd81b80428ecea0ec5be31055ca885191f
SHA51261f2fad027cfb9b1309c86ae7ac49d03af8c2b832a965ee15b7e8d15d453f5650514156cba2a3bde9cbd00dcadd403a7bbc686274988b223d8505e1cef32964a
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
1.8MB
MD5f64bfb2f10922691f73d024caa447e48
SHA1196536819a64cb13c1b78710bfb18cb8be4c5777
SHA256deb36787b95129fcabcd43d10401c2fe47d9e0b30aebf206f83acda4660ac32c
SHA512c688f5e34771bd8ad4b4b86f7c0670f49193fa281c1b56fe6d220131a0c38b4221585e1e38f3dc00d51f286472b3143c9943abd57b6a62dbe8047e8e388ace5b
-
Filesize
1.7MB
MD597463b8b882ab753434f3ecf6928ea85
SHA1e01f33b1d9bfc05e951719087458566ce4ffee4a
SHA256898520b99f7979c913999ecc5c8ab1e416d19c226464bf8e4b3ac2d8cd023a8d
SHA512fbc4d697f6147575fbcd0fafd21e2facddb9c3d72f0abd39f2a9524f15879b79e3be92573178d785af079abbc010910e257527e7ed3901c2a2231932680b7352
-
Filesize
4.9MB
MD5354e2562477ecab1cc52116cccb91c20
SHA1bc507791496a806c8376180718aef5a54447d6fb
SHA256364c1f1ccf4a537fe8705390bce9a94aeb634c8021f0bcb60ee9bda35e3f3d87
SHA5129d025986b00d8e8488b9d88b61b9368b2d6b0907843722921bcb0528bb241dc6fd406f26ef578dd2936f4f388479b723dfdef40d28d1e5a3d7358b936e124b1d
-
Filesize
945KB
MD58fc933172f3c7af2dace64e968b0fe6e
SHA1f794103213345eab73f12db2e54fbaf21cf789c8
SHA256629cc6613193ca5d906dc5c43b5e13d3b0d4273f406e2f2d1eafbbb4ec0d30b9
SHA512a4e6bc67fcd8fb1a606c45564544792520c0b7cea8be3e0df04f9bbe2b9810b2162fb89a93b14902d7eb7462cea3cd9a1795c8bfe03c637f64037f814302ca9c
-
Filesize
2.7MB
MD523c24119ebd0b55aeffa3cc84ecdca5d
SHA1169972a5d31284f4cad583c0d29e2b78ac6bb3b1
SHA256b87bc4b55120210954260e0564229ba7cec7e14d0cf4e8ece600e06ce7507154
SHA5123a86d6896043633e27bac7d2076db7b820e524ace67720b8c5f35dcfdc7039e4441b5cdedffde02e6ad0065d1e27196bd260286e32a9f516664ee06edead1672
-
Filesize
4.2MB
MD5261d511a3420cda4b383cab204e3ec7b
SHA159c3c24f34d2381869a203180b409631e0008918
SHA2565325d6080593f6f09f4cccd1dd6a29980c2a03eb3029f275ca10673d6d437157
SHA512215fdcd8bbe2ac24b69e71a2f34df24c4ed3f5dfff2f8c0930f6ebe7ca7a7f1cebcbe0b3a7bed358d716c427368a8e35a7cefdc488dd780ae24769b07e662146
-
Filesize
2.7MB
MD5579f94efe06de9dcb77d0d6f709ff45a
SHA14646801b4ccbb67fe68c260c1d237f4fe81315ef
SHA256f08231867bdca8eba5fb99a5c6ddc7c1d93c0be324eacabe8b69d0e85091d314
SHA512aa164e69f5433a7373f85f2e87f289c4f1c0e58d9a13c4d53ebd3d78edc5dc0aebb17b6e46d9aa49f63dd2e55b1746c774f452a45e76ee2aec9b00c3a45b377e
-
Filesize
5.2MB
MD576c93ef5be4aa31866a3b7e3fd6f13e6
SHA1ced5fe6962bdb675380d49e882b84b337b940cac
SHA25600dfab1f27b17b81082aa775ec3d91a94d85a73525597e1d8714cf70cbc823c3
SHA51284f9db3f59f8acadbc652914cfedef83b233f504d05a48d8d4c3c0fd0782b19282505cab4c4618847cc183070e4b15dc82c0b8614fb4f13386387d8b4a88c500
-
Filesize
5.0MB
MD5a9fb742b294352ba5cf8f66ab84f5c3b
SHA13aefcdbd890b999b4fb9e4d7747d4902f3c4e989
SHA2560a8b0b1acd41f8da35d862ba5d0437d7a7cb35fca3f4bfa6927c53e1c50865e0
SHA5121ce7f8d694d885c839c0c23b819774643aa425ac4910a6395388a7c629fad10a6608169a999122d2eb676152dbbcb990ad064616a5b99bbb1f16ddb025fa4c89
-
Filesize
3.6MB
MD501bd05eb6dd9fa15eac7cf2714440f71
SHA1ede1e8477399d3e7d960e4a65973559986d2c4a7
SHA25647b9fbb32055f45f7978defc56b260ab8cda0abf14c04f5c28ffd1f1ab2d0f5d
SHA512b831237a28a30576b1e807f6068f6f77f661902609777f9016c97b6a95ee29491029617ed6ff2981951af238053270df508742b7021d8dad92d09c4a60452aeb
-
Filesize
3.1MB
MD587f6834a82048093e6b4b39ee4d456fb
SHA17d246049a35504bcd6310d7a26c86cf233259705
SHA2562089d1005904e55e747c588fda147c3d48818afd99c45c94a0ae981ac14a8dad
SHA512b024813d826e7c78e69822ab95e743f5de1aaf12bc7555f0e572d0a431f7f18f6be3caf85c2fcd61258a213336e679293cbd6a660be14cfea05fbb70c52f81ab
-
Filesize
1.8MB
MD5c34870fde3ecef56b7fda53e3b9714d9
SHA1df50624ba1c0990c22b8bf2254a8b3800e2b1877
SHA256a6787c48c7c99334c8ccf287d340e597efe5de65e98f0ab23fabae29d88dcbfa
SHA512577e0494d4403f0fa3ef88b30835952598024ad3f1836abf5782aed3de7826cb4ea5c77adae4e1f6ca78b3e051564e0837551d9a073d9155b1e9bcbe21fff300
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin
Filesize18KB
MD5522966a6ec47f565068c1bc66067fd8c
SHA131eca4c1f32c82a0303e1c7a4ffd0c5b34c130c2
SHA256727a90e47acb50587e8cb89d416fa8c7ec8834b1843ace5a9cb4b175aae04639
SHA5120c9698840cd343cc04e2cc354496b6b0de99f25a669d2135147a75f1c77dfb7e6717d8298db1c1ecb9a340c3bfa535475fedef5993ea2ef3cd8bb4da8f734b01
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin
Filesize8KB
MD50115112fc3f604621feb755743bbac74
SHA16d21f8366cc83d9da023b99ecfcc434ec512bd09
SHA256d98c2522a4ef286ab55b8b1ce7b4a95b2054c018bca2f90a70d108f6f4a4ef50
SHA51233465da9ac6106fb92664dacc06ab78240ed123257b1b62e0b37b8cd706d491ae96cbe48235eab52addd76e998c9fdd5391ac53d086b2c76efcc21f3b21ab131
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin
Filesize13KB
MD5eca46106880b2957b726110fdf9ccbe2
SHA19fc5f19b941bd8090d19f1ae9d54714fd547aaef
SHA256a22fc840dd3324123c553a35976f74b77a90a56f76228edf363825b05924fad5
SHA51210aad17b98543ab053a71f5c0dd7a4af04ef6488f9841c94bcfc5f41728d7d9a211f0501b74e82740af67bd80c178d95f6095a41c941ea26338f907aa19cc0d5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.bin
Filesize23KB
MD532f278c635aba6973853ede657a68f82
SHA128cd8dff7187a9b848d25d9eb31ff6c25c24f610
SHA256863e1379d7d074fa96e8b7a6ecc7f5ef9866a278e75747c4c2e3c5558446e844
SHA512b9f4de08581e9964f1ea96a4f78b22652f40864ed1b471dea9389e9fb26c0411e636ae74433cee242f4dc42c04abdee26c3e385f3c46ba4e9134b28e2d710d6f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.bin
Filesize6KB
MD548d87b54235acbaa5c95ec67795633cb
SHA11a3995b44d06163bfc10cdb69372ed9031642f71
SHA25665c173e635408a0ab1cc0fe6893b22b01d0aee3493a931ca7c5bb6da40e54671
SHA51225259ab6481b5430c90733cb06f20d3071a85ca22d716eb610751cf02c946cb2848a203795c6c3b6235b4d508ed1af91fc44f24ff3db2ebe3dbe2a9661d43492
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.bin
Filesize15KB
MD5722aefff3e453668caf7f5df791e67ef
SHA15b4295c5e49ac7086cdef54f717874c2dee34b0b
SHA256186d1d29490be99fe6225a080e8b8433b2101c986908d4f99930cabe3c11d2f4
SHA512b9496ec6cc424f0db3a4fc893e4d52389ff1e638e40041272f92a2d4a51d2975d8c73db54815dbdbe3fea16c9a8a71f6931ec4c1736d15879aa5e29a83c3dc66
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.bin
Filesize15KB
MD5687a7d2976584b5c5fc73d914bb21f5f
SHA14cad250087f90f7da9ad5d033c7fe67b0d7451eb
SHA256c4b7ab0e57dc842c0dcedfd4cdd458fa6be667d11801dac4412b1112468e8c42
SHA51268e667b85d98573e85f6c7120ff2ac513b46c7d04cc4cca34688c5b2ee0b660eb27aa96c941186eaf041fda4b2bce23e18d3151c0db14de312628a09ac1f0aea
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.bin
Filesize5KB
MD57b82ed9ae85104b5635e8ab58baabddc
SHA1fc9aff180f6d7414e255585d9381568d765043c0
SHA256640001f6999d9d38024c5065fe90b4260da6a9984c284a8a33620a366660857e
SHA512cf5b07ba98727613f15c5d457147cf28209f4e07c1aea9cfa825324c1a099d016ce10409aa1a051ba425cf3e935119f94eac814ebc47f5b9fc21fec321a98081
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD515848d24556cde61bed55ba34c3e362c
SHA1351406305d6a9329b10dbbc9aa4cf647bc4ccbc7
SHA256d2f151a5470da4cb0efd7996e4980f64e1a2d354de188250f75ff9da03db06a2
SHA512fdab9c76685f6ff1beb754eed41e13f5888ab21f5880ee7a6f445b468ccb90453d6b67bea4089e1706557a9e206d3afec8bcc27331e03114dc566c0de812c022
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD52206b48160813eb75c38a8398b8bb3bc
SHA16a61888667f741c55dd450433a7b449a518e6af1
SHA256b8f1bac2a407dfd87e3901c8bc3368cbaa4deed9944c81e23e0bbba7e4ed6138
SHA512d8884d685ac3c4e396b506b69d39a22fdb08610bb40ae52a4542c73c653b119c8ab31b853e3e23101c1286b0f656e3c12aa1ed45bd5bea2a45e80257b40f6826
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD52f43ff972be23bc0a6a4e716e9cffb2e
SHA1ca91b67ede93f32fce95be8e7c63642113dcee21
SHA256c2a7afe479fa5bf486c5206dcc3d0d80cd03920e4408ff9aaa084405a9af5a0b
SHA51202c4196a0d22b4c799e18402539b1b3c9d2a43bc79fac766b7bb75c2ef0ded41fd20736b6a9aeedf706944b576894d4a6211bef836efcc8e34305f43574c356d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5dc28853d37f4d140db4056baf5def3ea
SHA12029ad004fcde1c772abcc88f1be28eaa0c000f3
SHA2569711f827785c2b45411e22ea8ceaa9693874c3ede12ea2ee9920a112138c8e9f
SHA512c2abcefdaa260d136b5d6e396d009c69f8881d8fcc46bf780a27a8bb6f67111d4b0c6be1fed8d157e163c2f75d3bbd3786249b219b2b920658eeb06dd2bc4037
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5b7963770e10d0f7b56820ba3a3af8dab
SHA10ad039956fff7a0b374aa9f2fd0b6a1f08c656d9
SHA256bc2add81a4f34d28b040bb303c8a332c986514f85b91ee75a0f7d40936941533
SHA512772659685db961d303b425dd2bf56a89569aaf7b6539d1faea2c3e4d187a331fda67d4ee052b55841c19c72986562e2c220f09bcfc8cd5b7fac65a5862c30abd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\4f30aa4f-a746-4a33-a67a-61c95f6fac71
Filesize671B
MD52b893cd035439abeb05bf2d87076c60f
SHA16b5017026e787a536cdf415dfcff28994a6c555d
SHA2569f7bf7c2e8cbcd73025a06a460e68192fd9afff15d1b64a6061562560b8340b6
SHA5129d09a552be7b6ae5d7af832e3a9e2a6dd480f9cb75e2b96f47bbb516538167fb2c348b2f9ec52406717bb47f7914170ec448c8824cfcce2b062fea53cde0401e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\6837b6f9-513c-4adf-9642-ec63a00f6d45
Filesize982B
MD565e4b52709c6d390b897fe75402afa65
SHA11dafa1330f853c9b968f00d7befdd93781a889c5
SHA256beb8567a435e4219f2207eefcd9117fd1bf86546b420dd9e5c790c7d57cac2ef
SHA51295f781507b60c452eb421d80da48d4b94f91f11fac0b9b42f33946915cdc40821716085115b7f017fd115eeae7ffe3141a885aa6bdb0c318aebcedde21766c55
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\c5bb65cd-1f94-41d1-91cd-8077253fec7e
Filesize26KB
MD551c0de6fd1206380173271209e753a48
SHA1f2d6edffbe6baab6704a9822e291ffc8e7f90ee6
SHA25602e1bf096e1c5b416b37c2c300d0d6ee4f0ac48e2216d11210601c36c5954685
SHA51272c3738df3b32504a37cfb16f3ec8514ac727728a6321bf43950aa2f588705e6a10ae9026d49b7c6bcba7e2a26a66d616674582555200cbdcf5adb5e0a9e0f5d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD56753fe66a31a01f5716141d9eadb3851
SHA1d9430693c30b1970cd89fab761a82c8f013f0394
SHA256b2598f049bea4cd5a77eac20dcde01ec2ca5ad86526d900e197da8d38827fc6a
SHA512aca8e9769a93f18845d7a10c82fe53369fd785231854be83f285cb06be2ec01ee279bc53ebdfa6b64f42bbc1c4a601d329a0a689e62a23ba25670d2bf0254793
-
Filesize
10KB
MD5e2f83afac3ba95eb5bd34b53dbf27b35
SHA1ef66985c3ee3b6e8197f90496cf7d5968660161f
SHA2569b47d017cd74357394d96bb0d5e05c0836742e3858fbcc7e54efeb8ad166795f
SHA512d7de6a95d017cdcf62f457193c36f0105b907bed04d40e8946754b013149f802d45c864249c5cface7b4e08da49ca83c7a23f0c30dc299bb0126cc7dfbb3ad22
-
Filesize
15KB
MD58d61adf61bc8ba2668e1c16f570e4b9f
SHA1b11ae4bdc86f66f889b5733398ed7dff9171643a
SHA256947036ae6145d671abcb5a9d67b7f17bc4045cad74aac35c2eff6d5c6d437962
SHA5125f9ed2e761d795e190d9f111a16178fb9caa86eb05f79bdccce8c9c199ca986a0d4016745e2fde47dc091416c2f2e2baeb7f6cfc808ff5c5c31b4e840f58887f
-
Filesize
11KB
MD5cb15bda23f8b5709cba4afa30b01bcca
SHA1aec29eae952027a45987ceb54dcf3f56f5157570
SHA256cfa7365f934842014f0d5df1607f57d97ab433ec58cba747e46ac420d2584d3a
SHA5121f35e753cb098417a23066e825cdd9c93874ffc0e29e8edbcbe81f297be12f288616d4c782931a2bc035e1233a8a3a02e6bf6264a31af82830238a25c8f5dd35