Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-12-2024 21:28
Static task
static1
General
-
Target
a1a647f34c4a8583f720a1042e570cdca073f8303b9245765d49a809d017466c.exe
-
Size
6.9MB
-
MD5
e58c50d1d193f4f718e949fd72e60afa
-
SHA1
6130753cb7e2fffba27e7079a0b44f603e37c611
-
SHA256
a1a647f34c4a8583f720a1042e570cdca073f8303b9245765d49a809d017466c
-
SHA512
b092c6230f7736d0f8308bc73bce8509e9dd029806901557a8a1ac56310fdc2e49a6a5d13c014ef105006ce0c6ec20d4bc2934216bf6fc9803d53feb19072cc5
-
SSDEEP
98304:07u2bgZJJu5WEsXtf5NICKbdyljXB09t4ktMYydmMUFYcRvnoykBs6koSUMT6lMa:WsJJaBEf5KbFxGsFloyX6kvKM
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
https://atten-supporse.biz/api
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://atten-supporse.biz/api
https://se-blurry.biz/api
https://zinc-sneark.biz/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 385f6231c5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 385f6231c5.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4s029g.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4s029g.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4s029g.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 385f6231c5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 385f6231c5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4s029g.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4s029g.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4s029g.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 385f6231c5.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4s029g.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9371dc5761.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 17b3e9077c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1Y45c5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2c8286.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3t22M.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 385f6231c5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 22 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 385f6231c5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1Y45c5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3t22M.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9371dc5761.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4s029g.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 17b3e9077c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1Y45c5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2c8286.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3t22M.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 385f6231c5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9371dc5761.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 17b3e9077c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2c8286.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4s029g.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 1Y45c5.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 15 IoCs
pid Process 1696 D1L61.exe 1664 L0O43.exe 3688 1Y45c5.exe 1880 skotes.exe 2728 2c8286.exe 1828 3t22M.exe 1836 4s029g.exe 3628 XfpUz7y.exe 4032 skotes.exe 2000 9371dc5761.exe 3652 17b3e9077c.exe 2900 d28b3f3c44.exe 2700 385f6231c5.exe 6128 skotes.exe 2632 skotes.exe -
Identifies Wine through registry keys 2 TTPs 11 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 1Y45c5.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 2c8286.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 3t22M.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 4s029g.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 9371dc5761.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 17b3e9077c.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 385f6231c5.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 385f6231c5.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4s029g.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4s029g.exe -
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\385f6231c5.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013039001\\385f6231c5.exe" skotes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a1a647f34c4a8583f720a1042e570cdca073f8303b9245765d49a809d017466c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" D1L61.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" L0O43.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\9371dc5761.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013036001\\9371dc5761.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\17b3e9077c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013037001\\17b3e9077c.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\d28b3f3c44.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013038001\\d28b3f3c44.exe" skotes.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 13 IoCs
flow ioc 54 raw.githubusercontent.com 55 raw.githubusercontent.com 62 raw.githubusercontent.com 64 raw.githubusercontent.com 39 raw.githubusercontent.com 41 raw.githubusercontent.com 49 raw.githubusercontent.com 51 raw.githubusercontent.com 63 raw.githubusercontent.com 40 raw.githubusercontent.com 42 raw.githubusercontent.com 46 raw.githubusercontent.com 58 raw.githubusercontent.com -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0009000000023c83-126.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
pid Process 3688 1Y45c5.exe 1880 skotes.exe 2728 2c8286.exe 1828 3t22M.exe 1836 4s029g.exe 2000 9371dc5761.exe 3652 17b3e9077c.exe 2700 385f6231c5.exe 6128 skotes.exe 2632 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1Y45c5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 2060 2728 WerFault.exe 86 2356 2000 WerFault.exe 102 2956 2000 WerFault.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 19 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1a647f34c4a8583f720a1042e570cdca073f8303b9245765d49a809d017466c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D1L61.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language L0O43.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 17b3e9077c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d28b3f3c44.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 385f6231c5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2c8286.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3t22M.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language d28b3f3c44.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1Y45c5.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage d28b3f3c44.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4s029g.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9371dc5761.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 3128 taskkill.exe 4896 taskkill.exe 2144 taskkill.exe 3408 taskkill.exe 3792 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 3688 1Y45c5.exe 3688 1Y45c5.exe 1880 skotes.exe 1880 skotes.exe 2728 2c8286.exe 2728 2c8286.exe 1828 3t22M.exe 1828 3t22M.exe 1836 4s029g.exe 1836 4s029g.exe 1836 4s029g.exe 1836 4s029g.exe 2000 9371dc5761.exe 2000 9371dc5761.exe 3652 17b3e9077c.exe 3652 17b3e9077c.exe 2900 d28b3f3c44.exe 2900 d28b3f3c44.exe 2900 d28b3f3c44.exe 2900 d28b3f3c44.exe 2700 385f6231c5.exe 2700 385f6231c5.exe 2700 385f6231c5.exe 2700 385f6231c5.exe 2700 385f6231c5.exe 6128 skotes.exe 6128 skotes.exe 2632 skotes.exe 2632 skotes.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 1836 4s029g.exe Token: SeDebugPrivilege 3128 taskkill.exe Token: SeDebugPrivilege 4896 taskkill.exe Token: SeDebugPrivilege 2144 taskkill.exe Token: SeDebugPrivilege 3408 taskkill.exe Token: SeDebugPrivilege 3792 taskkill.exe Token: SeDebugPrivilege 5044 firefox.exe Token: SeDebugPrivilege 5044 firefox.exe Token: SeDebugPrivilege 2700 385f6231c5.exe -
Suspicious use of FindShellTrayWindow 36 IoCs
pid Process 3688 1Y45c5.exe 2900 d28b3f3c44.exe 2900 d28b3f3c44.exe 2900 d28b3f3c44.exe 2900 d28b3f3c44.exe 2900 d28b3f3c44.exe 2900 d28b3f3c44.exe 2900 d28b3f3c44.exe 2900 d28b3f3c44.exe 2900 d28b3f3c44.exe 2900 d28b3f3c44.exe 5044 firefox.exe 5044 firefox.exe 5044 firefox.exe 5044 firefox.exe 5044 firefox.exe 5044 firefox.exe 5044 firefox.exe 5044 firefox.exe 5044 firefox.exe 5044 firefox.exe 5044 firefox.exe 5044 firefox.exe 5044 firefox.exe 5044 firefox.exe 5044 firefox.exe 5044 firefox.exe 5044 firefox.exe 5044 firefox.exe 5044 firefox.exe 5044 firefox.exe 5044 firefox.exe 2900 d28b3f3c44.exe 2900 d28b3f3c44.exe 2900 d28b3f3c44.exe 2900 d28b3f3c44.exe -
Suspicious use of SendNotifyMessage 34 IoCs
pid Process 2900 d28b3f3c44.exe 2900 d28b3f3c44.exe 2900 d28b3f3c44.exe 2900 d28b3f3c44.exe 2900 d28b3f3c44.exe 2900 d28b3f3c44.exe 2900 d28b3f3c44.exe 2900 d28b3f3c44.exe 2900 d28b3f3c44.exe 2900 d28b3f3c44.exe 5044 firefox.exe 5044 firefox.exe 5044 firefox.exe 5044 firefox.exe 5044 firefox.exe 5044 firefox.exe 5044 firefox.exe 5044 firefox.exe 5044 firefox.exe 5044 firefox.exe 5044 firefox.exe 5044 firefox.exe 5044 firefox.exe 5044 firefox.exe 5044 firefox.exe 5044 firefox.exe 5044 firefox.exe 5044 firefox.exe 5044 firefox.exe 5044 firefox.exe 2900 d28b3f3c44.exe 2900 d28b3f3c44.exe 2900 d28b3f3c44.exe 2900 d28b3f3c44.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5044 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2152 wrote to memory of 1696 2152 a1a647f34c4a8583f720a1042e570cdca073f8303b9245765d49a809d017466c.exe 82 PID 2152 wrote to memory of 1696 2152 a1a647f34c4a8583f720a1042e570cdca073f8303b9245765d49a809d017466c.exe 82 PID 2152 wrote to memory of 1696 2152 a1a647f34c4a8583f720a1042e570cdca073f8303b9245765d49a809d017466c.exe 82 PID 1696 wrote to memory of 1664 1696 D1L61.exe 83 PID 1696 wrote to memory of 1664 1696 D1L61.exe 83 PID 1696 wrote to memory of 1664 1696 D1L61.exe 83 PID 1664 wrote to memory of 3688 1664 L0O43.exe 84 PID 1664 wrote to memory of 3688 1664 L0O43.exe 84 PID 1664 wrote to memory of 3688 1664 L0O43.exe 84 PID 3688 wrote to memory of 1880 3688 1Y45c5.exe 85 PID 3688 wrote to memory of 1880 3688 1Y45c5.exe 85 PID 3688 wrote to memory of 1880 3688 1Y45c5.exe 85 PID 1664 wrote to memory of 2728 1664 L0O43.exe 86 PID 1664 wrote to memory of 2728 1664 L0O43.exe 86 PID 1664 wrote to memory of 2728 1664 L0O43.exe 86 PID 1696 wrote to memory of 1828 1696 D1L61.exe 94 PID 1696 wrote to memory of 1828 1696 D1L61.exe 94 PID 1696 wrote to memory of 1828 1696 D1L61.exe 94 PID 2152 wrote to memory of 1836 2152 a1a647f34c4a8583f720a1042e570cdca073f8303b9245765d49a809d017466c.exe 96 PID 2152 wrote to memory of 1836 2152 a1a647f34c4a8583f720a1042e570cdca073f8303b9245765d49a809d017466c.exe 96 PID 2152 wrote to memory of 1836 2152 a1a647f34c4a8583f720a1042e570cdca073f8303b9245765d49a809d017466c.exe 96 PID 1880 wrote to memory of 3628 1880 skotes.exe 99 PID 1880 wrote to memory of 3628 1880 skotes.exe 99 PID 1880 wrote to memory of 2000 1880 skotes.exe 102 PID 1880 wrote to memory of 2000 1880 skotes.exe 102 PID 1880 wrote to memory of 2000 1880 skotes.exe 102 PID 1880 wrote to memory of 3652 1880 skotes.exe 104 PID 1880 wrote to memory of 3652 1880 skotes.exe 104 PID 1880 wrote to memory of 3652 1880 skotes.exe 104 PID 1880 wrote to memory of 2900 1880 skotes.exe 109 PID 1880 wrote to memory of 2900 1880 skotes.exe 109 PID 1880 wrote to memory of 2900 1880 skotes.exe 109 PID 2900 wrote to memory of 3128 2900 d28b3f3c44.exe 110 PID 2900 wrote to memory of 3128 2900 d28b3f3c44.exe 110 PID 2900 wrote to memory of 3128 2900 d28b3f3c44.exe 110 PID 2900 wrote to memory of 4896 2900 d28b3f3c44.exe 112 PID 2900 wrote to memory of 4896 2900 d28b3f3c44.exe 112 PID 2900 wrote to memory of 4896 2900 d28b3f3c44.exe 112 PID 2900 wrote to memory of 2144 2900 d28b3f3c44.exe 114 PID 2900 wrote to memory of 2144 2900 d28b3f3c44.exe 114 PID 2900 wrote to memory of 2144 2900 d28b3f3c44.exe 114 PID 2900 wrote to memory of 3408 2900 d28b3f3c44.exe 116 PID 2900 wrote to memory of 3408 2900 d28b3f3c44.exe 116 PID 2900 wrote to memory of 3408 2900 d28b3f3c44.exe 116 PID 2900 wrote to memory of 3792 2900 d28b3f3c44.exe 118 PID 2900 wrote to memory of 3792 2900 d28b3f3c44.exe 118 PID 2900 wrote to memory of 3792 2900 d28b3f3c44.exe 118 PID 2900 wrote to memory of 4052 2900 d28b3f3c44.exe 120 PID 2900 wrote to memory of 4052 2900 d28b3f3c44.exe 120 PID 4052 wrote to memory of 5044 4052 firefox.exe 121 PID 4052 wrote to memory of 5044 4052 firefox.exe 121 PID 4052 wrote to memory of 5044 4052 firefox.exe 121 PID 4052 wrote to memory of 5044 4052 firefox.exe 121 PID 4052 wrote to memory of 5044 4052 firefox.exe 121 PID 4052 wrote to memory of 5044 4052 firefox.exe 121 PID 4052 wrote to memory of 5044 4052 firefox.exe 121 PID 4052 wrote to memory of 5044 4052 firefox.exe 121 PID 4052 wrote to memory of 5044 4052 firefox.exe 121 PID 4052 wrote to memory of 5044 4052 firefox.exe 121 PID 4052 wrote to memory of 5044 4052 firefox.exe 121 PID 5044 wrote to memory of 2488 5044 firefox.exe 122 PID 5044 wrote to memory of 2488 5044 firefox.exe 122 PID 5044 wrote to memory of 2488 5044 firefox.exe 122 PID 5044 wrote to memory of 2488 5044 firefox.exe 122 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1a647f34c4a8583f720a1042e570cdca073f8303b9245765d49a809d017466c.exe"C:\Users\Admin\AppData\Local\Temp\a1a647f34c4a8583f720a1042e570cdca073f8303b9245765d49a809d017466c.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\D1L61.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\D1L61.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\L0O43.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\L0O43.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1Y45c5.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1Y45c5.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Users\Admin\AppData\Local\Temp\1013035001\XfpUz7y.exe"C:\Users\Admin\AppData\Local\Temp\1013035001\XfpUz7y.exe"6⤵
- Executes dropped EXE
PID:3628
-
-
C:\Users\Admin\AppData\Local\Temp\1013036001\9371dc5761.exe"C:\Users\Admin\AppData\Local\Temp\1013036001\9371dc5761.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2000 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2000 -s 16087⤵
- Program crash
PID:2356
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2000 -s 15767⤵
- Program crash
PID:2956
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013037001\17b3e9077c.exe"C:\Users\Admin\AppData\Local\Temp\1013037001\17b3e9077c.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3652
-
-
C:\Users\Admin\AppData\Local\Temp\1013038001\d28b3f3c44.exe"C:\Users\Admin\AppData\Local\Temp\1013038001\d28b3f3c44.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3128
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4896
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2144
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3408
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3792
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1976 -parentBuildID 20240401114208 -prefsHandle 1892 -prefMapHandle 1884 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {00954629-4d4e-4bec-b27f-0f942e864f9b} 5044 "\\.\pipe\gecko-crash-server-pipe.5044" gpu9⤵PID:2488
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2460 -parentBuildID 20240401114208 -prefsHandle 2436 -prefMapHandle 2424 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0041f3ff-d02d-41d1-a8c4-6ac884b24323} 5044 "\\.\pipe\gecko-crash-server-pipe.5044" socket9⤵PID:4588
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3076 -childID 1 -isForBrowser -prefsHandle 3056 -prefMapHandle 3068 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1e0080e4-37c8-4ab3-9fcf-500a44a234bb} 5044 "\\.\pipe\gecko-crash-server-pipe.5044" tab9⤵PID:2096
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4328 -childID 2 -isForBrowser -prefsHandle 3768 -prefMapHandle 3528 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {caac0eea-4a6f-4043-89e5-094048df1db6} 5044 "\\.\pipe\gecko-crash-server-pipe.5044" tab9⤵PID:4568
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4964 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4916 -prefMapHandle 4912 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d1fffd6d-1250-4ec2-8d42-f59a56ecc442} 5044 "\\.\pipe\gecko-crash-server-pipe.5044" utility9⤵
- Checks processor information in registry
PID:1392
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5176 -childID 3 -isForBrowser -prefsHandle 5168 -prefMapHandle 5156 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2c4a5a60-5387-4959-a0bf-b483e35981b6} 5044 "\\.\pipe\gecko-crash-server-pipe.5044" tab9⤵PID:6704
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5416 -childID 4 -isForBrowser -prefsHandle 5424 -prefMapHandle 5428 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cf5af658-eb16-4bf7-a73d-2df83880b69d} 5044 "\\.\pipe\gecko-crash-server-pipe.5044" tab9⤵PID:6724
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5688 -childID 5 -isForBrowser -prefsHandle 5588 -prefMapHandle 5584 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2f63a4ea-edb2-4e89-a03c-8780b6c4f518} 5044 "\\.\pipe\gecko-crash-server-pipe.5044" tab9⤵PID:6836
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013039001\385f6231c5.exe"C:\Users\Admin\AppData\Local\Temp\1013039001\385f6231c5.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2700
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2c8286.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2c8286.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2728 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2728 -s 16045⤵
- Program crash
PID:2060
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3t22M.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3t22M.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1828
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4s029g.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4s029g.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1836
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2728 -ip 27281⤵PID:3788
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
PID:4032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2000 -ip 20001⤵PID:1572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2000 -ip 20001⤵PID:3716
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6128
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2632
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\85mw8mk9.default-release\activity-stream.discovery_stream.json
Filesize19KB
MD5b0ad6f02aa3d28624d8607b35e57efa8
SHA183a6bc0ae7bd11598c756c3cc27ec9cca88b2ba7
SHA2561645598021770829602a778a0e4026e2192c327ddf9f33122079cf8db2bd053f
SHA512bae290c7252ac496ff21d32424d2e7d3e1140533c595872c79d6b2a2f8bcd48ca4d2d13f0214be3e940ee86ff80456458d37028f49cf47c8bbde9e74fcce3796
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\85mw8mk9.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD551568f4dafebc535064a9790477f99d8
SHA1bea85055754eb978c153d1f0c65d2c4f6771eb22
SHA256a02ce869f2787d64d678ddca5e49595d3f8ade4d932bee643b739c8afdec0a1d
SHA5126cede83641d798ffa6ba5d341f6034ba38d0a9079950ee03a3fe5ec272909475c33bc4217166e49a974878f8fef4e1671ca731d53758a1ea2936fdf062e23e7b
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\85mw8mk9.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
13.3MB
MD55122e07da6c4389fbd0b811d41b18ae0
SHA1fa33ca1356b54c8c2d2f564a49754ed6104e0fd5
SHA256dc36cd245d0aa5750724ac2dc74d5368b9c06a6281b8082d682d3741185e18bf
SHA5121d1bd90f9c1adcd326911f4956661a21e20453eda601c05b741cc4859b5c182290b2830451a387d737eaefd4d2eedcfbc9a84892bb38b604f2900e4bd7d66753
-
Filesize
947KB
MD58ff64952a4b6ad604177055c0386a243
SHA11a51a318ee155add2edd493fb2197da18a54e548
SHA2563cef996b5c18ab07c07b96325a43ef611f74a90124d11e1451e76678028cbabf
SHA5129ceb86679fa29a761019efff8ae465a5c4ac311c998c6430cf2619204bd850bde73b1c29051db48d31af0411d9446f3205c03f0f8e1e7c5a0dc056a95b6a176a
-
Filesize
2.7MB
MD5daaa30f2dff00615a67ec640591df80d
SHA1f21f0d0f4c0ce3ccbeabc21537c56968366314e3
SHA256048ef18f5af0753f1703e5c6672728e70dfd0576a91d84abc5af1f0661e1ac61
SHA51275a0243194020db5896a18c4eec2ea6074fd735e7166f05fe00a8e0eaf339328817775d585cbd31b6d9ced14edf5ab864e9a91cf80f84802a9bc378bc966e510
-
Filesize
5.3MB
MD5845b8b792223088b1fd9f30f1c4f0998
SHA14343ec62d9c1d55b79f2b3e66fac1c7e4ae4276f
SHA256f42f2641be45ca04eedabf2162f735f3e6dd7e506ba20e7472b001903ae61df7
SHA5129ecb7b0afe7d20050fb858a32436b65ac4d698885aafd62dbec31cf95b4a3df8872c80b4b06e727a4eabf5dd73e396a1b41591f8b925ca02169f3d31b80ac417
-
Filesize
1.7MB
MD523d4f0764b48e58b48fe9d219ad8644b
SHA1490db0a630a6fa02179be21a40e8b9daf0b09a2a
SHA2560bf27ed8c4e9a4d4fb5d91ef15604296d731cfd062aed351dc6cc5a0c246a698
SHA51238643ef85d55edcdce0f46e5bf2f0f2dfa465bb648449968de394c14bce8b47266657aec252049102bcac43a4eee669dfe11448e9092ec54d5db0eba063dfbde
-
Filesize
3.5MB
MD5b9c2a2af9fa6daa11fb3a832f26199e3
SHA15b17232245ff3b13e3cf5bf46ad59e0d076d0440
SHA256f735dbbb3fd0ed7c73924f7661aff8eeb498b5cd6537b1b7a1954a1107e2719d
SHA51214ba25d8b9789314d3605f83f88a1206b09c05a034e622a1ada36a9cbdf8361ed50fe9c91989fe0beb55d77db99b8b9553f73c6a58675240295e5841986622ed
-
Filesize
3.1MB
MD5a6de850843679453111199938e2f063f
SHA1d3d29b0b125f2c153f7705752d2e04840d859056
SHA2564cbc26196d6f678797589a2277973ea4c3c5ef052c87170f613ed7d4698923ea
SHA5121a74e9763181d44bf58b8f62b730a387da38c091613c4934388843572e5d61df0a0f3f6529bda7926b66fcaa6b066b9c219822a8a7122098566f84ac8f37915f
-
Filesize
1.8MB
MD5615e21148ab9f18a2cd5fc57a29d2f9d
SHA13d0ac153bf285fd266e38b60f4ead5ba9a06cd3f
SHA256d20f28f876e0b6796e3f2d8b5c855eee43e6f9b20d2c9117a0d3179cd51b3d7e
SHA512aefa69bc9174dda7d21c1cdc3afa0a66ba6c4522d947f07049e21ae17f61801b3a3858429ad50882c00228a37e43ce7278002377dc435c6f7f64dccc64edd48d
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\AlternateServices.bin
Filesize6KB
MD5b483b1e751f27336ea766a693f706495
SHA173f67f694e51b9c387d733f8adcc6ae74ea4f642
SHA25676482e213d95d40a99fa7577d10e103929a60abef22125c21ed778e30573b48d
SHA5123261618595be6c0a2b5e8979a4672a79e6957e31ee0651f4d4582625c80f9dc304387b2220496e39abcdc0c75b2525b10c597833fcaca09d6265fff730374336
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\AlternateServices.bin
Filesize11KB
MD501e54fce4cab1dabea8881273d586a22
SHA1f273b38f652128698aed739ac1d76f6d5e602acd
SHA2566804d0be94f23f89dc4fa0896f43d7dce0518e99ae3ae47965e3c96e3b804947
SHA5124f9a79be85ea4dabf637bd3f0ed82ca2a4156d12d1e4c4eb17abb6021192c7af5c4ad68ded3eebc3e0ec33fff8ea6f7b0ede93955cd49498d3f39313591e2e4e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.bin
Filesize15KB
MD598176d22df501d71a1aa5cd7b1000fb8
SHA12ea49dcc8c6bf44c0b3d56bf63c04d584151ed8b
SHA25677e0c4d20257cae5d6b26621f15865eb7e7a50304b8c13e7929ce146271eb34e
SHA5123cec810433a8f1ebdf97442c5bb3e1ea1679133d39542129b618172cce4a777bbdf3ac254f2cda9bbb0c34ec08e0a4a268bbe2fbe61df3e45c8e86c6eb5cdeab
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.bin
Filesize15KB
MD515da50d7dc679c9eb888050dde416a5c
SHA1bfb3fc847b23f93da6b5ba030725518041970776
SHA256137e3fce13fc0903e01678ba0a984ede0bd4ede6397f110834902478bea0c0c3
SHA5120f3be9f8608bd3040bee5982378a144def2ace8cc8efaaddf29c9004142556559e6478e2f571536aa2e8bd2c1d00e49ee0b152608f4759d4c04e4fe836aaa6a9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.bin
Filesize5KB
MD552c9d89e3a94e6103344823a095a7b46
SHA10742f197c34ed8d5e9af292aac1b7818c79b1f51
SHA256d0afff1a3ccafdb549780cf2a32477d60d9df8b6346f0ef601051f2df1aa1207
SHA512daa020336a734575d52de6ea00cf8883c673e6fa0d72f3c478f9f5f07689c4f4354efc9496e701b1a6fe8f69173b002eee7fc12a572cdc98a4294e7ceafee21c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.bin
Filesize23KB
MD5e184783adc7b9a9f74a26e7aa7b03db0
SHA1ce4aff0cd11942634165236f7cc4fa9963b452eb
SHA256256e8cbd1a1d80545ad47718d3005329186cc22c5af53a437dbc731a0b5126c9
SHA51262160957a17a33c70ad36e759df2a2d5d9b5e2bd24c73dd7a68fda1244b4628c615e126ab429e8ea1f33485f823b52c7a2210ebdd37802db7575ab6c0f68ea4c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.bin
Filesize15KB
MD5aad625a5514b9bc7876af2e0d96749d4
SHA1db54bd1d28ee4b8f36dd5cb8ae7621df18f9f9ad
SHA2568789c257bb92fa7920b79ce4fe98339e178736a90d8715ba413d7f21f198e61c
SHA5126388d14db57f0f3598f730b3c9494e8b33239c4a4a1398d36294b00fd56409939c0c3e8500bfeafcfd24e57b892a51ecf3887507d88106bc6d00142ffaf33923
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.bin
Filesize5KB
MD53188f20c61d0d99197334325f33e8d06
SHA199144c6bb4679c75dba4808f4fb00d6543bb790e
SHA256ca3918caf50d6191acfab88f7a18d66b0369b7a10829658baaa80b89f676634f
SHA512cbedd0273dedc7fd826ab2a411559f43cace880db090fc1ccbd6bb8173c828a25f84b277d4d4c0e8267c91633743cfeff6ff995b586f077e8c5eddee697571c9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5466d6784620c06ca9e0edfc52509ba55
SHA1654d7c6a1d0c43fec2d6a478b63c87fee2d1c3d5
SHA256f316ce0518329092d7a754818c181314d3a9035559fc35dbdd884f6aea29023a
SHA5125819462210f2f4cb87c62b4e168a1689a6435d43569c318fff48b6ca398022fd347915b3cad4ede91ed1809d65f1890de123a901c2214156660710fac1814a0a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD51f1c3b5e68d52c7b08f4b76960d52c55
SHA1eec416ddfad6220576d08af2bbf7c4ecd18b5101
SHA256437f98488e563713a6fa432c5d038df81368b52e5f8ff0ce69f005cb9070a0ce
SHA512428560698573cd98b09e3ae66013d616eb699629ab950286e7ecff75bc377fbe68c3395355099e8003af6dbbeddd8b8e23485b6557bb0f81bc2c42f26c1cf07c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5e43a571f950f1ad1a5262554a8f5c7ef
SHA1fbb50b5bbe55bfc2b629e2229a7171ab61140a36
SHA2562e87931283194430b89fb89f7b968dd208e6c202ef027e2657da154aac278c41
SHA512f99eeae52a0f932c5ffa2e18aff08676e7285b04a33a97551f699a000f1d50adaf4305f42bc6c7f73b245a2d06d226eaa6d42fdf4bfe6add6c2dbdb492b64892
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp
Filesize3KB
MD583574b3f33b0839fe701d021b62ea5c9
SHA15bcaf7c2b3c87b0f682f1d90be89eccdc79a2cef
SHA2565e58cdae51b9d75a7630138032a447731ffcf69fadecaa621d609c439ffe9f21
SHA512f6a30a5f006aa877be7d46ab42ab056b2cabfdbb401a47f1e4dfdf7f21acab8f3a396e37b395d64fd11ffcba0bdf6575829febd367cd68ba0c46d90ccb7b0be6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5904b83bd5d20178fce2c6296ea3e6383
SHA1d3ef5b44b0cc7664dca8a7eda8605ed2e314ec01
SHA25653c253949cbd2a29cb2fd2fdb6cef63eeb6e707ac256afc1083f6d07c057112c
SHA512c153b7e04f35b84b0b64d502e2c875569874eedd94976c1bc522f78073277c0e1e2185d0bfa547161ed5c77f25418d60371054de1fef0a5df76eb258291886f0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5c5ec70daa414c46e1ffff443c2b29bd3
SHA19e6c968402e35d49119a6591431fcce641788e6f
SHA2561408916c4b7a0d2d0a123e639e593b9173c6a592b96f9f7dc6f2b22a4c0b9d34
SHA5124260b1d7e8f3252308ea820f76202d3f6efb1f46946583c45e475b898b6dd7c699cef5ae19282ef855ec60119e1cb80f8d88682d93cda78f74b11969acc35edd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\pending_pings\08b6ce53-8c26-4e3f-b7b2-63a8f0f7822a
Filesize982B
MD5f4075dc38070c803bf92b3c01101a008
SHA18a32e8c21bd20405ddfc32ab88845b601abb2c00
SHA2560e16705e1a39892b74e8cd053850f3f5151396c7bca44ecae2fb3d01e998a3f5
SHA512f3c64ddde2514e6aa19067db57efa4caea9bf6e22be79f95d7192e22d6abcfa2601405073e15b96fdc725aeae96929ab192b630c5a5c66e36b929694f42b351d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\pending_pings\412cddfc-33c6-4094-a6e1-66284acda407
Filesize24KB
MD52a5fd45d459da6becc2c4a4f4923db79
SHA124741fe80ce95bce625378df6bd486622cf05474
SHA256f2e422a4fe5558a4c50cf54b32dd98d225e958caa8c5a5471c6650d8d4585d69
SHA5126dceccd0c5662903f63c3d47f404a629bae707fd137554dda4c15bc90cbe231a45c4b5690cde0adf5458f073f74fe4d341ee1af6a9eed613f0da71864174f9f6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\pending_pings\a941fa69-4e8b-4995-9b85-74c6113e95fa
Filesize671B
MD57226b829286e958f8b901c15646cdbfa
SHA192d0bd1aa798d18bf012f464ab9c61ae159c4ac6
SHA2567a73c84b33f842ff555d6a17e5082c485d6bb97fa42b9f0d6bf069d8507a7882
SHA5127c2a8967c0dc55fedcccabca7c751053cfd0a379186b506fefba36197ce664eddb315241d79da097303ff550250aabc027f041d11cc12f3619217c3fb9eb8064
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD5eedea62fe7ce82d8663e18a2c33425fd
SHA132b9c8f573f5c54c6d046801ea6bf148f4cef7aa
SHA25648d07bbf9db3bdc492529f8746c4218a747e9868dcd792e1f9affe0f7d57f272
SHA5127e1a869fa79e3fd0625c44c714f347cd12f72a80396bc3e826aaed8d8f62108da5f9c28935a26f627d644b7c23e08be213ffbeae376699b97205e67c5433c939
-
Filesize
10KB
MD5bf012227ad1b28ca54364f0e1f410355
SHA1756d2facf52ca810dbe26dafc6bc5e5f757f568f
SHA25634cf58f6a4a1bba55b02bb8894b88d8264a4707c71a0c20b2ade9b866a4f0cad
SHA5123ac1222cee335889b63871718972c3cbee12c70cb689a4bd62dc2938e956f7c710f5d223fd8f8d6b41152ad5280c3935e656120feaa46cf606020be1e8b1239b
-
Filesize
11KB
MD517a5787fff5f92b466b63ae8b1fce7ed
SHA1740bf9fba456873f0a3fc2094ddb83fc0176ff99
SHA256d58bc3f0c9dfe3905fc9159fec74624fe13a7a4d80931327794d26a84344f886
SHA5122104ad28801838a417c9e5dd7828da958d8369399f2b9afda4528f436816f08bbccb93309b5f7a49399c36cef843fbd613230d9288a80098f635b916098b9685
-
Filesize
15KB
MD58163b6802152f4be7ddabfba7329df2b
SHA125929e9f5a21edd4dbf6af874bc1645e08844363
SHA25693282e7d5337ab321efd17441b52ef2c93cc24ff0820f956c8ea6d8aaa6ca9d4
SHA512b6c82c6009bd0c76a16db629fb1915a7c14033b06924cabd4fd464751a039963cfb67f439a399692cd241d9f72e3890fcb56df1cba5809f4bf7a346ea4d8ffab
-
Filesize
10KB
MD58fd64837794cf020a8dd262b89f4bbff
SHA19448eeac0c177c73221c82b15e26d58bfedfe19a
SHA2565778ba01f0d17da118af5fe2878b0a95f3d88f13894e37b7b0bd2c7fef4b780a
SHA5125139c2fbe1f3424ab4363fd4ffeb576ed5c9e42f49249984c048905555da0df24a289004a3ae8a7b9d6e5add0d79e794575e22175f4b81807aa7a48c388dba1e