Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-12-2024 19:43
Static task
static1
Behavioral task
behavioral1
Sample
3ae0d8cac0490f1183299570fdabe930d77493bf971ebd7c62a7f8ef5df0bb25N.exe
Resource
win7-20240903-en
General
-
Target
3ae0d8cac0490f1183299570fdabe930d77493bf971ebd7c62a7f8ef5df0bb25N.exe
-
Size
3.2MB
-
MD5
b95bc24ab92034a945f75a5f75553600
-
SHA1
7e4d98386717fcbdcc6e83f8120ecdc328d277fd
-
SHA256
3ae0d8cac0490f1183299570fdabe930d77493bf971ebd7c62a7f8ef5df0bb25
-
SHA512
255d54f4605d4c5efbcbf51f7de52cb14f67784d821761f34e54da2731aab05c038b1514bc5a6702988cfc6e1f3e0af6b7ed15b59bc47f6ea72f8e5da2e197e7
-
SSDEEP
49152:lsCbLpXZMwV1DnyS161hGucIOnj2aWIY/r1c:lsCbtXZzNnyS161hG2OnqaWI6m
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
https://atten-supporse.biz/api
https://infect-crackle.cyou/api
Extracted
amadey
5.04
397a17
http://89.110.69.103
http://94.156.177.33
-
install_dir
0efeaab28d
-
install_file
Gxtuum.exe
-
strings_key
6dea7a0890c1d404d1b67c90aea6ece4
-
url_paths
/Lv2D7fGdopb/index.php
/b9kdj3s3C0/index.php
Extracted
lumma
https://atten-supporse.biz/api
https://se-blurry.biz/api
https://zinc-sneark.biz/api
https://infect-crackle.cyou/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 881d6814bf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 881d6814bf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 881d6814bf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 881d6814bf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 881d6814bf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 881d6814bf.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3ae0d8cac0490f1183299570fdabe930d77493bf971ebd7c62a7f8ef5df0bb25N.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7qg0CPF.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2f807c17c6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f0bbc17bab.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 881d6814bf.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 881d6814bf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3ae0d8cac0490f1183299570fdabe930d77493bf971ebd7c62a7f8ef5df0bb25N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2f807c17c6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f0bbc17bab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f0bbc17bab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3ae0d8cac0490f1183299570fdabe930d77493bf971ebd7c62a7f8ef5df0bb25N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7qg0CPF.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2f807c17c6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 881d6814bf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7qg0CPF.exe -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation word.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation word.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 3ae0d8cac0490f1183299570fdabe930d77493bf971ebd7c62a7f8ef5df0bb25N.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 7qg0CPF.exe -
Executes dropped EXE 14 IoCs
pid Process 544 skotes.exe 3700 qtmPs7h.exe 4452 7qg0CPF.exe 1100 2f807c17c6.exe 2112 word.exe 976 f0bbc17bab.exe 4028 1264a5a903.exe 2952 skotes.exe 4576 881d6814bf.exe 1564 word.exe 4992 word.exe 3996 vector.exe 5472 skotes.exe 2084 vector.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 7qg0CPF.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 2f807c17c6.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine f0bbc17bab.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 881d6814bf.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 3ae0d8cac0490f1183299570fdabe930d77493bf971ebd7c62a7f8ef5df0bb25N.exe -
Loads dropped DLL 1 IoCs
pid Process 4452 7qg0CPF.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 881d6814bf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 881d6814bf.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\1264a5a903.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013020001\\1264a5a903.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\881d6814bf.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013021001\\881d6814bf.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\word = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\word.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2f807c17c6.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013018001\\2f807c17c6.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\f0bbc17bab.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013019001\\f0bbc17bab.exe" skotes.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 32 raw.githubusercontent.com 31 raw.githubusercontent.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 40 ip-api.com -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000d000000023b58-180.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 64 3ae0d8cac0490f1183299570fdabe930d77493bf971ebd7c62a7f8ef5df0bb25N.exe 544 skotes.exe 4452 7qg0CPF.exe 1100 2f807c17c6.exe 976 f0bbc17bab.exe 2952 skotes.exe 4576 881d6814bf.exe 5472 skotes.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2112 set thread context of 984 2112 word.exe 115 PID 3996 set thread context of 2084 3996 vector.exe 155 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 3ae0d8cac0490f1183299570fdabe930d77493bf971ebd7c62a7f8ef5df0bb25N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 3092 1100 WerFault.exe 111 3544 1100 WerFault.exe 111 -
System Location Discovery: System Language Discovery 1 TTPs 28 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language word.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f0bbc17bab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vector.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3ae0d8cac0490f1183299570fdabe930d77493bf971ebd7c62a7f8ef5df0bb25N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7qg0CPF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language word.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vector.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language word.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 1264a5a903.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1264a5a903.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 881d6814bf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qtmPs7h.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 1264a5a903.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2f807c17c6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 5 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2404 cmd.exe 1372 PING.EXE 3532 cmd.exe 3316 PING.EXE 3276 PING.EXE -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 7qg0CPF.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 7qg0CPF.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 3960 taskkill.exe 1680 taskkill.exe 1440 taskkill.exe 1032 taskkill.exe 3456 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings firefox.exe -
Runs ping.exe 1 TTPs 3 IoCs
pid Process 3316 PING.EXE 3276 PING.EXE 1372 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 64 3ae0d8cac0490f1183299570fdabe930d77493bf971ebd7c62a7f8ef5df0bb25N.exe 64 3ae0d8cac0490f1183299570fdabe930d77493bf971ebd7c62a7f8ef5df0bb25N.exe 544 skotes.exe 544 skotes.exe 3700 qtmPs7h.exe 3700 qtmPs7h.exe 3700 qtmPs7h.exe 3700 qtmPs7h.exe 3700 qtmPs7h.exe 3700 qtmPs7h.exe 3700 qtmPs7h.exe 3700 qtmPs7h.exe 3700 qtmPs7h.exe 3700 qtmPs7h.exe 3700 qtmPs7h.exe 3700 qtmPs7h.exe 3700 qtmPs7h.exe 3700 qtmPs7h.exe 3700 qtmPs7h.exe 3700 qtmPs7h.exe 3700 qtmPs7h.exe 3700 qtmPs7h.exe 3700 qtmPs7h.exe 3700 qtmPs7h.exe 3700 qtmPs7h.exe 3700 qtmPs7h.exe 3700 qtmPs7h.exe 3700 qtmPs7h.exe 3700 qtmPs7h.exe 3700 qtmPs7h.exe 4452 7qg0CPF.exe 4452 7qg0CPF.exe 4452 7qg0CPF.exe 4452 7qg0CPF.exe 4452 7qg0CPF.exe 4452 7qg0CPF.exe 4452 7qg0CPF.exe 4452 7qg0CPF.exe 4452 7qg0CPF.exe 4452 7qg0CPF.exe 4452 7qg0CPF.exe 4452 7qg0CPF.exe 4452 7qg0CPF.exe 4452 7qg0CPF.exe 4452 7qg0CPF.exe 4452 7qg0CPF.exe 4452 7qg0CPF.exe 4452 7qg0CPF.exe 4452 7qg0CPF.exe 4452 7qg0CPF.exe 4452 7qg0CPF.exe 4452 7qg0CPF.exe 4452 7qg0CPF.exe 4452 7qg0CPF.exe 4452 7qg0CPF.exe 4452 7qg0CPF.exe 4452 7qg0CPF.exe 4452 7qg0CPF.exe 4452 7qg0CPF.exe 4452 7qg0CPF.exe 1100 2f807c17c6.exe 1100 2f807c17c6.exe 2112 word.exe 2112 word.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeDebugPrivilege 3700 qtmPs7h.exe Token: SeDebugPrivilege 4452 7qg0CPF.exe Token: SeDebugPrivilege 2112 word.exe Token: SeDebugPrivilege 3960 taskkill.exe Token: SeDebugPrivilege 1680 taskkill.exe Token: SeDebugPrivilege 1440 taskkill.exe Token: SeDebugPrivilege 1032 taskkill.exe Token: SeDebugPrivilege 3456 taskkill.exe Token: SeDebugPrivilege 840 firefox.exe Token: SeDebugPrivilege 840 firefox.exe Token: SeDebugPrivilege 4576 881d6814bf.exe Token: SeDebugPrivilege 1564 word.exe Token: SeDebugPrivilege 4992 word.exe Token: SeDebugPrivilege 3996 vector.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 64 3ae0d8cac0490f1183299570fdabe930d77493bf971ebd7c62a7f8ef5df0bb25N.exe 4028 1264a5a903.exe 4028 1264a5a903.exe 4028 1264a5a903.exe 4028 1264a5a903.exe 4028 1264a5a903.exe 4028 1264a5a903.exe 4028 1264a5a903.exe 4028 1264a5a903.exe 840 firefox.exe 840 firefox.exe 840 firefox.exe 840 firefox.exe 840 firefox.exe 840 firefox.exe 840 firefox.exe 840 firefox.exe 840 firefox.exe 840 firefox.exe 840 firefox.exe 840 firefox.exe 840 firefox.exe 840 firefox.exe 840 firefox.exe 840 firefox.exe 840 firefox.exe 840 firefox.exe 840 firefox.exe 840 firefox.exe 840 firefox.exe 4028 1264a5a903.exe 4028 1264a5a903.exe 4028 1264a5a903.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 4028 1264a5a903.exe 4028 1264a5a903.exe 4028 1264a5a903.exe 4028 1264a5a903.exe 4028 1264a5a903.exe 4028 1264a5a903.exe 4028 1264a5a903.exe 4028 1264a5a903.exe 840 firefox.exe 840 firefox.exe 840 firefox.exe 840 firefox.exe 840 firefox.exe 840 firefox.exe 840 firefox.exe 840 firefox.exe 840 firefox.exe 840 firefox.exe 840 firefox.exe 840 firefox.exe 840 firefox.exe 840 firefox.exe 840 firefox.exe 840 firefox.exe 840 firefox.exe 840 firefox.exe 840 firefox.exe 840 firefox.exe 4028 1264a5a903.exe 4028 1264a5a903.exe 4028 1264a5a903.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 840 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 64 wrote to memory of 544 64 3ae0d8cac0490f1183299570fdabe930d77493bf971ebd7c62a7f8ef5df0bb25N.exe 83 PID 64 wrote to memory of 544 64 3ae0d8cac0490f1183299570fdabe930d77493bf971ebd7c62a7f8ef5df0bb25N.exe 83 PID 64 wrote to memory of 544 64 3ae0d8cac0490f1183299570fdabe930d77493bf971ebd7c62a7f8ef5df0bb25N.exe 83 PID 544 wrote to memory of 3700 544 skotes.exe 92 PID 544 wrote to memory of 3700 544 skotes.exe 92 PID 544 wrote to memory of 3700 544 skotes.exe 92 PID 3700 wrote to memory of 2404 3700 qtmPs7h.exe 95 PID 3700 wrote to memory of 2404 3700 qtmPs7h.exe 95 PID 3700 wrote to memory of 2404 3700 qtmPs7h.exe 95 PID 2404 wrote to memory of 1372 2404 cmd.exe 97 PID 2404 wrote to memory of 1372 2404 cmd.exe 97 PID 2404 wrote to memory of 1372 2404 cmd.exe 97 PID 3700 wrote to memory of 3532 3700 qtmPs7h.exe 98 PID 3700 wrote to memory of 3532 3700 qtmPs7h.exe 98 PID 3700 wrote to memory of 3532 3700 qtmPs7h.exe 98 PID 3532 wrote to memory of 3316 3532 cmd.exe 100 PID 3532 wrote to memory of 3316 3532 cmd.exe 100 PID 3532 wrote to memory of 3316 3532 cmd.exe 100 PID 2404 wrote to memory of 868 2404 cmd.exe 105 PID 2404 wrote to memory of 868 2404 cmd.exe 105 PID 2404 wrote to memory of 868 2404 cmd.exe 105 PID 3532 wrote to memory of 3276 3532 cmd.exe 106 PID 3532 wrote to memory of 3276 3532 cmd.exe 106 PID 3532 wrote to memory of 3276 3532 cmd.exe 106 PID 544 wrote to memory of 4452 544 skotes.exe 108 PID 544 wrote to memory of 4452 544 skotes.exe 108 PID 544 wrote to memory of 4452 544 skotes.exe 108 PID 544 wrote to memory of 1100 544 skotes.exe 111 PID 544 wrote to memory of 1100 544 skotes.exe 111 PID 544 wrote to memory of 1100 544 skotes.exe 111 PID 3532 wrote to memory of 2112 3532 cmd.exe 113 PID 3532 wrote to memory of 2112 3532 cmd.exe 113 PID 3532 wrote to memory of 2112 3532 cmd.exe 113 PID 2112 wrote to memory of 984 2112 word.exe 115 PID 2112 wrote to memory of 984 2112 word.exe 115 PID 2112 wrote to memory of 984 2112 word.exe 115 PID 2112 wrote to memory of 984 2112 word.exe 115 PID 2112 wrote to memory of 984 2112 word.exe 115 PID 2112 wrote to memory of 984 2112 word.exe 115 PID 2112 wrote to memory of 984 2112 word.exe 115 PID 2112 wrote to memory of 984 2112 word.exe 115 PID 2112 wrote to memory of 984 2112 word.exe 115 PID 2112 wrote to memory of 984 2112 word.exe 115 PID 544 wrote to memory of 976 544 skotes.exe 116 PID 544 wrote to memory of 976 544 skotes.exe 116 PID 544 wrote to memory of 976 544 skotes.exe 116 PID 4452 wrote to memory of 2960 4452 7qg0CPF.exe 117 PID 4452 wrote to memory of 2960 4452 7qg0CPF.exe 117 PID 4452 wrote to memory of 2960 4452 7qg0CPF.exe 117 PID 544 wrote to memory of 4028 544 skotes.exe 119 PID 544 wrote to memory of 4028 544 skotes.exe 119 PID 544 wrote to memory of 4028 544 skotes.exe 119 PID 4028 wrote to memory of 3960 4028 1264a5a903.exe 121 PID 4028 wrote to memory of 3960 4028 1264a5a903.exe 121 PID 4028 wrote to memory of 3960 4028 1264a5a903.exe 121 PID 4028 wrote to memory of 1680 4028 1264a5a903.exe 123 PID 4028 wrote to memory of 1680 4028 1264a5a903.exe 123 PID 4028 wrote to memory of 1680 4028 1264a5a903.exe 123 PID 4028 wrote to memory of 1440 4028 1264a5a903.exe 125 PID 4028 wrote to memory of 1440 4028 1264a5a903.exe 125 PID 4028 wrote to memory of 1440 4028 1264a5a903.exe 125 PID 4028 wrote to memory of 1032 4028 1264a5a903.exe 127 PID 4028 wrote to memory of 1032 4028 1264a5a903.exe 127 PID 4028 wrote to memory of 1032 4028 1264a5a903.exe 127 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ae0d8cac0490f1183299570fdabe930d77493bf971ebd7c62a7f8ef5df0bb25N.exe"C:\Users\Admin\AppData\Local\Temp\3ae0d8cac0490f1183299570fdabe930d77493bf971ebd7c62a7f8ef5df0bb25N.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:64 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Users\Admin\AppData\Local\Temp\1012982001\qtmPs7h.exe"C:\Users\Admin\AppData\Local\Temp\1012982001\qtmPs7h.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 9 > nul && REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "word" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\word.exe"4⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 95⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1372
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "word" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\word.exe"5⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:868
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 13 > nul && copy "C:\Users\Admin\AppData\Local\Temp\1012982001\qtmPs7h.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\word.exe" && ping 127.0.0.1 -n 13 > nul && "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\word.exe"4⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 135⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3316
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 135⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3276
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\word.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\word.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"6⤵
- System Location Discovery: System Language Discovery
PID:984 -
C:\Users\Admin\AppData\Local\Temp\10000760101\vector.exe"C:\Users\Admin\AppData\Local\Temp\10000760101\vector.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3996 -
C:\Users\Admin\AppData\Local\Temp\10000760101\vector.exe"C:\Users\Admin\AppData\Local\Temp\10000760101\vector.exe"8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2084
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\word.exe"C:\Users\Admin\AppData\Local\Temp\word.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1564 -
C:\Users\Admin\AppData\Local\Temp\word.exe"C:\Users\Admin\AppData\Local\Temp\word.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4992
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1012992001\7qg0CPF.exe"C:\Users\Admin\AppData\Local\Temp\1012992001\7qg0CPF.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmpD33.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmpD33.tmp.bat4⤵
- System Location Discovery: System Language Discovery
PID:2960
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013018001\2f807c17c6.exe"C:\Users\Admin\AppData\Local\Temp\1013018001\2f807c17c6.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1100 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1100 -s 15004⤵
- Program crash
PID:3092
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1100 -s 15164⤵
- Program crash
PID:3544
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013019001\f0bbc17bab.exe"C:\Users\Admin\AppData\Local\Temp\1013019001\f0bbc17bab.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:976
-
-
C:\Users\Admin\AppData\Local\Temp\1013020001\1264a5a903.exe"C:\Users\Admin\AppData\Local\Temp\1013020001\1264a5a903.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3960
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1680
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1440
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1032
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3456
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:3028
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:840 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1992 -parentBuildID 20240401114208 -prefsHandle 1908 -prefMapHandle 1900 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {06b387d7-35b5-4039-9643-5831df2638db} 840 "\\.\pipe\gecko-crash-server-pipe.840" gpu6⤵PID:2960
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2468 -parentBuildID 20240401114208 -prefsHandle 2444 -prefMapHandle 2432 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {56037967-7635-43e1-99c4-315f50f4764e} 840 "\\.\pipe\gecko-crash-server-pipe.840" socket6⤵PID:5108
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3372 -childID 1 -isForBrowser -prefsHandle 3384 -prefMapHandle 3380 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1264 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6d6f5fbb-b0c9-474e-9268-b690be16fb9a} 840 "\\.\pipe\gecko-crash-server-pipe.840" tab6⤵PID:1688
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3732 -childID 2 -isForBrowser -prefsHandle 3716 -prefMapHandle 3692 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1264 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a7bc4210-4dd7-450f-9837-22a6b2d52b24} 840 "\\.\pipe\gecko-crash-server-pipe.840" tab6⤵PID:3432
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3716 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 3920 -prefMapHandle 3940 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6108aaf2-8e56-47c5-b8a4-40a69809cb5d} 840 "\\.\pipe\gecko-crash-server-pipe.840" utility6⤵
- Checks processor information in registry
PID:5820
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5656 -childID 3 -isForBrowser -prefsHandle 4860 -prefMapHandle 5632 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 1264 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9e538064-62c3-4b61-9beb-bac11d6f2d72} 840 "\\.\pipe\gecko-crash-server-pipe.840" tab6⤵PID:412
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5772 -childID 4 -isForBrowser -prefsHandle 5780 -prefMapHandle 5784 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 1264 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {db204b4f-23fe-483f-9564-b3ae2b4de9dc} 840 "\\.\pipe\gecko-crash-server-pipe.840" tab6⤵PID:3476
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5964 -childID 5 -isForBrowser -prefsHandle 5972 -prefMapHandle 5976 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 1264 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {10733ccd-6c7c-49b1-a6e2-1f8222bd500c} 840 "\\.\pipe\gecko-crash-server-pipe.840" tab6⤵PID:2228
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013021001\881d6814bf.exe"C:\Users\Admin\AppData\Local\Temp\1013021001\881d6814bf.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4576
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2952
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1100 -ip 11001⤵PID:1616
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1100 -ip 11001⤵PID:3548
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5472
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Query Registry
6Remote System Discovery
1System Information Discovery
4System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57dca233df92b3884663fa5a40db8d49c
SHA1208b8f27b708c4e06ac37f974471cc7b29c29b60
SHA25690c83311e35da0b5f8aa65aa2109745feb68ee9540e863f4ed909872e9c6a84c
SHA512d134b96fd33c79c85407608f76afc5a9f937bff453b1c90727a3ed992006c7d4c8329be6a2b5ba6b11da1a32f7cd60e9bc380be388b586d6cd5c2e6b1f57bd07
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\activity-stream.discovery_stream.json
Filesize19KB
MD5d73e01f748d3ffec7d76ce5723adf90f
SHA1094e2760a5dad63970a0a18ae0ce5fb46fee88bc
SHA256ccae7d8107ab2a457424c10678f374cfc5e45fa345377e568a357ebb9601653b
SHA512a89fdfa3a63d37f656a55553a0b8ecde8e4d8974f7bf2cdf8f066cd8f3c31dbae310632f4cc750381df9c608ea54325d98c0fb83a133c88501953320d78c595d
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD5446f362a36e159996513b1426f64335d
SHA13c7f55474f94979f5644de1657ab808df3a82b7d
SHA2565b1385964c30b1689c6e0f7c7ce56ebf7f15362e6e466025d51f1cbbe5a9ee07
SHA51221d33df4176ceb19fd1c580a439e59cea3e9854c0fda6c4101199a3c56bbadf8823cc12a39f69c401f6ee93d016f59f74b6b5fc9d4a1ff2d6c7ca73bbc786e8b
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
5.0MB
MD5b183e5ff29a1532a84e5a38983ab9e4e
SHA1230c9cbd2e14598aaf73ae78c85c998a6b923a51
SHA25681a45f430c102365b46c663203ae5708b6befe2848f01efc7b702aff7170c901
SHA51231be2761821fb6bc81a010a3f68fa6901aa5e9768e9c57db53b52e0495c7340abccc9191500aa39540fef159578403e78d2af31ac364b89774d5f359b54c6c1e
-
Filesize
2.5MB
MD5d1e3f88d0caf949d5f1b4bf4efbb95a4
SHA161ffd2589a1965bf9cb874833c4c9b106b3e43e8
SHA256c505f3b2f40b8a68e7cacfe2a9925498ab0f7ef29aa7023bb472597021066b2e
SHA5125d4c43e858371f24ebafb56388a586c081d7b0289a3b039dbb2b011e9864e8e9f5dc7037fcb3e88f4bec4259a09ce5f3ccdae3161b43dff140e0e4ca7bff96c3
-
Filesize
799KB
MD589bd66e4285cb7295300a941964af529
SHA1232d9fee67a3c3652a80e1c1a258f0d789c6a6cf
SHA256a46bf8412717f75bf098966cb1f5074836e78f5699bb5073dcc45d59ca790047
SHA51272d1c8c4b74bacca619a58062441203c6cfea81d064dc1933af7a3cb9758d924b011a6935e8d255aad58159a4ecbb3677cc6a6e80f6daa8b135711195a5c8498
-
Filesize
5.9MB
MD53297554944a2e2892096a8fb14c86164
SHA14b700666815448a1e0f4f389135fddb3612893ec
SHA256e0a9fcd5805e66254aa20f8ddb3bdfca376a858b19222b178cc8893f914a6495
SHA512499aa1679f019e29b4d871a472d24b89adddc68978317f85f095c7278f25f926cbf532c8520c2f468b3942a3e37e9be20aea9f83c68e8b5e0c9adbf69640ad25
-
Filesize
1.8MB
MD54ac9141ca54abebc30ba2dbbd8202328
SHA10af8d99177f5a204341e92179e3df4fc7250f55b
SHA25626617312efc260714a32d2fb9f34581833a9437197f35a0ecfd091eb48518c36
SHA51211111f1dc8e17e935f138800ec358084a4ddc31475b2ea52af58c83539c48425f8831a7449e87bf9df2551930c4891db7a2f78fa0df1cf711f9268ef6922e720
-
Filesize
1.7MB
MD55d5cbdd1801035e2485e7353df38e0c3
SHA1569f6804a09e94d2413f0239c26a7e47734178a3
SHA256678b506795611f59eec55a7003e31a378679db301b5669cdf8d2c9b0826cfede
SHA51236d5081f994c44774548fcb8fa05d3461f1cc823b62fab79b949bafc3e26f457a58f278bce3fccaa79d43b92607ce61d38d687fcffa8863e273321cf493c75ea
-
Filesize
951KB
MD576c2c0bba853abfff5189ac4c5bbfa7b
SHA15e360faf571e5623ecc24bc075dd990038689fed
SHA256fdc3cce2d6bad9345ec450432e8456b645d73a5a9d1852da73444c5976f4488f
SHA512739c03ebe636c78aa7d2d4da6fe2066886dcdff63bcd644150c75e52a724ae7559dc3f1e0b5425e74f9abd3873295e6b1f3ae0b7b1777222bb0b702a0cfca6ff
-
Filesize
2.7MB
MD5fbb08fc5dee68a2eeaeb7c1d17493afd
SHA1d87a00662b3348fd21ace933f094e89ba64ad377
SHA25674d427ab9ed2d9e35230134138b929b7528054e7a1330ca4f50997746b0cd55c
SHA51239fa6630e5f50dee9ef6216c954fdf64507fe940ee3211e2a6eb0ba659036d655b14aae8f61d88049d83fe7c3eda9c629844d8a005ad96b08efbacdd7fed2176
-
Filesize
1.4MB
MD56f2fdecc48e7d72ca1eb7f17a97e59ad
SHA1fcbc8c4403e5c8194ee69158d7e70ee7dbd4c056
SHA25670e48ef5c14766f3601c97451b47859fddcbe7f237e1c5200cea8e7a7609d809
SHA512fea98a3d6fff1497551dc6583dd92798dcac764070a350fd381e856105a6411c94effd4b189b7a32608ff610422b8dbd6d93393c5da99ee66d4569d45191dc8b
-
Filesize
3.2MB
MD5b95bc24ab92034a945f75a5f75553600
SHA17e4d98386717fcbdcc6e83f8120ecdc328d277fd
SHA2563ae0d8cac0490f1183299570fdabe930d77493bf971ebd7c62a7f8ef5df0bb25
SHA512255d54f4605d4c5efbcbf51f7de52cb14f67784d821761f34e54da2731aab05c038b1514bc5a6702988cfc6e1f3e0af6b7ed15b59bc47f6ea72f8e5da2e197e7
-
Filesize
186B
MD5790dd6f9aab53b59e358a126dc5d59fc
SHA1ec6bf3eb0fa5d2e37c694bf71254e0ce0be1a5fc
SHA2567ca8c160037742b7da30366775d7aae7882a98e1fbfdbbefb743c2a93d6b1c52
SHA512a9d819b8d771febfa027de6f201d4effaf7bdd3334255707dddceb57b2b322649698903ee5d72f0e431780d29b01abedd5250d372100e6c66c0639965f86c7ef
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
Filesize
76KB
MD50e362e7005823d0bec3719b902ed6d62
SHA1590d860b909804349e0cdc2f1662b37bd62f7463
SHA2562d0dc6216f613ac7551a7e70a798c22aee8eb9819428b1357e2b8c73bef905ad
SHA512518991b68496b3f8545e418cf9b345e0791e09cc20d177b8aa47e0aba447aa55383c64f5bdaca39f2b061a5d08c16f2ad484af8a9f238ca23ab081618fba3ad3
-
Filesize
91B
MD53a4d0315257a76b9f68c51e82774a3f2
SHA17caa2392d6b9339ff7cf0fb61f23a2c254d585b7
SHA256967a4e6c3b9259e2999adfc4229c8409bbb4ac02f8c413c252f43d581a5a4d30
SHA51255b242f8c15fc381ca3e86773e9bd2ac83cf6292ebda460d04c8a2eff5c68c93bf5e2312060a5d66756958a069cde20d3959842e0359273c10e4ffbd66100291
-
Filesize
91B
MD5a1d86e39eed1eb4f51f55c6741f557d2
SHA10fad45da5d8b8d36dcf9ada2ab7e11c5ada95eeb
SHA256790c39788b4f3e2396675e3b8877061473f26b652ef0ec69d5d2bfd0cffe31ea
SHA5125f203c2f06df54947e231db17392f9b4f48333de56cdf86e9bd28be873586ba96ed0fac96a39f18aa060e22348bd96285d17cbaef8583a179fe158239eeddcbc
-
Filesize
116KB
MD5f70aa3fa04f0536280f872ad17973c3d
SHA150a7b889329a92de1b272d0ecf5fce87395d3123
SHA2568d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8
SHA51230675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\AlternateServices.bin
Filesize6KB
MD566f3b3a4355a1d8d6b1c9b756e159cf9
SHA1ed95b96b6866a71f07ef4569bbd25d0913cc6d8f
SHA256cb61a713cfad8e17dbfff906aa7ac7bc32f160c70b0abfb3d57d742eabdde632
SHA512b4e15607902a32ad95e01bc5b729349cee376bd764d0150e185d605e301c4f8a216c492e8c519e1b56a1a464dee90de35856d8d28928d7876fbae0eb2281d87f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\AlternateServices.bin
Filesize10KB
MD5877cbfd56d5586b35ae92ceade4a44a5
SHA127ba70bcf773435ebef3e8e980d9ba2b137c043c
SHA256857f163c4d51bb4bd8eb23a05000de656d26df9409bf3f73162ba7ed6a184705
SHA51228a953496be2c5068940b0d941645c0e10187e083a0412a9134804b883472d5463b48766dc41a2e75732806b95f774e26f655b8e1be0db91acc76319c8754f5b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize16KB
MD582586b8f347472185f2790b31f3a9950
SHA1d508694bc95bedc6ac17461196cc626d03a5e36e
SHA25625c567faa0f30e14cf3bc1d71ae126f632cde04113b3a5e3306a01ff050d3276
SHA512c558eb1ba1c4c071960951265177dfdbc0b7cebb37f500fc223f627a01b4e4985f136c6aa6ef53f7ddf3f57180bac9824b30f62f8c575ee02ba42c9d709040da
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize16KB
MD5e7e286d5d609b16bea7e50c6283c0cd6
SHA17f4b701fc48f2a996e87dc35dc4ec133c43f1505
SHA256713db5e65edbef4b2fcd8c3c6790f81d9afebadbfc2da7a0c38ec794fa7b220b
SHA512a8f1250b2e9dc578b9cf80eeb61ff0e8bac474fbd70076e371ed95894ab6a9373e61d3c5688e843a1b51f996209c2522f00d8e1c55cc42bdb764cb0b378737d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5c66484eef378922c5add795b5264cf76
SHA149a252e99c014474695e8d02658107e8e49c5871
SHA256748e1caea5589dd8bd8b5a4ad6276d4a71ae3d64edf444c47f445c3fe4ea6ea8
SHA512d5c0a5c588bf7d13d8a835be444949e3caef8373195a544ec4cf6bb5b36222d54bda6e91ae79f6693b703d6b806a3075be753baceaa67473b8d371fb79589e18
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\05ed4a6a-ec96-43b8-9557-3c24dac5c206
Filesize26KB
MD5a4409723240bb1c8e474a4a1e20c97b7
SHA16c4faaa0e3cbbaed0b6cf1e21d1787e2531839cb
SHA256f63d7175441e66033b1628ab5dadc944cd09ea69659f7adb36c77172497dc310
SHA51281816ca0f004665de791fa9895ad421bfabcb591c685e6f7973fff0c9d13c51976889723a41bb2f6375c1ccf2eee7706132e2371453dbf1450b194a232f86e71
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\1f07b830-a29c-401d-b63a-ce648eeb19ba
Filesize982B
MD50aee66356c34dcb77cd8e0930b162c8e
SHA11a7ad5dca7a6e5024f93a48fc7815fd1fd2af2b8
SHA25651f089e105991ea47dc3cd47154fc492ce9f6d10bc7a716494dabfa393eadb79
SHA51283fd86f5839844a59e29c44b82c0503db89ffe4d3657e2e6c369ea150b09a0fcad3903b6ed09dca35709cf8506236f9a381f8cec288e14a57331d26f133264e5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\5e9962f3-8066-4df2-ae84-78dac2be1f68
Filesize671B
MD583d56bf60ed707b46265333ff82980b0
SHA143ec52c3fb455fc58b6db2c4dada7da62d6d10bf
SHA2568a65819d19c1b2b743b1da3281b2343699b6a92623cbaaf7bc9593b85c104850
SHA5128c0940c03c1ebab7c9d196e21d608dc787602e74c1daeb84b04253d3d54ac1f0369da41d38fd854236ddeb8c6b400dc594f084f06946750c5c4e99373ee91a32
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD59eb1d0228bd4ae45823e8221d0d346c3
SHA116083a3e045192bb9fdf0b1c23ff96d7272b7d16
SHA2568b26a2fc0e846b4fcc713b7fa51544b9e97a62604424c4cf456671a9ae515c0e
SHA5122b9a924c55870142db39111e15068be9fcdc28e23c89ae7ac9c57fbd56e0dc0be14229e9c820551e61b2a80bf90bf10b08f85cbf94053c7fef8eb03d7bd6c2c0
-
Filesize
11KB
MD582c8d35ff5f5e884abef1738bdc3ae3b
SHA1a82c4826ab4862ff78b1c3a1675e1cfa2d48a3c6
SHA256d15b7e31c42ac7d0e8ef4591bbfd0567b1124aef87ee29a5e0edf4d89dd5fbf6
SHA5129d1213b49d323f0458abff27b4406494f4f7f715eb5e535daae8ed9f95f8c60728eba975d9c4ac30cb92532804252bfbd0da0476a831f96ceb2d8017d59efb2d
-
Filesize
15KB
MD59e30f50f63ec928c8bcc311b5615e878
SHA13789cef614fceb33886126763b515698f8c55e8f
SHA2563bdd86a8c05b1f8514a55f5e570a9440385ab2cafa3cfc875ba578034744ebc0
SHA512d290bab45b79a30e58e148242737162d4881a5a387b953cc42dee585313c279c7419f185eeb63ef330af33e0b11c8e9f3433edea3fee73ccdaa2bb41552d827c
-
Filesize
15KB
MD52bf6cc2ffa59df3d682c9311e077c6c2
SHA177e549e72da0536a0665c4103dfff605ad1c7497
SHA256f792f59ad1c5feed2079bdef69d8310c64efbff8d82e181fdf228a413b1a058f
SHA5120d4bd99fe24bf166de78d3eec47b8eca8f500897d0102e9936b13ed1e0f4885f20735d487155a2daa76f5f20be2edc8627337f8bc9ab2dbc4c790a45f4410766
-
Filesize
10KB
MD54694d14a2ae74ece8d94baead61326bd
SHA1ff4d4454f2cfbcaaeaaab7fd44b8d2941c7cfe10
SHA25684e2f9290bec2e8d3fa46f12d776c2526b19e690b4431237d67285fddde624e5
SHA51239698f909a1ac72f7c18cc9390026c37a1db5caa93fc21e30f879bed2382422ad466ccacc69887f70b6f7244e1d984b18d7c9bf393cf0697425cf5afbdb2ce58