Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-12-2024 09:06
Static task
static1
General
-
Target
4caf2e63eaa614383c4dec78f3099e04f39f323d8b9dbb9cb94b061b472b4b68.exe
-
Size
6.9MB
-
MD5
f99b377260672c892fd1b2bd14b38f0e
-
SHA1
850b0f76f135aeda4d91574a57ddab127abebe02
-
SHA256
4caf2e63eaa614383c4dec78f3099e04f39f323d8b9dbb9cb94b061b472b4b68
-
SHA512
b5d671df1ff1c39dbf126f1b8827ed2ee5a0dc343e1e24d5c4e71706b58a37a14a459cc052ef7c67f49d0601a21bae86f79f21937e57943e7b303f19a0b228e7
-
SSDEEP
196608:rzpSFRjexp9aR/XWqWbNJ3OqPvVwFtlEQLGdiflbOkaFoF:rzpm1eIJmqsP0tl8iliRC
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
https://atten-supporse.biz/api
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://atten-supporse.biz/api
https://se-blurry.biz/api
https://zinc-sneark.biz/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 2972ca9790.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 2972ca9790.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4n266h.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4n266h.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4n266h.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4n266h.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 2972ca9790.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4n266h.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4n266h.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 2972ca9790.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 2972ca9790.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1B05c0.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2D8376.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3q76T.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4n266h.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 37ede3b7fe.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 45cbb89f42.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2972ca9790.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 22 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2972ca9790.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1B05c0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2D8376.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3q76T.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3q76T.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 45cbb89f42.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2972ca9790.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2D8376.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 37ede3b7fe.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 45cbb89f42.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1B05c0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4n266h.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 37ede3b7fe.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4n266h.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 1B05c0.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 15 IoCs
pid Process 364 M9h10.exe 4296 k8h69.exe 3756 1B05c0.exe 2292 skotes.exe 3112 2D8376.exe 4116 3q76T.exe 4088 4n266h.exe 4148 vdGy6gA.exe 2356 37ede3b7fe.exe 4172 45cbb89f42.exe 2312 skotes.exe 2480 375aa677f6.exe 1600 2972ca9790.exe 6196 skotes.exe 7144 skotes.exe -
Identifies Wine through registry keys 2 TTPs 11 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 2D8376.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 3q76T.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 37ede3b7fe.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 1B05c0.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 45cbb89f42.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 2972ca9790.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 4n266h.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4n266h.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4n266h.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 2972ca9790.exe -
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" M9h10.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" k8h69.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\37ede3b7fe.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013388001\\37ede3b7fe.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\45cbb89f42.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013389001\\45cbb89f42.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\375aa677f6.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013390001\\375aa677f6.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2972ca9790.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013391001\\2972ca9790.exe" skotes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4caf2e63eaa614383c4dec78f3099e04f39f323d8b9dbb9cb94b061b472b4b68.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000d000000023b74-122.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
pid Process 3756 1B05c0.exe 2292 skotes.exe 3112 2D8376.exe 4116 3q76T.exe 4088 4n266h.exe 2356 37ede3b7fe.exe 4172 45cbb89f42.exe 2312 skotes.exe 1600 2972ca9790.exe 6196 skotes.exe 7144 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1B05c0.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 6932 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 652 3112 WerFault.exe 87 2944 2356 WerFault.exe 102 5332 4148 WerFault.exe 97 -
System Location Discovery: System Language Discovery 1 TTPs 20 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2972ca9790.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2D8376.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4n266h.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vdGy6gA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 375aa677f6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language M9h10.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 45cbb89f42.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 375aa677f6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4caf2e63eaa614383c4dec78f3099e04f39f323d8b9dbb9cb94b061b472b4b68.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3q76T.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 37ede3b7fe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k8h69.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1B05c0.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 375aa677f6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 3532 taskkill.exe 2676 taskkill.exe 4876 taskkill.exe 2628 taskkill.exe 4116 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 3756 1B05c0.exe 3756 1B05c0.exe 2292 skotes.exe 2292 skotes.exe 3112 2D8376.exe 3112 2D8376.exe 4116 3q76T.exe 4116 3q76T.exe 4088 4n266h.exe 4088 4n266h.exe 4088 4n266h.exe 4088 4n266h.exe 2356 37ede3b7fe.exe 2356 37ede3b7fe.exe 4172 45cbb89f42.exe 4172 45cbb89f42.exe 2312 skotes.exe 2312 skotes.exe 2480 375aa677f6.exe 2480 375aa677f6.exe 1600 2972ca9790.exe 1600 2972ca9790.exe 2480 375aa677f6.exe 2480 375aa677f6.exe 1600 2972ca9790.exe 1600 2972ca9790.exe 1600 2972ca9790.exe 6196 skotes.exe 6196 skotes.exe 7144 skotes.exe 7144 skotes.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 4088 4n266h.exe Token: SeDebugPrivilege 2628 taskkill.exe Token: SeDebugPrivilege 4116 taskkill.exe Token: SeDebugPrivilege 3532 taskkill.exe Token: SeDebugPrivilege 2676 taskkill.exe Token: SeDebugPrivilege 4876 taskkill.exe Token: SeDebugPrivilege 3328 firefox.exe Token: SeDebugPrivilege 3328 firefox.exe Token: SeDebugPrivilege 1600 2972ca9790.exe Token: SeDebugPrivilege 3328 firefox.exe Token: SeDebugPrivilege 3328 firefox.exe Token: SeDebugPrivilege 3328 firefox.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 3756 1B05c0.exe 2480 375aa677f6.exe 2480 375aa677f6.exe 2480 375aa677f6.exe 2480 375aa677f6.exe 2480 375aa677f6.exe 2480 375aa677f6.exe 2480 375aa677f6.exe 3328 firefox.exe 3328 firefox.exe 3328 firefox.exe 3328 firefox.exe 2480 375aa677f6.exe 3328 firefox.exe 3328 firefox.exe 3328 firefox.exe 3328 firefox.exe 3328 firefox.exe 3328 firefox.exe 3328 firefox.exe 3328 firefox.exe 3328 firefox.exe 3328 firefox.exe 3328 firefox.exe 3328 firefox.exe 3328 firefox.exe 3328 firefox.exe 3328 firefox.exe 3328 firefox.exe 3328 firefox.exe 2480 375aa677f6.exe 2480 375aa677f6.exe 2480 375aa677f6.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 2480 375aa677f6.exe 2480 375aa677f6.exe 2480 375aa677f6.exe 2480 375aa677f6.exe 2480 375aa677f6.exe 2480 375aa677f6.exe 2480 375aa677f6.exe 3328 firefox.exe 3328 firefox.exe 3328 firefox.exe 3328 firefox.exe 2480 375aa677f6.exe 3328 firefox.exe 3328 firefox.exe 3328 firefox.exe 3328 firefox.exe 3328 firefox.exe 3328 firefox.exe 3328 firefox.exe 3328 firefox.exe 3328 firefox.exe 3328 firefox.exe 3328 firefox.exe 3328 firefox.exe 3328 firefox.exe 3328 firefox.exe 3328 firefox.exe 3328 firefox.exe 2480 375aa677f6.exe 2480 375aa677f6.exe 2480 375aa677f6.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3328 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2180 wrote to memory of 364 2180 4caf2e63eaa614383c4dec78f3099e04f39f323d8b9dbb9cb94b061b472b4b68.exe 83 PID 2180 wrote to memory of 364 2180 4caf2e63eaa614383c4dec78f3099e04f39f323d8b9dbb9cb94b061b472b4b68.exe 83 PID 2180 wrote to memory of 364 2180 4caf2e63eaa614383c4dec78f3099e04f39f323d8b9dbb9cb94b061b472b4b68.exe 83 PID 364 wrote to memory of 4296 364 M9h10.exe 84 PID 364 wrote to memory of 4296 364 M9h10.exe 84 PID 364 wrote to memory of 4296 364 M9h10.exe 84 PID 4296 wrote to memory of 3756 4296 k8h69.exe 85 PID 4296 wrote to memory of 3756 4296 k8h69.exe 85 PID 4296 wrote to memory of 3756 4296 k8h69.exe 85 PID 3756 wrote to memory of 2292 3756 1B05c0.exe 86 PID 3756 wrote to memory of 2292 3756 1B05c0.exe 86 PID 3756 wrote to memory of 2292 3756 1B05c0.exe 86 PID 4296 wrote to memory of 3112 4296 k8h69.exe 87 PID 4296 wrote to memory of 3112 4296 k8h69.exe 87 PID 4296 wrote to memory of 3112 4296 k8h69.exe 87 PID 364 wrote to memory of 4116 364 M9h10.exe 95 PID 364 wrote to memory of 4116 364 M9h10.exe 95 PID 364 wrote to memory of 4116 364 M9h10.exe 95 PID 2180 wrote to memory of 4088 2180 4caf2e63eaa614383c4dec78f3099e04f39f323d8b9dbb9cb94b061b472b4b68.exe 96 PID 2180 wrote to memory of 4088 2180 4caf2e63eaa614383c4dec78f3099e04f39f323d8b9dbb9cb94b061b472b4b68.exe 96 PID 2180 wrote to memory of 4088 2180 4caf2e63eaa614383c4dec78f3099e04f39f323d8b9dbb9cb94b061b472b4b68.exe 96 PID 2292 wrote to memory of 4148 2292 skotes.exe 97 PID 2292 wrote to memory of 4148 2292 skotes.exe 97 PID 2292 wrote to memory of 4148 2292 skotes.exe 97 PID 2292 wrote to memory of 2356 2292 skotes.exe 102 PID 2292 wrote to memory of 2356 2292 skotes.exe 102 PID 2292 wrote to memory of 2356 2292 skotes.exe 102 PID 2292 wrote to memory of 4172 2292 skotes.exe 106 PID 2292 wrote to memory of 4172 2292 skotes.exe 106 PID 2292 wrote to memory of 4172 2292 skotes.exe 106 PID 2292 wrote to memory of 2480 2292 skotes.exe 108 PID 2292 wrote to memory of 2480 2292 skotes.exe 108 PID 2292 wrote to memory of 2480 2292 skotes.exe 108 PID 2480 wrote to memory of 2628 2480 375aa677f6.exe 110 PID 2480 wrote to memory of 2628 2480 375aa677f6.exe 110 PID 2480 wrote to memory of 2628 2480 375aa677f6.exe 110 PID 2480 wrote to memory of 4116 2480 375aa677f6.exe 112 PID 2480 wrote to memory of 4116 2480 375aa677f6.exe 112 PID 2480 wrote to memory of 4116 2480 375aa677f6.exe 112 PID 2480 wrote to memory of 3532 2480 375aa677f6.exe 114 PID 2480 wrote to memory of 3532 2480 375aa677f6.exe 114 PID 2480 wrote to memory of 3532 2480 375aa677f6.exe 114 PID 2480 wrote to memory of 2676 2480 375aa677f6.exe 116 PID 2480 wrote to memory of 2676 2480 375aa677f6.exe 116 PID 2480 wrote to memory of 2676 2480 375aa677f6.exe 116 PID 2480 wrote to memory of 4876 2480 375aa677f6.exe 118 PID 2480 wrote to memory of 4876 2480 375aa677f6.exe 118 PID 2480 wrote to memory of 4876 2480 375aa677f6.exe 118 PID 2480 wrote to memory of 2432 2480 375aa677f6.exe 120 PID 2480 wrote to memory of 2432 2480 375aa677f6.exe 120 PID 2432 wrote to memory of 3328 2432 firefox.exe 121 PID 2432 wrote to memory of 3328 2432 firefox.exe 121 PID 2432 wrote to memory of 3328 2432 firefox.exe 121 PID 2432 wrote to memory of 3328 2432 firefox.exe 121 PID 2432 wrote to memory of 3328 2432 firefox.exe 121 PID 2432 wrote to memory of 3328 2432 firefox.exe 121 PID 2432 wrote to memory of 3328 2432 firefox.exe 121 PID 2432 wrote to memory of 3328 2432 firefox.exe 121 PID 2432 wrote to memory of 3328 2432 firefox.exe 121 PID 2432 wrote to memory of 3328 2432 firefox.exe 121 PID 2432 wrote to memory of 3328 2432 firefox.exe 121 PID 3328 wrote to memory of 5088 3328 firefox.exe 122 PID 3328 wrote to memory of 5088 3328 firefox.exe 122 PID 3328 wrote to memory of 5088 3328 firefox.exe 122 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\4caf2e63eaa614383c4dec78f3099e04f39f323d8b9dbb9cb94b061b472b4b68.exe"C:\Users\Admin\AppData\Local\Temp\4caf2e63eaa614383c4dec78f3099e04f39f323d8b9dbb9cb94b061b472b4b68.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\M9h10.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\M9h10.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:364 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k8h69.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k8h69.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1B05c0.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1B05c0.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\1013334001\vdGy6gA.exe"C:\Users\Admin\AppData\Local\Temp\1013334001\vdGy6gA.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4148 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4148 -s 14167⤵
- Program crash
PID:5332
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013388001\37ede3b7fe.exe"C:\Users\Admin\AppData\Local\Temp\1013388001\37ede3b7fe.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2356 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2356 -s 16007⤵
- Program crash
PID:2944
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013389001\45cbb89f42.exe"C:\Users\Admin\AppData\Local\Temp\1013389001\45cbb89f42.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4172
-
-
C:\Users\Admin\AppData\Local\Temp\1013390001\375aa677f6.exe"C:\Users\Admin\AppData\Local\Temp\1013390001\375aa677f6.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2628
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4116
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3532
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2676
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4876
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3328 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2024 -parentBuildID 20240401114208 -prefsHandle 1936 -prefMapHandle 1928 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {6c411a09-fc46-4062-bcf1-07b6cfe4cb9a} 3328 "\\.\pipe\gecko-crash-server-pipe.3328" gpu9⤵PID:5088
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2460 -parentBuildID 20240401114208 -prefsHandle 2452 -prefMapHandle 2440 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e48f2555-60ed-476d-8635-f68f70fe7149} 3328 "\\.\pipe\gecko-crash-server-pipe.3328" socket9⤵PID:2352
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3200 -childID 1 -isForBrowser -prefsHandle 3192 -prefMapHandle 3188 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {68da2292-188c-4e74-8014-b4df0e24a881} 3328 "\\.\pipe\gecko-crash-server-pipe.3328" tab9⤵PID:3552
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3980 -childID 2 -isForBrowser -prefsHandle 3972 -prefMapHandle 3992 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {37485af5-9706-4b63-b84b-426977f23357} 3328 "\\.\pipe\gecko-crash-server-pipe.3328" tab9⤵PID:212
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4600 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4592 -prefMapHandle 4584 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3c2af0b1-010c-48cb-ae4c-107cfb95f036} 3328 "\\.\pipe\gecko-crash-server-pipe.3328" utility9⤵
- Checks processor information in registry
PID:6388
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5196 -childID 3 -isForBrowser -prefsHandle 5172 -prefMapHandle 5192 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a44cdbd3-f4fd-4ddb-9c5b-882bf442398d} 3328 "\\.\pipe\gecko-crash-server-pipe.3328" tab9⤵PID:6812
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5432 -childID 4 -isForBrowser -prefsHandle 5468 -prefMapHandle 5116 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {28daaec4-ac82-40cd-bdf6-3db94fe463df} 3328 "\\.\pipe\gecko-crash-server-pipe.3328" tab9⤵PID:6940
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5632 -childID 5 -isForBrowser -prefsHandle 5336 -prefMapHandle 5340 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fffbd057-5ffe-4677-a259-e895034a48af} 3328 "\\.\pipe\gecko-crash-server-pipe.3328" tab9⤵PID:6952
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013391001\2972ca9790.exe"C:\Users\Admin\AppData\Local\Temp\1013391001\2972ca9790.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1600
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2D8376.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2D8376.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3112 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3112 -s 15885⤵
- Program crash
PID:652
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3q76T.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3q76T.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4116
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4n266h.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4n266h.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4088
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3112 -ip 31121⤵PID:3416
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 2356 -ip 23561⤵PID:3196
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2312
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4148 -ip 41481⤵PID:5308
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6196
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:6932
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:7144
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lhmx4teg.default-release\activity-stream.discovery_stream.json
Filesize24KB
MD540d36ee23cf633c61404882e1cbb56c3
SHA19b2579d5a395348f462fa65c138dde07d2e03666
SHA25666a769a97a1ca3f92662b29ac807f7883accb262eb414baacf318aa526db94d8
SHA51283c66f3400669b25ce83f149ca1430deabe983f602ba677e6cf20e816e867b1aff513ddfec6128800771b6589d77cce7951ee29de72b962cd156980db96390ef
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lhmx4teg.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD55c0d6998eca5a2a687083a8cc15bb6b4
SHA10e5eccd26e2e78bf99602de50410bbac56a65b75
SHA25616e504999ee13d3042b33d33f968c23ef37024a1b038f18e10a501a4c0636c64
SHA512730a178621e0976393b9662689dddb0d406da538c4efae97638a8f23a12b6a3a9ef037f388ce47e30255f16952bcadaff4a4c246ec3bc3f340dcda967c8648bb
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lhmx4teg.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
2.5MB
MD52a78ce9f3872f5e591d643459cabe476
SHA19ac947dfc71a868bc9c2eb2bd78dfb433067682e
SHA25621a2ac44acd7a640735870eebfd04b8dc57bc66877cb5be3b929299e86a43dae
SHA51203e2cd8161a1394ee535a2ea7d197791ab715d69a02ffab98121ec5ac8150d2b17a9a32a59307042c4bbeffad7425b55efa047651de6ed39277dba80711454f9
-
Filesize
949KB
MD5736f6a847a1ad3eea241ba1d9c2ea3bf
SHA1a7f6938bf1c6b896ff20eb375c1b639e8d793a33
SHA25610fd96b0490b2d02fc335c07d142574f61d4997e8ead152c01b75314ff51c23b
SHA512775dce2301f1653b12774981d739b0b743a1129ac7f6bdd552df0d73e603ee2af1262ac77bf2e4fdda5d71dc7bd4615586d06780270a39f95e6b363993975ea3
-
Filesize
2.6MB
MD59e4e898045069f98318963270da27bf0
SHA1f65a9fcd5472e82f497a8bf6eb833505c970e650
SHA25653ae8fdd7c2de8c0ce628a30fda8060fa22e28df0781bc1aefbdb2441655972e
SHA512e2c08e98f1434464bfeeb262b09dcb39fdf819ceb4f3b0064461951005d38f5528326948dc6ff4e2dcba6fc7f6dd838796fd57162bc5a6f6c75ae84ded21fc3c
-
Filesize
5.4MB
MD500b28804831043e73644d1f40c03d251
SHA1e961f1a3702994ce9b42371a25775313c49d9634
SHA256b68f2a3ca61968c4623b6e7844d8c6c20bb7b348cf96887c2e51b888c541c6e3
SHA512a363d73c5525b15c245d3b75c0da5e40e9ddb6ab438568311f1863ba5b7a0db901581cd7f285ccaa5a2397c215cfb30ee40c5010733dfd7ec04ab7d8621e8ec2
-
Filesize
1.7MB
MD509d1a1276ff8fbe9dc8703db22ed155d
SHA11b6a30d6a9305cb79206b6f20b3329c0d66c54fc
SHA256e66fef29df453dfd67e5db61f4c847d74ad7ace5a9dedc71c45efd5119a038f1
SHA512af306ad0f60efe62177b17a8c9b5ea746f5793819e7e8bfec8613b9637e330a240ea4baca2aacc884ced46aba3fe811222f25b4ecb6cf50e9af7214373106428
-
Filesize
3.6MB
MD51cf0f7bddb832e9bb06408871fc362e4
SHA18de2e138cf972cff09800f2c8c4c7ed8c357c4f5
SHA25637e035e7105a73497e29c754206917b610b2c1bd950cb8900ad0e18b95a0b95d
SHA5120a67c38357f51fb51a48c7b1d8ca78019e2b1ffdab72f47ca0b008792483f355df8b503365514c40fbc95ae0fb55f299828655f54166978c1b6e54fd45b71780
-
Filesize
3.1MB
MD531b1538dfcc40163da1a24b8a48e6c90
SHA14377e5c025672f6dca9ed52bd08ca164b89bdca2
SHA256e7aa9c79350c8dab8bd903b453f3dfd899956698fb717c91ac3cab9dec75f361
SHA5123eb7b3d132ccf5c52e64eac37a00b07c3ec2a3c111cdfb2d229963b31f688f204252021be233b0d967ee4bbb3b79b62182bf1ec02247753a826218910733960e
-
Filesize
1.8MB
MD5d398a6c545b1aecb1c7046c91a2ef636
SHA1c48c073a2d2cf6017d0c49004882db7053d1e305
SHA256a79534430d6ef7642ad000dde7c34366027eaed4373cd2d74c624384b1873054
SHA5125a60eaee64d446be75ff5cc166fa28ec3698c75d6d942efddbc840d322f90fae75ba8c668e1422f3acac0f213949760b17ae09ee2cb1cd8c156a7f9b5e6f4ad7
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\AlternateServices.bin
Filesize18KB
MD560885c17de387838b2418de2a492f8ed
SHA11ca76aa43a005814c57f497a0c5a1698761993c4
SHA256cc79b95b32ee3ff40a430f285ef1128a9d2281c9caafdf4dfd2c1ea004c89fcc
SHA5123dd2d69bccf47080a6e2dd9c66e52dfddcf7e9478a53a523437f95820028d9a4c062a3c6cad31be7f0003d1e60f58e7785bbd185d3059c523dfd6f7bafeccebb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\AlternateServices.bin
Filesize6KB
MD5789dc01d12af4703bd9f42905ed076a7
SHA14bfff4ae8862ffcbc6f06a6e887288105b64f39c
SHA256f2bf1f906b14722a1d25bd77cc6a2ff10a7b4dd9e220d95bcaa8169c0b508545
SHA512653d7b60d7a8809b7e0bd545934bcb7095b67dc403249ef9670ebd7d83f0cb38d3174d5cce429efa3159cfcca9903b3c044afacdc338f1b1e01680287827584c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\AlternateServices.bin
Filesize8KB
MD5426970191c1f4f20122557c075f30ae4
SHA1d2520109722107b39564c8a3ade06b666ea18298
SHA2561125f1ca5918876cd7ea6f43aaccfd8a1cc4dc7185a7ae0bdaa0e318b787929b
SHA51263dd0df16e0dea49eabed313212dae6c314e549b3815277546ec0ac89e1cdaf88c9a64f879133ec220d919c39f409e3d42326c0698ef26617e48fd92e463e873
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\AlternateServices.bin
Filesize10KB
MD53f3db5ce8d7679efadcf3dc277577089
SHA10ecf474762c7c19fde091ca927dcde8ce8bd98fa
SHA2560a1713397d473f32185a24bab18d3115e58675ed9cf24403ada427aa30755b07
SHA5127126f40520e71d71736b9f2c89ff1b1a589452db501cd9c25d84823e90b2cc4a6357f68026d709ad251c5aa56de8052fbb4c0bb3ba3f189014d1f108e27480b0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.bin
Filesize23KB
MD580ce133fcd892ca4eae91d1688cdf373
SHA1882c0441d6d9809cec8e2e616977529d48331bee
SHA2562e9adf504110ce09cc9ebaf727066866e27379b1d1c92201379e33fa7d159ae6
SHA512d30cedb6ada199f6bba7b058111b1f6bb9e0628ae4f0ee3adfa420b34cd102ef4135dded9ef9ef76a8395a6acc4404738d4bdaf93baf746bc44f25e0f6c3b62d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.bin
Filesize5KB
MD5209ce67213200f0f6f42038bbc05140a
SHA1b4442d4ba943b365e922ce741f5e0adaadce54ab
SHA256347ed94aa74e8b685a96493155d444bdc74bc73ead23f491b19d046a2324fc95
SHA5129ef3fd593579109444eb5feea6739c754083e086dc39d85195aa5103f2aa1e65a7385487a6462b024ca0ae93a1d1a3b14b26bc0a807eab3ddc90e5a5e1697150
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.bin
Filesize14KB
MD5265e0ce96ec06b1c680236f58439a8e4
SHA1958a3d5dddd25fcab60afe03377fe633f58c937e
SHA256a9538d83eae2b36158c87e949728d010e7975370fee21712a13834e6ef7a2a91
SHA51208a24bf3c7c6efd9974e02b418e58955e45c0dafbe42cb26a61731d9e48f4b5d94eb6cc90524bf7089358e4a6595d3b7ac66bec05ab8afb3961a36b305244812
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.bin
Filesize15KB
MD5ea0e96c90a885a0cb2e4426ec5f53ec6
SHA1738b6cb704f74b06709876a0d22569a0da4817f1
SHA256e5d7dfd955c982df1f4249b8d05298e40f6d7a48f651f8b8b5a42deab128946a
SHA512b62d36360bad7dcad1908642311ab3237cce2a9931c05881bc197629d7eb2a15e1a80e9b725985c9db39dadf9f55ff3a74ecaf6d39c01ce04469c4562874ec99
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5ab7d5d19092641ab830357188dbe25c0
SHA192de5481ea28594cfaac278759cec86dd4b76ab4
SHA2564acee0612b2ba24aae0f97c35d19da19b894e93bb3c0547ced0ccc8ebd3176de
SHA5122d9dfb4b63bec19756dade1709e85939a760d8116e5828d578fb15158d13da293d5296acd0a9e1efc60a6b8d1b9bd57dcdcd25eafd26dd3b1988184d7a4b4be5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5dad8ed8b416e6130de164201f740aa43
SHA1c1d67a32443c46b771469b59ee8f79de8e4c996c
SHA256310d0e7a08dc4b20d982ac17503ee13f3447ed9d7af288cb71f7e30b85e6225d
SHA51247e2eeeaa578cba95dbec8aeaba815958218ccfa957c1ae8a6778143753eb519ebcb6a7ac0e5602bc44ca0198eb519b8c9423131de85bf0aeb8ddb847d69d479
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5c9e8d39c28c943db70f78f8e8ac869c8
SHA13a75112b09ad451d5ca370813e14cd27603599d5
SHA2566d15994e23216133b1e48a7eebbe8295dda2e7354d8225f4f8e7e9e075756670
SHA51288deb6fc1f070aa2145876d3eb718d7c63ab581e07983df5d092b9c24e6c2c03ec98183ec10eb07dc21874966be39213bd856c21b30a5460ef88ff1937153ae8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5472cb4c59b9bc3e49ed7735428766fad
SHA134b79eb4ac35e78505c5b97218a43388aa36b475
SHA2567b16bb1024d8872b92f131d157998d3bc38a11bc1f62a7e82c03c45711947e45
SHA512b466f8fc0e9890add50bd07e6443999c063104d0d56785f1a376080b397eadc6fcfdb7aeed38267eaad3d34ed607b683693f3e9dfb33bb9cf8e4055c8f1f349f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\pending_pings\386763fd-52c3-455c-b241-aa7371dd5713
Filesize27KB
MD5c7a023fad9979037644b16cf0bacccb0
SHA18b06e3202d8201784dec2caae218e11e1e6d17c4
SHA256d6dc41d196d2814549bbd85fd2a9e6a3d8d6e7fef73deced307cad14f61eb9ff
SHA5127325173ccc129f290701baaca0e8ae15ecf830fcec62c7eb1496aff938a05bd08503fd194b1eeea6fc227241c8ac40c4e24c243bb98f1144de29ddcda2fd6b7d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\pending_pings\b685333f-cbf7-4bd1-825d-7bbb619b1408
Filesize671B
MD55de270ac6947c164de6b3834e7bbe0a3
SHA104f459c762bb8a114c39ada4f2b86fa7780ebac6
SHA256b3673e8335c691e8956f543fa89d035eed15f04d3de3f652c024092590e60a4f
SHA5123cb6fc6adabe3b85790a8c3aa2069e8a9f353d3197b26f81a3239ea68b73e0c9ea4286e66cbeda639e8320dc9579a8a042ccba54040581eebb61975fe614f1a1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\pending_pings\d845d66f-0a15-4dcc-b9f2-c83e06a40580
Filesize982B
MD512b429ee0b4ca0128e8c0160357ec444
SHA104a5cb7da1988a6e1a773bbd494b55fbc5200ad4
SHA2563135ff2b1934d1985393b90541651c68b94067ab17d46b90626a2d1016b2df64
SHA512ec8477ec9178c58c62c86eb65b75630b2b8e7f2b6bc5ff2170bfd01efd22c40709a7ad5b5801ea5dc2b727b71d0bd1dd9c76c6d383dea70ce3c171cd9eec9e4b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD59fd92bc26d60e9ca426d10a99a0512b1
SHA1f1b6693c6dc6f8912b27f57f7cd02598d6cba837
SHA2561af8b4d60cd5d28dbff5fbb64a6b6b4c35875e8591ae5c6de48e561140af6f4d
SHA51252579fee9b27854bc6fb82ad9668be1ff8e89b459acb5050dfaec1832083c56f022801fd2a9f0f9babe1be413eb33103e250bd336123ceca08fb8d89fa13e0a4
-
Filesize
10KB
MD5dca7e1762a9299f64ebe2c9061eb340a
SHA15c94c211a03d9d379e3d208f3fb5009d0e01f3c4
SHA2560aec207defc1c909a558f1e2a6c58557426750913f0a29f07b7d5221c59fb2aa
SHA512395e2513f0b254f068ca1ec764b3820b27823d57d48da7d6f251f2690fe2caa3ead892489a1773037522bcfe2ad8c006d3ac671e52c35874785a7619fe9ac091
-
Filesize
15KB
MD562f815bcb255cd99b90b26f11035966f
SHA18a2e64e489396ba3a663753be35a63dc5a0fd60e
SHA256d6fda22bdf2ac74ff3f8eea3cd7445aaa51bce1e1e33fef9bb58ccbe0418aa8d
SHA512ce93e25e6763354a83b7c5182abbe086da89fd3d4d15297378d6398b40ce8deb88a3df437e3a3ebe32058b78520a8a07ac5c82edba6c016fb791350f5a29c56e
-
Filesize
10KB
MD5e695c7e8575019902cc73aa936228010
SHA13668b70b4523a89d5d722d16a7f8820c88ad06f0
SHA25691a1b5e2f5a5cceae9c52c6907486d253ad4bd500b684f92bf7bac9a69ced63c
SHA51248a0d87f97cff0d0ab21f20cddd5a5dd1d8ae63fa7a0f8cb25ad3e932200118ebda816c1b1c403d1606997e0dae6bd62d188e363d8fd976e93eb864a052d27d8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize2.1MB
MD5cc4b46c920a58190cf45e861e9317ba3
SHA14ed2ba9bc0ade9c954496fa0e12bed3a1121d490
SHA256b829ef9e297437e9c6cd03d5174f7bfb8bf8310e204ec64c9ca48647c2cc3c10
SHA51240c2167f427862113f536d2f300210aa1ef24df82d41bb58fbd2fdcbb475b066f79a1f7165421c29bf9621206c5ab6146d2b81d8f688aedc61b7ef4757fb7889