Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-12-2024 09:10
Static task
static1
General
-
Target
4caf2e63eaa614383c4dec78f3099e04f39f323d8b9dbb9cb94b061b472b4b68.exe
-
Size
6.9MB
-
MD5
f99b377260672c892fd1b2bd14b38f0e
-
SHA1
850b0f76f135aeda4d91574a57ddab127abebe02
-
SHA256
4caf2e63eaa614383c4dec78f3099e04f39f323d8b9dbb9cb94b061b472b4b68
-
SHA512
b5d671df1ff1c39dbf126f1b8827ed2ee5a0dc343e1e24d5c4e71706b58a37a14a459cc052ef7c67f49d0601a21bae86f79f21937e57943e7b303f19a0b228e7
-
SSDEEP
196608:rzpSFRjexp9aR/XWqWbNJ3OqPvVwFtlEQLGdiflbOkaFoF:rzpm1eIJmqsP0tl8iliRC
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
https://atten-supporse.biz/api
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://atten-supporse.biz/api
https://se-blurry.biz/api
https://zinc-sneark.biz/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4n266h.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4n266h.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4n266h.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" e48217c4be.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4n266h.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4n266h.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4n266h.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" e48217c4be.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" e48217c4be.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" e48217c4be.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" e48217c4be.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ab80e2875f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1B05c0.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2D8376.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3q76T.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4n266h.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e605bfeddc.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e48217c4be.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 20 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3q76T.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e48217c4be.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e605bfeddc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e48217c4be.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ab80e2875f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1B05c0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2D8376.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3q76T.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4n266h.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4n266h.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ab80e2875f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1B05c0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2D8376.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e605bfeddc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 1B05c0.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 14 IoCs
pid Process 2676 M9h10.exe 2896 k8h69.exe 768 1B05c0.exe 228 skotes.exe 3744 2D8376.exe 368 3q76T.exe 3576 4n266h.exe 3176 vdGy6gA.exe 2376 ab80e2875f.exe 5108 e605bfeddc.exe 1460 f3845af794.exe 4216 e48217c4be.exe 2964 skotes.exe 1628 skotes.exe -
Identifies Wine through registry keys 2 TTPs 10 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine ab80e2875f.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 1B05c0.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 2D8376.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 3q76T.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 4n266h.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine e605bfeddc.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine e48217c4be.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" e48217c4be.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4n266h.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4n266h.exe -
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" k8h69.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ab80e2875f.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013388001\\ab80e2875f.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e605bfeddc.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013389001\\e605bfeddc.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\f3845af794.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013390001\\f3845af794.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e48217c4be.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013391001\\e48217c4be.exe" skotes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4caf2e63eaa614383c4dec78f3099e04f39f323d8b9dbb9cb94b061b472b4b68.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" M9h10.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000c000000023baf-118.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
pid Process 768 1B05c0.exe 228 skotes.exe 3744 2D8376.exe 368 3q76T.exe 3576 4n266h.exe 2376 ab80e2875f.exe 5108 e605bfeddc.exe 4216 e48217c4be.exe 2964 skotes.exe 1628 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1B05c0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 5 IoCs
pid pid_target Process procid_target 2052 3744 WerFault.exe 86 5036 3744 WerFault.exe 86 3900 2376 WerFault.exe 96 5184 3176 WerFault.exe 95 5212 3176 WerFault.exe 95 -
System Location Discovery: System Language Discovery 1 TTPs 20 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e48217c4be.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k8h69.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1B05c0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4caf2e63eaa614383c4dec78f3099e04f39f323d8b9dbb9cb94b061b472b4b68.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2D8376.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vdGy6gA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f3845af794.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e605bfeddc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language f3845af794.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage f3845af794.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language M9h10.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3q76T.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4n266h.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ab80e2875f.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 3304 taskkill.exe 4480 taskkill.exe 1552 taskkill.exe 2868 taskkill.exe 1104 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 768 1B05c0.exe 768 1B05c0.exe 228 skotes.exe 228 skotes.exe 3744 2D8376.exe 3744 2D8376.exe 368 3q76T.exe 368 3q76T.exe 3576 4n266h.exe 3576 4n266h.exe 3576 4n266h.exe 3576 4n266h.exe 2376 ab80e2875f.exe 2376 ab80e2875f.exe 5108 e605bfeddc.exe 5108 e605bfeddc.exe 1460 f3845af794.exe 1460 f3845af794.exe 4216 e48217c4be.exe 4216 e48217c4be.exe 1460 f3845af794.exe 1460 f3845af794.exe 4216 e48217c4be.exe 4216 e48217c4be.exe 4216 e48217c4be.exe 2964 skotes.exe 2964 skotes.exe 1628 skotes.exe 1628 skotes.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 3576 4n266h.exe Token: SeDebugPrivilege 3304 taskkill.exe Token: SeDebugPrivilege 4480 taskkill.exe Token: SeDebugPrivilege 1552 taskkill.exe Token: SeDebugPrivilege 2868 taskkill.exe Token: SeDebugPrivilege 1104 taskkill.exe Token: SeDebugPrivilege 4264 firefox.exe Token: SeDebugPrivilege 4264 firefox.exe Token: SeDebugPrivilege 4216 e48217c4be.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 768 1B05c0.exe 1460 f3845af794.exe 1460 f3845af794.exe 1460 f3845af794.exe 1460 f3845af794.exe 1460 f3845af794.exe 1460 f3845af794.exe 1460 f3845af794.exe 1460 f3845af794.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 1460 f3845af794.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 1460 f3845af794.exe 1460 f3845af794.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 1460 f3845af794.exe 1460 f3845af794.exe 1460 f3845af794.exe 1460 f3845af794.exe 1460 f3845af794.exe 1460 f3845af794.exe 1460 f3845af794.exe 1460 f3845af794.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 1460 f3845af794.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 1460 f3845af794.exe 1460 f3845af794.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4264 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1284 wrote to memory of 2676 1284 4caf2e63eaa614383c4dec78f3099e04f39f323d8b9dbb9cb94b061b472b4b68.exe 82 PID 1284 wrote to memory of 2676 1284 4caf2e63eaa614383c4dec78f3099e04f39f323d8b9dbb9cb94b061b472b4b68.exe 82 PID 1284 wrote to memory of 2676 1284 4caf2e63eaa614383c4dec78f3099e04f39f323d8b9dbb9cb94b061b472b4b68.exe 82 PID 2676 wrote to memory of 2896 2676 M9h10.exe 83 PID 2676 wrote to memory of 2896 2676 M9h10.exe 83 PID 2676 wrote to memory of 2896 2676 M9h10.exe 83 PID 2896 wrote to memory of 768 2896 k8h69.exe 84 PID 2896 wrote to memory of 768 2896 k8h69.exe 84 PID 2896 wrote to memory of 768 2896 k8h69.exe 84 PID 768 wrote to memory of 228 768 1B05c0.exe 85 PID 768 wrote to memory of 228 768 1B05c0.exe 85 PID 768 wrote to memory of 228 768 1B05c0.exe 85 PID 2896 wrote to memory of 3744 2896 k8h69.exe 86 PID 2896 wrote to memory of 3744 2896 k8h69.exe 86 PID 2896 wrote to memory of 3744 2896 k8h69.exe 86 PID 2676 wrote to memory of 368 2676 M9h10.exe 93 PID 2676 wrote to memory of 368 2676 M9h10.exe 93 PID 2676 wrote to memory of 368 2676 M9h10.exe 93 PID 1284 wrote to memory of 3576 1284 4caf2e63eaa614383c4dec78f3099e04f39f323d8b9dbb9cb94b061b472b4b68.exe 94 PID 1284 wrote to memory of 3576 1284 4caf2e63eaa614383c4dec78f3099e04f39f323d8b9dbb9cb94b061b472b4b68.exe 94 PID 1284 wrote to memory of 3576 1284 4caf2e63eaa614383c4dec78f3099e04f39f323d8b9dbb9cb94b061b472b4b68.exe 94 PID 228 wrote to memory of 3176 228 skotes.exe 95 PID 228 wrote to memory of 3176 228 skotes.exe 95 PID 228 wrote to memory of 3176 228 skotes.exe 95 PID 228 wrote to memory of 2376 228 skotes.exe 96 PID 228 wrote to memory of 2376 228 skotes.exe 96 PID 228 wrote to memory of 2376 228 skotes.exe 96 PID 228 wrote to memory of 5108 228 skotes.exe 99 PID 228 wrote to memory of 5108 228 skotes.exe 99 PID 228 wrote to memory of 5108 228 skotes.exe 99 PID 228 wrote to memory of 1460 228 skotes.exe 100 PID 228 wrote to memory of 1460 228 skotes.exe 100 PID 228 wrote to memory of 1460 228 skotes.exe 100 PID 1460 wrote to memory of 3304 1460 f3845af794.exe 101 PID 1460 wrote to memory of 3304 1460 f3845af794.exe 101 PID 1460 wrote to memory of 3304 1460 f3845af794.exe 101 PID 1460 wrote to memory of 4480 1460 f3845af794.exe 103 PID 1460 wrote to memory of 4480 1460 f3845af794.exe 103 PID 1460 wrote to memory of 4480 1460 f3845af794.exe 103 PID 1460 wrote to memory of 1552 1460 f3845af794.exe 105 PID 1460 wrote to memory of 1552 1460 f3845af794.exe 105 PID 1460 wrote to memory of 1552 1460 f3845af794.exe 105 PID 1460 wrote to memory of 2868 1460 f3845af794.exe 107 PID 1460 wrote to memory of 2868 1460 f3845af794.exe 107 PID 1460 wrote to memory of 2868 1460 f3845af794.exe 107 PID 1460 wrote to memory of 1104 1460 f3845af794.exe 109 PID 1460 wrote to memory of 1104 1460 f3845af794.exe 109 PID 1460 wrote to memory of 1104 1460 f3845af794.exe 109 PID 1460 wrote to memory of 5000 1460 f3845af794.exe 111 PID 1460 wrote to memory of 5000 1460 f3845af794.exe 111 PID 5000 wrote to memory of 4264 5000 firefox.exe 112 PID 5000 wrote to memory of 4264 5000 firefox.exe 112 PID 5000 wrote to memory of 4264 5000 firefox.exe 112 PID 5000 wrote to memory of 4264 5000 firefox.exe 112 PID 5000 wrote to memory of 4264 5000 firefox.exe 112 PID 5000 wrote to memory of 4264 5000 firefox.exe 112 PID 5000 wrote to memory of 4264 5000 firefox.exe 112 PID 5000 wrote to memory of 4264 5000 firefox.exe 112 PID 5000 wrote to memory of 4264 5000 firefox.exe 112 PID 5000 wrote to memory of 4264 5000 firefox.exe 112 PID 5000 wrote to memory of 4264 5000 firefox.exe 112 PID 4264 wrote to memory of 2736 4264 firefox.exe 113 PID 4264 wrote to memory of 2736 4264 firefox.exe 113 PID 4264 wrote to memory of 2736 4264 firefox.exe 113 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\4caf2e63eaa614383c4dec78f3099e04f39f323d8b9dbb9cb94b061b472b4b68.exe"C:\Users\Admin\AppData\Local\Temp\4caf2e63eaa614383c4dec78f3099e04f39f323d8b9dbb9cb94b061b472b4b68.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\M9h10.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\M9h10.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k8h69.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k8h69.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1B05c0.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1B05c0.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Users\Admin\AppData\Local\Temp\1013334001\vdGy6gA.exe"C:\Users\Admin\AppData\Local\Temp\1013334001\vdGy6gA.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3176 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3176 -s 13807⤵
- Program crash
PID:5184
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3176 -s 14007⤵
- Program crash
PID:5212
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013388001\ab80e2875f.exe"C:\Users\Admin\AppData\Local\Temp\1013388001\ab80e2875f.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2376 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2376 -s 16007⤵
- Program crash
PID:3900
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013389001\e605bfeddc.exe"C:\Users\Admin\AppData\Local\Temp\1013389001\e605bfeddc.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5108
-
-
C:\Users\Admin\AppData\Local\Temp\1013390001\f3845af794.exe"C:\Users\Admin\AppData\Local\Temp\1013390001\f3845af794.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3304
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4480
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1552
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2868
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1104
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1984 -parentBuildID 20240401114208 -prefsHandle 1896 -prefMapHandle 1872 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {0d22e687-697d-4190-bed9-06d762ceb89f} 4264 "\\.\pipe\gecko-crash-server-pipe.4264" gpu9⤵PID:2736
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2436 -parentBuildID 20240401114208 -prefsHandle 2428 -prefMapHandle 2424 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d6fde9a0-4729-4d1f-bf9b-0a1f4732df63} 4264 "\\.\pipe\gecko-crash-server-pipe.4264" socket9⤵PID:3476
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3200 -childID 1 -isForBrowser -prefsHandle 3204 -prefMapHandle 3100 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9773e68c-1046-454a-ad09-58201affba73} 4264 "\\.\pipe\gecko-crash-server-pipe.4264" tab9⤵PID:5088
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3960 -childID 2 -isForBrowser -prefsHandle 3996 -prefMapHandle 3992 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b2275d6e-8f7b-465b-91bb-008d3dda308e} 4264 "\\.\pipe\gecko-crash-server-pipe.4264" tab9⤵PID:812
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4704 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4596 -prefMapHandle 4680 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {86424d1e-0d3e-46af-833a-3e8134535144} 4264 "\\.\pipe\gecko-crash-server-pipe.4264" utility9⤵
- Checks processor information in registry
PID:6352
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5152 -childID 3 -isForBrowser -prefsHandle 5144 -prefMapHandle 5140 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c32b860a-a30a-43f0-8050-4c6c08d25d31} 4264 "\\.\pipe\gecko-crash-server-pipe.4264" tab9⤵PID:7040
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5320 -childID 4 -isForBrowser -prefsHandle 5328 -prefMapHandle 5336 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b9d178b4-d9ba-4a55-b4cb-6ad72b522389} 4264 "\\.\pipe\gecko-crash-server-pipe.4264" tab9⤵PID:7092
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5536 -childID 5 -isForBrowser -prefsHandle 5616 -prefMapHandle 5612 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6a034741-92c4-48d5-a118-bc3c79c310e5} 4264 "\\.\pipe\gecko-crash-server-pipe.4264" tab9⤵PID:7112
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013391001\e48217c4be.exe"C:\Users\Admin\AppData\Local\Temp\1013391001\e48217c4be.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4216
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2D8376.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2D8376.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3744 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3744 -s 16085⤵
- Program crash
PID:2052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3744 -s 15805⤵
- Program crash
PID:5036
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3q76T.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3q76T.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:368
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4n266h.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4n266h.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3576
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3744 -ip 37441⤵PID:2064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3744 -ip 37441⤵PID:1236
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2376 -ip 23761⤵PID:1812
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2964
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3176 -ip 31761⤵PID:5148
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3176 -ip 31761⤵PID:5156
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1628
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\activity-stream.discovery_stream.json.tmp
Filesize22KB
MD5972bf672a4fa0f11b10b0499db24a3b6
SHA12220dd7d59260caff1deac110e81d186b9b4d6c8
SHA25697b284b025bc475f10d09ce6a9acbccfaf6002035007d8d6f6ce8391c58577c4
SHA51274b97e447c42700cb187277fcb2e8291d716ad5e957f88caa7fc437c0117317347d374ebb8853a81e14048d20531bbc7b15950fe2ca3b8edba8ca8427e1120f3
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD5d8d49e77fe2b3a1020865fc6a2f6dfc4
SHA1efd6021ad279f792e1eaa9a29e233872f2ed4a53
SHA256e34e55ba6784134acfbb899794d431c0ea43f2831257d38ecef4c873344cf7d3
SHA51231fb4913c1919957a71a2bfd5276e5510bcd1ee2f56bd104e38e5e7338861c803da5ef5e5dfff493d732e4f440678ec83ce3b8d4cc1618c6084301ef580fc1d6
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
2.5MB
MD52a78ce9f3872f5e591d643459cabe476
SHA19ac947dfc71a868bc9c2eb2bd78dfb433067682e
SHA25621a2ac44acd7a640735870eebfd04b8dc57bc66877cb5be3b929299e86a43dae
SHA51203e2cd8161a1394ee535a2ea7d197791ab715d69a02ffab98121ec5ac8150d2b17a9a32a59307042c4bbeffad7425b55efa047651de6ed39277dba80711454f9
-
Filesize
949KB
MD5736f6a847a1ad3eea241ba1d9c2ea3bf
SHA1a7f6938bf1c6b896ff20eb375c1b639e8d793a33
SHA25610fd96b0490b2d02fc335c07d142574f61d4997e8ead152c01b75314ff51c23b
SHA512775dce2301f1653b12774981d739b0b743a1129ac7f6bdd552df0d73e603ee2af1262ac77bf2e4fdda5d71dc7bd4615586d06780270a39f95e6b363993975ea3
-
Filesize
2.6MB
MD59e4e898045069f98318963270da27bf0
SHA1f65a9fcd5472e82f497a8bf6eb833505c970e650
SHA25653ae8fdd7c2de8c0ce628a30fda8060fa22e28df0781bc1aefbdb2441655972e
SHA512e2c08e98f1434464bfeeb262b09dcb39fdf819ceb4f3b0064461951005d38f5528326948dc6ff4e2dcba6fc7f6dd838796fd57162bc5a6f6c75ae84ded21fc3c
-
Filesize
5.4MB
MD500b28804831043e73644d1f40c03d251
SHA1e961f1a3702994ce9b42371a25775313c49d9634
SHA256b68f2a3ca61968c4623b6e7844d8c6c20bb7b348cf96887c2e51b888c541c6e3
SHA512a363d73c5525b15c245d3b75c0da5e40e9ddb6ab438568311f1863ba5b7a0db901581cd7f285ccaa5a2397c215cfb30ee40c5010733dfd7ec04ab7d8621e8ec2
-
Filesize
1.7MB
MD509d1a1276ff8fbe9dc8703db22ed155d
SHA11b6a30d6a9305cb79206b6f20b3329c0d66c54fc
SHA256e66fef29df453dfd67e5db61f4c847d74ad7ace5a9dedc71c45efd5119a038f1
SHA512af306ad0f60efe62177b17a8c9b5ea746f5793819e7e8bfec8613b9637e330a240ea4baca2aacc884ced46aba3fe811222f25b4ecb6cf50e9af7214373106428
-
Filesize
3.6MB
MD51cf0f7bddb832e9bb06408871fc362e4
SHA18de2e138cf972cff09800f2c8c4c7ed8c357c4f5
SHA25637e035e7105a73497e29c754206917b610b2c1bd950cb8900ad0e18b95a0b95d
SHA5120a67c38357f51fb51a48c7b1d8ca78019e2b1ffdab72f47ca0b008792483f355df8b503365514c40fbc95ae0fb55f299828655f54166978c1b6e54fd45b71780
-
Filesize
3.1MB
MD531b1538dfcc40163da1a24b8a48e6c90
SHA14377e5c025672f6dca9ed52bd08ca164b89bdca2
SHA256e7aa9c79350c8dab8bd903b453f3dfd899956698fb717c91ac3cab9dec75f361
SHA5123eb7b3d132ccf5c52e64eac37a00b07c3ec2a3c111cdfb2d229963b31f688f204252021be233b0d967ee4bbb3b79b62182bf1ec02247753a826218910733960e
-
Filesize
1.8MB
MD5d398a6c545b1aecb1c7046c91a2ef636
SHA1c48c073a2d2cf6017d0c49004882db7053d1e305
SHA256a79534430d6ef7642ad000dde7c34366027eaed4373cd2d74c624384b1873054
SHA5125a60eaee64d446be75ff5cc166fa28ec3698c75d6d942efddbc840d322f90fae75ba8c668e1422f3acac0f213949760b17ae09ee2cb1cd8c156a7f9b5e6f4ad7
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin
Filesize6KB
MD586936b1a182e8124fcb5e6b87cd3f18c
SHA1022ba3ed89dfc40fe5f162a532c6a43c702a193f
SHA2563ce212c17576dfb61f79c296a59ee92305a2423f76ca2338288546811cf04bf7
SHA512e13914e9e5947c3dd67f37d3cb5dccd4e5c650fe12a564564d703ab81cf469551d414ce839257dbce7b406729c622c3155e5ff317d0dfca9519ec86e4b75cf42
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin
Filesize7KB
MD5bde147c98f8cddd89d2163c3d02e5acd
SHA170fe5695b6878af168881438ae9560022186463e
SHA2567a6ad700952759b1ee4a48b26deb7be12adfcb5180d8a64b3197d71241e31de9
SHA5123fbe0e1ee41fec846fcc4c3240f5e258dcb872c8893301b43eb06e08e166b09c588c1d142478009081292d29e0439f24fb4ef546f20f373cc7109646088a17cd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.bin
Filesize23KB
MD590d3852a135b9d4c639f0d295fa97705
SHA186563637b9f45fcdd7b6526719eae177489f5583
SHA25699b4fc9277ed9383a7ed64099148014edd872db106ab6b6250f98ba82428e30b
SHA512bf811d3c57ca48b3485246d280cac55131a0ef10e2282ad9d3c7569746c471eb713226785c83ae74764d86281f3a1cd36a4e424f4dbe4eb3e90b52ce568e0d91
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.bin
Filesize15KB
MD5fa1c78e3ffe4d00b46b1acc857bc12ed
SHA1c40a79b9d35d398d9966f98cae0d76174328f9f8
SHA256ba831e0a4a91d9ffedf3c67739ee1fc829bd10dc6aebc815030dbd56ccc7dea8
SHA51259c0d2861c5d79841beabe117423fbcf432c68a7ef10e1baa6b29f6b27e9b4f70fffcdc26695ef489b23a2f0d9ed795a5edf5595d6104b9cfabf330b77e1601b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.bin
Filesize5KB
MD5c84c335bc0eac8accbadaac1e0eeafa5
SHA146a83a3642fa2b72c26d951cfd5409f3c5806526
SHA25640d6baeb8fd55f0db87b5d3e38fea20414110386b49e3e136e5783ea73cc8da8
SHA5122afb0add366566d35f416b940f2e6efc63ff5e678dbd082efce8f79937333069ad5ffc2039f062f7484b70360d26b8e163ba9b5c7be4dc2e9f75ca140c70ca88
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD51c410865c7b313b65f4d1c5c63672867
SHA1f70fdcecd8e1e8913daa463e8c6fba6027753bdf
SHA25620636fd7d83f697e9c1a9c304c82689c45b03d8abe346ae3916b2a503b1ffa71
SHA512b73e20d2d4da7f22239f87d2a861bbdd1221721c14a7cbfa65b2ce535a29df69d74ff9752de9d061301423b50f20c9f037c6c1693777a535f6d014f10dd57639
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5c729c7d9220d78da78743fa3e25a5964
SHA102f3a758722c8bea09699b399c41e455cb394e4d
SHA256b35c50b9ddef7a9cf8f414199e98bbb62342a3b833f778e32a237bc4f353c201
SHA512e97362164fd34bb23f6c9db4a0a54df082b4ade664c4b53283eb04730853894e71fd8f0f54fd11eecdbc150bd44a9a8fa6fa22ef83562d45426d52c4457fded1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\53c6ad88-8dc9-4953-b30f-15dda22914fd
Filesize27KB
MD5aa172313bb94017a73f57cc95cfc5787
SHA1ad935e6d97647c1b96934050fd059b3db765e830
SHA2565b9f34a52eda83c1577de6e31b80337c715ca91f0063dd1f7a9c623ef1a5dd74
SHA5124b15cbc169682a61f4137d22a2bc39f465a4beba4dba9e782f2ccb2c0c6dff0c12588a74ef628d0193529d2a3dd8f6b8b3c3d829677fe7e0d423b7a68bc6cd67
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\71fa6a34-11e2-4497-8ba0-e67b7ad963df
Filesize671B
MD5958e077c00753a5e76d59c5434eb00ba
SHA157391b59435386efd1467b0fcbcfadc6e44f8957
SHA25655ea724aad1a525db91347a1c2c1f3cda7075ccf623b01a5ab8079a31ed1376c
SHA5126ab22b4058541aade667ea77b5d21a509d92dd12c8c2a9f2c5ef9f764cafd86f0c8ad79d3ed55a840f4d41ba08fc001964ce8d65427ebf9a937d33f124d13185
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\ad7726bf-23fd-47cf-b541-284a9284a7bf
Filesize982B
MD5ebf10595945a842538ca2048017d3cb6
SHA1744789bdc3db03688efda4311422e44ad73a9d72
SHA256695f3fbfa3f3aed30728aa8b92f57c92b7d306a616f9f8b7d43b99a0995f9328
SHA512aa11467686a85afdcd47a2a8f21a2fce4fb71660f37f1c9aecc1d65ba11ba5ebfabab3e32a5b065d5ec181f20028c10331367cb6ce85ce3b8112a1b494407637
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD51f5efd5af8baad235bb88fe66815e18d
SHA135dbbbb0a30be2aac7e26c2870c4a154577d7193
SHA2565ede4db5ca6883d218c545cbc5ae551bbc9fbae032107cc2dc049df58e5aac6a
SHA5126bc147b10db62d0ee1a16439dc8107140d3b68e9ec29734fa897ef71049925254b8b45e5048f2049b9f99018cd9dfff8ee75aec761ec0074afbf2d2e700abb62
-
Filesize
12KB
MD51cd216983d76c138fbb8638d5a58198e
SHA1e0a33a48df78baaae52780079b5d05cc7f708257
SHA256976f3913ec4598c078694c134c89436d0be316ca26f39589383b783d4a5dfb32
SHA512ec9665ad2bf6ec6fa44d239d39e440f750f915725b7734981363086b35ea2f5e999a7f07a341421b60183aa5551d796ea70ec69eecbe3d8018b031bc9277283c
-
Filesize
15KB
MD5c48dc2e5e84d66c6a7d1b134a8cb6ec8
SHA1e86cf51e622f2af4840bace3c34d9c6ae2168e73
SHA256f6282d4be3f7980ee70766acc0d521119cee3cb46aa94ba8f5728b362e18d798
SHA512d978c3425393682eb90cc9782b1988702725cb686e2baa332722cb8eb5a6a527d0653c636c3e19ca14d4d0b9a777c15758975c19b7ae32ad6a37c3667268c84c
-
Filesize
10KB
MD5c81a40f449484efd54144b4771e2db11
SHA12a21ab41417fce0bc78105fc55ed0c068ae32fae
SHA256f6e98a42cd31a175b4e0cfed252536aa4c1c11d7ff64343c500ab0542d7eb7d8
SHA512f92006f4e8cf983eabd826aa60509d4f88d997c11aa18e4ebd641b100be4855f00c64df3a45e528cff7ec83edb9e37f462f685ec21832e127e953388f03e237c
-
Filesize
10KB
MD57b04c63b0f943845891cc9155e2bd5b5
SHA164459d35351af172b42a2561df640bcd18481987
SHA2562955880f06d0e2f96b582f57102d48946c64c0bac22b02e1ea6598174aecc885
SHA512e7bc98eaac4ec2fdaba6c589ee09b10bdd4a636f4069d3607b8cf2cc78bd91ddca18184ef4ad3b8d65a2f5637995a3954dfd5fa4190d0f87da08f0e4cc2ded6f