Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/12/2024, 11:44
Static task
static1
General
-
Target
9ed40e0d795ec7894955447aa60a3df726b8a1618bab72711936c56383e20a49.exe
-
Size
6.9MB
-
MD5
48638460aff1a61556318cf2a5b17361
-
SHA1
fcabab39f96fca1e443f9e36bc5cc58a78d7de6f
-
SHA256
9ed40e0d795ec7894955447aa60a3df726b8a1618bab72711936c56383e20a49
-
SHA512
0957f34cf86682ca5c9aedb2f0d2949340a765c4c4cec41901f503f75931c5018156ce1f6e1dcca8c172e0b9b7967fca648860a6edd1db1ff7473c93cbc27402
-
SSDEEP
196608:VswjKfv/R8uGECWZT+lGme1d3vkeIQchBXVK05:LKpFGj2T+lghgvX
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
https://atten-supporse.biz/api
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://atten-supporse.biz/api
https://se-blurry.biz/api
https://zinc-sneark.biz/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4o767n.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4o767n.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 294ae191f7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 294ae191f7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 294ae191f7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 294ae191f7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 294ae191f7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4o767n.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4o767n.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4o767n.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4o767n.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3X53c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4o767n.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1Z41K7.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2l4577.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4c6c59522d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 346ee43165.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 294ae191f7.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 20 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2l4577.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4c6c59522d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 346ee43165.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3X53c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4o767n.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1Z41K7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2l4577.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3X53c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4o767n.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 346ee43165.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 294ae191f7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1Z41K7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4c6c59522d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 294ae191f7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 1Z41K7.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 13 IoCs
pid Process 3280 k4f23.exe 1180 e5T82.exe 3692 1Z41K7.exe 2044 skotes.exe 1200 2l4577.exe 4604 3X53c.exe 4628 4c6c59522d.exe 2668 4o767n.exe 1216 346ee43165.exe 1836 21e831060c.exe 5060 294ae191f7.exe 6440 skotes.exe 6984 skotes.exe -
Identifies Wine through registry keys 2 TTPs 10 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 1Z41K7.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 2l4577.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 3X53c.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 4c6c59522d.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 4o767n.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 346ee43165.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 294ae191f7.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4o767n.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4o767n.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 294ae191f7.exe -
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" k4f23.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" e5T82.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\4c6c59522d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013412001\\4c6c59522d.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\346ee43165.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013413001\\346ee43165.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\21e831060c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013414001\\21e831060c.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\294ae191f7.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013415001\\294ae191f7.exe" skotes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9ed40e0d795ec7894955447aa60a3df726b8a1618bab72711936c56383e20a49.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000d000000023c99-92.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
pid Process 3692 1Z41K7.exe 2044 skotes.exe 1200 2l4577.exe 4604 3X53c.exe 4628 4c6c59522d.exe 2668 4o767n.exe 1216 346ee43165.exe 5060 294ae191f7.exe 6440 skotes.exe 6984 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1Z41K7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 396 1200 WerFault.exe 88 2040 4628 WerFault.exe 99 -
System Location Discovery: System Language Discovery 1 TTPs 19 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2l4577.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3X53c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4c6c59522d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 21e831060c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 21e831060c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1Z41K7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4o767n.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9ed40e0d795ec7894955447aa60a3df726b8a1618bab72711936c56383e20a49.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e5T82.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 346ee43165.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k4f23.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 21e831060c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 294ae191f7.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 4072 taskkill.exe 2608 taskkill.exe 1588 taskkill.exe 2560 taskkill.exe 4004 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 3692 1Z41K7.exe 3692 1Z41K7.exe 2044 skotes.exe 2044 skotes.exe 1200 2l4577.exe 1200 2l4577.exe 4604 3X53c.exe 4604 3X53c.exe 4628 4c6c59522d.exe 4628 4c6c59522d.exe 2668 4o767n.exe 2668 4o767n.exe 2668 4o767n.exe 2668 4o767n.exe 1216 346ee43165.exe 1216 346ee43165.exe 1836 21e831060c.exe 1836 21e831060c.exe 5060 294ae191f7.exe 5060 294ae191f7.exe 1836 21e831060c.exe 1836 21e831060c.exe 5060 294ae191f7.exe 5060 294ae191f7.exe 5060 294ae191f7.exe 6440 skotes.exe 6440 skotes.exe 6984 skotes.exe 6984 skotes.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 2668 4o767n.exe Token: SeDebugPrivilege 2560 taskkill.exe Token: SeDebugPrivilege 4004 taskkill.exe Token: SeDebugPrivilege 4072 taskkill.exe Token: SeDebugPrivilege 2608 taskkill.exe Token: SeDebugPrivilege 1588 taskkill.exe Token: SeDebugPrivilege 4804 firefox.exe Token: SeDebugPrivilege 4804 firefox.exe Token: SeDebugPrivilege 5060 294ae191f7.exe Token: SeDebugPrivilege 4804 firefox.exe Token: SeDebugPrivilege 4804 firefox.exe Token: SeDebugPrivilege 4804 firefox.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 3692 1Z41K7.exe 1836 21e831060c.exe 1836 21e831060c.exe 1836 21e831060c.exe 1836 21e831060c.exe 1836 21e831060c.exe 1836 21e831060c.exe 1836 21e831060c.exe 4804 firefox.exe 4804 firefox.exe 4804 firefox.exe 4804 firefox.exe 1836 21e831060c.exe 4804 firefox.exe 4804 firefox.exe 4804 firefox.exe 4804 firefox.exe 4804 firefox.exe 4804 firefox.exe 4804 firefox.exe 4804 firefox.exe 4804 firefox.exe 4804 firefox.exe 4804 firefox.exe 4804 firefox.exe 4804 firefox.exe 4804 firefox.exe 4804 firefox.exe 4804 firefox.exe 4804 firefox.exe 1836 21e831060c.exe 1836 21e831060c.exe 1836 21e831060c.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 1836 21e831060c.exe 1836 21e831060c.exe 1836 21e831060c.exe 1836 21e831060c.exe 1836 21e831060c.exe 1836 21e831060c.exe 1836 21e831060c.exe 4804 firefox.exe 4804 firefox.exe 4804 firefox.exe 4804 firefox.exe 1836 21e831060c.exe 4804 firefox.exe 4804 firefox.exe 4804 firefox.exe 4804 firefox.exe 4804 firefox.exe 4804 firefox.exe 4804 firefox.exe 4804 firefox.exe 4804 firefox.exe 4804 firefox.exe 4804 firefox.exe 4804 firefox.exe 4804 firefox.exe 4804 firefox.exe 4804 firefox.exe 4804 firefox.exe 1836 21e831060c.exe 1836 21e831060c.exe 1836 21e831060c.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4804 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 628 wrote to memory of 3280 628 9ed40e0d795ec7894955447aa60a3df726b8a1618bab72711936c56383e20a49.exe 84 PID 628 wrote to memory of 3280 628 9ed40e0d795ec7894955447aa60a3df726b8a1618bab72711936c56383e20a49.exe 84 PID 628 wrote to memory of 3280 628 9ed40e0d795ec7894955447aa60a3df726b8a1618bab72711936c56383e20a49.exe 84 PID 3280 wrote to memory of 1180 3280 k4f23.exe 85 PID 3280 wrote to memory of 1180 3280 k4f23.exe 85 PID 3280 wrote to memory of 1180 3280 k4f23.exe 85 PID 1180 wrote to memory of 3692 1180 e5T82.exe 86 PID 1180 wrote to memory of 3692 1180 e5T82.exe 86 PID 1180 wrote to memory of 3692 1180 e5T82.exe 86 PID 3692 wrote to memory of 2044 3692 1Z41K7.exe 87 PID 3692 wrote to memory of 2044 3692 1Z41K7.exe 87 PID 3692 wrote to memory of 2044 3692 1Z41K7.exe 87 PID 1180 wrote to memory of 1200 1180 e5T82.exe 88 PID 1180 wrote to memory of 1200 1180 e5T82.exe 88 PID 1180 wrote to memory of 1200 1180 e5T82.exe 88 PID 3280 wrote to memory of 4604 3280 k4f23.exe 98 PID 3280 wrote to memory of 4604 3280 k4f23.exe 98 PID 3280 wrote to memory of 4604 3280 k4f23.exe 98 PID 2044 wrote to memory of 4628 2044 skotes.exe 99 PID 2044 wrote to memory of 4628 2044 skotes.exe 99 PID 2044 wrote to memory of 4628 2044 skotes.exe 99 PID 628 wrote to memory of 2668 628 9ed40e0d795ec7894955447aa60a3df726b8a1618bab72711936c56383e20a49.exe 103 PID 628 wrote to memory of 2668 628 9ed40e0d795ec7894955447aa60a3df726b8a1618bab72711936c56383e20a49.exe 103 PID 628 wrote to memory of 2668 628 9ed40e0d795ec7894955447aa60a3df726b8a1618bab72711936c56383e20a49.exe 103 PID 2044 wrote to memory of 1216 2044 skotes.exe 107 PID 2044 wrote to memory of 1216 2044 skotes.exe 107 PID 2044 wrote to memory of 1216 2044 skotes.exe 107 PID 2044 wrote to memory of 1836 2044 skotes.exe 111 PID 2044 wrote to memory of 1836 2044 skotes.exe 111 PID 2044 wrote to memory of 1836 2044 skotes.exe 111 PID 1836 wrote to memory of 2560 1836 21e831060c.exe 113 PID 1836 wrote to memory of 2560 1836 21e831060c.exe 113 PID 1836 wrote to memory of 2560 1836 21e831060c.exe 113 PID 1836 wrote to memory of 4004 1836 21e831060c.exe 115 PID 1836 wrote to memory of 4004 1836 21e831060c.exe 115 PID 1836 wrote to memory of 4004 1836 21e831060c.exe 115 PID 1836 wrote to memory of 4072 1836 21e831060c.exe 117 PID 1836 wrote to memory of 4072 1836 21e831060c.exe 117 PID 1836 wrote to memory of 4072 1836 21e831060c.exe 117 PID 1836 wrote to memory of 2608 1836 21e831060c.exe 119 PID 1836 wrote to memory of 2608 1836 21e831060c.exe 119 PID 1836 wrote to memory of 2608 1836 21e831060c.exe 119 PID 1836 wrote to memory of 1588 1836 21e831060c.exe 121 PID 1836 wrote to memory of 1588 1836 21e831060c.exe 121 PID 1836 wrote to memory of 1588 1836 21e831060c.exe 121 PID 1836 wrote to memory of 1940 1836 21e831060c.exe 123 PID 1836 wrote to memory of 1940 1836 21e831060c.exe 123 PID 1940 wrote to memory of 4804 1940 firefox.exe 124 PID 1940 wrote to memory of 4804 1940 firefox.exe 124 PID 1940 wrote to memory of 4804 1940 firefox.exe 124 PID 1940 wrote to memory of 4804 1940 firefox.exe 124 PID 1940 wrote to memory of 4804 1940 firefox.exe 124 PID 1940 wrote to memory of 4804 1940 firefox.exe 124 PID 1940 wrote to memory of 4804 1940 firefox.exe 124 PID 1940 wrote to memory of 4804 1940 firefox.exe 124 PID 1940 wrote to memory of 4804 1940 firefox.exe 124 PID 1940 wrote to memory of 4804 1940 firefox.exe 124 PID 1940 wrote to memory of 4804 1940 firefox.exe 124 PID 4804 wrote to memory of 456 4804 firefox.exe 125 PID 4804 wrote to memory of 456 4804 firefox.exe 125 PID 4804 wrote to memory of 456 4804 firefox.exe 125 PID 4804 wrote to memory of 456 4804 firefox.exe 125 PID 4804 wrote to memory of 456 4804 firefox.exe 125 PID 4804 wrote to memory of 456 4804 firefox.exe 125 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\9ed40e0d795ec7894955447aa60a3df726b8a1618bab72711936c56383e20a49.exe"C:\Users\Admin\AppData\Local\Temp\9ed40e0d795ec7894955447aa60a3df726b8a1618bab72711936c56383e20a49.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\k4f23.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\k4f23.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3280 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\e5T82.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\e5T82.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1Z41K7.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1Z41K7.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\1013412001\4c6c59522d.exe"C:\Users\Admin\AppData\Local\Temp\1013412001\4c6c59522d.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4628 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4628 -s 16047⤵
- Program crash
PID:2040
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013413001\346ee43165.exe"C:\Users\Admin\AppData\Local\Temp\1013413001\346ee43165.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1216
-
-
C:\Users\Admin\AppData\Local\Temp\1013414001\21e831060c.exe"C:\Users\Admin\AppData\Local\Temp\1013414001\21e831060c.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2560
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4004
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4072
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2608
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1588
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2076 -parentBuildID 20240401114208 -prefsHandle 1988 -prefMapHandle 1980 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {0e050a75-7bc3-4d0e-8bea-9e32387db613} 4804 "\\.\pipe\gecko-crash-server-pipe.4804" gpu9⤵PID:456
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2508 -parentBuildID 20240401114208 -prefsHandle 2500 -prefMapHandle 2496 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {56811a93-9228-4602-b373-555c6df13ada} 4804 "\\.\pipe\gecko-crash-server-pipe.4804" socket9⤵PID:1868
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3224 -childID 1 -isForBrowser -prefsHandle 3216 -prefMapHandle 3212 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c66e87f7-b3e7-4b87-b27f-04e29f465af8} 4804 "\\.\pipe\gecko-crash-server-pipe.4804" tab9⤵PID:1440
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3772 -childID 2 -isForBrowser -prefsHandle 3768 -prefMapHandle 3764 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {528c9ee3-7c03-419d-8b77-20aaf96684fc} 4804 "\\.\pipe\gecko-crash-server-pipe.4804" tab9⤵PID:3876
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4772 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4752 -prefMapHandle 4756 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {af7bc14a-4c4a-41f3-8567-075474e9b48f} 4804 "\\.\pipe\gecko-crash-server-pipe.4804" utility9⤵
- Checks processor information in registry
PID:5672
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5720 -childID 3 -isForBrowser -prefsHandle 5740 -prefMapHandle 5736 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {aeb2d297-850c-4f83-af65-66bad8f2ffd4} 4804 "\\.\pipe\gecko-crash-server-pipe.4804" tab9⤵PID:1484
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5876 -childID 4 -isForBrowser -prefsHandle 5756 -prefMapHandle 5768 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8e5f2ff9-976c-4f03-8a4c-6feac8efa838} 4804 "\\.\pipe\gecko-crash-server-pipe.4804" tab9⤵PID:1520
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5856 -childID 5 -isForBrowser -prefsHandle 6048 -prefMapHandle 6052 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cb06348a-8750-40fa-9346-922fa70e30be} 4804 "\\.\pipe\gecko-crash-server-pipe.4804" tab9⤵PID:1396
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013415001\294ae191f7.exe"C:\Users\Admin\AppData\Local\Temp\1013415001\294ae191f7.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5060
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2l4577.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2l4577.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1200 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1200 -s 16085⤵
- Program crash
PID:396
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3X53c.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3X53c.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4604
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4o767n.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4o767n.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2668
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1200 -ip 12001⤵PID:3028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4628 -ip 46281⤵PID:1632
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6440
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6984
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\activity-stream.discovery_stream.json.tmp
Filesize18KB
MD57ef452986293a3243738bd10c888934a
SHA1f1c8ccd41013a8b63fccdbd11fc518df23a259bd
SHA256b244245555765f08fcd1773b7ac2b550e370fec6c1e0b7fa7092efcdf2b8e558
SHA5129059d9f57a54ce4d9063324ad220e7c2ff1ce81400717e1860e6df53d7130f39826e1dab299332543c39bf99f6b4e61d145f7399ec1b00cb3ed512f4703da172
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD5be2cd466ea65807b5562fcd4ce67b30c
SHA1368524f8b54df5619cd5ee9cb3bf82561b08bd2a
SHA256845183a4d0f32f9b261aba35c27f07f3b852eaba191314c6c2c98c5552c302e5
SHA5122ee2124c3c9f3373d5a8645c6fc82e4d733602b8dc33f27ece9678f092b169ff9a0a657a3438112a3f5ad9e70d1cea4e0d690ca18077882eb75681bfb7cf3add
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
1.8MB
MD59035a7790366c718391f37fd13a52b71
SHA100cffbc4cf948aa8a4a20c535da13b90099da1f7
SHA2567800195f1a9a7e6c04d66b85215f58ca240b9d6bb3f369d1ba8e150b95ae583c
SHA512ef277aab36d4549a26a596dcf93131d9314e23d97ea901a212f9f57f27693baa3ae54fdbd2d7f41197fd94d7e84ca894fc5ddc97ea7f2e77258d347a123ded68
-
Filesize
1.7MB
MD5e113c7c881355590d17b82cdd27e9c7d
SHA1ef5b7dcac182074a561fd2e1fb2eda69ac3a40bf
SHA256e8589e69f99d96c0c35c02ac0bdbb97cf3263855396f0408ec1f52e41d75a49b
SHA5127eb5b668f6f2d517ddbee8928756fe877c971beee8f88801d0a4a0492696a291a19c803ecbb5eb77f31febdfb0187272a3037f48fb527e8334c5dc26abdadbeb
-
Filesize
949KB
MD5aa9538e2609a13b9d70989fee6bf50ef
SHA11aa2cad3d9a5220cc8608f8d2f6ddca625462fcc
SHA256d0eb6c787139e3316220cf40be158d16a40b963b2f40fc06787dae680fa6a5e7
SHA512a1f470a72c42d78eea0a947b794d19084c81d2f90ebf18266b06fa98121daf61eabd1caf2cd0cc8e90e76834b2f8e45cf94435eda869f4b4e5a01774b33795cc
-
Filesize
2.7MB
MD5518449380f5deab6a9fd3c7a88776aa5
SHA16be4e76be6bab115b709f6a7536b32c0f86efff4
SHA256edca3a93ab5834491aa022d568bbc2d0924b3933159fbd193b550aa9ac355c5b
SHA51236d70ec7b4726fa6ec2f92774ce7b547ea89281db76acb498a50be469e63aac977317fef1995526be6c499470490847223edb16b2801a4aae27fd9daf2767664
-
Filesize
2.6MB
MD583b2aa227469cb6b1f61f031b833c86a
SHA1af7cff78b9c660714197541da9daf857e1c48d90
SHA256afd2addba2d713e60ad23b03b5b1d035ff0af26e1153ea01a04ecee3439acde2
SHA512d8a6e2509bd05d1ea21532976e507dd2f3a5640766bbe5f7f7f5560e2438b53260440eeb76a3ee9dd63943ed6aa0826095006b11298f124f161ee9434cb59979
-
Filesize
5.4MB
MD5f2eb143bac76496a4b6a33a67d6175e1
SHA1d6b3194c0e1be510e1e86ee806b6caa5550bbe62
SHA256bb816d71905034c8d4928d7e60b055a24ae2882869f7dde03e97bcf6dafd8d7b
SHA51226f92d0ba8df9d62b5889fb6b4436597446ad370c2495187a4ab020fda175c63d0e7dafd34ba7966f8ff1194c1025da04ac217f73cbbaaf425e18e1dbab338d7
-
Filesize
1.7MB
MD596e99da216000a05f217d3f9062b53b3
SHA121de04b8db36227859b13698e340dc59001782b9
SHA256ae6b5e2426b3acaeae058ac76fcbf04d21eb0e5954309393fca663827bb775da
SHA512fd4a62e018a569167967a01c8651809126929009849ecb6a56c9bee21a7fd357081703efcaf485035d86b0d158fc7750b494ba57e9eba4df2e33f934117d7939
-
Filesize
3.6MB
MD53fa16bdd99114f8409d2ecdcf893ba58
SHA17d5499670ddca1afd304c9cc1bb00f2fa20bfedf
SHA256a9ee969f44aa71f7977ef3a2197e95ca06ab2947483ebb0efab749308426a771
SHA51264866e6332199562eae6257ca11d5d137859abeaaf27fccb57a9a2660af1a055d22f575017a001f1302d7752f934dc5511604ee3691e491ab5f1cc70fe71c2d3
-
Filesize
3.1MB
MD59f55b56814015f22fb5a9068a1bac402
SHA1792bfa57fd0d50e1c004044f63cd8b71f7427858
SHA2563cd15e8fff1b3254d98a2d7d6c4d41393434d43e07e5f51833e0dbaf4719158a
SHA51236ca2735c17bdbd72c86d4b7f0c38e6f70098c107840c17772f17f5235f03a4cafab1a8952b125509b68a3e49bc36bb1f58b63eb7f90d07c561f1ab0c8719933
-
Filesize
1.8MB
MD5c21182b71e3fdd1bc9cf2581cc28a329
SHA14134b01e41e3c5867e4a42e735daab965aa51cfb
SHA256e5d81f8b678103832260b0ad22972a6c28ae74d2d9ea26acb62f170497a5a96a
SHA5128890121a031f5a7e2e96284b1a9222b36f290946ba03a42d4346325c78448d09d900bae3b33c500f8707cdddfa305b57a3d11a61f20d45ec8cfbd3f654ca89f9
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\AlternateServices.bin
Filesize6KB
MD5a3629346eea4133213c1ace33019a942
SHA1144095ade54442ba27c33560a9b044a79db6c807
SHA256cfbfaee0058f41ff57116e0850f901290ab671fabf8cc08682a04193148b5591
SHA5121ca69f5f366568e9a30b0ead271fabe6e70aa2c59b22ac2ff9693e4971edf63319feafc9f060c5637114db5b688e93cfdf3109fd0d8a0694d817c3a6addcaa69
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\AlternateServices.bin
Filesize18KB
MD59311712a92a28d2c02d8828f6be84c05
SHA12ee0d9a6776b0efead8062f04f9bb3ad57e7bab9
SHA256f47408406feee45a7dc19d47bd19ed31f775dba232c6434349a554e72be60344
SHA5121aa2fed91f885e763af8b42e7d67e59987ab9b158edecbe3aad7070ab90f71c947216961d274130d5c94129acd60ab13febcf8e4d60f88210e9f563e3590762f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\AlternateServices.bin
Filesize10KB
MD5f1a80c8f406cb3a82a55b060e20d7ab4
SHA1af9b3554709b5d77b04dea9f09f1a4bdb480e0ad
SHA256abee2d2a8e119a644ce75749ae8751fe694b30a6420a5609bbbf60669764267e
SHA512cbe1f0dea158c82e298065ced3f4020fc495c8ffc262b7e9d9350882a49a59d69bce79b49e37366ba90df58c357d2f6bc90080fcdc6e1b06e163fe15f6b9724e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.bin
Filesize23KB
MD50b170bd12000634e23111c3c40d124f6
SHA16f50d5937ffab1f80f2b1157de2e80af876be4a0
SHA256dd7853d96d75925b6b4bbcf5f4c31a0de195db27408ff757eb2b6cbaa3c8efeb
SHA51276452a86149a62492d612519de9e512acb5057600205d817b57570c3c4877335359412f5ceb37cd90b4c1cda2f98532a088bef06378d27ed82189838b984e8f7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.bin
Filesize5KB
MD580aea78520a4262afd67b9988779c237
SHA12f34386c07839c3dbdbbbe29f2ea56d1d01658af
SHA2561bb050b7203aefa9e94968d01eafb6c0e0e1ec55257b2d47b54b240f13b9cd6d
SHA512801a7992bafc76a461b927634971bcb3802e17f4764c9c367c8656c2ac81b261a0b5519b1fe923cd9417885b048a046e477941318d5d74d2ad09eb6f59d65c6d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.bin
Filesize6KB
MD558168ac036c7a4e11c60508e53257c89
SHA11066f25e5877ee64308f3746f460c58085a245c9
SHA256a435afc5464642c1ff37c8ed4888d4e40b6e1b511f442f23fb1b957384c90916
SHA512525b8bde9eef5a80ccf28cb1dd30e232302f42b531ccda9245c2907f4e70031e6472d27ba19f3d999f2618a8f0f94afe66362cb60f374f8ddbe231841aefc1d5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.bin
Filesize15KB
MD59814d77e9ce219b2751064f2fc40019f
SHA183170f49c1bb8ddc688debf5d6abb57c0c252d72
SHA2561a8d33a7c044031e2c490d8ec693239321c52240e2a30ee3a023d8f90045fa6e
SHA512b86991c5baec8007057f141280ad4ac658914dc9fc660ed61f795e07b95cf6e2e62ebcc7c4ceb0ec0ede0b127cdd568f55a9fdcf7ddb4790b5be77925a261acc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.bin
Filesize15KB
MD5e08eabf2968493c57bb755ca22fb7144
SHA1514dc27ac34a53ba1fd191bd263c8704892b08b3
SHA256b1c1819b315027a418ccbe2e0776c5e352916ac70c738de4add5611b31955f5d
SHA512932d55f346bfe43188033f1c67c09d7d174da9c108478ddc9c2debd183a0af20a8466517620206599a22a47d7bc1593ba34af36c4e7eb33de5e75e199a0524bd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5c8645f4f3653ad36843b1bfcb3ba8bf1
SHA10e6f5c5e8576e389b4f8a6d1851bc76aa1068d5a
SHA256e873ebb132781c440346610727b94bc4987e088da4e0a5a2644304e76317fd97
SHA512691e5778288a1ceca9b3d22bd7da876605407a73d4d76a929f7e9067798733d2422a6ee482a0217a60e5d5dd6e1a9478d95124c5bbc64b79f429147af70ef9bf
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD59b33986e0bab1f4a669a9eb5d2265dff
SHA17a4b986af72cbd618612e891fc30b8884b0b8fdc
SHA256ab3e0b4e36d3d69a9396fd34a604e19418df092032d44e2cd973b5471d3126b0
SHA512ac6eafc319f58bca278d4b90475d2f3f8b9233b6276ab81cb58775c36b0bb4a11194fffc530afe841d52f49bca54a07c8c9fe7b4eafac6716e403677e581ea26
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5789a7ea85fd5e8784944f124c7fb04b2
SHA1992bb52c023688c42dc22eaa413a64f187642dde
SHA2566f81ed71ae3a6ff0f20b79124b5179f5b203964f074f870ca46365e377caab28
SHA512c238c97c270fb466990e138327e8734ead3f3cf22ed763e205d7f426dd6207c4aed0091ff2bd4d9c91fcdf700c14bf6061345e21f44a9d54882138fec39a2192
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD55e14836b84802667ebd67b92714b0a41
SHA12e1f0989930188169ecd316c7e609fe4cca6c4ed
SHA2565cdad7c11b5977eb3927b1eeff2558fa52ca99e2a91c4792ebf34326c74e90b6
SHA51235f2c1b390ac5f02113636af0e5fb0f62ccd0deb86a42594e81d035343833e59b66a51886b2add54d723089cc789f2cdf4b43fa43d9d0e31fba796445373692b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5781b49fe4107c21ea1da2608e9fbe21a
SHA1d1e75d3afc055d9f3af75a024aa87f4d199270bf
SHA256dd17f074065abe0283f9f36345063e24054adf91e1825e068ac9ca79be0db210
SHA5123d919a4f0572f483a62c8c2866e4d29b1ff39ed70f030d177669c8972b20834fb9ef9177bb630ce1223b5b5c22424b4d1bd87db6c689e255091507a536c8844e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5a4e3f3cfdc10edc528c53285d7612b5d
SHA173ecdb61d5bf49bad1d5c767890b919c96b6a159
SHA256157d3a7bb2f0c5e34a88a6262b0f130e6f879a46f62fb38ea0468dba340d7eb1
SHA512904c50dae7f45cd241039e33ea11d4b7dde608d558c974e110654f3e16e16b08a87629a77e72b10011df5554a67afa46e982c48aa4e860f3e941411556bee687
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\00c9ca98-15b8-473b-90b3-aced842e4803
Filesize982B
MD5cc28e235da159da72a4cdfd1db3e6df1
SHA1a6b853f7b1d5ce5000ed1642326e69fe117fabb8
SHA256ac03d625aca2d38d15c84a764ae37c2973a9a3c78ab43e42497ccac4123e0f4e
SHA51247813b1ebd95f89627d0a493e427328f7cc45ec7abc1d8fe20638a313ce00aefebdf12ea1ca260042a458eba77af53a26797855d0ec7fce73f87dcc7a2051f38
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\04ad9ad1-0129-4822-b029-f5ab0dc71acd
Filesize671B
MD553ecd56ed928984fa9abb5a158579692
SHA180c5ca4da0c66d1a31529b18d0713a3b7e691edc
SHA25621982f4b1755c996235c77e668891d35cab3c0e8850d8f6b62985a03f6c52c42
SHA512f695acb8a69bc9bee31b0feed08e9b5c419e5e80e22b0af70d3cff46cbcfc159f8c20116f8c48dfcfb4038c98ff0938252a8123ca1d81cfcca37c129eca96b3c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\f3eed83c-b6ce-4575-8e9a-eb0ebf097909
Filesize28KB
MD51e4cf36cae6ffa12f761cd49ddc533ad
SHA1beef32cc4ed58c945770ab25a5ebf254173c0644
SHA256bfd6600d68f1f16771e5e9d73399f5a0d5b03763c734a415a489b82ef141e30d
SHA5128cd3c0da55d1a58deee48e9882a1e4ae12f7e9b468d9bd34bc5fdbb8619140b17631f974aa4ae85e9be533787db5bf7b057d33475162bc9d663c1b3de36356ec
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD5e71b737328eab83074c8aad3a2fbc170
SHA12cfab1ef1648b977d8d63575eea9b462e48949db
SHA256c5ff08a1a434516953ba83bfed14dfe38d2dbce833f069056eb4b07e4fe647f5
SHA5126793d3fb8bfd76ab8a1087bcbbcc82120b4b3f7d15f95705fd488ddbe261f845cc55c6dccc8d0d9ddb7773e8f0c1accd3c20ad3211c5c6feac4a519dc02e439c
-
Filesize
12KB
MD57032c4f5e6413a085e02d775b91436c2
SHA19d0810ae89bb368a0f09c2383db1694d35cb8ae4
SHA2565e20a5cbb7d9487ade4d67ca1e20bfc06accfaa75ba444268d51169275a18b24
SHA5121f742613e17197d6efaa260df03f28894a8ff8377d9bf289eaf8c34142a286de301a8309e7b7171d67f28a3978d599d1a9c99f409a3aa0f74d2918afc9c46f7d
-
Filesize
15KB
MD56fd640769fd9afca4d857a082c60c9ef
SHA1d925cff59ad8156f5e8d1c8ba69a77ccb30879b0
SHA2560f9c032ae6a3c89bd9a4903b2e6994cf925f9b180dc70fbf9f32ff3151f14731
SHA512995c6cac780326fe1f359372c341c19da89fd1986c7843df8cd384226590b38d67dcace0699272cd2a24ac0f7937575811034d59d808f669e1c6c69b3fb594ae
-
Filesize
10KB
MD51044ba2163cb7cd4626d9f8d42ba2fc0
SHA122782e4f5acd7b8e262a6b210f27136ec122e3cc
SHA256fa1ce16d3a93c12d781bbcd7016f72244fefaae95cc665d56c21844185ae5035
SHA512da72aeb5cae266d47b4c68ce2f31893bcaac9a7add47f08e6f46bc0f3ad90212110433fe59861d062104304acfc77cd1e70db0364a262d36d72b39e579d67195
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize3.1MB
MD56be4a1bf462fa0ddf78980bf8cc16c33
SHA19ed16bc7e513df8b79623f7e7ec5140196fa2560
SHA2567f7f987f84cf3e208171e5b1ea3791a3e2be202967554ddf69d615589f507660
SHA512efec2ec3cd39b57f3681bb8c07e0880ad96fe4deacfb906e92e33337b03fd43a9dfe6de083bfef981b413476b05c83e761132f830b829ac9d1da7d381aee6142