Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-12-2024 21:32
Static task
static1
General
-
Target
3cd15e8fff1b3254d98a2d7d6c4d41393434d43e07e5f51833e0dbaf4719158a.exe
-
Size
3.1MB
-
MD5
9f55b56814015f22fb5a9068a1bac402
-
SHA1
792bfa57fd0d50e1c004044f63cd8b71f7427858
-
SHA256
3cd15e8fff1b3254d98a2d7d6c4d41393434d43e07e5f51833e0dbaf4719158a
-
SHA512
36ca2735c17bdbd72c86d4b7f0c38e6f70098c107840c17772f17f5235f03a4cafab1a8952b125509b68a3e49bc36bb1f58b63eb7f90d07c561f1ab0c8719933
-
SSDEEP
98304:XUG+Xz5Bd651tNRcJFCdUO53E0bBviHQbF:XbQ7Jc3Zbk
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
205.209.109.10:4449
205.209.109.10:7723
clgbfqzkkypxjps
-
delay
1
-
install
false
-
install_folder
%AppData%
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
https://atten-supporse.biz/api
Extracted
lumma
https://atten-supporse.biz/api
https://covery-mover.biz/api
Signatures
-
Amadey family
-
Asyncrat family
-
Gcleaner family
-
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection fa2ae94647.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" fa2ae94647.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" fa2ae94647.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" fa2ae94647.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" fa2ae94647.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" fa2ae94647.exe -
Stealc family
-
resource yara_rule behavioral1/memory/2408-53-0x00000000003F0000-0x0000000000852000-memory.dmp VenomRAT behavioral1/memory/2408-54-0x00000000003F0000-0x0000000000852000-memory.dmp VenomRAT -
Venomrat family
-
Async RAT payload 2 IoCs
resource yara_rule behavioral1/memory/2408-53-0x00000000003F0000-0x0000000000852000-memory.dmp family_asyncrat behavioral1/memory/2408-54-0x00000000003F0000-0x0000000000852000-memory.dmp family_asyncrat -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3cd15e8fff1b3254d98a2d7d6c4d41393434d43e07e5f51833e0dbaf4719158a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ H3tyh96.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3EUEYgl.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0421d5b3fc.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 36322d8bf7.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ fa2ae94647.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d0ff59fbd6.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0421d5b3fc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion fa2ae94647.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3cd15e8fff1b3254d98a2d7d6c4d41393434d43e07e5f51833e0dbaf4719158a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3EUEYgl.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d0ff59fbd6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion H3tyh96.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion H3tyh96.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3EUEYgl.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 36322d8bf7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 36322d8bf7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion fa2ae94647.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3cd15e8fff1b3254d98a2d7d6c4d41393434d43e07e5f51833e0dbaf4719158a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0421d5b3fc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d0ff59fbd6.exe -
Executes dropped EXE 10 IoCs
pid Process 2732 skotes.exe 2408 H3tyh96.exe 2516 yiklfON.exe 404 3EUEYgl.exe 2456 4f6c72a03d.exe 2868 0421d5b3fc.exe 1496 36322d8bf7.exe 1404 2ff7d1383d.exe 1564 fa2ae94647.exe 3588 d0ff59fbd6.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine d0ff59fbd6.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine 3cd15e8fff1b3254d98a2d7d6c4d41393434d43e07e5f51833e0dbaf4719158a.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine H3tyh96.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine 3EUEYgl.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine 0421d5b3fc.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine 36322d8bf7.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine fa2ae94647.exe -
Loads dropped DLL 17 IoCs
pid Process 2344 3cd15e8fff1b3254d98a2d7d6c4d41393434d43e07e5f51833e0dbaf4719158a.exe 2344 3cd15e8fff1b3254d98a2d7d6c4d41393434d43e07e5f51833e0dbaf4719158a.exe 2732 skotes.exe 2732 skotes.exe 2732 skotes.exe 2732 skotes.exe 2732 skotes.exe 2732 skotes.exe 2732 skotes.exe 2732 skotes.exe 2732 skotes.exe 2732 skotes.exe 2732 skotes.exe 2732 skotes.exe 2732 skotes.exe 2732 skotes.exe 3588 d0ff59fbd6.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features fa2ae94647.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" fa2ae94647.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\0421d5b3fc.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013818001\\0421d5b3fc.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\36322d8bf7.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013819001\\36322d8bf7.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\2ff7d1383d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013820001\\2ff7d1383d.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\fa2ae94647.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013821001\\fa2ae94647.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x00050000000193a4-370.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 2344 3cd15e8fff1b3254d98a2d7d6c4d41393434d43e07e5f51833e0dbaf4719158a.exe 2732 skotes.exe 2408 H3tyh96.exe 404 3EUEYgl.exe 2868 0421d5b3fc.exe 1496 36322d8bf7.exe 1564 fa2ae94647.exe 3588 d0ff59fbd6.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 3cd15e8fff1b3254d98a2d7d6c4d41393434d43e07e5f51833e0dbaf4719158a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 20 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yiklfON.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d0ff59fbd6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language H3tyh96.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 2ff7d1383d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3cd15e8fff1b3254d98a2d7d6c4d41393434d43e07e5f51833e0dbaf4719158a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3EUEYgl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0421d5b3fc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 36322d8bf7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2ff7d1383d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 2ff7d1383d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4f6c72a03d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fa2ae94647.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3EUEYgl.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3EUEYgl.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3028 timeout.exe -
Kills process with taskkill 5 IoCs
pid Process 1724 taskkill.exe 1300 taskkill.exe 2804 taskkill.exe 2572 taskkill.exe 1672 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_Classes\Local Settings firefox.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 3EUEYgl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 0421d5b3fc.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 0421d5b3fc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 3EUEYgl.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 3EUEYgl.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 2344 3cd15e8fff1b3254d98a2d7d6c4d41393434d43e07e5f51833e0dbaf4719158a.exe 2732 skotes.exe 2408 H3tyh96.exe 2408 H3tyh96.exe 2408 H3tyh96.exe 404 3EUEYgl.exe 2408 H3tyh96.exe 404 3EUEYgl.exe 2868 0421d5b3fc.exe 1496 36322d8bf7.exe 2408 H3tyh96.exe 1404 2ff7d1383d.exe 1564 fa2ae94647.exe 1564 fa2ae94647.exe 1564 fa2ae94647.exe 1404 2ff7d1383d.exe 1404 2ff7d1383d.exe 3588 d0ff59fbd6.exe 3588 d0ff59fbd6.exe 2408 H3tyh96.exe 2408 H3tyh96.exe 2408 H3tyh96.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 2408 H3tyh96.exe Token: SeDebugPrivilege 1724 taskkill.exe Token: SeDebugPrivilege 1300 taskkill.exe Token: SeDebugPrivilege 2804 taskkill.exe Token: SeDebugPrivilege 2572 taskkill.exe Token: SeDebugPrivilege 1672 taskkill.exe Token: SeDebugPrivilege 1564 fa2ae94647.exe Token: SeDebugPrivilege 980 firefox.exe Token: SeDebugPrivilege 980 firefox.exe -
Suspicious use of FindShellTrayWindow 21 IoCs
pid Process 2344 3cd15e8fff1b3254d98a2d7d6c4d41393434d43e07e5f51833e0dbaf4719158a.exe 1404 2ff7d1383d.exe 1404 2ff7d1383d.exe 1404 2ff7d1383d.exe 1404 2ff7d1383d.exe 1404 2ff7d1383d.exe 1404 2ff7d1383d.exe 1404 2ff7d1383d.exe 1404 2ff7d1383d.exe 1404 2ff7d1383d.exe 1404 2ff7d1383d.exe 1404 2ff7d1383d.exe 1404 2ff7d1383d.exe 980 firefox.exe 980 firefox.exe 980 firefox.exe 980 firefox.exe 1404 2ff7d1383d.exe 1404 2ff7d1383d.exe 1404 2ff7d1383d.exe 1404 2ff7d1383d.exe -
Suspicious use of SendNotifyMessage 19 IoCs
pid Process 1404 2ff7d1383d.exe 1404 2ff7d1383d.exe 1404 2ff7d1383d.exe 1404 2ff7d1383d.exe 1404 2ff7d1383d.exe 1404 2ff7d1383d.exe 1404 2ff7d1383d.exe 1404 2ff7d1383d.exe 1404 2ff7d1383d.exe 1404 2ff7d1383d.exe 1404 2ff7d1383d.exe 1404 2ff7d1383d.exe 980 firefox.exe 980 firefox.exe 980 firefox.exe 1404 2ff7d1383d.exe 1404 2ff7d1383d.exe 1404 2ff7d1383d.exe 1404 2ff7d1383d.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2408 H3tyh96.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2344 wrote to memory of 2732 2344 3cd15e8fff1b3254d98a2d7d6c4d41393434d43e07e5f51833e0dbaf4719158a.exe 30 PID 2344 wrote to memory of 2732 2344 3cd15e8fff1b3254d98a2d7d6c4d41393434d43e07e5f51833e0dbaf4719158a.exe 30 PID 2344 wrote to memory of 2732 2344 3cd15e8fff1b3254d98a2d7d6c4d41393434d43e07e5f51833e0dbaf4719158a.exe 30 PID 2344 wrote to memory of 2732 2344 3cd15e8fff1b3254d98a2d7d6c4d41393434d43e07e5f51833e0dbaf4719158a.exe 30 PID 2732 wrote to memory of 2408 2732 skotes.exe 33 PID 2732 wrote to memory of 2408 2732 skotes.exe 33 PID 2732 wrote to memory of 2408 2732 skotes.exe 33 PID 2732 wrote to memory of 2408 2732 skotes.exe 33 PID 2732 wrote to memory of 2516 2732 skotes.exe 34 PID 2732 wrote to memory of 2516 2732 skotes.exe 34 PID 2732 wrote to memory of 2516 2732 skotes.exe 34 PID 2732 wrote to memory of 2516 2732 skotes.exe 34 PID 2732 wrote to memory of 404 2732 skotes.exe 36 PID 2732 wrote to memory of 404 2732 skotes.exe 36 PID 2732 wrote to memory of 404 2732 skotes.exe 36 PID 2732 wrote to memory of 404 2732 skotes.exe 36 PID 404 wrote to memory of 2156 404 3EUEYgl.exe 38 PID 404 wrote to memory of 2156 404 3EUEYgl.exe 38 PID 404 wrote to memory of 2156 404 3EUEYgl.exe 38 PID 404 wrote to memory of 2156 404 3EUEYgl.exe 38 PID 2156 wrote to memory of 3028 2156 cmd.exe 40 PID 2156 wrote to memory of 3028 2156 cmd.exe 40 PID 2156 wrote to memory of 3028 2156 cmd.exe 40 PID 2156 wrote to memory of 3028 2156 cmd.exe 40 PID 2732 wrote to memory of 2456 2732 skotes.exe 41 PID 2732 wrote to memory of 2456 2732 skotes.exe 41 PID 2732 wrote to memory of 2456 2732 skotes.exe 41 PID 2732 wrote to memory of 2456 2732 skotes.exe 41 PID 2732 wrote to memory of 2868 2732 skotes.exe 42 PID 2732 wrote to memory of 2868 2732 skotes.exe 42 PID 2732 wrote to memory of 2868 2732 skotes.exe 42 PID 2732 wrote to memory of 2868 2732 skotes.exe 42 PID 2732 wrote to memory of 1496 2732 skotes.exe 43 PID 2732 wrote to memory of 1496 2732 skotes.exe 43 PID 2732 wrote to memory of 1496 2732 skotes.exe 43 PID 2732 wrote to memory of 1496 2732 skotes.exe 43 PID 2732 wrote to memory of 1404 2732 skotes.exe 44 PID 2732 wrote to memory of 1404 2732 skotes.exe 44 PID 2732 wrote to memory of 1404 2732 skotes.exe 44 PID 2732 wrote to memory of 1404 2732 skotes.exe 44 PID 1404 wrote to memory of 1724 1404 2ff7d1383d.exe 45 PID 1404 wrote to memory of 1724 1404 2ff7d1383d.exe 45 PID 1404 wrote to memory of 1724 1404 2ff7d1383d.exe 45 PID 1404 wrote to memory of 1724 1404 2ff7d1383d.exe 45 PID 2732 wrote to memory of 1564 2732 skotes.exe 48 PID 2732 wrote to memory of 1564 2732 skotes.exe 48 PID 2732 wrote to memory of 1564 2732 skotes.exe 48 PID 2732 wrote to memory of 1564 2732 skotes.exe 48 PID 1404 wrote to memory of 1300 1404 2ff7d1383d.exe 49 PID 1404 wrote to memory of 1300 1404 2ff7d1383d.exe 49 PID 1404 wrote to memory of 1300 1404 2ff7d1383d.exe 49 PID 1404 wrote to memory of 1300 1404 2ff7d1383d.exe 49 PID 1404 wrote to memory of 2804 1404 2ff7d1383d.exe 51 PID 1404 wrote to memory of 2804 1404 2ff7d1383d.exe 51 PID 1404 wrote to memory of 2804 1404 2ff7d1383d.exe 51 PID 1404 wrote to memory of 2804 1404 2ff7d1383d.exe 51 PID 1404 wrote to memory of 2572 1404 2ff7d1383d.exe 53 PID 1404 wrote to memory of 2572 1404 2ff7d1383d.exe 53 PID 1404 wrote to memory of 2572 1404 2ff7d1383d.exe 53 PID 1404 wrote to memory of 2572 1404 2ff7d1383d.exe 53 PID 1404 wrote to memory of 1672 1404 2ff7d1383d.exe 55 PID 1404 wrote to memory of 1672 1404 2ff7d1383d.exe 55 PID 1404 wrote to memory of 1672 1404 2ff7d1383d.exe 55 PID 1404 wrote to memory of 1672 1404 2ff7d1383d.exe 55 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\3cd15e8fff1b3254d98a2d7d6c4d41393434d43e07e5f51833e0dbaf4719158a.exe"C:\Users\Admin\AppData\Local\Temp\3cd15e8fff1b3254d98a2d7d6c4d41393434d43e07e5f51833e0dbaf4719158a.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\1013675001\H3tyh96.exe"C:\Users\Admin\AppData\Local\Temp\1013675001\H3tyh96.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2408
-
-
C:\Users\Admin\AppData\Local\Temp\1013765001\yiklfON.exe"C:\Users\Admin\AppData\Local\Temp\1013765001\yiklfON.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2516
-
-
C:\Users\Admin\AppData\Local\Temp\1013771001\3EUEYgl.exe"C:\Users\Admin\AppData\Local\Temp\1013771001\3EUEYgl.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\1013771001\3EUEYgl.exe" & rd /s /q "C:\ProgramData\7YMOHDTJW4EU" & exit4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\SysWOW64\timeout.exetimeout /t 105⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:3028
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013817001\4f6c72a03d.exe"C:\Users\Admin\AppData\Local\Temp\1013817001\4f6c72a03d.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2456
-
-
C:\Users\Admin\AppData\Local\Temp\1013818001\0421d5b3fc.exe"C:\Users\Admin\AppData\Local\Temp\1013818001\0421d5b3fc.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:2868
-
-
C:\Users\Admin\AppData\Local\Temp\1013819001\36322d8bf7.exe"C:\Users\Admin\AppData\Local\Temp\1013819001\36322d8bf7.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1496
-
-
C:\Users\Admin\AppData\Local\Temp\1013820001\2ff7d1383d.exe"C:\Users\Admin\AppData\Local\Temp\1013820001\2ff7d1383d.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1724
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1300
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2804
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2572
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1672
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:2140
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:980 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="980.0.926296952\1032794748" -parentBuildID 20221007134813 -prefsHandle 1224 -prefMapHandle 1136 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {6224779d-afdd-47a1-8fc1-fdf0e000cb10} 980 "\\.\pipe\gecko-crash-server-pipe.980" 1336 ffd5858 gpu6⤵PID:2808
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="980.1.337681055\905304176" -parentBuildID 20221007134813 -prefsHandle 1516 -prefMapHandle 1512 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a9d33df7-7720-490c-8993-4c3bee454608} 980 "\\.\pipe\gecko-crash-server-pipe.980" 1544 41ed658 socket6⤵PID:2308
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="980.2.173231628\85702975" -childID 1 -isForBrowser -prefsHandle 2148 -prefMapHandle 2144 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 572 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e71a5930-5931-4979-975b-8315dd1eb095} 980 "\\.\pipe\gecko-crash-server-pipe.980" 2160 19c6cf58 tab6⤵PID:2636
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="980.3.472879226\777666543" -childID 2 -isForBrowser -prefsHandle 2848 -prefMapHandle 2844 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 572 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {79a46584-3388-471d-a240-0b442b687bf3} 980 "\\.\pipe\gecko-crash-server-pipe.980" 2860 e63f58 tab6⤵PID:1860
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="980.4.445005638\1104244818" -childID 3 -isForBrowser -prefsHandle 1080 -prefMapHandle 1072 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 572 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {3ac3a610-2641-47bc-9aa1-0847b8c05a3a} 980 "\\.\pipe\gecko-crash-server-pipe.980" 3444 1768fc58 tab6⤵PID:768
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="980.5.38731733\821712362" -childID 4 -isForBrowser -prefsHandle 3656 -prefMapHandle 3728 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 572 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b3280af3-cdda-4bb3-aabe-a4e6c5d32c54} 980 "\\.\pipe\gecko-crash-server-pipe.980" 3828 1f005f58 tab6⤵PID:2676
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="980.6.355920687\474564398" -childID 5 -isForBrowser -prefsHandle 3944 -prefMapHandle 3948 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 572 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {06c903ac-9bba-47e7-8c3e-cbfa904aadab} 980 "\\.\pipe\gecko-crash-server-pipe.980" 3932 1f006e58 tab6⤵PID:1224
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013821001\fa2ae94647.exe"C:\Users\Admin\AppData\Local\Temp\1013821001\fa2ae94647.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1564
-
-
C:\Users\Admin\AppData\Local\Temp\1013822001\d0ff59fbd6.exe"C:\Users\Admin\AppData\Local\Temp\1013822001\d0ff59fbd6.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3588
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\633SXO0D\download[1].htm
Filesize1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\1009pdhg.default-release\activity-stream.discovery_stream.json.tmp
Filesize26KB
MD5c08db4d602591822cebf9e5de58188ee
SHA1cb6367860777475b4ab3cbd0f347a52f55c34e9b
SHA256a89e40647517df8a23b985da0340b73d80d3cd0e782826e6460af89d43c3e63b
SHA512a0bc76072c5efa7ee6342dc916f8f0680c1d2ca5920ed61b74a298fcda17df1dfd9e393c8116c9e39db1bbc8faffe5df3f8015648c1a05d1753acf3e1a352d12
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\1009pdhg.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
1.7MB
MD540f8c17c136d4dc83b130c9467cf6dcc
SHA1e9b6049aa7da0af9718f2f4ae91653d9bac403bb
SHA256cafb60920939bd2079d96f2e6e73f87632bc15bd72998f864e8968f7aab9623b
SHA5126760a0752957535ec45ce3307e31569ac263eb73157d6a424d6e30647651a4e93db7c0378028d9e0ce07e65a357d2bb81047064ccda2f6a13fa7402ee7794c2d
-
Filesize
7.4MB
MD5d71d031f039f8fb153488c26fb7d410f
SHA15b15fd6f94bdbb35ecd02bf9aa51912d698ebf45
SHA25636541a0e062085fed175a4a5eae45aa9e3563fff4a816a1bffa1b2c6f8280e5b
SHA512d97c801c73f14ae20b11529d0b0f58afc3981d92bd00f88dda59881f24d89d3b325a8c61b88adc77753cebb1c320afc64af7522c61c34b2a4916b13bddc278cf
-
Filesize
1.8MB
MD53b8b3018e3283830627249d26305419d
SHA140fa5ef5594f9e32810c023aba5b6b8cea82f680
SHA256258e444e78225f74d47ba4698d49a33e6d1f6ed1f3f710186be426078e2bf1cb
SHA5122e9a42e53406446b503f150abfa16b994ee34211830d14ccbfbf52d86019dc5cca95c40222e5c6aed910c90988f999560ff972c575f9c207d7834abba6f04aa0
-
Filesize
2.5MB
MD52a78ce9f3872f5e591d643459cabe476
SHA19ac947dfc71a868bc9c2eb2bd78dfb433067682e
SHA25621a2ac44acd7a640735870eebfd04b8dc57bc66877cb5be3b929299e86a43dae
SHA51203e2cd8161a1394ee535a2ea7d197791ab715d69a02ffab98121ec5ac8150d2b17a9a32a59307042c4bbeffad7425b55efa047651de6ed39277dba80711454f9
-
Filesize
1.7MB
MD590dce1932dcde8d949d1db24db4f8435
SHA11bfe974d937500266c7aa9b11ca7c6b84d61d060
SHA256c69cbf09846c2784e868d9bf59fe7f99345cf5d6d27fcbb4c8e7900e3f5e0869
SHA512cdb75fbe28983f84d03be6257ebbbc888202e6b13f0174bfa165149ec6332e8163338f30a10ef7941c960b5534ae9d6bdc7ec778aab811e001138cd814b088be
-
Filesize
1.7MB
MD5940119fb4a1811bf4b96148780249480
SHA110aa2e4f4f3274f0e3565058e61a99e2d5d01480
SHA256b01ded9a55443ccdc5f4f883197cf5ccbcaea96733d172f70e1c8c94fd8af6e7
SHA512006b24a4f63305d923e1f8455f751f85786e41300b5abf5c45900b23c643f60b3a61e05f8b851f65876b5c3e5cddda51a4e1fde00de65e2c7f411f9fe2819c71
-
Filesize
948KB
MD527e9770fd075f0b6b7dfaea7e2043da1
SHA11c9d1440bbf6b36e85145a3c2578aa49a890c993
SHA256f84e4d6470b21157ca301546ef52fa10c7576c4de5e92a400871f6d83547083e
SHA5129d46e085894007c8daae660c3a04615cc5a57aa3dc1977dacabf4137eabaf7d841959c84b6f37d9870e06ef28658524b67091a78b862ea6124448fdac633bfce
-
Filesize
2.7MB
MD56778d98b1d0e2d91d94e691ace705063
SHA18aa1fd9243c2dc618d1e7c227126c0b20d00f008
SHA256797f94d207c02e3a8ddda00c3522547254e5ee69bbe2f39821ef8a3d9b4e6aef
SHA512512f725d9b2db551adc60d23b6a1eeb3bf3249b640d651916cec482cafd3a418ce9363a1168beb1a6719abf67813a03dadfcf74efce411805c1653eee627b062
-
Filesize
1.9MB
MD5fcf0bc8b1fa8d11d7b4deb6d36984b04
SHA168adab1a3267460eef1969d6e8b8a573c2f8213e
SHA256ab9d97632285feeeb86e9cb6cb54513704469d3b5eb6501b27a07f0215d2a00a
SHA51289116a34ade27747f1915643761bc071df8b00227cfd56633e54278c1d07991b25b9766c71ca359ed9ffb3439f5c2b7ec4d96b891c9c0b91c167afc167f2951c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
442KB
MD585430baed3398695717b0263807cf97c
SHA1fffbee923cea216f50fce5d54219a188a5100f41
SHA256a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA51206511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1
-
Filesize
8.0MB
MD5a01c5ecd6108350ae23d2cddf0e77c17
SHA1c6ac28a2cd979f1f9a75d56271821d5ff665e2b6
SHA256345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42
SHA512b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD52faf8263681f07fc52bf4b254bf061f1
SHA1b5e5f0188b5c8f46a1c61df04e495cd7b069e391
SHA2566b6c51ef739aaeeabc5d370f3724010fe84c4654dcbe4df5f84c6c872f391615
SHA5123fa74494eab75aa494a9b48b827fa978bc08e9ec7aea35645697925d9680b09698e597bc90de5216d20baeea68d8f82d0baae1a1545edb32590440340c59cc20
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\datareporting\glean\pending_pings\4bf04903-befc-4954-b9bc-5fbc5c0e82d9
Filesize745B
MD551bc195bd0e06de5fd7054832a820f50
SHA1d79ac9b213bf1e98f00d74eb74f42370c0ae2d04
SHA256727dad814a3f2114f16c555a85a05dfd10b9e2b76e66e2992acb0339070ff556
SHA512cd8de374029265ee5dc0e67d26278467d1cea01099d09ccefefb6170722acf31367df86d4d473d5377d58f300ef135dd5e366e098a2030b1dd8966229d9fa457
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\datareporting\glean\pending_pings\688d438e-9763-4919-8c90-e51b0aaf553b
Filesize11KB
MD524249144973a90ae5dc0d2cf02697a1d
SHA16b6649a1eec4588e4e52248e655d413d2546edd0
SHA2560ef899e0c572387d9e1652a42fdea0c40c4ca9ac5fbb6880508307c6db65aab4
SHA5127f285ec1c879eb6a9357ee67faee08dc359ecca2e05309438d1406dd9c620d4d9eb8e4e375594acb0ead80ed8c8eddac24d37d10074fd86a2be21c84493700f5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll
Filesize997KB
MD5fe3355639648c417e8307c6d051e3e37
SHA1f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA2561ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA5128f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info
Filesize116B
MD53d33cdc0b3d281e67dd52e14435dd04f
SHA14db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json
Filesize372B
MD58be33af717bb1b67fbd61c3f4b807e9e
SHA17cf17656d174d951957ff36810e874a134dd49e0
SHA256e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd
SHA5126125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll
Filesize11.8MB
MD533bf7b0439480effb9fb212efce87b13
SHA1cee50f2745edc6dc291887b6075ca64d716f495a
SHA2568ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e
SHA512d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig
Filesize1KB
MD5937326fead5fd401f6cca9118bd9ade9
SHA14526a57d4ae14ed29b37632c72aef3c408189d91
SHA25668a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81
SHA512b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2
-
Filesize
6KB
MD57ebe61fe94d732f1a698331b8d88e417
SHA1b79cba3ad44c9d2ba2e0d29f544a4b78622a1c9a
SHA2569d0512f7ffd0da8691a78085e2e5e8824d660af2376ee857f1a8ee433f72b01c
SHA5129eceb4e52a929ff4a0f08ad957a130dac76c216685866debcbf7b1ba1a4033ee6de032e0515d14a8a02075227f8a25dc727c5feaeb7dd9c031d40cb9ab7ad615
-
Filesize
7KB
MD5c4d5538f5331ced0ccc3dd1ba83b136c
SHA1f6fd88b347c83da0931c0fe46e420acc08065278
SHA256c283d10872e8e2594840696cbaeaac9251f61b1a8f4e57ba626c6a00fc440032
SHA51285cf7bfea909cfe2cd1c19d751b1ee945d94aee970304b773462e02858192ac662e40f31517858725c215210ac0daf495e9322590735ae9ac7dd9e043e955db7
-
Filesize
7KB
MD543decb46ead67ab87444d4545b06f4e6
SHA18f0ac4c7db1078a070cecc4b850b6545f2689d9c
SHA256dc23c2aaf83f2b368c6325d20df95df65d8e9f97dfdfba9786a4ef98900d5c13
SHA512dd243a651d25b4fc1ea127ca913cfb522752d145a860690c1099b84a797c48d7fcb3a83d7736e5c4c035e066fa908b22f253bcfed6ce1c296059a590f53f5523
-
Filesize
6KB
MD58ea31741d2b0117642f806c28bccadaa
SHA135a9373b7b9e82d9f70e73d632e44b1c1a1e1d56
SHA25659b8ceaeb9c05bcf40a8050efada33cc0708054d1b60b8e4070663529fbbf8ff
SHA512beb75d8386a2bbfba947ecaa799b9416902d681f2dccd9802fcec601c9a96102d484cea5b4822a12dfa8d20de7cd47ac790c75a794272b2dc26afb2964391fd9
-
Filesize
6KB
MD5b4623e36e570b3a138c8015e52c0a7bf
SHA124bbc83251b85cce471be18a28079dd85cc89dda
SHA25618d8ecff16cbe65219d99368e00753b24515df40b37619530924497028800f72
SHA512137388bcc9c9291c05efbb3d13fb4c73cf1bd3a35e0a30fef271a2db7914679dad495d29e7c30c5e3746c52cbaedfc48f5129c6844073425914161c36c353f61
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD5d7676fdded376e7f5a1d7134f29403fd
SHA1a7537dbad9d1e9b5ee4d253bd18c102371e358c4
SHA2564a02e9a24f99ac1482406a3c47758c8fdd3930821ad19b7d07efcb8dc270138f
SHA512912aa49f5f1b9f8462ba9a6751cd5a11eb159930b1ed23fb3b5ca41173ff51fb6805ceb0aea1a448855dc96420b6183187e3152bad99ce70fd3ffb5e03b3839f
-
Filesize
1.4MB
MD5a8cf5621811f7fac55cfe8cb3fa6b9f6
SHA1121356839e8138a03141f5f5856936a85bd2a474
SHA256614a0362ab87cee48d0935b5bb957d539be1d94c6fdeb3fe42fac4fbe182c10c
SHA5124479d951435f222ca7306774002f030972c9f1715d6aaf512fca9420dd79cb6d08240f80129f213851773290254be34f0ff63c7b1f4d554a7db5f84b69e84bdd
-
Filesize
3.1MB
MD59f55b56814015f22fb5a9068a1bac402
SHA1792bfa57fd0d50e1c004044f63cd8b71f7427858
SHA2563cd15e8fff1b3254d98a2d7d6c4d41393434d43e07e5f51833e0dbaf4719158a
SHA51236ca2735c17bdbd72c86d4b7f0c38e6f70098c107840c17772f17f5235f03a4cafab1a8952b125509b68a3e49bc36bb1f58b63eb7f90d07c561f1ab0c8719933