Analysis
-
max time kernel
146s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-12-2024 23:46
Static task
static1
Behavioral task
behavioral1
Sample
74353c3a81ce1d692ac70fb74607a05c8bee2f2e08a524de8222c1f0be935f51.exe
Resource
win10v2004-20241007-en
General
-
Target
74353c3a81ce1d692ac70fb74607a05c8bee2f2e08a524de8222c1f0be935f51.exe
-
Size
7.0MB
-
MD5
200de062afe380d5cfd657c1678d3076
-
SHA1
a0eaa751966264d5f38e852e43aaa6899d141a7c
-
SHA256
74353c3a81ce1d692ac70fb74607a05c8bee2f2e08a524de8222c1f0be935f51
-
SHA512
8dcb05f0c48487780ea007e01afa77246ff7ea64024334c3bd5ac69e923a4fad9dfe27117613200a6dd1f898da6a8e7f560c79f077ef33ed8866d47ae0ade1d0
-
SSDEEP
196608:HlIyLfShvOJiSUjLbmqyOVqdBtU4HRgYovRiFP9VfdE:FIyLLCjL67O8dBtFxg9QnFS
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
https://atten-supporse.biz/api
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
xworm
5.0
127.0.0.1:8080
101.99.92.189:8080
d5gQ6Zf7Tzih1Pi1
-
install_file
USB.exe
Extracted
lumma
https://atten-supporse.biz/api
https://covery-mover.biz/api
Signatures
-
Amadey family
-
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral1/memory/1252-3153-0x0000000007990000-0x000000000799E000-memory.dmp disable_win_def -
Detect Xworm Payload 3 IoCs
resource yara_rule behavioral1/memory/1252-72-0x0000000000E40000-0x00000000012B6000-memory.dmp family_xworm behavioral1/memory/1252-73-0x0000000000E40000-0x00000000012B6000-memory.dmp family_xworm behavioral1/memory/1252-3493-0x0000000000E40000-0x00000000012B6000-memory.dmp family_xworm -
Gcleaner family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 30b3e46c44.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 30b3e46c44.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4b394g.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4b394g.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4b394g.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4b394g.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 30b3e46c44.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4b394g.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4b394g.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 30b3e46c44.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 30b3e46c44.exe -
Stealc family
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral1/memory/1252-3313-0x000000000AE70000-0x000000000AF90000-memory.dmp family_stormkitty -
Stormkitty family
-
Xworm family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 13 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2J9156.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4b394g.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9feskIx.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0ada70c7c7.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1J17p1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3y47J.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c0641774b2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f65883a956.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 30b3e46c44.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
pid Process 1648 powershell.exe 1604 powershell.exe 5880 powershell.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts attrib.exe File opened for modification C:\Windows\System32\drivers\etc\hosts dasald.exe File opened for modification C:\Windows\System32\drivers\etc\hosts attrib.exe -
Checks BIOS information in registry 2 TTPs 26 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9feskIx.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9feskIx.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1J17p1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2J9156.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4b394g.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c0641774b2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f65883a956.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 30b3e46c44.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0ada70c7c7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1J17p1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2J9156.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4b394g.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3y47J.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3y47J.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c0641774b2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f65883a956.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 30b3e46c44.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0ada70c7c7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 1J17p1.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 9feskIx.exe -
Clipboard Data 1 TTPs 2 IoCs
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
pid Process 6380 powershell.exe 6556 cmd.exe -
Executes dropped EXE 20 IoCs
pid Process 4000 U0w71.exe 3520 W5n58.exe 1004 1J17p1.exe 4900 skotes.exe 1968 2J9156.exe 2308 3y47J.exe 2116 4b394g.exe 1252 9feskIx.exe 4200 694a6d94db.exe 640 c0641774b2.exe 516 f65883a956.exe 2772 b8535da000.exe 1648 30b3e46c44.exe 3228 skotes.exe 5380 0ada70c7c7.exe 3928 dasald.exe 3112 dasald.exe 6112 rar.exe 2008 skotes.exe 4596 skotes.exe -
Identifies Wine through registry keys 2 TTPs 13 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 2J9156.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 3y47J.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 4b394g.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine c0641774b2.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine f65883a956.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 0ada70c7c7.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 1J17p1.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 9feskIx.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 30b3e46c44.exe -
Loads dropped DLL 17 IoCs
pid Process 3112 dasald.exe 3112 dasald.exe 3112 dasald.exe 3112 dasald.exe 3112 dasald.exe 3112 dasald.exe 3112 dasald.exe 3112 dasald.exe 3112 dasald.exe 3112 dasald.exe 3112 dasald.exe 3112 dasald.exe 3112 dasald.exe 3112 dasald.exe 3112 dasald.exe 3112 dasald.exe 3112 dasald.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 30b3e46c44.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4b394g.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4b394g.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\f65883a956.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013848001\\f65883a956.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b8535da000.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013849001\\b8535da000.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\30b3e46c44.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013850001\\30b3e46c44.exe" skotes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 74353c3a81ce1d692ac70fb74607a05c8bee2f2e08a524de8222c1f0be935f51.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" U0w71.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" W5n58.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\c0641774b2.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013847001\\c0641774b2.exe" skotes.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 227 ip-api.com -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0032000000023b7f-143.dat autoit_exe -
Enumerates processes with tasklist 1 TTPs 4 IoCs
pid Process 5492 tasklist.exe 5796 tasklist.exe 6936 tasklist.exe 5556 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
pid Process 1004 1J17p1.exe 4900 skotes.exe 1968 2J9156.exe 2308 3y47J.exe 2116 4b394g.exe 1252 9feskIx.exe 516 f65883a956.exe 1648 30b3e46c44.exe 3228 skotes.exe 5380 0ada70c7c7.exe 2008 skotes.exe 4596 skotes.exe -
resource yara_rule behavioral1/files/0x00070000000241d0-3289.dat upx behavioral1/memory/3112-3304-0x00007FF9902A0000-0x00007FF990962000-memory.dmp upx behavioral1/files/0x00070000000241ca-3347.dat upx behavioral1/files/0x00070000000241c9-3346.dat upx behavioral1/files/0x00070000000241c8-3345.dat upx behavioral1/files/0x00070000000241c7-3344.dat upx behavioral1/files/0x00070000000241c6-3343.dat upx behavioral1/files/0x00070000000241c5-3342.dat upx behavioral1/files/0x00070000000241c4-3341.dat upx behavioral1/files/0x00070000000241c2-3340.dat upx behavioral1/files/0x00070000000241d5-3339.dat upx behavioral1/files/0x00070000000241d4-3338.dat upx behavioral1/memory/3112-3371-0x00007FF990120000-0x00007FF99029F000-memory.dmp upx behavioral1/memory/3112-3370-0x00007FF994140000-0x00007FF994164000-memory.dmp upx behavioral1/memory/3112-3369-0x00007FF99FE30000-0x00007FF99FE49000-memory.dmp upx behavioral1/files/0x00070000000241cf-3397.dat upx behavioral1/memory/3112-3400-0x00007FF990010000-0x00007FF9900DE000-memory.dmp upx behavioral1/memory/3112-3419-0x00007FF98FAD0000-0x00007FF990003000-memory.dmp upx behavioral1/memory/3112-3396-0x00007FF9900E0000-0x00007FF990113000-memory.dmp upx behavioral1/memory/3112-3395-0x00007FF9A6490000-0x00007FF9A649D000-memory.dmp upx behavioral1/memory/3112-3394-0x00007FF99FE10000-0x00007FF99FE29000-memory.dmp upx behavioral1/memory/3112-3441-0x00007FF9902A0000-0x00007FF990962000-memory.dmp upx behavioral1/memory/3112-3444-0x00007FF98F950000-0x00007FF98FA6A000-memory.dmp upx behavioral1/memory/3112-3443-0x00007FF9A25D0000-0x00007FF9A25F5000-memory.dmp upx behavioral1/memory/3112-3440-0x00007FF9A6120000-0x00007FF9A612D000-memory.dmp upx behavioral1/memory/3112-3439-0x00007FF99ADC0000-0x00007FF99ADD4000-memory.dmp upx behavioral1/files/0x00070000000241d3-3387.dat upx behavioral1/memory/3112-3368-0x00007FF99FEB0000-0x00007FF99FEDC000-memory.dmp upx behavioral1/files/0x00070000000241cd-3333.dat upx behavioral1/memory/3112-3328-0x00007FF9A6A50000-0x00007FF9A6A5F000-memory.dmp upx behavioral1/memory/3112-3327-0x00007FF9A25D0000-0x00007FF9A25F5000-memory.dmp upx behavioral1/files/0x00070000000241ce-3326.dat upx behavioral1/files/0x00070000000241c3-3323.dat upx behavioral1/memory/3112-3537-0x00007FF994140000-0x00007FF994164000-memory.dmp upx behavioral1/memory/3112-3538-0x00007FF990120000-0x00007FF99029F000-memory.dmp upx behavioral1/memory/3112-3583-0x00007FF9900E0000-0x00007FF990113000-memory.dmp upx behavioral1/memory/3112-3585-0x00007FF98FAD0000-0x00007FF990003000-memory.dmp upx behavioral1/memory/3112-3589-0x00007FF990010000-0x00007FF9900DE000-memory.dmp upx behavioral1/memory/3112-3619-0x00007FF990120000-0x00007FF99029F000-memory.dmp upx behavioral1/memory/3112-3614-0x00007FF9A25D0000-0x00007FF9A25F5000-memory.dmp upx behavioral1/memory/3112-3613-0x00007FF9902A0000-0x00007FF990962000-memory.dmp upx behavioral1/memory/3112-3639-0x00007FF990010000-0x00007FF9900DE000-memory.dmp upx behavioral1/memory/3112-3643-0x00007FF98F950000-0x00007FF98FA6A000-memory.dmp upx behavioral1/memory/3112-3653-0x00007FF9900E0000-0x00007FF990113000-memory.dmp upx behavioral1/memory/3112-3652-0x00007FF9A6490000-0x00007FF9A649D000-memory.dmp upx behavioral1/memory/3112-3651-0x00007FF99FE10000-0x00007FF99FE29000-memory.dmp upx behavioral1/memory/3112-3650-0x00007FF990120000-0x00007FF99029F000-memory.dmp upx behavioral1/memory/3112-3649-0x00007FF994140000-0x00007FF994164000-memory.dmp upx behavioral1/memory/3112-3648-0x00007FF99FE30000-0x00007FF99FE49000-memory.dmp upx behavioral1/memory/3112-3647-0x00007FF9A6A50000-0x00007FF9A6A5F000-memory.dmp upx behavioral1/memory/3112-3646-0x00007FF9A25D0000-0x00007FF9A25F5000-memory.dmp upx behavioral1/memory/3112-3645-0x00007FF99FEB0000-0x00007FF99FEDC000-memory.dmp upx behavioral1/memory/3112-3644-0x00007FF9902A0000-0x00007FF990962000-memory.dmp upx behavioral1/memory/3112-3642-0x00007FF9A6120000-0x00007FF9A612D000-memory.dmp upx behavioral1/memory/3112-3641-0x00007FF99ADC0000-0x00007FF99ADD4000-memory.dmp upx behavioral1/memory/3112-3640-0x00007FF98FAD0000-0x00007FF990003000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1J17p1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 468 5380 WerFault.exe 124 5960 1252 WerFault.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 22 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9feskIx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f65883a956.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b8535da000.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 74353c3a81ce1d692ac70fb74607a05c8bee2f2e08a524de8222c1f0be935f51.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language U0w71.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1J17p1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3y47J.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language b8535da000.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 30b3e46c44.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c0641774b2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage b8535da000.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0ada70c7c7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language W5n58.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2J9156.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4b394g.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 694a6d94db.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 7112 WMIC.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 6944 systeminfo.exe -
Kills process with taskkill 14 IoCs
pid Process 4784 taskkill.exe 5624 taskkill.exe 6124 taskkill.exe 1160 taskkill.exe 2896 taskkill.exe 2228 taskkill.exe 4824 taskkill.exe 5968 taskkill.exe 6236 taskkill.exe 3028 taskkill.exe 3452 taskkill.exe 1648 taskkill.exe 4488 taskkill.exe 5252 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1252 9feskIx.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 1004 1J17p1.exe 1004 1J17p1.exe 4900 skotes.exe 4900 skotes.exe 1968 2J9156.exe 1968 2J9156.exe 2308 3y47J.exe 2308 3y47J.exe 2116 4b394g.exe 2116 4b394g.exe 1252 9feskIx.exe 1252 9feskIx.exe 2116 4b394g.exe 2116 4b394g.exe 516 f65883a956.exe 516 f65883a956.exe 2772 b8535da000.exe 2772 b8535da000.exe 1648 30b3e46c44.exe 1648 30b3e46c44.exe 3228 skotes.exe 3228 skotes.exe 1648 30b3e46c44.exe 1648 30b3e46c44.exe 1648 30b3e46c44.exe 2772 b8535da000.exe 2772 b8535da000.exe 1252 9feskIx.exe 1252 9feskIx.exe 5380 0ada70c7c7.exe 5380 0ada70c7c7.exe 5880 powershell.exe 5880 powershell.exe 1648 powershell.exe 1648 powershell.exe 1648 powershell.exe 5880 powershell.exe 6380 powershell.exe 6380 powershell.exe 6380 powershell.exe 1604 powershell.exe 1604 powershell.exe 6380 powershell.exe 6380 powershell.exe 2008 skotes.exe 2008 skotes.exe 4596 skotes.exe 4596 skotes.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2116 4b394g.exe Token: SeDebugPrivilege 1160 taskkill.exe Token: SeDebugPrivilege 3028 taskkill.exe Token: SeDebugPrivilege 2896 taskkill.exe Token: SeDebugPrivilege 4784 taskkill.exe Token: SeDebugPrivilege 2228 taskkill.exe Token: SeDebugPrivilege 4992 firefox.exe Token: SeDebugPrivilege 4992 firefox.exe Token: SeDebugPrivilege 1648 30b3e46c44.exe Token: SeDebugPrivilege 1252 9feskIx.exe Token: SeDebugPrivilege 5880 powershell.exe Token: SeDebugPrivilege 1648 powershell.exe Token: SeDebugPrivilege 5796 tasklist.exe Token: SeDebugPrivilege 5492 tasklist.exe Token: SeIncreaseQuotaPrivilege 6892 WMIC.exe Token: SeSecurityPrivilege 6892 WMIC.exe Token: SeTakeOwnershipPrivilege 6892 WMIC.exe Token: SeLoadDriverPrivilege 6892 WMIC.exe Token: SeSystemProfilePrivilege 6892 WMIC.exe Token: SeSystemtimePrivilege 6892 WMIC.exe Token: SeProfSingleProcessPrivilege 6892 WMIC.exe Token: SeIncBasePriorityPrivilege 6892 WMIC.exe Token: SeCreatePagefilePrivilege 6892 WMIC.exe Token: SeBackupPrivilege 6892 WMIC.exe Token: SeRestorePrivilege 6892 WMIC.exe Token: SeShutdownPrivilege 6892 WMIC.exe Token: SeDebugPrivilege 6892 WMIC.exe Token: SeSystemEnvironmentPrivilege 6892 WMIC.exe Token: SeRemoteShutdownPrivilege 6892 WMIC.exe Token: SeUndockPrivilege 6892 WMIC.exe Token: SeManageVolumePrivilege 6892 WMIC.exe Token: 33 6892 WMIC.exe Token: 34 6892 WMIC.exe Token: 35 6892 WMIC.exe Token: 36 6892 WMIC.exe Token: SeDebugPrivilege 6380 powershell.exe Token: SeDebugPrivilege 6936 tasklist.exe Token: SeIncreaseQuotaPrivilege 6892 WMIC.exe Token: SeSecurityPrivilege 6892 WMIC.exe Token: SeTakeOwnershipPrivilege 6892 WMIC.exe Token: SeLoadDriverPrivilege 6892 WMIC.exe Token: SeSystemProfilePrivilege 6892 WMIC.exe Token: SeSystemtimePrivilege 6892 WMIC.exe Token: SeProfSingleProcessPrivilege 6892 WMIC.exe Token: SeIncBasePriorityPrivilege 6892 WMIC.exe Token: SeCreatePagefilePrivilege 6892 WMIC.exe Token: SeBackupPrivilege 6892 WMIC.exe Token: SeRestorePrivilege 6892 WMIC.exe Token: SeShutdownPrivilege 6892 WMIC.exe Token: SeDebugPrivilege 6892 WMIC.exe Token: SeSystemEnvironmentPrivilege 6892 WMIC.exe Token: SeRemoteShutdownPrivilege 6892 WMIC.exe Token: SeUndockPrivilege 6892 WMIC.exe Token: SeManageVolumePrivilege 6892 WMIC.exe Token: 33 6892 WMIC.exe Token: 34 6892 WMIC.exe Token: 35 6892 WMIC.exe Token: 36 6892 WMIC.exe Token: SeDebugPrivilege 5556 tasklist.exe Token: SeDebugPrivilege 5624 taskkill.exe Token: SeDebugPrivilege 3452 taskkill.exe Token: SeDebugPrivilege 4824 taskkill.exe Token: SeDebugPrivilege 6124 taskkill.exe Token: SeDebugPrivilege 5968 taskkill.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 1004 1J17p1.exe 2772 b8535da000.exe 2772 b8535da000.exe 2772 b8535da000.exe 2772 b8535da000.exe 2772 b8535da000.exe 2772 b8535da000.exe 2772 b8535da000.exe 2772 b8535da000.exe 4992 firefox.exe 4992 firefox.exe 4992 firefox.exe 4992 firefox.exe 4992 firefox.exe 4992 firefox.exe 4992 firefox.exe 4992 firefox.exe 4992 firefox.exe 4992 firefox.exe 4992 firefox.exe 4992 firefox.exe 4992 firefox.exe 4992 firefox.exe 4992 firefox.exe 4992 firefox.exe 4992 firefox.exe 4992 firefox.exe 4992 firefox.exe 4992 firefox.exe 4992 firefox.exe 2772 b8535da000.exe 2772 b8535da000.exe 2772 b8535da000.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 2772 b8535da000.exe 2772 b8535da000.exe 2772 b8535da000.exe 2772 b8535da000.exe 2772 b8535da000.exe 2772 b8535da000.exe 2772 b8535da000.exe 2772 b8535da000.exe 4992 firefox.exe 4992 firefox.exe 4992 firefox.exe 4992 firefox.exe 4992 firefox.exe 4992 firefox.exe 4992 firefox.exe 4992 firefox.exe 4992 firefox.exe 4992 firefox.exe 4992 firefox.exe 4992 firefox.exe 4992 firefox.exe 4992 firefox.exe 4992 firefox.exe 4992 firefox.exe 4992 firefox.exe 4992 firefox.exe 4992 firefox.exe 4992 firefox.exe 2772 b8535da000.exe 2772 b8535da000.exe 2772 b8535da000.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4992 firefox.exe 1252 9feskIx.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4932 wrote to memory of 4000 4932 74353c3a81ce1d692ac70fb74607a05c8bee2f2e08a524de8222c1f0be935f51.exe 82 PID 4932 wrote to memory of 4000 4932 74353c3a81ce1d692ac70fb74607a05c8bee2f2e08a524de8222c1f0be935f51.exe 82 PID 4932 wrote to memory of 4000 4932 74353c3a81ce1d692ac70fb74607a05c8bee2f2e08a524de8222c1f0be935f51.exe 82 PID 4000 wrote to memory of 3520 4000 U0w71.exe 83 PID 4000 wrote to memory of 3520 4000 U0w71.exe 83 PID 4000 wrote to memory of 3520 4000 U0w71.exe 83 PID 3520 wrote to memory of 1004 3520 W5n58.exe 84 PID 3520 wrote to memory of 1004 3520 W5n58.exe 84 PID 3520 wrote to memory of 1004 3520 W5n58.exe 84 PID 1004 wrote to memory of 4900 1004 1J17p1.exe 85 PID 1004 wrote to memory of 4900 1004 1J17p1.exe 85 PID 1004 wrote to memory of 4900 1004 1J17p1.exe 85 PID 3520 wrote to memory of 1968 3520 W5n58.exe 86 PID 3520 wrote to memory of 1968 3520 W5n58.exe 86 PID 3520 wrote to memory of 1968 3520 W5n58.exe 86 PID 4000 wrote to memory of 2308 4000 U0w71.exe 87 PID 4000 wrote to memory of 2308 4000 U0w71.exe 87 PID 4000 wrote to memory of 2308 4000 U0w71.exe 87 PID 4932 wrote to memory of 2116 4932 74353c3a81ce1d692ac70fb74607a05c8bee2f2e08a524de8222c1f0be935f51.exe 90 PID 4932 wrote to memory of 2116 4932 74353c3a81ce1d692ac70fb74607a05c8bee2f2e08a524de8222c1f0be935f51.exe 90 PID 4932 wrote to memory of 2116 4932 74353c3a81ce1d692ac70fb74607a05c8bee2f2e08a524de8222c1f0be935f51.exe 90 PID 4900 wrote to memory of 1252 4900 skotes.exe 91 PID 4900 wrote to memory of 1252 4900 skotes.exe 91 PID 4900 wrote to memory of 1252 4900 skotes.exe 91 PID 4900 wrote to memory of 4200 4900 skotes.exe 95 PID 4900 wrote to memory of 4200 4900 skotes.exe 95 PID 4900 wrote to memory of 4200 4900 skotes.exe 95 PID 4900 wrote to memory of 640 4900 skotes.exe 98 PID 4900 wrote to memory of 640 4900 skotes.exe 98 PID 4900 wrote to memory of 640 4900 skotes.exe 98 PID 4900 wrote to memory of 516 4900 skotes.exe 100 PID 4900 wrote to memory of 516 4900 skotes.exe 100 PID 4900 wrote to memory of 516 4900 skotes.exe 100 PID 4900 wrote to memory of 2772 4900 skotes.exe 101 PID 4900 wrote to memory of 2772 4900 skotes.exe 101 PID 4900 wrote to memory of 2772 4900 skotes.exe 101 PID 2772 wrote to memory of 1160 2772 b8535da000.exe 102 PID 2772 wrote to memory of 1160 2772 b8535da000.exe 102 PID 2772 wrote to memory of 1160 2772 b8535da000.exe 102 PID 2772 wrote to memory of 3028 2772 b8535da000.exe 104 PID 2772 wrote to memory of 3028 2772 b8535da000.exe 104 PID 2772 wrote to memory of 3028 2772 b8535da000.exe 104 PID 2772 wrote to memory of 2896 2772 b8535da000.exe 106 PID 2772 wrote to memory of 2896 2772 b8535da000.exe 106 PID 2772 wrote to memory of 2896 2772 b8535da000.exe 106 PID 2772 wrote to memory of 4784 2772 b8535da000.exe 108 PID 2772 wrote to memory of 4784 2772 b8535da000.exe 108 PID 2772 wrote to memory of 4784 2772 b8535da000.exe 108 PID 2772 wrote to memory of 2228 2772 b8535da000.exe 110 PID 2772 wrote to memory of 2228 2772 b8535da000.exe 110 PID 2772 wrote to memory of 2228 2772 b8535da000.exe 110 PID 4900 wrote to memory of 1648 4900 skotes.exe 112 PID 4900 wrote to memory of 1648 4900 skotes.exe 112 PID 4900 wrote to memory of 1648 4900 skotes.exe 112 PID 2772 wrote to memory of 4032 2772 b8535da000.exe 113 PID 2772 wrote to memory of 4032 2772 b8535da000.exe 113 PID 4032 wrote to memory of 4992 4032 firefox.exe 114 PID 4032 wrote to memory of 4992 4032 firefox.exe 114 PID 4032 wrote to memory of 4992 4032 firefox.exe 114 PID 4032 wrote to memory of 4992 4032 firefox.exe 114 PID 4032 wrote to memory of 4992 4032 firefox.exe 114 PID 4032 wrote to memory of 4992 4032 firefox.exe 114 PID 4032 wrote to memory of 4992 4032 firefox.exe 114 PID 4032 wrote to memory of 4992 4032 firefox.exe 114 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 5096 attrib.exe 5176 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\74353c3a81ce1d692ac70fb74607a05c8bee2f2e08a524de8222c1f0be935f51.exe"C:\Users\Admin\AppData\Local\Temp\74353c3a81ce1d692ac70fb74607a05c8bee2f2e08a524de8222c1f0be935f51.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\U0w71.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\U0w71.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\W5n58.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\W5n58.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1J17p1.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1J17p1.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\1013829001\9feskIx.exe"C:\Users\Admin\AppData\Local\Temp\1013829001\9feskIx.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1252 -
C:\Users\Admin\AppData\Local\Temp\dasald.exe"C:\Users\Admin\AppData\Local\Temp\dasald.exe"7⤵
- Executes dropped EXE
PID:3928 -
C:\Users\Admin\AppData\Local\Temp\dasald.exe"C:\Users\Admin\AppData\Local\Temp\dasald.exe"8⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
PID:3112 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\dasald.exe'"9⤵PID:7036
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\dasald.exe'10⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5880
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"9⤵PID:5892
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend10⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1648
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"9⤵PID:6160
-
C:\Windows\system32\tasklist.exetasklist /FO LIST10⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:5492
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"9⤵PID:6312
-
C:\Windows\system32\tasklist.exetasklist /FO LIST10⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:5796
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"9⤵PID:6524
-
C:\Windows\System32\Wbem\WMIC.exeWMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName10⤵
- Suspicious use of AdjustPrivilegeToken
PID:6892
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"9⤵
- Clipboard Data
PID:6556 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-Clipboard10⤵
- Clipboard Data
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6380
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"9⤵PID:6496
-
C:\Windows\system32\tasklist.exetasklist /FO LIST10⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:6936
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"9⤵PID:6520
-
C:\Windows\system32\tree.comtree /A /F10⤵PID:5864
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "systeminfo"9⤵PID:5704
-
C:\Windows\system32\systeminfo.exesysteminfo10⤵
- Gathers system information
PID:6944
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /V DataBasePath"9⤵PID:5412
-
C:\Windows\system32\reg.exeREG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /V DataBasePath10⤵PID:7136
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"9⤵PID:4520
-
C:\Windows\system32\tree.comtree /A /F10⤵PID:1828
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "attrib -r C:\Windows\System32\drivers\etc\hosts"9⤵PID:1356
-
C:\Windows\system32\attrib.exeattrib -r C:\Windows\System32\drivers\etc\hosts10⤵
- Drops file in Drivers directory
- Views/modifies file attributes
PID:5096
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"9⤵PID:3172
-
C:\Windows\system32\tree.comtree /A /F10⤵PID:5144
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "attrib +r C:\Windows\System32\drivers\etc\hosts"9⤵PID:1608
-
C:\Windows\system32\attrib.exeattrib +r C:\Windows\System32\drivers\etc\hosts10⤵
- Drops file in Drivers directory
- Views/modifies file attributes
PID:5176
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"9⤵PID:1800
-
C:\Windows\system32\tasklist.exetasklist /FO LIST10⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:5556
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"9⤵PID:732
-
C:\Windows\system32\tree.comtree /A /F10⤵PID:5160
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"9⤵PID:5352
-
C:\Windows\system32\tree.comtree /A /F10⤵PID:5312
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"9⤵PID:5580
-
C:\Windows\system32\tree.comtree /A /F10⤵PID:5660
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 4992"9⤵PID:5692
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 499210⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5624
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 2848"9⤵PID:5548
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 284810⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3452
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 3372"9⤵PID:5288
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 337210⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4824
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 4604"9⤵PID:6068
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 460410⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6124
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 2720"9⤵PID:6224
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 272010⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5968
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 6488"9⤵PID:6000
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 648810⤵
- Kills process with taskkill
PID:1648
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 7012"9⤵PID:4888
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 701210⤵
- Kills process with taskkill
PID:4488
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 7024"9⤵PID:1480
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 702410⤵
- Kills process with taskkill
PID:5252
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 7052"9⤵PID:5184
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 705210⤵
- Kills process with taskkill
PID:6236
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "getmac"9⤵PID:3140
-
C:\Windows\system32\getmac.exegetmac10⤵PID:6388
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\_MEI39282\rar.exe a -r -hp"blank" "C:\Users\Admin\AppData\Local\Temp\ezUJX.zip" *"9⤵PID:6516
-
C:\Users\Admin\AppData\Local\Temp\_MEI39282\rar.exeC:\Users\Admin\AppData\Local\Temp\_MEI39282\rar.exe a -r -hp"blank" "C:\Users\Admin\AppData\Local\Temp\ezUJX.zip" *10⤵
- Executes dropped EXE
PID:6112
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic os get Caption"9⤵PID:6964
-
C:\Windows\System32\Wbem\WMIC.exewmic os get Caption10⤵PID:7164
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic computersystem get totalphysicalmemory"9⤵PID:6436
-
C:\Windows\System32\Wbem\WMIC.exewmic computersystem get totalphysicalmemory10⤵PID:6664
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"9⤵PID:5808
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid10⤵PID:6976
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER"9⤵PID:3260
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER10⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:1604
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"9⤵PID:5072
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name10⤵
- Detects videocard installed
PID:7112
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault"9⤵PID:3640
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault10⤵
- Suspicious behavior: EnumeratesProcesses
PID:6380
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1252 -s 20967⤵
- Program crash
PID:5960
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013846001\694a6d94db.exe"C:\Users\Admin\AppData\Local\Temp\1013846001\694a6d94db.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4200
-
-
C:\Users\Admin\AppData\Local\Temp\1013847001\c0641774b2.exe"C:\Users\Admin\AppData\Local\Temp\1013847001\c0641774b2.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- System Location Discovery: System Language Discovery
PID:640
-
-
C:\Users\Admin\AppData\Local\Temp\1013848001\f65883a956.exe"C:\Users\Admin\AppData\Local\Temp\1013848001\f65883a956.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:516
-
-
C:\Users\Admin\AppData\Local\Temp\1013849001\b8535da000.exe"C:\Users\Admin\AppData\Local\Temp\1013849001\b8535da000.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1160
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3028
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2896
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4784
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2228
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4992 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2036 -parentBuildID 20240401114208 -prefsHandle 1952 -prefMapHandle 1944 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a770e456-1325-4f76-9cef-3b6d1612160a} 4992 "\\.\pipe\gecko-crash-server-pipe.4992" gpu9⤵PID:2848
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2500 -parentBuildID 20240401114208 -prefsHandle 2484 -prefMapHandle 2480 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {53090baa-ac8f-4122-824d-a64a9f5b2dc4} 4992 "\\.\pipe\gecko-crash-server-pipe.4992" socket9⤵PID:3372
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=892 -childID 1 -isForBrowser -prefsHandle 3336 -prefMapHandle 3364 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1284 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {308e29d6-b486-4d72-aa1a-2ac19ea354ed} 4992 "\\.\pipe\gecko-crash-server-pipe.4992" tab9⤵PID:4604
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4112 -childID 2 -isForBrowser -prefsHandle 4104 -prefMapHandle 4100 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1284 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8628b1b6-2d21-48dc-83ca-3effbc6e6ab7} 4992 "\\.\pipe\gecko-crash-server-pipe.4992" tab9⤵PID:2720
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4760 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4716 -prefMapHandle 4712 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {57ecd50e-d3df-4abc-b085-cafe4f05b9e7} 4992 "\\.\pipe\gecko-crash-server-pipe.4992" utility9⤵
- Checks processor information in registry
PID:6488
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5180 -childID 3 -isForBrowser -prefsHandle 5172 -prefMapHandle 5168 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1284 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {630f588a-1d15-480b-9b0d-1b21b9db5e18} 4992 "\\.\pipe\gecko-crash-server-pipe.4992" tab9⤵PID:7012
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5296 -childID 4 -isForBrowser -prefsHandle 5304 -prefMapHandle 5308 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1284 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {023cf2df-0022-438a-bc26-d2d48555e723} 4992 "\\.\pipe\gecko-crash-server-pipe.4992" tab9⤵PID:7024
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5504 -childID 5 -isForBrowser -prefsHandle 5512 -prefMapHandle 5520 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1284 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f79c516e-43bd-40fe-8d67-f2d039b41b32} 4992 "\\.\pipe\gecko-crash-server-pipe.4992" tab9⤵PID:7052
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013850001\30b3e46c44.exe"C:\Users\Admin\AppData\Local\Temp\1013850001\30b3e46c44.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1648
-
-
C:\Users\Admin\AppData\Local\Temp\1013851001\0ada70c7c7.exe"C:\Users\Admin\AppData\Local\Temp\1013851001\0ada70c7c7.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5380 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5380 -s 15287⤵
- Program crash
PID:468
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2J9156.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2J9156.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1968
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3y47J.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3y47J.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2308
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4b394g.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4b394g.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2116
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 5380 -ip 53801⤵PID:6536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1252 -ip 12521⤵PID:4384
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2008
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4596
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\activity-stream.discovery_stream.json
Filesize19KB
MD573f66f6eb8328d4dc7abbfb9500da339
SHA123aa692e9f0c3bcfa68b92c0a294f8971b7e1396
SHA25605253621d63ca7cbf05281ab362bd135dc31bf7c9bab87eb31dfef5a89b921e3
SHA5128d35ecd8c8537ad999a5184829db13fefe585bbfed572cc783dd8d1dcd79acec60fec0dcb4792f151a6db0a53c492f97b15fe090ed7e71713b66a2a928f86f0b
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD5e81be8d37a8f4b797df1aaf0a778d928
SHA1140c10bb2d53910ea4aea5cfc9f8fb8a74b9e613
SHA25626b31b13f5bd329f1e786a1baa5d83241ccd593ff204c90a35374411f8260acc
SHA512aaf4c6803ac0a33b03c843bbd9b9f288d1f4672dd5060f5079600405bd395108b50edc045e30b749452b2b6977e1da2010bb1196ca72c5c3bd72c484b9be1c10
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\cache2\entries\F8CBD54DDA10F4286A41EC6A537240712D6C2308
Filesize9KB
MD5ccc215575f98da852f2e0153599429f4
SHA19e3d2375c5b2215eb1488db78168d1f2517252a4
SHA256cd0f9d8fc80f6dda5dca7854808e556fad374cef410cb4e5f8bae9142049e268
SHA512690fd78e2b42bef171612d5d8a6283996c9e595d11effab2916925b76730ed669f51f368fc80b58e1fee055b2a92e331dc49273f326daebe93f30952aa8236f7
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
1.8MB
MD558f824a8f6a71da8e9a1acc97fc26d52
SHA1b0e199e6f85626edebbecd13609a011cf953df69
SHA2565e5b808ed64c4f40e07a4894e1da294e364383f0a51adb7ec8c7568afba3eb17
SHA5127d6c752369ea83bad34873d8603c413e9372ff66adcaad11e7f23d3ce85827e057444b30eadf927329191825aef4dc37a1e68c30b71fae4ce6f53708102fb461
-
Filesize
2.5MB
MD52a78ce9f3872f5e591d643459cabe476
SHA19ac947dfc71a868bc9c2eb2bd78dfb433067682e
SHA25621a2ac44acd7a640735870eebfd04b8dc57bc66877cb5be3b929299e86a43dae
SHA51203e2cd8161a1394ee535a2ea7d197791ab715d69a02ffab98121ec5ac8150d2b17a9a32a59307042c4bbeffad7425b55efa047651de6ed39277dba80711454f9
-
Filesize
949KB
MD501f739d5437a9f2a00f374bc77074319
SHA17c6be727db3896a5e8080534d3a5a07eabc10019
SHA2565c899e7bd1466b7d8a8fca178bb73e99aedc6d50951c4d226d3dde24dee3a97e
SHA512bf7c8af17d7742062b59233cb628f792e97514c80e02c0533c9c8d5c925fea347892ac606507c18f7e66a466f2bf8a1e06763352bdb4fc7b92c40b993aa79947
-
Filesize
1.9MB
MD52920e7cc2d1445dac674e5a361acdf93
SHA1ae68904f35149434cb772fa55be52a94bb91c39a
SHA2563dadaab5000b3129bc9844fff329754a7e3c20fa364dfd4dcd9ccbf531fce2a9
SHA512e5ba86de23497ebf4d0204bf5db9e04c9f4999e0bc3741c730c2f237ad12dc49bf9a1a8f8186c42be3338e0fbbcb20d363c87c2f8954ae712aed9bfbe90582ef
-
Filesize
114KB
MD5d9f3a549453b94ec3a081feb24927cd7
SHA11af72767f6dfd1eaf78b899c3ad911cfa3cd09c8
SHA256ff366f2cf27da8b95912968ac830f2db3823f77c342e73ee45ec335dbc2c1a73
SHA512f48765c257e1539cacce536e4f757e3d06388a6e7e6c7f714c3fce2290ce7cdb5f0e8bb8db740b5899ba8b53e2ed8b47e08b0d043bb8df5a660841dc2c204029
-
Filesize
2.7MB
MD5fa2c83f3c3dc8a2a7054b1ec4f47c41c
SHA1502ddba5890ec40fcd927f7b2c6c5089943b9051
SHA2566d2e322f70170af5b520ccfc7ffb1abfaa611e0252e5d2ccde4c416ab32770cc
SHA51295028f7091bd2cd067c2636d6387052f33c1e6450f31733b9aeee54967725d61562edc6712abc59cdebff5db2124deabe73642593b412a5e5786345ef96796cc
-
Filesize
5.4MB
MD576298be0bdafb14914bb5a9fb4ac3ed5
SHA1b423842a7424eb0b4bb990faddd2c76eac68f094
SHA256287bef2c62bbe128262c4c8d060e369b63f40b9d452558646b54c31d526ce106
SHA512a0928d9888ad296c85559265050a400cb774551279271138fd4a2eccd436792f303930b9860a90b1254b72a4d426997f8a3c6f7cb588cdf85ff334493aa0f6d8
-
Filesize
1.7MB
MD505ccde04770ed7266dc36ebb4523974d
SHA16de6f18a48fd56d6c65ea510b91fe6d868e0b7e3
SHA25669c4775e400b5ee547f81fc67a0b9b5f6319b2adb4c482a9a79e716a56dc8e3b
SHA5121c9dd7e3d4babd0d1ce0e812e57f982bb9bfe0c7e1e5d9fffe5757634921f65981c29abb3a856b7ad4bb0954b29dcd163096a5e2fe6aa227f51eb002ee945721
-
Filesize
3.6MB
MD5c6649c457fb718f4acffa993a3bd547b
SHA1633a45d3382a506811e3583139376c5e87ced0c1
SHA2564eb33eeb472add7fb1c7fcd4cdea1b522ea78aef40ae41fbd967aa4317bae8db
SHA5123f26e20e829cb3f2f87f79c6b710ac0166cabf9efb50afeddb8b83f3247aaec1b587da337f36a43847f9b158cec30a03e77d94ce3fec5bb5cad59a505e595367
-
Filesize
3.1MB
MD5ea67026317674d166594bf5450ba5783
SHA1e6f843343265c038a7b340d412795ab31176ef39
SHA256f3b4123a66aacafe980321a2da2a3631367ae898269d629efc134149a02d05df
SHA5120376dddb29eb71037c4be3aa8690d7e57f546d63d8d9c58aa68c0d769054ff4a2f91f746ef44cdcaf29e3230054cfd7a0ea462a4a91e06708db0da4ff905e654
-
Filesize
1.8MB
MD50cefe9dfd3024abb0a90de7d3903deea
SHA111b1d1b803f45df9685826d6a2616219fd49c852
SHA256fd864cb4c1cb656bf68153177fc4997132d00ae5bd2df2e181756295186804da
SHA512fc8818b82f0ef2dce4755a872ab556ba3608ccb5d383747cf65a015e5a6bbe1f7804bc4c5d8d3fa68e05bb02481458f593d437a28929ef01ae933b50b1c8ee49
-
Filesize
20KB
MD5f9a82fcd194145331140ee9e834f8c98
SHA107d4bded1cb30d20b7c4a761506bcd47e63cc3f8
SHA256dfee7c500f5f6b57ffefcd32f1c610402e571bb197f788a0f9bdf007901d957c
SHA51254f538906281826b48965aa865eb4b75201d2bd61b848350b28639e92712f2ccb81515536f1d89e62cbc55673700cf5c69c55578a4d2e3c3e7d10fbb2b4a352a
-
Filesize
116KB
MD5f70aa3fa04f0536280f872ad17973c3d
SHA150a7b889329a92de1b272d0ecf5fce87395d3123
SHA2568d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8
SHA51230675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84
-
Filesize
117KB
MD5862f820c3251e4ca6fc0ac00e4092239
SHA1ef96d84b253041b090c243594f90938e9a487a9a
SHA25636585912e5eaf83ba9fea0631534f690ccdc2d7ba91537166fe53e56c221e153
SHA5122f8a0f11bccc3a8cb99637deeda0158240df0885a230f38bb7f21257c659f05646c6b61e993f87e0877f6ba06b347ddd1fc45d5c44bc4e309ef75ed882b82e4e
-
Filesize
48KB
MD51d9398c54c80c0ef2f00a67fc7c9a401
SHA1858880173905e571c81a4a62a398923483f98e70
SHA25689006952bee2b38d1b5c54cc055d8868d06c43e94cd9d9e0d00a716c5f3856fa
SHA512806300d5820206e8f80639ccb1fba685aafa66a9528416102aeb28421e77784939285a88a67fad01b818f817a91382145322f993d855211f10e7ba3f5563a596
-
Filesize
59KB
MD52401460a376c597edce907f31ec67fbc
SHA17f723e755cb9bfeac79e3b49215dd41fdb5c2d90
SHA2564f3f99b69834c43dac5c3f309cb0bd56c07e8c2ac555de4923fa2ddc27801960
SHA5129e77d666c6b74cfb6287775333456cce43feb51ec39ad869c3350b1308e01ad9b9c476c8fa6251fe8ad4ab1175994902a4ad670493b95eb52adb3d4606c0b633
-
Filesize
107KB
MD5df361ea0c714b1a9d8cf9fcf6a907065
SHA1102115ec2e550a8a8cad5949530cca9993250c76
SHA256f78ee4524eb6e9885b9cbdb125b2f335864f51e9c36dc18fdccb5050926adffe
SHA512b1259df9167f89f8df82bda1a21a26ee7eb4824b97791e7bbaa3e57b50ae60676762fd598c8576d4e6330ffaf12972a31db2f17b244c5301dcf29fe4abfba43f
-
Filesize
35KB
MD5d4c05f1c17ac3eb482b3d86399c9baae
SHA181b9a3dd8a5078c7696c90fbd4cf7e3762f479a5
SHA25686bd72b13a47693e605a0de1112c9998d12e737644e7a101ac396d402e25cf2f
SHA512f81379d81361365c63d45d56534c042d32ee52cad2c25607794fe90057dcdeeb2b3c1ff1d2162f9c1bdf72871f4da56e7c942b1c1ad829c89bf532fb3b04242e
-
Filesize
86KB
MD5e0fa126b354b796f9735e07e306573e1
SHA118901ce5f9a1f6b158f27c4a3e31e183aa83251b
SHA256e0dc01233b16318cd21ca13570b8fdf4808657ec7d0cc3e7656b09ccf563dc3e
SHA512dd38100889c55bffc6c4b882658ecd68a79257bc1ffd10f0f46e13e79bff3fc0f908ae885cc4a5fed035bd399860b923c90ef75e203b076b14069bf87610f138
-
Filesize
26KB
MD584aa87c6dd11a474be70149614976b89
SHA1c31f98ec19fc36713d1d7d077ad4176db351f370
SHA2566066df940d183cf218a5053100e474d1f96be0a4e4ee7c09b31ea303ff56e21b
SHA51211b9f8e39c14c17788cc8f1fddd458d70b5f9ef50a3bdb0966548ddcb077ff1bf8ca338b02e45ec0b2e97a5edbe39481dd0e734119bc1708def559a0508adc42
-
Filesize
44KB
MD51d982f4d97ee5e5d4d89fe94b7841a43
SHA17f92fe214183a5c2a8979154ece86aad3c8120c6
SHA256368cf569adc4b8d2c981274f22181fea6e7ce4fa09b3a5d883b0ff0ba825049d
SHA5129ecdcf9b3e8dc7999d2fa8b3e3189f4b59ae3a088c4b92eaa79385ed412f3379ebe2f30245a95d158051dbd708a5c9941c150b9c3b480be7e1c2bba6dea5cb24
-
Filesize
57KB
MD53911ae916c6e4bf99fe3296c3e5828ca
SHA187165cbf8ea18b94216ac2d1ffe46f22eddb0434
SHA2563ec855c00585db0246b56f04d11615304931e03066cb9fc760ed598c34d85a1f
SHA5125c30ed540fdfa199cdf56e73c9a13e9ac098f47244b076c70056fd4bf46f5b059cb4b9cdb0e03568ca9c93721622c793d6c659704af400bd3e20767d1893827e
-
Filesize
66KB
MD568e9eb3026fa037ee702016b7eb29e1b
SHA160c39dec3f9fb84b5255887a1d7610a245e8562e
SHA2562ae5c1bdd1e691675bb028efd5185a4fa517ac46c9ef76af23c96344455ecc79
SHA51250a919a9e728350005e83d5dd51ebca537afe5eb4739fee1f6a44a9309b137bb1f48581bafa490b2139cf6f035d80379bf6ffcdff7f4f1a1de930ba3f508c1af
-
Filesize
1.3MB
MD5bed03063e08a571088685625544ce144
SHA156519a1b60314ec43f3af0c5268ecc4647239ba3
SHA2560d960743dbf746817b61ff7dd1c8c99b4f8c915de26946be56118cd6bedaebdc
SHA512c136e16db86f94b007db42a9bf485a7c255dcc2843b40337e8f22a67028117f5bd5d48f7c1034d7446bb45ea16e530f1216d22740ddb7fab5b39cc33d4c6d995
-
Filesize
108KB
MD5219d87feecd1ab8fac9cd8ede1f3fbd8
SHA1d1c3cab1817a3477d6d9326f1d8138bafe322f80
SHA2565ab78c548a9047e7936d7a94ef0d3454abe878ccc0efffa2b9562944a387e130
SHA5123cda1f230677753e0ce70deb583269645f04d9095596818f47c07314eed2e1f6b9498621022fdeff098799cac6446ab4c35888c44f9eac247444c6d3a532501b
-
Filesize
1.6MB
MD58377fe5949527dd7be7b827cb1ffd324
SHA1aa483a875cb06a86a371829372980d772fda2bf9
SHA25688e8aa1c816e9f03a3b589c7028319ef456f72adb86c9ddca346258b6b30402d
SHA512c59d0cbe8a1c64f2c18b5e2b1f49705d079a2259378a1f95f7a368415a2dc3116e0c3c731e9abfa626d12c02b9e0d72c98c1f91a359f5486133478144fa7f5f7
-
Filesize
29KB
MD508b000c3d990bc018fcb91a1e175e06e
SHA1bd0ce09bb3414d11c91316113c2becfff0862d0d
SHA256135c772b42ba6353757a4d076ce03dbf792456143b42d25a62066da46144fece
SHA5128820d297aeda5a5ebe1306e7664f7a95421751db60d71dc20da251bcdfdc73f3fd0b22546bd62e62d7aa44dfe702e4032fe78802fb16ee6c2583d65abc891cbf
-
Filesize
221KB
MD5b2e766f5cf6f9d4dcbe8537bc5bded2f
SHA1331269521ce1ab76799e69e9ae1c3b565a838574
SHA2563cc6828e7047c6a7eff517aa434403ea42128c8595bf44126765b38200b87ce4
SHA5125233c8230497aadb9393c3ee5049e4ab99766a68f82091fe32393ee980887ebd4503bf88847c462c40c3fc786f8d179dac5cb343b980944ade43bc6646f5ad5a
-
Filesize
1.7MB
MD52996cbf9598eb07a64d66d4c3aba4b10
SHA1ac176ab53cdef472770d27a38db5bd6eb71a5627
SHA256feba57a74856dedb9d9734d12c640ca7f808ead2db1e76a0f2bcf1e4561cd03f
SHA512667e117683d94ae13e15168c477800f1cd8d840e316890ec6f41a6e4cefd608536655f3f6d7065c51c6b1b8e60dd19aa44da3f9e8a70b94161fd7dc3abf5726c
-
Filesize
615KB
MD59c223575ae5b9544bc3d69ac6364f75e
SHA18a1cb5ee02c742e937febc57609ac312247ba386
SHA25690341ac8dcc9ec5f9efe89945a381eb701fe15c3196f594d9d9f0f67b4fc2213
SHA51257663e2c07b56024aaae07515ee3a56b2f5068ebb2f2dc42be95d1224376c2458da21c965aab6ae54de780cb874c2fc9de83d9089abf4536de0f50faca582d09
-
Filesize
467B
MD59795f79ddb61aa29027f4d68496b379c
SHA12b28db4d9ac8cffba73048444b1df25346f4ef32
SHA256e63f3d6710097498085564dfc85add6ed4cf44238c33d20820d2426abcee4e31
SHA512e44fbbc02da75d173c81bdfda9b14102997609af06fd50c51030430c3c80193dadb632592997361c79b0dfed50ccc0e1743c306a881401a1c78a6a7facb45d4d
-
Filesize
25KB
MD50433850f6f3ddd30a85efc839fbdb124
SHA107f092ae1b1efd378424ba1b9f639e37d1dc8cb9
SHA256290c0a19cd41e8b8570b8b19e09c0e5b1050f75f06450729726193cf645e406c
SHA5128e785085640db504496064a3c3d1b72feab6b3f0bc33676795601a67fcf410baa9a6cd79f6404829b47fd6afcd9a75494d0228d7109c73d291093cd6a42447ff
-
Filesize
643KB
MD519efdd227ee57e5181fa7ceb08a42aa1
SHA15737adf3a6b5d2b54cc1bace4fc65c4a5aafde50
SHA2568a77b2c76440365ee3e6e2f589a78ad53f2086b1451b5baa0c4bfe3b6ee1c49d
SHA51277db2fe6433e6a80042a091f86689186b877e28039a6aeaa8b2b7d67c8056372d04a1a8afdb9fe92cfaea30680e8afeb6b597d2ecf2d97e5d3b693605b392997
-
Filesize
295KB
MD5382cd9ff41cc49ddc867b5ff23ef4947
SHA17e8ef1e8eaae696aea56e53b2fb073d329ccd9d6
SHA2568915462bc034088db6fdb32a9b3e3fcfe5343d64649499f66ffb8ada4d0ad5f2
SHA5124e911b5fb8d460bfe5cb09eab74f67c0f4b5f23a693d1ff442379f49a97da8fed65067eb80a8dbeedb6feebc45f0e3b03958bd920d582ffb18c13c1f8c7b4fc4
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
20KB
MD549693267e0adbcd119f9f5e02adf3a80
SHA13ba3d7f89b8ad195ca82c92737e960e1f2b349df
SHA256d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f
SHA512b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2
-
Filesize
124KB
MD59618e15b04a4ddb39ed6c496575f6f95
SHA11c28f8750e5555776b3c80b187c5d15a443a7412
SHA256a4cd72e529e60b5f74c50e4e5b159efaf80625f23534dd15a28203760b8b28ab
SHA512f802582aa7510f6b950e3343b0560ffa9037c6d22373a6a33513637ab0f8e60ed23294a13ad8890935b02c64830b5232ba9f60d0c0fe90df02b5da30ecd7fa26
-
Filesize
7.3MB
MD529713ebba8304896f257a90d12389de0
SHA18d5553b1931d7b1138163b681c191ee7f681ac83
SHA25694196eb7588daa100a08d5075e5e03b4ae5bc05eaacf3d9ce77c84eaa3d1e9cd
SHA512de2249cd067258e7a7bdb7f23f4d459ef4f1be0433fef7f6d3317b93c968a792f6ae8a8a6b6eab272b8e5047d6ff4099e6bee10c565d3fea7b6245edfaa3ac83
-
Filesize
40KB
MD5a182561a527f929489bf4b8f74f65cd7
SHA18cd6866594759711ea1836e86a5b7ca64ee8911f
SHA25642aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914
SHA5129bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558
-
Filesize
48KB
MD5349e6eb110e34a08924d92f6b334801d
SHA1bdfb289daff51890cc71697b6322aa4b35ec9169
SHA256c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a
SHA5122a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
Filesize
160KB
MD5f310cf1ff562ae14449e0167a3e1fe46
SHA185c58afa9049467031c6c2b17f5c12ca73bb2788
SHA256e187946249cd390a3c1cf5d4e3b0d8f554f9acdc416bf4e7111fff217bb08855
SHA5121196371de08c964268c44103ccaed530bda6a145df98e0f480d8ee5ad58cb6fb33ca4c9195a52181fe864726dcf52e6a7a466d693af0cda43400a3a7ef125fad
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\AlternateServices.bin
Filesize6KB
MD56131d457d4f5615e8af866e078f93b7b
SHA1f2c55207d88df7b860880bac2fa4b4e3b1d65025
SHA25686a7a72cf0dbf3dd8adb98787c18721edf2a473da10360a170e4b55987371448
SHA512160cf39398ce04e10de2181e9ab1c14c2ef8fce631c78e0ff558cce53c5d75987b770722d3f685ff84f671deab6eb88d46815c28d26b5871ea3adea23ce5536b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\AlternateServices.bin
Filesize8KB
MD5c228d1ee7e40674995d11033a54a35de
SHA1ae46e526618807d989bbaacff72228244cc9c40e
SHA256de13df1f940428d9c99a1f239f2a63010556c2eb6f0c92b6b4db10929565c89f
SHA512d4c6ef744b59e0454b7206709c0aa8973aa644bad62ab451d0c1fdf3cd26e2ddbc40645af07dc16f306cc0dcc57885a65d122eb87a0757cca887080db9e752e6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.bin
Filesize23KB
MD56fcfa6c7934420ab52658a191f6454bd
SHA1c5a9dde79ce91c505b0d9ad2e357d383440a56d8
SHA2563cfb4516503f8a2842814911217ea3a33d6808ed2a2ac8673b5e0142eb2c6711
SHA5128b8a4d8f8f33bde5a7d31504d220d654218663c2b22c72c40bdbb3bd445aeeba7a0954000779733b0f4cc495e2fa1652d010fbb420125fc686786a2bb6349419
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.bin
Filesize15KB
MD585153737a3c6051cef92b1da1dbca3cd
SHA12817c231d5f60a9591fb5db47b57f5f949b85918
SHA256c9098c165057587585aba48fae9eb6bf725aab4975c2775499e3f90afb4bcc2f
SHA512b0599bc0340d19e1b7e91e812eca49f60bdda007e5fea0ed6ad985b2594442d1a5fc901ca9c4fdb01d2151a9c54cd010e8514911d528f40daea6e38e345a2ddf
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.bin
Filesize15KB
MD5bd0befb4e7c36d35b75c06d18a5da870
SHA12e32e7b8fca4768635d106e3566176c0a1f5a0e5
SHA256eece9f8910191cc6484242e854162c63bb5c48be4556581cff4905778061dd26
SHA5122243748fdb41d09043b1f3f78d82dee007190cd408ec44965809eb08dc04d7d144e2f4a1588554ad1a30ac306c6caed9860da9fd30ee801e89b4891af5db8f30
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5e4454074bb94edf3da639699611d7687
SHA12680900c8148e8640cfc126133df0b08a88e524b
SHA256c2b8a9219889ddf45050256ab41ff3dd89a0f0bc9dbd8bc1643e95107b91f181
SHA5124d78daf5fc2d5955496edbe8ff31aa91f5ba6416f51a5a47a86599eac0a2fbc2b702e9628297accc165fadea3d221dcd47fb8b80e8d0c08146cdccdfb1f19c5e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5075d36f307e57d7b9855c92b1335cb4b
SHA1bc494641535550edec477349e41fea6d290d20b5
SHA25674ce71c87240d72f380d932b7c29d9d50f88a4f85968ce4f9a94b890276cf56b
SHA512c7575da11c5a3f1cb8c91110a612ce046ffb39dd52dd288aeb894f5ee3317c0625d676f2c814aeec9092d970f9eaf444ae8962f8871f3dbb13281d4843953948
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5b7b8839e3d06e0a082c115df44d68651
SHA1c3175eed2f3678cb96c0d4fda3439bcf9147bb30
SHA256acdbb47d1df70bdf62fc61ee177349c59a6387e19aeac39f6e2caed36db49b99
SHA5129588b0e0e5a6cc27f2f9963812ded43fa308a08570ea4c7c5c972efb7874962d117bf655fad14e09aafa44838ca922673e8001bb973e526490b1ab45251ae0fe
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5bc0f6b306f7501d51f141635b138a702
SHA1b1d049d77149c45f183769f47167957bbc3e247e
SHA2562e714c5232e2d2fd6d398f5feef9b45aed1c6b829e5c8c682d5034780d9c098f
SHA512bd91bed8abdafa32aa3d3fc40ce4736c6320882c8b43c763e1645b2d9c99ad92ca3e24f00b0527867b36089e2e162783d2a1e1eabd7068b841602c3fdca3276a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5649ddf6eb7dea9d14a0ede265b5734a9
SHA160fce263664e3fd6d3e281aa141cdff4e7a29043
SHA256ab6e2a87e67599704282228a0f2d0a0d88bc52a4c768bd82eeadc85c1f46bfb7
SHA5122ac6de44be7594a867b7cf73ac043ba04a92b818d637468f88d8eb5bd95d11d455438d76e5691efbcb4b1324ffe725d1ba592fdd7c1d41b397223e442d32510a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\0413290e-b750-46c9-acb4-df654ce6d02d
Filesize982B
MD5260def2f0c5f32c3ca1e8a9cbac0deab
SHA13927793329c010f5f063303f8ad040791f683680
SHA256d76172d3c56bdd680583383a87959789bb0e84671c27f43f5f19b6e5a545106f
SHA5121587b1af6b008e9b0b6fe418a66803f5228e72840b587860b36e214a79f5fe60e8a1a146f5abc4c9dd87c1ef86ebb710bb8241f3796e620be306006dc15b4d0d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\645b3bce-8e57-4118-894a-c790e821df6b
Filesize671B
MD5712ad7e84b24cbf30c988ac89c396c9f
SHA1c0b3140fbb9293984b2487885a65d7eb90b5d619
SHA256f0120d306bc44adb4e0a295128c0ab222fbe458759c50449d388e339d439eb99
SHA512826bcbb342e62f825bd2dc163fddd2a4023bd03dd678546709957271d74e1f24c682ae42c7db7ab8ad6cfe3f6552b9036462ad5ddf17de9b8dd091e9e4f29a1d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\9c0bc7bb-3a47-49f3-93f0-fa0438ff2536
Filesize27KB
MD58835547f14c145877f5d79122fb36f2d
SHA17f68a5f7df31d69ef8d2964ff367a626b95538ae
SHA256974d38f59fa07683694ae2dca48bf4d3d2609ae6ed01d24f800d8cada250d70a
SHA512cd6b0dd9fc4151ca6b492ae20943f7be67a3077d4496a350c98ac9c6df2075a9e60e7e217ab48ceb836cdcf2c4a34dab13f62205a9577ae1185e50a9e2791acf
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD52306308d7c715d7278d47b1e5c0a189d
SHA1142d8f3ca4d3061a474c113c0fc7d4ea2c3e63f9
SHA256e497ed22a49a5f4d235b7bd8b82a9775255bfeac24bca0e695ae16cb241b939d
SHA512bb6a15dfa8dfc35ef2cb003aa57b0bc312bac251f05a503f31425b17bf9049d49fddae7a4894ebb9ff2d8d648aad25c00c52fbbe1a279306f2be804dc6efada9
-
Filesize
10KB
MD5207d75b9354053ea9934fe911e4d488d
SHA144a15bd5da4e61761a373a479b9de6df09f45ca7
SHA2564594016d14c3020b66aae835b24bab2e685d186973869387bf53f023100337db
SHA51243043b04c1e0c95a2641cf38b1e88bcf257d8c0f5a6a14281c6c1973f6934716e3387ca61406db66a64ac5e67aff1462be3d3f22fbca6f8a122d2b49905f5025
-
Filesize
15KB
MD54290b981ea3a6d99975286c8b7bbe6c7
SHA13876331071ac26e281b738c3091e5ab1c3569cc2
SHA256a5dfc42b7df0834876d031d67102172c80dacb11cb00595cd9bbc03612dceba9
SHA5129dec7be5a5dd2d2c34a421731d61aad32df064b5d972ac8f8e07fe50ffcac7ced8e9115a8112f30ec0cdc0dd82b6ce81c4824c67cabe77db48876e332aba272d
-
Filesize
10KB
MD51096cb2034e408e13d6ec5eb007723e3
SHA185d5217e64551b7a1aebe519715f5e0a170e8a8b
SHA2567b37eaeeccc645e2c1af7e5170d604efaa28fc9a42697a9e13cda7c427a6c2fd
SHA512028154a584ff3941a95076f2804a107d81e97b87f9f46d71537f4e9363b81c2e12c8944450a2629aa438fa256f0615385117dcf3a9ee57a89aaa0eea2cb69921
-
Filesize
10KB
MD54021128ab118b9fffe1ea49187a8fda9
SHA1889346a1423a97a974d6381a78ca529c6e35b584
SHA256e66836a5297b784e8b9dfcda199411d5252bad80cd77187f4b76d60ef74245a5
SHA512e18e3c4618273126fbf0a92ddc5e390aca93a4d01a943831a007342ca88b38e80d0239efa1429db3be6381c16567937875568ed31d0483d211ac97732c7cfea6