Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-12-2024 18:09
Static task
static1
General
-
Target
e722b1ec7c893209be4e092e4db1aefe498cd87120350df2049f2d50b5e5bf1d.exe
-
Size
7.0MB
-
MD5
9ba89ec890c56c8523e4fa8d79a2814b
-
SHA1
26822793a0cf792d95b518e5c3aeebeff6f0dbd0
-
SHA256
e722b1ec7c893209be4e092e4db1aefe498cd87120350df2049f2d50b5e5bf1d
-
SHA512
f83c21c87b85a41cd1c98bd3800e561909d2181b9713a42e408d94b32ec1e7757af5e2bd00420f0dfe25524ab9161cf6e1332158a5fc3be5a6aa2b02c4037a21
-
SSDEEP
98304:VEWkNpsEdqrpEeqz1sO3vmZ69xOq5+9c3lMdWXzbHjAksOWkEDNCd:iWkNpsEcrpE5xFukPOq5rMcXnj7ICd
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
https://atten-supporse.biz/api
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://atten-supporse.biz/api
https://covery-mover.biz/api
Signatures
-
Amadey family
-
Gcleaner family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4v380f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 1e62ab0eae.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 1e62ab0eae.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 1e62ab0eae.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 1e62ab0eae.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4v380f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4v380f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4v380f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4v380f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4v380f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 1e62ab0eae.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 13 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1e62ab0eae.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2t7496.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3o23Y.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1e91a1f303.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c530a62d40.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1r86h8.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4v380f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3EUEYgl.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 502085517a.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 26 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1e91a1f303.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1e91a1f303.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c530a62d40.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1r86h8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2t7496.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3o23Y.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4v380f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3EUEYgl.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 502085517a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1e62ab0eae.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2t7496.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3o23Y.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4v380f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3EUEYgl.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 502085517a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c530a62d40.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1r86h8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1e62ab0eae.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 3EUEYgl.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 1r86h8.exe -
Executes dropped EXE 17 IoCs
pid Process 3504 T8q31.exe 3020 N8Q40.exe 4536 1r86h8.exe 2580 skotes.exe 4764 2t7496.exe 2308 skotes.exe 3992 3o23Y.exe 440 4v380f.exe 1700 yiklfON.exe 1620 3EUEYgl.exe 4452 skotes.exe 3384 1e91a1f303.exe 2956 502085517a.exe 2668 b2ef8ced4c.exe 4624 c530a62d40.exe 1164 1e62ab0eae.exe 5476 skotes.exe -
Identifies Wine through registry keys 2 TTPs 13 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 1e91a1f303.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 502085517a.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 3EUEYgl.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 2t7496.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 3o23Y.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 4v380f.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine c530a62d40.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 1e62ab0eae.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 1r86h8.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4v380f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4v380f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 1e62ab0eae.exe -
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" N8Q40.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\1e91a1f303.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013772001\\1e91a1f303.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\502085517a.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013773001\\502085517a.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b2ef8ced4c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013774001\\b2ef8ced4c.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\1e62ab0eae.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013775001\\1e62ab0eae.exe" skotes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e722b1ec7c893209be4e092e4db1aefe498cd87120350df2049f2d50b5e5bf1d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" T8q31.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000b000000023b85-152.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 13 IoCs
pid Process 4536 1r86h8.exe 2580 skotes.exe 4764 2t7496.exe 2308 skotes.exe 3992 3o23Y.exe 440 4v380f.exe 1620 3EUEYgl.exe 4452 skotes.exe 3384 1e91a1f303.exe 2956 502085517a.exe 4624 c530a62d40.exe 1164 1e62ab0eae.exe 5476 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1r86h8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1860 4624 WerFault.exe 146 -
System Location Discovery: System Language Discovery 1 TTPs 24 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e722b1ec7c893209be4e092e4db1aefe498cd87120350df2049f2d50b5e5bf1d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1r86h8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2t7496.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4v380f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yiklfON.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language b2ef8ced4c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1e62ab0eae.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1e91a1f303.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b2ef8ced4c.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage b2ef8ced4c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3o23Y.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3EUEYgl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 502085517a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language T8q31.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language N8Q40.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c530a62d40.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3EUEYgl.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3EUEYgl.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3620 timeout.exe -
Kills process with taskkill 5 IoCs
pid Process 3144 taskkill.exe 5100 taskkill.exe 4776 taskkill.exe 772 taskkill.exe 3020 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 37 IoCs
pid Process 4536 1r86h8.exe 4536 1r86h8.exe 2580 skotes.exe 2580 skotes.exe 4764 2t7496.exe 4764 2t7496.exe 2308 skotes.exe 2308 skotes.exe 3992 3o23Y.exe 3992 3o23Y.exe 440 4v380f.exe 440 4v380f.exe 440 4v380f.exe 440 4v380f.exe 1620 3EUEYgl.exe 1620 3EUEYgl.exe 4452 skotes.exe 4452 skotes.exe 3384 1e91a1f303.exe 3384 1e91a1f303.exe 1620 3EUEYgl.exe 1620 3EUEYgl.exe 2956 502085517a.exe 2956 502085517a.exe 2668 b2ef8ced4c.exe 2668 b2ef8ced4c.exe 2668 b2ef8ced4c.exe 2668 b2ef8ced4c.exe 4624 c530a62d40.exe 4624 c530a62d40.exe 1164 1e62ab0eae.exe 1164 1e62ab0eae.exe 1164 1e62ab0eae.exe 1164 1e62ab0eae.exe 1164 1e62ab0eae.exe 5476 skotes.exe 5476 skotes.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 440 4v380f.exe Token: SeDebugPrivilege 5100 taskkill.exe Token: SeDebugPrivilege 4776 taskkill.exe Token: SeDebugPrivilege 772 taskkill.exe Token: SeDebugPrivilege 3020 taskkill.exe Token: SeDebugPrivilege 3144 taskkill.exe Token: SeDebugPrivilege 2376 firefox.exe Token: SeDebugPrivilege 2376 firefox.exe Token: SeDebugPrivilege 1164 1e62ab0eae.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 4536 1r86h8.exe 2668 b2ef8ced4c.exe 2668 b2ef8ced4c.exe 2668 b2ef8ced4c.exe 2668 b2ef8ced4c.exe 2668 b2ef8ced4c.exe 2668 b2ef8ced4c.exe 2668 b2ef8ced4c.exe 2376 firefox.exe 2376 firefox.exe 2376 firefox.exe 2376 firefox.exe 2668 b2ef8ced4c.exe 2376 firefox.exe 2376 firefox.exe 2376 firefox.exe 2376 firefox.exe 2376 firefox.exe 2376 firefox.exe 2376 firefox.exe 2376 firefox.exe 2376 firefox.exe 2376 firefox.exe 2376 firefox.exe 2376 firefox.exe 2376 firefox.exe 2376 firefox.exe 2376 firefox.exe 2376 firefox.exe 2376 firefox.exe 2668 b2ef8ced4c.exe 2668 b2ef8ced4c.exe 2668 b2ef8ced4c.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 2668 b2ef8ced4c.exe 2668 b2ef8ced4c.exe 2668 b2ef8ced4c.exe 2668 b2ef8ced4c.exe 2668 b2ef8ced4c.exe 2668 b2ef8ced4c.exe 2668 b2ef8ced4c.exe 2376 firefox.exe 2376 firefox.exe 2376 firefox.exe 2376 firefox.exe 2668 b2ef8ced4c.exe 2376 firefox.exe 2376 firefox.exe 2376 firefox.exe 2376 firefox.exe 2376 firefox.exe 2376 firefox.exe 2376 firefox.exe 2376 firefox.exe 2376 firefox.exe 2376 firefox.exe 2376 firefox.exe 2376 firefox.exe 2376 firefox.exe 2376 firefox.exe 2376 firefox.exe 2376 firefox.exe 2668 b2ef8ced4c.exe 2668 b2ef8ced4c.exe 2668 b2ef8ced4c.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2376 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3744 wrote to memory of 3504 3744 e722b1ec7c893209be4e092e4db1aefe498cd87120350df2049f2d50b5e5bf1d.exe 85 PID 3744 wrote to memory of 3504 3744 e722b1ec7c893209be4e092e4db1aefe498cd87120350df2049f2d50b5e5bf1d.exe 85 PID 3744 wrote to memory of 3504 3744 e722b1ec7c893209be4e092e4db1aefe498cd87120350df2049f2d50b5e5bf1d.exe 85 PID 3504 wrote to memory of 3020 3504 T8q31.exe 86 PID 3504 wrote to memory of 3020 3504 T8q31.exe 86 PID 3504 wrote to memory of 3020 3504 T8q31.exe 86 PID 3020 wrote to memory of 4536 3020 N8Q40.exe 87 PID 3020 wrote to memory of 4536 3020 N8Q40.exe 87 PID 3020 wrote to memory of 4536 3020 N8Q40.exe 87 PID 4536 wrote to memory of 2580 4536 1r86h8.exe 88 PID 4536 wrote to memory of 2580 4536 1r86h8.exe 88 PID 4536 wrote to memory of 2580 4536 1r86h8.exe 88 PID 3020 wrote to memory of 4764 3020 N8Q40.exe 89 PID 3020 wrote to memory of 4764 3020 N8Q40.exe 89 PID 3020 wrote to memory of 4764 3020 N8Q40.exe 89 PID 3504 wrote to memory of 3992 3504 T8q31.exe 92 PID 3504 wrote to memory of 3992 3504 T8q31.exe 92 PID 3504 wrote to memory of 3992 3504 T8q31.exe 92 PID 3744 wrote to memory of 440 3744 e722b1ec7c893209be4e092e4db1aefe498cd87120350df2049f2d50b5e5bf1d.exe 93 PID 3744 wrote to memory of 440 3744 e722b1ec7c893209be4e092e4db1aefe498cd87120350df2049f2d50b5e5bf1d.exe 93 PID 3744 wrote to memory of 440 3744 e722b1ec7c893209be4e092e4db1aefe498cd87120350df2049f2d50b5e5bf1d.exe 93 PID 2580 wrote to memory of 1700 2580 skotes.exe 112 PID 2580 wrote to memory of 1700 2580 skotes.exe 112 PID 2580 wrote to memory of 1700 2580 skotes.exe 112 PID 2580 wrote to memory of 1620 2580 skotes.exe 114 PID 2580 wrote to memory of 1620 2580 skotes.exe 114 PID 2580 wrote to memory of 1620 2580 skotes.exe 114 PID 2580 wrote to memory of 3384 2580 skotes.exe 117 PID 2580 wrote to memory of 3384 2580 skotes.exe 117 PID 2580 wrote to memory of 3384 2580 skotes.exe 117 PID 1620 wrote to memory of 3392 1620 3EUEYgl.exe 119 PID 1620 wrote to memory of 3392 1620 3EUEYgl.exe 119 PID 1620 wrote to memory of 3392 1620 3EUEYgl.exe 119 PID 3392 wrote to memory of 3620 3392 cmd.exe 122 PID 3392 wrote to memory of 3620 3392 cmd.exe 122 PID 3392 wrote to memory of 3620 3392 cmd.exe 122 PID 2580 wrote to memory of 2956 2580 skotes.exe 121 PID 2580 wrote to memory of 2956 2580 skotes.exe 121 PID 2580 wrote to memory of 2956 2580 skotes.exe 121 PID 2580 wrote to memory of 2668 2580 skotes.exe 123 PID 2580 wrote to memory of 2668 2580 skotes.exe 123 PID 2580 wrote to memory of 2668 2580 skotes.exe 123 PID 2668 wrote to memory of 5100 2668 b2ef8ced4c.exe 125 PID 2668 wrote to memory of 5100 2668 b2ef8ced4c.exe 125 PID 2668 wrote to memory of 5100 2668 b2ef8ced4c.exe 125 PID 2668 wrote to memory of 4776 2668 b2ef8ced4c.exe 127 PID 2668 wrote to memory of 4776 2668 b2ef8ced4c.exe 127 PID 2668 wrote to memory of 4776 2668 b2ef8ced4c.exe 127 PID 2668 wrote to memory of 772 2668 b2ef8ced4c.exe 129 PID 2668 wrote to memory of 772 2668 b2ef8ced4c.exe 129 PID 2668 wrote to memory of 772 2668 b2ef8ced4c.exe 129 PID 2668 wrote to memory of 3020 2668 b2ef8ced4c.exe 131 PID 2668 wrote to memory of 3020 2668 b2ef8ced4c.exe 131 PID 2668 wrote to memory of 3020 2668 b2ef8ced4c.exe 131 PID 2668 wrote to memory of 3144 2668 b2ef8ced4c.exe 133 PID 2668 wrote to memory of 3144 2668 b2ef8ced4c.exe 133 PID 2668 wrote to memory of 3144 2668 b2ef8ced4c.exe 133 PID 2668 wrote to memory of 3692 2668 b2ef8ced4c.exe 135 PID 2668 wrote to memory of 3692 2668 b2ef8ced4c.exe 135 PID 3692 wrote to memory of 2376 3692 firefox.exe 136 PID 3692 wrote to memory of 2376 3692 firefox.exe 136 PID 3692 wrote to memory of 2376 3692 firefox.exe 136 PID 3692 wrote to memory of 2376 3692 firefox.exe 136 PID 3692 wrote to memory of 2376 3692 firefox.exe 136 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\e722b1ec7c893209be4e092e4db1aefe498cd87120350df2049f2d50b5e5bf1d.exe"C:\Users\Admin\AppData\Local\Temp\e722b1ec7c893209be4e092e4db1aefe498cd87120350df2049f2d50b5e5bf1d.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\T8q31.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\T8q31.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\N8Q40.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\N8Q40.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1r86h8.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1r86h8.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Users\Admin\AppData\Local\Temp\1013765001\yiklfON.exe"C:\Users\Admin\AppData\Local\Temp\1013765001\yiklfON.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1700
-
-
C:\Users\Admin\AppData\Local\Temp\1013771001\3EUEYgl.exe"C:\Users\Admin\AppData\Local\Temp\1013771001\3EUEYgl.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\1013771001\3EUEYgl.exe" & rd /s /q "C:\ProgramData\W4WB168Q1DJM" & exit7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3392 -
C:\Windows\SysWOW64\timeout.exetimeout /t 108⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:3620
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013772001\1e91a1f303.exe"C:\Users\Admin\AppData\Local\Temp\1013772001\1e91a1f303.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3384
-
-
C:\Users\Admin\AppData\Local\Temp\1013773001\502085517a.exe"C:\Users\Admin\AppData\Local\Temp\1013773001\502085517a.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2956
-
-
C:\Users\Admin\AppData\Local\Temp\1013774001\b2ef8ced4c.exe"C:\Users\Admin\AppData\Local\Temp\1013774001\b2ef8ced4c.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5100
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4776
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:772
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3020
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3144
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2376 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1940 -parentBuildID 20240401114208 -prefsHandle 1856 -prefMapHandle 1832 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {f3072585-332f-4d40-bbbb-255b1ea2794f} 2376 "\\.\pipe\gecko-crash-server-pipe.2376" gpu9⤵PID:1772
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2420 -parentBuildID 20240401114208 -prefsHandle 2412 -prefMapHandle 2400 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0bfde83f-0c49-4cd0-8711-7ac8f38ff334} 2376 "\\.\pipe\gecko-crash-server-pipe.2376" socket9⤵PID:3780
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3048 -childID 1 -isForBrowser -prefsHandle 3060 -prefMapHandle 3056 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {350a4136-1519-48c2-b8c7-6e178ba91bc8} 2376 "\\.\pipe\gecko-crash-server-pipe.2376" tab9⤵PID:1812
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3916 -childID 2 -isForBrowser -prefsHandle 3908 -prefMapHandle 3904 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {42ce7bac-99a3-41d1-bdbb-dc44b22f2ea8} 2376 "\\.\pipe\gecko-crash-server-pipe.2376" tab9⤵PID:5112
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4464 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4456 -prefMapHandle 4444 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f6fad32b-e672-48f2-89c2-a3d874dc40a9} 2376 "\\.\pipe\gecko-crash-server-pipe.2376" utility9⤵
- Checks processor information in registry
PID:5504
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5136 -childID 3 -isForBrowser -prefsHandle 5128 -prefMapHandle 5108 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {48d46752-8b1e-49b8-b71f-fa642224fac2} 2376 "\\.\pipe\gecko-crash-server-pipe.2376" tab9⤵PID:6652
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5280 -childID 4 -isForBrowser -prefsHandle 5388 -prefMapHandle 5384 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {30098c4a-4616-4080-b62d-26f66b52b60c} 2376 "\\.\pipe\gecko-crash-server-pipe.2376" tab9⤵PID:6672
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5528 -childID 5 -isForBrowser -prefsHandle 5180 -prefMapHandle 5268 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b0e5139a-a7f8-411d-8dfc-73d5aba01999} 2376 "\\.\pipe\gecko-crash-server-pipe.2376" tab9⤵PID:6744
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013776001\c530a62d40.exe"C:\Users\Admin\AppData\Local\Temp\1013776001\c530a62d40.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4624 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4624 -s 17847⤵
- Program crash
PID:1860
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013775001\1e62ab0eae.exe"C:\Users\Admin\AppData\Local\Temp\1013775001\1e62ab0eae.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1164
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2t7496.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2t7496.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4764
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3o23Y.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3o23Y.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3992
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4v380f.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4v380f.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:440
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2308
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4624 -ip 46241⤵PID:5444
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5476
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ws2kncw.default-release\activity-stream.discovery_stream.json
Filesize19KB
MD5ff0970ebff4e74818bbdcf88c69ff182
SHA1ec11632d0c9224474e5505acb6bfb501a6571094
SHA2565fb228c0f32c1cab20397648dfcf15d4dd40dedb325d12529c37a9ce89957189
SHA512f633fe306efaf7203235922482f07fdca44b6c1254080a0aac8892346425424f3b88ab76aeb94069515f9d0d986452d61092dbc99c9f101143217d8610144695
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ws2kncw.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD5057cd36021f8e01dc90fb010c6d4f0da
SHA15219d913abd7597d61395e8d240e0c9bcbf3b666
SHA256493f9b4e2ccd994adcc9a7e5b78703e310ac074fbe7995fb5ee18c0a53918934
SHA5128347c50e0e35fdd8c889cdfe5c589baa4f5718d0138f99fd6bba1c0aaff72cb2aa0e7f5cd4c278835003eaec03f959be9bb59835b1e9974792c1f75c6656843a
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ws2kncw.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
7.4MB
MD5d71d031f039f8fb153488c26fb7d410f
SHA15b15fd6f94bdbb35ecd02bf9aa51912d698ebf45
SHA25636541a0e062085fed175a4a5eae45aa9e3563fff4a816a1bffa1b2c6f8280e5b
SHA512d97c801c73f14ae20b11529d0b0f58afc3981d92bd00f88dda59881f24d89d3b325a8c61b88adc77753cebb1c320afc64af7522c61c34b2a4916b13bddc278cf
-
Filesize
1.8MB
MD53b8b3018e3283830627249d26305419d
SHA140fa5ef5594f9e32810c023aba5b6b8cea82f680
SHA256258e444e78225f74d47ba4698d49a33e6d1f6ed1f3f710186be426078e2bf1cb
SHA5122e9a42e53406446b503f150abfa16b994ee34211830d14ccbfbf52d86019dc5cca95c40222e5c6aed910c90988f999560ff972c575f9c207d7834abba6f04aa0
-
Filesize
946KB
MD56a8c39af3a76c1d0a21384cb2af3ea88
SHA1ce3c9fc0ba78b6bf25178dcd55aac1cfd4f9561d
SHA25632a9e0d7c38c38f02796e3280d0099f920aeb62b69122746d28a35226000de8c
SHA5128fa5daaf36fbbea12cbfaf68d3c4bb85e729b5afd52408bb0460236cb0048fe2bdfcfe8aed3a0a4fa3253142227f7a32a72b88409e118f6fced7639c675c49f8
-
Filesize
1.9MB
MD59ab589c46a5b8ecd08d59093e5748144
SHA175be11f83b2857167e2f4a48f67fdd95ca9ab4ae
SHA25616ed4315e25a900e8bd2ab5a55932fea00923040bb95133ce263e952131f3286
SHA512b6f594a2d278fe3d4fbf232952053aae327753abbcca5508c17ba7900a0e088ca11815333b507ed83b1010747b4654a5786f47e57e444983b5ac75c308c59af4
-
Filesize
2.7MB
MD5208380dfdc7f14f216dcff3bfc6b89b1
SHA134b2e815fa63715775ac1164a157c49224f75196
SHA256cc525c548d50066182f348f4aa679522d171e2cad1e5a941e854c7e5045034fc
SHA5121616cdbc43826ab069b9894d8c17e7d345c8fbb50c861c4d67d2f4dd96645d48cb1923f5feda1c37a1ad787f7e267ad064b24e0d82095a09f36d745d6aaff996
-
Filesize
5.4MB
MD5e085653d2a48f215d3fb2ca413c189ce
SHA1d44cb3cb4af5e1f8a405485f8f7486e1007f25a4
SHA2561da006c16d80b0d176010fc4e21499315fed2fdca5e2a722c57f00d0da6c7c01
SHA512a064bb111069aed68c1443e9dab52fd504af79c0de7c1f0c9da5521184d8060262ef99cb0296e2666ac28f66a322c3d5d6a98d9d620c9e404a3b83163e26140a
-
Filesize
1.7MB
MD5b1389ec87bad100fad616612b0f8850c
SHA12893314486cb66c4454a83f21be67c536dcf0822
SHA25631b4f87080ce3e4bb1425ac640fdf884e0c54f27992177d9006174c9a662673b
SHA512cc16a98f23a91a30cf8042000c5db986c24c20b6cb72faebe94728815f73fa6c12a6a5f0625773a0f2aa46b08736fb4b4ef083192dc94e49fefcbcab3cc9e040
-
Filesize
3.6MB
MD50a93b2bbc5d9f9795095de4b0cb11de6
SHA140ae78a47df0ea5c8aae2ebab3ae741b9f5fd9c8
SHA256388b369fd40bd7c9dbbc7c262d1725cb9293de02aa8201aa2f20604e724850d8
SHA512b4e40bf89f2bc731aea1d058678a16498bac67fefe99497c0aef9f5ba09d6ecc3c6b5df79b5bc489ede716cd458c9f6a4dc985dba2f7135b75c137e8607da380
-
Filesize
3.1MB
MD5b050ef7f8588d03f67fd99df7b52384e
SHA19612c8a1882edf14bd97ccca61dc3f4a2a16cd3c
SHA256e899816b45c6394774718047ac63fee217db865339c7a7d467db69c575bdfa64
SHA512f4a5f954b1199c889dac4317f4b06fa07ffc9a5255a5f8aea60d9824765808def5a60a19f5003a564e4e1591c98e06c8b134441a6217f6d4e825caa65c28cf15
-
Filesize
1.8MB
MD5f311c4e019a62fb6a0151f10f30cc2bf
SHA133741cc7dbb6c8ab5661b01be59abc95bc2fe93b
SHA2567fe212bf16319044794c1dfae79a8c3c6d6f0f9752eb8682472b54c6b15c9381
SHA5129fef6e8e3c1dd403c906caa6d2afe7d401790260c5bea21992211406c28e43831529ed99ba03d5b2b149cc3e4c196c5bbbe0a822d4ed20bc28d6610c4ac85db7
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin
Filesize10KB
MD5e09dc26532067098940343dcfced9650
SHA1b16fc4697ce137b35109ade089f91e87d5aef351
SHA256d89d0959e0e76cb75b2f24f65f53629b99c8ec9d3cd80cf050a894b681994ddf
SHA512138adce18b5d35eaa350705f5a862a221438f24d60bf59ebd2ce17df826fcdee385758795c7ab82a53eadee2277221a3e55794d4ab927abba05e3bf2fde4f8a2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin
Filesize13KB
MD52c3d597e86c19f66d6e85f0c82923188
SHA1532668001f4aff5ed4a0c29ab58e316c4beaec60
SHA25690ae5e69d01e0fa6327dea9055842c311f490c163c7c4c4ae4fe21ffd21f956b
SHA5123800aec0e7862a129d22c9cd6ebf1fe83c55d5ce71f7fc11cfb8a60ba11c1010df3932fc5cb37e7c11dca9ca15687b7b4308493273a22ef8302373f69955f2e9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.bin
Filesize14KB
MD55308a3e4cb9becbbcee0e90c7389214e
SHA1023ec3bcb7e96b8d18cb7d7eb092314faae17b3c
SHA2561a584ccfeb58cfc944dd12be5382781c02ac5c350faec746138f4b02770a4446
SHA512c920e18ad43e5589638fb4e45732d2f74ad6bbd631c7b4af14e7013196171335274c77577065cd85d9a36eb1a9423392ce9cc819f3275456550431c983706e63
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.bin
Filesize23KB
MD5fd415dc9d65930580669c9a1f6c864b0
SHA1556250d2ad0fbd19e5103b3ef00e2c4c4d0e3f53
SHA256c96c695872b96250c645deb1424024b85c57a06844ec486e90c630f767548eeb
SHA5127a0d0a983530b87444dd6a492cb5437df2cf32e3369dc2bdde9b2117acd4ca19f8ebf9da36b7ab63ee89fdeed180f38638225cc9e2cf5cec54f354b108d6e005
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.bin
Filesize15KB
MD5a52a7e1508c0b938f62d7b36b24cd888
SHA1b7baf2462a09b6b2c86b1125d96f60b051c71ddc
SHA25648e80b01fdee5d63d31759e788f73730e348356c1969062a316c9c9b8cb7be04
SHA5126a9e254ea60fd428afe1a9cf18289eb52b294aa82a8d3816ec60b80cbcb7d49a0a7649222b932ab6ef05c3bf4e18dbe315087b57f3d0580325b3411850032911
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.bin
Filesize5KB
MD59d53210fb00ea041c3de636975fb114a
SHA17611d8fdc4ee6c641dead8a5cb77ae380ef0edf5
SHA2560d3269b771925bf9f96e365814f04fc026dab9ded627f56e94a6d10ba783d98a
SHA512ccc4059b8929165f1ddfb5f02ba92036226440622574cb6f4c3a6079e8835d08497db055f21b6e568097da6afca242fa7b43f074093a14d89467d29d52ab1959
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5429aaa9fe2700a44daa0f1a6a14276a9
SHA1ddf0cbed6e885b570d42d105e465dd950bb488c3
SHA256e383ce7e4cb7d258caa0de639ae7249ad33191a0d9a4c8e6bee3d501c67e8f8a
SHA512c3b70eda8ee47ec6bbf8ae32ed112bbf245d7879af2a6fbb02d322cc6d37d4b4a8237c3b471eb50179c99ad9f837b3062f157181678ac4ba5cafaedd0159af7c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5e93b47393ce850df593326992a6b482d
SHA1d29b45b4ab16e1036bf91dae22248273564afdfe
SHA256583450b2e7d85eee65e886be6b2f985c68ddcce6896bfa5795c6290f06c91564
SHA512ae91edfa32c0143915e64ca1965a10526549a08af90472e838e8447d5862f00fabf3bcf8a2f758b2d85c489f05c59f1cea0805816f17d84584f8dd283314e3bc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD514c6e6672140b2a08a57229e4c5027b9
SHA1a80b7a338f776d823e5b2ed9c7b39435afe38a4a
SHA25689418055461f2a6498097b972bfa10e86150c3602ed1043b5f46f108dedd45f2
SHA512ef0694810e155a55e489784c8532bc97f8edec7532d2beeff92f1f74e64c0a313c9a64f53076adf0ff8ea65fef6b8b1ef9f1ed7c1c48790288b12fc52b4b5b24
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD515b927dd04639e092688c483a0d340dd
SHA182b438dd993fa83f714e370e3e042fcbf3e16dbd
SHA2563a9dd5015b588febcd1b5bfc6685618890688d02d2e0f0ea6515ba1699499957
SHA512afff4275cc0bf71485943bb9fca8c92e15b579c338286d7d131918c5f9f28068f8b4aa66737c96aee2d2aae29d1cc852784c27d38c6007d4b1fb5dc99fe371d4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5f1e14e31e307b49dbaaee0d9d9124753
SHA10a8e4e36dc613625258a0228805740e2d7ffe863
SHA256d6e5204179a4063d8ed5b59897e15d36153b8fcd1bd76b8dee672d98be0ca596
SHA512a64a22a4343432078aa66817f954173842b8bbce1271739bbfedd647c3f58b194fc7d2393856136cd8b91021ed2954fd42a38d9e5f38756a07de87abcf9ec0c1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD58f744ab7d1f06912b0ef49a8cb8dcb05
SHA15bc469596fa078129608b39c8d498fa3aabb85dd
SHA25626a6642bdc66196163c2423bf2d5087c150ca6dca3fc0ae5fe81b8ad9d3ff8a8
SHA5123cd7045ee66e01ff5372a8cf0d79db8c10e661b20f83c37a59eadfc438c62a547217adf8e13f04ef048db69ef0151d17638a2daa1c7841b43babe87a46f813d4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\84d2b932-27e4-4c71-aca3-452f0d4efb3c
Filesize671B
MD5f03396166d826f149e7a6dde77008746
SHA15e81ba4274b27b4411319dd72eb1f1b19f043c19
SHA256ebf10e1c8fc8d5a78e581752f24206fd2c751b436d55a5c829b29a825f780960
SHA5129b6dddbc618e2fbfb6f25064ed52c1569b1d0cf3ad0940b05e527640b2bef9f39df87b69a217786bf03ff56f218c2573a9b28ec82e79be41cc2dece1abc6f6d2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\876873cf-19d3-4645-898c-db4bb608074d
Filesize28KB
MD5b6b5443e98c964842404f4a02f4edf26
SHA13b452747fadb14b9d675d7d1d2d3bbb7da36f521
SHA256317ae7225ad27f542fdce3e40aa55f6746625d1f9da7b2709aaf134a969b6714
SHA512295d706dd5e4d2b86ab09c789cc8285e0c77ed0027caa3ba3f85360ecc3485e920dffc239530a89d0ae46403f659add48e7d2a87fdfaec3f751bfae26774600a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\e4330db2-5ee7-4266-8dd5-02cbc1fba2f4
Filesize982B
MD5def1c98421c5eb75f94d1c1ca52b3231
SHA1740d6c772959dedfbcd8c707e1976d884cdace51
SHA256aa8182ab005c203ea5e730d332a2f52d7b9418c7b1e98ec3d3c72b3c386d6943
SHA5123a7307e31198fca2f056ad504866f733926c918525a174771169b814e421720f60974e8708833dbc8503148385062f900d63643041d856f86d6f71d1ed4fa1e5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
11KB
MD512c2b29b6dc3baebe2a5c2daf86d42c2
SHA1b53856b8565793bdaa9ff59de8dd275562cfd645
SHA25698caac91da04b772883200088f651fa8d0dc6710c8b27e21c79125d7438a5fe6
SHA5127adecf2aa41c3b8fab3d676a6270855b2c02542daa80e468ce34b4987327125334595f24b964e6fcb69c213ad01f71684bc4754dbecd31ec64267d39af20d4fe
-
Filesize
15KB
MD5edc7d33060f254680f6fec7fb7d5b729
SHA152cc06baa3d7683d9b65db211301ea3b934590d7
SHA2568e31d3bc892bf2006f7eb4ec769c09aeef5efcf02cef7b3bfc26a7f766500574
SHA512e0c35ead88df75c36bd3228901259539c6c7dd44608c747e7236e5dd4157f302a5ee61deb6acf67a26b18e9bdf0f1c9b3093fe0c022c5739c5421d810cf6f981
-
Filesize
10KB
MD53028c6a5ee8b938c27fb64bfc17020df
SHA1a8c58a6c45dd0aa4490b953b6572f0ef3f648159
SHA2561a2fc5219af8d85844a0c1f8995f1bbe057952c39e4d8fcc328de39392e948f9
SHA51205c5f9628c093828b01e63c2681e11a5a72f32efe80cde15c7108ba78a430ce515dc5166688bf274830ee793c4cb03f6fbb1392c82b72d7af41e875e78b8918c
-
Filesize
15KB
MD5798ce558d27c11c51ae22f5804d6c4f5
SHA13c4db676cc5455c284fb58ecba0f1ff61e86f1ee
SHA2566c63e2b9ccc81d364bf8c74bb65a0e652c25caffb4a7b2363bd520cd73e5b65d
SHA5129f8431fac6a7614a82283798fb1b95ddf14de64c6a07568c6b451af21b7de37edb6d3481c792dd5300429da8e7b4afcdd89e11f3380772eff59c176c4317d528
-
Filesize
11KB
MD5b6da1b5a6adb761f88d136928aa4fb52
SHA16d7cb2a9d335a66a5d0f65e0c08574aabff376c7
SHA2560d69882ae9a1f9917796b2303699260c034536a50cd90f4401590514192041f9
SHA512b48bb9115e2d25b7fc650ad13c485c0f665bb32965d0774842840d9cf995c0097ba4bed88c813e49712fbf4e1df4e0dd9b5441b9f5730b520b2a2d7298772682
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize9.5MB
MD5d1a2ffbd216ca99f0bfc48334530fa08
SHA1e648f7ea5615790687794c0b5ad186ba1f7ff1f5
SHA256f4fbfb18dea4f4b8e69013d7aa21b1526c42f9377908678aa45ea86e679477b0
SHA5128802e3388aaa322bee8e1956662f6368629bcda9e35b318111580e64da99a26d26b977f7f34566b520d37961ff4b5fd1315b49fa2d722706fbd7aa396c2c77cd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize9.5MB
MD51e4984c380ee7dfd4d8bfea4d04ee29d
SHA1d7e531f26c16a0049c15513d3aefc0f5301c1925
SHA256798cae9046e2623d6817a42505ceacf0a67ad74df11d2a7e69d37a0d6454d126
SHA5121c94856d80ba0172ec2d78725ee9d047d4fba57888b62f0a755c34721c80aa44d2bb4ffaad0456671226d2a903b38dac78307c4bd106f0a072bf5bd04a37a095