Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-12-2024 19:54
Static task
static1
General
-
Target
1136566f5c896c8a2218126b2c4dbe67a6fd83bf808fd2de735458a6422f0636.exe
-
Size
6.9MB
-
MD5
5690ba1d0f23125e6a250ad945bb0f61
-
SHA1
735ea7ae82ffcfa15cb8de133a2cd29ffb2f294e
-
SHA256
1136566f5c896c8a2218126b2c4dbe67a6fd83bf808fd2de735458a6422f0636
-
SHA512
6262d48e3ea0c5e1ca0f91b5950749ccddc36a53b82a12d1443f6d3b84e6e0b4164d347a5a9bfe2f0796d9f733e38cb4de1acb79da362f72d9dcef682d5bfd46
-
SSDEEP
196608:Gamkq+z5p/OtyEeJiwXW65oY3GEmR7+2cVau:bmkqc9O/6fW6aY3GfR7+dQu
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
https://atten-supporse.biz/api
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://atten-supporse.biz/api
https://covery-mover.biz/api
Signatures
-
Amadey family
-
Gcleaner family
-
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 91d535d8c0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 91d535d8c0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 91d535d8c0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 91d535d8c0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 91d535d8c0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 91d535d8c0.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 12 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2g5323.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3d69R.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ec4da0b3e7.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4L684S.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 91066d55a2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9756c4e101.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 91d535d8c0.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1c55e6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 24 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2g5323.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9756c4e101.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ec4da0b3e7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 91d535d8c0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2g5323.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3d69R.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4L684S.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 91066d55a2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ec4da0b3e7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 91d535d8c0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1c55e6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4L684S.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 91066d55a2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9756c4e101.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1c55e6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3d69R.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 1c55e6.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 16 IoCs
pid Process 1636 g1t41.exe 1844 j7v75.exe 464 1c55e6.exe 2520 skotes.exe 972 2g5323.exe 1416 skotes.exe 404 3d69R.exe 3208 4L684S.exe 2192 91066d55a2.exe 4520 9756c4e101.exe 4840 ec4da0b3e7.exe 4992 670b856c2e.exe 5660 91d535d8c0.exe 6828 skotes.exe 5724 b389ffaa47.exe 6472 skotes.exe -
Identifies Wine through registry keys 2 TTPs 12 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 91d535d8c0.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 2g5323.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 3d69R.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 4L684S.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 91066d55a2.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 9756c4e101.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 1c55e6.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine ec4da0b3e7.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 91d535d8c0.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 91d535d8c0.exe -
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\670b856c2e.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013797001\\670b856c2e.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\91d535d8c0.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013798001\\91d535d8c0.exe" skotes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1136566f5c896c8a2218126b2c4dbe67a6fd83bf808fd2de735458a6422f0636.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" g1t41.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" j7v75.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\9756c4e101.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013795001\\9756c4e101.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ec4da0b3e7.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013796001\\ec4da0b3e7.exe" skotes.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0008000000023cdd-130.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
pid Process 464 1c55e6.exe 2520 skotes.exe 972 2g5323.exe 1416 skotes.exe 404 3d69R.exe 3208 4L684S.exe 2192 91066d55a2.exe 4520 9756c4e101.exe 4840 ec4da0b3e7.exe 5660 91d535d8c0.exe 6828 skotes.exe 6472 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1c55e6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 4860 3208 WerFault.exe 91 5864 2192 WerFault.exe 100 -
System Location Discovery: System Language Discovery 1 TTPs 21 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b389ffaa47.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1136566f5c896c8a2218126b2c4dbe67a6fd83bf808fd2de735458a6422f0636.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2g5323.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 91066d55a2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 670b856c2e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language g1t41.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1c55e6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9756c4e101.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language j7v75.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 670b856c2e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 670b856c2e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 91d535d8c0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3d69R.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4L684S.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ec4da0b3e7.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 4920 taskkill.exe 5064 taskkill.exe 4352 taskkill.exe 1600 taskkill.exe 896 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 464 1c55e6.exe 464 1c55e6.exe 2520 skotes.exe 2520 skotes.exe 972 2g5323.exe 972 2g5323.exe 404 3d69R.exe 404 3d69R.exe 1416 skotes.exe 1416 skotes.exe 3208 4L684S.exe 3208 4L684S.exe 2192 91066d55a2.exe 2192 91066d55a2.exe 4520 9756c4e101.exe 4520 9756c4e101.exe 4840 ec4da0b3e7.exe 4840 ec4da0b3e7.exe 4992 670b856c2e.exe 4992 670b856c2e.exe 4992 670b856c2e.exe 4992 670b856c2e.exe 5660 91d535d8c0.exe 5660 91d535d8c0.exe 5660 91d535d8c0.exe 5660 91d535d8c0.exe 5660 91d535d8c0.exe 6828 skotes.exe 6828 skotes.exe 6472 skotes.exe 6472 skotes.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 4920 taskkill.exe Token: SeDebugPrivilege 5064 taskkill.exe Token: SeDebugPrivilege 1600 taskkill.exe Token: SeDebugPrivilege 896 taskkill.exe Token: SeDebugPrivilege 824 firefox.exe Token: SeDebugPrivilege 824 firefox.exe Token: SeDebugPrivilege 5660 91d535d8c0.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 464 1c55e6.exe 4992 670b856c2e.exe 4992 670b856c2e.exe 4992 670b856c2e.exe 4992 670b856c2e.exe 4992 670b856c2e.exe 4992 670b856c2e.exe 4992 670b856c2e.exe 4992 670b856c2e.exe 824 firefox.exe 824 firefox.exe 824 firefox.exe 824 firefox.exe 824 firefox.exe 824 firefox.exe 824 firefox.exe 824 firefox.exe 824 firefox.exe 824 firefox.exe 824 firefox.exe 824 firefox.exe 824 firefox.exe 824 firefox.exe 824 firefox.exe 824 firefox.exe 824 firefox.exe 824 firefox.exe 824 firefox.exe 824 firefox.exe 824 firefox.exe 4992 670b856c2e.exe 4992 670b856c2e.exe 4992 670b856c2e.exe 4992 670b856c2e.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 4992 670b856c2e.exe 4992 670b856c2e.exe 4992 670b856c2e.exe 4992 670b856c2e.exe 4992 670b856c2e.exe 4992 670b856c2e.exe 4992 670b856c2e.exe 4992 670b856c2e.exe 824 firefox.exe 824 firefox.exe 824 firefox.exe 824 firefox.exe 824 firefox.exe 824 firefox.exe 824 firefox.exe 824 firefox.exe 824 firefox.exe 824 firefox.exe 824 firefox.exe 824 firefox.exe 824 firefox.exe 824 firefox.exe 824 firefox.exe 824 firefox.exe 824 firefox.exe 824 firefox.exe 824 firefox.exe 824 firefox.exe 4992 670b856c2e.exe 4992 670b856c2e.exe 4992 670b856c2e.exe 4992 670b856c2e.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 824 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4664 wrote to memory of 1636 4664 1136566f5c896c8a2218126b2c4dbe67a6fd83bf808fd2de735458a6422f0636.exe 82 PID 4664 wrote to memory of 1636 4664 1136566f5c896c8a2218126b2c4dbe67a6fd83bf808fd2de735458a6422f0636.exe 82 PID 4664 wrote to memory of 1636 4664 1136566f5c896c8a2218126b2c4dbe67a6fd83bf808fd2de735458a6422f0636.exe 82 PID 1636 wrote to memory of 1844 1636 g1t41.exe 83 PID 1636 wrote to memory of 1844 1636 g1t41.exe 83 PID 1636 wrote to memory of 1844 1636 g1t41.exe 83 PID 1844 wrote to memory of 464 1844 j7v75.exe 84 PID 1844 wrote to memory of 464 1844 j7v75.exe 84 PID 1844 wrote to memory of 464 1844 j7v75.exe 84 PID 464 wrote to memory of 2520 464 1c55e6.exe 85 PID 464 wrote to memory of 2520 464 1c55e6.exe 85 PID 464 wrote to memory of 2520 464 1c55e6.exe 85 PID 1844 wrote to memory of 972 1844 j7v75.exe 86 PID 1844 wrote to memory of 972 1844 j7v75.exe 86 PID 1844 wrote to memory of 972 1844 j7v75.exe 86 PID 1636 wrote to memory of 404 1636 g1t41.exe 87 PID 1636 wrote to memory of 404 1636 g1t41.exe 87 PID 1636 wrote to memory of 404 1636 g1t41.exe 87 PID 4664 wrote to memory of 3208 4664 1136566f5c896c8a2218126b2c4dbe67a6fd83bf808fd2de735458a6422f0636.exe 91 PID 4664 wrote to memory of 3208 4664 1136566f5c896c8a2218126b2c4dbe67a6fd83bf808fd2de735458a6422f0636.exe 91 PID 4664 wrote to memory of 3208 4664 1136566f5c896c8a2218126b2c4dbe67a6fd83bf808fd2de735458a6422f0636.exe 91 PID 2520 wrote to memory of 2192 2520 skotes.exe 100 PID 2520 wrote to memory of 2192 2520 skotes.exe 100 PID 2520 wrote to memory of 2192 2520 skotes.exe 100 PID 2520 wrote to memory of 4520 2520 skotes.exe 101 PID 2520 wrote to memory of 4520 2520 skotes.exe 101 PID 2520 wrote to memory of 4520 2520 skotes.exe 101 PID 2520 wrote to memory of 4840 2520 skotes.exe 103 PID 2520 wrote to memory of 4840 2520 skotes.exe 103 PID 2520 wrote to memory of 4840 2520 skotes.exe 103 PID 2520 wrote to memory of 4992 2520 skotes.exe 105 PID 2520 wrote to memory of 4992 2520 skotes.exe 105 PID 2520 wrote to memory of 4992 2520 skotes.exe 105 PID 4992 wrote to memory of 4920 4992 670b856c2e.exe 106 PID 4992 wrote to memory of 4920 4992 670b856c2e.exe 106 PID 4992 wrote to memory of 4920 4992 670b856c2e.exe 106 PID 4992 wrote to memory of 5064 4992 670b856c2e.exe 108 PID 4992 wrote to memory of 5064 4992 670b856c2e.exe 108 PID 4992 wrote to memory of 5064 4992 670b856c2e.exe 108 PID 4992 wrote to memory of 4352 4992 670b856c2e.exe 110 PID 4992 wrote to memory of 4352 4992 670b856c2e.exe 110 PID 4992 wrote to memory of 4352 4992 670b856c2e.exe 110 PID 4992 wrote to memory of 1600 4992 670b856c2e.exe 112 PID 4992 wrote to memory of 1600 4992 670b856c2e.exe 112 PID 4992 wrote to memory of 1600 4992 670b856c2e.exe 112 PID 4992 wrote to memory of 896 4992 670b856c2e.exe 114 PID 4992 wrote to memory of 896 4992 670b856c2e.exe 114 PID 4992 wrote to memory of 896 4992 670b856c2e.exe 114 PID 4992 wrote to memory of 1088 4992 670b856c2e.exe 116 PID 4992 wrote to memory of 1088 4992 670b856c2e.exe 116 PID 1088 wrote to memory of 824 1088 firefox.exe 117 PID 1088 wrote to memory of 824 1088 firefox.exe 117 PID 1088 wrote to memory of 824 1088 firefox.exe 117 PID 1088 wrote to memory of 824 1088 firefox.exe 117 PID 1088 wrote to memory of 824 1088 firefox.exe 117 PID 1088 wrote to memory of 824 1088 firefox.exe 117 PID 1088 wrote to memory of 824 1088 firefox.exe 117 PID 1088 wrote to memory of 824 1088 firefox.exe 117 PID 1088 wrote to memory of 824 1088 firefox.exe 117 PID 1088 wrote to memory of 824 1088 firefox.exe 117 PID 1088 wrote to memory of 824 1088 firefox.exe 117 PID 824 wrote to memory of 2320 824 firefox.exe 118 PID 824 wrote to memory of 2320 824 firefox.exe 118 PID 824 wrote to memory of 2320 824 firefox.exe 118 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\1136566f5c896c8a2218126b2c4dbe67a6fd83bf808fd2de735458a6422f0636.exe"C:\Users\Admin\AppData\Local\Temp\1136566f5c896c8a2218126b2c4dbe67a6fd83bf808fd2de735458a6422f0636.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\g1t41.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\g1t41.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\j7v75.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\j7v75.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1c55e6.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1c55e6.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\1013794001\91066d55a2.exe"C:\Users\Admin\AppData\Local\Temp\1013794001\91066d55a2.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2192 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2192 -s 7847⤵
- Program crash
PID:5864
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013795001\9756c4e101.exe"C:\Users\Admin\AppData\Local\Temp\1013795001\9756c4e101.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4520
-
-
C:\Users\Admin\AppData\Local\Temp\1013796001\ec4da0b3e7.exe"C:\Users\Admin\AppData\Local\Temp\1013796001\ec4da0b3e7.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4840
-
-
C:\Users\Admin\AppData\Local\Temp\1013797001\670b856c2e.exe"C:\Users\Admin\AppData\Local\Temp\1013797001\670b856c2e.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4920
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5064
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:4352
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1600
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:896
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2008 -parentBuildID 20240401114208 -prefsHandle 1924 -prefMapHandle 1916 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {2543c0d8-38d3-47d0-8845-b5dceb7e9101} 824 "\\.\pipe\gecko-crash-server-pipe.824" gpu9⤵PID:2320
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2460 -parentBuildID 20240401114208 -prefsHandle 2452 -prefMapHandle 2448 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ccd54f5a-e35d-4e1d-97a1-d9c9924218f5} 824 "\\.\pipe\gecko-crash-server-pipe.824" socket9⤵PID:1136
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3108 -childID 1 -isForBrowser -prefsHandle 2632 -prefMapHandle 3012 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1184 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e036f730-c55d-4026-92f3-f2a2fa4cc55b} 824 "\\.\pipe\gecko-crash-server-pipe.824" tab9⤵PID:3444
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4192 -childID 2 -isForBrowser -prefsHandle 4188 -prefMapHandle 4180 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1184 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {84c29956-fef5-486e-92ed-f787b7a5bc96} 824 "\\.\pipe\gecko-crash-server-pipe.824" tab9⤵PID:4196
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2868 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4836 -prefMapHandle 4832 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {41ddd05f-9aef-48b1-ab24-efbd7189d5ab} 824 "\\.\pipe\gecko-crash-server-pipe.824" utility9⤵
- Checks processor information in registry
PID:6612
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5388 -childID 3 -isForBrowser -prefsHandle 5408 -prefMapHandle 5296 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1184 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6692b472-c7b7-41f1-bc37-0fefb32ac2ad} 824 "\\.\pipe\gecko-crash-server-pipe.824" tab9⤵PID:6624
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5552 -childID 4 -isForBrowser -prefsHandle 5504 -prefMapHandle 5284 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1184 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {588d8de8-bc1c-441b-aa57-637a26a721ef} 824 "\\.\pipe\gecko-crash-server-pipe.824" tab9⤵PID:2516
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5736 -childID 5 -isForBrowser -prefsHandle 5812 -prefMapHandle 5808 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1184 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {adf58d23-a61b-47a2-8d3d-f3acc277f50d} 824 "\\.\pipe\gecko-crash-server-pipe.824" tab9⤵PID:2160
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013798001\91d535d8c0.exe"C:\Users\Admin\AppData\Local\Temp\1013798001\91d535d8c0.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5660
-
-
C:\Users\Admin\AppData\Local\Temp\1013799001\b389ffaa47.exe"C:\Users\Admin\AppData\Local\Temp\1013799001\b389ffaa47.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5724
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2g5323.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2g5323.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:972
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3d69R.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3d69R.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:404
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4L684S.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4L684S.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3208 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3208 -s 8243⤵
- Program crash
PID:4860
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1416
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3208 -ip 32081⤵PID:408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2192 -ip 21921⤵PID:5840
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6828
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6472
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\activity-stream.discovery_stream.json
Filesize19KB
MD5a1b5347d34e977d58fe991b37f38ab11
SHA1c07e20b289b5d63b0664f26c1e57984413ccf50f
SHA256fcc342af723542f44343d4c80efc617b933c295bc0ac7cf3255af5505b192a6e
SHA512d7f73e14b8fbea7125622f1541cf3763c59395f9307245a51b6b0ef7d74d31bd298e4f2decd294b44881fa078bc500a82116091fd55d13613b12a893996f1360
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD5b06ad36ba0d7cc2107a9be5989697b66
SHA130362edf678b2fdb96bf6c8900bc0945a01edfcf
SHA25652bd35088fcb66afbc3370790d059c184a5b8dc2d69aa5ec77dc96a5dee52ab7
SHA5122ca1bae6fc9cfc43cdf1600b011a2b72766c208ddf3c2b6ab82e53ed6f80717c8fc4e49c1c7b3ff289ae3fb405bd79c9fbc987c89b7c6d4e8de4aec501752a8a
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
1.9MB
MD5fcf0bc8b1fa8d11d7b4deb6d36984b04
SHA168adab1a3267460eef1969d6e8b8a573c2f8213e
SHA256ab9d97632285feeeb86e9cb6cb54513704469d3b5eb6501b27a07f0215d2a00a
SHA51289116a34ade27747f1915643761bc071df8b00227cfd56633e54278c1d07991b25b9766c71ca359ed9ffb3439f5c2b7ec4d96b891c9c0b91c167afc167f2951c
-
Filesize
1.8MB
MD5a27fd8186596b71aeee364fbc2a19b59
SHA1f57ae9721146f3018610b05472a1bda895ea1788
SHA25618b168402cd120acdc3be2fbfcd03adb8c09aebd3748f72885c5a94af127968f
SHA512b6ff1ca9c0529ed7db21385951cda8fbe192971c9410408ff3b765ba757167df0d80648b964c581940a78fec967d770011e2b879bef10494b58db6dbd06882e6
-
Filesize
1.7MB
MD5b77fcf58b15829cf7922664905a91f93
SHA1ba66460754801bf6f8a85e6ef06d075f3689b3f5
SHA256f2f4b3927120c31c77b9e09c3bb57ccae730555d2390fe2020824f9926d82fb0
SHA512d6dafef60194cd7ff1dd0e80b649f17dc082dea7401ebde2b7e956792a1aab4ff9cffc4f8b2524e6b6c1e64e726ff1b8b1928e35ae4fdc7fa1dd07700add3e6e
-
Filesize
949KB
MD5adbcc0272c5077c35d7f6cd77693178a
SHA19499a0a8d12804b013392e7de84786c56e570218
SHA2561de22689e5a21f4a8389630d7812f1948591e6718eb12aef0d3064c68cb02db2
SHA512c712735f1fadbf3533a97a71a2358f92e081b844f951f1c58c0b08ff1a182a99637839543bca69106f0089730e21059c5a34b358dbd317ba712a4a19de460737
-
Filesize
2.6MB
MD5694aa82544e4a51841fcef9ebf0058f1
SHA1243a3201f1203a8d03a1e3a7dfe5123f15bf64b6
SHA2564dcc3fc85165273636cccf4df83442d72f929f0e4a9fa04d0a6a53a4175856d1
SHA512850c0c5ec70c5b0d568cbcfbf21a3a97ea73549216aea7ef552b8dca8c9b53c368b9f7dc357e1e4b0e61e91f53fe39dd7228d7d1b9c6ffc3eb2bf7456874f09f
-
Filesize
2.5MB
MD52a78ce9f3872f5e591d643459cabe476
SHA19ac947dfc71a868bc9c2eb2bd78dfb433067682e
SHA25621a2ac44acd7a640735870eebfd04b8dc57bc66877cb5be3b929299e86a43dae
SHA51203e2cd8161a1394ee535a2ea7d197791ab715d69a02ffab98121ec5ac8150d2b17a9a32a59307042c4bbeffad7425b55efa047651de6ed39277dba80711454f9
-
Filesize
2.6MB
MD53c5c05ee39ea385bc626531b4f5f5dbd
SHA186495ef8de316f62be630e035e8f01da587a372e
SHA2563bcd6cea79db7594b29b8fea202d579226c29c7390812989f368ddd92578c43d
SHA5120540dfa8a577af5f6b537cd26b7a541c8935bbd51e66ced520ef44aaf39c28ef8ba39b434f9c4cc82acb5079e5a6ca75931d14d65bb7136a4c713beb4f97f735
-
Filesize
5.3MB
MD559a801af16d33fa038ecbb35a0f7d0c3
SHA113bc110d9b15b7ebd23ccf8706744ae0c4ef449b
SHA2568ce5a6ce73d0578b8b4756122cb8193d95eb4805d52366c7087856e1f1678d8c
SHA51217b88d7e3885ba58fc6f2b2463f7cdb41cffb1fe76fd3243221eb6989a0ea11a27f77ce3e66503808c952278f1868e2ce47fb0f0a5210b243c80b2c497f3e81a
-
Filesize
1.7MB
MD53f78e574ceb89348cf3af90c3a63bf20
SHA16fc220d8237c163947adfea2f7e643b8535a2450
SHA256200f25b055e75ab01b7b34120001b35682ecda95f704e5f0645280b3fc421b38
SHA512f3a8873737d9c338be9142279fb083950d1456732ff5790884d2c5ff6b91c8b739cba08b03ed72c539c6497091951b624cc2c0bab54dce8665aaa2cad315f0cd
-
Filesize
3.5MB
MD58ea6065d2ff7065c6f3990bad08653ea
SHA1d391a6f0e07858acf15a05b554f3ae8a6a6b51e7
SHA2561d5fea83aa35c8025d890c157dc2ce7f765a28c371523d92fd62b6f64cb516b1
SHA512d1a125afad0f38e2225aab6118656878aa4edf1cc5726d562a5c6956fa7850c5cf6fc939b93830b24d3514dd9e1c957d695ce989179bc3fe1ce2b23bd36f8518
-
Filesize
3.1MB
MD51aaf3e2606d14db0a9b98489236c9e46
SHA1a2c7000cc1d007e6e15e855cc2c759009fd456a5
SHA25632e07d777eae1dd0eced61981c34bdc5058d067c090e7535d1b899f8e5af8a24
SHA5122a91ada961cbc38e99013e8d421a4716a0308463e4a755ab6836ef9acc51594e5a8dcfddf0a78e47c92744dedb55724bd72bebd0edd2b56bb51216ddd6594fb7
-
Filesize
1.8MB
MD51524da94feeebb2a921c3065f4da2383
SHA168ad3edc97d668005f47ac76d5a0f8397d24b8cb
SHA2564228f1c544520402ca8d8120aca88167f1b23ccb2efb536fe668dc6dd0bc267c
SHA51246988b61b3b9ad9aebbd860c1b6a4bc2587e0726b498b2bcdf688e200471ea5b08cc68a7404e7d2d85f199ef498af455b9288d3612b842bdf13f7b3edbde2ea6
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin
Filesize8KB
MD554e5d1d4431d10ed732e576abc77fb1f
SHA1750981d6e371b7ccfc4de76e47b91cb0cb825b70
SHA2562a8511cf37888588fe2b1fee5ec11f68c56b764da9daefdf29fe728a3b7a508c
SHA5124334668cbe6a645365ab1c7961137f579a07d209738783c9e51621839a388e2e7715ea8724a0c0b54dc41b2c291081e4d147f7412a470baf0ad97c88e6f05a1e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.bin
Filesize15KB
MD52c7d00acfd6133f826ab536d736f3613
SHA10065030226154119d4c8356ab8f139228cdc2295
SHA25654c1a0b7398d1e9b2c2325aa1497097dbfcb9cb9790fc2e208395ae34a7faa0a
SHA512d0368e326195dada23d90874aa4b2b86474ba44a4ddb4f15c793370d9bc5f6b4d34d22fc5871979066366163be22f90184590df8c9ee0774b25402d1b2007628
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.bin
Filesize23KB
MD5f1cb03657ba26a4f5fba67fd37a575f2
SHA168c872c90f37d7111111dcc6455f36d6d9da7da2
SHA256f40a446d43f3976bb38f878f359d68f3692dccb55d7c0537d758c5edfc8ccdd4
SHA5122e0b91536b779c73ff01ea04ed15e16426ebeb1365e9b7eaf0b3a8234465d0db730674eec0f277552497df7bdb10ef53721582f1d574f7aeee2076a4c9d0bca5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD50c0a797deafce5a3a8c25d1593fc1d23
SHA1f3f19ca7ebb804ebbcab748a560b3dcafd014395
SHA256dd3fefc47159f019fc4f7158372c7fe61e1c35560a3b5055e1c23df0d59d6e9b
SHA512a7776fb39ba96de21655111b9d1dd76c8b992677245a3eb612e750f8df41a601774aff09a0a53c573343d37e9627b169d52a1b98fbbf7d88c0d254626e27e4dc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5951508f407022d79887afba7fb201afb
SHA1b919cd1818e80e687b03e032312b74670329236a
SHA2564687a0842655c27deff02661cecebd8e0e07bc149c4ac0da7b7da38d8fbab19a
SHA512f0984e33b1f71c220a66445258138201481ea1e530a1a9ac7a1f170f8ef54abdd179427fce1a2b9a4b967bccc67b113ccf221d04bf63c6667b2b96cff63c77be
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD537c1d49a45e915dde5decd350a95fff4
SHA1beb0359bf0312cab2aef4549a65f2a8db29406fd
SHA2562aef97f876f58e600862b970605e66e9aaab3bae0de72c7448ae891399b80742
SHA5123e3f5da4292162829a398afe1bb656bc1156d9e8da99f96bd669148ee127a34d7a0053f3dfc9e0cded4ac9f18f53e4e678dc7ced838b7f1e6fe2849fca720e89
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5b1cbb559e635a71a0f51164214e49f8b
SHA168bb88be37122114a1eaeb3d55793507c30bd74f
SHA2560732f16fb4bca31a63029016463b676d9cee380af0a5874f9bd64af400833ca0
SHA5124a91f22f009022a7f60c886f8461ed76986fd4a4605713ebc3813c94e3661d95909549ebc03f40019f9a26567e66e12a8c61f13138ac3d1890fd4634729edf92
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\2be99cd9-df12-4027-9346-65e7038003cc
Filesize982B
MD56509cc138c74c07faba496bd6bc943de
SHA12b8857af9251abc52a28b5a1aa7db11e89135ef3
SHA25600741396d1b470c1c5bc3287a60a54766126a136b8651baa83b9d464290ad409
SHA5120b8cb4eecadcb209e64b140ae43e86915ca114d9dab4eb213eb839a6190d92abda4a200bd24c066b1f5589b8da0186e0508e2374d95ceaba95b7e57ee260af56
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\859f9396-e8e6-4de5-bf3d-b74c37902f35
Filesize27KB
MD573407cee2595431153a7b4eb5754af49
SHA14946cd193798e9d378d2db0d4736680fdeecefca
SHA2560089fa12d699d2c7db22db2bdba4e90c638c6b725a55f2c54686c9fb95d387e7
SHA51263d4bbfee53a7996d88ef7ff3f1374075b18c4578e92af02c47c98ea05bd0d76a5cb454a329fd86f8b13ef192fc91b172ab5ec752f38cadb9b10841d3d0e56e5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\abfef5de-6788-4254-9270-c7d37df49386
Filesize671B
MD52a5c5ab22234660627aa880349dff254
SHA164088f1fec7e86b889a225b2d61743490305504d
SHA25691a78d29deb5bb52abe916f529d81e37c169772b1dac9789e73219c0b67e724b
SHA512e8687d1fd68ece904ccb622fdfa5854cc927042ff5a933cfebdad65ee9b0af5064a2e103e1cc309019ec512b083699bc3f02eac39591f9eb88ffb27d0a071fa0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD5a9769af56ae1202beb1a1cda5ed23f71
SHA1eb2dd87e59a357b2a9eb8ead820b881251fa676f
SHA2569dc1965db576438daae7c46071104920d1bfff938df6da883ab2b2358ffc8625
SHA51219ce758a11c83841f8c013b698e3567cf1a49a810b769afa5703f71af50d4770b4298caff5ffac0dd8b284f02918ad12b64078519afc4a53eff58b947fe255c6
-
Filesize
15KB
MD5d0598e4d3c75498b700b5596a3d8abb5
SHA1376a0c67fc07dba1d17fbdcefa72988b0f593f99
SHA25667a06eb6d0d0aa7e078a5575a1ca5535bad079dba16e91fbbf2f2a5849ca60da
SHA5128e3e68ed1283f4d556f8cf8de5438cc1a0ed0ea7fe40d8529ad494b1ee73790e39022e3bd3f034dd33bba10cd3db5670c1c6b76691b1951dda7dd8e0cedd8f20
-
Filesize
11KB
MD53f97a6549d04d36a24285194be865d86
SHA1e2d0ebc838b5087a0bac3ffaf05f617ff2175e22
SHA2568815c4f8839bc5529402ae3b5c410abb230fb732d632e261e58e67a4cf4c9dc9
SHA512baca3955e2a52f53d3f9708bb777404a85dd8fb65941b24358bf40ae3770b2ee34dc01cc4b1cf5aa52f2b538d24fbaefb0bf84c4bf13351725d40afcd3fae7a4
-
Filesize
10KB
MD5f67bf8b2964c67e560368ecd53418ea6
SHA1884c3385376af30fe3062e6b38ea0ee985b2d7e2
SHA256ca8f65d5340eabdb7372add9639c7fa79515ac5ef2ff0ad00f9b0ab30cfe5d2b
SHA512d283a43a489065802df6b5bae0283f50a697299526c46214bb38d77cf47bebf78636f780bbf070da93ec7d2bcd957073276bb48efa40dbc02ec263a23c9d8033
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize2.8MB
MD56bf860eb13cc760471bd08ba8638a4b2
SHA1dddfef6fbeb0a2920ecbc839b0b6f677ae4d125e
SHA256bf43c1d6ead5fcfcfac1e3c4543d2c8de49c7003b2d19063b4c4f8dec8f7ac81
SHA512b8a9b8e86d58c7f79ead7710ae205fea91b877e03c4a59dba8169608e2efce7abdf785436539f997d987a067f7846b8922a1c8449334ea7a75c20639119fc33d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize616KB
MD548d524266872855c2fec0eaa16a608a7
SHA15bb966f5b5ef4bd712b7d95466d8296c4253e31a
SHA256877ff1b0c8c2f4ae6babd318a3755778953830c1c9d745918e7fd0006160b90c
SHA5127785c8f5f047d0c6027edba75e85f3bb6624b54d17ab5279781d905c354885c6b64fb2a7e6e4e2a9acb8e2cc2efb1c94e5856d3e99e882caf433f35f3941e7bd