Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-12-2024 10:27
Static task
static1
General
-
Target
bd49ad91c3de34024b053c54f0f178d663a020f93dae77083bb60029319417be.exe
-
Size
7.0MB
-
MD5
fa8f9c19c5e220b98bb6f2867974f4e6
-
SHA1
515c62e4dc078e440bb13d9d7730261ef97de587
-
SHA256
bd49ad91c3de34024b053c54f0f178d663a020f93dae77083bb60029319417be
-
SHA512
9f6599bed0dcdda5cdcc7cb8c747fa9bb0e38d6bfc2d069dfadfab4c8764fce699de815802900cafb66ecb683ba7a0a27cdcc44957cea7ec5fca2db6f52b37a5
-
SSDEEP
98304:fpe+Nth8Dyp0iPEm4Bw6g1MPekw4tfRIo7M7EkbydHI+ImZ/UK+j1xC:hNyw1SekwiF7HdISZr+jvC
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://sordid-snaked.cyou/api
https://awake-weaves.cyou/api
https://wrathful-jammy.cyou/api
https://debonairnukk.xyz/api
https://diffuculttan.xyz/api
https://effecterectz.xyz/api
https://deafeninggeh.biz/api
https://immureprech.biz/api
https://tacitglibbr.biz/api
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
https://ratiomun.cyou/api
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://tacitglibbr.biz/api
https://immureprech.biz/api
https://deafeninggeh.biz/api
https://wrathful-jammy.cyou/api
https://awake-weaves.cyou/api
https://sordid-snaked.cyou/api
https://covery-mover.biz/api
Signatures
-
Amadey family
-
Gcleaner family
-
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4B104G.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4B104G.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 7460784ad5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 7460784ad5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4B104G.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4B104G.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4B104G.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4B104G.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 7460784ad5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 7460784ad5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 7460784ad5.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 12 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ba2e5cb205.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1V40B6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2j6801.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4B104G.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4b75822e25.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7460784ad5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3j71q.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2cbe809b01.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 24 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2j6801.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4B104G.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2cbe809b01.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3j71q.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3j71q.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4b75822e25.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7460784ad5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ba2e5cb205.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1V40B6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4B104G.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2cbe809b01.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ba2e5cb205.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1V40B6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2j6801.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4b75822e25.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7460784ad5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 1V40B6.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 15 IoCs
pid Process 4484 I8A35.exe 4204 l9K66.exe 1940 1V40B6.exe 3756 skotes.exe 456 2j6801.exe 232 3j71q.exe 5028 4B104G.exe 1292 2cbe809b01.exe 1340 b9a9f0a368.exe 1240 4b75822e25.exe 5132 7460784ad5.exe 5276 skotes.exe 5572 ba2e5cb205.exe 2988 skotes.exe 2240 skotes.exe -
Identifies Wine through registry keys 2 TTPs 12 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 1V40B6.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 2j6801.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 3j71q.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 2cbe809b01.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 4b75822e25.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 4B104G.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 7460784ad5.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine ba2e5cb205.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4B104G.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4B104G.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 7460784ad5.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b9a9f0a368.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1014358001\\b9a9f0a368.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\4b75822e25.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1014359001\\4b75822e25.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\7460784ad5.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1014360001\\7460784ad5.exe" skotes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bd49ad91c3de34024b053c54f0f178d663a020f93dae77083bb60029319417be.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" I8A35.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" l9K66.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000c000000023ba3-74.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
pid Process 1940 1V40B6.exe 3756 skotes.exe 456 2j6801.exe 232 3j71q.exe 5028 4B104G.exe 1292 2cbe809b01.exe 1240 4b75822e25.exe 5132 7460784ad5.exe 5276 skotes.exe 5572 ba2e5cb205.exe 2988 skotes.exe 2240 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1V40B6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 6988 5572 WerFault.exe 121 -
System Location Discovery: System Language Discovery 1 TTPs 20 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage b9a9f0a368.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4b75822e25.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language I8A35.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language l9K66.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4B104G.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2cbe809b01.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b9a9f0a368.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7460784ad5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bd49ad91c3de34024b053c54f0f178d663a020f93dae77083bb60029319417be.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1V40B6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language b9a9f0a368.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ba2e5cb205.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2j6801.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3j71q.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 2276 taskkill.exe 2284 taskkill.exe 1068 taskkill.exe 1940 taskkill.exe 4780 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 1940 1V40B6.exe 1940 1V40B6.exe 3756 skotes.exe 3756 skotes.exe 456 2j6801.exe 456 2j6801.exe 232 3j71q.exe 232 3j71q.exe 5028 4B104G.exe 5028 4B104G.exe 1292 2cbe809b01.exe 1292 2cbe809b01.exe 5028 4B104G.exe 5028 4B104G.exe 1340 b9a9f0a368.exe 1340 b9a9f0a368.exe 1240 4b75822e25.exe 1240 4b75822e25.exe 1340 b9a9f0a368.exe 1340 b9a9f0a368.exe 5132 7460784ad5.exe 5132 7460784ad5.exe 5276 skotes.exe 5276 skotes.exe 5132 7460784ad5.exe 5132 7460784ad5.exe 5132 7460784ad5.exe 5572 ba2e5cb205.exe 5572 ba2e5cb205.exe 2988 skotes.exe 2988 skotes.exe 2240 skotes.exe 2240 skotes.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 5028 4B104G.exe Token: SeDebugPrivilege 4780 taskkill.exe Token: SeDebugPrivilege 2276 taskkill.exe Token: SeDebugPrivilege 2284 taskkill.exe Token: SeDebugPrivilege 1068 taskkill.exe Token: SeDebugPrivilege 1940 taskkill.exe Token: SeDebugPrivilege 1724 firefox.exe Token: SeDebugPrivilege 1724 firefox.exe Token: SeDebugPrivilege 5132 7460784ad5.exe Token: SeDebugPrivilege 1724 firefox.exe Token: SeDebugPrivilege 1724 firefox.exe Token: SeDebugPrivilege 1724 firefox.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 1940 1V40B6.exe 1340 b9a9f0a368.exe 1340 b9a9f0a368.exe 1340 b9a9f0a368.exe 1340 b9a9f0a368.exe 1340 b9a9f0a368.exe 1340 b9a9f0a368.exe 1340 b9a9f0a368.exe 1340 b9a9f0a368.exe 1724 firefox.exe 1724 firefox.exe 1724 firefox.exe 1724 firefox.exe 1724 firefox.exe 1724 firefox.exe 1724 firefox.exe 1724 firefox.exe 1724 firefox.exe 1724 firefox.exe 1724 firefox.exe 1724 firefox.exe 1724 firefox.exe 1724 firefox.exe 1724 firefox.exe 1724 firefox.exe 1724 firefox.exe 1724 firefox.exe 1724 firefox.exe 1724 firefox.exe 1724 firefox.exe 1340 b9a9f0a368.exe 1340 b9a9f0a368.exe 1340 b9a9f0a368.exe 1340 b9a9f0a368.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 1340 b9a9f0a368.exe 1340 b9a9f0a368.exe 1340 b9a9f0a368.exe 1340 b9a9f0a368.exe 1340 b9a9f0a368.exe 1340 b9a9f0a368.exe 1340 b9a9f0a368.exe 1340 b9a9f0a368.exe 1724 firefox.exe 1724 firefox.exe 1724 firefox.exe 1724 firefox.exe 1724 firefox.exe 1724 firefox.exe 1724 firefox.exe 1724 firefox.exe 1724 firefox.exe 1724 firefox.exe 1724 firefox.exe 1724 firefox.exe 1724 firefox.exe 1724 firefox.exe 1724 firefox.exe 1724 firefox.exe 1724 firefox.exe 1724 firefox.exe 1724 firefox.exe 1724 firefox.exe 1340 b9a9f0a368.exe 1340 b9a9f0a368.exe 1340 b9a9f0a368.exe 1340 b9a9f0a368.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1724 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4856 wrote to memory of 4484 4856 bd49ad91c3de34024b053c54f0f178d663a020f93dae77083bb60029319417be.exe 82 PID 4856 wrote to memory of 4484 4856 bd49ad91c3de34024b053c54f0f178d663a020f93dae77083bb60029319417be.exe 82 PID 4856 wrote to memory of 4484 4856 bd49ad91c3de34024b053c54f0f178d663a020f93dae77083bb60029319417be.exe 82 PID 4484 wrote to memory of 4204 4484 I8A35.exe 83 PID 4484 wrote to memory of 4204 4484 I8A35.exe 83 PID 4484 wrote to memory of 4204 4484 I8A35.exe 83 PID 4204 wrote to memory of 1940 4204 l9K66.exe 84 PID 4204 wrote to memory of 1940 4204 l9K66.exe 84 PID 4204 wrote to memory of 1940 4204 l9K66.exe 84 PID 1940 wrote to memory of 3756 1940 1V40B6.exe 85 PID 1940 wrote to memory of 3756 1940 1V40B6.exe 85 PID 1940 wrote to memory of 3756 1940 1V40B6.exe 85 PID 4204 wrote to memory of 456 4204 l9K66.exe 86 PID 4204 wrote to memory of 456 4204 l9K66.exe 86 PID 4204 wrote to memory of 456 4204 l9K66.exe 86 PID 4484 wrote to memory of 232 4484 I8A35.exe 89 PID 4484 wrote to memory of 232 4484 I8A35.exe 89 PID 4484 wrote to memory of 232 4484 I8A35.exe 89 PID 4856 wrote to memory of 5028 4856 bd49ad91c3de34024b053c54f0f178d663a020f93dae77083bb60029319417be.exe 92 PID 4856 wrote to memory of 5028 4856 bd49ad91c3de34024b053c54f0f178d663a020f93dae77083bb60029319417be.exe 92 PID 4856 wrote to memory of 5028 4856 bd49ad91c3de34024b053c54f0f178d663a020f93dae77083bb60029319417be.exe 92 PID 3756 wrote to memory of 1292 3756 skotes.exe 93 PID 3756 wrote to memory of 1292 3756 skotes.exe 93 PID 3756 wrote to memory of 1292 3756 skotes.exe 93 PID 3756 wrote to memory of 1340 3756 skotes.exe 95 PID 3756 wrote to memory of 1340 3756 skotes.exe 95 PID 3756 wrote to memory of 1340 3756 skotes.exe 95 PID 1340 wrote to memory of 4780 1340 b9a9f0a368.exe 96 PID 1340 wrote to memory of 4780 1340 b9a9f0a368.exe 96 PID 1340 wrote to memory of 4780 1340 b9a9f0a368.exe 96 PID 1340 wrote to memory of 2276 1340 b9a9f0a368.exe 100 PID 1340 wrote to memory of 2276 1340 b9a9f0a368.exe 100 PID 1340 wrote to memory of 2276 1340 b9a9f0a368.exe 100 PID 1340 wrote to memory of 2284 1340 b9a9f0a368.exe 102 PID 1340 wrote to memory of 2284 1340 b9a9f0a368.exe 102 PID 1340 wrote to memory of 2284 1340 b9a9f0a368.exe 102 PID 1340 wrote to memory of 1068 1340 b9a9f0a368.exe 104 PID 1340 wrote to memory of 1068 1340 b9a9f0a368.exe 104 PID 1340 wrote to memory of 1068 1340 b9a9f0a368.exe 104 PID 1340 wrote to memory of 1940 1340 b9a9f0a368.exe 106 PID 1340 wrote to memory of 1940 1340 b9a9f0a368.exe 106 PID 1340 wrote to memory of 1940 1340 b9a9f0a368.exe 106 PID 3756 wrote to memory of 1240 3756 skotes.exe 108 PID 3756 wrote to memory of 1240 3756 skotes.exe 108 PID 3756 wrote to memory of 1240 3756 skotes.exe 108 PID 1340 wrote to memory of 3580 1340 b9a9f0a368.exe 109 PID 1340 wrote to memory of 3580 1340 b9a9f0a368.exe 109 PID 3580 wrote to memory of 1724 3580 firefox.exe 110 PID 3580 wrote to memory of 1724 3580 firefox.exe 110 PID 3580 wrote to memory of 1724 3580 firefox.exe 110 PID 3580 wrote to memory of 1724 3580 firefox.exe 110 PID 3580 wrote to memory of 1724 3580 firefox.exe 110 PID 3580 wrote to memory of 1724 3580 firefox.exe 110 PID 3580 wrote to memory of 1724 3580 firefox.exe 110 PID 3580 wrote to memory of 1724 3580 firefox.exe 110 PID 3580 wrote to memory of 1724 3580 firefox.exe 110 PID 3580 wrote to memory of 1724 3580 firefox.exe 110 PID 3580 wrote to memory of 1724 3580 firefox.exe 110 PID 1724 wrote to memory of 4060 1724 firefox.exe 111 PID 1724 wrote to memory of 4060 1724 firefox.exe 111 PID 1724 wrote to memory of 4060 1724 firefox.exe 111 PID 1724 wrote to memory of 4060 1724 firefox.exe 111 PID 1724 wrote to memory of 4060 1724 firefox.exe 111 PID 1724 wrote to memory of 4060 1724 firefox.exe 111 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd49ad91c3de34024b053c54f0f178d663a020f93dae77083bb60029319417be.exe"C:\Users\Admin\AppData\Local\Temp\bd49ad91c3de34024b053c54f0f178d663a020f93dae77083bb60029319417be.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\I8A35.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\I8A35.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l9K66.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l9K66.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1V40B6.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1V40B6.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Users\Admin\AppData\Local\Temp\1014357001\2cbe809b01.exe"C:\Users\Admin\AppData\Local\Temp\1014357001\2cbe809b01.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1292
-
-
C:\Users\Admin\AppData\Local\Temp\1014358001\b9a9f0a368.exe"C:\Users\Admin\AppData\Local\Temp\1014358001\b9a9f0a368.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4780
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2276
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2284
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1068
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1940
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2056 -parentBuildID 20240401114208 -prefsHandle 1992 -prefMapHandle 1988 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {dccfefa1-b87f-4271-b15c-2add11e16486} 1724 "\\.\pipe\gecko-crash-server-pipe.1724" gpu9⤵PID:4060
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2508 -parentBuildID 20240401114208 -prefsHandle 2500 -prefMapHandle 2496 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {200a544d-172c-4b1d-8cc7-8184886105b2} 1724 "\\.\pipe\gecko-crash-server-pipe.1724" socket9⤵PID:3056
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3108 -childID 1 -isForBrowser -prefsHandle 2872 -prefMapHandle 2880 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 940 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fce20f63-2a39-4fe2-81cb-212f4d1cc741} 1724 "\\.\pipe\gecko-crash-server-pipe.1724" tab9⤵PID:3188
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4160 -childID 2 -isForBrowser -prefsHandle 4156 -prefMapHandle 4152 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 940 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {db66b091-22e2-4321-9f47-4c9f71edb859} 1724 "\\.\pipe\gecko-crash-server-pipe.1724" tab9⤵PID:4916
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4880 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4884 -prefMapHandle 4836 -prefsLen 29197 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cbaf58b0-0e82-4833-ba4a-edf0a381211b} 1724 "\\.\pipe\gecko-crash-server-pipe.1724" utility9⤵
- Checks processor information in registry
PID:5388
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5100 -childID 3 -isForBrowser -prefsHandle 4992 -prefMapHandle 5076 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 940 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d40494c1-8ca5-4f76-bca7-b4ac48f5b305} 1724 "\\.\pipe\gecko-crash-server-pipe.1724" tab9⤵PID:6948
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5228 -childID 4 -isForBrowser -prefsHandle 5236 -prefMapHandle 5240 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 940 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3077073e-f8c5-4035-a81e-de18222aa624} 1724 "\\.\pipe\gecko-crash-server-pipe.1724" tab9⤵PID:6980
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5468 -childID 5 -isForBrowser -prefsHandle 5360 -prefMapHandle 5484 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 940 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6417347d-603c-4e1e-b4c9-29ddf63b91b7} 1724 "\\.\pipe\gecko-crash-server-pipe.1724" tab9⤵PID:7136
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1014359001\4b75822e25.exe"C:\Users\Admin\AppData\Local\Temp\1014359001\4b75822e25.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1240
-
-
C:\Users\Admin\AppData\Local\Temp\1014360001\7460784ad5.exe"C:\Users\Admin\AppData\Local\Temp\1014360001\7460784ad5.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5132
-
-
C:\Users\Admin\AppData\Local\Temp\1014361001\ba2e5cb205.exe"C:\Users\Admin\AppData\Local\Temp\1014361001\ba2e5cb205.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5572 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5572 -s 7727⤵
- Program crash
PID:6988
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2j6801.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2j6801.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:456
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3j71q.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3j71q.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:232
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4B104G.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4B104G.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5028
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5276
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 5572 -ip 55721⤵PID:6864
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2988
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2240
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\activity-stream.discovery_stream.json
Filesize22KB
MD535f9419cbc3f8ee88a7f105af9ec85e5
SHA11cb75681772aae2fefa094ba956dc8d0e6894baf
SHA2569988b63fad5ab2343f3a853a590d7e19077ee212f79b00f170d06bb9c9a194d6
SHA512b775a44eeba77b7db2c4b9887c5bbd486b86c815c1ea5a18926e5c08941e06e130385674af5453780c03b02268be922569ce6ee5b4b41f765e3e865b486eacd1
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\cache2\entries\37373F56CBD822F5FCF64BA01E1320A0924D8460
Filesize24KB
MD5e47d7f738d921eb57ddf307de5f007c5
SHA10c426f0691e6b32eb17dcf767ec457179ab65a91
SHA256a36cea69eba94f12491c9361b31b5dabcbf46638273355555092e4abddbc94f2
SHA5129caac3686d0ed37d1532050dd57b4b571fba8a189ad88f8b6db2fd874ffe6e26021798b9323f005b5f7626983654d78d82ed706d55d658b7dc91dcfae9ae4b85
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD5aa846e13b4d5b2f614aac97d1bca1cc8
SHA11a5d96c99b54ad0e0b97388b01ce7f14e2e49932
SHA2568d380d4ad6f84a727e0889ef5df78bba6a55492fcc9d34088493993603bf5a8f
SHA512e5bb3eaee79a75acd83f161f0186042e9fc85d5adae2c1afc1633f50c96a91f703b68d2d95bd9983782ffedfc74a736a3d0cc9193a8c07e840c4c2372ed6b00a
-
Filesize
1.8MB
MD59d09272ac982d62d77946b1f957b6112
SHA1f431d0c1aeed11eaa7a51d97a1a00e0c1f0530c2
SHA25633b1f3d3f016753911b3e9efeb89ad133c855cd6e4850c0b43b1842ee90ad7fc
SHA51233c1299c43775a31f27dd2b9747734efc8825b74f8237b489d334126917d0202a3477b4677ea674237a65ba475faac4a24b3a5e6b568d3e1eca9367b34767f4d
-
Filesize
946KB
MD52f31d29ec74040cc7ce4b9cc341cce0b
SHA13a122771d15a91371c31b06f705d7e0a07774935
SHA25617b8d14a92e07b825cf03f14b0fb4718f706872fc1a31172a525706e2f69c4d2
SHA512a88970d65f00755926ac77846fbe51b26a0aac781e1b51c0c2ce4f40805581bdd6278f2a6570a2237aff4e353278aa45b8ebb133efe00db378b7b820c2eec3a1
-
Filesize
1.7MB
MD5807a67da4cfbc1cf70de9fecfea9fb09
SHA1e2c37f774fe4daf510961d6ed7239d8b03d83036
SHA256c85b9fda965fb5d13142b0ef3369e46abbc5f4bfb948fd2179d6d160123c0689
SHA51265c46a8585e0b87c53d242a18dab0ed9d83c1378347ac0209bf5522b93c34051ae1aa7e0b63829980f1cb156d54bab3060c39152d27ff694a79876aabcd78561
-
Filesize
2.7MB
MD5d6160b483577667b6a0056f5f3325103
SHA1811c2a568c756389939ad598e379d48a5be37789
SHA256cf9ded7b486e8bcddc5ac55f90b4b7e2eb2af62f86c4790476a7033087ba9a3b
SHA51243d9b20a2461c13afbf35b021786adca1bed0b7e3024987853242dfbbf5d73b3e24f85847dd873b27cac7a4be7aa168f47f7fad0d59087f2f0f710583d85236b
-
Filesize
1.9MB
MD56b388916c9f72353cbd4799ed242d4f4
SHA164b382ca1909b0ae89f26d49652f19fceaf33a48
SHA25683cc25a9b6c72190cd8886758cc9afa6625be19579a7532faa97f3feb5e6a7fd
SHA51290e42d22d3c2f87daa6703312dab91c00f6026f17325434f75520852d96d31969c4ebca0f94947626c372b18b57cc7e8af11d637cda68c2526d3971d44f7e85a
-
Filesize
2.6MB
MD5439e85f0b6fc29c5ea63104154ceb634
SHA1f2ccdd27e7edee794ab77cd945f518bfb5f4c04d
SHA256bc972404568fabbe2929a0f728d6094d99131cdb8b53dc504701a1eebb4c0d6a
SHA512b8af1870ecb6777c87c7f0f76a5dd5f99818924f122b06b3fe966f69c4d34ff39894e614952b64952789d75007b8474d010d0192c4ee3dcf68ff50c2b3d95e02
-
Filesize
5.5MB
MD5595064e37dcbc37d6931d2d68ac3b1a4
SHA183d683b0c574c607cee956533f07b2559927a310
SHA2564410b1ef33f5f0ef64c12c1d56660c09d7a49329a73b16fa824e341b4a7e1d58
SHA5125a10196383b11cd65a3d2b3d4edf57d41351cb2991fdca82d1ac753dd92e467a55ecafcf1af54a521c51f71429dc81db6a653b800eef59ff12c4579aa625eb14
-
Filesize
1.8MB
MD54cd665bb2e14afaf47313eefa5b3062f
SHA15cae67a79d827beb065abe49446c1be1d46f1ba2
SHA256c1f435b6b40bd2e00f4b7d3a89ffc46091cc8298ae70bb97444aab650dbb17e0
SHA512818db1b60e8f0e4b23e027631ec38894429dfc65f846635d992faba893d19d7c2774cfc836a3f93a81a39fb0a96c7537f4bd8591acd4934a44a3105876d84cb6
-
Filesize
3.6MB
MD5adcd60cf6347202c65729d4f26f35f9c
SHA1945bc5988fa4f476da5b68669f1e3612bc4e7193
SHA256a7a934906241bcb6e98a2a0585a4c4baaf977ce600bb1a5548f8e1f0b1546368
SHA5121508bdae506f1c6a621273d0e694d4cc1f53a24eef77de746186c737e7ccc4ea1ac51383c462e80718264b5fdb61ef081e15a5428de7660f7b0a56609d5a1f09
-
Filesize
3.1MB
MD552844852230f99e02891a15b601571f2
SHA153bfe041262404913af4764d56fe3afb6bea2616
SHA25630254b13c93de15fd6c697da7b3ed6677291a939a95156c5b527d8b21ce1ca6c
SHA512d170f9d5b161712e60032a0534f7f71f4d3667d8466b6530f23f529ec48c98d98aa74661d65e6ef33a1f7469dcf776f6edfe51817b462ba9bc2476252439f54f
-
Filesize
1.8MB
MD534e2bca3b92a1852c57e5df538a97705
SHA1203437d7a054cb4eb7e3b8fe0dc7d877478d94f2
SHA2565a9bcc582b56aa80fff7c45701da58d28ab6fdb82182fe556ec85db9dd062498
SHA5127e98cfba815ce1e000f7267662b8a5875e266a8a312be30e7314db48eec3239f5a91662f7e5c6a00bd6ef335ebb1d7e315a451e682d0bb27d5b06e3ced7c62eb
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin
Filesize18KB
MD5e80581450d9eadb11f7600edaeaac50b
SHA14addbb6583cd13f76ab375a2cb764ac55b235117
SHA256ccdfb1d75d5c90ede256757903512cb4c2381e2f20b3d03333776a622a1d4e27
SHA5124171602a0df32a5a07e32c33220c767edc4eeded9408750d548d193ddb06bb3c349593b786e9593c29e934c6b4aec7c9992a748f5979b77f57116b149dbbfe88
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin
Filesize10KB
MD5fae091dc24d07cdfd0cee0aa6840cfd2
SHA104a66caf9bb73d1e0c498d1711275bd790c34df9
SHA256e33216924707314b2addee602b4a8f301925adfe626d9120fc8880a84714908f
SHA51247b3dd17d35f3cdfd1a37381ef2a9eb0b9b20d97a977d6b84ad78d6228aaba26ad9896177037a6afed9c257c91612821cf1f8381e4249156d726c4740287a60f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.bin
Filesize15KB
MD5fdb448c3a87d7a30a65121c027c370a4
SHA1fcc23f0a5a33082e77c873b31947290a741a9e21
SHA25616299a64a8efec382a179b6155ceb555eff2cdce19005c11286f40e653e00b5e
SHA512e01405ff519f7de7f4881e2ae74b7d6408c42c7ce7b3483d70c391c14caa32178eae9805dd3c6892e297509bfb6cf1ea61e705175bea93554480b998e13ace5e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.bin
Filesize23KB
MD5c6d0240eaaca884dd6fd0761cf11b2d7
SHA130a919eddce1bacb165eed707313d78b335778d8
SHA2562d99c116842d7f234df6df79f592006d19cadddfd8efd7a750ba4da78d57e75b
SHA5127e17e9d72dff743fb5a55eabdf97c6561eb6909f0afe629d584a6c851f5dc5b439be4b59425343e4f717eebaca4500dfa9b1787396bfd0944b077c3b36dc6a87
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.bin
Filesize15KB
MD5a0b799feca6f0e95a7e884860cda1dd7
SHA116acf3d212d26a8c08b76d30432864b4eb86b173
SHA256717e29bde89d34027a650323dad7abcfd7c92ed54cb16e2092b1cb28669b525d
SHA5121ffd9da8abd1bbf9b9c18319f22b06ed194570e5494aff4ed494e6771878c254fcc6c3a2d76a9dd5301183214fbc01b9ac646ce6fed7a394de8716893b99f27f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.bin
Filesize6KB
MD53603301407f4a3db1a7b330094f60f80
SHA137ac757d98c7dbf546ec715330892f9fd9245a2a
SHA2564a79976074beb21452080e2c8ad51e261e99c9763ab9782656d4e83ffdf78b9b
SHA512a54b5d6db9aae1c3003251a91139f0a43b29b5c3700bee533cea6524262ac36ddaa8322fb5e445a969b4cd66a305c8cc01cb4919d18f3f6a36b1dfa6af5c27e3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD59df6282518ae89caac4d32e0987e4672
SHA149cf6c793f46495f329eb95c3295727527d7b9b3
SHA256708d578a2a0d9040d920aeea544b6769dfd1061fae8f02d33b73c234462079b6
SHA512490f0ec44cae1c2160621dfd296d1a389d72a5f470fe08db3ea74f48e6c93d96bf32894680aa3f9bf05486eb15d509c9f5ba83452b84cacbd90a45ceb297718e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5c97af4ac28db187e72616f19735bb514
SHA160c8ba181a62d35f723f8ed75f298eef362ff65a
SHA25656f5adcd79ae6fa64824cc3a2845e7fe8aedd910ee64bd056439cdc2e6239c20
SHA5121d2f4f0d3563cd2dd213eacb75146915fc8fea5b91efeeeb6f3c3b3efa020f7c2512e9f5bc1a97f0d15a181cda1103d3a99fa7e4c6b6936220230c5c9531d101
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD557762b5c3e685b18cb6d11b9804fe95f
SHA13f75db39f618cc4b4598ea12b0356b18e3cfdecb
SHA2562d4e3be46cbb0da29e1cbd892280116b6997fc00d642b5f56c1fe0c6a5e2eef8
SHA5129a59096f11cd07d464bc6239f185230dd9e8990ee091e28eff2891ad52d6c05a29505070025e363d535e25c0ef0a9e6ae3a8032079b1073a207ead879fa5ae81
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD51390923171fa619beef0768a124548f5
SHA10836fb70f033d05a3498f03c9b0e8adb8bd178b2
SHA256f0fb4d89f8d5142e62cfab5a26576191b067e51cb420086ee343d02b3059d4de
SHA512aecf889011c7c7786f197d3b6e8c45e5251a92bbc69c802ba24e987f714457ee10ec7652f3442e0a60e1c314f1bd3789d610d69e6b44ac6cb047f8ac4c4cdd72
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5b2bdb6b62545ab90bb9bd90bbd5b7708
SHA181d6871c9e2fa44742dc02e52e1471bd8f565c16
SHA256cbb6aeb500c6affe6e098e84020b439cbd5404cb50fb2f0c78829188fa8512ea
SHA5129a07c8983fa983b2a2366f21342ed1a5376f1a7365d61c295dc34d3ed0eaf5c14597d3a736fd64e9eb5288145d5e09a286cc460c137e743366759893135142fc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5e39bde1f4373f37060f1cf850222336a
SHA1ce948c09d521388595efd615308066ebb1775c63
SHA256400e148871e60b4e7a8132cab0106c03ece7e6e7ed8a981f1fbdb538eb534863
SHA5120fd350ed2adcca54dbcb6ada54a157f77d78f9771cf92e8ffc34123b5e32c898d9d34fbc719af6f4c66afeddc27894d7ac2dfdd727966d7c0554b7ac676e082f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\2b1336d3-2648-403e-b405-0e6b56e6ce48
Filesize671B
MD586fcd0485f7485828b696a2bf48731bb
SHA1009decb3d5be65650f3dd684c161d6fa95841774
SHA256a64cbd3960f73963bfd79015b7828b1a5f6213378a10be7ffe2e4110dbb228b4
SHA5123b104f7f8afbf4c1e1fe313e7a10eab7d9b57035e007bcdff98c9f6af0d34b1d28612a34ef6a158fd1ab26a7e22dd91adc3e57cf1faab18a3b136adaa368ab43
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\8340aba1-d4cd-49dd-8f44-39175d47219d
Filesize26KB
MD5e4aaecba5c144665ba85e02a463c8593
SHA1d4a77d2cff7f8245e156b197903883b7b29ff3c4
SHA256a279ec505bcac3903cd89e19e7345d97f32849bd7eeda78a5790560346249eb3
SHA5124ce652f6ae4f82ad89e6bf612964b02da6bacf947d6a3a04e167c66c31d237362493e54a03334efa40bf3398ed3043eba52a0b0f859ab568348858507b86e97c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\d3eea9e0-2d50-4d1a-bf95-47b0d4aafb20
Filesize982B
MD5339e32a6f8936c2c5142b2097b37fd15
SHA1d5b95c9dd54710a1bc8abff1abe39531417449c0
SHA25657771f9dc6528dee20b09bf96addfccc568d20b63f57fff09a6928e2f55cb268
SHA51239ce94037c1bb36697b14f78bca7dfb62269e97da6518db6237bf187d44d6f7ea99e24f95531c85dbbd29d32b529093eae7ec8ffa900401fded4e2f5f67fde20
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD5525ae4591a5ca6f9af8b3aef7e379f7f
SHA1f8cff720832521ee3d36d1bf30294b46aada876d
SHA25603f815fc1a4e00415c097af9cd0098731dfb7cb5b7c19253d66024fa3530e5bd
SHA5125cf83d14888acc4100e57595b74a552e97f3deacc2dd5bb726b0dd57750a4f10bf84f3747ab56c8bab6788796af2c8c7d2527a6ca81422033ac101a1e3acf9f9
-
Filesize
15KB
MD5021ec84845024a1e96389491bc078b3a
SHA1f9a5e477df8cde63f789f8391f41e02143076131
SHA256421a203cbed8e5a035d8d8c741089b2360dab7396ffe2a6109d836888e38df71
SHA5124b2ed3a40e61fd23c6a9dc838265ec2568831bac58b6d2f2b95c9c3dc6d311fbb7957f8cbf430834562b3fb7ed9411e4271aa02b95c74b618ad51d0287b1a4be
-
Filesize
10KB
MD5638c168b3df7ab83c0178968130c0c8d
SHA109b361eb314e32378e9c1341538171aabc7e38c2
SHA2561db38cf89623657895bf17d9f90f9d20aed2ec03b926be7f87d20434aea29b4e
SHA512d92a94930440f46a9b3fd83fa910d32a285d5ec0714990db0dcb457faf0ad97b79fe577fe3342db31bd8135b6b6f130f6736c32890a9f95e3c9215f4460aefef
-
Filesize
10KB
MD55a3f033cf0d8d17781550bbd7bd42fdc
SHA12aaedded64992d317e48c9f5b220d4a41d58304f
SHA2566c105543191bff728cbe3704c571528078b5d19376c8f5dd585871d4bade090c
SHA512b20b947ac3d3aedd74a75bb57c33f990c022fa26f4a117e88095d31978b405fba9a3df62680625c4db556c4ab06eeec59fb96c010ad08ef0f17803c7de2670a4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize1.9MB
MD5d1ad4b640a39b391b2a711b07b6eb495
SHA162a4f1d75e2ad8773022b954a562362316e60ccf
SHA2569535600607f44381634a3685b43c255720b7b7030c503d4e56a69c6774a561a7
SHA512924e9d48174751202ce4a209f2933a44d44fc38107d51e4abb57b9f9105a2e63a4d6207e91ed7260140c513be78a22e974eecd381fed62c3399fd61652b80211