Analysis
-
max time kernel
291s -
max time network
293s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
14/10/2024, 07:34
Static task
static1
Behavioral task
behavioral1
Sample
abbba313a28d7e3a90d5bd467652058d5db032d2fa450e5209f06e1a9f0e41ed.exe
Resource
win7-20241010-en
General
-
Target
abbba313a28d7e3a90d5bd467652058d5db032d2fa450e5209f06e1a9f0e41ed.exe
-
Size
1.8MB
-
MD5
a67bb9538a2a91d727c9051f6e19a594
-
SHA1
dc18242150c171b2a7a484419586e376b769cc33
-
SHA256
abbba313a28d7e3a90d5bd467652058d5db032d2fa450e5209f06e1a9f0e41ed
-
SHA512
e188866b130ebf33583147379e9ade8541f995007ec864dcf2a284abdb650b0321922419554877934f34545f7de034884dd3e0e32a3b9cb8eca70a6ff2c79264
-
SSDEEP
49152:20LUVXEtvdW/4pM3tnd6/p/h69ynRAH8QAQ/PVJzO:2DVMvBandytAcQAIPV9O
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
doma
http://185.215.113.37
-
url_path
/e2b1563c6670f193.php
Extracted
lumma
https://clearancek.site
https://licendfilteo.site
https://spirittunek.store
https://bathdoomgaz.store
https://studennotediw.store
https://dissapoiznw.store
https://eaglepawnoy.store
https://mobbipenju.store
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" fd9dee4624.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" fd9dee4624.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" fd9dee4624.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection fd9dee4624.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" fd9dee4624.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" fd9dee4624.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ abbba313a28d7e3a90d5bd467652058d5db032d2fa450e5209f06e1a9f0e41ed.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a96cce70f4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ abcf3bd449.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ fd9dee4624.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 12 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion abbba313a28d7e3a90d5bd467652058d5db032d2fa450e5209f06e1a9f0e41ed.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion abcf3bd449.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a96cce70f4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion abcf3bd449.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion fd9dee4624.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion fd9dee4624.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion abbba313a28d7e3a90d5bd467652058d5db032d2fa450e5209f06e1a9f0e41ed.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a96cce70f4.exe -
Executes dropped EXE 7 IoCs
pid Process 2932 skotes.exe 1608 21042b9661.exe 1916 num.exe 2144 a96cce70f4.exe 3180 abcf3bd449.exe 3660 fd9dee4624.exe 3832 skotes.exe -
Identifies Wine through registry keys 2 TTPs 6 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine abbba313a28d7e3a90d5bd467652058d5db032d2fa450e5209f06e1a9f0e41ed.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine a96cce70f4.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine abcf3bd449.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine fd9dee4624.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine skotes.exe -
Loads dropped DLL 10 IoCs
pid Process 2556 abbba313a28d7e3a90d5bd467652058d5db032d2fa450e5209f06e1a9f0e41ed.exe 2932 skotes.exe 2932 skotes.exe 2932 skotes.exe 2932 skotes.exe 2932 skotes.exe 2932 skotes.exe 2932 skotes.exe 2932 skotes.exe 2932 skotes.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features fd9dee4624.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" fd9dee4624.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\num.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000336001\\num.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\a96cce70f4.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000349001\\a96cce70f4.exe" skotes.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x00060000000194da-28.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 2556 abbba313a28d7e3a90d5bd467652058d5db032d2fa450e5209f06e1a9f0e41ed.exe 2932 skotes.exe 2144 a96cce70f4.exe 3180 abcf3bd449.exe 3660 fd9dee4624.exe 3832 skotes.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2932 set thread context of 3832 2932 skotes.exe 58 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job abbba313a28d7e3a90d5bd467652058d5db032d2fa450e5209f06e1a9f0e41ed.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 21042b9661.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language num.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a96cce70f4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fd9dee4624.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language abcf3bd449.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language abbba313a28d7e3a90d5bd467652058d5db032d2fa450e5209f06e1a9f0e41ed.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 1492 taskkill.exe 2964 taskkill.exe 1556 taskkill.exe 236 taskkill.exe 2952 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_Classes\Local Settings firefox.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 skotes.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 skotes.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 skotes.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 skotes.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2556 abbba313a28d7e3a90d5bd467652058d5db032d2fa450e5209f06e1a9f0e41ed.exe 2932 skotes.exe 1608 21042b9661.exe 1608 21042b9661.exe 2144 a96cce70f4.exe 3180 abcf3bd449.exe 3180 abcf3bd449.exe 3660 fd9dee4624.exe 3832 skotes.exe 3832 skotes.exe 3660 fd9dee4624.exe 3660 fd9dee4624.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 2952 taskkill.exe Token: SeDebugPrivilege 1492 taskkill.exe Token: SeDebugPrivilege 2964 taskkill.exe Token: SeDebugPrivilege 1556 taskkill.exe Token: SeDebugPrivilege 236 taskkill.exe Token: SeDebugPrivilege 1088 firefox.exe Token: SeDebugPrivilege 1088 firefox.exe Token: SeDebugPrivilege 3660 fd9dee4624.exe -
Suspicious use of FindShellTrayWindow 16 IoCs
pid Process 2556 abbba313a28d7e3a90d5bd467652058d5db032d2fa450e5209f06e1a9f0e41ed.exe 1608 21042b9661.exe 1608 21042b9661.exe 1608 21042b9661.exe 1608 21042b9661.exe 1608 21042b9661.exe 1608 21042b9661.exe 1608 21042b9661.exe 1088 firefox.exe 1088 firefox.exe 1088 firefox.exe 1088 firefox.exe 1608 21042b9661.exe 1608 21042b9661.exe 1608 21042b9661.exe 1608 21042b9661.exe -
Suspicious use of SendNotifyMessage 14 IoCs
pid Process 1608 21042b9661.exe 1608 21042b9661.exe 1608 21042b9661.exe 1608 21042b9661.exe 1608 21042b9661.exe 1608 21042b9661.exe 1608 21042b9661.exe 1088 firefox.exe 1088 firefox.exe 1088 firefox.exe 1608 21042b9661.exe 1608 21042b9661.exe 1608 21042b9661.exe 1608 21042b9661.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2556 wrote to memory of 2932 2556 abbba313a28d7e3a90d5bd467652058d5db032d2fa450e5209f06e1a9f0e41ed.exe 31 PID 2556 wrote to memory of 2932 2556 abbba313a28d7e3a90d5bd467652058d5db032d2fa450e5209f06e1a9f0e41ed.exe 31 PID 2556 wrote to memory of 2932 2556 abbba313a28d7e3a90d5bd467652058d5db032d2fa450e5209f06e1a9f0e41ed.exe 31 PID 2556 wrote to memory of 2932 2556 abbba313a28d7e3a90d5bd467652058d5db032d2fa450e5209f06e1a9f0e41ed.exe 31 PID 2932 wrote to memory of 1608 2932 skotes.exe 33 PID 2932 wrote to memory of 1608 2932 skotes.exe 33 PID 2932 wrote to memory of 1608 2932 skotes.exe 33 PID 2932 wrote to memory of 1608 2932 skotes.exe 33 PID 1608 wrote to memory of 2952 1608 21042b9661.exe 34 PID 1608 wrote to memory of 2952 1608 21042b9661.exe 34 PID 1608 wrote to memory of 2952 1608 21042b9661.exe 34 PID 1608 wrote to memory of 2952 1608 21042b9661.exe 34 PID 1608 wrote to memory of 1492 1608 21042b9661.exe 37 PID 1608 wrote to memory of 1492 1608 21042b9661.exe 37 PID 1608 wrote to memory of 1492 1608 21042b9661.exe 37 PID 1608 wrote to memory of 1492 1608 21042b9661.exe 37 PID 2932 wrote to memory of 1916 2932 skotes.exe 39 PID 2932 wrote to memory of 1916 2932 skotes.exe 39 PID 2932 wrote to memory of 1916 2932 skotes.exe 39 PID 2932 wrote to memory of 1916 2932 skotes.exe 39 PID 1608 wrote to memory of 2964 1608 21042b9661.exe 40 PID 1608 wrote to memory of 2964 1608 21042b9661.exe 40 PID 1608 wrote to memory of 2964 1608 21042b9661.exe 40 PID 1608 wrote to memory of 2964 1608 21042b9661.exe 40 PID 1608 wrote to memory of 1556 1608 21042b9661.exe 42 PID 1608 wrote to memory of 1556 1608 21042b9661.exe 42 PID 1608 wrote to memory of 1556 1608 21042b9661.exe 42 PID 1608 wrote to memory of 1556 1608 21042b9661.exe 42 PID 1608 wrote to memory of 236 1608 21042b9661.exe 44 PID 1608 wrote to memory of 236 1608 21042b9661.exe 44 PID 1608 wrote to memory of 236 1608 21042b9661.exe 44 PID 1608 wrote to memory of 236 1608 21042b9661.exe 44 PID 1608 wrote to memory of 284 1608 21042b9661.exe 46 PID 1608 wrote to memory of 284 1608 21042b9661.exe 46 PID 1608 wrote to memory of 284 1608 21042b9661.exe 46 PID 1608 wrote to memory of 284 1608 21042b9661.exe 46 PID 284 wrote to memory of 1088 284 firefox.exe 47 PID 284 wrote to memory of 1088 284 firefox.exe 47 PID 284 wrote to memory of 1088 284 firefox.exe 47 PID 284 wrote to memory of 1088 284 firefox.exe 47 PID 284 wrote to memory of 1088 284 firefox.exe 47 PID 284 wrote to memory of 1088 284 firefox.exe 47 PID 284 wrote to memory of 1088 284 firefox.exe 47 PID 284 wrote to memory of 1088 284 firefox.exe 47 PID 284 wrote to memory of 1088 284 firefox.exe 47 PID 284 wrote to memory of 1088 284 firefox.exe 47 PID 284 wrote to memory of 1088 284 firefox.exe 47 PID 284 wrote to memory of 1088 284 firefox.exe 47 PID 1088 wrote to memory of 300 1088 firefox.exe 48 PID 1088 wrote to memory of 300 1088 firefox.exe 48 PID 1088 wrote to memory of 300 1088 firefox.exe 48 PID 1088 wrote to memory of 1688 1088 firefox.exe 49 PID 1088 wrote to memory of 1688 1088 firefox.exe 49 PID 1088 wrote to memory of 1688 1088 firefox.exe 49 PID 1088 wrote to memory of 1688 1088 firefox.exe 49 PID 1088 wrote to memory of 1688 1088 firefox.exe 49 PID 1088 wrote to memory of 1688 1088 firefox.exe 49 PID 1088 wrote to memory of 1688 1088 firefox.exe 49 PID 1088 wrote to memory of 1688 1088 firefox.exe 49 PID 1088 wrote to memory of 1688 1088 firefox.exe 49 PID 1088 wrote to memory of 1688 1088 firefox.exe 49 PID 1088 wrote to memory of 1688 1088 firefox.exe 49 PID 1088 wrote to memory of 1688 1088 firefox.exe 49 PID 1088 wrote to memory of 1688 1088 firefox.exe 49 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\abbba313a28d7e3a90d5bd467652058d5db032d2fa450e5209f06e1a9f0e41ed.exe"C:\Users\Admin\AppData\Local\Temp\abbba313a28d7e3a90d5bd467652058d5db032d2fa450e5209f06e1a9f0e41ed.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\1000332001\21042b9661.exe"C:\Users\Admin\AppData\Local\Temp\1000332001\21042b9661.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2952
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1492
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2964
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1556
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:236
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:284 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1088.0.2003974169\1479718217" -parentBuildID 20221007134813 -prefsHandle 1244 -prefMapHandle 1172 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5e65acaf-734c-4a22-b855-3cf1ea494eee} 1088 "\\.\pipe\gecko-crash-server-pipe.1088" 1320 114d4e58 gpu6⤵PID:300
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1088.1.567087762\1768230908" -parentBuildID 20221007134813 -prefsHandle 1508 -prefMapHandle 1504 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d1efd678-33de-49ce-b871-622e0ce8db73} 1088 "\\.\pipe\gecko-crash-server-pipe.1088" 1520 e74858 socket6⤵PID:1688
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1088.2.422195711\600878841" -childID 1 -isForBrowser -prefsHandle 2084 -prefMapHandle 2080 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 888 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {66b45eb8-be02-4c3b-a2f6-61eda4b4e6cc} 1088 "\\.\pipe\gecko-crash-server-pipe.1088" 2096 1a5e9f58 tab6⤵PID:1508
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1088.3.1087622182\876730038" -childID 2 -isForBrowser -prefsHandle 2812 -prefMapHandle 2808 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 888 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {4ed2c6cc-8196-47c9-aa43-5be8ea492169} 1088 "\\.\pipe\gecko-crash-server-pipe.1088" 2824 1bf8ed58 tab6⤵PID:2676
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1088.4.1466973317\625398301" -childID 3 -isForBrowser -prefsHandle 1772 -prefMapHandle 3024 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 888 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c9e64e6a-ad28-43e4-ac22-30682dbfb87e} 1088 "\\.\pipe\gecko-crash-server-pipe.1088" 3668 e6b058 tab6⤵PID:2332
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1088.5.1749726114\1633531787" -childID 4 -isForBrowser -prefsHandle 3780 -prefMapHandle 3784 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 888 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {760be0a4-838a-4d83-a13f-b2c39e60a8d5} 1088 "\\.\pipe\gecko-crash-server-pipe.1088" 3776 1f999258 tab6⤵PID:348
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1088.6.828653080\1015307238" -childID 5 -isForBrowser -prefsHandle 3956 -prefMapHandle 3960 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 888 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {2af3b90e-ca2d-4cbf-8bfe-29b016970e18} 1088 "\\.\pipe\gecko-crash-server-pipe.1088" 3944 1fabbb58 tab6⤵PID:1952
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000336001\num.exe"C:\Users\Admin\AppData\Local\Temp\1000336001\num.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1916
-
-
C:\Users\Admin\AppData\Local\Temp\1000349001\a96cce70f4.exe"C:\Users\Admin\AppData\Local\Temp\1000349001\a96cce70f4.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2144
-
-
C:\Users\Admin\1000350002\abcf3bd449.exe"C:\Users\Admin\1000350002\abcf3bd449.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3180
-
-
C:\Users\Admin\AppData\Local\Temp\1000357001\fd9dee4624.exe"C:\Users\Admin\AppData\Local\Temp\1000357001\fd9dee4624.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3660
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:3832
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD59fa6a87d6ac6c29173f38b8de4ea7272
SHA1c333a6778cc153fdbbadccc1cda4f575103c818c
SHA25656b3a862526d4a5ae4311c3b742a7a42cd6206939944458e3566694b1cddf0ba
SHA512913efb4c7ece09f91af9fc7f0309b95136144706636880993720ebde7fc0a28fc09b26ba72c2c26513fe238fad72a7d49c46e37ec2c6a83055968ae900fb021c
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\xmhyv50e.default-release\activity-stream.discovery_stream.json.tmp
Filesize26KB
MD5025d8f12ba8f160dbae7b670a6659551
SHA1c68804a47d83f6161ceec4e890632cebd3376f5c
SHA2561ed2f4a8e2ea67e47fa1589d65629849103b2ff3d6824c3ffde9188dde1a1f91
SHA5121decc78e2858bd25e01be2ab9eea04de0e103339453d21e2f9200aae219b4d09c9252d2074df21eafdcfd33b2cc96b276912b3ca15959929636a4dd1ac955def
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\xmhyv50e.default-release\activity-stream.discovery_stream.json.tmp
Filesize25KB
MD5272a94579f0c2dd2f8eaae0851638700
SHA1deee9c9807d49e9361561b5f06e1af54697b73cf
SHA25671a70976255001c0691c54f6be933311e7c0ee5d555ae6b5bfa2a5f2f8f08983
SHA5127ddc55a31c5c204319bc84eeec62491ab63ebae7620b4109b26c4b6b4350e9eaefcbbc179726c6f13424c1d6567d10220682bb8ef02780d233f257b8ab235d34
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\xmhyv50e.default-release\cache2\entries\037778A55E1B7E9BED3390289866D09402D6C913
Filesize9KB
MD502b8596afe577c607e2c7d83bd921fc2
SHA1ec355045fd217354c27c2a37e7e5a7d842a8877f
SHA25689a8612b531979e75a47e253c1b20aee108a2542e8290650c8b0164c5f63b827
SHA512ae347f917c8671317e740c8acab518f73c6148a11c770847e8348e70939a7710d8ccbd2aa0291b26e047dc51b7cf4ec3084e96f3b6de3d5cced22aae8907eecd
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\xmhyv50e.default-release\cache2\entries\31A9B722A944C59894A0F0C9157EE804E55494F7
Filesize11KB
MD50fb948dbdea4507c94dc1ed20af9553f
SHA1d1efb16dc0c7b0dec5bbc66051b12d5f21b5d336
SHA2566a67fd82e20688d8d688124647fff5f9dd55e2811bf8509f88ca0a17a25b5412
SHA5125a32a36ddbc02cd9dccb8132db3e7583c28b1bdbc8b3a73fe42ba15b44591d7232befd146c36e26de64a6fc7daaf9483828a349744eb6b6bf58a1c23dd04af09
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\xmhyv50e.default-release\cache2\entries\6D89348819C8881868053197CA0754F36784BF5F
Filesize15KB
MD5f35c50d4b9a97849355e7a7eb061bc13
SHA17e318d88c46262143872e2510085601bf6366355
SHA256f06cde2c56aafe3d29f7d9c7b243fbed8e0cc5a4c27292ac0e0e95cf0ea6ce4f
SHA512aa47ebd8316ad024b9c4135191d0ad5d5c81e0bfe0d5e7a89764d8348a3e8c62c04001ae15951c7ed172dbf40d81989e9831ee1565c01a32993dc3bd009bdcdf
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\xmhyv50e.default-release\cache2\entries\F210D48319A1879FD1C5213FA010C613B99BA085
Filesize11KB
MD51d21a6c358c7100081227505942575cf
SHA1207b5f86b8ee665d8e519507879c1a8ebded047d
SHA2561af2f9cc02698557b6a03149789cbb9df76689a53470668a46d1bf52fa26a3e7
SHA5123fa60597409997df584b135e78534958506641d88af2a3ce6b7eb95289a8d40c2364a4b3ce235a4118148a8943712a97a7d02c46a2942eb71e6b3f9147be7ee3
-
Filesize
898KB
MD5e6629643e8305d91ff0457edb686f35c
SHA124977a57a4130edd8e82dfaa6de8f6cf2a2a9625
SHA256fc83d3aec4b43b001f402b2e0717e75a612aa63d584c4fa6440262fba22c5353
SHA51202f7139d28d39f5f5b254377bd35c9285018bc595e9cb4b975fdc76b7ad42f34a47216fbd644d45a1c715a7f38e13ccf65b43952b49b00c6e58d6fc51f18831b
-
Filesize
307KB
MD5791fcee57312d4a20cc86ae1cea8dfc4
SHA104a88c60ae1539a63411fe4765e9b931e8d2d992
SHA25627e4a3627d7df2b22189dd4bebc559ae1986d49a8f4e35980b428fadb66cf23d
SHA5122771d4e7b272bf770efad22c9fb1dfafe10cbbf009df931f091fb543e3132c0efda16acb5b515452e9e67e8b1fc8fe8aedd1376c236061385f026865cdc28d2c
-
Filesize
2.8MB
MD5624aa9f7c297655526b0c57976065fd9
SHA17a0be2e902647eebafc4b857146677ebd81012ef
SHA256e8653f720910be487637fe70d1bd58299a2f207d7140a00db5a6d51e4c65c00f
SHA51204657e8ffbbfa20eb56a7d2d9acb7e08c0e5b0fc8bc628d3974d189386ec7f2c9fb36b639b4b2f670cdfde4860f2947d9117d37be47a50f8257b94bee253f56a
-
Filesize
1.7MB
MD58e7b1277f59e4026ab6f51465fac3a86
SHA1f5b35e55ce77e8d3272a8643084927e5fbdf6d7f
SHA2562b827e1a195301d413885981ca553b38570d8d79488a2f57b573580dc7420496
SHA5121939267885b3d733b87bd2cfee906fd151cc1aa20fb4c740ba2eb56756cc569c8e2c484c8a922734f2717a66c15558a901f4d1eb9bdc2d6be689386cb3e675b8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
442KB
MD585430baed3398695717b0263807cf97c
SHA1fffbee923cea216f50fce5d54219a188a5100f41
SHA256a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA51206511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1
-
Filesize
8.0MB
MD5a01c5ecd6108350ae23d2cddf0e77c17
SHA1c6ac28a2cd979f1f9a75d56271821d5ff665e2b6
SHA256345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42
SHA512b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms
Filesize7KB
MD5e5cdf4ef9ec3c8b191d2497f1d4f178e
SHA17e83972b956b4dd586778427b70053e1fb801773
SHA2568c69c134a900848ac3e063ffee0a075d2ef19e586623bbf3b8e540be9d68227b
SHA5120b96d667496248dfa3c1e09409aa62ffed9936481aaed10183d1ec5053109534d24c17f26ed7a5b58e4a71a9e2ac2ac25d30b5b14272ec6f43ed8790e902524c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\addonStartup.json.lz4
Filesize5KB
MD535860b7440797fdf92b6b343858fae39
SHA162c24f43eedf6e71b226f0159dbbfeecc152f47f
SHA256fa8d0fffa1b53a2ef40a65da9e28fe04dd91f053f4784f542714e60b4290f498
SHA5125ae3d1a8279ae0fdf7954c3cf2279ea9c525e36547c4ed92049f741be6bd46bfef82b40763c7d01e0620dcf356fc9fc45b12be4dce319d4d9b354f6fa15d1a69
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\bookmarkbackups\bookmarks-2024-10-14_11_7Rf7HncBl+3VdROYNL8qAw==.jsonlz4
Filesize943B
MD5eee6961e0cda219c540ede84dbf62c68
SHA1b95a56fb33b8eefec54591d4ea6cd12c092ebbbd
SHA25679008b1590fb7a23e0de7d9d4d02723dd44133a22976ca2598b7eae2324883aa
SHA5121ef572548ac7836ceb36ab8853cd909651008150c2feda277169530dbe585843d80d28b5fe5966059ad5fc78e74d68b381153bacd537a71ad4be2f02974d3850
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\broadcast-listeners.json
Filesize204B
MD572c95709e1a3b27919e13d28bbe8e8a2
SHA100892decbee63d627057730bfc0c6a4f13099ee4
SHA2569cf589357fceea2f37cd1a925e5d33fd517a44d22a16c357f7fb5d4d187034aa
SHA512613ca9dd2d12afe31fb2c4a8d9337eeecfb58dabaeaaba11404b9a736a4073dfd9b473ba27c1183d3cc91d5a9233a83dce5a135a81f755d978cea9e198209182
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD5d35a7631a728458a34144cab25aa1bde
SHA12879593ca9dbecdfe0f8e4e3fcc657b03134fbc7
SHA256efa8ced698e10d12a47347a6aac30ed8aa5cc5abfbb966bb05696fff8a59d109
SHA512f549081f8b61818c78500095e6b474c8fd6c6e83b75c9d8f9ae5800cac12b55c46ca779007f78438981f08bd978f69b50a199e6b7798c366af730df8ad48380d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\datareporting\glean\pending_pings\76023023-dca1-409d-8de2-7055fe39b8dc
Filesize10KB
MD5eb78244ba055bfab4eba5d60d7edfa05
SHA1678e2a6d62d8a6da1f5f7a6bf8e65249c088fda6
SHA256ef5ad6fe82d5114ca98feec763693b3fe31d03392683d4df17233210c2d04f1a
SHA512b1e67ef9ccc368aca0eecc1abd7ba15634e5c9c29e58b7ba8fb6380554ec349d5370c044926e5b2ad413417c1b09713676a63c50d60eb8fbb410e80c8fc6ca1b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\datareporting\glean\pending_pings\826de32f-9cea-4212-b658-4a9b283136b6
Filesize745B
MD5e63b657ad054e1765a68759a7ee747ff
SHA1139924170e20605ca0f8f2d06976981ffc9b32ae
SHA256ca45e35a54a1b344c4c475cbb2cf62c13b0bc7234c38c4849532f6a13f376de4
SHA512255081c72fb6e8a7f7bee6b0b6371cc7431fb95ee536986a778f7235b1a77f64e54a826d885d7872e366616cb37c4f11b91de4a5baa937d6c26ce4dd12e4ed83
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll
Filesize997KB
MD5fe3355639648c417e8307c6d051e3e37
SHA1f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA2561ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA5128f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info
Filesize116B
MD53d33cdc0b3d281e67dd52e14435dd04f
SHA14db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json
Filesize372B
MD58be33af717bb1b67fbd61c3f4b807e9e
SHA17cf17656d174d951957ff36810e874a134dd49e0
SHA256e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd
SHA5126125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll
Filesize11.8MB
MD533bf7b0439480effb9fb212efce87b13
SHA1cee50f2745edc6dc291887b6075ca64d716f495a
SHA2568ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e
SHA512d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig
Filesize1KB
MD5937326fead5fd401f6cca9118bd9ade9
SHA14526a57d4ae14ed29b37632c72aef3c408189d91
SHA25668a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81
SHA512b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2
-
Filesize
7KB
MD58aca263726fadd3f1387dde1fcb4acb7
SHA121c3ebcd67f07aa3fd4c3b50d2982fd23f1ccf8a
SHA256458fcdf9498e9368b88f2ba81ab5af7b7a0b87c202e94fea34b84f2b23a726a3
SHA5129ab611a6a5a985c05fe1652a132807c794258e8676f8bd90c19439eb76b439f7ff952a53cc37cf16a901f77250b6796754252b006d3d67187bead2d8dfcc16b8
-
Filesize
7KB
MD522456b1945d071cbf3dc6e67e2b29e06
SHA11bb61a39f9791f61c7685e90af16d132a77e33b8
SHA256b256c45e1e16565e67e717b5bb5cff70c98f07459241b92e93f44ac5eadd40ac
SHA512429c01f3bc7d809ed4dbaf45d61737ab8e03a8d55891937ccfb73746857b605691dc14e290c5c0bcaeb8abd90d2cc23c60e1dd5d7f230b42d00d7cc5e5f1178d
-
Filesize
7KB
MD51456ff31953c29d8eac1e0924c28540b
SHA1848fa20a6caf34755a72fcb94799cf911337f43f
SHA2564e0539e6e553d2480a0c46ee8df62f1fdfe013d4f7b3f24a3a55a728523d4be8
SHA5122afde054d0af28791476c322706070efc1476bd46ae254573e8d9bbe2158b298b1e959b86fc6bd7cdf9ada6d835dd49fa1b268204c4922f372f58ae2f62d9509
-
Filesize
6KB
MD5fd36ff776c7b633a9adc74ca7d18cab8
SHA1bbc675a505e134b7547d9e65a17bdb0d89803c4b
SHA25602ae59825171a3f5d1b2b3cfb28016fe35d1a3a48d8d7ed47bbe11b72deed777
SHA5123f3ca2dcf0fe45ac47be7a56410623e5223c072ee91e8dd3669fc0e256c017e37f31921b5ab91a09c53375e1b570af0620fda66124e98e55ff664e489e5bbe7b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\sessionCheckpoints.json
Filesize90B
MD5c4ab2ee59ca41b6d6a6ea911f35bdc00
SHA15942cd6505fc8a9daba403b082067e1cdefdfbc4
SHA25600ad9799527c3fd21f3a85012565eae817490f3e0d417413bf9567bb5909f6a2
SHA51271ea16900479e6af161e0aad08c8d1e9ded5868a8d848e7647272f3002e2f2013e16382b677abe3c6f17792a26293b9e27ec78e16f00bd24ba3d21072bd1cae2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD54d55fc8760d15437012cea37c261c0f3
SHA1b535779b144482c457f6f8afbf43327521f4d413
SHA2569ee243ea06cca37817c95e8885b1334766ce3a27b3245e2ea9da3c66ad3e8f96
SHA512291b4fd147275821ee41166ae77d7b0fdd438c02cc0862d86a88616e3f59b4a9cdb3291121b67eaf2ff1352d830ae080bdf126dc9e8d2cb026f803c7ac859a07
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize192KB
MD5e8777533452df298db698cf06fef62f2
SHA1310888df3e00effc4337344d299dbd089f2aafe5
SHA2567d212b68ab30bdfa38ce494b5bd1abf75a5c90e48c0870d2f773dfb2c0be7d36
SHA51245d1beceb801d5a4ee295da623ccc07a0a0325577bb4ce03cc6b26fd5e6e4a53f24b8aa9be08e1e0a83166ad9a5f2c0f8f797ef4a26ee5b26127efce1ecdbe6a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\targeting.snapshot.json
Filesize4KB
MD5507bb927f93a7c12046f4e4e6d3a3ae2
SHA123117199f9e3a74c1241e5b9442aeacd37e20e5a
SHA256c8e596771fb255c4c4828b94f503885c49a3e56cc41dee204c8943147b13a396
SHA5120fc18a54a3abc4049c2240a066d6d7f8cd37c91436b0c9da03714b6388762c8ce51d2937562f4261faaf0310392f79f223028440314b9e24b8b3d0b031089d4d
-
Filesize
1.8MB
MD5a67bb9538a2a91d727c9051f6e19a594
SHA1dc18242150c171b2a7a484419586e376b769cc33
SHA256abbba313a28d7e3a90d5bd467652058d5db032d2fa450e5209f06e1a9f0e41ed
SHA512e188866b130ebf33583147379e9ade8541f995007ec864dcf2a284abdb650b0321922419554877934f34545f7de034884dd3e0e32a3b9cb8eca70a6ff2c79264