Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 23:28
Static task
static1
General
-
Target
8188cfdd4bc2d6991d30f5c394b47b11f17f6ce920bb23bea805c5c6772b4a81.exe
-
Size
5.5MB
-
MD5
6ad27ed41e83e1276426abc7852a7b1a
-
SHA1
8cf45789d1717fbd0d3fa56a5181d3a76616c0c5
-
SHA256
8188cfdd4bc2d6991d30f5c394b47b11f17f6ce920bb23bea805c5c6772b4a81
-
SHA512
f6c55476a68e9c798eaa7f0b942c4f133f10d5764843327c7ec79dc2011fc32404ebe18c2041d9a5c6ed1641e66d59aff91505ec0d6949fa0d5ad512c2a2374b
-
SSDEEP
98304:GbSkC2TwlvmZeLaYOPKs/e3f0Vrr068IWK/WAWffeivlwNSD9JrKys:Q3C2Tw2eLVqKs2MRwdfcWXei9wirKys
Malware Config
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://founpiuer.store/api
https://bringlanejk.site/api
https://moeventmynz.site/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" da808ded96.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection da808ded96.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" da808ded96.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" da808ded96.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" da808ded96.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" da808ded96.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ da808ded96.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2z9064.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3D10h.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 665.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5e04effc5d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4W130F.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c48da731ff.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 22 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2z9064.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4W130F.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 665.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion da808ded96.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c48da731ff.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3D10h.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 665.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c48da731ff.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2z9064.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3D10h.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4W130F.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5e04effc5d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5e04effc5d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion da808ded96.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 4W130F.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 13 IoCs
pid Process 4548 B1I52.exe 2824 2z9064.exe 2792 3D10h.exe 968 4W130F.exe 1380 skotes.exe 640 665.exe 948 c48da731ff.exe 2544 5e04effc5d.exe 3492 skotes.exe 4652 3a7d74d402.exe 7036 da808ded96.exe 5720 skotes.exe 6596 skotes.exe -
Identifies Wine through registry keys 2 TTPs 11 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 2z9064.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 4W130F.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 5e04effc5d.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine da808ded96.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 3D10h.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 665.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine c48da731ff.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features da808ded96.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" da808ded96.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8188cfdd4bc2d6991d30f5c394b47b11f17f6ce920bb23bea805c5c6772b4a81.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" B1I52.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\c48da731ff.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1003968001\\c48da731ff.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5e04effc5d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1003969001\\5e04effc5d.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\3a7d74d402.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1003970001\\3a7d74d402.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\da808ded96.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1003971001\\da808ded96.exe" skotes.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000f000000023cc4-106.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
pid Process 2824 2z9064.exe 2792 3D10h.exe 968 4W130F.exe 1380 skotes.exe 640 665.exe 948 c48da731ff.exe 2544 5e04effc5d.exe 3492 skotes.exe 7036 da808ded96.exe 5720 skotes.exe 6596 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 4W130F.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 800 2824 WerFault.exe 87 1944 948 WerFault.exe 109 3108 948 WerFault.exe 109 -
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2z9064.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3D10h.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5e04effc5d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8188cfdd4bc2d6991d30f5c394b47b11f17f6ce920bb23bea805c5c6772b4a81.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 665.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3a7d74d402.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da808ded96.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language B1I52.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4W130F.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c48da731ff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 3732 taskkill.exe 1952 taskkill.exe 1760 taskkill.exe 2740 taskkill.exe 3904 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 2824 2z9064.exe 2824 2z9064.exe 2792 3D10h.exe 2792 3D10h.exe 968 4W130F.exe 968 4W130F.exe 1380 skotes.exe 1380 skotes.exe 640 665.exe 640 665.exe 948 c48da731ff.exe 948 c48da731ff.exe 2544 5e04effc5d.exe 2544 5e04effc5d.exe 3492 skotes.exe 3492 skotes.exe 4652 3a7d74d402.exe 4652 3a7d74d402.exe 7036 da808ded96.exe 7036 da808ded96.exe 4652 3a7d74d402.exe 4652 3a7d74d402.exe 7036 da808ded96.exe 7036 da808ded96.exe 7036 da808ded96.exe 5720 skotes.exe 5720 skotes.exe 6596 skotes.exe 6596 skotes.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 3904 taskkill.exe Token: SeDebugPrivilege 3732 taskkill.exe Token: SeDebugPrivilege 1952 taskkill.exe Token: SeDebugPrivilege 1760 taskkill.exe Token: SeDebugPrivilege 2740 taskkill.exe Token: SeDebugPrivilege 4296 firefox.exe Token: SeDebugPrivilege 4296 firefox.exe Token: SeDebugPrivilege 7036 da808ded96.exe -
Suspicious use of FindShellTrayWindow 32 IoCs
pid Process 968 4W130F.exe 4652 3a7d74d402.exe 4652 3a7d74d402.exe 4652 3a7d74d402.exe 4652 3a7d74d402.exe 4652 3a7d74d402.exe 4652 3a7d74d402.exe 4296 firefox.exe 4296 firefox.exe 4296 firefox.exe 4296 firefox.exe 4652 3a7d74d402.exe 4296 firefox.exe 4296 firefox.exe 4296 firefox.exe 4296 firefox.exe 4296 firefox.exe 4296 firefox.exe 4296 firefox.exe 4296 firefox.exe 4296 firefox.exe 4296 firefox.exe 4296 firefox.exe 4296 firefox.exe 4296 firefox.exe 4296 firefox.exe 4296 firefox.exe 4296 firefox.exe 4296 firefox.exe 4652 3a7d74d402.exe 4652 3a7d74d402.exe 4652 3a7d74d402.exe -
Suspicious use of SendNotifyMessage 30 IoCs
pid Process 4652 3a7d74d402.exe 4652 3a7d74d402.exe 4652 3a7d74d402.exe 4652 3a7d74d402.exe 4652 3a7d74d402.exe 4652 3a7d74d402.exe 4296 firefox.exe 4296 firefox.exe 4296 firefox.exe 4296 firefox.exe 4652 3a7d74d402.exe 4296 firefox.exe 4296 firefox.exe 4296 firefox.exe 4296 firefox.exe 4296 firefox.exe 4296 firefox.exe 4296 firefox.exe 4296 firefox.exe 4296 firefox.exe 4296 firefox.exe 4296 firefox.exe 4296 firefox.exe 4296 firefox.exe 4296 firefox.exe 4296 firefox.exe 4296 firefox.exe 4652 3a7d74d402.exe 4652 3a7d74d402.exe 4652 3a7d74d402.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4296 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2904 wrote to memory of 4548 2904 8188cfdd4bc2d6991d30f5c394b47b11f17f6ce920bb23bea805c5c6772b4a81.exe 84 PID 2904 wrote to memory of 4548 2904 8188cfdd4bc2d6991d30f5c394b47b11f17f6ce920bb23bea805c5c6772b4a81.exe 84 PID 2904 wrote to memory of 4548 2904 8188cfdd4bc2d6991d30f5c394b47b11f17f6ce920bb23bea805c5c6772b4a81.exe 84 PID 4548 wrote to memory of 2824 4548 B1I52.exe 87 PID 4548 wrote to memory of 2824 4548 B1I52.exe 87 PID 4548 wrote to memory of 2824 4548 B1I52.exe 87 PID 4548 wrote to memory of 2792 4548 B1I52.exe 96 PID 4548 wrote to memory of 2792 4548 B1I52.exe 96 PID 4548 wrote to memory of 2792 4548 B1I52.exe 96 PID 2904 wrote to memory of 968 2904 8188cfdd4bc2d6991d30f5c394b47b11f17f6ce920bb23bea805c5c6772b4a81.exe 99 PID 2904 wrote to memory of 968 2904 8188cfdd4bc2d6991d30f5c394b47b11f17f6ce920bb23bea805c5c6772b4a81.exe 99 PID 2904 wrote to memory of 968 2904 8188cfdd4bc2d6991d30f5c394b47b11f17f6ce920bb23bea805c5c6772b4a81.exe 99 PID 968 wrote to memory of 1380 968 4W130F.exe 100 PID 968 wrote to memory of 1380 968 4W130F.exe 100 PID 968 wrote to memory of 1380 968 4W130F.exe 100 PID 1380 wrote to memory of 640 1380 skotes.exe 107 PID 1380 wrote to memory of 640 1380 skotes.exe 107 PID 1380 wrote to memory of 640 1380 skotes.exe 107 PID 1380 wrote to memory of 948 1380 skotes.exe 109 PID 1380 wrote to memory of 948 1380 skotes.exe 109 PID 1380 wrote to memory of 948 1380 skotes.exe 109 PID 1380 wrote to memory of 2544 1380 skotes.exe 115 PID 1380 wrote to memory of 2544 1380 skotes.exe 115 PID 1380 wrote to memory of 2544 1380 skotes.exe 115 PID 1380 wrote to memory of 4652 1380 skotes.exe 117 PID 1380 wrote to memory of 4652 1380 skotes.exe 117 PID 1380 wrote to memory of 4652 1380 skotes.exe 117 PID 4652 wrote to memory of 3904 4652 3a7d74d402.exe 118 PID 4652 wrote to memory of 3904 4652 3a7d74d402.exe 118 PID 4652 wrote to memory of 3904 4652 3a7d74d402.exe 118 PID 4652 wrote to memory of 3732 4652 3a7d74d402.exe 120 PID 4652 wrote to memory of 3732 4652 3a7d74d402.exe 120 PID 4652 wrote to memory of 3732 4652 3a7d74d402.exe 120 PID 4652 wrote to memory of 1952 4652 3a7d74d402.exe 122 PID 4652 wrote to memory of 1952 4652 3a7d74d402.exe 122 PID 4652 wrote to memory of 1952 4652 3a7d74d402.exe 122 PID 4652 wrote to memory of 1760 4652 3a7d74d402.exe 124 PID 4652 wrote to memory of 1760 4652 3a7d74d402.exe 124 PID 4652 wrote to memory of 1760 4652 3a7d74d402.exe 124 PID 4652 wrote to memory of 2740 4652 3a7d74d402.exe 127 PID 4652 wrote to memory of 2740 4652 3a7d74d402.exe 127 PID 4652 wrote to memory of 2740 4652 3a7d74d402.exe 127 PID 4652 wrote to memory of 3140 4652 3a7d74d402.exe 130 PID 4652 wrote to memory of 3140 4652 3a7d74d402.exe 130 PID 3140 wrote to memory of 4296 3140 firefox.exe 131 PID 3140 wrote to memory of 4296 3140 firefox.exe 131 PID 3140 wrote to memory of 4296 3140 firefox.exe 131 PID 3140 wrote to memory of 4296 3140 firefox.exe 131 PID 3140 wrote to memory of 4296 3140 firefox.exe 131 PID 3140 wrote to memory of 4296 3140 firefox.exe 131 PID 3140 wrote to memory of 4296 3140 firefox.exe 131 PID 3140 wrote to memory of 4296 3140 firefox.exe 131 PID 3140 wrote to memory of 4296 3140 firefox.exe 131 PID 3140 wrote to memory of 4296 3140 firefox.exe 131 PID 3140 wrote to memory of 4296 3140 firefox.exe 131 PID 4296 wrote to memory of 4672 4296 firefox.exe 132 PID 4296 wrote to memory of 4672 4296 firefox.exe 132 PID 4296 wrote to memory of 4672 4296 firefox.exe 132 PID 4296 wrote to memory of 4672 4296 firefox.exe 132 PID 4296 wrote to memory of 4672 4296 firefox.exe 132 PID 4296 wrote to memory of 4672 4296 firefox.exe 132 PID 4296 wrote to memory of 4672 4296 firefox.exe 132 PID 4296 wrote to memory of 4672 4296 firefox.exe 132 PID 4296 wrote to memory of 4672 4296 firefox.exe 132 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\8188cfdd4bc2d6991d30f5c394b47b11f17f6ce920bb23bea805c5c6772b4a81.exe"C:\Users\Admin\AppData\Local\Temp\8188cfdd4bc2d6991d30f5c394b47b11f17f6ce920bb23bea805c5c6772b4a81.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\B1I52.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\B1I52.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2z9064.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2z9064.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2824 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2824 -s 15564⤵
- Program crash
PID:800
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3D10h.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3D10h.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2792
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4W130F.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4W130F.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Users\Admin\AppData\Local\Temp\1003963001\665.exe"C:\Users\Admin\AppData\Local\Temp\1003963001\665.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:640
-
-
C:\Users\Admin\AppData\Local\Temp\1003968001\c48da731ff.exe"C:\Users\Admin\AppData\Local\Temp\1003968001\c48da731ff.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:948 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 948 -s 15885⤵
- Program crash
PID:1944
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 948 -s 15685⤵
- Program crash
PID:3108
-
-
-
C:\Users\Admin\AppData\Local\Temp\1003969001\5e04effc5d.exe"C:\Users\Admin\AppData\Local\Temp\1003969001\5e04effc5d.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2544
-
-
C:\Users\Admin\AppData\Local\Temp\1003970001\3a7d74d402.exe"C:\Users\Admin\AppData\Local\Temp\1003970001\3a7d74d402.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3904
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3732
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1952
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1760
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2740
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking5⤵
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking6⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2072 -parentBuildID 20240401114208 -prefsHandle 1996 -prefMapHandle 1988 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {bba00861-a78d-4266-9088-6605b7154cab} 4296 "\\.\pipe\gecko-crash-server-pipe.4296" gpu7⤵PID:4672
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2496 -parentBuildID 20240401114208 -prefsHandle 2472 -prefMapHandle 2468 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {afdd41ca-78bf-4817-b916-281d07ea0aac} 4296 "\\.\pipe\gecko-crash-server-pipe.4296" socket7⤵PID:3612
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3372 -childID 1 -isForBrowser -prefsHandle 3448 -prefMapHandle 3120 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e91f71df-3878-422e-8f0e-3a74b2996c11} 4296 "\\.\pipe\gecko-crash-server-pipe.4296" tab7⤵PID:2388
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2736 -childID 2 -isForBrowser -prefsHandle 3716 -prefMapHandle 3712 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7a76fb4b-78df-4a74-9597-4676a680ff4b} 4296 "\\.\pipe\gecko-crash-server-pipe.4296" tab7⤵PID:4528
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4636 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4632 -prefMapHandle 4620 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c61a0704-e286-4d54-b5d3-d2e0c582f2ab} 4296 "\\.\pipe\gecko-crash-server-pipe.4296" utility7⤵
- Checks processor information in registry
PID:6712
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5448 -childID 3 -isForBrowser -prefsHandle 5464 -prefMapHandle 5456 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d3c73953-8e96-433a-98fe-b87bd41be429} 4296 "\\.\pipe\gecko-crash-server-pipe.4296" tab7⤵PID:5508
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5624 -childID 4 -isForBrowser -prefsHandle 5632 -prefMapHandle 5636 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {78122b9c-76bf-4fe8-ad3e-c79048d28993} 4296 "\\.\pipe\gecko-crash-server-pipe.4296" tab7⤵PID:5548
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5840 -childID 5 -isForBrowser -prefsHandle 5916 -prefMapHandle 5912 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {69dca497-bd16-4d5e-9be8-f0410deba497} 4296 "\\.\pipe\gecko-crash-server-pipe.4296" tab7⤵PID:5564
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1003971001\da808ded96.exe"C:\Users\Admin\AppData\Local\Temp\1003971001\da808ded96.exe"4⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:7036
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2824 -ip 28241⤵PID:2504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 2824 -ip 28241⤵PID:1120
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 948 -ip 9481⤵PID:3268
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 948 -ip 9481⤵PID:4112
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3492
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5720
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6596
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\activity-stream.discovery_stream.json
Filesize18KB
MD5ff5c0a0ec537111c3235c007286199c4
SHA1ab35fa671f2ba4c952675bd0d7332fd2d6113d30
SHA2562beb6867b1194d68bc7652e19039dbd98e6ccee4a790c9b907e79298a2a7b575
SHA51239f4d321654f7166068b512d0125d72ff77b5af704ad20a1fa1a0a3f5b477814de60418fd7af5186af72510d4c9fd4f7981ef0495eacfb3627094695c088c563
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\cache2\entries\D500AD994A7515157BB2A6ADD5B18B754E4D2F99
Filesize13KB
MD5bf4110e73c15cc6a0679a65f48ad0707
SHA131b5a8c93fe16995a4119d0df1b59394cc299bb3
SHA25657fd481a974cc9ae274c76608a11c659c6b14fa447e41f262a5e2540cd0365df
SHA512cebbc4058e9729148f18c74f35cdd541ac4daf4018456a97dbf6b45673b6124ad74c9d0da8d9cf6973db4d070269e21272504410c5d602e5963d37b3aaec0ab2
-
Filesize
2.9MB
MD558dc151d5fc1a239fc75c9a19e5ecbcf
SHA182637b80d03a477b5bfb793f97093a4e77eae259
SHA256cbc893e5989abb593668abceddfd5ee021bc47475aadcf0f17a77e279bfe861f
SHA51242470db72278a9422fcde594d00a37a719fb3144e5988ec31139a83a9c9cf361c4c78771e7363d5d6c538c202e7ad5ea4bf714d9081bd0d4d7e3635189cf3721
-
Filesize
2.9MB
MD58d999adf1925470a0c1cb14302416dda
SHA1d38705d99bcd9470f95ba3835f220653a8817439
SHA25628d49fd106080aadfac205f4461b7afaf79e43af59d05613a4f78a03b4bc0d53
SHA5129ee097a1fb56bb0120a0aa095bdf761e5fccce6dd765c1a53a6f497c6abd14aaef98b17debc5346c1c5f1704e5ed972c861704ff614e753bd06665db6760c328
-
Filesize
2.0MB
MD5dd5d490f1451d01bfc3ab1f2dec6e62f
SHA176b00533da1537cbea76d48a8d94ed0515d5a11d
SHA2562beffec571dce2052e563a0651424ac2a4be219dc068a283e5904a4ce767cdc0
SHA512053dba255ef0802130241416e85fe07ab4445739d5e75a7f65fc6e3d94c6b8881c7fb2b5560cfa35504540d9e75c65a221291ca5efe9ebf48e40580ce95c8d7d
-
Filesize
898KB
MD5c40a431e9148be221e97e1041384e4f8
SHA15b6d4a6b670116c9644f050b5f59c8da6438f479
SHA2560cb3fdee7cbee9cab55d63a755a04513c2bf2e98f6e4863b13d8300a9975e046
SHA51254ba58c46625e24ee4fc0a11b902fdbe06d1e2ec317292f8cf7504168264a3d621e9f68e5136d6a58c76bd90847bdacf671cb0600ffcf1d7fab96bacd60f1017
-
Filesize
2.7MB
MD544f2a19d558f87d2ad13248097e8efc5
SHA12dfb7112a808a1f0006164aa646e2ee66c17d31c
SHA2560c53329caa20f66d8126c2dd37e455689b36a4f3c29f0a5435b350337d6b32c0
SHA512470ec29041351cbfa70bcdc9505a9736fb9f595bc0c4133b89e4b8bc4adfffb145b991aabab8c25f9616e0a9398a15573832da235348480e5188821b9736f1c7
-
Filesize
3.1MB
MD540d0a9a302cafa04a16c25948c5d1743
SHA1cd881baf15f4997516531c568dd4e780b25678bc
SHA25621527060aa825602cce291ed6a371dd7eaeeec36a006dc2ce45533e3dbfec2e4
SHA5120ced8896299e0751570e5f5f790177d80f525c0dd7340f1ef56d4b82f9b974fe0e3de0d7e6fddf5a4a9981b2f55c5811b02791db74a2795ae071bd9220d64a9c
-
Filesize
3.7MB
MD54f224df3452b9c1c68797ea6f8936fb0
SHA150d3aaa6dd399be3fd92f2e570631e2300daf792
SHA2560dede2dac7382f688c0dccc9cc8bc63207f751489f8c59833f3b8499e05e3c0d
SHA512078431d221440c81888c240a652c58e9337afbb2ac9729897a566b6ace3baf5930f6a80ec97d353d61f0a0d8535a180b4f6535fcfb75893658af5d40c73d97da
-
Filesize
2.8MB
MD53ecd18933647e380909e891891dc9b2d
SHA14cde594108e341c829fae17b0b2517c1d797488e
SHA256541ca863e7eaaf20781b0ad6a049d34ccf41da106598f29a0f61239251e6965e
SHA512fccf8ec7d6fe215305b54e3e179e20a5bb3a06891f5873b4e7942162aa9a763f8cc8c23debc9767a9ebada3ca0aac7895f4ed62f3641d5617362b8e80d877c9e
-
Filesize
2.0MB
MD52a29388bf33283298f9e7627e8949930
SHA1d0344a99409a59964592060d1741432f063e7ff0
SHA25646a4affbb44bdc5c43f6656123e4d886112e2b46479d08fc59751bef5f4c2da5
SHA512e3afe5d0cc172853600d6f54817623c85a4ce41809a515a90d62085e7a693868eeb215f2e0fb055f45b0cbddb733679d61d24bb77e5b750c012dcaf6d4451a29
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\AlternateServices.bin
Filesize11KB
MD5c63b6faa08335fd7d6abae404dff5f7f
SHA191c3051f5082da27ba9c1dcf2ac06f0a3bd1d84c
SHA256ba5e0f68bc4e68b2f7cea226b731acdb9aad46d3a42119647259a2daf1863e57
SHA512e54550e019cd7f47012ad98f33908e5494a707634332d850b76114af857137a9e89acd50725f4a0fb2f0cbd1295f093bdcc3e32dc300b93e008f845d20472bbe
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.bin
Filesize23KB
MD56fba415405624be629db02cbe020da01
SHA1f08166d79690bb804d2386bcc1d23f9d35721b6b
SHA256e96d4827112ea35f6524e042e4c5ece4e13c5b1640a79318be7d334acdfc5125
SHA512a902c80c72fe9da11dc9bced61ebb53d48b22f1576abdbf6050987c28d1040f5d9752055b93b4e312234e864bd0ee3b031855c8c56e280991acab86a3f91b822
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.bin
Filesize5KB
MD5a53164a69f0e43b3b83f08ebbc184b3f
SHA19ec44c7c9b055e7f59e4e0c27f8bf8f3b9d3daf1
SHA256074333d1b6e93cba94dd64d29a69b7172bae39784b68da9b06336138c40cb3a0
SHA512503f8d017676251c47629418e982cef4b9f30d950a401970e2db626d7c00cbbff426cfaf4a0cfbb93a01c70b7a9ec9de4eee6aea5dfdd1c763258f7c12088ee5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.bin
Filesize15KB
MD5f7872f0fd9cbd460c449543481f40cad
SHA1b78e729107a5fa98febd86881eb1521d4c6bbf40
SHA256a5148c59446f7ca7528c15e5e37e1ce9a1a54cfd51056452494bd8c366383f17
SHA512a5da3163dd880626dee7d74eda0ba2f1e2a0ef9f0bfd825f84ff35d1b153b32993d02ca9ff15151650a228851ebbf9fe9a79c688bbc3b307c6960ee654514169
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5c843b2e0be3ce916a1739e55815c3eb6
SHA1154a3a36a69ed70aa577ae55ed2962b27e45af33
SHA256fc661c618d56d88f7d46443e685b5f572d81e124b65929c33abc4f60ea98049c
SHA512aaf240b2126dc94ea28a9ccf56946e20441907d06de2223292206236fe243e71c379925f22451d048b8fd55b624271b4748c5b46b8cc454eae3fc224bdc86ddc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5c38d9a724ecbdfe96fa1483a77ded510
SHA1d69ebfac65ed3e6f0c27fa392d1e28374dc4797f
SHA2567a8b9158afc03c804e989e88f2d7eac778ac345780c442aac22a28dce6801126
SHA512a822bd338c2b52e5f866c338a1f822677fc2768e56cd65f3087327c2cee4da8ca2116e7348e04f1f62d3ad87160d2f4faca3528f30860625cbab8cc841f12c85
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5e0ed7fce8dc7952106470ffada9c5200
SHA13f2680a217806e63f5c0aebc90cab1f52e630c17
SHA256e4651fec0661c1c2c44e90d05f58e572019d9a0e918c8d16f87597f3b016e20a
SHA5127c59ce3946a6f766a2f28535ef7aba9d140067bdd3931a5b8d9b3d04a5ac717cdd9acf970f35a5414a075ab36b4185920f0e99db36cb0eab99e018b8646bca9f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD531dc9d7a37eac0a7b04e2692ce5a8b00
SHA1803bec79aeed85ae955e3deedb0d50ed276ac4fe
SHA2564abc99b5454a23024a8580713c3bd235d8c27930f2559cc2e62593cdfd0d3d21
SHA512da9526aa4e2613264af7a22c3c61f362a45ec56a1dda3637061c6e6b832ac23c51abc9bbd9595f1ae9da23976dcd6b1a7bde03c0851f0a4b11f5eb18024c1586
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD595b0c5a6314f5889cdfe4b96c7078237
SHA12e2f23e12a4326c4b53fc8f686cfc4759f5216e2
SHA25635f34248b87d2d8154f08f1c8ff40be11fe9c23dd392e6f1a038b1f441f459b4
SHA512838171b4bc714ccf290b58317b060e028a499422b33354f87fdacd881beef116a491b8d953ec6dcb83fd37a7f26a7216c4e4a6e80082b9444c0963a08c405bba
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5306bfd9fafa7393acd89ee4d7ffffab8
SHA11d53fb21a7c703457907673271a6e8fb8ee82372
SHA25611d211080a7168573a61d3f859df02536fbbd3fd0a617b0956d87adedbd30c06
SHA51209875cd57ec0c81bc53e4dee1694b3a5c182f4d1e8019bd9c3fef5c15ba690736eb8a913780cb812930906df45ceb8413633741c7193fdfb6ed4dd8248af6828
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\683bb305-d16f-4af4-8d2f-1850f7c695b1
Filesize28KB
MD54460da4467aad4095dea92fb40119c47
SHA14048a84e630db57f2da293f4ef896d7f32ee27a9
SHA2562782e837c1157f7895010c14a74611143879aed669c6c5c42f6f8e076a3cba4e
SHA512c342754787d5126bdd409dd45d80da633c25a80fd52c47ca6f9ea441c106703e6815d25122386698588ac19fcff879e59ccff69650c7d04aad69ed660056bda9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\9085101a-c4a2-4da9-9ea4-7471038f29d5
Filesize671B
MD569df3ce78c07e64b6f46bd82fc223dec
SHA1347dccf929b819e7cb5cc03ca644a88c6b932e8d
SHA256fef7c79103625db11eaceb599200a3bc1862af18e3f946d3301fb367fc563535
SHA5127e7845e908edbf30baa654d34e5e22a293cd777419b118ad59382c0bdc36d8ab6be0d07a586776e56d4aa42d2760595c100324ca4fb45935562a08dc46b7585a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\f890f688-db18-43ed-86d1-f8bf234e3755
Filesize982B
MD50c992a426d366f2573b6873f439ba918
SHA1f8e71fd21511512c1488cd81cc0a46a71f47486e
SHA2563e37cfbd85424ced4f620a8c474f74362c2146e2439c5b096d5140625d5372d2
SHA5128603dbbbcef9b8c71391f79dc4ea3d2581922ba0372cddd6dbba6f095de48888d6cd59ef14e582bba5093701a02a41427654d39eb7ca8ce17cff0b0bf4f36481
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD552cda57453deca1353f9a1986d8814af
SHA188415da064358f3a6670c7edacee6433eb62045e
SHA256e194601d2eb5ba56edb94ad12c3adf6ca163d36949a50968f73f5c78a4d45cbf
SHA512e2cfe3947c5e68d40fd30739d2b78fafe9af5e2b2877a84785686ff66c642d1ed1dcf20d83acd6db13e8389fdce7fa03a3ad95235f611a0b6197a1c77054e1f8
-
Filesize
12KB
MD5e7708684052babdbe01ecefb258ed7bb
SHA161469f134dde5ceda3e170286091254d9e89139a
SHA256b9b5fdf383e64f642eb689c865e5314adabe565bc17d9e9454da625f52cfddad
SHA512161eb276ead79b8d84183a12745c182a00a3dd92a70f75c9dd8d4b0334215ae6d06f821f4e3ad983024255b8ed377b958b18a3292211e1bbcf70a6b788dd5560
-
Filesize
15KB
MD53605131c8db83c957ec3bb28b6489592
SHA103d6cca051e804468bd4a0ffc0db6d1288c0d2af
SHA2566c7140c0755b4f22043fc49c5de42309b0865dd661876b52c3ab8e2be9faaf5e
SHA512262e0ab2e448d172d207ff67a4b54fdabf8d4a0504334d348bddaae6f9706c857381b6e22610094a990151bff389634f47ca2a88694102348d3ad14a923ebdaa
-
Filesize
10KB
MD52a334eb34de3a3cbdb0f2c97f6550b76
SHA17971501679bd1bc37c44923075898e93ba8adba4
SHA256ac52b9fac67216b9897f6439cc8954c080b5d7c10e098e9201597193c2ca9356
SHA5120b718279629c6f01c297c5b24d42a5ca9491eba223109c4a755ac1598e971893040aa78315563270b8ce5b1c20c11c215eb5103de262799031e526fef00baf16
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize2.2MB
MD55cac4f27236f46ccc4c0173e93503890
SHA10d06441cd5e4b2f8be9eb4f48ec9bbbace678310
SHA256136c82bcd330bf459d6d271d86c5307d6d28ba8bb1d653bc7ae04e45cbb744ca
SHA512f139f8122c4b25a9282bfa1cc199a7b6f1071c3d076198a54a82898264901267b82cb8bebb37afa295ad7bb35bcf845b953897eff3143cac776ad0925b231249