Analysis
-
max time kernel
140s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 23:33
Static task
static1
General
-
Target
8188cfdd4bc2d6991d30f5c394b47b11f17f6ce920bb23bea805c5c6772b4a81.exe
-
Size
5.5MB
-
MD5
6ad27ed41e83e1276426abc7852a7b1a
-
SHA1
8cf45789d1717fbd0d3fa56a5181d3a76616c0c5
-
SHA256
8188cfdd4bc2d6991d30f5c394b47b11f17f6ce920bb23bea805c5c6772b4a81
-
SHA512
f6c55476a68e9c798eaa7f0b942c4f133f10d5764843327c7ec79dc2011fc32404ebe18c2041d9a5c6ed1641e66d59aff91505ec0d6949fa0d5ad512c2a2374b
-
SSDEEP
98304:GbSkC2TwlvmZeLaYOPKs/e3f0Vrr068IWK/WAWffeivlwNSD9JrKys:Q3C2Tw2eLVqKs2MRwdfcWXei9wirKys
Malware Config
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://founpiuer.store/api
https://bringlanejk.site/api
https://moeventmynz.site/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 0a6ff09215.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 0a6ff09215.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 0a6ff09215.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 0a6ff09215.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 0a6ff09215.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 0a6ff09215.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3D10h.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 665.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0047e88dac.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0a6ff09215.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2z9064.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d06c8dd7f5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4W130F.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 22 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2z9064.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2z9064.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 665.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0047e88dac.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d06c8dd7f5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0a6ff09215.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3D10h.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 665.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0047e88dac.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0a6ff09215.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3D10h.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4W130F.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4W130F.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d06c8dd7f5.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 4W130F.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 13 IoCs
pid Process 1840 B1I52.exe 5040 2z9064.exe 2388 3D10h.exe 2376 4W130F.exe 388 skotes.exe 4044 665.exe 4624 skotes.exe 4124 0047e88dac.exe 2128 d06c8dd7f5.exe 4240 704ad3efd2.exe 5240 0a6ff09215.exe 6636 skotes.exe 6324 skotes.exe -
Identifies Wine through registry keys 2 TTPs 11 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 3D10h.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 665.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 0047e88dac.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine d06c8dd7f5.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 2z9064.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 0a6ff09215.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 4W130F.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 0a6ff09215.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 0a6ff09215.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\704ad3efd2.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1003970001\\704ad3efd2.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\0a6ff09215.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1003971001\\0a6ff09215.exe" skotes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8188cfdd4bc2d6991d30f5c394b47b11f17f6ce920bb23bea805c5c6772b4a81.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" B1I52.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\0047e88dac.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1003968001\\0047e88dac.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\d06c8dd7f5.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1003969001\\d06c8dd7f5.exe" skotes.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000a000000023cdf-104.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
pid Process 5040 2z9064.exe 2388 3D10h.exe 2376 4W130F.exe 388 skotes.exe 4044 665.exe 4624 skotes.exe 4124 0047e88dac.exe 2128 d06c8dd7f5.exe 5240 0a6ff09215.exe 6636 skotes.exe 6324 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 4W130F.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 3336 5040 WerFault.exe 87 556 4124 WerFault.exe 111 1848 4124 WerFault.exe 111 -
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0a6ff09215.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8188cfdd4bc2d6991d30f5c394b47b11f17f6ce920bb23bea805c5c6772b4a81.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language B1I52.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0047e88dac.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 665.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2z9064.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4W130F.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d06c8dd7f5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3D10h.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 704ad3efd2.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 2960 taskkill.exe 3336 taskkill.exe 2248 taskkill.exe 1596 taskkill.exe 4908 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 5040 2z9064.exe 5040 2z9064.exe 2388 3D10h.exe 2388 3D10h.exe 2376 4W130F.exe 2376 4W130F.exe 388 skotes.exe 388 skotes.exe 4044 665.exe 4044 665.exe 4624 skotes.exe 4624 skotes.exe 4124 0047e88dac.exe 4124 0047e88dac.exe 2128 d06c8dd7f5.exe 2128 d06c8dd7f5.exe 4240 704ad3efd2.exe 4240 704ad3efd2.exe 5240 0a6ff09215.exe 5240 0a6ff09215.exe 4240 704ad3efd2.exe 4240 704ad3efd2.exe 5240 0a6ff09215.exe 5240 0a6ff09215.exe 5240 0a6ff09215.exe 6636 skotes.exe 6636 skotes.exe 6324 skotes.exe 6324 skotes.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 2960 taskkill.exe Token: SeDebugPrivilege 3336 taskkill.exe Token: SeDebugPrivilege 2248 taskkill.exe Token: SeDebugPrivilege 1596 taskkill.exe Token: SeDebugPrivilege 4908 taskkill.exe Token: SeDebugPrivilege 3528 firefox.exe Token: SeDebugPrivilege 3528 firefox.exe Token: SeDebugPrivilege 5240 0a6ff09215.exe -
Suspicious use of FindShellTrayWindow 32 IoCs
pid Process 2376 4W130F.exe 4240 704ad3efd2.exe 4240 704ad3efd2.exe 4240 704ad3efd2.exe 4240 704ad3efd2.exe 4240 704ad3efd2.exe 4240 704ad3efd2.exe 4240 704ad3efd2.exe 3528 firefox.exe 3528 firefox.exe 3528 firefox.exe 3528 firefox.exe 3528 firefox.exe 3528 firefox.exe 3528 firefox.exe 3528 firefox.exe 3528 firefox.exe 3528 firefox.exe 3528 firefox.exe 3528 firefox.exe 3528 firefox.exe 3528 firefox.exe 3528 firefox.exe 3528 firefox.exe 3528 firefox.exe 3528 firefox.exe 3528 firefox.exe 3528 firefox.exe 3528 firefox.exe 4240 704ad3efd2.exe 4240 704ad3efd2.exe 4240 704ad3efd2.exe -
Suspicious use of SendNotifyMessage 30 IoCs
pid Process 4240 704ad3efd2.exe 4240 704ad3efd2.exe 4240 704ad3efd2.exe 4240 704ad3efd2.exe 4240 704ad3efd2.exe 4240 704ad3efd2.exe 4240 704ad3efd2.exe 3528 firefox.exe 3528 firefox.exe 3528 firefox.exe 3528 firefox.exe 3528 firefox.exe 3528 firefox.exe 3528 firefox.exe 3528 firefox.exe 3528 firefox.exe 3528 firefox.exe 3528 firefox.exe 3528 firefox.exe 3528 firefox.exe 3528 firefox.exe 3528 firefox.exe 3528 firefox.exe 3528 firefox.exe 3528 firefox.exe 3528 firefox.exe 3528 firefox.exe 4240 704ad3efd2.exe 4240 704ad3efd2.exe 4240 704ad3efd2.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3528 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4336 wrote to memory of 1840 4336 8188cfdd4bc2d6991d30f5c394b47b11f17f6ce920bb23bea805c5c6772b4a81.exe 86 PID 4336 wrote to memory of 1840 4336 8188cfdd4bc2d6991d30f5c394b47b11f17f6ce920bb23bea805c5c6772b4a81.exe 86 PID 4336 wrote to memory of 1840 4336 8188cfdd4bc2d6991d30f5c394b47b11f17f6ce920bb23bea805c5c6772b4a81.exe 86 PID 1840 wrote to memory of 5040 1840 B1I52.exe 87 PID 1840 wrote to memory of 5040 1840 B1I52.exe 87 PID 1840 wrote to memory of 5040 1840 B1I52.exe 87 PID 1840 wrote to memory of 2388 1840 B1I52.exe 99 PID 1840 wrote to memory of 2388 1840 B1I52.exe 99 PID 1840 wrote to memory of 2388 1840 B1I52.exe 99 PID 4336 wrote to memory of 2376 4336 8188cfdd4bc2d6991d30f5c394b47b11f17f6ce920bb23bea805c5c6772b4a81.exe 102 PID 4336 wrote to memory of 2376 4336 8188cfdd4bc2d6991d30f5c394b47b11f17f6ce920bb23bea805c5c6772b4a81.exe 102 PID 4336 wrote to memory of 2376 4336 8188cfdd4bc2d6991d30f5c394b47b11f17f6ce920bb23bea805c5c6772b4a81.exe 102 PID 2376 wrote to memory of 388 2376 4W130F.exe 103 PID 2376 wrote to memory of 388 2376 4W130F.exe 103 PID 2376 wrote to memory of 388 2376 4W130F.exe 103 PID 388 wrote to memory of 4044 388 skotes.exe 108 PID 388 wrote to memory of 4044 388 skotes.exe 108 PID 388 wrote to memory of 4044 388 skotes.exe 108 PID 388 wrote to memory of 4124 388 skotes.exe 111 PID 388 wrote to memory of 4124 388 skotes.exe 111 PID 388 wrote to memory of 4124 388 skotes.exe 111 PID 388 wrote to memory of 2128 388 skotes.exe 117 PID 388 wrote to memory of 2128 388 skotes.exe 117 PID 388 wrote to memory of 2128 388 skotes.exe 117 PID 388 wrote to memory of 4240 388 skotes.exe 118 PID 388 wrote to memory of 4240 388 skotes.exe 118 PID 388 wrote to memory of 4240 388 skotes.exe 118 PID 4240 wrote to memory of 2960 4240 704ad3efd2.exe 119 PID 4240 wrote to memory of 2960 4240 704ad3efd2.exe 119 PID 4240 wrote to memory of 2960 4240 704ad3efd2.exe 119 PID 4240 wrote to memory of 3336 4240 704ad3efd2.exe 123 PID 4240 wrote to memory of 3336 4240 704ad3efd2.exe 123 PID 4240 wrote to memory of 3336 4240 704ad3efd2.exe 123 PID 4240 wrote to memory of 2248 4240 704ad3efd2.exe 125 PID 4240 wrote to memory of 2248 4240 704ad3efd2.exe 125 PID 4240 wrote to memory of 2248 4240 704ad3efd2.exe 125 PID 4240 wrote to memory of 1596 4240 704ad3efd2.exe 127 PID 4240 wrote to memory of 1596 4240 704ad3efd2.exe 127 PID 4240 wrote to memory of 1596 4240 704ad3efd2.exe 127 PID 4240 wrote to memory of 4908 4240 704ad3efd2.exe 129 PID 4240 wrote to memory of 4908 4240 704ad3efd2.exe 129 PID 4240 wrote to memory of 4908 4240 704ad3efd2.exe 129 PID 4240 wrote to memory of 832 4240 704ad3efd2.exe 131 PID 4240 wrote to memory of 832 4240 704ad3efd2.exe 131 PID 832 wrote to memory of 3528 832 firefox.exe 132 PID 832 wrote to memory of 3528 832 firefox.exe 132 PID 832 wrote to memory of 3528 832 firefox.exe 132 PID 832 wrote to memory of 3528 832 firefox.exe 132 PID 832 wrote to memory of 3528 832 firefox.exe 132 PID 832 wrote to memory of 3528 832 firefox.exe 132 PID 832 wrote to memory of 3528 832 firefox.exe 132 PID 832 wrote to memory of 3528 832 firefox.exe 132 PID 832 wrote to memory of 3528 832 firefox.exe 132 PID 832 wrote to memory of 3528 832 firefox.exe 132 PID 832 wrote to memory of 3528 832 firefox.exe 132 PID 3528 wrote to memory of 1792 3528 firefox.exe 133 PID 3528 wrote to memory of 1792 3528 firefox.exe 133 PID 3528 wrote to memory of 1792 3528 firefox.exe 133 PID 3528 wrote to memory of 1792 3528 firefox.exe 133 PID 3528 wrote to memory of 1792 3528 firefox.exe 133 PID 3528 wrote to memory of 1792 3528 firefox.exe 133 PID 3528 wrote to memory of 1792 3528 firefox.exe 133 PID 3528 wrote to memory of 1792 3528 firefox.exe 133 PID 3528 wrote to memory of 1792 3528 firefox.exe 133 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\8188cfdd4bc2d6991d30f5c394b47b11f17f6ce920bb23bea805c5c6772b4a81.exe"C:\Users\Admin\AppData\Local\Temp\8188cfdd4bc2d6991d30f5c394b47b11f17f6ce920bb23bea805c5c6772b4a81.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\B1I52.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\B1I52.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2z9064.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2z9064.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5040 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5040 -s 16284⤵
- Program crash
PID:3336
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3D10h.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3D10h.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2388
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4W130F.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4W130F.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Users\Admin\AppData\Local\Temp\1003963001\665.exe"C:\Users\Admin\AppData\Local\Temp\1003963001\665.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4044
-
-
C:\Users\Admin\AppData\Local\Temp\1003968001\0047e88dac.exe"C:\Users\Admin\AppData\Local\Temp\1003968001\0047e88dac.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4124 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4124 -s 15725⤵
- Program crash
PID:556
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4124 -s 16245⤵
- Program crash
PID:1848
-
-
-
C:\Users\Admin\AppData\Local\Temp\1003969001\d06c8dd7f5.exe"C:\Users\Admin\AppData\Local\Temp\1003969001\d06c8dd7f5.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2128
-
-
C:\Users\Admin\AppData\Local\Temp\1003970001\704ad3efd2.exe"C:\Users\Admin\AppData\Local\Temp\1003970001\704ad3efd2.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2960
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3336
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2248
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1596
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4908
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking5⤵
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking6⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2076 -parentBuildID 20240401114208 -prefsHandle 2000 -prefMapHandle 1992 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {de2f6e42-77bd-4361-be98-bc8168c58773} 3528 "\\.\pipe\gecko-crash-server-pipe.3528" gpu7⤵PID:1792
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2508 -parentBuildID 20240401114208 -prefsHandle 2500 -prefMapHandle 2496 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e7989c26-1e38-43b4-ade7-a36b1e38a319} 3528 "\\.\pipe\gecko-crash-server-pipe.3528" socket7⤵PID:4184
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3040 -childID 1 -isForBrowser -prefsHandle 3052 -prefMapHandle 3212 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1348 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6b85b948-9e09-41f9-ab23-e901358f9322} 3528 "\\.\pipe\gecko-crash-server-pipe.3528" tab7⤵PID:4484
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3508 -childID 2 -isForBrowser -prefsHandle 3600 -prefMapHandle 2760 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1348 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {eb2a5f48-5ab9-4dd2-aff6-16b380aa4d4c} 3528 "\\.\pipe\gecko-crash-server-pipe.3528" tab7⤵PID:4692
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4488 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4496 -prefMapHandle 4448 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {49d52d4f-706d-43aa-9231-3dd00f9beec8} 3528 "\\.\pipe\gecko-crash-server-pipe.3528" utility7⤵
- Checks processor information in registry
PID:5352
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5584 -childID 3 -isForBrowser -prefsHandle 5524 -prefMapHandle 5508 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1348 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {645e6acd-eba3-4a47-a689-8e9157e4d496} 3528 "\\.\pipe\gecko-crash-server-pipe.3528" tab7⤵PID:5680
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5744 -childID 4 -isForBrowser -prefsHandle 5752 -prefMapHandle 5756 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1348 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5f3c6c27-e016-4e29-b10c-be1040da9e42} 3528 "\\.\pipe\gecko-crash-server-pipe.3528" tab7⤵PID:5692
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5960 -childID 5 -isForBrowser -prefsHandle 5964 -prefMapHandle 5972 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1348 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {037d66e0-023c-4114-9adc-f59a277f0e4a} 3528 "\\.\pipe\gecko-crash-server-pipe.3528" tab7⤵PID:5708
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1003971001\0a6ff09215.exe"C:\Users\Admin\AppData\Local\Temp\1003971001\0a6ff09215.exe"4⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5240
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5040 -ip 50401⤵PID:1184
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4624
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4124 -ip 41241⤵PID:3164
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4124 -ip 41241⤵PID:1424
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6636
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6324
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ws2kncw.default-release\activity-stream.discovery_stream.json
Filesize18KB
MD52c01a49a6f2b4564576d7d19e7ae3c80
SHA1830b157e4566c85afa893d762054eccb64f36dff
SHA256671a58f7b7ce0187c37665ece47920529e873cf1a9f2ca1cb38ecca8a67a79f2
SHA512ad290e9a91ada89fd6f5103936c6638865b494f62d5fb23783f0c400940d9086c75d0e2eb58b372c4fdd12492e8d21930a8a69817e1e0e94fb7b5f620f7ebb66
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ws2kncw.default-release\cache2\entries\D500AD994A7515157BB2A6ADD5B18B754E4D2F99
Filesize13KB
MD505b35dfafa46d698044da4532f303d77
SHA113cc1ef19c39d8828a643e5344f7900d5906d61b
SHA2564b46fcc8477cd7c7834e25c3ca18ac520ca64abdb546125bec51bda500180ab8
SHA5121a07650c4eed7cc09de52f44eafd5a3d8a10452084089db53818a7eed2e02727f9157a698832020979651707cebfa050998fdfe77926b420c8b8ff17c62d291f
-
Filesize
2.9MB
MD558dc151d5fc1a239fc75c9a19e5ecbcf
SHA182637b80d03a477b5bfb793f97093a4e77eae259
SHA256cbc893e5989abb593668abceddfd5ee021bc47475aadcf0f17a77e279bfe861f
SHA51242470db72278a9422fcde594d00a37a719fb3144e5988ec31139a83a9c9cf361c4c78771e7363d5d6c538c202e7ad5ea4bf714d9081bd0d4d7e3635189cf3721
-
Filesize
2.9MB
MD58d999adf1925470a0c1cb14302416dda
SHA1d38705d99bcd9470f95ba3835f220653a8817439
SHA25628d49fd106080aadfac205f4461b7afaf79e43af59d05613a4f78a03b4bc0d53
SHA5129ee097a1fb56bb0120a0aa095bdf761e5fccce6dd765c1a53a6f497c6abd14aaef98b17debc5346c1c5f1704e5ed972c861704ff614e753bd06665db6760c328
-
Filesize
2.0MB
MD5dd5d490f1451d01bfc3ab1f2dec6e62f
SHA176b00533da1537cbea76d48a8d94ed0515d5a11d
SHA2562beffec571dce2052e563a0651424ac2a4be219dc068a283e5904a4ce767cdc0
SHA512053dba255ef0802130241416e85fe07ab4445739d5e75a7f65fc6e3d94c6b8881c7fb2b5560cfa35504540d9e75c65a221291ca5efe9ebf48e40580ce95c8d7d
-
Filesize
898KB
MD5c40a431e9148be221e97e1041384e4f8
SHA15b6d4a6b670116c9644f050b5f59c8da6438f479
SHA2560cb3fdee7cbee9cab55d63a755a04513c2bf2e98f6e4863b13d8300a9975e046
SHA51254ba58c46625e24ee4fc0a11b902fdbe06d1e2ec317292f8cf7504168264a3d621e9f68e5136d6a58c76bd90847bdacf671cb0600ffcf1d7fab96bacd60f1017
-
Filesize
2.7MB
MD544f2a19d558f87d2ad13248097e8efc5
SHA12dfb7112a808a1f0006164aa646e2ee66c17d31c
SHA2560c53329caa20f66d8126c2dd37e455689b36a4f3c29f0a5435b350337d6b32c0
SHA512470ec29041351cbfa70bcdc9505a9736fb9f595bc0c4133b89e4b8bc4adfffb145b991aabab8c25f9616e0a9398a15573832da235348480e5188821b9736f1c7
-
Filesize
3.1MB
MD540d0a9a302cafa04a16c25948c5d1743
SHA1cd881baf15f4997516531c568dd4e780b25678bc
SHA25621527060aa825602cce291ed6a371dd7eaeeec36a006dc2ce45533e3dbfec2e4
SHA5120ced8896299e0751570e5f5f790177d80f525c0dd7340f1ef56d4b82f9b974fe0e3de0d7e6fddf5a4a9981b2f55c5811b02791db74a2795ae071bd9220d64a9c
-
Filesize
3.7MB
MD54f224df3452b9c1c68797ea6f8936fb0
SHA150d3aaa6dd399be3fd92f2e570631e2300daf792
SHA2560dede2dac7382f688c0dccc9cc8bc63207f751489f8c59833f3b8499e05e3c0d
SHA512078431d221440c81888c240a652c58e9337afbb2ac9729897a566b6ace3baf5930f6a80ec97d353d61f0a0d8535a180b4f6535fcfb75893658af5d40c73d97da
-
Filesize
2.8MB
MD53ecd18933647e380909e891891dc9b2d
SHA14cde594108e341c829fae17b0b2517c1d797488e
SHA256541ca863e7eaaf20781b0ad6a049d34ccf41da106598f29a0f61239251e6965e
SHA512fccf8ec7d6fe215305b54e3e179e20a5bb3a06891f5873b4e7942162aa9a763f8cc8c23debc9767a9ebada3ca0aac7895f4ed62f3641d5617362b8e80d877c9e
-
Filesize
2.0MB
MD52a29388bf33283298f9e7627e8949930
SHA1d0344a99409a59964592060d1741432f063e7ff0
SHA25646a4affbb44bdc5c43f6656123e4d886112e2b46479d08fc59751bef5f4c2da5
SHA512e3afe5d0cc172853600d6f54817623c85a4ce41809a515a90d62085e7a693868eeb215f2e0fb055f45b0cbddb733679d61d24bb77e5b750c012dcaf6d4451a29
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin
Filesize8KB
MD541d7eaca08cf1be5f8b875d967bbf029
SHA104dec7a5f75da377a9dca18230de341b07157160
SHA256956596bfb094144fbfbc30f053bb1f7ea2923cc05c58bd314b0d97781d0fdfd1
SHA5120ed7b4f99ecc9f8b4ff6b6400256d01a1928e3f92266027b59eca9ab5c29ed93eb97aa21a3b299667aa3230e107ac4340c0d9ef874a3ef2de32418217ccc9830
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin
Filesize12KB
MD5e67a31c7c466c0eeff6e4f85be15c0c6
SHA1ad019341aeeaeed4c7a69eec5a7e4ff39bb8c7f9
SHA256f57b233122b84ba95c83ec6c8ff00436aa82f8a34b9600980435be577f2edcf1
SHA512ee5facbc71f422cc4041bd40441e7041ba0922612704735714217029c965b6f930022784875e4ac39ad9ca6b720f009d474853527d38fd3539db5b924ff38502
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.bin
Filesize23KB
MD5e0f0849abfc340c9160b3ec4105a6745
SHA12b8e446352702d25e3dd6380b4dc52c74c4f75ce
SHA256ce694b8c1e64b596ff442ada79455768a597afdd9fe7a7037fb393fab4ac00ad
SHA51226a451fbca770438d51abd7ace9243d56fac3ed7b793b63bfa7b8d3dff6ede96363c7da94b69299bd558cc66a638cf9d855c2ed41edc13daa64fdb33ba68009f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.bin
Filesize15KB
MD51335d13c43804549f91242a7a40f5ed0
SHA177ccf9c6bc367bea7fcbc83e0f7341ef0721856f
SHA256b8d111482d6cc2b44c606218157987fa8ef8201af0caeb593bce437e222cbcc2
SHA5127b451999b6134964c5417d05b4465c62765094f3fee8b7568db1eb194d0b378c5170400fb7d265aab0f6811811f1dfaff0d053733b4510f16d3d6666bfa0562c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.bin
Filesize15KB
MD5c76d783eda1ede8a771d85fc3d19639f
SHA1f9a3cdc6ed14201d73852321fe7caef7195ef483
SHA2568a2389cdb51955899d0b01f60b6ed4636f24cba515f6c5abe27c0ae0e713d459
SHA512426b44c5b1e191dcadbdd57fa723114c292a9f0a304bbf98bcaeb470e25f13fd841e3f9153ec84531bd0f4f964ee625a954579c5cee0a016b433f846598db088
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.bin
Filesize6KB
MD583ff1f6ee084d4fa000c0cd6fe6bfc44
SHA1e13f3692d2ed9c8557a2f14f5b1f42922725b5a8
SHA256425b80a5c6ca90ef75504d22fee4a7010fec668a65f7cd2b9a887fab14545d7d
SHA5120df8189e309b70af553c3ae5d4ffaa3982a5bedad13474cf48cf97ea3399853ad803f75a0d44a3ef9934ba677711e44fe9b71e81eb3fb421efe41642388c19b0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5aff9d545f331c6aca2faab023fd3f60e
SHA10974abcf40feb4d8f052996913d292095cc64d09
SHA256083ae82db7c86e407a1a2e40a36dd9399bc564c19cd99cc9f5d83a7a0ec13ffa
SHA512dcefeea66cd839b3dcf61ada689d45f5a3d134f005f2e1e0d190b4297fa6e233b2f8be88370a073234e86049d8bf3dcb892a145c96400595b4b0f55474ccb814
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5cfe4d58433af497b45daa08d4b16b9cc
SHA1a013cf09eacb052270acde04c50ce8bb778de74e
SHA256f3b28f51e57bb9cc4f5b66fce764b1e7e5320e535d91ff9247af13e41810b843
SHA512536ebc7037112ba6f94a4fe371ac344304949f7867caee3980fc2703e4057e23eda07fd8bb846e6550a5c594ba3a3ce8fc9604845214ae42baf3fde7e14c4f11
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD571521927ac7ce6554ba57a8eac62c9dc
SHA1acd017389a819b344fe054ab805bf62d9405b27d
SHA256511e8cffb65db013b4ca66a7a167c078db7dd1951047f6351482abde155748e4
SHA512f248c9304239e607fd31385f300368fa6a32f1bab6ff0b5501cf2f44b117a6215137a106c7f81f0464280913b7d1f9c711c1af17f3206b557e6eb671828f4dec
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5017cd50ab14054e0329d6074d76ea740
SHA1e57a5e39c68694617f329e8c4eaac7e3ca5db9d8
SHA25654e01a253f1c819f1821bc100a75b322cd164724256dfcc4095b2329233c9583
SHA512f557366897c77283a5d2ce6493c1f162c2448c6aa1b0ba317284251202589aa572ffcaa587a2f5ea3a6c22fb15d24954526609b086c1af3144f03c22ae2573dd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\a6541ccc-13e0-46d8-bccd-319d41cce22a
Filesize671B
MD5e889090d0159943bc7f6bef09fb618aa
SHA1807e4934fe86f69808419c015461efe19f497571
SHA25600ba56cb9bc028e5005730839f75632397eb079e41ffa8132cc76b596c4454b2
SHA51260a2635580b87a63e150f1b29be43c5d10b83ce0fa8d1c564e53dafc8e8034d3c50419d0545e327941f229a83a22dba8758d28f9e4bf5d3211f3795ec0f1229d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\ca7e0635-cade-4e86-aabf-20aab0c10823
Filesize28KB
MD511d8f183ed0b40d6ccce3afa4e834764
SHA15a30c451ae08df5831edd7d26a28d8210715859b
SHA2568df5b3878c22708d97f70be0e6b5388d805c7426b6e0200ab9eb2abc2d2a0f69
SHA512c1ad108b1bc24366548bae0c88afeb470d53388b6ce38763ce9a86eed3a9e8a335d866b30fc2455861cdd2b83613d2ade7273927cacb3023ab6cb2bfd573819b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\f0677a36-8bde-48b0-8029-9b23a5c03eb3
Filesize982B
MD5dc9ff444a14fefcdd4639d083a26a484
SHA1882526a5cc4a733a5f8078e3edbd6fd52361ff23
SHA25684c0f874ba6c7017bcc2c7621713864aa5f908a3e171312dc3ca5eb26198ff71
SHA512d0010e0de770c43463c6a1203f43b5e33fb7535686cc7f8338e303b18deda7ec2ea0a492cfa0d7ae91135bc2cd5ab9a04d658f652dbc5b88bf86c1c59a2d978d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD5c595394efa07976eaaff3494613b34dc
SHA166b2f03381ccbced4c2ec4e431d708404e630305
SHA256c64f77f34c56d0fa0f73d5776468d2830bba81bc75ccdf89f209a84ee1ded4c8
SHA512e9f6237a29c8d1f76cff5f24a4585c3a39e803cebc5790129bcc835e6feef833a45acda965c296d74056ffbe720eb4c23a9409b01e85d0b4e140ca3f54911f6d
-
Filesize
12KB
MD5a62fd00134ec16b9a0d71485bad56609
SHA122d3cc6409499d652f3a6ebedf66a4e632ee760f
SHA256ccfa7f255055b83a0326af205405384d204e1d1a7beb2727b8ccf1e50714f462
SHA512981bd028997d02952e15c774bae418101442e0b9e09d66b0de924c2b2d45dbed18e9d9f2b85c3754c32f8bf8099f36325b8d53ec311c04b0b845f13b4641678a
-
Filesize
15KB
MD58389ec6be3ae1e8d7df9fce0e1503644
SHA13d44a94d5e659826b5632e2f41ca8ac77aea7917
SHA2567151244c7459d639a68475f6219536cf257aa8797a2372492f3d86d980c56277
SHA5126f24df31a4e31d880ccf7d7f245284651cd0ed370f5b72fc53e1215e24cbd9b259ffdeb5934446dcb4c6bf61b2b01a64d883f7fa51e5e3607e3f9642e2dbba7f
-
Filesize
11KB
MD5d7ac0fc93030cc514dc5036be75ca780
SHA16bddadbc2664a625e207698f3da21407df7ecafd
SHA256d6720ae7cac83ddb5219c7ce00afe375e0b3c8aa8ebd0218510625437ab74f77
SHA512a5c30009fa6e3bdb53d3c29d82e1214fb59fdbaae5b2c7e3ff7f2229bb89d73cb9335db4813ab321978f61a83c021d296379321973dfb88bd8681ff716526b86
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize1.2MB
MD5a3cee6a746055b2ab9822b766cc96b2c
SHA1138c5b53e5929358f5bd610c636d916c9e09d814
SHA25687f9d9ff7a3777b25fc51d0090d4bee00b090168aa2a97a51bbd6731fa930453
SHA5129e303bef1e79259c41f5b46d4d659209b4e3b13f83937e9096df660e54e429fb8d0d2a746d36d8b264cad3fb121639130b0017d85287f3d8b877cba0fed753c9