Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 10:24
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240708-en
General
-
Target
file.exe
-
Size
3.1MB
-
MD5
b2b571311ce73fae9f03f3c10e894ca7
-
SHA1
6083d27101e3e323c8e25e4dd34ba1e13571bf33
-
SHA256
ac0b68558b6952cba1922a80d3c687c3789909db072e27ac0d0be6e2169f7ac6
-
SHA512
cdf4c6ab60e185cd783f7b5ddedf4d4b8cd6d072c0a07c860b6beff9248a6173d6e5bafd34dc487ffc15fd2f14f1e105d1c8a7fc3bba39b79994b7ffbb143a1d
-
SSDEEP
49152:0FurO4HoMBIKDE+nAepay2Rytdid0Xn7OXyJLn+:+PooMqgvnhOSrOiJLn+
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Extracted
lumma
https://founpiuer.store/api
https://navygenerayk.store/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection fce0578451.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" fce0578451.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" fce0578451.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" fce0578451.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" fce0578451.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" fce0578451.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5d77031a69.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ fce0578451.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6d09ef75b9.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 4704 chrome.exe 4844 chrome.exe 4776 chrome.exe 868 chrome.exe -
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion fce0578451.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6d09ef75b9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6d09ef75b9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5d77031a69.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion fce0578451.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5d77031a69.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation file.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 7 IoCs
pid Process 4428 skotes.exe 4644 6d09ef75b9.exe 1380 5d77031a69.exe 5044 0e75068655.exe 5676 fce0578451.exe 2968 skotes.exe 960 skotes.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 6d09ef75b9.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 5d77031a69.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine fce0578451.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine file.exe -
Loads dropped DLL 1 IoCs
pid Process 1380 5d77031a69.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features fce0578451.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" fce0578451.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\6d09ef75b9.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1003839001\\6d09ef75b9.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5d77031a69.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1003840001\\5d77031a69.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\0e75068655.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1003841001\\0e75068655.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fce0578451.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1003842001\\fce0578451.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000a000000023ba9-95.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 2692 file.exe 4428 skotes.exe 4644 6d09ef75b9.exe 1380 5d77031a69.exe 5676 fce0578451.exe 2968 skotes.exe 960 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 6088 1380 WerFault.exe 100 -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fce0578451.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5d77031a69.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0e75068655.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6d09ef75b9.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 5d77031a69.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 5d77031a69.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Kills process with taskkill 5 IoCs
pid Process 1808 taskkill.exe 3096 taskkill.exe 3412 taskkill.exe 1788 taskkill.exe 2952 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 2692 file.exe 2692 file.exe 4428 skotes.exe 4428 skotes.exe 4644 6d09ef75b9.exe 4644 6d09ef75b9.exe 1380 5d77031a69.exe 1380 5d77031a69.exe 1380 5d77031a69.exe 1380 5d77031a69.exe 1380 5d77031a69.exe 1380 5d77031a69.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 5044 0e75068655.exe 5044 0e75068655.exe 5044 0e75068655.exe 5044 0e75068655.exe 5676 fce0578451.exe 5676 fce0578451.exe 5676 fce0578451.exe 5676 fce0578451.exe 5676 fce0578451.exe 2968 skotes.exe 2968 skotes.exe 960 skotes.exe 960 skotes.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeDebugPrivilege 2952 taskkill.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeDebugPrivilege 1808 taskkill.exe Token: SeDebugPrivilege 3096 taskkill.exe Token: SeDebugPrivilege 3412 taskkill.exe Token: SeDebugPrivilege 1788 taskkill.exe Token: SeDebugPrivilege 4828 firefox.exe Token: SeDebugPrivilege 4828 firefox.exe Token: SeDebugPrivilege 5676 fce0578451.exe Token: SeDebugPrivilege 4828 firefox.exe Token: SeDebugPrivilege 4828 firefox.exe Token: SeDebugPrivilege 4828 firefox.exe -
Suspicious use of FindShellTrayWindow 59 IoCs
pid Process 2692 file.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 5044 0e75068655.exe 5044 0e75068655.exe 5044 0e75068655.exe 5044 0e75068655.exe 5044 0e75068655.exe 5044 0e75068655.exe 5044 0e75068655.exe 4828 firefox.exe 4828 firefox.exe 4828 firefox.exe 4828 firefox.exe 4828 firefox.exe 4828 firefox.exe 4828 firefox.exe 4828 firefox.exe 4828 firefox.exe 4828 firefox.exe 4828 firefox.exe 4828 firefox.exe 4828 firefox.exe 4828 firefox.exe 4828 firefox.exe 4828 firefox.exe 4828 firefox.exe 4828 firefox.exe 4828 firefox.exe 4828 firefox.exe 4828 firefox.exe 5044 0e75068655.exe 5044 0e75068655.exe 5044 0e75068655.exe 5044 0e75068655.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 5044 0e75068655.exe 5044 0e75068655.exe 5044 0e75068655.exe 5044 0e75068655.exe 5044 0e75068655.exe 5044 0e75068655.exe 5044 0e75068655.exe 4828 firefox.exe 4828 firefox.exe 4828 firefox.exe 4828 firefox.exe 4828 firefox.exe 4828 firefox.exe 4828 firefox.exe 4828 firefox.exe 4828 firefox.exe 4828 firefox.exe 4828 firefox.exe 4828 firefox.exe 4828 firefox.exe 4828 firefox.exe 4828 firefox.exe 4828 firefox.exe 4828 firefox.exe 4828 firefox.exe 4828 firefox.exe 4828 firefox.exe 5044 0e75068655.exe 5044 0e75068655.exe 5044 0e75068655.exe 5044 0e75068655.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4828 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2692 wrote to memory of 4428 2692 file.exe 87 PID 2692 wrote to memory of 4428 2692 file.exe 87 PID 2692 wrote to memory of 4428 2692 file.exe 87 PID 4428 wrote to memory of 4644 4428 skotes.exe 95 PID 4428 wrote to memory of 4644 4428 skotes.exe 95 PID 4428 wrote to memory of 4644 4428 skotes.exe 95 PID 4428 wrote to memory of 1380 4428 skotes.exe 100 PID 4428 wrote to memory of 1380 4428 skotes.exe 100 PID 4428 wrote to memory of 1380 4428 skotes.exe 100 PID 1380 wrote to memory of 4844 1380 5d77031a69.exe 101 PID 1380 wrote to memory of 4844 1380 5d77031a69.exe 101 PID 4844 wrote to memory of 4408 4844 chrome.exe 102 PID 4844 wrote to memory of 4408 4844 chrome.exe 102 PID 4844 wrote to memory of 2568 4844 chrome.exe 103 PID 4844 wrote to memory of 2568 4844 chrome.exe 103 PID 4844 wrote to memory of 2568 4844 chrome.exe 103 PID 4844 wrote to memory of 2568 4844 chrome.exe 103 PID 4844 wrote to memory of 2568 4844 chrome.exe 103 PID 4844 wrote to memory of 2568 4844 chrome.exe 103 PID 4844 wrote to memory of 2568 4844 chrome.exe 103 PID 4844 wrote to memory of 2568 4844 chrome.exe 103 PID 4844 wrote to memory of 2568 4844 chrome.exe 103 PID 4844 wrote to memory of 2568 4844 chrome.exe 103 PID 4844 wrote to memory of 2568 4844 chrome.exe 103 PID 4844 wrote to memory of 2568 4844 chrome.exe 103 PID 4844 wrote to memory of 2568 4844 chrome.exe 103 PID 4844 wrote to memory of 2568 4844 chrome.exe 103 PID 4844 wrote to memory of 2568 4844 chrome.exe 103 PID 4844 wrote to memory of 2568 4844 chrome.exe 103 PID 4844 wrote to memory of 2568 4844 chrome.exe 103 PID 4844 wrote to memory of 2568 4844 chrome.exe 103 PID 4844 wrote to memory of 2568 4844 chrome.exe 103 PID 4844 wrote to memory of 2568 4844 chrome.exe 103 PID 4844 wrote to memory of 2568 4844 chrome.exe 103 PID 4844 wrote to memory of 2568 4844 chrome.exe 103 PID 4844 wrote to memory of 2568 4844 chrome.exe 103 PID 4844 wrote to memory of 2568 4844 chrome.exe 103 PID 4844 wrote to memory of 2568 4844 chrome.exe 103 PID 4844 wrote to memory of 2568 4844 chrome.exe 103 PID 4844 wrote to memory of 2568 4844 chrome.exe 103 PID 4844 wrote to memory of 2568 4844 chrome.exe 103 PID 4844 wrote to memory of 2568 4844 chrome.exe 103 PID 4844 wrote to memory of 2568 4844 chrome.exe 103 PID 4844 wrote to memory of 4368 4844 chrome.exe 104 PID 4844 wrote to memory of 4368 4844 chrome.exe 104 PID 4844 wrote to memory of 3920 4844 chrome.exe 105 PID 4844 wrote to memory of 3920 4844 chrome.exe 105 PID 4844 wrote to memory of 3920 4844 chrome.exe 105 PID 4844 wrote to memory of 3920 4844 chrome.exe 105 PID 4844 wrote to memory of 3920 4844 chrome.exe 105 PID 4844 wrote to memory of 3920 4844 chrome.exe 105 PID 4844 wrote to memory of 3920 4844 chrome.exe 105 PID 4844 wrote to memory of 3920 4844 chrome.exe 105 PID 4844 wrote to memory of 3920 4844 chrome.exe 105 PID 4844 wrote to memory of 3920 4844 chrome.exe 105 PID 4844 wrote to memory of 3920 4844 chrome.exe 105 PID 4844 wrote to memory of 3920 4844 chrome.exe 105 PID 4844 wrote to memory of 3920 4844 chrome.exe 105 PID 4844 wrote to memory of 3920 4844 chrome.exe 105 PID 4844 wrote to memory of 3920 4844 chrome.exe 105 PID 4844 wrote to memory of 3920 4844 chrome.exe 105 PID 4844 wrote to memory of 3920 4844 chrome.exe 105 PID 4844 wrote to memory of 3920 4844 chrome.exe 105 PID 4844 wrote to memory of 3920 4844 chrome.exe 105 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Users\Admin\AppData\Local\Temp\1003839001\6d09ef75b9.exe"C:\Users\Admin\AppData\Local\Temp\1003839001\6d09ef75b9.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4644
-
-
C:\Users\Admin\AppData\Local\Temp\1003840001\5d77031a69.exe"C:\Users\Admin\AppData\Local\Temp\1003840001\5d77031a69.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\\Program Files\\Google\\Chrome\\Application\\chrome.exe" --remote-debugging-port=9229 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff99ce8cc40,0x7ff99ce8cc4c,0x7ff99ce8cc585⤵PID:4408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1924,i,7914368266111124579,10337851723365788702,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1920 /prefetch:25⤵PID:2568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2140,i,7914368266111124579,10337851723365788702,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2172 /prefetch:35⤵PID:4368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2228,i,7914368266111124579,10337851723365788702,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2476 /prefetch:85⤵PID:3920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3188,i,7914368266111124579,10337851723365788702,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3220 /prefetch:15⤵
- Uses browser remote debugging
PID:868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3224,i,7914368266111124579,10337851723365788702,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3360 /prefetch:15⤵
- Uses browser remote debugging
PID:4776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3804,i,7914368266111124579,10337851723365788702,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4608 /prefetch:15⤵
- Uses browser remote debugging
PID:4704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4580,i,7914368266111124579,10337851723365788702,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4744 /prefetch:85⤵PID:4924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4428,i,7914368266111124579,10337851723365788702,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4780 /prefetch:85⤵PID:4076
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1380 -s 15924⤵
- Program crash
PID:6088
-
-
-
C:\Users\Admin\AppData\Local\Temp\1003841001\0e75068655.exe"C:\Users\Admin\AppData\Local\Temp\1003841001\0e75068655.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5044 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2952
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1808
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3096
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3412
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1788
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:848
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4828 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1992 -parentBuildID 20240401114208 -prefsHandle 1908 -prefMapHandle 1900 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {22570ca0-6dcf-4b16-a95e-1be524a9352d} 4828 "\\.\pipe\gecko-crash-server-pipe.4828" gpu6⤵PID:2428
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2416 -parentBuildID 20240401114208 -prefsHandle 2392 -prefMapHandle 2388 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {08b8a16e-da81-4e34-bbc7-d0db37958050} 4828 "\\.\pipe\gecko-crash-server-pipe.4828" socket6⤵PID:4856
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2824 -childID 1 -isForBrowser -prefsHandle 3220 -prefMapHandle 2788 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 900 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {12336e44-6f12-41c3-af99-6b48c545d139} 4828 "\\.\pipe\gecko-crash-server-pipe.4828" tab6⤵PID:4300
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3952 -childID 2 -isForBrowser -prefsHandle 3944 -prefMapHandle 3940 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 900 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9522b937-0ce2-4844-8dfa-09fb928218d1} 4828 "\\.\pipe\gecko-crash-server-pipe.4828" tab6⤵PID:1808
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4704 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4788 -prefMapHandle 4692 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7bda8afa-c529-4fa4-83d7-573c6fea7e37} 4828 "\\.\pipe\gecko-crash-server-pipe.4828" utility6⤵
- Checks processor information in registry
PID:5304
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5572 -childID 3 -isForBrowser -prefsHandle 5588 -prefMapHandle 5584 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 900 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {43769bc4-ccc6-406d-a90c-99c4b63de38e} 4828 "\\.\pipe\gecko-crash-server-pipe.4828" tab6⤵PID:5364
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5720 -childID 4 -isForBrowser -prefsHandle 5724 -prefMapHandle 5732 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 900 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c8f023d2-48ff-49ea-89b2-5327e06e3487} 4828 "\\.\pipe\gecko-crash-server-pipe.4828" tab6⤵PID:5396
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5932 -childID 5 -isForBrowser -prefsHandle 5796 -prefMapHandle 5800 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 900 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4d7dff94-0077-482d-98f5-b46c2c0a9666} 4828 "\\.\pipe\gecko-crash-server-pipe.4828" tab6⤵PID:5416
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1003842001\fce0578451.exe"C:\Users\Admin\AppData\Local\Temp\1003842001\fce0578451.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5676
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1808
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1380 -ip 13801⤵PID:6048
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2968
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:960
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
676KB
MD5eda18948a989176f4eebb175ce806255
SHA1ff22a3d5f5fb705137f233c36622c79eab995897
SHA25681a4f37c5495800b7cc46aea6535d9180dadb5c151db6f1fd1968d1cd8c1eeb4
SHA512160ed9990c37a4753fc0f5111c94414568654afbedc05308308197df2a99594f2d5d8fe511fd2279543a869ed20248e603d88a0b9b8fb119e8e6131b0c52ff85
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\activity-stream.discovery_stream.json
Filesize18KB
MD58eae93967a42b3da366e6fa15498de4f
SHA1d9769d06ac6994c38a732cdffd7d00f52cd6130f
SHA256bb800bc60f1dc5a345f35f93e67e1c7a86992fb534991205afde1f72a855a883
SHA51288ef7447ea3931b14a4586ed3e7f6cd919f1a25ab695810267fe369f8e0099b9861d75397c23e6d4d2e7b6ccbfec627d70081c889c68828aae6c3c172252cacc
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\cache2\entries\D500AD994A7515157BB2A6ADD5B18B754E4D2F99
Filesize13KB
MD57061571278bfc106d0a35d66d2fb2828
SHA144e23179c67593cabb11cc2c218efd05d6ea9aa3
SHA256d32c308b7f760fa56614340094c12bd073647af5f1d067e6ca34506eedfd4bbc
SHA5120182bc8a80e7af305a335f7f471035fc318b211ecc21d41ae14431fd39796fe5ff909b8c2856efbf64bb18ad458902cca06c24494fc4fcc690cbd94671d55dec
-
Filesize
2.9MB
MD56cbbda73e7392624944477c1d44383ad
SHA10962c25d539bf2a14241350eec57898e92a72354
SHA2561936882f17511417879134f6842ca480af0ab4f3c2f4e87a83c64a1a667d4165
SHA512bc141b5919651ed3d11ce51506ff649332443bfa24631d4586bbc11b01bdf2473fafd9f5217d3aa05b000e62e5a0ddbee1c0c5e0d0e8dfb3f9e6ac01555a2fe0
-
Filesize
2.0MB
MD50a6bff9f711868a9d329f64b16ef0ca7
SHA1e825b1e8e95b2efecbf1421cd6092358efd694a8
SHA256f817ca9481d1a85feeb75b673eea7a88dd67f3f60fd9b64cf5259fab5bb75848
SHA51244fc354bba52c731fd6bf1aabd8e5657ec765029752c8ca5d246ddd3166020a97a54ef0fd7be9d98ef9b66fd8ba5301e76bf15014f7889f1c70c3d69f5defe5d
-
Filesize
898KB
MD5aca3f7838b44d713cfa09687c2c5a49c
SHA1e7f6e41cfde18be9589ab87eb5897612e69c6140
SHA256f02caf2880bb9bb808299b41cbcab7417e598436ded1584776488fa99592efc2
SHA51290e9a5426ab2ffb9cb298b1870092a92c67b37aec245ebee2702b9bc60569380d2f6ce839dbd49635989b7d242fbef67ab071ed3f4aebec8bf11d411df0265eb
-
Filesize
2.7MB
MD57e30ff7c74d7f01908276e2f37ce92a0
SHA1197911cfec93587ddea1bd6776436baf9e29aea5
SHA2567baeb7c48c9f7a1540c8328f6535c27694a9bf594a592dd37a2320d6025e18ed
SHA512694cf891723d09cc47b48a901d5aae2db0037d7bd5fd8367c1b474edeb8c6a5f2d1d4675c7d7b8ffd6aa9a4b5d86a35f13ba62f99b9a7897fc14982acbc3c776
-
Filesize
3.1MB
MD5b2b571311ce73fae9f03f3c10e894ca7
SHA16083d27101e3e323c8e25e4dd34ba1e13571bf33
SHA256ac0b68558b6952cba1922a80d3c687c3789909db072e27ac0d0be6e2169f7ac6
SHA512cdf4c6ab60e185cd783f7b5ddedf4d4b8cd6d072c0a07c860b6beff9248a6173d6e5bafd34dc487ffc15fd2f14f1e105d1c8a7fc3bba39b79994b7ffbb143a1d
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\AlternateServices.bin
Filesize13KB
MD582477e3e2e6b9f5bf426ac403fe5a551
SHA1ee3d89aa9420d83c21d4ba25c2c1e0590c10daac
SHA256ca35feb2ec63d3f50f73ba65dbebce44be6340721e21938b0c9b3c4c2c457104
SHA512cde950f1e7f5bb5ac0b03c92110744184f94b16d4c0daa38fad06972a5cd943067c10aaa6d00416b4eff7f522d831b00fc2a0e5011009ec103400a8db263558f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5f0792654eda97e1711a5331246af180f
SHA1a264097c8998cbb6825c8caa4ee192f9d2ff23df
SHA256f166e9edf46985bd9abfbcd2c61eb942b1d0998b3e07ec8f491fdbaf88deee2f
SHA51289d07c63938ce8e2ee4591f78561693db41d2df09306807643b4f629c4d759025741ec5dff7c9016f65f4f0da7b35f18899fc8714790c8a95a1a4bfe842b7a11
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD581e3f5e1341707b2e730b09a6f9871a1
SHA1abc4dbbac0adca30fe6146f4c75b83a8ae6aef1d
SHA2564c2702699ca2cb8e8e3461246b0e25928e42b1c09bb5882290e6457a63e328f8
SHA5127b0d5f9451d3d1d03e7838faf9674825fea8cded22c2aa547c17f4772a198306a99f52ede10ab0a8d55f16f501ceb0bac5525e8c2960ccd0b16223ff9f1f4cda
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD54be4635e427c884dae602391f0378b6f
SHA1a8fee62912f2910a6b593d6f4f1cec1ef7d8812c
SHA25646dc0005f30ec8f0ee7fa31f6e1a03e91e2d4c2c47de3e1dd1b2d57d90b51028
SHA5123e9d24fac4e4b2a6d84570e9602c1ccd45188bff0f26f1ecae4b7eb4a1ec868129ce0576835e74ce3faace728019bbd35592c4a7ebd1b50167e8a877b20fb911
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD57452c015d0b86485a60b2f4c002c36f6
SHA1007e6cb8e4603467cd2f4df8b1e716c7de53503c
SHA256d09296465242257bfbcf9d3a2073a076e0f57eb037f4367cecb12af3c0b4711d
SHA5123dc85b5d60076d5ff3312e2cc1815989aca522f6fa3b80c1f30cf796bf71c121f7fec5c420a10966a89671cfa4e4471b227c633b01407dce3d2a520589cda40c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\1464f505-c047-4ce4-a0e9-05357715fd4f
Filesize982B
MD5be32e57cc061b8ba8edf6df5200d445f
SHA1f8323e6b0a94451471e30e124f42f83d6893c213
SHA256af00a4b4776c08ed199343a43da98f339a67f05b180124552048e479a7c547a0
SHA5120013f87afa6897a951d0e701eab9c527251834c15b444ebf66b99a84a458e84dc0d6f6a96e3edff35170f4e5d356ac649796ff0bed461d66134ec0fa88a27b32
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\551c85a3-ef53-4682-a8d3-5c4de4fa933d
Filesize671B
MD5f3875fdf598c200795567893676b72c2
SHA11c840f1777578eb77f4933d6f9e01b0fb5999773
SHA256b5b10b0544ab5ced41b5aa55bf71453ac86550dfef4edeb7b8e18ef7f6fb2c4a
SHA5123d01ed86693bf74fd4ea0abb9efdbd9ee8cd936bcf72be19576034e8347def5e49bf411c469752c64d19758a2993542dbfbec4dae346db8e4015712dec3320e6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\aeca3035-4dee-4af8-a24a-3a3baf484c59
Filesize28KB
MD5e4c51fb7eafcc1943fc069ec731972e4
SHA1e04225a8ee9597adab22775a0776285d3cb976d6
SHA2561db279bab35275c0103bf12a9bd9800c8a8fe4d6889b11fd8190f51077b63ebd
SHA512db78c483aa2dfd4c8fb28f8286c4409ead18d0555d8894a39397e12b50b198c71d10d16fc95141d41e2a7adb50ddbd32bc85f4a37f1d2178d2ee040afac9b3a2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD5770c4e109ae7f071619d03f0674a7574
SHA1a401ebd93dc79454eacef4f27c7bf5a5551c981b
SHA256dfd7ee6d5684747a8453649a81fd2eaaf5c392bcac76754394d27a874f57381d
SHA5126812bcf61f5a022bd2047b9d19256858bf20742595f48955c0b8c5fff6e4c9725a2a421c3dded48287c5a3cdc85e4451714e2f1d405789f57c7cd26bae465354
-
Filesize
15KB
MD59f7c2100a59a04ed8ab8aa2d768cbdd4
SHA138e22c0f56d467b6b68951cc20f613f728d3855f
SHA256fbcfdf6953b0589b567c868195622249dfeede15ab538fc9815e63cb1af1228b
SHA5125736f73c9465801ec72e78ce3c6ef3bad809d5383ac235faa1dcdf60687fa8d1008cb4c3679534b86f389d59bd04cd7de2e47b5fa468f68778e59205137af772
-
Filesize
10KB
MD575b53a507a7996402147450605297914
SHA1442938aa4812a799f467f8a14d2739e3786e5905
SHA2560710c0ff6bc9053ca24845e7d6138a0212c4b3bd526618f942402090e9d8a9ae
SHA512c8239de17a22b7bbf8ad193e18aa8386d60f6973ed609117f7a1680207d54ad40cdc1971f92cbf602fe68fde29c0ee32364608bd5c71934d96f5d6abf31d1d0e