Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05/11/2024, 15:06
Static task
static1
General
-
Target
7a8091adae649be1b60dffc3835d7ca8b068f78925aa22e4fbb610ac261da3c2.exe
-
Size
5.6MB
-
MD5
56dae66fe9e918710134238e6ad5baa3
-
SHA1
fa75388aff74f2f4abe1ee726c93d3d2822b9a68
-
SHA256
7a8091adae649be1b60dffc3835d7ca8b068f78925aa22e4fbb610ac261da3c2
-
SHA512
ef89d142abe55bd2d6e0c238f0a5f3c7b57b0e43377a75d44ba4172d7183c4c13dfcdafec031d00c35b55665048eb15e43581c5d1e07d525ea2b944b08dff39a
-
SSDEEP
98304:5ZMw7Ejk+oFsVrNcHSSrkTDOJ7qCL5XBpW+6dTUy/sl:5ZMw7EjkQVroBkTDOV9PpW++TUt
Malware Config
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://founpiuer.store/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c700b4905a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c700b4905a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c700b4905a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c700b4905a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c700b4905a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c700b4905a.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3F17R.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4K023H.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ da182eb20a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d056a98c28.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2a5131.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c700b4905a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 20 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3F17R.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4K023H.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion da182eb20a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d056a98c28.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3F17R.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c700b4905a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2a5131.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2a5131.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d056a98c28.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c700b4905a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4K023H.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion da182eb20a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 4K023H.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 13 IoCs
pid Process 4516 l2A58.exe 4136 2a5131.exe 5024 3F17R.exe 936 4K023H.exe 4728 skotes.exe 232 DLER214.exe 4244 da182eb20a.exe 4524 skotes.exe 1768 d056a98c28.exe 3452 bcaa05e1d4.exe 6904 c700b4905a.exe 5988 skotes.exe 6876 skotes.exe -
Identifies Wine through registry keys 2 TTPs 10 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 2a5131.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 4K023H.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine d056a98c28.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 3F17R.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine da182eb20a.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine c700b4905a.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c700b4905a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c700b4905a.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bcaa05e1d4.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1004130001\\bcaa05e1d4.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\c700b4905a.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1004131001\\c700b4905a.exe" skotes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7a8091adae649be1b60dffc3835d7ca8b068f78925aa22e4fbb610ac261da3c2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" l2A58.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\da182eb20a.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1004128001\\da182eb20a.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\d056a98c28.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1004129001\\d056a98c28.exe" skotes.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0007000000023ca0-108.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
pid Process 4136 2a5131.exe 5024 3F17R.exe 936 4K023H.exe 4728 skotes.exe 4244 da182eb20a.exe 4524 skotes.exe 1768 d056a98c28.exe 6904 c700b4905a.exe 5988 skotes.exe 6876 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 4K023H.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
pid pid_target Process procid_target 3736 4136 WerFault.exe 87 4316 232 WerFault.exe 106 3640 4244 WerFault.exe 110 4516 4244 WerFault.exe 110 -
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a5131.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language l2A58.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4K023H.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7a8091adae649be1b60dffc3835d7ca8b068f78925aa22e4fbb610ac261da3c2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da182eb20a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d056a98c28.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bcaa05e1d4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c700b4905a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3F17R.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DLER214.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 2836 taskkill.exe 716 taskkill.exe 3536 taskkill.exe 3908 taskkill.exe 64 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 4136 2a5131.exe 4136 2a5131.exe 5024 3F17R.exe 5024 3F17R.exe 936 4K023H.exe 936 4K023H.exe 4728 skotes.exe 4728 skotes.exe 4244 da182eb20a.exe 4244 da182eb20a.exe 4524 skotes.exe 4524 skotes.exe 1768 d056a98c28.exe 1768 d056a98c28.exe 3452 bcaa05e1d4.exe 3452 bcaa05e1d4.exe 6904 c700b4905a.exe 6904 c700b4905a.exe 3452 bcaa05e1d4.exe 3452 bcaa05e1d4.exe 6904 c700b4905a.exe 6904 c700b4905a.exe 6904 c700b4905a.exe 5988 skotes.exe 5988 skotes.exe 6876 skotes.exe 6876 skotes.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 232 DLER214.exe Token: SeDebugPrivilege 3536 taskkill.exe Token: SeDebugPrivilege 3908 taskkill.exe Token: SeDebugPrivilege 64 taskkill.exe Token: SeDebugPrivilege 2836 taskkill.exe Token: SeDebugPrivilege 716 taskkill.exe Token: SeDebugPrivilege 4944 firefox.exe Token: SeDebugPrivilege 4944 firefox.exe Token: SeDebugPrivilege 6904 c700b4905a.exe -
Suspicious use of FindShellTrayWindow 32 IoCs
pid Process 936 4K023H.exe 3452 bcaa05e1d4.exe 3452 bcaa05e1d4.exe 3452 bcaa05e1d4.exe 3452 bcaa05e1d4.exe 3452 bcaa05e1d4.exe 3452 bcaa05e1d4.exe 3452 bcaa05e1d4.exe 4944 firefox.exe 4944 firefox.exe 4944 firefox.exe 4944 firefox.exe 4944 firefox.exe 4944 firefox.exe 4944 firefox.exe 4944 firefox.exe 4944 firefox.exe 4944 firefox.exe 4944 firefox.exe 4944 firefox.exe 4944 firefox.exe 4944 firefox.exe 4944 firefox.exe 4944 firefox.exe 4944 firefox.exe 4944 firefox.exe 4944 firefox.exe 4944 firefox.exe 4944 firefox.exe 3452 bcaa05e1d4.exe 3452 bcaa05e1d4.exe 3452 bcaa05e1d4.exe -
Suspicious use of SendNotifyMessage 30 IoCs
pid Process 3452 bcaa05e1d4.exe 3452 bcaa05e1d4.exe 3452 bcaa05e1d4.exe 3452 bcaa05e1d4.exe 3452 bcaa05e1d4.exe 3452 bcaa05e1d4.exe 3452 bcaa05e1d4.exe 4944 firefox.exe 4944 firefox.exe 4944 firefox.exe 4944 firefox.exe 4944 firefox.exe 4944 firefox.exe 4944 firefox.exe 4944 firefox.exe 4944 firefox.exe 4944 firefox.exe 4944 firefox.exe 4944 firefox.exe 4944 firefox.exe 4944 firefox.exe 4944 firefox.exe 4944 firefox.exe 4944 firefox.exe 4944 firefox.exe 4944 firefox.exe 4944 firefox.exe 3452 bcaa05e1d4.exe 3452 bcaa05e1d4.exe 3452 bcaa05e1d4.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4944 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1844 wrote to memory of 4516 1844 7a8091adae649be1b60dffc3835d7ca8b068f78925aa22e4fbb610ac261da3c2.exe 83 PID 1844 wrote to memory of 4516 1844 7a8091adae649be1b60dffc3835d7ca8b068f78925aa22e4fbb610ac261da3c2.exe 83 PID 1844 wrote to memory of 4516 1844 7a8091adae649be1b60dffc3835d7ca8b068f78925aa22e4fbb610ac261da3c2.exe 83 PID 4516 wrote to memory of 4136 4516 l2A58.exe 87 PID 4516 wrote to memory of 4136 4516 l2A58.exe 87 PID 4516 wrote to memory of 4136 4516 l2A58.exe 87 PID 4516 wrote to memory of 5024 4516 l2A58.exe 98 PID 4516 wrote to memory of 5024 4516 l2A58.exe 98 PID 4516 wrote to memory of 5024 4516 l2A58.exe 98 PID 1844 wrote to memory of 936 1844 7a8091adae649be1b60dffc3835d7ca8b068f78925aa22e4fbb610ac261da3c2.exe 100 PID 1844 wrote to memory of 936 1844 7a8091adae649be1b60dffc3835d7ca8b068f78925aa22e4fbb610ac261da3c2.exe 100 PID 1844 wrote to memory of 936 1844 7a8091adae649be1b60dffc3835d7ca8b068f78925aa22e4fbb610ac261da3c2.exe 100 PID 936 wrote to memory of 4728 936 4K023H.exe 101 PID 936 wrote to memory of 4728 936 4K023H.exe 101 PID 936 wrote to memory of 4728 936 4K023H.exe 101 PID 4728 wrote to memory of 232 4728 skotes.exe 106 PID 4728 wrote to memory of 232 4728 skotes.exe 106 PID 4728 wrote to memory of 232 4728 skotes.exe 106 PID 4728 wrote to memory of 4244 4728 skotes.exe 110 PID 4728 wrote to memory of 4244 4728 skotes.exe 110 PID 4728 wrote to memory of 4244 4728 skotes.exe 110 PID 4728 wrote to memory of 1768 4728 skotes.exe 117 PID 4728 wrote to memory of 1768 4728 skotes.exe 117 PID 4728 wrote to memory of 1768 4728 skotes.exe 117 PID 4728 wrote to memory of 3452 4728 skotes.exe 118 PID 4728 wrote to memory of 3452 4728 skotes.exe 118 PID 4728 wrote to memory of 3452 4728 skotes.exe 118 PID 3452 wrote to memory of 3536 3452 bcaa05e1d4.exe 119 PID 3452 wrote to memory of 3536 3452 bcaa05e1d4.exe 119 PID 3452 wrote to memory of 3536 3452 bcaa05e1d4.exe 119 PID 3452 wrote to memory of 3908 3452 bcaa05e1d4.exe 121 PID 3452 wrote to memory of 3908 3452 bcaa05e1d4.exe 121 PID 3452 wrote to memory of 3908 3452 bcaa05e1d4.exe 121 PID 3452 wrote to memory of 64 3452 bcaa05e1d4.exe 123 PID 3452 wrote to memory of 64 3452 bcaa05e1d4.exe 123 PID 3452 wrote to memory of 64 3452 bcaa05e1d4.exe 123 PID 3452 wrote to memory of 2836 3452 bcaa05e1d4.exe 125 PID 3452 wrote to memory of 2836 3452 bcaa05e1d4.exe 125 PID 3452 wrote to memory of 2836 3452 bcaa05e1d4.exe 125 PID 3452 wrote to memory of 716 3452 bcaa05e1d4.exe 127 PID 3452 wrote to memory of 716 3452 bcaa05e1d4.exe 127 PID 3452 wrote to memory of 716 3452 bcaa05e1d4.exe 127 PID 3452 wrote to memory of 1056 3452 bcaa05e1d4.exe 129 PID 3452 wrote to memory of 1056 3452 bcaa05e1d4.exe 129 PID 1056 wrote to memory of 4944 1056 firefox.exe 130 PID 1056 wrote to memory of 4944 1056 firefox.exe 130 PID 1056 wrote to memory of 4944 1056 firefox.exe 130 PID 1056 wrote to memory of 4944 1056 firefox.exe 130 PID 1056 wrote to memory of 4944 1056 firefox.exe 130 PID 1056 wrote to memory of 4944 1056 firefox.exe 130 PID 1056 wrote to memory of 4944 1056 firefox.exe 130 PID 1056 wrote to memory of 4944 1056 firefox.exe 130 PID 1056 wrote to memory of 4944 1056 firefox.exe 130 PID 1056 wrote to memory of 4944 1056 firefox.exe 130 PID 1056 wrote to memory of 4944 1056 firefox.exe 130 PID 4944 wrote to memory of 3480 4944 firefox.exe 131 PID 4944 wrote to memory of 3480 4944 firefox.exe 131 PID 4944 wrote to memory of 3480 4944 firefox.exe 131 PID 4944 wrote to memory of 3480 4944 firefox.exe 131 PID 4944 wrote to memory of 3480 4944 firefox.exe 131 PID 4944 wrote to memory of 3480 4944 firefox.exe 131 PID 4944 wrote to memory of 3480 4944 firefox.exe 131 PID 4944 wrote to memory of 3480 4944 firefox.exe 131 PID 4944 wrote to memory of 3480 4944 firefox.exe 131 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a8091adae649be1b60dffc3835d7ca8b068f78925aa22e4fbb610ac261da3c2.exe"C:\Users\Admin\AppData\Local\Temp\7a8091adae649be1b60dffc3835d7ca8b068f78925aa22e4fbb610ac261da3c2.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l2A58.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l2A58.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2a5131.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2a5131.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4136 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4136 -s 15764⤵
- Program crash
PID:3736
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3F17R.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3F17R.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5024
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4K023H.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4K023H.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Users\Admin\AppData\Local\Temp\1004090001\DLER214.exe"C:\Users\Admin\AppData\Local\Temp\1004090001\DLER214.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:232 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 232 -s 17565⤵
- Program crash
PID:4316
-
-
-
C:\Users\Admin\AppData\Local\Temp\1004128001\da182eb20a.exe"C:\Users\Admin\AppData\Local\Temp\1004128001\da182eb20a.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4244 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4244 -s 15845⤵
- Program crash
PID:3640
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4244 -s 16405⤵
- Program crash
PID:4516
-
-
-
C:\Users\Admin\AppData\Local\Temp\1004129001\d056a98c28.exe"C:\Users\Admin\AppData\Local\Temp\1004129001\d056a98c28.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1768
-
-
C:\Users\Admin\AppData\Local\Temp\1004130001\bcaa05e1d4.exe"C:\Users\Admin\AppData\Local\Temp\1004130001\bcaa05e1d4.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3536
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3908
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:64
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2836
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:716
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking5⤵
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking6⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2060 -parentBuildID 20240401114208 -prefsHandle 1984 -prefMapHandle 1976 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d627ba6c-2289-41db-a9ef-c210416e1898} 4944 "\\.\pipe\gecko-crash-server-pipe.4944" gpu7⤵PID:3480
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2492 -parentBuildID 20240401114208 -prefsHandle 2484 -prefMapHandle 2480 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ddafd836-00b4-4175-8385-744bae96b9a2} 4944 "\\.\pipe\gecko-crash-server-pipe.4944" socket7⤵PID:2732
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2888 -childID 1 -isForBrowser -prefsHandle 3216 -prefMapHandle 3232 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fcfdf152-cc84-42a1-9f84-5910d7e51e66} 4944 "\\.\pipe\gecko-crash-server-pipe.4944" tab7⤵PID:2172
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4160 -childID 2 -isForBrowser -prefsHandle 4152 -prefMapHandle 4148 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {45bd4eb5-8e6a-4f61-9826-f48178d0ab93} 4944 "\\.\pipe\gecko-crash-server-pipe.4944" tab7⤵PID:3356
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4932 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4924 -prefMapHandle 4832 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {513479a7-4ea1-4ee1-8150-cb8917fb56c7} 4944 "\\.\pipe\gecko-crash-server-pipe.4944" utility7⤵
- Checks processor information in registry
PID:6832
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5260 -childID 3 -isForBrowser -prefsHandle 5252 -prefMapHandle 5248 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {782532b9-3155-4370-adb4-b11adb821438} 4944 "\\.\pipe\gecko-crash-server-pipe.4944" tab7⤵PID:4676
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5360 -childID 4 -isForBrowser -prefsHandle 5368 -prefMapHandle 5372 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {bfab307c-e746-4e88-9419-95c132bcc043} 4944 "\\.\pipe\gecko-crash-server-pipe.4944" tab7⤵PID:1684
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5352 -childID 5 -isForBrowser -prefsHandle 5568 -prefMapHandle 5572 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {09490fd7-562f-49c4-8f3c-8d070897571c} 4944 "\\.\pipe\gecko-crash-server-pipe.4944" tab7⤵PID:232
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1004131001\c700b4905a.exe"C:\Users\Admin\AppData\Local\Temp\1004131001\c700b4905a.exe"4⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6904
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4136 -ip 41361⤵PID:1944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 232 -ip 2321⤵PID:3580
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4244 -ip 42441⤵PID:876
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4244 -ip 42441⤵PID:3244
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4524
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5988
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6876
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\activity-stream.discovery_stream.json
Filesize18KB
MD57e1aedbaad5f66634179e446af4e64d2
SHA1ed82dfbe9b023380f6179310b483dfcc6b8745a6
SHA25656252b4f4c445841ff9001bc8d7f9a95c2dcaf0c2f0678bf10f58f1fe46176bb
SHA512cc7709115c2615a9470c6d919af6940c8347b1db1d63e1ff3a820effa0fae04f07620110f9a4725f09911009f8fb16e2282c1975735c292e008722f9ff58686b
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\cache2\entries\D500AD994A7515157BB2A6ADD5B18B754E4D2F99
Filesize13KB
MD5457f85efb24624f1c07a38f9766b782e
SHA18ecce0800e9c33e675ee829cbbbbd64be07d438f
SHA256c66f8f0d33d2ad0826bfa4f5e647dcf2d117bc3a442bb6c21b3071c408949f81
SHA512e95c5312189fa83450a5cd1d4704f71a0f19e1745c9e77f90f59577c84993572a54bcf07f989ab0959c18d6ba0875caf973636f08717d19a75ff81be1b0003e1
-
Filesize
16KB
MD554ec587044fdff4bfd0029946041a109
SHA1242cc5fdd5c75a02776f1f5e526cc42cf138b313
SHA256e666b2644c35f564041ad18c5125f1677255f05421ad18785aed42bfb3ac5adf
SHA5126e2c9f3b3850c021b0db78af02f37e6fe1b32bd046ba5767b0499f2c4af11586e167c80235258b5536bcfece567a18f2e2eca6a107e60d5efb62a65175049046
-
Filesize
3.0MB
MD50d7b1ba6e967a55e6cff34069832498e
SHA1be54bc4033d47cd14bc9648ce964c67b283fb6c6
SHA2566ecb0aee684e895fbaede81d1ecacd3b2379301d7ab37ccd883de5ece7651988
SHA512a4713d6a23b406c2bba2035d34c9e8a7da2b4af1fb27f3a26b9821c45f250766b7d171044b7f8a35bc51a49eae7f6541c483af0bb08f06040b9fc4be567c73e2
-
Filesize
2.1MB
MD5d295038f6facf219e302c0444bffa7b0
SHA117a55b8e0872feb3476eb425758c7b8500e857fb
SHA256a0cc678c942c6f391cb39e06f20cb9a8cdc2e319e41f52023c5e0e7b3985594d
SHA512075691b3e30fd88fc59428f94c05858a0d625b371a1c44625d2d801efe337548bff94d7dc4facf14cbb88679a8186f23b053b9c7952120f40b50498693178e09
-
Filesize
898KB
MD5b5ff96d881cb52f00f72b6c8ecad69d2
SHA16b85832269229650a6eee74f742988bc806c95e2
SHA256340900762b8ced8d422e37559e5d5d31eb8cb986ff59da2f0cdcbcd3f831b044
SHA51238176fb25a18e0a4ca75d4308fb4136e9e4b6ceb5dd45ae9007e87f4350393d71c71f3a1588d875d211da9d95f5bced394b2292073dcd7355bdb731fc7fa8837
-
Filesize
2.6MB
MD521815e007675b940346568cc76eba24f
SHA1f5c0f6525d7fdefd7939d0b57ecc023fcbb8badd
SHA2560fd9eac4a439cd1c2411be9dea2f0de044948a5bf43aca7d3959dcd018da6fb3
SHA5126f60e2202475d9cd9905eebb7196358b55c9f8d2a91dea11899f9d35b0aa32b402f1f088176349e04e6ce3474b91800432f790f5239c2ada092e95b50712ad3f
-
Filesize
3.1MB
MD536cde0f98ab8a93df2c3134ab9771502
SHA1d778b355d36d12d05562bed3f78af22c944eb575
SHA2566d466d1d251413c12eea858fb6632f05321720d64212b98b92b68a7190627261
SHA512a79ef6f322657769550e03f1734b88c1a3b330ec6523f5fa444066cea7bc1dfd2df41833d9c99380209f2e25d1685c81dbc9eee948aa30678ff8a54a3b4c5d80
-
Filesize
3.8MB
MD5ba8e83413484b0fc931cd1265751af3f
SHA1b8000dfddf6ee7fc176ea4d8e60515885e5cf0c5
SHA256dace49f1e6a37e4910314a5674abc7e46cd08d20ca92d423f540466a94320479
SHA512ff0748f76ce627406627ae8338f2c5c6dea1e8bafe06c32791ca8684cecb454825c623610b93e39cd40db7b33c735fc37f2c9b0987d46bde47fa73507a017378
-
Filesize
2.9MB
MD5d4d8406aa8da86e06a9fe0942d4e7eb8
SHA1c2d2503604f1af2cc099af2021bb544b0a563c20
SHA25657a15eecd54ed9592c6d49f6b5a562ed44c049f1265ecf7b42a90569dc8f8740
SHA51278f7dac660bd11af6ac985d4f00397258b05c083479677797b7e23a5675b33ed3a2b09f2801166a34a15480734554277133a5dbe030edab4b081df51e8e47e7e
-
Filesize
2.1MB
MD5bbcc32dc6b38c304fd1e85e156e19753
SHA1b1afa09577e219950778ee0336ecc59ea9d19f04
SHA2569424a09ca4319cd342a64203eda4b47c4e48b96c5194e90c55e40f34c2601387
SHA5128f2a5aa684f6876d97e0f6ac4ac378429af0b09a1b956a42444eed9b54629469acdc7ef6a97aab3f75d4bdc0dd47c4d21dd3166562af15e0a49beede5346ca7d
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\AlternateServices.bin
Filesize13KB
MD54ee59458f6f05c18a8045cc96e89c604
SHA1df7eaa7f553e8ee8dee42e949cc8ea6377465d41
SHA2561f686dfa2b88fd226e4309fc43f83abfe40e407dc033f276ac6102b8f1f4759a
SHA512445d6368aba8cb27cdec46496c8dcbe09afb24581693fd0d44dd1cc3405f90e8a97598b7167c3677a05d0c29d4ca59ea0468a03d2c5f1bde11136800d8af6680
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\AlternateServices.bin
Filesize17KB
MD5adb40c88d87eb78ef840ffc815342487
SHA1138673750f1d45ce62feda0459b29c1108a1065b
SHA256315a379bca80675c750539321746b587bc62ba5f275fe06424526a784cd62cff
SHA512e79a643ac31f092b11a898494f9c14edac7402acaaeb1ed01578f83def0b1cff5fe65a62bcdd1d8fbf62151dc76f175cb26500dfa995e6da7fba4988275ba7fa
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.bin
Filesize23KB
MD5f54559e374405a6dec4dec62b00e7d1b
SHA1526016b55ed3cc908c9084b3e9ac0da71f9b10d3
SHA25627ccb949e72ab6e136706be0bf7906147dbb4e0264a50f5b3399a0e3b1ab6ec2
SHA51209a9d83e19ffe98d42e02a50ba6290a26deb363a297461b7ecb08c17d244f0070c5454fa988a086284a2fe18d1f703b9274b55023b13ff5704d154f2a73eab1b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.bin
Filesize28KB
MD5ffbbef6a69f981bacfb7a09db2ea37f6
SHA1d9f97b731d07a0c098686ef3e131d115e8dd3b66
SHA2568df941c42086c50e5734af41bc1bc0e096e66f7a7358506b16507e339e3901fe
SHA5122fcf3628dc4a41664b5e29c4f26d63c4988717b1c5b90e3f9811a5c5feb2cb2ef93fe651b95b438d51d9da4d4e140723e0d4db1708cea4ea4b6fdc5797ff8395
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.bin
Filesize6KB
MD5044f2ada42e97ceb880ce663f2ae3885
SHA12a1c1afada5c943ae7f9c7641451534fbc4d2d1d
SHA2562cabdbd9b13230bbbbe73c73a8c7901b5621f549b5f16cadff2e34fd3131e544
SHA51270b83e49a3b4e32ece851c4abbe45d0da617e5ee8a1ca7114b67b64acdfaef7472c964cea0f975d0e34b2d0a4469e5d102ac563a102e342b43ff45845ff4b1e0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.bin
Filesize28KB
MD567434c0ee5467d38e77045e82d19b66a
SHA1799679ca2e92cc8a59104fe6927881ebd7a4caec
SHA2566e82b5dd2cbbfac5a5673ffdaf02fb8b2e347ad84b8691609efd83b53c563b55
SHA51232280147ef883a782d8de03dd6ea6b9cc310c0c0f1e609cc8c97fe650f8265f01028e24a4e0c16e59226435e9e373d63af84f057686582ddbdfee286e38a1ac2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize28KB
MD52c26ec4c383d0d57578fbb8aedfae0d5
SHA142ad933f3fdbf33416e6d954cee02e6b58f5240f
SHA2562a08d9da2b1b0860c0cddfe5139711029929796cceb3e44d44c60b1e64cd9cb7
SHA5128a9a7b7f4d76f76f07b053227574af988ec0379b14f3b8c222767fb8d5a7b54f63d1e9d8c919589e20a6d9c0c9d1fff59317a7e7d191255309b538d208c20736
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize28KB
MD52e885315e65268ba229db9cb34589702
SHA18f362c500a58a81f518fd43f2f7735a9cddd763e
SHA256bbb79c3a071048c441c37187de800ddfaf1fd3b6861b5a281632959f447fbcc2
SHA512a541b4e226d2576406d70a2b70bd5d5a4fa1b1f74d967abf699f57509c55ea80500ae4420e8139a779aeb9cbe8610e315af3d37c0c6fbd10d785aa772813aa62
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD50d66d3aa3be0da92899826767e168e62
SHA1f526e460b34319241c24974c349d67419ba08bad
SHA256e9ceec8629f72a6ed1359952f255e9bed036162cf57332a3b369c9fbe0d69b45
SHA512bbb2f913930358435b11896536c17355ef3a0952fdb83b5310e94b62b4eabda8a587f15aabc4c0bf58f3179b000b71f3360c5f50870d4755c5bc6abc09f8f08d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5218087ac94075fd0274b0dfa7ed9fc1b
SHA17c0d24a9735eb0e7609fd0a8eb9d062043fbed46
SHA2566d86c49f35f7ad521b8562c4285f6f0443208a2fc6b1c87ecfc818823f27da77
SHA5125aabcd924ad9bdf0ae8c655d86bbbf5bf11689ed33fe41bfe688a0ef2842b55310eb9c28d63fb11a408a4f4f8723f83224ce7c84b1e15f24da7bb6d31e979d40
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD52584891d95c887ac8c40e43fecede174
SHA1101e6ea5b81d5c86a0e1a4ad58dc8b222b020123
SHA25634496d23a8413a88eaa093d743dc51ca5281e60ae3e5ca6f494f85167735030b
SHA5125e8fc45eb7e14f5eb33512cb53464cd2ee21b8b1c82343b10fded118cf5c525454d44854cd4cb79314e032f451e26754da19a01a9e36d718746689672fa46b89
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5e5315261fdc584bd95b2a18b7dc4f374
SHA184b9cfddf07da8228b7644de32633f7bb7283980
SHA25654d7edd900ee959a9d3ff86590111edaee5a2bd099930980d8ff866f7f3f7bb8
SHA512c91436adfa4d716079b0f7bfb04ab417a8974e683a6b6042ccc037960f8126a8437b5e7b82282149392cfdb447863a4bf93d9bda98dbf99d1d50d3ed038a4558
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\360905ee-54d3-4e31-ab99-0bd6c7683007
Filesize25KB
MD5735d84d2ab5e666a1596b3403c5ebd9a
SHA11c74d7e479bd00843b6fba0d2d3e01047d263a2a
SHA25699ebfac976f40e3be5d186e43496e0f99f4cf9d51e4570a9e1d07cd2eb814467
SHA5124b5011cd37d5c24ace39546410d3c06754981e15504ea20c2b3a032fd6503dd8fc74e1c0e60e7a2c66cda3ecc79755cfb4e29da8462257800426f83e0a406d1a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\3d8ae338-d7ee-48bc-a668-7acad2058abd
Filesize982B
MD5b3f4a1aa4364f4c2f91daee7fb350476
SHA1145839385714576152c2cc0b96dfdfd5f0da62f6
SHA256bf891503292f265c06ec57c7f1b51a58eb0189ce97fc428f8280baea9dd75bbd
SHA51210de7c1f695c4bc71b96fb88f6cb2d45f90949655cf03c7e00b5932e7107783bf13898e222f711ed311462e4e1653c420813a6db5462e4385acfd54ffec1d51f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\b8d8755a-4e69-4e78-b9ee-c5af6a07c3de
Filesize671B
MD54f6c9af64674e02fa39036fac665ec2f
SHA1ccdb57c28d58ee50d64e41ba248a0bcb94d09513
SHA256fe264e5618d25b8ea770030d8488f4df8b428a2cf1f518c4f3e28650331c49d0
SHA512b88d17367466abfff84162e45ff03ed10af84c57f1f3160690a16b207810f7a3c953093ac9e24f9f12ee7969053119a30c678bc6646017f9fd0c2eb0372ad970
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll.tmp
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-widevinecdm\4.10.2710.0\LICENSE.txt.tmp
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll.lib.tmp
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll.sig.tmp
Filesize1KB
MD536e5ee071a6f2f03c5d3889de80b0f0d
SHA1cf6e8ddb87660ef1ef84ae36f97548a2351ac604
SHA2566be809d16e0944386e45cf605eae0cd2cf46f111d1a6fe999fec813d2c378683
SHA51299b61896659e558a79f0e9be95286ebf01d31d13b71df6db4923406e88b3ba72584ef2b62e073b2f5e06901af2c7d1b92d3d12187fe5b4b29c9dd2678444f34e
-
Filesize
10KB
MD54fd0b5f44c48682a97eaa1abaf8f8fb4
SHA13fd4ad9d9b342b5828e9092ef5d63ceb6b8089b4
SHA256f16a7fe8ae998af3751cff8983e765a843af478384b23e1108daa0197cf3cb43
SHA5123e5099346fe68a39c795c6543e34595914636ba7629cfd10f79a9d2890b4d06be8ce8d74a4099c42585e629946a789c53602d60e97de3550c0138953701a6b3e
-
Filesize
12KB
MD52d4fd147112455ad8cc30c412c428b45
SHA181322d642db84273df3e6570a25671bfa2c7c0cf
SHA256723a153272194aa4dba27fe0e0ac03ec5ccbec93e9a3851b44900d4bf2e33483
SHA512790708c06feb87f26d43d733cd1e6417ab38677d44a8cfe5fb0116609f3ec4068f979389b7815562a8ceb3d3e74cea3e69fe058bb1b8f4205d5c901b72b12efe
-
Filesize
10KB
MD59fc674d2e31baba67b81e959db0d8475
SHA18346bebc3a43fdcfdff82d55faa09cae2abef873
SHA256722ec82b98bfc6ac8da7fd43105df0bc7c01db0b0e45573608d47ca65d77c95f
SHA5120df17fba6ab35c2882135c9de5e4ba4f306d79d2f38a9c540389ba01bdad769b16a522da8cbd9f229f6ff1c7b69d75282a39bf1914221603c165c2af0556db68
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize2.4MB
MD5d993afba57f762ac4f61ad8f770455a2
SHA1bbff77576b9f78eb594b47edd6cccfb42fb0b478
SHA25691380ead02f6cefba7bdc095907fa6b68f025b88c63b4575c337927157a6accb
SHA512e1e8e71fea57bb45f12f5be9f1eb6c1aaca49d63bb0af7ddf8e428c64ac06302ce8623ee50148765f5daa6ca5e3721595e30c65c3568e3260491ab9b4e4e1c42