Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 15:17
Static task
static1
General
-
Target
f627c5c8edf647d5f01d443fa16f44a0cf2e59e094679532c54244ce5f5be1c4.exe
-
Size
6.0MB
-
MD5
c10324bba0b1941f4e381cd43230780f
-
SHA1
34004ac99d53afa1246bb37042585f4bf586e2b4
-
SHA256
f627c5c8edf647d5f01d443fa16f44a0cf2e59e094679532c54244ce5f5be1c4
-
SHA512
5af9f2175d8d370d60009cb7a8addd00a177019abcfba14d721d66e4e9cfe318a8c9ad4abd6b71b257f50fa6426197fae07cc3a82dff1f51c289591656ecff41
-
SSDEEP
98304:JGPXsnwNfO6kaqJOsZQ9rBdYs58IvWf5DvbCXJUNZAGtDol4Pale8TZPAI8:JGPQwNfivv2hYs9WAONX9c4PaQG1AI
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Extracted
lumma
https://founpiuer.store/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" dedccc38a2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" dedccc38a2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" dedccc38a2.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection dedccc38a2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" dedccc38a2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" dedccc38a2.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1e50B0.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 405aeea74c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b6d2e3eb2d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dedccc38a2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2D4028.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3V00C.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 20 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2D4028.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3V00C.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dedccc38a2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1e50B0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1e50B0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b6d2e3eb2d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b6d2e3eb2d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3V00C.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2D4028.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dedccc38a2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 405aeea74c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 405aeea74c.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 1e50B0.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 13 IoCs
pid Process 4432 q6E15.exe 4948 C8E51.exe 4192 1e50B0.exe 4424 skotes.exe 4584 2D4028.exe 4128 405aeea74c.exe 1160 3V00C.exe 1292 4L806u.exe 4372 b6d2e3eb2d.exe 4456 skotes.exe 5452 dedccc38a2.exe 1804 skotes.exe 3148 skotes.exe -
Identifies Wine through registry keys 2 TTPs 10 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 1e50B0.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 405aeea74c.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine b6d2e3eb2d.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine dedccc38a2.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 2D4028.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 3V00C.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features dedccc38a2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" dedccc38a2.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b6d2e3eb2d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1004386001\\b6d2e3eb2d.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dedccc38a2.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1004388001\\dedccc38a2.exe" skotes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f627c5c8edf647d5f01d443fa16f44a0cf2e59e094679532c54244ce5f5be1c4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" q6E15.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" C8E51.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\405aeea74c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1004385001\\405aeea74c.exe" skotes.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000a000000023b9b-65.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
pid Process 4192 1e50B0.exe 4424 skotes.exe 4584 2D4028.exe 4128 405aeea74c.exe 1160 3V00C.exe 4372 b6d2e3eb2d.exe 4456 skotes.exe 5452 dedccc38a2.exe 1804 skotes.exe 3148 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1e50B0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
pid pid_target Process procid_target 1824 4584 WerFault.exe 90 2352 4584 WerFault.exe 90 4064 4128 WerFault.exe 101 2032 4128 WerFault.exe 101 -
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4L806u.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dedccc38a2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1e50B0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3V00C.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b6d2e3eb2d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language q6E15.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 405aeea74c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2D4028.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C8E51.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f627c5c8edf647d5f01d443fa16f44a0cf2e59e094679532c54244ce5f5be1c4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 1604 taskkill.exe 2912 taskkill.exe 3720 taskkill.exe 5068 taskkill.exe 632 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 4192 1e50B0.exe 4192 1e50B0.exe 4424 skotes.exe 4424 skotes.exe 4584 2D4028.exe 4584 2D4028.exe 4128 405aeea74c.exe 4128 405aeea74c.exe 1160 3V00C.exe 1160 3V00C.exe 4372 b6d2e3eb2d.exe 4372 b6d2e3eb2d.exe 1292 4L806u.exe 1292 4L806u.exe 4456 skotes.exe 4456 skotes.exe 1292 4L806u.exe 1292 4L806u.exe 5452 dedccc38a2.exe 5452 dedccc38a2.exe 5452 dedccc38a2.exe 5452 dedccc38a2.exe 5452 dedccc38a2.exe 1804 skotes.exe 1804 skotes.exe 3148 skotes.exe 3148 skotes.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 5068 taskkill.exe Token: SeDebugPrivilege 632 taskkill.exe Token: SeDebugPrivilege 1604 taskkill.exe Token: SeDebugPrivilege 2912 taskkill.exe Token: SeDebugPrivilege 3720 taskkill.exe Token: SeDebugPrivilege 3676 firefox.exe Token: SeDebugPrivilege 3676 firefox.exe Token: SeDebugPrivilege 5452 dedccc38a2.exe Token: SeDebugPrivilege 3676 firefox.exe Token: SeDebugPrivilege 3676 firefox.exe Token: SeDebugPrivilege 3676 firefox.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 4192 1e50B0.exe 1292 4L806u.exe 1292 4L806u.exe 1292 4L806u.exe 1292 4L806u.exe 1292 4L806u.exe 1292 4L806u.exe 1292 4L806u.exe 1292 4L806u.exe 3676 firefox.exe 3676 firefox.exe 3676 firefox.exe 3676 firefox.exe 3676 firefox.exe 3676 firefox.exe 3676 firefox.exe 3676 firefox.exe 3676 firefox.exe 3676 firefox.exe 3676 firefox.exe 3676 firefox.exe 3676 firefox.exe 3676 firefox.exe 3676 firefox.exe 3676 firefox.exe 3676 firefox.exe 3676 firefox.exe 3676 firefox.exe 3676 firefox.exe 3676 firefox.exe 1292 4L806u.exe 1292 4L806u.exe 1292 4L806u.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 1292 4L806u.exe 1292 4L806u.exe 1292 4L806u.exe 1292 4L806u.exe 1292 4L806u.exe 1292 4L806u.exe 1292 4L806u.exe 1292 4L806u.exe 3676 firefox.exe 3676 firefox.exe 3676 firefox.exe 3676 firefox.exe 3676 firefox.exe 3676 firefox.exe 3676 firefox.exe 3676 firefox.exe 3676 firefox.exe 3676 firefox.exe 3676 firefox.exe 3676 firefox.exe 3676 firefox.exe 3676 firefox.exe 3676 firefox.exe 3676 firefox.exe 3676 firefox.exe 3676 firefox.exe 3676 firefox.exe 3676 firefox.exe 1292 4L806u.exe 1292 4L806u.exe 1292 4L806u.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3676 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4344 wrote to memory of 4432 4344 f627c5c8edf647d5f01d443fa16f44a0cf2e59e094679532c54244ce5f5be1c4.exe 83 PID 4344 wrote to memory of 4432 4344 f627c5c8edf647d5f01d443fa16f44a0cf2e59e094679532c54244ce5f5be1c4.exe 83 PID 4344 wrote to memory of 4432 4344 f627c5c8edf647d5f01d443fa16f44a0cf2e59e094679532c54244ce5f5be1c4.exe 83 PID 4432 wrote to memory of 4948 4432 q6E15.exe 86 PID 4432 wrote to memory of 4948 4432 q6E15.exe 86 PID 4432 wrote to memory of 4948 4432 q6E15.exe 86 PID 4948 wrote to memory of 4192 4948 C8E51.exe 88 PID 4948 wrote to memory of 4192 4948 C8E51.exe 88 PID 4948 wrote to memory of 4192 4948 C8E51.exe 88 PID 4192 wrote to memory of 4424 4192 1e50B0.exe 89 PID 4192 wrote to memory of 4424 4192 1e50B0.exe 89 PID 4192 wrote to memory of 4424 4192 1e50B0.exe 89 PID 4948 wrote to memory of 4584 4948 C8E51.exe 90 PID 4948 wrote to memory of 4584 4948 C8E51.exe 90 PID 4948 wrote to memory of 4584 4948 C8E51.exe 90 PID 4424 wrote to memory of 4128 4424 skotes.exe 101 PID 4424 wrote to memory of 4128 4424 skotes.exe 101 PID 4424 wrote to memory of 4128 4424 skotes.exe 101 PID 4432 wrote to memory of 1160 4432 q6E15.exe 102 PID 4432 wrote to memory of 1160 4432 q6E15.exe 102 PID 4432 wrote to memory of 1160 4432 q6E15.exe 102 PID 4344 wrote to memory of 1292 4344 f627c5c8edf647d5f01d443fa16f44a0cf2e59e094679532c54244ce5f5be1c4.exe 104 PID 4344 wrote to memory of 1292 4344 f627c5c8edf647d5f01d443fa16f44a0cf2e59e094679532c54244ce5f5be1c4.exe 104 PID 4344 wrote to memory of 1292 4344 f627c5c8edf647d5f01d443fa16f44a0cf2e59e094679532c54244ce5f5be1c4.exe 104 PID 1292 wrote to memory of 5068 1292 4L806u.exe 109 PID 1292 wrote to memory of 5068 1292 4L806u.exe 109 PID 1292 wrote to memory of 5068 1292 4L806u.exe 109 PID 4424 wrote to memory of 4372 4424 skotes.exe 112 PID 4424 wrote to memory of 4372 4424 skotes.exe 112 PID 4424 wrote to memory of 4372 4424 skotes.exe 112 PID 1292 wrote to memory of 632 1292 4L806u.exe 113 PID 1292 wrote to memory of 632 1292 4L806u.exe 113 PID 1292 wrote to memory of 632 1292 4L806u.exe 113 PID 1292 wrote to memory of 1604 1292 4L806u.exe 115 PID 1292 wrote to memory of 1604 1292 4L806u.exe 115 PID 1292 wrote to memory of 1604 1292 4L806u.exe 115 PID 4424 wrote to memory of 2760 4424 skotes.exe 117 PID 4424 wrote to memory of 2760 4424 skotes.exe 117 PID 4424 wrote to memory of 2760 4424 skotes.exe 117 PID 1292 wrote to memory of 2912 1292 4L806u.exe 118 PID 1292 wrote to memory of 2912 1292 4L806u.exe 118 PID 1292 wrote to memory of 2912 1292 4L806u.exe 118 PID 1292 wrote to memory of 3720 1292 4L806u.exe 120 PID 1292 wrote to memory of 3720 1292 4L806u.exe 120 PID 1292 wrote to memory of 3720 1292 4L806u.exe 120 PID 1292 wrote to memory of 2512 1292 4L806u.exe 122 PID 1292 wrote to memory of 2512 1292 4L806u.exe 122 PID 2512 wrote to memory of 3676 2512 firefox.exe 123 PID 2512 wrote to memory of 3676 2512 firefox.exe 123 PID 2512 wrote to memory of 3676 2512 firefox.exe 123 PID 2512 wrote to memory of 3676 2512 firefox.exe 123 PID 2512 wrote to memory of 3676 2512 firefox.exe 123 PID 2512 wrote to memory of 3676 2512 firefox.exe 123 PID 2512 wrote to memory of 3676 2512 firefox.exe 123 PID 2512 wrote to memory of 3676 2512 firefox.exe 123 PID 2512 wrote to memory of 3676 2512 firefox.exe 123 PID 2512 wrote to memory of 3676 2512 firefox.exe 123 PID 2512 wrote to memory of 3676 2512 firefox.exe 123 PID 3676 wrote to memory of 2116 3676 firefox.exe 124 PID 3676 wrote to memory of 2116 3676 firefox.exe 124 PID 3676 wrote to memory of 2116 3676 firefox.exe 124 PID 3676 wrote to memory of 2116 3676 firefox.exe 124 PID 3676 wrote to memory of 2116 3676 firefox.exe 124 PID 3676 wrote to memory of 2116 3676 firefox.exe 124 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\f627c5c8edf647d5f01d443fa16f44a0cf2e59e094679532c54244ce5f5be1c4.exe"C:\Users\Admin\AppData\Local\Temp\f627c5c8edf647d5f01d443fa16f44a0cf2e59e094679532c54244ce5f5be1c4.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\q6E15.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\q6E15.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\C8E51.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\C8E51.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1e50B0.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1e50B0.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\1004385001\405aeea74c.exe"C:\Users\Admin\AppData\Local\Temp\1004385001\405aeea74c.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4128 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4128 -s 16047⤵
- Program crash
PID:4064
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4128 -s 16447⤵
- Program crash
PID:2032
-
-
-
C:\Users\Admin\AppData\Local\Temp\1004386001\b6d2e3eb2d.exe"C:\Users\Admin\AppData\Local\Temp\1004386001\b6d2e3eb2d.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4372
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"6⤵PID:2760
-
-
C:\Users\Admin\AppData\Local\Temp\1004388001\dedccc38a2.exe"C:\Users\Admin\AppData\Local\Temp\1004388001\dedccc38a2.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5452
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2D4028.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2D4028.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4584 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4584 -s 16125⤵
- Program crash
PID:2352
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4584 -s 15925⤵
- Program crash
PID:1824
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3V00C.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3V00C.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1160
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4L806u.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4L806u.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5068
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:632
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1604
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2912
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3720
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking3⤵
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking4⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2040 -parentBuildID 20240401114208 -prefsHandle 1968 -prefMapHandle 1960 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {889d17a6-914c-4686-9aff-0e290f09f512} 3676 "\\.\pipe\gecko-crash-server-pipe.3676" gpu5⤵PID:2116
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2476 -parentBuildID 20240401114208 -prefsHandle 2468 -prefMapHandle 2464 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6ffc3850-b767-47be-8a03-7acf8e17b9c1} 3676 "\\.\pipe\gecko-crash-server-pipe.3676" socket5⤵PID:2308
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3212 -childID 1 -isForBrowser -prefsHandle 3144 -prefMapHandle 3036 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1096 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f50e4ebb-e4af-4e40-9ff1-7c65b9cb60e4} 3676 "\\.\pipe\gecko-crash-server-pipe.3676" tab5⤵PID:2232
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3156 -childID 2 -isForBrowser -prefsHandle 3792 -prefMapHandle 3788 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1096 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b32cd3a7-0664-4c1b-967d-124d6341e105} 3676 "\\.\pipe\gecko-crash-server-pipe.3676" tab5⤵PID:3692
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4476 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4444 -prefMapHandle 4428 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {95b0d414-0dee-47f8-b86f-fc716440b3f9} 3676 "\\.\pipe\gecko-crash-server-pipe.3676" utility5⤵
- Checks processor information in registry
PID:5708
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5076 -childID 3 -isForBrowser -prefsHandle 5072 -prefMapHandle 5068 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1096 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {71a523db-243f-49b1-b6d1-55ad5b2ce6f3} 3676 "\\.\pipe\gecko-crash-server-pipe.3676" tab5⤵PID:1580
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5248 -childID 4 -isForBrowser -prefsHandle 5332 -prefMapHandle 5328 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1096 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {39e08c03-3a51-450a-9196-d8874fad173a} 3676 "\\.\pipe\gecko-crash-server-pipe.3676" tab5⤵PID:5020
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5440 -childID 5 -isForBrowser -prefsHandle 5520 -prefMapHandle 5448 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1096 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6563a0ad-c2cf-4c37-8aa7-0c911f7a252d} 3676 "\\.\pipe\gecko-crash-server-pipe.3676" tab5⤵PID:5088
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4584 -ip 45841⤵PID:2248
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4584 -ip 45841⤵PID:4472
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4128 -ip 41281⤵PID:1184
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 4128 -ip 41281⤵PID:644
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4456
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1804
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3148
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\85mw8mk9.default-release\activity-stream.discovery_stream.json
Filesize19KB
MD5c3141e091cd8b3b709e90efe20c902d6
SHA18f6989719d6921040fe2e9f4fb5c51ecfc79e605
SHA2563f7e3021ad4a9f059c9b1a4da83419a94636c3b95d961b0a1ff1b7794ed3c34b
SHA5123b7a7acb1fd111f79e58a89a178e2b821f22d29056ee84273dba253fe75a485c2d347b3666f0678e77c66408c4f6ae1eb2d5abfd32a15d278f69193af480e492
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\85mw8mk9.default-release\cache2\entries\D500AD994A7515157BB2A6ADD5B18B754E4D2F99
Filesize13KB
MD5f6caa833df16766e4f0d78ce62820b10
SHA1c3a622efc6b58864c304ca78c6d603fbaaba71a8
SHA2569e375a83a313f05da08aadc53fd743d8870db1c13c1e87352fcf8a2dacc0bac1
SHA5129ed1b95ddceddd366d41fa9115349dd5b4395828da7ad5be7578b65d064f1e1403c290e05dd5c552eadc836fce2e6043414ec3531318b7a7c1f989360638db11
-
Filesize
2.7MB
MD53bc828a8f628bc6199ab6d326d8248ce
SHA1a311d6b7bd0941cc55f34906ca985c2610c4cc39
SHA25617ece55200618f86244c2db2ed3ea84b6d8288488259c6285af7af0a66accdeb
SHA512403132549fc8ee39a6b6686709d2a8f47ef91d995e0dab5d78164104ace7b488e572e4ce4391f2c40ef61261e7418f369070734237a224cbd1686c54ca92aa89
-
Filesize
898KB
MD5bfff0711dc710a768efb377ec52d8675
SHA1cdae3316ae15804e7c9f3b5df4633cdba705e358
SHA256349f42274af7381354ebcfe56b2a9b5603bece7ed39c62b40cba761f62c2cc73
SHA5127bcfa71b2a38b5b58afb4ceb042ed81d28134f02129635814e3c7ef717f88dbfcf47d61bca7cf03ce50b0be51e889d8e0b9089afb7710e7e011ba581c9329a93
-
Filesize
5.5MB
MD5a97b51dd7d69a7959e545d9b7cd0f59b
SHA1b94169ab7e84855807bad56f663e7b04237a141e
SHA256abc7f6832c2fa1e2b00ad713bb50cd9a779fd26050a80f54aee054e1f494b66b
SHA512f1ad4edc84ef9c351feec606cd5d3f30bce898cdd9abe6a11d866adbbe6034f7bc8367844b1f25167a928b8e5b235cf8dd787deca923358284c56ab83d26e376
-
Filesize
2.0MB
MD521ac7507fffcd6e2b0274b32a35d9ad7
SHA16abdef1e24d7adf089866ad982f70e66079aee28
SHA2567a9977fddd91522541d5f875554010fb9a34f9ea6ea012693f675f09bc238c46
SHA5127e6646c241292b363d4bf3a7f3095751bbafa96d3eed924c9465dcdd399dc8c904d7193ec1436bb1982d7bee93572cc06f169144bc65cac5bb5551b223f8bc4d
-
Filesize
3.4MB
MD531f3f88d0b809e736e6e6a3ae1b25ac3
SHA1c4078c1afcd00336c0d5f74cc7dc9e9185c9e3ce
SHA2562921d270c0b955298380e3a88b3912644fa9d615b5e1bb097d65a8a6c0d6578a
SHA512dc888ad22a5c7f79187878fabb6482894e7fa5f5f7cdee5a2ee5008ec00a637ac868b920dcdbea14f08492221158e33f3d24cc3660f6355c8de853f2f7c78697
-
Filesize
3.1MB
MD5bfa41382e3fd3c4fdedf06cec3408f55
SHA1b0862bdbe47b056a050627f5fd0a43cf10c87b89
SHA2567a5647d5562383eed1c0fedaca9e020217ce144693197aa9e2188036d20fd8a3
SHA5126f31d9cf5127f1f30026e2b498e68b8d4c861053274aca4f59168146a0f853bbe1e47e22a1e6e412c554d5d6585445f74eadfe4b74aca3abd41f0b93951e09bf
-
Filesize
3.0MB
MD5ef8dc00b7c8a470542f0097d13b7c945
SHA19f2350ab147142d85f9744b886cecf536e75b263
SHA2563cf161b38a1f3d4a637b38128eafcdbeeee776124850f01ee688f64e5e946294
SHA512e86156689609d96bc94525847d471fd82a6da864c98e4f9fc8eaa20502567d878232eac88472543b078eb01d0ed6602a998a8ee26c64022eceb6fcb464f760d6
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\AlternateServices.bin
Filesize16KB
MD584b1f5566ce7349a7265cbde577572c8
SHA1dca021aa1ec0b4f014ddabfb13e0797376139834
SHA256a0425900fbaf81e809ea1db66d7dbd63570ada836b2f1401fd20cfba79f9ffbc
SHA512050da1c84e81b853ceb79626995bdb1f891a39b034113b8b25768254706190bf93263c97e49bf4dc4969b6e9bb9eba56c1621f9efb83c9e79430c8135fc915cd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\AlternateServices.bin
Filesize6KB
MD5faaf8d585989e82fb0fe1eb09272a0cf
SHA15a682a4cbcbe6371899c3021e4c158e79cbee51e
SHA2563b16732bba16c293bd7c85fa4b18bc0668b2cc243ba4b6db778447380fcc62a3
SHA512b5357dea1aaf493ad9196a56d090d586f576d9cf3dc8ff81710a1ab66c63fbd85451c44a18784d148c0cd37c798322da97b819c5c2ec412afbfb9e292e2bf53b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\AlternateServices.bin
Filesize10KB
MD53f7020823e62639092d822967c7a0a90
SHA1bfab020c7d8756cb4431a75fde2640d16fe42723
SHA256aff64196f043e5a2dd6a4dfbc819944a200a603f2003c327f5006f4a958517ed
SHA512fa8807d951c8596f6ea051cc098e51e28d002a0dba6c321dbf7779cf858dc307995cc9758f77bca3b1f047c905a0b1900204e8b62bd08597951c95e58a321c7a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.bin
Filesize14KB
MD5ac7cb301db841eba18998e46d7f6eb3a
SHA14a93f4bf023365b9432e1a748b2aa0bd5191982e
SHA2561183a65b210d1b0643d9d25829db1e71078d97bb2d847f4e99dd686c43d46f79
SHA512660fb03e4f5809e2ce64d45da858ffe32e0dde7438e2116a793efbe58a602e03f35266d48dfc12d10a60833e6c3d3abe7ff3cb78965fd042654e7d8e2d685ff4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.bin
Filesize5KB
MD5f5eca966552a756e6469b45b9d1930bb
SHA1ac1647e843d5a0529a01df25166f89b8a13b6897
SHA25686e72539340189f6896cc6d6ee7cfdcfb0c98fac0be6909907adcf4c20f470e8
SHA512e738fe5d900878c7560309c3a2cbecca0da508f1e33f5bebc901685adf1cefb14ac4d4cbecf4d3896809c129b102d2c250579ea1407a365baf5a5a765841a3ac
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.bin
Filesize15KB
MD5f6b85c095baca199edcf37b7323a042c
SHA15a9e99de1fd6ac3bca3c971d2a73b201d0b53992
SHA25626a1032d79f3d66727a0e74f1bb361d85750ffb47c6328ffc81b24970670997b
SHA5121c70dcf9b7b595f8544810f1d8299e3d3509e552627161721f0d65bf293bc847754d986936bae332f4c803bd3d62866bf1c0a04f203b1484fda0d116272dbafc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.bin
Filesize23KB
MD58301a02d4e6a7f19d85cbd7a51e7037b
SHA1f7a599638482846767bcde073c2d236387be7f12
SHA256473c5b925a847392da859d5858d357a95f7aefc3ce25239a9ec62d97f981280f
SHA512fdde156c5b35d2ef8da722d5726cabb8bae87c94f84b124ba951a8d6ef1df4a3e75d9386b703afce02d5425a5bbf93a4400c192c6edf525e5435e9c12e1e50e6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5e59f52144021c639bf102d35df270fa9
SHA1213fb2bde4107ec0d066abd97cf9a18bee30131e
SHA25611e50062cbf9f7b57e68608e3b8b3f4cabc28535ad88a4ec46878fa406eabac6
SHA512974d3e31de81f2e69bdb6b471eae1e23ffbb48e9805a1f593b90c1e58fc3d687f9b6e2c3cb539b9739671e11d5ecad53149aeb537602656b7b7e2fce1b714836
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5cf8d0b9b615140c0345dde944a9e8547
SHA139bc2b1e2b14d8bb5661edb4ea17fd7145371288
SHA25666814c59f3d0c13049ebfa21ced8045644420358b8009e27a6e3cbfcc25cd240
SHA512df21b2ddb80837a87acfedd56d1993823a3293d8061bd5d689b1d933448f6f65f6d1240fb3887e5581797c0b1cfed293102662118cbd0b29d83ad7ec314052cc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD50236ebcb683dfacc86dbbf58a397799c
SHA1c45d734bf04ad44dc94464900ded9ff976220b95
SHA2566134eb5209e2f23aa246fe858b97f17ac55595a799478f1a18d5ec75eeac2063
SHA5127465c3510e5f27e29e66f207063d2243a5889bc1b108f26ad048b0b76aeaf4417f18c4a3cafed3b2b31e61416f5e6f4a54c5f1fd21ec9c487e8a865fffa4fac3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5545023fe866c33fdc96234d02f1c4437
SHA141cb6ac43b5c49b4348f1e5716f9a10de080142b
SHA256033857c5cfff0d77b4ec754e3bb871a0c7ee6726f3d88a9bee8a6ac8be915f7f
SHA5129eaf5065bae6731606fbd1187b7e62069717b6a2fcb4c083a1f791ec54f1d8c358293f4e435c7fb365d510d8e946411e90e59329effe695827c7437a4d06f063
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5958e8d99f4412e16e0c254289889734f
SHA124d96a6cb747506d309384821b6d9d228cf12c49
SHA256304c6617e5e8ab5928b9d760aa93ebeb975e7381603ee44110a566e06af9fa6b
SHA512b5decb9d1c4c7bdfe1034da473d3ca3bab03238284fde7e2acc7ae5dbf325cbeba0d94aa52e605a2c0583ad85da1f9dd7c0301a8a89a4df2b78bbee601967eb5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD56af463eae258b5d32d474fd475446f5c
SHA1ce14494d452eac9ab0bb395310127fd138a7f0ce
SHA256c47b0fbbebe4595567a096cf97ac9fe867329aa57ffb0dff4f81eed71562d696
SHA512e0d229f024724a1e974e16c924ab02364df56c085b0bf4bbf78e870f0ee33df25655d91b531addd43286c118f96d49d4464b9d5ef073b92aa626c3d7154a4a6a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\pending_pings\0bdd7788-0453-4476-b50f-452f8e9a4f3e
Filesize27KB
MD5765694d0d5695282db0f5a9a9289c299
SHA1fddb9124e3bc8a314d4dde83240f46b0ce79f6d3
SHA256fde7f9827def52c5af78e53163d83041774df543a23b57dc78290434d4d71a28
SHA5125f0c4486c2fa61558271b3af374e3c0da559635920ab7bf9a5907d04dfae7542e23211a52f38f9ea43112dda7e354e80fcb2a1eb2c9d89d6c89af1acbeb56c0b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\pending_pings\2978c418-0313-45c3-90c8-73aa9113edb8
Filesize982B
MD5f7a1d72571c1807b5390cbfbf541df48
SHA1ca1c10deca6bbb60ddc00dc7ce2ea7999ee6a31d
SHA2566ec14c0c38646e6bed3cb4176019d9c4b8a4d1b9945b83bc5ba5e5dc5567e47d
SHA512622a1d5817b48499a8a1c813ed2cfe36014e34258095a236f12fba32ac5c3e1b583b36e045c8ea4253ae7eac4f5742d5055398e6d918dd38855c770c7b83f635
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\pending_pings\e471f103-d232-4ed8-bca7-8e54798ac178
Filesize671B
MD5a081d57e16d9f3567877003ff956bfd7
SHA172ffabb95c751f1a80aecb9fd70bf33777b30b62
SHA256f5b4711b71340141900b90fc70bd2d4ce470140497c6793e093e76f634ffd689
SHA512debc51ae7d8b0dfd97697a27fb8a56ce4c39edd9fd0c34a52768d23d51a2b4771e9a4b5cb8e5f9f94f1ebf1e97eacb00e33b5186757dda52d0987f20ed098c2e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD58fccc19d4731875aa204ad12b4e84400
SHA1e7cf7198596ed8bd0bb0ad8a9c5846c2d89075ff
SHA256e1cb7ea65eb84005a051cfba76eaeebef84d638820680cb29e4fdc88055b3683
SHA512122b61ac8a313c85e32865b492fec403b6e948f2548cc3e4409ff042c362ffb363d7cb4b934d9aabedcd516dd837966670433cd4cefe938c3360f1c6f0884102
-
Filesize
11KB
MD5b6bbf641d733e12d81ff7c44ba59a213
SHA1df6e86b0df14fb0570e912dc23d071abc4712f1f
SHA2566b24a6a8d7042cdf0eaede434796e201a0a8fbb22aa9906e4660769b9d2eebd3
SHA512393a4f669d6f508faba9b2214e3a7f0c4034751293f113941a566e8051b3859b131d9e569b46fe3b40a80d4d25c7b4a539726ab2aec705dee898948389c129cd
-
Filesize
12KB
MD5087c6d776543ea330e5be242a37e30f0
SHA16992a9eca3dbdcb78063da147c6596a45239e79d
SHA25608cb6ac26e9d9cc94e39bb32e73f17d3e7d4b8b694aaf1673e1b283d95bea396
SHA51290683b2d1d47c1875a975a316e945219ee7aa47068dabb3400ec049df484575a4ab64cfafbade3784bf44727739bb3f3342e33d5fb9720db49e34503ba6564dc
-
Filesize
10KB
MD524217d6cf2c9a98118138bebaa44a8f6
SHA169be412a8926cdaa9bb481357299b91eca3cf2f2
SHA256074f9a16a34ffdb8a1c8bd38fad94f0f283c8dcca4287f17d8a6c7c89513539c
SHA512bca8bb9b1097adc21c95b7c8a91fd6b8459deff5857f475f7c726d0168d2ce6a30cf3b7aa8a736a870adffa2a9dfe4ab665cdad4d16b399e66c17bd241152f93
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\sessionstore-backups\recovery.baklz4
Filesize4KB
MD58e59b343254b12f38c4abc8a136e7ffa
SHA19cd25c038142947b48dedf5774b018c4d67d6104
SHA25606f4e9072e7269453403f3e7eb404c51832180ea3cddc3bfc25f380c53ce9de9
SHA512f546e29c25a3190b59cbaec55e2f6904e113894efd395021dafcb7a185ba0697858e75a3f8029a34a520da32fa54d33713251fac83c502e227211fd90b598527
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize1.6MB
MD57287b879ba2820862b249a59db49a53b
SHA1226b217a57fae56798d4adf4c60a7c877e632d48
SHA2567645cb9dc873c9289f4f9e12ce945ab4397e4fd82771b0269a66c791104da943
SHA5127ef6c5cb6fe74f2dba31db07b2fb4125ddcb290bc7920d26f4556ee8ec58becc62ac43390cbce4ab9ce43b942bb1592e2e1b85d7c9c81d7e1aaa2b48f6f16504
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize1.6MB
MD5225a219952ffb937d9039f2df1223099
SHA1e018ea0442ec894773fc70d0ccca100f34e24de8
SHA25605b9ac0da56e42d78bbd6be82370cb286abdf6697754691016780795eb76b94a
SHA51259dd4c91d836026a70e85129a65ed248deb9093d88ec89c57c7201a6e91d23125c9339396779f639bd3da7f8de4d67cc905bfd1ecf273dbeb9ceb94b9b7e0f18
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize1.9MB
MD5791c6f583a7940f46545f1941f159480
SHA11387f0fdc97ec489e90a97dc00aa5c938f32d102
SHA256a5a014cf7524f43c923996611653a8180360a325c3cb0d834ac388d9915a349f
SHA512aa50827612f9d9a03f8fb9a9f0f7ea20110046e75e8d0b21815209f6a9996c53e5d2cf978a2860b0c5d0a098ac22de0f21a9eeca46a3d6fe6fe4a4e87cde2ec3