Analysis
-
max time kernel
142s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 12:16
Static task
static1
General
-
Target
baf8b7e2ee48818deb6635d14afd2b14e278d5cb5e5fef5e57ee1f0aace06365.exe
-
Size
6.0MB
-
MD5
ecece534e2fd7875af0841e4bc37e9e6
-
SHA1
89f7f4b8f67d1f8253918072b981dcfcb36dc07f
-
SHA256
baf8b7e2ee48818deb6635d14afd2b14e278d5cb5e5fef5e57ee1f0aace06365
-
SHA512
a0d0a904e855c3f2d873f73455ad58ba621038096c3576f248fc213aad2d5d9ea9ad93597375f510c4de6800ed35d2159154076d22868f5b7250b6da73cb2283
-
SSDEEP
98304:vmc7JUm6S+mAtr4/k26EcFtKEyzXz/KEIhkBzc9apvD3XfsSse9SprSv05:vDNc2AFkTz/KE3dWIvDnUje9UM05
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Extracted
lumma
https://founpiuer.store/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" e52bc714c6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" e52bc714c6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" e52bc714c6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" e52bc714c6.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection e52bc714c6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" e52bc714c6.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ cf84f31b05.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4eb745d79c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3M68J.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e52bc714c6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1L28p9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2v2108.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 20 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cf84f31b05.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4eb745d79c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1L28p9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2v2108.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1L28p9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3M68J.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3M68J.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cf84f31b05.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e52bc714c6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2v2108.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4eb745d79c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e52bc714c6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 1L28p9.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 13 IoCs
pid Process 2132 t3t64.exe 3232 g4p56.exe 4492 1L28p9.exe 4680 skotes.exe 2428 2v2108.exe 1000 3M68J.exe 1708 4E887r.exe 3584 cf84f31b05.exe 5960 4eb745d79c.exe 6364 e52bc714c6.exe 6560 skotes.exe 7004 skotes.exe 3316 skotes.exe -
Identifies Wine through registry keys 2 TTPs 10 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 3M68J.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine cf84f31b05.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine e52bc714c6.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 1L28p9.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 2v2108.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 4eb745d79c.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features e52bc714c6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" e52bc714c6.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" baf8b7e2ee48818deb6635d14afd2b14e278d5cb5e5fef5e57ee1f0aace06365.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" t3t64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" g4p56.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cf84f31b05.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1004602001\\cf84f31b05.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\4eb745d79c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1004603001\\4eb745d79c.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e52bc714c6.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1004605001\\e52bc714c6.exe" skotes.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0007000000023c8e-47.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
pid Process 4492 1L28p9.exe 4680 skotes.exe 2428 2v2108.exe 1000 3M68J.exe 3584 cf84f31b05.exe 5960 4eb745d79c.exe 6364 e52bc714c6.exe 6560 skotes.exe 7004 skotes.exe 3316 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1L28p9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 1436 2428 WerFault.exe 90 3900 2428 WerFault.exe 90 5404 3584 WerFault.exe 119 -
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language baf8b7e2ee48818deb6635d14afd2b14e278d5cb5e5fef5e57ee1f0aace06365.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1L28p9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4eb745d79c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language t3t64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e52bc714c6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language g4p56.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4E887r.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2v2108.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3M68J.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cf84f31b05.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 5108 taskkill.exe 4488 taskkill.exe 4844 taskkill.exe 536 taskkill.exe 2040 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 4492 1L28p9.exe 4492 1L28p9.exe 4680 skotes.exe 4680 skotes.exe 2428 2v2108.exe 2428 2v2108.exe 1000 3M68J.exe 1000 3M68J.exe 1708 4E887r.exe 1708 4E887r.exe 3584 cf84f31b05.exe 3584 cf84f31b05.exe 1708 4E887r.exe 1708 4E887r.exe 5960 4eb745d79c.exe 5960 4eb745d79c.exe 6364 e52bc714c6.exe 6364 e52bc714c6.exe 6364 e52bc714c6.exe 6364 e52bc714c6.exe 6364 e52bc714c6.exe 6560 skotes.exe 6560 skotes.exe 7004 skotes.exe 7004 skotes.exe 3316 skotes.exe 3316 skotes.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 5108 taskkill.exe Token: SeDebugPrivilege 4488 taskkill.exe Token: SeDebugPrivilege 4844 taskkill.exe Token: SeDebugPrivilege 536 taskkill.exe Token: SeDebugPrivilege 2040 taskkill.exe Token: SeDebugPrivilege 4132 firefox.exe Token: SeDebugPrivilege 4132 firefox.exe Token: SeDebugPrivilege 6364 e52bc714c6.exe Token: SeDebugPrivilege 4132 firefox.exe Token: SeDebugPrivilege 4132 firefox.exe Token: SeDebugPrivilege 4132 firefox.exe -
Suspicious use of FindShellTrayWindow 32 IoCs
pid Process 4492 1L28p9.exe 1708 4E887r.exe 1708 4E887r.exe 1708 4E887r.exe 1708 4E887r.exe 1708 4E887r.exe 1708 4E887r.exe 4132 firefox.exe 4132 firefox.exe 4132 firefox.exe 4132 firefox.exe 1708 4E887r.exe 4132 firefox.exe 4132 firefox.exe 4132 firefox.exe 4132 firefox.exe 4132 firefox.exe 4132 firefox.exe 4132 firefox.exe 4132 firefox.exe 4132 firefox.exe 4132 firefox.exe 4132 firefox.exe 4132 firefox.exe 4132 firefox.exe 4132 firefox.exe 4132 firefox.exe 4132 firefox.exe 4132 firefox.exe 1708 4E887r.exe 1708 4E887r.exe 1708 4E887r.exe -
Suspicious use of SendNotifyMessage 30 IoCs
pid Process 1708 4E887r.exe 1708 4E887r.exe 1708 4E887r.exe 1708 4E887r.exe 1708 4E887r.exe 1708 4E887r.exe 4132 firefox.exe 4132 firefox.exe 4132 firefox.exe 4132 firefox.exe 1708 4E887r.exe 4132 firefox.exe 4132 firefox.exe 4132 firefox.exe 4132 firefox.exe 4132 firefox.exe 4132 firefox.exe 4132 firefox.exe 4132 firefox.exe 4132 firefox.exe 4132 firefox.exe 4132 firefox.exe 4132 firefox.exe 4132 firefox.exe 4132 firefox.exe 4132 firefox.exe 4132 firefox.exe 1708 4E887r.exe 1708 4E887r.exe 1708 4E887r.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4132 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4880 wrote to memory of 2132 4880 baf8b7e2ee48818deb6635d14afd2b14e278d5cb5e5fef5e57ee1f0aace06365.exe 86 PID 4880 wrote to memory of 2132 4880 baf8b7e2ee48818deb6635d14afd2b14e278d5cb5e5fef5e57ee1f0aace06365.exe 86 PID 4880 wrote to memory of 2132 4880 baf8b7e2ee48818deb6635d14afd2b14e278d5cb5e5fef5e57ee1f0aace06365.exe 86 PID 2132 wrote to memory of 3232 2132 t3t64.exe 87 PID 2132 wrote to memory of 3232 2132 t3t64.exe 87 PID 2132 wrote to memory of 3232 2132 t3t64.exe 87 PID 3232 wrote to memory of 4492 3232 g4p56.exe 88 PID 3232 wrote to memory of 4492 3232 g4p56.exe 88 PID 3232 wrote to memory of 4492 3232 g4p56.exe 88 PID 4492 wrote to memory of 4680 4492 1L28p9.exe 89 PID 4492 wrote to memory of 4680 4492 1L28p9.exe 89 PID 4492 wrote to memory of 4680 4492 1L28p9.exe 89 PID 3232 wrote to memory of 2428 3232 g4p56.exe 90 PID 3232 wrote to memory of 2428 3232 g4p56.exe 90 PID 3232 wrote to memory of 2428 3232 g4p56.exe 90 PID 2132 wrote to memory of 1000 2132 t3t64.exe 100 PID 2132 wrote to memory of 1000 2132 t3t64.exe 100 PID 2132 wrote to memory of 1000 2132 t3t64.exe 100 PID 4880 wrote to memory of 1708 4880 baf8b7e2ee48818deb6635d14afd2b14e278d5cb5e5fef5e57ee1f0aace06365.exe 103 PID 4880 wrote to memory of 1708 4880 baf8b7e2ee48818deb6635d14afd2b14e278d5cb5e5fef5e57ee1f0aace06365.exe 103 PID 4880 wrote to memory of 1708 4880 baf8b7e2ee48818deb6635d14afd2b14e278d5cb5e5fef5e57ee1f0aace06365.exe 103 PID 1708 wrote to memory of 5108 1708 4E887r.exe 104 PID 1708 wrote to memory of 5108 1708 4E887r.exe 104 PID 1708 wrote to memory of 5108 1708 4E887r.exe 104 PID 1708 wrote to memory of 4488 1708 4E887r.exe 108 PID 1708 wrote to memory of 4488 1708 4E887r.exe 108 PID 1708 wrote to memory of 4488 1708 4E887r.exe 108 PID 1708 wrote to memory of 4844 1708 4E887r.exe 110 PID 1708 wrote to memory of 4844 1708 4E887r.exe 110 PID 1708 wrote to memory of 4844 1708 4E887r.exe 110 PID 1708 wrote to memory of 536 1708 4E887r.exe 112 PID 1708 wrote to memory of 536 1708 4E887r.exe 112 PID 1708 wrote to memory of 536 1708 4E887r.exe 112 PID 1708 wrote to memory of 2040 1708 4E887r.exe 114 PID 1708 wrote to memory of 2040 1708 4E887r.exe 114 PID 1708 wrote to memory of 2040 1708 4E887r.exe 114 PID 1708 wrote to memory of 1728 1708 4E887r.exe 116 PID 1708 wrote to memory of 1728 1708 4E887r.exe 116 PID 1728 wrote to memory of 4132 1728 firefox.exe 117 PID 1728 wrote to memory of 4132 1728 firefox.exe 117 PID 1728 wrote to memory of 4132 1728 firefox.exe 117 PID 1728 wrote to memory of 4132 1728 firefox.exe 117 PID 1728 wrote to memory of 4132 1728 firefox.exe 117 PID 1728 wrote to memory of 4132 1728 firefox.exe 117 PID 1728 wrote to memory of 4132 1728 firefox.exe 117 PID 1728 wrote to memory of 4132 1728 firefox.exe 117 PID 1728 wrote to memory of 4132 1728 firefox.exe 117 PID 1728 wrote to memory of 4132 1728 firefox.exe 117 PID 1728 wrote to memory of 4132 1728 firefox.exe 117 PID 4132 wrote to memory of 2816 4132 firefox.exe 118 PID 4132 wrote to memory of 2816 4132 firefox.exe 118 PID 4132 wrote to memory of 2816 4132 firefox.exe 118 PID 4132 wrote to memory of 2816 4132 firefox.exe 118 PID 4132 wrote to memory of 2816 4132 firefox.exe 118 PID 4132 wrote to memory of 2816 4132 firefox.exe 118 PID 4132 wrote to memory of 2816 4132 firefox.exe 118 PID 4132 wrote to memory of 2816 4132 firefox.exe 118 PID 4132 wrote to memory of 2816 4132 firefox.exe 118 PID 4132 wrote to memory of 2816 4132 firefox.exe 118 PID 4132 wrote to memory of 2816 4132 firefox.exe 118 PID 4132 wrote to memory of 2816 4132 firefox.exe 118 PID 4132 wrote to memory of 2816 4132 firefox.exe 118 PID 4132 wrote to memory of 2816 4132 firefox.exe 118 PID 4132 wrote to memory of 2816 4132 firefox.exe 118 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\baf8b7e2ee48818deb6635d14afd2b14e278d5cb5e5fef5e57ee1f0aace06365.exe"C:\Users\Admin\AppData\Local\Temp\baf8b7e2ee48818deb6635d14afd2b14e278d5cb5e5fef5e57ee1f0aace06365.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\t3t64.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\t3t64.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g4p56.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g4p56.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1L28p9.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1L28p9.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4680 -
C:\Users\Admin\AppData\Local\Temp\1004602001\cf84f31b05.exe"C:\Users\Admin\AppData\Local\Temp\1004602001\cf84f31b05.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3584 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3584 -s 15967⤵
- Program crash
PID:5404
-
-
-
C:\Users\Admin\AppData\Local\Temp\1004603001\4eb745d79c.exe"C:\Users\Admin\AppData\Local\Temp\1004603001\4eb745d79c.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5960
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"6⤵PID:6188
-
-
C:\Users\Admin\AppData\Local\Temp\1004605001\e52bc714c6.exe"C:\Users\Admin\AppData\Local\Temp\1004605001\e52bc714c6.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6364
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2v2108.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2v2108.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2428 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2428 -s 15885⤵
- Program crash
PID:1436
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2428 -s 16005⤵
- Program crash
PID:3900
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3M68J.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3M68J.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1000
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4E887r.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4E887r.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5108
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4488
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4844
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:536
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2040
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking3⤵
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking4⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2020 -parentBuildID 20240401114208 -prefsHandle 1936 -prefMapHandle 1928 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {cb5f2ff1-e9e9-4de8-ab86-b991a62b1f16} 4132 "\\.\pipe\gecko-crash-server-pipe.4132" gpu5⤵PID:2816
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2440 -parentBuildID 20240401114208 -prefsHandle 2432 -prefMapHandle 2428 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {da5c8046-f724-4598-8570-b9dc3c65af81} 4132 "\\.\pipe\gecko-crash-server-pipe.4132" socket5⤵PID:2876
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3432 -childID 1 -isForBrowser -prefsHandle 3424 -prefMapHandle 3420 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 988 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4f2c19f4-36be-41a5-8f1c-2cee86a4f644} 4132 "\\.\pipe\gecko-crash-server-pipe.4132" tab5⤵PID:588
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3780 -childID 2 -isForBrowser -prefsHandle 3776 -prefMapHandle 3772 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 988 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fec3942e-2b3e-4e41-8604-295c0cb8801c} 4132 "\\.\pipe\gecko-crash-server-pipe.4132" tab5⤵PID:3440
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4544 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4748 -prefMapHandle 4756 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {87f6bc85-8f12-453c-9908-10d17427f270} 4132 "\\.\pipe\gecko-crash-server-pipe.4132" utility5⤵
- Checks processor information in registry
PID:6376
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5272 -childID 3 -isForBrowser -prefsHandle 3980 -prefMapHandle 5300 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 988 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {21a8fb92-6695-40d7-8531-30a6ace66ba6} 4132 "\\.\pipe\gecko-crash-server-pipe.4132" tab5⤵PID:3940
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5512 -childID 4 -isForBrowser -prefsHandle 5520 -prefMapHandle 5524 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 988 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fd8a3720-9543-4e18-bc73-6984ff903cb8} 4132 "\\.\pipe\gecko-crash-server-pipe.4132" tab5⤵PID:3532
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5792 -childID 5 -isForBrowser -prefsHandle 5784 -prefMapHandle 5780 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 988 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {10cb0fbf-253e-4667-bbab-869cf79fd9dc} 4132 "\\.\pipe\gecko-crash-server-pipe.4132" tab5⤵PID:1208
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2428 -ip 24281⤵PID:4276
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2428 -ip 24281⤵PID:4520
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3584 -ip 35841⤵PID:5300
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6560
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:7004
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3316
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ws2kncw.default-release\activity-stream.discovery_stream.json
Filesize19KB
MD54e203deeff34faa4bdca0e73045fb09f
SHA1f3a17f0eb60a7c3c0a72a920a78b198918780612
SHA256efbe6c5425d2f91d56c0eb5796dbeefaf3de659eea1d8f32d2590c34f62b81d9
SHA5123d18e68839651af740dfd20d94c4644939b29b6c722f5bed8096b5d4e34371e368854fb3743f30a85cdd0bd3695d68947e9d1a4f004bc61139b2ed640ace9aa2
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ws2kncw.default-release\cache2\entries\D500AD994A7515157BB2A6ADD5B18B754E4D2F99
Filesize13KB
MD535229293fa8be2795df607622c54ae2e
SHA14186c4b4f77f52d119177dd4b91ea7c02d2b599a
SHA2560b208eeb9b13bbb7e8682fd90af383163b8aa637c1a93d2664d1f98a1efebd88
SHA512d8a7fde27294aa3a11992339c60f76aa211818175289a3d631ea248255395881c457c80c18a3c6aa36325e6cc02d297e305f7755a4f1f5f0816270e74be0dfd9
-
Filesize
3.0MB
MD51049d6c72a807361508643e0d57c0abc
SHA1b431e1736922fab8553ba5a0818890b5f7f774e7
SHA2561d32662fb0f86e9f7da870ce4868edf093140ef0282f2d32a217e8f4f49c751a
SHA512e45d17243be335c930a7f2b5289f613af20f07ab6253fc8f3b9bae43f5f08f58479188eaecf8915207e1b6abf9f21e565b0922033eb3104d04ddb0a9ed72e5a0
-
Filesize
2.1MB
MD555358d794dcc2ca7ed8167f6efa19d1e
SHA1dbbb0c51b1806291668092b573098bdfb31e0dc4
SHA256a96804ad4921a6d278b7d44b12a3d29f9fc9e3646e8ac63c811c75d1bf6ce90a
SHA512a1b9c098eabcfb0a579e7f65d36228920f882ca1ab57afc748280c90ca265d826b7e2a69845f9a35527744d64fae26ecc10ea6b3674ab1eebfaaf5827bc07644
-
Filesize
2.7MB
MD5ea19e2180e8d8ddab430a332a4ef8703
SHA14b11a13d49b7c567cbac7623adb335877c708801
SHA25630ba58e31b4b4939caa1ce9e18f9c8ac1161d64221f2b768ec61918596a72890
SHA51215b3249a67bcc4c5b878b169147dd4e046394a4402ca8dc838883562c65efdb2ce8fb86375e39edcc6d36d1bab85079851d34a49c302b3034424d187b6bc829a
-
Filesize
898KB
MD59f64a2ad043d0815592dad4733c739e3
SHA15df0267d6b57d803ca227358c78ff0035696efa1
SHA25624b6598a2fce9276d978853f8ee7ef03ec43636ade375c22938221ec9be93843
SHA512e6e8ffb79c4f31f694d68ab6781d1ee514800cd5019333e96aa4b464fb3467375953fb7a6d6f51917b26091361949e0ae4c0caae5905634ddfd660f42e4d71f7
-
Filesize
5.5MB
MD5dbe3da375d481cae01228af9df6fccfd
SHA1507c4bee9a1abe78409186fa15c227303a22739e
SHA256c01a584e389f50ffea7a2da171ff2e86c0d38977d0031c82ed2fd817f81e09ab
SHA5124e83c7e5161698201875a8510b43b5d4406424292258a27ac049915e4a15996417013a593e34477151d13dc69105a1c95d2c2156ce4956e5b1599535d118bdcf
-
Filesize
2.0MB
MD59e9d31eba7c246e195f2c97e3cc2f492
SHA1f9aa0488a34cfb533684c1244c979ab9a2acd8df
SHA256cf390add5c6914d74ae8393be745cc14ab43542f986f985f30d18f9181a34a23
SHA512a7cfd1933259f0d39f63fff1a36f6c03a60f240cabd1e18189c8310f3820428d091dda903873ba1104a7301144b0923d49fe092eca7703297f66f37f65e0a436
-
Filesize
3.4MB
MD58cc70cd6030b5f707b06037ede97235b
SHA1f31286d8a47a56095e94588283157745c0687e91
SHA25660abf9524de1ea4ce7b26e22f7410e9b7d60acf9d5045a5a558d570a53734425
SHA5120b4160725085ef7ac16124cc28f1322f57cd880100a5676b0e52edcf1aa4bf6467eceecb6959283bca76381436025cae4bfb87d691d1693cebc11a3fbb82fe5f
-
Filesize
3.1MB
MD546465c85a1ff3747b195b7638ddd42d0
SHA1ec707c4a58c19d6bfddfa11097730521c5b43698
SHA256edc41ee27d1580b4f0b0d94633c81320cbbc55a00f304cd2956673bdaf36f79a
SHA5126727396a3c596b33a20728048999125e5007adaf85625ffaf1d4e81d1afe78d741dbe7adc6cb70df8fbb5fa6ac2412fa4b075d9aef2c2ca8134e125b97b2de99
-
Filesize
3.1MB
MD5ba4f3e063cc29e24e49e7bf0b8272312
SHA10baed49558f88d6da8b30bcb4a4a5b17e1b070ff
SHA2566e139931e2e96d0c0131ff0c704d66816627a683bd54d63a1de03762198bafcc
SHA512c901fc3ef890fdf734be6e99845bba403910282025fa7fe7534cddd387ae59128929c5d1bade1990309e78a42e1a44d4b0c0ece452a1e40401bf6104bfd6ceed
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin
Filesize18KB
MD5ed388d2d86bb019856ed56b3f4ad9a5b
SHA1bb0b3a6edf3c6a6b4366dc30e783f8697c691edc
SHA256cae37c2548ad7b7d17aa1b401b76c5f56aeab5cf2d32b567ceafaf1b0a4d2bc9
SHA512735a1dc09276abb78dd32449bbf26aa4b330d7a02f33e31246226c0a46b13cd6cdcb06b6c2d9da1b8bb2ed750d685063a0fa3af818dcc93d3461a88100c3a15d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin
Filesize8KB
MD59786abb72775e530dc7f618f1e0637f5
SHA103f587bc36bc7f9330c36e006bd2b67133168398
SHA2566197b3b8bfa4b7e45d9b1b9d89ee0209550338e73c0f4f9fed1915b36a36a961
SHA512a3c7aa1a2a6328721a32b0117a518914722dc46f00ad8829b51f5420a64ca7d3863f70e68e19c193ab6ecccc7927bc6f02b717dcf5d6803cb32758ec3e406805
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin
Filesize10KB
MD55f6f85e4c4c1f9ebcb2a5fd903990c9e
SHA195a9137706d17b3dcefb5d2d2055cab0ad0cd706
SHA256ed5956c091a5aaa3b5bfbce24f45679adf1bd8ee66afba37bfe7353d1379b353
SHA512b62739997003231547f597cc34c84c5f61d3dc162b01e492a77d799ae5207086ed74055a310b0add5a528d0ef7377c912408c5f56d07ffc197eb792796d43e94
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.bin
Filesize23KB
MD57c2edec99c594f08af123e79c92f3483
SHA199fdf4ad6c10ff2c5e599769480fe7dfbe6708c8
SHA256b851ad5d99ebce7e612d6bc15f01c5e14140187a80593f8dc05208abd967d360
SHA5128afb68fb8081c00e4b7270770423a6c73aa7500886d335436258e4d25e2d362a52f91ec674dac06b36ca6a1c27f8659a70b311852a25c9bda674f8c618f9c341
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.bin
Filesize14KB
MD5f3103b909843a4fa0f7736b0b3688357
SHA168a92ac01fa91205449af98513dfa4a44cd35cac
SHA256bf68cb5c0f95b07a5fc2982cb593de26e32e16ca1b35a466f142f0187725bdd6
SHA51289e3b579164cb3c7d78af699b4c5a0ac9fccb783b46fc288b8f8cae2b2da75f81f0b26593b3aa55f4d0d927ac0604132ffb2fb43d39c98fbbfa3f06590b1e3d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.bin
Filesize6KB
MD569976eab9064c10c722864effc2637e2
SHA1b5f685f85d5caeb774f71e16f9c65dd4c7f46899
SHA256a594e2d82742bdfdf572dea9ad56ca2d7cffd8083ef0f9b4f18e797c0bc3f594
SHA512758efb838336ab9cc0fa6f61a92e5d963d18505ce6b3c405c876a98bf605977cd3a6acb9ed42e6810765505b27098bbd10710f22ce6d5696a0a3514615d2b155
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD59e6d572d942c8fdc291a20654a8e320d
SHA12a00a4ac8e0289afefc4dd5f4d88175a2ae55195
SHA2564674fd9cffea0b5c808de84d3435d7ac5c57cc4007ad295f4b6df10276a8cddb
SHA512b69465e14c5914b5dd40eeb84629b41ac611a928f4d1326e448dbaca127789033eb73ed6c03bb78672caa8f4fe2e5d26a8bc379810ae95e1b3886449c3bfead6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD577b16331252d8205980056c7e47d5035
SHA14e03be50afc52283b65754c337f3560e67be08c4
SHA2562711f9855e9f90381d4e90c9e48448d888996317a87e00ec52ad8dc303a53b93
SHA51255d99d26e5c85e8bd498ce64d18ad7cd3911abc34336ad0722771f5caa08436dba88158ccc6da8bfb01552db94661bf910b0bb492f15a7eacf9fbfc7c18fe27c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5385abc7ee9ba2cb8dd236d02dfd401e2
SHA1522160e041304aa75052bce121dd6132a15cbc26
SHA256e523cd41b380d4d67f38f02896f2af3ee19c28ebf76b50fec6fa5522905fac55
SHA512e94fbf1b087aee1e59279ba709d0a9c43612dbb42e259c58ebb6a4ce89eda53ca0191ecb3c72248903bddc0ac90c495af5148f3260946e42b128b4658fa853bc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD576cf538d8af96b76c8c702141a801e48
SHA1f10a68d6fbe4d0326c858d9a974c7da5b42dc252
SHA256031b75a6e91d27ed0f3b509940d21b08aca8e593bb555950eb7947d590b672a2
SHA5120ef4ca8736c4a8160f7e226588f7a0239e682c470fc0e6bc612c0e9c7e8a6b8a86d12d5c63a992e130bd17de42ae55c75acf09b48e9e2f8359b788d480a2afb0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD507ec0cb0c70a6b76bd0664d82b66a98f
SHA13594226c636e2d8be4485a7e5801948d8ac7000d
SHA25669bf6f6a6c78e73282ee671e9097934e903cecbfeaa4b2d6c57d4016a68ac6a8
SHA512cd21a8dd644f6ad3338b7eb1c6b05604038a5bc972d45d8ecb961d9fcd2196df08a13da258dad515fd1a878e2c7b24675e03b69fe506b2aec7562fe814d25be0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD594ef704372feef311419b2d452b5b4ec
SHA15d6f62ad1226c6bffb940cacc6f2d4a20f49a16e
SHA2567b2096a114a48b18c93bac81b711e052c0200d4fc8c8e84a2d1e4825de64cb1b
SHA5121cba6194cea29dca7c166bc773b80299d150c60d59cec74a603e90f4d31242686fa0e56507e82bd0c433b03449e8fe3069887d8c4991fe6d86bc35ad55df8a8d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\7a55349e-a425-469f-b382-d235534a6d49
Filesize26KB
MD5d650c4a0b2ec2a16f120d8e2acb13b7f
SHA19bd3a314e899a230f806faeff3c064acc02fab6a
SHA256569c6497cea1cb77b192d1c1e43ce3509fc4de729bb9320266671bb42656a5e7
SHA512c348602e57927c104bcce0313bc8c4a427248d47a6367597605d07ca13a2d912a7d75ac2f08d859b8fbfa853b407d0f983568c348f85c62343fc0bf7e8dae54f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\e941ea2f-c1ae-4b7d-8b45-9c349536c9cb
Filesize982B
MD582a04e1ff14eb46429deafcc07269249
SHA1e12c609f64c3bf49522622707678e934ccc57336
SHA2565f57309c3e3a5baf0cfca624c37a401fede9693f514776b7632101c73a78df21
SHA512d1cee33340f94ff980acff73d1880d61bd950921ed846a4ee6ca1414a6138838c400d39b153b4e20c81d0e8529d9778b23ee9b76c1c15377c9181b4a4bba5ca9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\f6eb38c1-abd2-46e2-920b-22295bc8f344
Filesize671B
MD5c95cc5b11bfbef43461bc99205112fd4
SHA12745b11172f1e8e46bdcda952db2f2e3ca110a90
SHA25677cf653bfc242d69d5276fa16bc24103f440141805cadd9a38becce693d9b45a
SHA512ac1af1f6af6da9613ba74fa12beb182c1d5cf895336a2d018a752f14a83ff595a82a6a7f7f0944235729475604d340cfb88f31a6750c57ae6612dd11846b6cb0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD530c6eb9f75d45d2c617d355819d9b9d4
SHA16828deeda0e9ac85ceefb8ef874eeb815da39674
SHA256bcc68fa7cf442bebba9f1f11119c4121f2945d8226ab64944ac031df1ecaba38
SHA512d2a1616d6e5ab72ed38c7ad838c83d03dacd51a10af87d7ac1a0f914b02659c097f5a09a36d902a0ec3a91fda47edb98112454b2ae9d1f0571d4320906f1b5cf
-
Filesize
15KB
MD5df31cef4a0841e029ae9fdb58357be82
SHA17117aee578273edaef6b0169f7ce2e32664557ca
SHA2567aa9156fb6984d1bab124187fa8744556f25541378d8f3c441c470083e7b6a8c
SHA5121b113055a949f8999e31b7da93ffb0bcba5683be40955904a78e592e6bb5ae516229d2cb687973ed2f825b00c1a0a12e1c31933b7d7c480477fc0841c29618fd
-
Filesize
10KB
MD558936f61a03f8c56e2295786c6eead80
SHA1ab869855a8bd5b7b631053b412d5d7bc02eadafe
SHA256cca52aeb641c5c4bcc383ad3cd02878950fd48801607a90957dab7e6b1285ef3
SHA512a2ac23479e28b5f8988b65eb916885c129193aa0479ff81fa6ccac8f4f66b344741432a8f93dc4aadddece2112b1a580584949d95d1e01999d2dd7decd15de14
-
Filesize
10KB
MD5a87d936eeaf20d46697b929be6599eff
SHA16eb3d009432a0529ad366eb00930e5aeaa862678
SHA256240b6df28a59d6301fbfce781d91dea20c70b7eed101b31d0dde0a556b704155
SHA5123337dd11b46ccfa39b7693aaffa7c3595fda4e2d8eb50e942e1c632891882db0889a1ab42dfce2e0b46eff3d0d3cb9bd1bd04ec495ff5310c595c894225bd8eb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize1.0MB
MD54acfaa9d2dc8cb91ab1255f37b47ba7d
SHA1a2de81f46a74df78d52666592cf603ecdb0f53ed
SHA256fac46cbb76e87136d9c0e35b58965849ac70a020ef2e60e5b55d86747be74315
SHA512141e04d37782bb421cc7a9dcc41a77b428f8596ef3d011d4e31e5de1da54774a2f3e48f950d5d238ad0359dcdb38331fd0f738ad2833ec8b57b6ccfab55cc38c