Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 13:30
Static task
static1
General
-
Target
066048b484a01f17fabdd9c33427db935012341f42987ffeeb2fdef7e29306d5.exe
-
Size
6.0MB
-
MD5
a8d2fe7cd17246f57a3118076e472cb4
-
SHA1
a5c06840cb80443faeb9c20d13b7637c2ddc457b
-
SHA256
066048b484a01f17fabdd9c33427db935012341f42987ffeeb2fdef7e29306d5
-
SHA512
ab2ee4b4649903fe46e33d8d7963f56fa69b5724be64e7f3cba57c6dc536ec4125ef0f8ee1c940ee14d50efaf806f1365ca93d8eed10348cb04c8cce8d653e2c
-
SSDEEP
98304:SkCrBY6yHhyQLeCp6gcyXvoSEBqXC6snR1EJghVT37yjp:SPG6yHhrLlp/cyXpEBt6snROJghV
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Extracted
lumma
https://founpiuer.store/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" f6ec8feaa5.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection f6ec8feaa5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" f6ec8feaa5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" f6ec8feaa5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" f6ec8feaa5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" f6ec8feaa5.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 19729fc5f1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2z7346.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3n00Q.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1H15c9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5542b3f467.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f6ec8feaa5.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3n00Q.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1H15c9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1H15c9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f6ec8feaa5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2z7346.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2z7346.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 19729fc5f1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 19729fc5f1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f6ec8feaa5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5542b3f467.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5542b3f467.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3n00Q.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 1H15c9.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 12 IoCs
pid Process 2204 w7f28.exe 2336 A3F80.exe 4112 1H15c9.exe 2716 skotes.exe 4492 2z7346.exe 3948 5542b3f467.exe 4180 3n00Q.exe 3496 4W966f.exe 1068 19729fc5f1.exe 5756 f6ec8feaa5.exe 6164 skotes.exe 7024 skotes.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 1H15c9.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 19729fc5f1.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine f6ec8feaa5.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 2z7346.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 5542b3f467.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 3n00Q.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features f6ec8feaa5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" f6ec8feaa5.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\19729fc5f1.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1004615001\\19729fc5f1.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\f6ec8feaa5.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1004617001\\f6ec8feaa5.exe" skotes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 066048b484a01f17fabdd9c33427db935012341f42987ffeeb2fdef7e29306d5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" w7f28.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" A3F80.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5542b3f467.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1004614001\\5542b3f467.exe" skotes.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0007000000023c86-67.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 4112 1H15c9.exe 2716 skotes.exe 4492 2z7346.exe 3948 5542b3f467.exe 4180 3n00Q.exe 1068 19729fc5f1.exe 5756 f6ec8feaa5.exe 6164 skotes.exe 7024 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1H15c9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
pid pid_target Process procid_target 2228 4492 WerFault.exe 90 1372 4492 WerFault.exe 90 4060 3948 WerFault.exe 104 1808 3948 WerFault.exe 104 -
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language w7f28.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A3F80.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4W966f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f6ec8feaa5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1H15c9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 19729fc5f1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3n00Q.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 066048b484a01f17fabdd9c33427db935012341f42987ffeeb2fdef7e29306d5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2z7346.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5542b3f467.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 1060 taskkill.exe 3332 taskkill.exe 2708 taskkill.exe 3656 taskkill.exe 2736 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 4112 1H15c9.exe 4112 1H15c9.exe 2716 skotes.exe 2716 skotes.exe 4492 2z7346.exe 4492 2z7346.exe 3948 5542b3f467.exe 3948 5542b3f467.exe 4180 3n00Q.exe 4180 3n00Q.exe 1068 19729fc5f1.exe 1068 19729fc5f1.exe 3496 4W966f.exe 3496 4W966f.exe 3496 4W966f.exe 3496 4W966f.exe 5756 f6ec8feaa5.exe 5756 f6ec8feaa5.exe 5756 f6ec8feaa5.exe 5756 f6ec8feaa5.exe 5756 f6ec8feaa5.exe 6164 skotes.exe 6164 skotes.exe 7024 skotes.exe 7024 skotes.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 2708 taskkill.exe Token: SeDebugPrivilege 3656 taskkill.exe Token: SeDebugPrivilege 2736 taskkill.exe Token: SeDebugPrivilege 1060 taskkill.exe Token: SeDebugPrivilege 3332 taskkill.exe Token: SeDebugPrivilege 64 firefox.exe Token: SeDebugPrivilege 64 firefox.exe Token: SeDebugPrivilege 5756 f6ec8feaa5.exe Token: SeDebugPrivilege 64 firefox.exe Token: SeDebugPrivilege 64 firefox.exe Token: SeDebugPrivilege 64 firefox.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 4112 1H15c9.exe 3496 4W966f.exe 3496 4W966f.exe 3496 4W966f.exe 3496 4W966f.exe 3496 4W966f.exe 3496 4W966f.exe 3496 4W966f.exe 64 firefox.exe 64 firefox.exe 64 firefox.exe 64 firefox.exe 64 firefox.exe 64 firefox.exe 64 firefox.exe 64 firefox.exe 64 firefox.exe 64 firefox.exe 64 firefox.exe 64 firefox.exe 64 firefox.exe 64 firefox.exe 64 firefox.exe 64 firefox.exe 64 firefox.exe 64 firefox.exe 64 firefox.exe 64 firefox.exe 64 firefox.exe 3496 4W966f.exe 3496 4W966f.exe 3496 4W966f.exe 3496 4W966f.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 3496 4W966f.exe 3496 4W966f.exe 3496 4W966f.exe 3496 4W966f.exe 3496 4W966f.exe 3496 4W966f.exe 3496 4W966f.exe 64 firefox.exe 64 firefox.exe 64 firefox.exe 64 firefox.exe 64 firefox.exe 64 firefox.exe 64 firefox.exe 64 firefox.exe 64 firefox.exe 64 firefox.exe 64 firefox.exe 64 firefox.exe 64 firefox.exe 64 firefox.exe 64 firefox.exe 64 firefox.exe 64 firefox.exe 64 firefox.exe 64 firefox.exe 64 firefox.exe 3496 4W966f.exe 3496 4W966f.exe 3496 4W966f.exe 3496 4W966f.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 64 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3796 wrote to memory of 2204 3796 066048b484a01f17fabdd9c33427db935012341f42987ffeeb2fdef7e29306d5.exe 84 PID 3796 wrote to memory of 2204 3796 066048b484a01f17fabdd9c33427db935012341f42987ffeeb2fdef7e29306d5.exe 84 PID 3796 wrote to memory of 2204 3796 066048b484a01f17fabdd9c33427db935012341f42987ffeeb2fdef7e29306d5.exe 84 PID 2204 wrote to memory of 2336 2204 w7f28.exe 87 PID 2204 wrote to memory of 2336 2204 w7f28.exe 87 PID 2204 wrote to memory of 2336 2204 w7f28.exe 87 PID 2336 wrote to memory of 4112 2336 A3F80.exe 88 PID 2336 wrote to memory of 4112 2336 A3F80.exe 88 PID 2336 wrote to memory of 4112 2336 A3F80.exe 88 PID 4112 wrote to memory of 2716 4112 1H15c9.exe 89 PID 4112 wrote to memory of 2716 4112 1H15c9.exe 89 PID 4112 wrote to memory of 2716 4112 1H15c9.exe 89 PID 2336 wrote to memory of 4492 2336 A3F80.exe 90 PID 2336 wrote to memory of 4492 2336 A3F80.exe 90 PID 2336 wrote to memory of 4492 2336 A3F80.exe 90 PID 2716 wrote to memory of 3948 2716 skotes.exe 104 PID 2716 wrote to memory of 3948 2716 skotes.exe 104 PID 2716 wrote to memory of 3948 2716 skotes.exe 104 PID 2204 wrote to memory of 4180 2204 w7f28.exe 106 PID 2204 wrote to memory of 4180 2204 w7f28.exe 106 PID 2204 wrote to memory of 4180 2204 w7f28.exe 106 PID 3796 wrote to memory of 3496 3796 066048b484a01f17fabdd9c33427db935012341f42987ffeeb2fdef7e29306d5.exe 112 PID 3796 wrote to memory of 3496 3796 066048b484a01f17fabdd9c33427db935012341f42987ffeeb2fdef7e29306d5.exe 112 PID 3796 wrote to memory of 3496 3796 066048b484a01f17fabdd9c33427db935012341f42987ffeeb2fdef7e29306d5.exe 112 PID 3496 wrote to memory of 2708 3496 4W966f.exe 116 PID 3496 wrote to memory of 2708 3496 4W966f.exe 116 PID 3496 wrote to memory of 2708 3496 4W966f.exe 116 PID 2716 wrote to memory of 1068 2716 skotes.exe 118 PID 2716 wrote to memory of 1068 2716 skotes.exe 118 PID 2716 wrote to memory of 1068 2716 skotes.exe 118 PID 3496 wrote to memory of 3656 3496 4W966f.exe 119 PID 3496 wrote to memory of 3656 3496 4W966f.exe 119 PID 3496 wrote to memory of 3656 3496 4W966f.exe 119 PID 3496 wrote to memory of 2736 3496 4W966f.exe 121 PID 3496 wrote to memory of 2736 3496 4W966f.exe 121 PID 3496 wrote to memory of 2736 3496 4W966f.exe 121 PID 3496 wrote to memory of 1060 3496 4W966f.exe 123 PID 3496 wrote to memory of 1060 3496 4W966f.exe 123 PID 3496 wrote to memory of 1060 3496 4W966f.exe 123 PID 3496 wrote to memory of 3332 3496 4W966f.exe 125 PID 3496 wrote to memory of 3332 3496 4W966f.exe 125 PID 3496 wrote to memory of 3332 3496 4W966f.exe 125 PID 3496 wrote to memory of 808 3496 4W966f.exe 127 PID 3496 wrote to memory of 808 3496 4W966f.exe 127 PID 808 wrote to memory of 64 808 firefox.exe 128 PID 808 wrote to memory of 64 808 firefox.exe 128 PID 808 wrote to memory of 64 808 firefox.exe 128 PID 808 wrote to memory of 64 808 firefox.exe 128 PID 808 wrote to memory of 64 808 firefox.exe 128 PID 808 wrote to memory of 64 808 firefox.exe 128 PID 808 wrote to memory of 64 808 firefox.exe 128 PID 808 wrote to memory of 64 808 firefox.exe 128 PID 808 wrote to memory of 64 808 firefox.exe 128 PID 808 wrote to memory of 64 808 firefox.exe 128 PID 808 wrote to memory of 64 808 firefox.exe 128 PID 64 wrote to memory of 3588 64 firefox.exe 129 PID 64 wrote to memory of 3588 64 firefox.exe 129 PID 64 wrote to memory of 3588 64 firefox.exe 129 PID 64 wrote to memory of 3588 64 firefox.exe 129 PID 64 wrote to memory of 3588 64 firefox.exe 129 PID 64 wrote to memory of 3588 64 firefox.exe 129 PID 64 wrote to memory of 3588 64 firefox.exe 129 PID 64 wrote to memory of 3588 64 firefox.exe 129 PID 64 wrote to memory of 3588 64 firefox.exe 129 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\066048b484a01f17fabdd9c33427db935012341f42987ffeeb2fdef7e29306d5.exe"C:\Users\Admin\AppData\Local\Temp\066048b484a01f17fabdd9c33427db935012341f42987ffeeb2fdef7e29306d5.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w7f28.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w7f28.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\A3F80.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\A3F80.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1H15c9.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1H15c9.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\1004614001\5542b3f467.exe"C:\Users\Admin\AppData\Local\Temp\1004614001\5542b3f467.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3948 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3948 -s 15607⤵
- Program crash
PID:4060
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3948 -s 15927⤵
- Program crash
PID:1808
-
-
-
C:\Users\Admin\AppData\Local\Temp\1004615001\19729fc5f1.exe"C:\Users\Admin\AppData\Local\Temp\1004615001\19729fc5f1.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1068
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"6⤵PID:1800
-
-
C:\Users\Admin\AppData\Local\Temp\1004617001\f6ec8feaa5.exe"C:\Users\Admin\AppData\Local\Temp\1004617001\f6ec8feaa5.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5756
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2z7346.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2z7346.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4492 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 15725⤵
- Program crash
PID:2228
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 16045⤵
- Program crash
PID:1372
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3n00Q.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3n00Q.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4180
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4W966f.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4W966f.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2708
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3656
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2736
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1060
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3332
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking3⤵
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking4⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:64 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2060 -parentBuildID 20240401114208 -prefsHandle 1984 -prefMapHandle 1976 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5659eb90-d090-4945-b34a-794c5633ac15} 64 "\\.\pipe\gecko-crash-server-pipe.64" gpu5⤵PID:3588
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2492 -parentBuildID 20240401114208 -prefsHandle 2484 -prefMapHandle 2480 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {874fd457-4df7-49ac-b51c-78160dc28d0d} 64 "\\.\pipe\gecko-crash-server-pipe.64" socket5⤵PID:1908
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3064 -childID 1 -isForBrowser -prefsHandle 2652 -prefMapHandle 3116 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1312 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fe9eb84c-b7fc-47dc-8cdf-ac4eeb1a39ee} 64 "\\.\pipe\gecko-crash-server-pipe.64" tab5⤵PID:1420
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3968 -childID 2 -isForBrowser -prefsHandle 3960 -prefMapHandle 3956 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1312 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2ba64412-7e85-459b-b081-5c6e6a61d4b9} 64 "\\.\pipe\gecko-crash-server-pipe.64" tab5⤵PID:4468
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4528 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4680 -prefMapHandle 4688 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {062050b1-5a18-4283-a665-d8eb2aa88a5d} 64 "\\.\pipe\gecko-crash-server-pipe.64" utility5⤵
- Checks processor information in registry
PID:5304
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5612 -childID 3 -isForBrowser -prefsHandle 5600 -prefMapHandle 5604 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1312 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ed9195f8-ec8e-4ad7-906b-7675ecfe0759} 64 "\\.\pipe\gecko-crash-server-pipe.64" tab5⤵PID:5440
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5776 -childID 4 -isForBrowser -prefsHandle 5524 -prefMapHandle 5540 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1312 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {482c3d6d-4531-4eb3-b929-4acd6265b716} 64 "\\.\pipe\gecko-crash-server-pipe.64" tab5⤵PID:5464
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5568 -childID 5 -isForBrowser -prefsHandle 5912 -prefMapHandle 5916 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1312 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {60671940-8990-4172-b8e1-83bb2c2d7a6e} 64 "\\.\pipe\gecko-crash-server-pipe.64" tab5⤵PID:5476
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4492 -ip 44921⤵PID:4108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4492 -ip 44921⤵PID:3980
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3948 -ip 39481⤵PID:5104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3948 -ip 39481⤵PID:4972
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6164
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:7024
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\activity-stream.discovery_stream.json
Filesize19KB
MD58a147f9635653426b820016197fa18f7
SHA14e9df25e3b0c69480f0f2a50199cff417019d1b9
SHA25609c9b4e06c1cd9325dce657c9070c206b1f2d0fc2a11b99a64589e0f24169354
SHA512bedbdb5041e1c612f0a5550f6946766da4e1c6225a9493d38f126e22457cfe128f58e710126eb19aff43e95ec0a65881704d527d574f7c2e1e05986459f70838
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\cache2\entries\D500AD994A7515157BB2A6ADD5B18B754E4D2F99
Filesize13KB
MD5668701f719aa4b806806090268f2b413
SHA146b40dc686ad5f4a778f7ff3754e3b17fd333e62
SHA256586ed10cefd9cd68d631cd0c3297a33397b8fc95bdb1b3833716f2a88f5fe8d7
SHA512506a640b9add2c658eac1fc48014372abea578595d5bdd3092d3fc36ec5ff8841e963f0b6bae3544a19f88019a948e9ac97f8889422ddfb1348545fb677dc14f
-
Filesize
3.0MB
MD5a8f20ad3d41973d7375370b0b7e0f206
SHA11e7775500a8838eb99511557a0a6b91001711e77
SHA256945c4e520925902102b0b7435d34ae82952150535847dbb9bae31e319c62ac00
SHA51274915dbf9abb08f258c5f64ec12b19bbbafb0a09a6f01b322cbb3594f9ce3469b352b6279e0b2dcb817ac5a2fc0635c0dd860bd649138326f164ea6193951891
-
Filesize
2.0MB
MD55f44f2bb693c50d1141aa214dac22796
SHA1aa3408aaf55c7fc92b90cdbb08075c2b59a7a6dc
SHA256184b2aee425e019ac00a1000a882e5d01e4175e90d84ca0e473db487d43add7d
SHA5124ea0f394a1ec64d7c97b726d7df92519ac87d053e3c1030b0bd8a3fd9b41beed1f48008f85b02b5de2f505e2283888e142dfb8dd3499440b3c00e28da9f23d4e
-
Filesize
2.7MB
MD5f5d406d80203b2cd70f0564a6fe8309f
SHA1a35bc1c2d248ac8bbd8157dca64305b7a65a75a1
SHA25680e15878d467e06d9be6e3c4a28ddf3b868bb911bad8e122322ef070d8699b90
SHA5126fab58aa3d45fcea48a02005bd764b1cfd3e9b76bf8681584dbbdcf12cc62f97cfa88bd8f0c8e013f73ab62f733658a8b7ef44f87e9e274f469235a40b8c13d6
-
Filesize
898KB
MD502a1f7c082ffd663e2141a160951a05e
SHA16d60aaa42a1554f38ca30e23393d9c575deaa327
SHA256f9fa963ad8bff60d05389047e7bd0d9623b918019a63b5281c60072de21d80a2
SHA512b4be8d55e4973a929bb893eaa50ba2798205e7acb05187de8842f871d72fee961735fe96bdbc785d1f055605b688c1581495c2cbba5727c2f35bcfff665f3428
-
Filesize
5.5MB
MD5d50494e397f979f5cc6eb05f403bb066
SHA17292a78143c569a1f4bcaffc56ace7bd1f8e4091
SHA25675b5f88da3e7b00ffae58fdcb95942aa204117f9884759a458470a1f6a3e3d16
SHA512014fc746b92739a584d5c8435df57481b3f41fffeb727593fb5d570c71ea4ff1b5c786fcd65fcc65800f771bbf12cd8ec0d66def5d257af09e7a09013d1e1b16
-
Filesize
2.1MB
MD555358d794dcc2ca7ed8167f6efa19d1e
SHA1dbbb0c51b1806291668092b573098bdfb31e0dc4
SHA256a96804ad4921a6d278b7d44b12a3d29f9fc9e3646e8ac63c811c75d1bf6ce90a
SHA512a1b9c098eabcfb0a579e7f65d36228920f882ca1ab57afc748280c90ca265d826b7e2a69845f9a35527744d64fae26ecc10ea6b3674ab1eebfaaf5827bc07644
-
Filesize
3.4MB
MD543406b30a80c3081ed0bfe0f7d6e33fc
SHA1679a723f795edff745609396b4da762c40b2d317
SHA256f5aa4288738c125d531ca5c5cd3a53d1d7438eca34d45618807667cb23423695
SHA5128ae4144fcf2a82804a788f7fbdcac304b891103299aa301478803b005aee39851abbe162375292af800d15c39808dd82e6f4410857f20be9e01bf55a11d24080
-
Filesize
3.1MB
MD59cc497f013c9bcd51e290c241c08d3b2
SHA1f4e3a229714e498d1d870b47d5ff203981369236
SHA256a15fce12a08432606c810866fb8aa0b13731f32b3410b02b3b944dc06f1f08dc
SHA5124f08daa12d5c0249d818ae0f38a99a97b011b0f41271bd927597b3f85b6b1bceb21c90196165ad63b247f2645d5c6a255a4604f5a0556b6a0e2d2f1012cffe70
-
Filesize
3.0MB
MD51049d6c72a807361508643e0d57c0abc
SHA1b431e1736922fab8553ba5a0818890b5f7f774e7
SHA2561d32662fb0f86e9f7da870ce4868edf093140ef0282f2d32a217e8f4f49c751a
SHA512e45d17243be335c930a7f2b5289f613af20f07ab6253fc8f3b9bae43f5f08f58479188eaecf8915207e1b6abf9f21e565b0922033eb3104d04ddb0a9ed72e5a0
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\AlternateServices.bin
Filesize8KB
MD5fe83fd9559fff716001767c5cb485bbe
SHA19da7e76d526bf4ba91634b5eca5351c1dc4a6b5e
SHA25617d3338253de22b3ead655527a6a5f1b692101ddd3defd1f4d434d8c27eaf325
SHA5122226bafebdc4cf8858b79d63c2cbf1383b6d1d42245ae15c31bc78077bb564bd7bdbc0eacdbb7157363a7696c400fc3ef3c90b39998b0c14b8c556bdd047273e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.bin
Filesize23KB
MD562271fa3ac3e159ee93f7f228e5bdb01
SHA1a6992f15e2e7e41174c7e9b17e47534d9ab1fda3
SHA256eadcd611ecf99789a9ae846a351587e76b018e8fa174595a8538387eb2586418
SHA5126f25bc82f385a8cec215f7aac345d4af3cbfa9490978d34a431725d6b87e49ff18ef2b15bff69c2818b430c09f00918afc50d98842f090505e8935a1d691e969
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.bin
Filesize6KB
MD5b6fac7316a562fae85d1b10725a07fd7
SHA1fd434a554caa2f6c3613176cfec5197fb2260c12
SHA256db9d0affee9cac1c2f419936304dc90fc517bb395bef882d4085369e18284cc9
SHA5126836715a68fa9d2d9959bfc2ceea5be1c32d704d4cfa0ec04b909192d42be13195820a3bc1176c3e04c67f1325eee26043eb8169e4901ed00a6a0cccc0813a9d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.bin
Filesize15KB
MD5f004dbd17a04d1ef9d3538d4f6331b99
SHA10bc66cc86bbe0a9cd98f8daeee91aa6d9fc07a0d
SHA256b69636e74c2f6da301ccbcabb440f633fb3f3f5da5c2a2f730d0ca09915eaeef
SHA5120c49446e9a83a8f6f957771ca2217944a65b23fa13e3a30ff35a8b44608fd29261513625d9ac7ef99983373ef3d06023d16fa2056bb836d6348bcddf46e2f38c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD526f73b40a5336b7bd6aa01292199fdc2
SHA121f315ee52aa4e02dad2b702c4d6ae7c2bda3159
SHA25615be2a80c664537d679f5301f82db7f48b951b1da78690561812b54c60cf7113
SHA512d335a19baff95726cb63e5b5cdca8e9cade90dd9c01106025d2f1ae1fa2b70c5080723113aecadba84f620c68027ce9f3e7e39dd9a2ef6895cdf3a2a8af5fb11
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5829ac77824955cb6151305e070644a0a
SHA19a869c196d21ddff0c35fdb57e7584006e416311
SHA2565ed291c7465e810edad84a1c38cd5868c4c0f32a60b69c8e02d7331c4182116f
SHA512660ff94c944ebf93780d51d907d9357f49d923b1bf467637be09401fd231e870e1a2671b08e976f41d1b25eb76e7beed45ddb189b236c1dec695cd45cc0c113e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5f3ee397ed0fc56b64e5d5b4d49d0d293
SHA154983a9e4b4184478f7279364d214ba9b4fbfede
SHA25678964c720359f240ae8bf5dc1d73978f34e6e11185a71afd1a2a8a6e4a3f857c
SHA512f47b5ccf0d8484ebb06a436b1cf670045ddbd51d479aae9fc2fc9e97658fdaf1a74e2c04507ec1c31aeaf011aecd4f3b0270a40af9c932363b6fe37f7983994b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5c983eaf0bec7fc1793b77a98a889fe08
SHA118f429ad08cb24741a70a48a0df2d23451482ede
SHA2561c1331f785476397def11ef11329759900072e0773a6f4184cb326b3d91e4675
SHA51217251242ec6708794ad4071b68f0de6617f56171e0aa7c83beb208f87feb5d3366ff813e51fc8cec2e5449fcb31fc0cfd9b559072ef0d41a8c9fa0b1c424e5a9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5f048f44e2c7a21c7bfbd2eafe5268af1
SHA121aa171fd83bb4a31c374c21cb220a5533143ad7
SHA25678e2da8b6fcb5045e43dab5055dff1b7f67c5c1ba13c00a560d876cd15eb62b6
SHA512f7aec30c037bd239e01329df23f63af2459354092ee47557e25cf6595bdbbc663a2ff430998878032af0efbfec9793b711fff5b0e742cf31835e4e0a5cb9a46b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\22861381-bca0-4422-8512-e1692628406e
Filesize26KB
MD5d3280a82fe1991c28a7f6de87553f387
SHA1ce9a931ea5f25b8396861a585d7946593c636ade
SHA2567827f89472201f17dc043e882b49577dfc65196f063f4f2fa567c43d3bc0b8cf
SHA51294159ea8747f91020539283b9f2440da2ab54578aea5fb8f6f4a820cda85889e8e512519c2b1ffcf6a2eadc346c0f8c52f01cc858e1cbea22685dfc5254214f2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\3497e0f3-8bc9-4aa0-8d15-708b0ab14046
Filesize671B
MD578821c0525d7a652afd3b95c39b2801b
SHA1b8b7d80c424d42e2babe14a047b19259dc5cfcc1
SHA256a3c19333e004cad28a31bff046732913cb5ac1fc0a82ef706dcdbcc2b4552b37
SHA51263c5d0ad87f4dffaae34494f681064340194276e5fce69e48b5ec04a42601971bb1320d1623f3ebf67810717cd0f1780e16192c548e8759f7ba3c94cfce5e240
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\ad796941-154f-4cbd-b42d-a4afa7648a01
Filesize982B
MD529d25f1fa7a1ec5925d03618ef690fc1
SHA19319c00da46392b7482b442fcaf0b5024ee1718a
SHA256a03e405bded58a88fe96aa8117a48b6c8031e3461156db852625f462e8b877ba
SHA51248d36f48e96ab4e7114038480059f0228353b19066055fc57834e7e7e24feee9e9359776f5db462ae6002d3554ac290c5ae1bba50115e061a915ef6d5d0c6161
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD55e31a193a7481f861cae5e70d4eacd97
SHA1aeb9384e4146f0e92edb7271c6363d6e4b063e0f
SHA256e229caf82f55570a41b857ec98a7d913d3e7a68059d36a010d9ca67a748b2814
SHA512ebf53697b8c82f3fcdf17aa740e677e3ecc3afcd993ea9063f384ae8dd162caee217b975e312275a994a9371a85a0f25e3d007a5dca4ef01fd4700c4ca2a1315
-
Filesize
15KB
MD5d94a90fffbb0883a43bb55b566571326
SHA140582a74a3e483eea4c3bf78140d2f5ea310d70c
SHA25623bbd9f562c29a66ebc1ca453d80dab63346bc36bbb3da8b7b8e58c5873377b3
SHA51242b2012bb3277211fc19246488a7326d5f488c718018a19b01c809dce8960d0fbc30b6ea7d4695d26395f58b978a67143c055ce161de0688f10091506fc3f6fa
-
Filesize
10KB
MD53feb50a9df34d3132f91bc8e7705378c
SHA10417f3d23608c77189243575e50c8b960ba6b3b0
SHA256576be56f365e583d961bec50de4f2c2c242dace79426f8a9cdfa7369ed7bacc3
SHA5127fe9c684d9c46179d2a17996ef5551e82e9332101f13905218ba6d11f0f92c1d13fc0ed7f191ea3d387ab66e3eebcabf7efa94f821232d120f38076cb5960ce7
-
Filesize
10KB
MD54658f485086b0cfe892a4f6b46bce5c3
SHA1243aa61f447caad2388877aa5d08b694e3ff3665
SHA2563ac18400d69358a24373c1e673f185a59fefde3bef5e11152b55b4a27eb2f7fd
SHA512383999fe3c4e1b890746e48cf6b28041fedd8060154467869280c0653f05c42629ee30a88e0c32aebc0e2e87f766d8b818dc5380c212f935469b7bc595b1b534