Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 14:47
Static task
static1
General
-
Target
7b355ec73489aeac5f98a766c972183513c5a1c955f0c12fab3b27d3c926b3ca.exe
-
Size
6.0MB
-
MD5
8ebf52be0e836f41920a30a1a984d838
-
SHA1
3171ba42aec514b4ceb723e606b71991534ca133
-
SHA256
7b355ec73489aeac5f98a766c972183513c5a1c955f0c12fab3b27d3c926b3ca
-
SHA512
e2addf5c9973c2b226beba0eb79273571ca7aa05914c5aeae92598b096621606f4396a85afccbd1543c5f9457ced2ff2b1a84a8205ead4c2fc4dbc7b75e89f1b
-
SSDEEP
98304:DHvmTNQpHp89bX+CZn9JrydZLMRkv0a9s5uxldAHKQ4Tk8dEn2BYnKtjETEg:25Kk9JrMNv06uufdQKQ43GYYWrg
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Extracted
lumma
https://founpiuer.store/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 0ce73cecb8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 0ce73cecb8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 0ce73cecb8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 0ce73cecb8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 0ce73cecb8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 0ce73cecb8.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 88f6c04f17.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 65af547ce9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0ce73cecb8.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1w90F5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2b3621.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3P84h.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 20 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3P84h.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1w90F5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2b3621.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2b3621.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1w90F5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3P84h.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 88f6c04f17.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 88f6c04f17.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 65af547ce9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 65af547ce9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0ce73cecb8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0ce73cecb8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 1w90F5.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 13 IoCs
pid Process 1376 G2o73.exe 2912 s7V81.exe 3676 1w90F5.exe 2184 skotes.exe 3956 2b3621.exe 4484 skotes.exe 3360 3P84h.exe 548 88f6c04f17.exe 964 4K176I.exe 4132 65af547ce9.exe 5960 0ce73cecb8.exe 4876 skotes.exe 6056 skotes.exe -
Identifies Wine through registry keys 2 TTPs 10 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 3P84h.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 65af547ce9.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 1w90F5.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 2b3621.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 88f6c04f17.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 0ce73cecb8.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 0ce73cecb8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 0ce73cecb8.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7b355ec73489aeac5f98a766c972183513c5a1c955f0c12fab3b27d3c926b3ca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" G2o73.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" s7V81.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\88f6c04f17.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1004626001\\88f6c04f17.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\65af547ce9.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1004627001\\65af547ce9.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\0ce73cecb8.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1004629001\\0ce73cecb8.exe" skotes.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0007000000023cb5-66.dat autoit_exe behavioral1/memory/5960-844-0x0000000000D10000-0x0000000000FBA000-memory.dmp autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
pid Process 3676 1w90F5.exe 2184 skotes.exe 3956 2b3621.exe 4484 skotes.exe 3360 3P84h.exe 548 88f6c04f17.exe 4132 65af547ce9.exe 5960 0ce73cecb8.exe 4876 skotes.exe 6056 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1w90F5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 3524 3956 WerFault.exe 90 3596 548 WerFault.exe 102 828 548 WerFault.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0ce73cecb8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2b3621.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65af547ce9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7b355ec73489aeac5f98a766c972183513c5a1c955f0c12fab3b27d3c926b3ca.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language s7V81.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3P84h.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4K176I.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language G2o73.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 88f6c04f17.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1w90F5.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 3976 taskkill.exe 2712 taskkill.exe 4624 taskkill.exe 4472 taskkill.exe 3296 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 3676 1w90F5.exe 3676 1w90F5.exe 2184 skotes.exe 2184 skotes.exe 3956 2b3621.exe 3956 2b3621.exe 4484 skotes.exe 4484 skotes.exe 3360 3P84h.exe 3360 3P84h.exe 548 88f6c04f17.exe 548 88f6c04f17.exe 964 4K176I.exe 964 4K176I.exe 4132 65af547ce9.exe 4132 65af547ce9.exe 964 4K176I.exe 964 4K176I.exe 5960 0ce73cecb8.exe 5960 0ce73cecb8.exe 5960 0ce73cecb8.exe 5960 0ce73cecb8.exe 5960 0ce73cecb8.exe 4876 skotes.exe 4876 skotes.exe 6056 skotes.exe 6056 skotes.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 4624 taskkill.exe Token: SeDebugPrivilege 4472 taskkill.exe Token: SeDebugPrivilege 3296 taskkill.exe Token: SeDebugPrivilege 3976 taskkill.exe Token: SeDebugPrivilege 2712 taskkill.exe Token: SeDebugPrivilege 4312 firefox.exe Token: SeDebugPrivilege 4312 firefox.exe Token: SeDebugPrivilege 5960 0ce73cecb8.exe Token: SeDebugPrivilege 4312 firefox.exe Token: SeDebugPrivilege 4312 firefox.exe Token: SeDebugPrivilege 4312 firefox.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 3676 1w90F5.exe 964 4K176I.exe 964 4K176I.exe 964 4K176I.exe 964 4K176I.exe 964 4K176I.exe 964 4K176I.exe 964 4K176I.exe 4312 firefox.exe 4312 firefox.exe 4312 firefox.exe 4312 firefox.exe 4312 firefox.exe 4312 firefox.exe 4312 firefox.exe 4312 firefox.exe 4312 firefox.exe 4312 firefox.exe 4312 firefox.exe 4312 firefox.exe 4312 firefox.exe 4312 firefox.exe 4312 firefox.exe 4312 firefox.exe 4312 firefox.exe 4312 firefox.exe 4312 firefox.exe 4312 firefox.exe 4312 firefox.exe 964 4K176I.exe 964 4K176I.exe 964 4K176I.exe 964 4K176I.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 964 4K176I.exe 964 4K176I.exe 964 4K176I.exe 964 4K176I.exe 964 4K176I.exe 964 4K176I.exe 964 4K176I.exe 4312 firefox.exe 4312 firefox.exe 4312 firefox.exe 4312 firefox.exe 4312 firefox.exe 4312 firefox.exe 4312 firefox.exe 4312 firefox.exe 4312 firefox.exe 4312 firefox.exe 4312 firefox.exe 4312 firefox.exe 4312 firefox.exe 4312 firefox.exe 4312 firefox.exe 4312 firefox.exe 4312 firefox.exe 4312 firefox.exe 4312 firefox.exe 4312 firefox.exe 964 4K176I.exe 964 4K176I.exe 964 4K176I.exe 964 4K176I.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4312 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1056 wrote to memory of 1376 1056 7b355ec73489aeac5f98a766c972183513c5a1c955f0c12fab3b27d3c926b3ca.exe 84 PID 1056 wrote to memory of 1376 1056 7b355ec73489aeac5f98a766c972183513c5a1c955f0c12fab3b27d3c926b3ca.exe 84 PID 1056 wrote to memory of 1376 1056 7b355ec73489aeac5f98a766c972183513c5a1c955f0c12fab3b27d3c926b3ca.exe 84 PID 1376 wrote to memory of 2912 1376 G2o73.exe 86 PID 1376 wrote to memory of 2912 1376 G2o73.exe 86 PID 1376 wrote to memory of 2912 1376 G2o73.exe 86 PID 2912 wrote to memory of 3676 2912 s7V81.exe 87 PID 2912 wrote to memory of 3676 2912 s7V81.exe 87 PID 2912 wrote to memory of 3676 2912 s7V81.exe 87 PID 3676 wrote to memory of 2184 3676 1w90F5.exe 89 PID 3676 wrote to memory of 2184 3676 1w90F5.exe 89 PID 3676 wrote to memory of 2184 3676 1w90F5.exe 89 PID 2912 wrote to memory of 3956 2912 s7V81.exe 90 PID 2912 wrote to memory of 3956 2912 s7V81.exe 90 PID 2912 wrote to memory of 3956 2912 s7V81.exe 90 PID 1376 wrote to memory of 3360 1376 G2o73.exe 101 PID 1376 wrote to memory of 3360 1376 G2o73.exe 101 PID 1376 wrote to memory of 3360 1376 G2o73.exe 101 PID 2184 wrote to memory of 548 2184 skotes.exe 102 PID 2184 wrote to memory of 548 2184 skotes.exe 102 PID 2184 wrote to memory of 548 2184 skotes.exe 102 PID 1056 wrote to memory of 964 1056 7b355ec73489aeac5f98a766c972183513c5a1c955f0c12fab3b27d3c926b3ca.exe 104 PID 1056 wrote to memory of 964 1056 7b355ec73489aeac5f98a766c972183513c5a1c955f0c12fab3b27d3c926b3ca.exe 104 PID 1056 wrote to memory of 964 1056 7b355ec73489aeac5f98a766c972183513c5a1c955f0c12fab3b27d3c926b3ca.exe 104 PID 964 wrote to memory of 4624 964 4K176I.exe 106 PID 964 wrote to memory of 4624 964 4K176I.exe 106 PID 964 wrote to memory of 4624 964 4K176I.exe 106 PID 964 wrote to memory of 4472 964 4K176I.exe 115 PID 964 wrote to memory of 4472 964 4K176I.exe 115 PID 964 wrote to memory of 4472 964 4K176I.exe 115 PID 964 wrote to memory of 3296 964 4K176I.exe 117 PID 964 wrote to memory of 3296 964 4K176I.exe 117 PID 964 wrote to memory of 3296 964 4K176I.exe 117 PID 2184 wrote to memory of 4132 2184 skotes.exe 119 PID 2184 wrote to memory of 4132 2184 skotes.exe 119 PID 2184 wrote to memory of 4132 2184 skotes.exe 119 PID 964 wrote to memory of 3976 964 4K176I.exe 120 PID 964 wrote to memory of 3976 964 4K176I.exe 120 PID 964 wrote to memory of 3976 964 4K176I.exe 120 PID 964 wrote to memory of 2712 964 4K176I.exe 122 PID 964 wrote to memory of 2712 964 4K176I.exe 122 PID 964 wrote to memory of 2712 964 4K176I.exe 122 PID 964 wrote to memory of 3444 964 4K176I.exe 124 PID 964 wrote to memory of 3444 964 4K176I.exe 124 PID 3444 wrote to memory of 4312 3444 firefox.exe 125 PID 3444 wrote to memory of 4312 3444 firefox.exe 125 PID 3444 wrote to memory of 4312 3444 firefox.exe 125 PID 3444 wrote to memory of 4312 3444 firefox.exe 125 PID 3444 wrote to memory of 4312 3444 firefox.exe 125 PID 3444 wrote to memory of 4312 3444 firefox.exe 125 PID 3444 wrote to memory of 4312 3444 firefox.exe 125 PID 3444 wrote to memory of 4312 3444 firefox.exe 125 PID 3444 wrote to memory of 4312 3444 firefox.exe 125 PID 3444 wrote to memory of 4312 3444 firefox.exe 125 PID 3444 wrote to memory of 4312 3444 firefox.exe 125 PID 4312 wrote to memory of 5060 4312 firefox.exe 126 PID 4312 wrote to memory of 5060 4312 firefox.exe 126 PID 4312 wrote to memory of 5060 4312 firefox.exe 126 PID 4312 wrote to memory of 5060 4312 firefox.exe 126 PID 4312 wrote to memory of 5060 4312 firefox.exe 126 PID 4312 wrote to memory of 5060 4312 firefox.exe 126 PID 4312 wrote to memory of 5060 4312 firefox.exe 126 PID 4312 wrote to memory of 5060 4312 firefox.exe 126 PID 4312 wrote to memory of 5060 4312 firefox.exe 126 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b355ec73489aeac5f98a766c972183513c5a1c955f0c12fab3b27d3c926b3ca.exe"C:\Users\Admin\AppData\Local\Temp\7b355ec73489aeac5f98a766c972183513c5a1c955f0c12fab3b27d3c926b3ca.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\G2o73.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\G2o73.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s7V81.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s7V81.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1w90F5.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1w90F5.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\1004626001\88f6c04f17.exe"C:\Users\Admin\AppData\Local\Temp\1004626001\88f6c04f17.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:548 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 548 -s 15927⤵
- Program crash
PID:3596
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 548 -s 15527⤵
- Program crash
PID:828
-
-
-
C:\Users\Admin\AppData\Local\Temp\1004627001\65af547ce9.exe"C:\Users\Admin\AppData\Local\Temp\1004627001\65af547ce9.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4132
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"6⤵PID:7148
-
-
C:\Users\Admin\AppData\Local\Temp\1004629001\0ce73cecb8.exe"C:\Users\Admin\AppData\Local\Temp\1004629001\0ce73cecb8.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5960
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2b3621.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2b3621.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3956 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3956 -s 15925⤵
- Program crash
PID:3524
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3P84h.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3P84h.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3360
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4K176I.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4K176I.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4624
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4472
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3296
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3976
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2712
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking3⤵
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking4⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2068 -parentBuildID 20240401114208 -prefsHandle 1980 -prefMapHandle 1972 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {79b463f6-b844-4ec4-8a49-61595d1f87b6} 4312 "\\.\pipe\gecko-crash-server-pipe.4312" gpu5⤵PID:5060
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2488 -parentBuildID 20240401114208 -prefsHandle 2480 -prefMapHandle 2468 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1cc110a1-3972-4b05-837b-4be3a131c261} 4312 "\\.\pipe\gecko-crash-server-pipe.4312" socket5⤵PID:116
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3204 -childID 1 -isForBrowser -prefsHandle 2788 -prefMapHandle 3260 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1328 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cccea729-3105-4d83-b4c3-97f5a1d83c01} 4312 "\\.\pipe\gecko-crash-server-pipe.4312" tab5⤵PID:3740
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2908 -childID 2 -isForBrowser -prefsHandle 3716 -prefMapHandle 3712 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1328 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9be8df21-133f-4d8e-ab94-5b66f65de7af} 4312 "\\.\pipe\gecko-crash-server-pipe.4312" tab5⤵PID:4484
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4488 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4476 -prefMapHandle 4472 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {97295c79-f48c-4467-8310-ae10fb86d4a4} 4312 "\\.\pipe\gecko-crash-server-pipe.4312" utility5⤵
- Checks processor information in registry
PID:5632
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4908 -childID 3 -isForBrowser -prefsHandle 5204 -prefMapHandle 5188 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1328 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {29be4b9b-9da6-4802-8361-0002166a3f3d} 4312 "\\.\pipe\gecko-crash-server-pipe.4312" tab5⤵PID:3588
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5344 -childID 4 -isForBrowser -prefsHandle 5424 -prefMapHandle 5420 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1328 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9029dbe2-425a-4c07-a904-666a58267c40} 4312 "\\.\pipe\gecko-crash-server-pipe.4312" tab5⤵PID:6820
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5536 -childID 5 -isForBrowser -prefsHandle 5616 -prefMapHandle 5612 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1328 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5c575f79-5cdc-482c-b3bc-e9c4016b47e1} 4312 "\\.\pipe\gecko-crash-server-pipe.4312" tab5⤵PID:3524
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3956 -ip 39561⤵PID:2312
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4484
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 548 -ip 5481⤵PID:5028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 548 -ip 5481⤵PID:1340
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 548 -ip 5481⤵PID:5616
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 548 -ip 5481⤵PID:5672
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4876
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6056
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\activity-stream.discovery_stream.json.tmp
Filesize19KB
MD55bf2f78a33b6923805163c720ea31bd9
SHA112587f5268907970cdc487bf6c608cc8cfd7ef3c
SHA256808b913f190a82831270f699d9197b77a54cb70c9997cacd6f6ba5ec7973e617
SHA5124714953691945aa900f814140917adf217c9220974dde548736d6c28cb4398a90119d470f57dd8a8444631977589cb9a0e2b4f9a6faf11f4e310b1c9e534e92d
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\cache2\entries\D500AD994A7515157BB2A6ADD5B18B754E4D2F99
Filesize13KB
MD559d2dc9bcb364752786081235e9be2bc
SHA1c80eb4f93270381856a1ad280c95219272b48c82
SHA2560edbf5409b0846ff6768f3751032c0a6a503d9ca7f76d7b0f3bfea7224c25f5e
SHA51204da9a59b1d6097ec1483a8d6b363a688d80b1aaa0302a2342c4c958d45b0eb40fdf8bfec94babe4eef00c317926a09f132d7be7c07ca55f520cc2d06738a285
-
Filesize
2.6MB
MD5434a153614e722708bfa0d9cc51a5437
SHA149714a7748b4b61e1a4b13ff87c54d377b9aff78
SHA2565a9bd3b8c8d79747adb97806805db047ecc41b5054835a7cc61aba42d5559b3c
SHA51219d049cb6d3e6d2e94b004dc83be84fa2473b2fc640dd38d0c69e4de469754808c365392b8652716df578a6ed806a769e34257fb369077be69434ba9734de8ef
-
Filesize
898KB
MD55ea3a9f940601d8adc24531aa3d21df6
SHA13f55bd42277820ae3c0e299e2c25396715ef889a
SHA25692a8fd883428406990a7f00a17810bcdb312f65b98c1e8faa017c1365d299d95
SHA512aa07457d6beca094ca2ebb7d04c361f292aac4b77ed86b3bdea0355a40cd0c75ebff13e48c83fd20d9f31b2141a7f40b02b6be09a803deb55150a39c133564f6
-
Filesize
5.5MB
MD5a5755d4d8630d4112f00d75bc1cf8573
SHA130724f112f40f21f97f3bba260b9c5c78556fa69
SHA2561284b78f136de2e912787b0d45a86139d2941ce96d3ba8b0b7f9fe8261b1ee30
SHA5123d4a0683f022ff5ce8dbe83b576d8b2280a596fd0518b370c07a811aa4187d06291c11d747f3b047ee6a661d355e54ce33484541080d487607c76e2e741628f3
-
Filesize
2.0MB
MD52f8c72218bc8d19062c1bcfc28aac96c
SHA1ca163d6116edab9f45704e91635bf350a6fcf349
SHA256b61e6a903e387ec816cd46b72d7224caec4eac2c9837562b25e6df64a5b1c76e
SHA5122408bbf4473204b765bf860daec4ff47fb4ca34ad57559acf05ae69490564920a00a01d64899bb0eda4903442610a950bcba4105d7459a9108ca4607f71133b3
-
Filesize
3.4MB
MD5468e9e410a18ce566488b10594fc2bb7
SHA1b67c5fee158c85592b397da88a80a4090ebcccf9
SHA256e925b1ff44bbedf321d725c92816e9bfa3285c088ccd5a7454aacd7a11f823d9
SHA51208ae71556cdec37f81ab1444641add5696af628f724e93335a528895527d7378da3c5903e0400687e779386f23130b8caed5888bba4bd28022772759fe23744e
-
Filesize
3.1MB
MD5f8afa361afb4a6bc89bea140b4efe038
SHA13499dfef16ce37a4d15cb80200b8fb3938b49eb7
SHA256c7c1ef0db5466cf919cad7a49fad1c1677ec4b46d230da9335b78549ea2d9ebc
SHA51251456007129128373d014820dff7054f3d955fba0d6167017a79b51be441ff59c3276e89b5ab45b37e2175ed7a3eabb961ad4fb9110031e294dc14c71f6582c4
-
Filesize
3.1MB
MD54cd9e71dbd4fe83c9e2646791c93089a
SHA12107a9bc99dfc0d1fac036c9e59a786626dae7d1
SHA25692266e2506dbada2a9f94aa22c9b7b03b37771e97c58105f624748978827853e
SHA5122075c454015fa707a58f4c1a5645b6223a4c08cbaa8e9aeba79a26a050a6ab1a0f64ce4ff30c691cf31f6389dba49e1d206c5042dbc7fbb63dda0945dcab870e
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\AlternateServices.bin
Filesize8KB
MD5cc64ddb42233fe6fe2c3ac1b4cd56143
SHA1a43783ee8ef3191999b1cb20550432935110070a
SHA2567a22d1cc325e0141dc6c54382bfbada0b0a60d9284e27c53894a62dff9199ac5
SHA512e144507174ab481a3752a5880b27eb415cf4479fd77355d60cf9b242b2bf1df6b034268c760e965e7b0dab35a2e35c51dcd858b815612c39de9e734a7af7c915
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.bin
Filesize23KB
MD5a007665ef11e68595bf78dff254e1c7f
SHA1ac73490b153f37d78442ebbcc39ae2370d5ac8b0
SHA2562645b3efcc459db124d308c3eeebc063691801da4f8c0f9504547c5ec7ffeece
SHA512d62b5d0dac6ce966ead17ede1c34a07cbe95f128e754faf5ac492ff92f4167e80c5b95b3ece3395aab8bb8f0a9c15d0e88bbc23484012e13998ae07d7dc24b2a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.bin
Filesize5KB
MD5195d14d3ac223672fd7b86c9eb68f982
SHA1d2728fbf3101218e145ff816ca23e9ceff45af13
SHA256296c52ac9f6b4b6f7332da561126fc01932d5d9dd5f491534462bfe13dbfabd1
SHA512b893a7fbeed6d8414830a4898bf51b2b04a7a8feac93cbddf60e3964058620e9e07da91a74c91bd7cb9a4e3ef4b217a5bf1f71ef3e1197c8ad6b1727c94d5486
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.bin
Filesize15KB
MD506c3a9398bf63f068af25ee009930bb3
SHA1d4f6598354a1fdccff2031f0797e08bbacf79461
SHA256242b9dab4d59a27a6d48ade98648f052c58d71523f8d147744af59cbdb2d1716
SHA512e312d865c595a7ccb74e8378f59166f7868beff7849eed9d3573fcd24638295c224bbe40c3ca1ddcfb7add928295b2b8d83ddecd3177dd2a6e64a3b69cff1c82
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD53dc0f6caee3787d41d20977bfa83bdf9
SHA1d2af088cd6cf1fb8fadc83c755f93c36161a70eb
SHA256a25d3a18671b24a8bc735552c6285a7ffa532f7afb6ac36a661a46b4fa6e5673
SHA5120fb3a17eb38abdf3fec6f22c01011aa67120d4af33da8ca4cb45dec8ed9e8ca2eebc0ba2baadb35cc0863ddbc4ad3fea17081af81f2a654f8d26a197671a0c26
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD524f494928ff43ecf918949d723973378
SHA1491f1220e7fc386d6f119d3fb9b80bd3aed1ea02
SHA25610b903d502e1c75555833a1b1a4767dd2d160e27964df792173a00d3fb826103
SHA51268bfbf38fa50f749e92dcd4a97c5ef9983a1f512db2d30dc570079b7ba0c7b86c75bacfb5d2df1e5690ca6c58530d2da1c3f19a196781230468d6b2c16037786
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD52b808bc4d9e9b4ab66df3a209f4cfe36
SHA1f0fba846a141f14d8ef412bea49f82b2ca089b7c
SHA256558a9471e0e49beca27ac1061c7b5f9b159e87dd1197793a883bdade0452d37e
SHA5124eec6508f270985497c368038361a86a7f7fa6b266082c3b84b2eef89e807985b06d3c8a0931c40b1abd50a6fe21afb6cdd33f0aba75cfe8c4b43a5f1c89db0d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD54970887992305889df0fadd55e137e69
SHA13ad0fad84ecce9ade085b0c23b63622f43801dc8
SHA256fe6f024c3af460dd403c554b4128cda577368cc9fd189d5edbca6a2d7527d071
SHA512f11236840e10255a96017bf66abe349037d85ec7ecd4cc4f95d17e3bf331c599ea37e3168fd518a0bde20cbf2841251b9959a520e50ca58573cb62c04b35973f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\pending_pings\27b43c95-fe78-4bf0-943f-3f6be54667ac
Filesize26KB
MD523fd9da37200dbb88e74fa99b02c9047
SHA15ea97a1ba75c64a92dc6fb020067426f1bda0a11
SHA2561358ac3660fc50a230e2629aa2a5fed37b813f28e8d3d413c2866f34446c39cd
SHA512e9e00fac40c4f11811fd7bcc3ca5735889e5cabbd6ab07728d83018841ecee1f621de4814f1f9fac763b6d607202c58e1e57dd27ab9c7d69dd8635b08f9b36d1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\pending_pings\9403bf00-3bb1-48a9-9bbb-d7cc3b24d32e
Filesize982B
MD5b8f00d0befc571aff1c7b2d6ab8f3b33
SHA1559df5d545ae3d3f14e9571418879ab3a611c9f3
SHA256249bc02abe1927cc84cfe1700cf8bb1729c70f58673d2c27060f05be06369134
SHA51220d1df0db885e6f503fc3d780a31169f49f3a13bdf50f27666183582f4dedee6d29c38a3e8fbdf764a733906ca1df657b0391556d795691ed56310c1489607da
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\pending_pings\f1a205d4-9e6f-44ce-8164-990554e97a6f
Filesize671B
MD5106e5daba46a7158e7282d8c8febcc7d
SHA13823925614055812a0ee9fea701d6613ed23539f
SHA2566a3a3e22c48027ef6c97a579d7e668ac48652438b77f01fda8fb4e56f3d13b7e
SHA512a61d0d7de5c121fc2347b4540dc3aaebd2aca749b2750a9d6a529d08e0718332eb84b799e9d5bab5ff50022d8a9ced02e2489ca2f63b9fd2aa44b945d9119ece
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD5b25742e122ef5a1760150ba22839b3e3
SHA1dbfc6c6ff63ce9f72d9f32830dfc04bcd5c8f9c3
SHA25610f865aa7b4b70124aab69ff3c35636ccf1dda6ca460a30be7ce1dcccd3caf2c
SHA512dc6999995127c1f7e31005c9bed9d9e431b47a4ff0ddf7e9de4a59691eebe90fbd52659c724735b03225c94562250e48b841ac624519b5a6f2e45f789d7c4e32
-
Filesize
15KB
MD532efc60c480a2c2df2766908c66a4c6e
SHA1620be8b91e731af05bb9362e23b79aafa290672f
SHA2562e8aad73609fb051a163adba1af40f27e86ae27601160217d120b04b0fa806b1
SHA512bf06bc343c39530263a9e653390e3f63f6bf7c92c5faed7dc5b30450d41a249ef656b5b4d2b5a0a55a50a37cac7c1af40798e5ac68c74cc18369004063f0d122
-
Filesize
10KB
MD509199eb531cf17c24293cab4fece7d18
SHA1300e3043a9ffdbf013417e0bc5cb9ed109b3e08f
SHA2567d0a3bcb84724407a0df8225e9e3fb5bd66f508b88cfb621dd3aa12949e6392a
SHA512739d93c9c5da8e7593728410d40c5138a0213ca67cd476a903796cdbc20f2e27e0761e23499e35da4f87b97b3dcc7d995fcfe279ae9428b43e7e9fb2ba49749b
-
Filesize
11KB
MD50b0649fd09032a3bb33fd5678cc10feb
SHA1eb97f6d4b03d85e2dab3924d3c64633d44532b08
SHA256098e3ecc8169798d85b1750cdea1a66b302c4aa9ddc6298910243c15718ca48e
SHA5121b8f0a083f5d15f117cc6b1d07c9c6e045154b1ce2bee5a8df94ef81cd277e624cf32ff06f4f407826d396a2a2be751426f01f5f4e5d8252985ea9c911ddaff7