Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 18:31
Static task
static1
General
-
Target
5aa47e342483cbf1379164875c5131f896ce3ca562d37135e8baed56fc6486a0.exe
-
Size
6.0MB
-
MD5
179d69888de82761958fbbc4aa61bcd7
-
SHA1
dd1ecaf102f49df1ae7f533b53b5e892cf694bfd
-
SHA256
5aa47e342483cbf1379164875c5131f896ce3ca562d37135e8baed56fc6486a0
-
SHA512
d8349c5993ef5f93dacf1e8d62021bb78387b99bb9514ffbbee5ff525f2f671fcdd172d9290ad2988fbb27584cfda86bbc38323235fba88020f052bfcf0427cd
-
SSDEEP
98304:w+0ohNemtwkk4j/ia0pBCUX3Uc4BjTZE6nNWM4rowJxEpY4zuxwBhVFS6JtB6+:w+0o/Jtwh4mTcUXEc4BjTZE6d4ZQ+oRt
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Extracted
lumma
https://founpiuer.store/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 9a90075344.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 9a90075344.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 9a90075344.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 9a90075344.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 9a90075344.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 9a90075344.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5638a2f54b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1B08t4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2Z3635.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3P84g.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2f7e1ecfbb.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9a90075344.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 20 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9a90075344.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1B08t4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5638a2f54b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3P84g.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2Z3635.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2f7e1ecfbb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2f7e1ecfbb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9a90075344.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1B08t4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2Z3635.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3P84g.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5638a2f54b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 1B08t4.exe -
Executes dropped EXE 13 IoCs
pid Process 3740 J3G30.exe 3968 s2Y89.exe 3536 1B08t4.exe 2700 skotes.exe 4724 2Z3635.exe 4516 5638a2f54b.exe 4996 3P84g.exe 528 4R117c.exe 1064 2f7e1ecfbb.exe 6436 9a90075344.exe 6616 skotes.exe 4880 skotes.exe 6820 skotes.exe -
Identifies Wine through registry keys 2 TTPs 10 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 1B08t4.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 2f7e1ecfbb.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 9a90075344.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 2Z3635.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 5638a2f54b.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 3P84g.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 9a90075344.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 9a90075344.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5aa47e342483cbf1379164875c5131f896ce3ca562d37135e8baed56fc6486a0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" J3G30.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" s2Y89.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5638a2f54b.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1004664001\\5638a2f54b.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2f7e1ecfbb.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1004665001\\2f7e1ecfbb.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\9a90075344.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1004667001\\9a90075344.exe" skotes.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000a000000023b8d-68.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
pid Process 3536 1B08t4.exe 2700 skotes.exe 4724 2Z3635.exe 4516 5638a2f54b.exe 4996 3P84g.exe 1064 2f7e1ecfbb.exe 6436 9a90075344.exe 6616 skotes.exe 4880 skotes.exe 6820 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1B08t4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
pid pid_target Process procid_target 3776 4724 WerFault.exe 91 3688 4724 WerFault.exe 91 2696 4516 WerFault.exe 102 2532 4516 WerFault.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language J3G30.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1B08t4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2Z3635.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5638a2f54b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2f7e1ecfbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3P84g.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4R117c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5aa47e342483cbf1379164875c5131f896ce3ca562d37135e8baed56fc6486a0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9a90075344.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language s2Y89.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 1808 taskkill.exe 1620 taskkill.exe 3632 taskkill.exe 4092 taskkill.exe 232 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 3536 1B08t4.exe 3536 1B08t4.exe 2700 skotes.exe 2700 skotes.exe 4724 2Z3635.exe 4724 2Z3635.exe 4516 5638a2f54b.exe 4516 5638a2f54b.exe 4996 3P84g.exe 4996 3P84g.exe 528 4R117c.exe 528 4R117c.exe 1064 2f7e1ecfbb.exe 1064 2f7e1ecfbb.exe 528 4R117c.exe 528 4R117c.exe 6436 9a90075344.exe 6436 9a90075344.exe 6436 9a90075344.exe 6436 9a90075344.exe 6436 9a90075344.exe 6616 skotes.exe 6616 skotes.exe 4880 skotes.exe 4880 skotes.exe 6820 skotes.exe 6820 skotes.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 1808 taskkill.exe Token: SeDebugPrivilege 1620 taskkill.exe Token: SeDebugPrivilege 3632 taskkill.exe Token: SeDebugPrivilege 4092 taskkill.exe Token: SeDebugPrivilege 232 taskkill.exe Token: SeDebugPrivilege 2400 firefox.exe Token: SeDebugPrivilege 2400 firefox.exe Token: SeDebugPrivilege 6436 9a90075344.exe Token: SeDebugPrivilege 2400 firefox.exe Token: SeDebugPrivilege 2400 firefox.exe Token: SeDebugPrivilege 2400 firefox.exe -
Suspicious use of FindShellTrayWindow 31 IoCs
pid Process 528 4R117c.exe 528 4R117c.exe 528 4R117c.exe 528 4R117c.exe 528 4R117c.exe 528 4R117c.exe 528 4R117c.exe 2400 firefox.exe 2400 firefox.exe 2400 firefox.exe 2400 firefox.exe 2400 firefox.exe 2400 firefox.exe 2400 firefox.exe 2400 firefox.exe 2400 firefox.exe 2400 firefox.exe 2400 firefox.exe 2400 firefox.exe 2400 firefox.exe 2400 firefox.exe 2400 firefox.exe 2400 firefox.exe 2400 firefox.exe 2400 firefox.exe 2400 firefox.exe 2400 firefox.exe 2400 firefox.exe 528 4R117c.exe 528 4R117c.exe 528 4R117c.exe -
Suspicious use of SendNotifyMessage 30 IoCs
pid Process 528 4R117c.exe 528 4R117c.exe 528 4R117c.exe 528 4R117c.exe 528 4R117c.exe 528 4R117c.exe 528 4R117c.exe 2400 firefox.exe 2400 firefox.exe 2400 firefox.exe 2400 firefox.exe 2400 firefox.exe 2400 firefox.exe 2400 firefox.exe 2400 firefox.exe 2400 firefox.exe 2400 firefox.exe 2400 firefox.exe 2400 firefox.exe 2400 firefox.exe 2400 firefox.exe 2400 firefox.exe 2400 firefox.exe 2400 firefox.exe 2400 firefox.exe 2400 firefox.exe 2400 firefox.exe 528 4R117c.exe 528 4R117c.exe 528 4R117c.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2400 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3164 wrote to memory of 3740 3164 5aa47e342483cbf1379164875c5131f896ce3ca562d37135e8baed56fc6486a0.exe 86 PID 3164 wrote to memory of 3740 3164 5aa47e342483cbf1379164875c5131f896ce3ca562d37135e8baed56fc6486a0.exe 86 PID 3164 wrote to memory of 3740 3164 5aa47e342483cbf1379164875c5131f896ce3ca562d37135e8baed56fc6486a0.exe 86 PID 3740 wrote to memory of 3968 3740 J3G30.exe 88 PID 3740 wrote to memory of 3968 3740 J3G30.exe 88 PID 3740 wrote to memory of 3968 3740 J3G30.exe 88 PID 3968 wrote to memory of 3536 3968 s2Y89.exe 89 PID 3968 wrote to memory of 3536 3968 s2Y89.exe 89 PID 3968 wrote to memory of 3536 3968 s2Y89.exe 89 PID 3536 wrote to memory of 2700 3536 1B08t4.exe 90 PID 3536 wrote to memory of 2700 3536 1B08t4.exe 90 PID 3536 wrote to memory of 2700 3536 1B08t4.exe 90 PID 3968 wrote to memory of 4724 3968 s2Y89.exe 91 PID 3968 wrote to memory of 4724 3968 s2Y89.exe 91 PID 3968 wrote to memory of 4724 3968 s2Y89.exe 91 PID 2700 wrote to memory of 4516 2700 skotes.exe 102 PID 2700 wrote to memory of 4516 2700 skotes.exe 102 PID 2700 wrote to memory of 4516 2700 skotes.exe 102 PID 3740 wrote to memory of 4996 3740 J3G30.exe 103 PID 3740 wrote to memory of 4996 3740 J3G30.exe 103 PID 3740 wrote to memory of 4996 3740 J3G30.exe 103 PID 3164 wrote to memory of 528 3164 5aa47e342483cbf1379164875c5131f896ce3ca562d37135e8baed56fc6486a0.exe 107 PID 3164 wrote to memory of 528 3164 5aa47e342483cbf1379164875c5131f896ce3ca562d37135e8baed56fc6486a0.exe 107 PID 3164 wrote to memory of 528 3164 5aa47e342483cbf1379164875c5131f896ce3ca562d37135e8baed56fc6486a0.exe 107 PID 528 wrote to memory of 1808 528 4R117c.exe 108 PID 528 wrote to memory of 1808 528 4R117c.exe 108 PID 528 wrote to memory of 1808 528 4R117c.exe 108 PID 528 wrote to memory of 1620 528 4R117c.exe 112 PID 528 wrote to memory of 1620 528 4R117c.exe 112 PID 528 wrote to memory of 1620 528 4R117c.exe 112 PID 2700 wrote to memory of 1064 2700 skotes.exe 114 PID 2700 wrote to memory of 1064 2700 skotes.exe 114 PID 2700 wrote to memory of 1064 2700 skotes.exe 114 PID 528 wrote to memory of 3632 528 4R117c.exe 115 PID 528 wrote to memory of 3632 528 4R117c.exe 115 PID 528 wrote to memory of 3632 528 4R117c.exe 115 PID 528 wrote to memory of 4092 528 4R117c.exe 117 PID 528 wrote to memory of 4092 528 4R117c.exe 117 PID 528 wrote to memory of 4092 528 4R117c.exe 117 PID 528 wrote to memory of 232 528 4R117c.exe 120 PID 528 wrote to memory of 232 528 4R117c.exe 120 PID 528 wrote to memory of 232 528 4R117c.exe 120 PID 528 wrote to memory of 1448 528 4R117c.exe 123 PID 528 wrote to memory of 1448 528 4R117c.exe 123 PID 1448 wrote to memory of 2400 1448 firefox.exe 124 PID 1448 wrote to memory of 2400 1448 firefox.exe 124 PID 1448 wrote to memory of 2400 1448 firefox.exe 124 PID 1448 wrote to memory of 2400 1448 firefox.exe 124 PID 1448 wrote to memory of 2400 1448 firefox.exe 124 PID 1448 wrote to memory of 2400 1448 firefox.exe 124 PID 1448 wrote to memory of 2400 1448 firefox.exe 124 PID 1448 wrote to memory of 2400 1448 firefox.exe 124 PID 1448 wrote to memory of 2400 1448 firefox.exe 124 PID 1448 wrote to memory of 2400 1448 firefox.exe 124 PID 1448 wrote to memory of 2400 1448 firefox.exe 124 PID 2400 wrote to memory of 4292 2400 firefox.exe 125 PID 2400 wrote to memory of 4292 2400 firefox.exe 125 PID 2400 wrote to memory of 4292 2400 firefox.exe 125 PID 2400 wrote to memory of 4292 2400 firefox.exe 125 PID 2400 wrote to memory of 4292 2400 firefox.exe 125 PID 2400 wrote to memory of 4292 2400 firefox.exe 125 PID 2400 wrote to memory of 4292 2400 firefox.exe 125 PID 2400 wrote to memory of 4292 2400 firefox.exe 125 PID 2400 wrote to memory of 4292 2400 firefox.exe 125 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\5aa47e342483cbf1379164875c5131f896ce3ca562d37135e8baed56fc6486a0.exe"C:\Users\Admin\AppData\Local\Temp\5aa47e342483cbf1379164875c5131f896ce3ca562d37135e8baed56fc6486a0.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\J3G30.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\J3G30.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3740 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s2Y89.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s2Y89.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1B08t4.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1B08t4.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\1004664001\5638a2f54b.exe"C:\Users\Admin\AppData\Local\Temp\1004664001\5638a2f54b.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4516 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4516 -s 16007⤵
- Program crash
PID:2696
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4516 -s 14447⤵
- Program crash
PID:2532
-
-
-
C:\Users\Admin\AppData\Local\Temp\1004665001\2f7e1ecfbb.exe"C:\Users\Admin\AppData\Local\Temp\1004665001\2f7e1ecfbb.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1064
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"6⤵PID:4500
-
-
C:\Users\Admin\AppData\Local\Temp\1004667001\9a90075344.exe"C:\Users\Admin\AppData\Local\Temp\1004667001\9a90075344.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6436
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2Z3635.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2Z3635.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4724 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4724 -s 16485⤵
- Program crash
PID:3776
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4724 -s 16285⤵
- Program crash
PID:3688
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3P84g.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3P84g.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4996
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4R117c.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4R117c.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1808
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1620
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3632
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4092
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:232
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking3⤵
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking4⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2076 -parentBuildID 20240401114208 -prefsHandle 2000 -prefMapHandle 1992 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5b83f5eb-8529-4918-9a6d-43083073feaa} 2400 "\\.\pipe\gecko-crash-server-pipe.2400" gpu5⤵PID:4292
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2508 -parentBuildID 20240401114208 -prefsHandle 2500 -prefMapHandle 2496 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2dac45c9-1f4b-4023-9de5-e0007b0e73c6} 2400 "\\.\pipe\gecko-crash-server-pipe.2400" socket5⤵PID:3740
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3012 -childID 1 -isForBrowser -prefsHandle 1492 -prefMapHandle 3116 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1288 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {77d2caf0-9f3d-473f-8473-e9281ed7eac0} 2400 "\\.\pipe\gecko-crash-server-pipe.2400" tab5⤵PID:3552
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2728 -childID 2 -isForBrowser -prefsHandle 3856 -prefMapHandle 3872 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1288 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {af8726d7-b368-426c-8dc8-6953de27fb0f} 2400 "\\.\pipe\gecko-crash-server-pipe.2400" tab5⤵PID:1828
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4552 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4544 -prefMapHandle 4532 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0dce6ea7-133f-4400-ac04-a040e8441e26} 2400 "\\.\pipe\gecko-crash-server-pipe.2400" utility5⤵
- Checks processor information in registry
PID:6292
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5256 -childID 3 -isForBrowser -prefsHandle 5244 -prefMapHandle 5248 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1288 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {53128908-c5f2-4452-9c31-76bea808724a} 2400 "\\.\pipe\gecko-crash-server-pipe.2400" tab5⤵PID:5416
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5328 -childID 4 -isForBrowser -prefsHandle 5372 -prefMapHandle 5380 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1288 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a3979c61-772c-4c37-bb01-6336c36212bb} 2400 "\\.\pipe\gecko-crash-server-pipe.2400" tab5⤵PID:5428
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5628 -childID 5 -isForBrowser -prefsHandle 5540 -prefMapHandle 5544 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1288 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9c32b4cc-d8aa-447f-93ba-1e4360c4007b} 2400 "\\.\pipe\gecko-crash-server-pipe.2400" tab5⤵PID:5440
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4724 -ip 47241⤵PID:4592
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4724 -ip 47241⤵PID:3136
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4516 -ip 45161⤵PID:5036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4516 -ip 45161⤵PID:3288
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6616
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4880
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6820
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\activity-stream.discovery_stream.json
Filesize20KB
MD50a54f9011ed1cf446fdfc1aec4ff805a
SHA1b5df397e028226dd6c04de044a47cf64c31b4a06
SHA25679736d306fa086ed28f86066d7a643702a16d8ce9cb19650058751f61a85be0b
SHA512a38ae3f31fd51520b8003cce67a299e5d43add78e847a7c099ce3c3ee362cce8e98a08562f0f14e2bd223277211d627b9fc011d36caeee8fb32f835e287d73bc
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\cache2\entries\D500AD994A7515157BB2A6ADD5B18B754E4D2F99
Filesize13KB
MD58daeef7feaf93b58f85d5911370bbf9d
SHA10e1cb27435e0b7c61340c2e9f6a32b885011bcea
SHA2564960cf6ab80b489fa95f5acd78aac39a50178b12ecfef8c5e9ef3733d5de1df0
SHA512d4e056617088d3894bc91584bcb4b8cc2ad75f90a817e556cfa43a67b322d629dad3bc4d97128a7391249d51b856de8823367d89c50adfe01ba8d4048c6b7568
-
Filesize
3.0MB
MD5427a063388d79b8cfec7e922feb81c07
SHA19638f797e91ea60bd424b3b2ddef9d0d53a2e030
SHA2560836b74c5507b060778ad90bab2ebd7bc230ffe3004d67ced991fa47ecbd566e
SHA512a775039b50cfbd24a87d10474653c1bbfc4afe85d0093dbbdad3d29c76466e9f156318a2fada8797e3b821a31e0e960fbd577d243c2b06ce1dfff601d288d7fa
-
Filesize
2.0MB
MD5fdd09e1d35cbc3837a26255801aacb53
SHA1c6a5b12ae933c9cb222b3d8a5ebb4bd432e22b95
SHA25626711a4c32193e82db0ecc58bfc95d9482f111d1389314029432f228fbdb75e0
SHA5127f52301a06f6f0fb4d6eaf07a784e45a9cd9bb275754aae59bf1a2139af1304d296da21777e2c0e52f2b8c876a4cea5ef35a6bd574135b1256714d6304087750
-
Filesize
2.7MB
MD567943707204f342d03b0d888d91dfcb7
SHA163adff12f8b484c2df92fc1d90e9b8651c885e74
SHA256c34b445ec31ca803d440aa62ccd026dd4a16f3d91faad0389cbcc4e63dd2b2f2
SHA512f322865b051f58f6024866b81150a13a9697ea970e2c14577a15cd62162cd685b6af70bd310532011dc725ebbe377efa9431550194af1d76d6ea68a967886464
-
Filesize
898KB
MD5c2f642b51ce5dd471ea60f6670788937
SHA180d535b22689a7eaba487bea737f948163b84530
SHA256e4b0df56bcdfaf576ee33b4e88cb33a5b56b615b49989ddb0f967d204ce6cb4d
SHA512310c14ff21f8a9e6c9697cfef7cb7636a75de5711e6455fc35304c75a7a940a4b51c0ed6fa3196e8dbac8854d472dc4e10e0138e4363a11975240eb6b84f3d5e
-
Filesize
5.5MB
MD51eec1a5651e83163806b846fd7751bd2
SHA140694d5d0676b311878dd0fb8eb2ac6aaee0d5bc
SHA256d5fdee1e26f80bd7fbcac1618d2578a705bf39f3a4d6244a6fae8dde7cc2d0fc
SHA512ef869fd180d08b2e78454871b9ef530af2775ba372a3de2c027e925f85ea3f00867a792e2f311e7a24b8c7dbd0c455b7ff5ac6ad086560777bcba938348c0d5b
-
Filesize
2.0MB
MD52bd1643c51ab40c4b17e6f15b1eaeb0c
SHA10ed83b36c8cc314690e7353a2a3631deee098331
SHA256f7536ef71a6a1df24263e5bf3b58be00674f303eff4787d70de246e481f8330e
SHA5124e5d5416d72b5d254b32b98feed4009eb321d21f520d607fdce174b3a7bfd9cab01cfa43981c0dc6f989c936c411e274e924244d31223d6ad2dcee5e7d6b5246
-
Filesize
3.4MB
MD5bf1fc5049728f09c3c879e81691af7c9
SHA112246ddbfc7cf649cdf77a0d8acff64524336914
SHA256e82602b0d52e3ae1d6e67e68892d0e0bccec0414271499cb4cb87f1b244d88b3
SHA512962d2487b4b3cb5f2b01c1c8c652f596b6864fe9773b3fe643db726fe93bd135086535ac71f1045a7810775aa5c32bebbd45f5e0c53bd78d2e081c770af031d8
-
Filesize
3.1MB
MD5065366de9cd0ccac6b7e2dc0f2c5c8bd
SHA140a61570203bf51aa2cc995b184cc117b619ab44
SHA256295373e8416d0e053b5745f47073e17fc342de0246a930469e9cb9de6f740dd5
SHA5123f895156884dc9f9b2d1ef4a4d2162fc82fa58452b5f6cd6ac8db0d88d444854149c532793dce33c7af58f6f5eec24cce67cdb3e26e4dc2b8b59684013072a99
-
Filesize
3.0MB
MD5c641b3ee57b10edb933e1f5eddabce24
SHA1028a2826c6726e0facaf6902a4499a7697ff3e6c
SHA256845b66567bfde5a0d1959f6d6ade4cbaa063b0f13c0fde2626950a67bfb05a6f
SHA512bfd9652fc052ccc08e0856bd1e56ae8664d249c3a764a47140d42fc933532558ca135b0203bb512d2cda5a584493240c49cdebb4000c667abd13a730c7583e3e
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\AlternateServices.bin
Filesize6KB
MD5bace92f1feadffbb4b77d8b656fa4eb1
SHA13307fa747ae3c1fca3732c94dda524c14a3b1110
SHA2568f68d9e790c824e1feaeb6c4fcc1613eae400f27fd7a5f9fb5790a8d5d008ba0
SHA512be5b57db86c7180eec40edb52c4a7b38c82926ced2da45d76d6da23db6ba3007901aa8cf6002a82fdc7ad99ccd2aeb848e0d9511a845f9d7a03a352195cc50b2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\AlternateServices.bin
Filesize10KB
MD5ffd22fe6b2ff26890d362984d475d256
SHA1e6a4adf585b0e72fb5a1e98e01ac1af195fd305e
SHA25648a322090af3a47da0d73d0b21a3b5dfe2b985c96d564e58f41c123361d24e0e
SHA512d2ca8767beb649ee6329ea19c6fc0368994aa44d7ee0ccbf115b1f17724daa4cc3fde510f4b2fdbb2972f9825e23e2af72576d5a044e98d3e9e3ca31d6321168
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.bin
Filesize23KB
MD5ae0ed5b8bbd66e493a1f855de62879c4
SHA1c0d06a60a79b55bba12135b29aa5b0be1827dc88
SHA256b948929649fe74eea90911beadae448e8ddc7e36b5864ccac7a3c42b14f21b0e
SHA512c625babe010df62f9c2009eacf77ca197edd745f70af71cb8916e25a5de8195e2e33cee6dc77300a65d45e83a8783de2398ab4e4ed5478a2d5b499ec94b623f7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.bin
Filesize15KB
MD590e18cb05feb4dd9ca41105f00171d15
SHA195fdcfe0ba9eb7976ea61ac7a9d7e2b99185bdaf
SHA256c53e4a9fe06a2cc8004a64412b8de251d2faf6af1fd7969eab1dd505e75b5592
SHA512bc9a56e36e691994517fa7709cfc03d71962fc487a46ee476e10c27d6798f038359790c6372e6119fb23f3b233bd1207d5d2b5554b3cf25680d13f7cd436ee6a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.bin
Filesize14KB
MD548c1608fd3c3c2a83ea27aa92e5446fb
SHA15c29373003c8703cd59df1e52294a5495f83116f
SHA256de8cdb0b03b373247ab3cfb3657a861169cc246f3fe38699550d3ab145940370
SHA5128237a31b3c87dcb680d2c2c22eee31f32d5b51329712096cc51b0a9513feb393b4d73a96576607cca19e8f9217826aff79580a53e79f16b496541419882793dd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.bin
Filesize5KB
MD57e37a2cac3c86e128ba8d0bc7672bc03
SHA15d083cd9b213482dddbc0fb70dc5996f1f8d499c
SHA256ae4390d51236f62b3c5c194e14df5e0ddc3221402dab5efcbcd492e47de4b967
SHA512f1ae6b39ccc1c5ece6617a394496d7e2468ffdb21ae5f12ddd1ad9d10e96c54fc180fdc9b8a27c03b59a807c6b01913182fbf33d07f8e7ba1162884e7d1f9bec
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.bin
Filesize5KB
MD510c25c50c1dcb2a9237fb798c7945b8b
SHA150e9d1e5320568293221bf916d851382e09ec103
SHA256f71921b96b03c9afea70cbe34c58091b6349cf039fefa4278d6374225935363c
SHA512a551c2cfa1f580ec163dfc4615252dc9e7c9e1ce922c628f38b89d8866ffe9bb75daf4cc6fb3afbefccf15ca13a4c5394e9e4b0c98dd7341a788da89cdb7a9c7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD549fc72e1999ecc714911b2be4561f0d6
SHA1562708581edfeae2fed779094975c4f966cc2bed
SHA25664dda2f62f1eebdf4acb1c03a9aa3315d19a48d058570459d3537514c9d0c445
SHA5126d30f9fa64948449b87ec86c1f413b611bcb9d3a024a1eaafabcad619317ecf0b6c88644af571be5dfe977a04b4f74a41c7ac3a9f29281d239767d692c1e10d1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5dd43c3e61c1f8284deebe19a98280b9c
SHA1751a521d1badee58540cce5fa7f5082e2fe69278
SHA256b0804f71b0c1a6e56acfa1f400ee0b8ab16d1d63c40e1870a58180c6a4a4af97
SHA5125265283621caa93bf134e8752fd6bb25b3b181bd8b8e0c2abd5580fd41852c5a3e532f6f41009bcace1f1058b5d573d8d656f5d7edee86409f792fab44c5b9a8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5be12586ed0ee749d5b060610a41d4ff4
SHA181dee0f09d5c3620ceeec93d703cb973fedff061
SHA256703178e595c31c41de20c01fd0377093985a42f1d9ef48272bb2b256e73d39e2
SHA512baf85a2b4a2c0e4bd78441bcb0921813196b548389f543b2d6eac3dc424e1d79da356018690524b4b5a060693431ddda1f1b39d64d5e7ca1b71229537c2e0db5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5c21a70ea268c02697648a4b31d18231f
SHA1fb7518ad7a47ade81f99b3983719d0e83c406d1e
SHA256009cb78d087da4fa3145d29bc9df5e610ff502552cedea261d654b515cf73751
SHA512b3d6cba0791534ec47b8c5687129a76c6af95b991f7a7498c1b7d890eca848fb5a3876a6f95e33be5d4e7635f1009de3941d72bf6e404a6297c5874e531472f3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD594f861ecc2a1cc9d2f508ba7ac5f3e39
SHA1dac764b2f6cff09e3aa053d3af1fa2915f5ee082
SHA256f230dfbafeb62b9ff270c8ecb01bef1e671aa9bf790ceb17a7d224e917deee28
SHA51258f56dff5094ba0e8a0c266bd303cc2924a32b55ca04f19d9f5c09ee5b7e9ccbe9e692b76c04f05fc74e8ea520ebc3e84158e408f8c6147554ee0cb72df3759c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\87af6604-5981-4adc-9250-bc6f40ff7ca4
Filesize982B
MD5d03aa72f3b714f0e90c551d61ff285cd
SHA1ed40ab426c0a88e0ee1eb5d067b62b712b3314a9
SHA2565cc3404325a890643ef57571b022f4e4699c1566b992cebb2c49ad8e46d6917a
SHA512e8401d16f8f742853ef633f892487113281d1bbd62185d6705fbdafc2da1b77da862153511b14483aa5753c7e32960ff2d134fae435b63c71a51357c6c23d2f0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\b91f73ec-bc6d-4aa9-be94-9bcfd6d4a0f3
Filesize671B
MD572536e8c64fae0e7730b46610fbb44a5
SHA15b29d5c907c32350dbaeb230a00bee6c376fd494
SHA2562ba2c9deb14a9bd6cda3495a860d957467d60e144a38f4fb3e633dd99f16d9a8
SHA5121b4ea075fc0a5d15041d4ca03b2524d83fb6e8f96925829ccc27f962b857ec24efc0d4207161a442e86deae64974bbc355679cc9ea50f26688043602db1cc1fe
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\d90748cc-00e5-4219-9d21-2e333026b74d
Filesize27KB
MD5de2dd9fb58b4cbdf81caa040dfd814d8
SHA163f6ec488bfa6a115a1eca52bef3e2707975d7f5
SHA256169f88e1ac7b7f6b09e78fa2c0889da4dd40336fe24c9cc3d35239152302e9b8
SHA51298ff6006c3134b8131260367a6c8b5a3b6d9168cd1632eee8d5c01196aca9673620483465becb5c3c34e3c96a54069636f3aa89aa11968300e008df430c515dc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
11KB
MD51afd424771c005c12119f8d68d9a2311
SHA1e3b8da937870c7f18c3388c7b0f8ecb50d44e9d8
SHA25693b349e0ecc48a53b86bc3298fb1b420255f1cf67b48af2bea12cd87dce84f4b
SHA512dbd3961dc4b257d5aed9b14cc682f7816155a1f8808edc53aec7d6ed97f14d1b3a3f7fc10ee01086c887006cb66037a532d2e6d78f09a0814938bd8c4d95fab7
-
Filesize
10KB
MD52f78bd2904a845cf5550ff30fe0e5a9c
SHA1b142ee9165e1a53734bb4594de3da79d03b80eef
SHA256286de80f324ebcbdd5b460b12c97645f9fb7519f5fa876801b4fe3bcfb49dfbd
SHA5128aadb9b6e02114186e328fb65693d2a2b10a4acd3f46d18d85ddd22fc004f3cc6af2eee4ef0780404623b9a2f5ce223ede4414c1f98b449f31d366185558b1c4
-
Filesize
10KB
MD5d731f63ff24d134d964401f974e14caf
SHA12c85066c15416ff1d251547171f732671af4e302
SHA256dee56ff9afc0d08e941888d5bf0bc1c8bcd5e04a33b32bf9da7489d0936e1fdf
SHA5123328792388e4065eaa6e7df95017869c68f0aed15fef14921b008b5a5dc94d2967ba4e0a6dce54f50dc887e17deff43f6932de67df4aab85c9e71915a3d1f751