Analysis
-
max time kernel
142s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 18:39
Static task
static1
General
-
Target
5aa47e342483cbf1379164875c5131f896ce3ca562d37135e8baed56fc6486a0.exe
-
Size
6.0MB
-
MD5
179d69888de82761958fbbc4aa61bcd7
-
SHA1
dd1ecaf102f49df1ae7f533b53b5e892cf694bfd
-
SHA256
5aa47e342483cbf1379164875c5131f896ce3ca562d37135e8baed56fc6486a0
-
SHA512
d8349c5993ef5f93dacf1e8d62021bb78387b99bb9514ffbbee5ff525f2f671fcdd172d9290ad2988fbb27584cfda86bbc38323235fba88020f052bfcf0427cd
-
SSDEEP
98304:w+0ohNemtwkk4j/ia0pBCUX3Uc4BjTZE6nNWM4rowJxEpY4zuxwBhVFS6JtB6+:w+0o/Jtwh4mTcUXEc4BjTZE6d4ZQ+oRt
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Extracted
lumma
https://founpiuer.store/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" f9d11cf99f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" f9d11cf99f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" f9d11cf99f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" f9d11cf99f.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection f9d11cf99f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" f9d11cf99f.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1B08t4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f9d11cf99f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2Z3635.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3P84g.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 487fb00e22.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2890dc46c1.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 20 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2890dc46c1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2890dc46c1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f9d11cf99f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1B08t4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2Z3635.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 487fb00e22.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f9d11cf99f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1B08t4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3P84g.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 487fb00e22.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2Z3635.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3P84g.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 1B08t4.exe -
Executes dropped EXE 13 IoCs
pid Process 3004 J3G30.exe 1352 s2Y89.exe 2028 1B08t4.exe 3400 skotes.exe 3588 2Z3635.exe 2400 3P84g.exe 1028 4R117c.exe 440 487fb00e22.exe 5964 2890dc46c1.exe 6200 skotes.exe 6652 f9d11cf99f.exe 6156 skotes.exe 2524 skotes.exe -
Identifies Wine through registry keys 2 TTPs 10 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 1B08t4.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 3P84g.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine f9d11cf99f.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 2Z3635.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 487fb00e22.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 2890dc46c1.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features f9d11cf99f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" f9d11cf99f.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2890dc46c1.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1004665001\\2890dc46c1.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\f9d11cf99f.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1004667001\\f9d11cf99f.exe" skotes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5aa47e342483cbf1379164875c5131f896ce3ca562d37135e8baed56fc6486a0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" J3G30.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" s2Y89.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\487fb00e22.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1004664001\\487fb00e22.exe" skotes.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0007000000023c94-49.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
pid Process 2028 1B08t4.exe 3400 skotes.exe 3588 2Z3635.exe 2400 3P84g.exe 440 487fb00e22.exe 5964 2890dc46c1.exe 6200 skotes.exe 6652 f9d11cf99f.exe 6156 skotes.exe 2524 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1B08t4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 1128 3588 WerFault.exe 90 5180 440 WerFault.exe 121 5272 440 WerFault.exe 121 -
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language J3G30.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3P84g.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4R117c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 487fb00e22.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f9d11cf99f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5aa47e342483cbf1379164875c5131f896ce3ca562d37135e8baed56fc6486a0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2Z3635.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language s2Y89.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1B08t4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2890dc46c1.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 3768 taskkill.exe 1548 taskkill.exe 3620 taskkill.exe 4340 taskkill.exe 4348 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 2028 1B08t4.exe 2028 1B08t4.exe 3400 skotes.exe 3400 skotes.exe 3588 2Z3635.exe 3588 2Z3635.exe 2400 3P84g.exe 2400 3P84g.exe 1028 4R117c.exe 1028 4R117c.exe 440 487fb00e22.exe 440 487fb00e22.exe 1028 4R117c.exe 1028 4R117c.exe 5964 2890dc46c1.exe 5964 2890dc46c1.exe 6200 skotes.exe 6200 skotes.exe 6652 f9d11cf99f.exe 6652 f9d11cf99f.exe 6652 f9d11cf99f.exe 6652 f9d11cf99f.exe 6652 f9d11cf99f.exe 6156 skotes.exe 6156 skotes.exe 2524 skotes.exe 2524 skotes.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 4348 taskkill.exe Token: SeDebugPrivilege 3768 taskkill.exe Token: SeDebugPrivilege 1548 taskkill.exe Token: SeDebugPrivilege 3620 taskkill.exe Token: SeDebugPrivilege 4340 taskkill.exe Token: SeDebugPrivilege 1636 firefox.exe Token: SeDebugPrivilege 1636 firefox.exe Token: SeDebugPrivilege 6652 f9d11cf99f.exe Token: SeDebugPrivilege 1636 firefox.exe Token: SeDebugPrivilege 1636 firefox.exe Token: SeDebugPrivilege 1636 firefox.exe -
Suspicious use of FindShellTrayWindow 32 IoCs
pid Process 2028 1B08t4.exe 1028 4R117c.exe 1028 4R117c.exe 1028 4R117c.exe 1028 4R117c.exe 1028 4R117c.exe 1028 4R117c.exe 1028 4R117c.exe 1636 firefox.exe 1636 firefox.exe 1636 firefox.exe 1636 firefox.exe 1636 firefox.exe 1636 firefox.exe 1636 firefox.exe 1636 firefox.exe 1636 firefox.exe 1636 firefox.exe 1636 firefox.exe 1636 firefox.exe 1636 firefox.exe 1636 firefox.exe 1636 firefox.exe 1636 firefox.exe 1636 firefox.exe 1636 firefox.exe 1636 firefox.exe 1636 firefox.exe 1636 firefox.exe 1028 4R117c.exe 1028 4R117c.exe 1028 4R117c.exe -
Suspicious use of SendNotifyMessage 30 IoCs
pid Process 1028 4R117c.exe 1028 4R117c.exe 1028 4R117c.exe 1028 4R117c.exe 1028 4R117c.exe 1028 4R117c.exe 1028 4R117c.exe 1636 firefox.exe 1636 firefox.exe 1636 firefox.exe 1636 firefox.exe 1636 firefox.exe 1636 firefox.exe 1636 firefox.exe 1636 firefox.exe 1636 firefox.exe 1636 firefox.exe 1636 firefox.exe 1636 firefox.exe 1636 firefox.exe 1636 firefox.exe 1636 firefox.exe 1636 firefox.exe 1636 firefox.exe 1636 firefox.exe 1636 firefox.exe 1636 firefox.exe 1028 4R117c.exe 1028 4R117c.exe 1028 4R117c.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1636 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1244 wrote to memory of 3004 1244 5aa47e342483cbf1379164875c5131f896ce3ca562d37135e8baed56fc6486a0.exe 83 PID 1244 wrote to memory of 3004 1244 5aa47e342483cbf1379164875c5131f896ce3ca562d37135e8baed56fc6486a0.exe 83 PID 1244 wrote to memory of 3004 1244 5aa47e342483cbf1379164875c5131f896ce3ca562d37135e8baed56fc6486a0.exe 83 PID 3004 wrote to memory of 1352 3004 J3G30.exe 84 PID 3004 wrote to memory of 1352 3004 J3G30.exe 84 PID 3004 wrote to memory of 1352 3004 J3G30.exe 84 PID 1352 wrote to memory of 2028 1352 s2Y89.exe 87 PID 1352 wrote to memory of 2028 1352 s2Y89.exe 87 PID 1352 wrote to memory of 2028 1352 s2Y89.exe 87 PID 2028 wrote to memory of 3400 2028 1B08t4.exe 89 PID 2028 wrote to memory of 3400 2028 1B08t4.exe 89 PID 2028 wrote to memory of 3400 2028 1B08t4.exe 89 PID 1352 wrote to memory of 3588 1352 s2Y89.exe 90 PID 1352 wrote to memory of 3588 1352 s2Y89.exe 90 PID 1352 wrote to memory of 3588 1352 s2Y89.exe 90 PID 3004 wrote to memory of 2400 3004 J3G30.exe 105 PID 3004 wrote to memory of 2400 3004 J3G30.exe 105 PID 3004 wrote to memory of 2400 3004 J3G30.exe 105 PID 1244 wrote to memory of 1028 1244 5aa47e342483cbf1379164875c5131f896ce3ca562d37135e8baed56fc6486a0.exe 106 PID 1244 wrote to memory of 1028 1244 5aa47e342483cbf1379164875c5131f896ce3ca562d37135e8baed56fc6486a0.exe 106 PID 1244 wrote to memory of 1028 1244 5aa47e342483cbf1379164875c5131f896ce3ca562d37135e8baed56fc6486a0.exe 106 PID 1028 wrote to memory of 4348 1028 4R117c.exe 107 PID 1028 wrote to memory of 4348 1028 4R117c.exe 107 PID 1028 wrote to memory of 4348 1028 4R117c.exe 107 PID 1028 wrote to memory of 3768 1028 4R117c.exe 113 PID 1028 wrote to memory of 3768 1028 4R117c.exe 113 PID 1028 wrote to memory of 3768 1028 4R117c.exe 113 PID 1028 wrote to memory of 1548 1028 4R117c.exe 115 PID 1028 wrote to memory of 1548 1028 4R117c.exe 115 PID 1028 wrote to memory of 1548 1028 4R117c.exe 115 PID 1028 wrote to memory of 3620 1028 4R117c.exe 117 PID 1028 wrote to memory of 3620 1028 4R117c.exe 117 PID 1028 wrote to memory of 3620 1028 4R117c.exe 117 PID 1028 wrote to memory of 4340 1028 4R117c.exe 119 PID 1028 wrote to memory of 4340 1028 4R117c.exe 119 PID 1028 wrote to memory of 4340 1028 4R117c.exe 119 PID 3400 wrote to memory of 440 3400 skotes.exe 121 PID 3400 wrote to memory of 440 3400 skotes.exe 121 PID 3400 wrote to memory of 440 3400 skotes.exe 121 PID 1028 wrote to memory of 2900 1028 4R117c.exe 122 PID 1028 wrote to memory of 2900 1028 4R117c.exe 122 PID 2900 wrote to memory of 1636 2900 firefox.exe 123 PID 2900 wrote to memory of 1636 2900 firefox.exe 123 PID 2900 wrote to memory of 1636 2900 firefox.exe 123 PID 2900 wrote to memory of 1636 2900 firefox.exe 123 PID 2900 wrote to memory of 1636 2900 firefox.exe 123 PID 2900 wrote to memory of 1636 2900 firefox.exe 123 PID 2900 wrote to memory of 1636 2900 firefox.exe 123 PID 2900 wrote to memory of 1636 2900 firefox.exe 123 PID 2900 wrote to memory of 1636 2900 firefox.exe 123 PID 2900 wrote to memory of 1636 2900 firefox.exe 123 PID 2900 wrote to memory of 1636 2900 firefox.exe 123 PID 1636 wrote to memory of 3368 1636 firefox.exe 124 PID 1636 wrote to memory of 3368 1636 firefox.exe 124 PID 1636 wrote to memory of 3368 1636 firefox.exe 124 PID 1636 wrote to memory of 3368 1636 firefox.exe 124 PID 1636 wrote to memory of 3368 1636 firefox.exe 124 PID 1636 wrote to memory of 3368 1636 firefox.exe 124 PID 1636 wrote to memory of 3368 1636 firefox.exe 124 PID 1636 wrote to memory of 3368 1636 firefox.exe 124 PID 1636 wrote to memory of 3368 1636 firefox.exe 124 PID 1636 wrote to memory of 3368 1636 firefox.exe 124 PID 1636 wrote to memory of 3368 1636 firefox.exe 124 PID 1636 wrote to memory of 3368 1636 firefox.exe 124 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\5aa47e342483cbf1379164875c5131f896ce3ca562d37135e8baed56fc6486a0.exe"C:\Users\Admin\AppData\Local\Temp\5aa47e342483cbf1379164875c5131f896ce3ca562d37135e8baed56fc6486a0.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\J3G30.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\J3G30.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s2Y89.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s2Y89.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1B08t4.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1B08t4.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Users\Admin\AppData\Local\Temp\1004664001\487fb00e22.exe"C:\Users\Admin\AppData\Local\Temp\1004664001\487fb00e22.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:440 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 440 -s 15967⤵
- Program crash
PID:5180
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 440 -s 15847⤵
- Program crash
PID:5272
-
-
-
C:\Users\Admin\AppData\Local\Temp\1004665001\2890dc46c1.exe"C:\Users\Admin\AppData\Local\Temp\1004665001\2890dc46c1.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5964
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"6⤵PID:6224
-
-
C:\Users\Admin\AppData\Local\Temp\1004667001\f9d11cf99f.exe"C:\Users\Admin\AppData\Local\Temp\1004667001\f9d11cf99f.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6652
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2Z3635.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2Z3635.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3588 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3588 -s 16045⤵
- Program crash
PID:1128
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3P84g.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3P84g.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2400
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4R117c.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4R117c.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4348
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3768
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1548
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3620
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4340
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking3⤵
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking4⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2060 -parentBuildID 20240401114208 -prefsHandle 1980 -prefMapHandle 1972 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d71a115c-e70a-4b43-92a4-02da0f7bad3a} 1636 "\\.\pipe\gecko-crash-server-pipe.1636" gpu5⤵PID:3368
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2508 -parentBuildID 20240401114208 -prefsHandle 2500 -prefMapHandle 2496 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3f8894e9-a80e-4a70-9622-19619aa8cc96} 1636 "\\.\pipe\gecko-crash-server-pipe.1636" socket5⤵PID:4544
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1644 -childID 1 -isForBrowser -prefsHandle 2976 -prefMapHandle 3272 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fca20a04-b9e9-46a4-886e-820a2e6350fc} 1636 "\\.\pipe\gecko-crash-server-pipe.1636" tab5⤵PID:4964
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3712 -childID 2 -isForBrowser -prefsHandle 3732 -prefMapHandle 3728 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {94c2e0d5-1715-43b7-bbd9-da265c3193aa} 1636 "\\.\pipe\gecko-crash-server-pipe.1636" tab5⤵PID:4472
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4752 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4744 -prefMapHandle 4740 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {69c6da2b-2822-4c03-ba14-88504877b442} 1636 "\\.\pipe\gecko-crash-server-pipe.1636" utility5⤵
- Checks processor information in registry
PID:6792
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4820 -childID 3 -isForBrowser -prefsHandle 5704 -prefMapHandle 4744 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {192c9d56-b55b-4d1f-aaff-9afeb4eb6e5a} 1636 "\\.\pipe\gecko-crash-server-pipe.1636" tab5⤵PID:6000
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5832 -childID 4 -isForBrowser -prefsHandle 5840 -prefMapHandle 5844 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {767244ae-1d17-45db-bbf5-184622fdc780} 1636 "\\.\pipe\gecko-crash-server-pipe.1636" tab5⤵PID:6012
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6120 -childID 5 -isForBrowser -prefsHandle 6040 -prefMapHandle 6048 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ae1615e5-6a24-4b5a-ab50-05c6420bbca0} 1636 "\\.\pipe\gecko-crash-server-pipe.1636" tab5⤵PID:6024
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3588 -ip 35881⤵PID:1344
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3588 -ip 35881⤵PID:3652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 440 -ip 4401⤵PID:2300
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 440 -ip 4401⤵PID:2700
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6200
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6156
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2524
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\activity-stream.discovery_stream.json
Filesize19KB
MD5089ec52a914428b7a39147c9f7c61064
SHA1c9475050e949f64a98f6221d224ce8bfaf8b80cf
SHA256af0755845eb66a90a04d02f4f6bc33c908a53d7d03e9ee0225dfdfebe47e15de
SHA512c4a503407f9473b0b3575cc0e63a0eb81dd76875c24bd3f4d8ed87ac629862ecccc3c0bb760483a990df1976d919e24a25c28b8040d385b29e62ba013361f6c3
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\cache2\entries\D500AD994A7515157BB2A6ADD5B18B754E4D2F99
Filesize13KB
MD58254d003adc2eb6b7cd74457dc1cb720
SHA1f21f632f91f466021ce6a69f9686b36b8330c5f8
SHA256646864c131d36d156cdff0f312b5a32510cfe8e9bb14eef63b54f88a178a6cf3
SHA5126c3f3248511ae99da59a99cc2576d539c5ede90b407f7ab7ec0deaccda6e54064b8a75b56c1afb6bd5d4d8b1b3564a45d1f9f4123c704d2ffb20721b2b596f74
-
Filesize
3.0MB
MD5427a063388d79b8cfec7e922feb81c07
SHA19638f797e91ea60bd424b3b2ddef9d0d53a2e030
SHA2560836b74c5507b060778ad90bab2ebd7bc230ffe3004d67ced991fa47ecbd566e
SHA512a775039b50cfbd24a87d10474653c1bbfc4afe85d0093dbbdad3d29c76466e9f156318a2fada8797e3b821a31e0e960fbd577d243c2b06ce1dfff601d288d7fa
-
Filesize
2.0MB
MD5fdd09e1d35cbc3837a26255801aacb53
SHA1c6a5b12ae933c9cb222b3d8a5ebb4bd432e22b95
SHA25626711a4c32193e82db0ecc58bfc95d9482f111d1389314029432f228fbdb75e0
SHA5127f52301a06f6f0fb4d6eaf07a784e45a9cd9bb275754aae59bf1a2139af1304d296da21777e2c0e52f2b8c876a4cea5ef35a6bd574135b1256714d6304087750
-
Filesize
2.7MB
MD567943707204f342d03b0d888d91dfcb7
SHA163adff12f8b484c2df92fc1d90e9b8651c885e74
SHA256c34b445ec31ca803d440aa62ccd026dd4a16f3d91faad0389cbcc4e63dd2b2f2
SHA512f322865b051f58f6024866b81150a13a9697ea970e2c14577a15cd62162cd685b6af70bd310532011dc725ebbe377efa9431550194af1d76d6ea68a967886464
-
Filesize
898KB
MD5c2f642b51ce5dd471ea60f6670788937
SHA180d535b22689a7eaba487bea737f948163b84530
SHA256e4b0df56bcdfaf576ee33b4e88cb33a5b56b615b49989ddb0f967d204ce6cb4d
SHA512310c14ff21f8a9e6c9697cfef7cb7636a75de5711e6455fc35304c75a7a940a4b51c0ed6fa3196e8dbac8854d472dc4e10e0138e4363a11975240eb6b84f3d5e
-
Filesize
5.5MB
MD51eec1a5651e83163806b846fd7751bd2
SHA140694d5d0676b311878dd0fb8eb2ac6aaee0d5bc
SHA256d5fdee1e26f80bd7fbcac1618d2578a705bf39f3a4d6244a6fae8dde7cc2d0fc
SHA512ef869fd180d08b2e78454871b9ef530af2775ba372a3de2c027e925f85ea3f00867a792e2f311e7a24b8c7dbd0c455b7ff5ac6ad086560777bcba938348c0d5b
-
Filesize
2.0MB
MD52bd1643c51ab40c4b17e6f15b1eaeb0c
SHA10ed83b36c8cc314690e7353a2a3631deee098331
SHA256f7536ef71a6a1df24263e5bf3b58be00674f303eff4787d70de246e481f8330e
SHA5124e5d5416d72b5d254b32b98feed4009eb321d21f520d607fdce174b3a7bfd9cab01cfa43981c0dc6f989c936c411e274e924244d31223d6ad2dcee5e7d6b5246
-
Filesize
3.4MB
MD5bf1fc5049728f09c3c879e81691af7c9
SHA112246ddbfc7cf649cdf77a0d8acff64524336914
SHA256e82602b0d52e3ae1d6e67e68892d0e0bccec0414271499cb4cb87f1b244d88b3
SHA512962d2487b4b3cb5f2b01c1c8c652f596b6864fe9773b3fe643db726fe93bd135086535ac71f1045a7810775aa5c32bebbd45f5e0c53bd78d2e081c770af031d8
-
Filesize
3.1MB
MD5065366de9cd0ccac6b7e2dc0f2c5c8bd
SHA140a61570203bf51aa2cc995b184cc117b619ab44
SHA256295373e8416d0e053b5745f47073e17fc342de0246a930469e9cb9de6f740dd5
SHA5123f895156884dc9f9b2d1ef4a4d2162fc82fa58452b5f6cd6ac8db0d88d444854149c532793dce33c7af58f6f5eec24cce67cdb3e26e4dc2b8b59684013072a99
-
Filesize
3.0MB
MD5c641b3ee57b10edb933e1f5eddabce24
SHA1028a2826c6726e0facaf6902a4499a7697ff3e6c
SHA256845b66567bfde5a0d1959f6d6ade4cbaa063b0f13c0fde2626950a67bfb05a6f
SHA512bfd9652fc052ccc08e0856bd1e56ae8664d249c3a764a47140d42fc933532558ca135b0203bb512d2cda5a584493240c49cdebb4000c667abd13a730c7583e3e
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\AlternateServices.bin
Filesize8KB
MD50c2a8ad3d1ce2691f137cfbf6ea20399
SHA1640c503026d4f58a5fda2bde2210e3aad77e9ee9
SHA2568d28b50af970c4657ddb90cc10fa4be69eb442b9d010629dce3b05ac2d42bad0
SHA51281ffef0fab0b2af1c17d47969a9f727e117a7c845bfb11937d9bac228b5dfa66525cfb1270c6a321976d11ad8990b0f6ea3619d0aeee8a085e3717ecfb3684c5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.bin
Filesize23KB
MD5f9776ed9801969ef70c23e757211d9bb
SHA1801ce6c841f8f2ba29120e14b148e787e9cf2edf
SHA2566005b95718630843f11d13bfc08b913bacc08aa7bda25885724ec6d9ee4a5797
SHA5125714cbe55c332b45da1942e3a0810858ee6df5b50953f11a69a9bec06594b05d4c31458e6eee9af805ec7ac936f8f6f8c04827790f917b46669e7ec0d5824672
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.bin
Filesize5KB
MD51f7aa9dc5623c08c90818753052cbf60
SHA1d6b4e3a9167b7dcb9473160e480e52e662d7e66c
SHA256f9b7cac4465aaf9a3375eb0ba5fbdafed4f83ce17bbaada1b10e86394cd01ae2
SHA512c61f87afd9ae77042065e997366157f3eb29e3bd179b39c30dcf9bb0470b6099a28c7f6f428e492b98092a81d7cda883ae355a8ef690efad6e449a780fdd35ce
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.bin
Filesize6KB
MD5daee17e8a7685a9a9c9aed455a31bd6b
SHA19cbb7ecaa6731e09ead6bff114cb82f02f1db2d6
SHA2563fa1eddfa39ccfa17e694f0223bddb776be9a5061a82b618adafefc3c7fc0c3e
SHA512702eff46f7862e46e432f75d19e43be1508c7dc8885576fa75362edee5b1e09efe851aa7f004dcc8af17876602a877f74863f39d47bb802278e91c6ed4d9bcb6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.bin
Filesize15KB
MD5bc557d620a2e04339b2480b414667e8d
SHA17bc165ad3b35b9671fea3d3cc162c15084fb389a
SHA256f5049777daa23101aa6ad9c019b132101868d2b9708774c11806be3782739577
SHA512ef1cf69cb9286cad22a36d341360682a73bd64072894d6921a38c3c4ac47f0b396109503a5c7c2e6f21962efdc3349aa8ba244572792ca5e6624a6fa4a144923
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD54e299a41cdd58df80ed2312cf2ea60e5
SHA10524b31a41edd559caaad626754fed779f162e6d
SHA256489007b137aa0577abdc7f3b1cb5ed7409e550e3531ccf5b62401f7237049b30
SHA5122565fa2fe1b2f5a3ab2fbd1e3790f151631f6fa18d6ac312e304e99dff9aca72d265eb6684991d5ea4c48a08c06fd5c4d6095ec7a282b0bd35c87f37af251262
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5eb3dc9b6895e14176cfc3054a7cc00a4
SHA16190da5543a32512da0acd0ad6116994901da8a5
SHA256782867053c73a7b26050183c33cb6d40cb3f557899ef67d9f04829181c79cd69
SHA51244f5303bca5124ef15d78fbc76ccb4d318d42ab6dd29adb18bc06d7a85cf07ed03463e8e77b3da363c2a0759635cbfd2d3efbb896d6e67e6396e0c2510dba4a8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD576568ebf86fb3e5c8e98daa694a864c7
SHA1e3b618c7d96db3252b38f097113046dd1866f1dc
SHA25640fa6c3484d8b16fafecf78e03f38e69019090c387194f52a07750707c55aa65
SHA5120fa05eec20c13d2ea9f6e64c1117043651429aa705e0e34092a6f17af064c5c66a6bf561250311e2f492be0a05fb6b2195e1423cb64b46126bba82dfa4a10108
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD55e560f3a2dcfbe7c8dc32acae8a79bb2
SHA12284b10b7ec739853134ed5fa03b706ee53666c7
SHA256ce2e56602ef12f9c9b350d4464b871c9146d1acba29d1c6a0480d05c1a2eb0b0
SHA512d37cb95a798615327685b6eaaf9e4d42649fa4a32d5f9a96ac74ae04729184f549af71cb981cdf63f7906613e2d786f86194ce51f570fcca9a297ad1fb8172f6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5ac965ae0f3adcda9ec362c0f927cb105
SHA17e6e0ab6d7e1b52ae238d780f56449ceee4b57f5
SHA256bc4231e7e17bb2d0302c9f2dbe66052b8260991f93fb59665c9c44f79ccc4f84
SHA51202d6b22cbbe63690944d69c00099a8b2c9b4b1afff7aafc12eb5ab5a167749a4311bf6ade0c53cf95725d23dfa48cfd11cd696219cb97fcba44d59db832c864a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5ba8c3e90af53c9e372f6ec95ace490d0
SHA17f6930092c91a038e0f16dc1d80278d2934fbf2f
SHA256e10739c34904f65933e542be5fffbbc45ee21a87e829224c30f65bab1872f912
SHA51265c233fb1db8c3b8fb94867840b947e62eae325fb19749294223600050f46d225729cd73047ba224ffa77efa628207a666f692f4f2d0a7b0fee993a9ff01a13c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\pending_pings\000d9963-a380-4680-ae12-2b4b0c1736c0
Filesize982B
MD56717f2be27d43d2f0604557bdd539495
SHA1567095cad39abe8c0a5384539c8b7d73439d4a67
SHA25614931cc1b398ea9f650ad5560e67d9a4b57026bd71a636bf273d21dd5f258d87
SHA51273b6cdc5dfe375386014e927397c3f2c8f22e7570b2fcc102331cb2f24f7ed2bf5a44fe6dc4446f9d0135a6f6d7c30fc53a449e138c0832184a2ab1720208f9f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\pending_pings\975c57ab-f492-4578-95c4-96c44c0ecd13
Filesize27KB
MD5bd96366d1e5fb89094a8fe504c5017f5
SHA1baad231c9d57da995a495314a2019b3bd262b60e
SHA2560675c5150759a9d3b2dd089fd7120661b941de83e5ca9c4ae1df2b362a0b6d00
SHA512e5a121ddf5a6ffd4c11ba73d44b834838049ef502e39c516df667da1a8f6180bc4063946b54ac6cc53d289d69bdb5513f0cecc02e088eb48b82167d031601a8e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\pending_pings\e0b67593-7360-4ca9-a30c-549f6e6fe28a
Filesize671B
MD51c78bcf41faaaffcadd31c0bbde5ab87
SHA16c658b10fd64887ffbdff4aa83ab9af97028bc6a
SHA256ac0789b9b39ced23598074ae17b25b37a24edc8efd31f8997e1e618297181da5
SHA512377913211d4a74a236527b56d430016ea73a03d9f113e433aa50863c6f5a83f8c2a5640fe1fadfe37aa5d33eab5cfceb25019edfe8bb1465ad0de28e9ee9279a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
11KB
MD56039d1e6882c56b5634412060c6893da
SHA1328e50c70fdf8b4363ee971c03d2870dc85cdbcf
SHA25677af19b30f687cfdaf7f11048dab83eb1ef8cf173f1612e0682214d033b01175
SHA512e95774c02c7d67cf9b79138e9cda1d9e957ae2b315504a75301a1a07face6698d22441fa6b1e36643fadd633a4e74f3532d7d6aa42cd5072a6d101b5ca6ba7a3
-
Filesize
15KB
MD574fb494a5a25a5c34d07cc5cda999cdd
SHA170a45d37c2bc3b4e171c0951c18f0166a6deea5d
SHA25608ffd291502c290457ca5061a48edbaf527abb7cd34e32f0b742d1da3733de99
SHA5129a1fda160a69b87a11f7f7585f3cdafeec8a8bbcab32d5ed4e8748c694130def524c9c686d2972b1e34c316907374a32bbacae201633f7ee4acfc8f77d0f789b
-
Filesize
10KB
MD54f92fb39e3ff8d280aa0861bef27eaa0
SHA1b65a8cc5fb6bce544dff34ac9ea3452025aadef4
SHA256d9d91faab3f8e63a184cc9f4e9beb7b2a35422915ae8e924d990b66be95bf3ce
SHA51285598ee6c88ab82f7928c372040c40f6ed0dc1c563facf5593ff8c74c7c1606d464266963eb75c6a8014fb3f4bb2f4a47a469ca66ff37761e603806272b03da9
-
Filesize
10KB
MD5a6b0aad45e585c3945f86a1e9d293b5f
SHA16059de029e415e7bb062a024027e78c18d35675c
SHA256887c2ab811b53b67b5e8afafdea2ea5765577de95d30e11e0f16366a1bce3944
SHA512c19e1f572f756890c0fa49cc0ad491ef5c46cc8b2748234117e4be2a6b88958f061b30d18a124ac0c819033af7ae7c0fc20d7aea669aa55dece87727e6abc665