Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 21:00
Static task
static1
General
-
Target
2323be2fd15aa79b9342d61bae72e3ca6e29ab916cb3ecdf9dd95dc639a3a8c0.exe
-
Size
6.0MB
-
MD5
cc0a80de5d1a2b2781f869c76ceaff3a
-
SHA1
edbf51fe76d328745f685dee313fbe23b5720339
-
SHA256
2323be2fd15aa79b9342d61bae72e3ca6e29ab916cb3ecdf9dd95dc639a3a8c0
-
SHA512
0bb390e5a0263828e9fc117e38da340e912fd701b8e01e7b51e5fa8e8be30a25416c05f5ddf11141d28aa4eb51461a812256626c323aa2f361d5a852ba773240
-
SSDEEP
98304:KLXRZyXqa00dZxxjdUfxFBz29410TEutST+8bNSRxgTi2HbHO3xaaL5DPgsbvxw6:KlkBTxvUfxFo44EumdNSRavbWxN9DY+C
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Extracted
lumma
https://founpiuer.store/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" e4e8012e46.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" e4e8012e46.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" e4e8012e46.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" e4e8012e46.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection e4e8012e46.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" e4e8012e46.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1d58t5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2f2338.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3O27T.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1ac41098a5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ef2d04c1e4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e4e8012e46.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3O27T.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e4e8012e46.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2f2338.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2f2338.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1ac41098a5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1d58t5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1ac41098a5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3O27T.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ef2d04c1e4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ef2d04c1e4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e4e8012e46.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1d58t5.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 1d58t5.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 12 IoCs
pid Process 2912 w0s26.exe 2872 O4l39.exe 2432 1d58t5.exe 400 skotes.exe 4344 2f2338.exe 4048 3O27T.exe 1992 4U980t.exe 4640 1ac41098a5.exe 5916 ef2d04c1e4.exe 5960 e4e8012e46.exe 5176 skotes.exe 744 skotes.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 1d58t5.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 1ac41098a5.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 2f2338.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 3O27T.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine ef2d04c1e4.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine e4e8012e46.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features e4e8012e46.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" e4e8012e46.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" O4l39.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\1ac41098a5.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1004688001\\1ac41098a5.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ef2d04c1e4.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1004689001\\ef2d04c1e4.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e4e8012e46.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1004691001\\e4e8012e46.exe" skotes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2323be2fd15aa79b9342d61bae72e3ca6e29ab916cb3ecdf9dd95dc639a3a8c0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" w0s26.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0007000000023cb8-47.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 2432 1d58t5.exe 400 skotes.exe 4344 2f2338.exe 4048 3O27T.exe 4640 1ac41098a5.exe 5916 ef2d04c1e4.exe 5960 e4e8012e46.exe 5176 skotes.exe 744 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1d58t5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 4684 4344 WerFault.exe 90 4896 4344 WerFault.exe 90 3608 4640 WerFault.exe 105 -
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language w0s26.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language O4l39.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2f2338.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ef2d04c1e4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e4e8012e46.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2323be2fd15aa79b9342d61bae72e3ca6e29ab916cb3ecdf9dd95dc639a3a8c0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1d58t5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1ac41098a5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4U980t.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3O27T.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 2188 taskkill.exe 1700 taskkill.exe 3208 taskkill.exe 1460 taskkill.exe 1540 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 2432 1d58t5.exe 2432 1d58t5.exe 400 skotes.exe 400 skotes.exe 4344 2f2338.exe 4344 2f2338.exe 4048 3O27T.exe 4048 3O27T.exe 4640 1ac41098a5.exe 4640 1ac41098a5.exe 1992 4U980t.exe 1992 4U980t.exe 5916 ef2d04c1e4.exe 5916 ef2d04c1e4.exe 1992 4U980t.exe 1992 4U980t.exe 5960 e4e8012e46.exe 5960 e4e8012e46.exe 5960 e4e8012e46.exe 5960 e4e8012e46.exe 5960 e4e8012e46.exe 5176 skotes.exe 5176 skotes.exe 744 skotes.exe 744 skotes.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 1700 taskkill.exe Token: SeDebugPrivilege 3208 taskkill.exe Token: SeDebugPrivilege 1460 taskkill.exe Token: SeDebugPrivilege 1540 taskkill.exe Token: SeDebugPrivilege 2188 taskkill.exe Token: SeDebugPrivilege 4192 firefox.exe Token: SeDebugPrivilege 4192 firefox.exe Token: SeDebugPrivilege 5960 e4e8012e46.exe Token: SeDebugPrivilege 4192 firefox.exe Token: SeDebugPrivilege 4192 firefox.exe Token: SeDebugPrivilege 4192 firefox.exe -
Suspicious use of FindShellTrayWindow 32 IoCs
pid Process 2432 1d58t5.exe 1992 4U980t.exe 1992 4U980t.exe 1992 4U980t.exe 1992 4U980t.exe 1992 4U980t.exe 1992 4U980t.exe 4192 firefox.exe 4192 firefox.exe 4192 firefox.exe 4192 firefox.exe 4192 firefox.exe 4192 firefox.exe 4192 firefox.exe 4192 firefox.exe 4192 firefox.exe 4192 firefox.exe 4192 firefox.exe 4192 firefox.exe 4192 firefox.exe 4192 firefox.exe 4192 firefox.exe 4192 firefox.exe 4192 firefox.exe 4192 firefox.exe 4192 firefox.exe 4192 firefox.exe 4192 firefox.exe 1992 4U980t.exe 1992 4U980t.exe 1992 4U980t.exe 1992 4U980t.exe -
Suspicious use of SendNotifyMessage 30 IoCs
pid Process 1992 4U980t.exe 1992 4U980t.exe 1992 4U980t.exe 1992 4U980t.exe 1992 4U980t.exe 1992 4U980t.exe 4192 firefox.exe 4192 firefox.exe 4192 firefox.exe 4192 firefox.exe 4192 firefox.exe 4192 firefox.exe 4192 firefox.exe 4192 firefox.exe 4192 firefox.exe 4192 firefox.exe 4192 firefox.exe 4192 firefox.exe 4192 firefox.exe 4192 firefox.exe 4192 firefox.exe 4192 firefox.exe 4192 firefox.exe 4192 firefox.exe 4192 firefox.exe 4192 firefox.exe 1992 4U980t.exe 1992 4U980t.exe 1992 4U980t.exe 1992 4U980t.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4192 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 904 wrote to memory of 2912 904 2323be2fd15aa79b9342d61bae72e3ca6e29ab916cb3ecdf9dd95dc639a3a8c0.exe 86 PID 904 wrote to memory of 2912 904 2323be2fd15aa79b9342d61bae72e3ca6e29ab916cb3ecdf9dd95dc639a3a8c0.exe 86 PID 904 wrote to memory of 2912 904 2323be2fd15aa79b9342d61bae72e3ca6e29ab916cb3ecdf9dd95dc639a3a8c0.exe 86 PID 2912 wrote to memory of 2872 2912 w0s26.exe 87 PID 2912 wrote to memory of 2872 2912 w0s26.exe 87 PID 2912 wrote to memory of 2872 2912 w0s26.exe 87 PID 2872 wrote to memory of 2432 2872 O4l39.exe 88 PID 2872 wrote to memory of 2432 2872 O4l39.exe 88 PID 2872 wrote to memory of 2432 2872 O4l39.exe 88 PID 2432 wrote to memory of 400 2432 1d58t5.exe 89 PID 2432 wrote to memory of 400 2432 1d58t5.exe 89 PID 2432 wrote to memory of 400 2432 1d58t5.exe 89 PID 2872 wrote to memory of 4344 2872 O4l39.exe 90 PID 2872 wrote to memory of 4344 2872 O4l39.exe 90 PID 2872 wrote to memory of 4344 2872 O4l39.exe 90 PID 2912 wrote to memory of 4048 2912 w0s26.exe 100 PID 2912 wrote to memory of 4048 2912 w0s26.exe 100 PID 2912 wrote to memory of 4048 2912 w0s26.exe 100 PID 904 wrote to memory of 1992 904 2323be2fd15aa79b9342d61bae72e3ca6e29ab916cb3ecdf9dd95dc639a3a8c0.exe 101 PID 904 wrote to memory of 1992 904 2323be2fd15aa79b9342d61bae72e3ca6e29ab916cb3ecdf9dd95dc639a3a8c0.exe 101 PID 904 wrote to memory of 1992 904 2323be2fd15aa79b9342d61bae72e3ca6e29ab916cb3ecdf9dd95dc639a3a8c0.exe 101 PID 1992 wrote to memory of 1700 1992 4U980t.exe 102 PID 1992 wrote to memory of 1700 1992 4U980t.exe 102 PID 1992 wrote to memory of 1700 1992 4U980t.exe 102 PID 400 wrote to memory of 4640 400 skotes.exe 105 PID 400 wrote to memory of 4640 400 skotes.exe 105 PID 400 wrote to memory of 4640 400 skotes.exe 105 PID 1992 wrote to memory of 3208 1992 4U980t.exe 106 PID 1992 wrote to memory of 3208 1992 4U980t.exe 106 PID 1992 wrote to memory of 3208 1992 4U980t.exe 106 PID 1992 wrote to memory of 1460 1992 4U980t.exe 108 PID 1992 wrote to memory of 1460 1992 4U980t.exe 108 PID 1992 wrote to memory of 1460 1992 4U980t.exe 108 PID 1992 wrote to memory of 1540 1992 4U980t.exe 111 PID 1992 wrote to memory of 1540 1992 4U980t.exe 111 PID 1992 wrote to memory of 1540 1992 4U980t.exe 111 PID 1992 wrote to memory of 2188 1992 4U980t.exe 114 PID 1992 wrote to memory of 2188 1992 4U980t.exe 114 PID 1992 wrote to memory of 2188 1992 4U980t.exe 114 PID 1992 wrote to memory of 2064 1992 4U980t.exe 116 PID 1992 wrote to memory of 2064 1992 4U980t.exe 116 PID 2064 wrote to memory of 4192 2064 firefox.exe 117 PID 2064 wrote to memory of 4192 2064 firefox.exe 117 PID 2064 wrote to memory of 4192 2064 firefox.exe 117 PID 2064 wrote to memory of 4192 2064 firefox.exe 117 PID 2064 wrote to memory of 4192 2064 firefox.exe 117 PID 2064 wrote to memory of 4192 2064 firefox.exe 117 PID 2064 wrote to memory of 4192 2064 firefox.exe 117 PID 2064 wrote to memory of 4192 2064 firefox.exe 117 PID 2064 wrote to memory of 4192 2064 firefox.exe 117 PID 2064 wrote to memory of 4192 2064 firefox.exe 117 PID 2064 wrote to memory of 4192 2064 firefox.exe 117 PID 4192 wrote to memory of 1752 4192 firefox.exe 118 PID 4192 wrote to memory of 1752 4192 firefox.exe 118 PID 4192 wrote to memory of 1752 4192 firefox.exe 118 PID 4192 wrote to memory of 1752 4192 firefox.exe 118 PID 4192 wrote to memory of 1752 4192 firefox.exe 118 PID 4192 wrote to memory of 1752 4192 firefox.exe 118 PID 4192 wrote to memory of 1752 4192 firefox.exe 118 PID 4192 wrote to memory of 1752 4192 firefox.exe 118 PID 4192 wrote to memory of 1752 4192 firefox.exe 118 PID 4192 wrote to memory of 1752 4192 firefox.exe 118 PID 4192 wrote to memory of 1752 4192 firefox.exe 118 PID 4192 wrote to memory of 1752 4192 firefox.exe 118 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2323be2fd15aa79b9342d61bae72e3ca6e29ab916cb3ecdf9dd95dc639a3a8c0.exe"C:\Users\Admin\AppData\Local\Temp\2323be2fd15aa79b9342d61bae72e3ca6e29ab916cb3ecdf9dd95dc639a3a8c0.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w0s26.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w0s26.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\O4l39.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\O4l39.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1d58t5.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1d58t5.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Users\Admin\AppData\Local\Temp\1004688001\1ac41098a5.exe"C:\Users\Admin\AppData\Local\Temp\1004688001\1ac41098a5.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4640 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4640 -s 15727⤵
- Program crash
PID:3608
-
-
-
C:\Users\Admin\AppData\Local\Temp\1004689001\ef2d04c1e4.exe"C:\Users\Admin\AppData\Local\Temp\1004689001\ef2d04c1e4.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5916
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"6⤵PID:6040
-
-
C:\Users\Admin\AppData\Local\Temp\1004691001\e4e8012e46.exe"C:\Users\Admin\AppData\Local\Temp\1004691001\e4e8012e46.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5960
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2f2338.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2f2338.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4344 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4344 -s 15885⤵
- Program crash
PID:4684
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4344 -s 15685⤵
- Program crash
PID:4896
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3O27T.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3O27T.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4048
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4U980t.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4U980t.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1700
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3208
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1460
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1540
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2188
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking3⤵
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking4⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2076 -parentBuildID 20240401114208 -prefsHandle 1988 -prefMapHandle 1980 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {105e1afb-1c6e-4336-8ea9-5c2daf4602a8} 4192 "\\.\pipe\gecko-crash-server-pipe.4192" gpu5⤵PID:1752
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2428 -parentBuildID 20240401114208 -prefsHandle 2500 -prefMapHandle 2496 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5afeb961-5927-4391-8a1d-1f41f785584e} 4192 "\\.\pipe\gecko-crash-server-pipe.4192" socket5⤵PID:2620
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3232 -childID 1 -isForBrowser -prefsHandle 3224 -prefMapHandle 3220 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1300 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6d9b3481-9963-4d6f-808e-7dc02fab7d5a} 4192 "\\.\pipe\gecko-crash-server-pipe.4192" tab5⤵PID:4164
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3980 -childID 2 -isForBrowser -prefsHandle 3976 -prefMapHandle 3972 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1300 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {76b1e48c-1399-4e2c-9d90-f4dd508bbe0d} 4192 "\\.\pipe\gecko-crash-server-pipe.4192" tab5⤵PID:1952
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4812 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4792 -prefMapHandle 4732 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {74616a2d-75e8-4867-86ce-5294fb1241c2} 4192 "\\.\pipe\gecko-crash-server-pipe.4192" utility5⤵
- Checks processor information in registry
PID:5788
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5420 -childID 3 -isForBrowser -prefsHandle 5344 -prefMapHandle 5416 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1300 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c07d2403-64e5-4b02-84b7-594e2b2b6341} 4192 "\\.\pipe\gecko-crash-server-pipe.4192" tab5⤵PID:5256
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5552 -childID 4 -isForBrowser -prefsHandle 5632 -prefMapHandle 5628 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1300 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {14175a7e-9ad7-4a1f-bbf6-9b8f672b3529} 4192 "\\.\pipe\gecko-crash-server-pipe.4192" tab5⤵PID:5268
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5828 -childID 5 -isForBrowser -prefsHandle 5748 -prefMapHandle 5756 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1300 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cc148e0b-a083-4139-b01c-dee916da12d8} 4192 "\\.\pipe\gecko-crash-server-pipe.4192" tab5⤵PID:5284
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4344 -ip 43441⤵PID:3368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4344 -ip 43441⤵PID:4424
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4640 -ip 46401⤵PID:2408
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5176
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:744
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\activity-stream.discovery_stream.json
Filesize19KB
MD5980a6ed6435a702773247d02b5072be7
SHA1762cbdca32f2c6cf209ea6a9289ee4e736af30d4
SHA256e573625768d0cdebdaf8f82e2bb561e003c1a7cb2a441d17f3bf8212ee0828f1
SHA512bb2a12d6129813fb244e8096ef5143d60e0c2f0fbfa8e4a866fa29568e3e9cd01489dbf38b4ab37ca56cdd980c0804c5f0f9e8049d8cf5f96cb22f3e2dce5475
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\cache2\entries\D500AD994A7515157BB2A6ADD5B18B754E4D2F99
Filesize13KB
MD5ec75008ac449ced6f4ce4a1a49df76d3
SHA1f8e885fab5a6c2b5c2fe2fec2c6e3c9317c01fcc
SHA25614bb75852fef02e28730b53119986fc4bc419d746deb383cf76fcd507dff4ef6
SHA512215c943f5b605cc9ebd54ab45dcb7c194608aa67858874b9d7039aff5ab374bfd89a7ef1b74da2de5d060bf9cd5077b8b18ccb62ad8dff25602e0809b76f465a
-
Filesize
2.7MB
MD5931f8bee773858a42d4abd15f095faeb
SHA16fd014cf2ae593580cdb12fd7d92ea1646218385
SHA256a8fb3c434d73c06c3ae5e8bd172eea93e3062c7fc5882a65fd7c42a19e0f4f7f
SHA51286182ebf3c47614962548c63b2d24efa4d323fba2065c138c03fd8b8c982d55f71e6c81fcd09c3bef86b28c81a1045a6f6c2dedefa8b35cce762f0b1313384f0
-
Filesize
898KB
MD5d40ddacc179947e37456f6d7891f4d7e
SHA17d738e819123dd91910c8e2f260ec63175a259b7
SHA256d052f8d4e9ac71c5526d4f42819e998363ad4341e84dda5047d2d86dc623b070
SHA5124cff353716d964aefbb73316a9fd946ca84004968c33fe70ef96fa3dd999009a57a7aea03befc80c029b94252d823d41ec6ba960fe7d949d4191eb684c881091
-
Filesize
5.5MB
MD5e2d2790b4c2d99251faa41e219797f4a
SHA13815916075f53d196d48577bc45437ac68ea9032
SHA2560f630d3484371d8beea4f49361869579de8674f540bfa2e064c248c2d33233d5
SHA512b797ed0c343827c8044ddc620c6051fafe19431eb7d9ef75cd4ebdffcf7921915817b3a3694fa77aac1c5ac05a81c3ff828279273745421f8559a708349bb3ee
-
Filesize
2.0MB
MD5fb7b7bcdddc2f33ab022c222c225914d
SHA17577f5d3d26279d360b7d6282e1f3ca9d4ddc6d6
SHA256681df755fbb816d71e83fd61784466e525eb3f3794d697f2cf64cd006021d06b
SHA5129a1f0d49a8ed0e93ff06cc47a20b61a8a2669e2053026610ff49171391dad1d2ebde978f4054adb58c87bca2adbe0b78b4ea9b78ee18cc083fdd480527cd51a4
-
Filesize
3.5MB
MD5970fdbb3287ac57ea0456e42c94518ae
SHA1051cc1cfc9de64ee0737f93bc2fa32f96883173e
SHA25691f9bf3edaf51658c616b5cd66e484c13359cb21eea0d1d4e4bd48dbeb5b8207
SHA512cb3f10b8f31388f4f4c15878d189db320daf8cd8badf8fd6a3ac1ad18fd5d3d4e1fb84ba1f49a6cd656dffd29f4ad67e394614cf73e8dd880337800e055488a8
-
Filesize
3.2MB
MD5f9a1a09cae1f3e95ad4fb5d3e4a9aa99
SHA1a62246eddc35f2f896eda7bae424773e4a1bc701
SHA256f902e514362cedf39c5fb6684946a8128241ad2df0e4f5688fca2a2bdb189796
SHA512a84a6a88858a471b0eb78811df3cea3e9342edf2d62b34769ee282864723719e6a09aaacbb1ec0d34f712bbb66abfb5f7d17b9c6bc1c5b0b34aabf105e091e68
-
Filesize
3.0MB
MD5f72d1b75f6ab8637850c130111ab174a
SHA1d17726f2b118ea6732e7188d8619a829f350fa80
SHA2568f667976a8ae99b929b33236bce03a48a9526f94f87fbcde28746decbc9800c5
SHA512e11f9f1a306e3c3c35aaf34d0201ae588eff30e30f4b154379ed32fa3519f9b69258f66047be56f8288900e0be9184e5619f0ae522754490f3aed8fa6f6c08c4
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\AlternateServices.bin
Filesize10KB
MD5a06b405b8d0a91abf9f037e5492414d8
SHA158f5b48876f805b2a3993b449dbf33818b53582d
SHA2566e7f40bc6e696431bfeb54cb0f2bb2c7d7fd2eb567f9044a03ec1611bc7044f7
SHA512028633f819b8963dee1fe620d9dbacf06af212abe733b4a4ad7626350bdfe0a52d98f9503bbc72af33786555832dc129a2f9d1cfe8d89042adac790dc751768f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.bin
Filesize22KB
MD51e0bc2234035b09daaa501b92ff8c646
SHA177a580521ceeec78cdd23aa204b51229bf5657bc
SHA2562ae7773c4a4873c8ed2dd36eb7b1c7fdfd4fe71b3da1f4a1c56ac160cdbe21e9
SHA512278cb4ef5c57c14f6fafababeb56c5e2c20a4db8cd17095b2c6f83d0dd7b3ff09f5d566ec07056c2b91aaada7f02953a18103e474b3e86c93c86f5c816cc15a6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.bin
Filesize5KB
MD503d2959be4a2e07c1c07d86174dae4ee
SHA1b31c0e455edccdbe0efc4a9411013d1cb93bb558
SHA25695be929e144280dd0cdeba1f01b97f62ffcf5ea9a31e9d40b0595a44c358f0ce
SHA5121e20be8bf1b9356f56124b5bd55cfb347022d939ea07c1afc44a1f718874c08ac8eb750dcb308a2f62deb4a8aa8b9df194cc24c1d19b46ee3bf0bda42e1d7ce7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.bin
Filesize15KB
MD58eb69af92f10470200d08e8a2f970077
SHA1b1cfba5825646d431b1207370f64fb60016bcd2a
SHA2561fd54941ce63bcc6c10e356fe892d505a3332600b10507fab7d86e400bb91ee4
SHA512f205f10bf261494232b398bb39f03ab838415c6ae3c57e1ce91c069eddc3345272e7d7412ac9e09f99b69f41d8c5f15820e7c978d83db51d4a24ef70fe6276ad
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.bin
Filesize15KB
MD5b1270c6fbed158032dbfe957a4ddf89d
SHA1f9ac93f966df20065b7ea7dfe2751661a9bce96f
SHA2563808df571404f0a90621500dc48a98248eca92328cc3198186cbccbe29e0d51b
SHA512ce6a79b74d2918e2c26de7ec413cd1fa573df8949739e8e62fbf5a1f6a832a3876ff37d7d7206c9f67c3c97c268dd1c952bcbef3ac9986a50542743fe6a97fb4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5810ccb8430dfebadbc0c3704e967175b
SHA15c75aea992bef24815fa72ca7117c9e985341d3f
SHA25646ea34a1cdaa9fb13ffd93aa749c6cb38cf0111779b8ce18392b7b4b14ec788d
SHA51212482fc6d5f88d870ad0e637b3e4e4dbd6b2654ae143538d6ce288b8ab95bee138666e7830c8263df3738cc7f6743a19d59e7f61857aaf3cc1e7c3163d73cc02
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD525e6a568ca10925bfd035d48ab29e9ec
SHA1b7324849b98d36dbf06e9edf3221de09445db41d
SHA256b3923bcb8ae931de8a2d939981b7882a18f91b093401b8e11ae502af240e0d8f
SHA512628efcf72d1e9f1b09bda689836dbae6771af24b15cb6f9334f6f9be352d1a4479dfff318cfa761393b431abddaabeb77b08bb21f932ab592acd0e57c9d47f18
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD51cd5757813596f83c3ea3bf98bab81f1
SHA14406ddd8fcfd58286afb0efbebeeb01384572729
SHA2566f6c06372ed93c9ed02c16b5612857449381e0e4bcd09e125c2815ba2b0c9e8f
SHA5124a528827b688354926da802a6c12c9d3c934288ea1e6333b6f87df17be50079f576a7cdbb2221fc5ed31dfe011b7934bdc15144f42251d5bf6f44d34bd2eb742
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD50039a152bb898aed816b9f1c207b2ce2
SHA1a669d3aa7ff831d3b6fb7390e578060d0ed31d51
SHA256c988cd63cef10d93efa9a40a916faa150d10cf6888c626780bd63a00ebbd6f3b
SHA5123d1881aef3f255ba511a27250a488cec171a6136d2584ab8cd7e87dc06c31969d93ac0ef74b28a01c59ae510e8bbc86b33ed09be1f0257ade2d3e6b11f5b847f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\13f78d7c-72fd-47bf-82cc-14fab74eed64
Filesize671B
MD554a8effacdb965e86f71d4f6ad092fb0
SHA1748d102b2e38b294e668957be0a228e121781e3c
SHA2560f54da4fa78c1da1d8c3ed94fabfded4e2df9613d3b787cb13e1c49758f9fe82
SHA5123e6907858b4279387640628eceb428d7f0054fb21fa56519da6949f9269f880b30156e8ad9a4ebce75de6411ab089acefec708a867c770cb0b622d95a2c46a0b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\5ae3b78e-42d3-4b98-a4f0-92ab58c18197
Filesize25KB
MD59d622b1fdf291ba721c244a77376c423
SHA1f6fde0015cbba92b7d6b91cd78b59020df75b825
SHA256b6f8fa36506f74f314281dafad5b6ed1d00d26a02ee49d3beaa27aab78ebd6be
SHA5129e299ca15ee7d700920b484033f9c8627e5a37a7b804354fda5ef64c5301dadd501831607aefa130ba390f21cb9b31d1ee11f972b1986f6f0930166f80ba0477
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\a7f7a1ef-f3c4-4833-b73e-214fe7e6ab6f
Filesize982B
MD564a84b20534da275e49e90115831b512
SHA1576fe66856662918eb601c116fdfb3939f1ad784
SHA25623649da74937857ce8649639bc6d712ca39cb00d2b27ff2ace535e4d054bf0a7
SHA512a6f5fc5847acfbc4ff186571605c30fcc62c0ad5e8851a51542829b71799a4a5bbd0b220c7e6f5750809ed043ec006fad790aaefb01e0fd879fff1291e961439
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD5ff996b96e1ab6c680d101c2b192df023
SHA1f838b860117513b37664992c3c8fcf655387018f
SHA2566fdccb6bed02a973d769f2e44b74ffcbf8ac56a51c4bc4e3d5aacb3dbe043d0f
SHA5122e96ed64c612204625454e344e3ee600dc955ec0ec96e83bb41ea69f49b1c7e37a9e0d6c417aece38dd940d3974d63318d553445b67288009ecf0a0902651811
-
Filesize
15KB
MD50a4fcc1eb7c773d52106435438eac41b
SHA16abae5c384482de29d056c040664b65a3a3fe9cb
SHA256bacb6381425192128864d555810ae0701b8728f038251dbdaae701ab1f29295c
SHA512a22b9a31987c547f5606fe913b3ac1b3e4a90041a0e9b00de5fa4d96eb47905b388e7e36a4e50b8745a1e032edef2a98af9efacaa424815aeae783ad2c3e0f8c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize1.6MB
MD5e0dbf1ae6845145c51816449a0faa550
SHA11acb41b6f8986fb4a3a2022b366ef4da11ca2d83
SHA256f1b36402003c36c903775011104363c21e8eab144ec6bddd93f814ad7aa63177
SHA512630e5d2823ead708fb8b59eb34e63c501a165a7b1af180b60f3f0287f2ac0bdcf1b87e3bf3a7307a65114e51bfc31f8ac0be42f18a298fac4c8bb602c2c1748b