Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-11-2024 04:06
Static task
static1
General
-
Target
d4d6aaa232271d8e81d2a03d503a73f46a5c5c710fa6128c08284874a6c8ff0c.exe
-
Size
6.0MB
-
MD5
d7a40118e6d4686b4a11f4ac49ccaf1d
-
SHA1
d80be69c93759cfd2bb9dec276979e196202aab1
-
SHA256
d4d6aaa232271d8e81d2a03d503a73f46a5c5c710fa6128c08284874a6c8ff0c
-
SHA512
a1126fe60f9891131ac9de04f3b1512e7da0197c168c9d1d3d4632ad52eaf002467220bd5b423d3a21212b558daa444cc4cb40a806cf3f06bf0a7b1b6a5137a3
-
SSDEEP
98304:7Gb+KW8pO2DH2OP/yErov5MtEkVxXaFwpyAnSWxuv38/oPOYPnAAya0wjSQ/gaY6:7hKW8pRNyUov5Mt9xKFwpBfwrG4z
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Extracted
lumma
https://navygenerayk.store/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" fb3fe0a88f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" fb3fe0a88f.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection fb3fe0a88f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" fb3fe0a88f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" fb3fe0a88f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" fb3fe0a88f.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1K20A9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3s79Z.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ fb3fe0a88f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2z8437.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b0df76fc8c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 838e506220.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 20 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion fb3fe0a88f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3s79Z.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3s79Z.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion fb3fe0a88f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1K20A9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b0df76fc8c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b0df76fc8c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1K20A9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 838e506220.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 838e506220.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2z8437.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2z8437.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 1K20A9.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 13 IoCs
pid Process 1368 k3a89.exe 544 l3v78.exe 3860 1K20A9.exe 2480 skotes.exe 704 2z8437.exe 3752 3s79Z.exe 4552 4T753l.exe 1552 b0df76fc8c.exe 732 838e506220.exe 1680 skotes.exe 5944 fb3fe0a88f.exe 6376 skotes.exe 1716 skotes.exe -
Identifies Wine through registry keys 2 TTPs 10 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine b0df76fc8c.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 838e506220.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine fb3fe0a88f.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 1K20A9.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 2z8437.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 3s79Z.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features fb3fe0a88f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" fb3fe0a88f.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fb3fe0a88f.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1004991001\\fb3fe0a88f.exe" skotes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d4d6aaa232271d8e81d2a03d503a73f46a5c5c710fa6128c08284874a6c8ff0c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" k3a89.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" l3v78.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b0df76fc8c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1004988001\\b0df76fc8c.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\838e506220.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1004989001\\838e506220.exe" skotes.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000a000000023b31-47.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
pid Process 3860 1K20A9.exe 2480 skotes.exe 704 2z8437.exe 3752 3s79Z.exe 1552 b0df76fc8c.exe 732 838e506220.exe 1680 skotes.exe 5944 fb3fe0a88f.exe 6376 skotes.exe 1716 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1K20A9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k3a89.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1K20A9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2z8437.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fb3fe0a88f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d4d6aaa232271d8e81d2a03d503a73f46a5c5c710fa6128c08284874a6c8ff0c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language l3v78.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4T753l.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3s79Z.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b0df76fc8c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 838e506220.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 916 taskkill.exe 4040 taskkill.exe 2508 taskkill.exe 3552 taskkill.exe 4132 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 3860 1K20A9.exe 3860 1K20A9.exe 2480 skotes.exe 2480 skotes.exe 704 2z8437.exe 704 2z8437.exe 3752 3s79Z.exe 3752 3s79Z.exe 4552 4T753l.exe 4552 4T753l.exe 1552 b0df76fc8c.exe 1552 b0df76fc8c.exe 4552 4T753l.exe 4552 4T753l.exe 732 838e506220.exe 732 838e506220.exe 1680 skotes.exe 1680 skotes.exe 5944 fb3fe0a88f.exe 5944 fb3fe0a88f.exe 5944 fb3fe0a88f.exe 5944 fb3fe0a88f.exe 5944 fb3fe0a88f.exe 6376 skotes.exe 6376 skotes.exe 1716 skotes.exe 1716 skotes.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 3552 taskkill.exe Token: SeDebugPrivilege 4132 taskkill.exe Token: SeDebugPrivilege 916 taskkill.exe Token: SeDebugPrivilege 4040 taskkill.exe Token: SeDebugPrivilege 2508 taskkill.exe Token: SeDebugPrivilege 2276 firefox.exe Token: SeDebugPrivilege 2276 firefox.exe Token: SeDebugPrivilege 5944 fb3fe0a88f.exe Token: SeDebugPrivilege 2276 firefox.exe Token: SeDebugPrivilege 2276 firefox.exe Token: SeDebugPrivilege 2276 firefox.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 3860 1K20A9.exe 4552 4T753l.exe 4552 4T753l.exe 4552 4T753l.exe 4552 4T753l.exe 4552 4T753l.exe 4552 4T753l.exe 4552 4T753l.exe 2276 firefox.exe 2276 firefox.exe 2276 firefox.exe 2276 firefox.exe 2276 firefox.exe 2276 firefox.exe 2276 firefox.exe 2276 firefox.exe 2276 firefox.exe 2276 firefox.exe 2276 firefox.exe 2276 firefox.exe 2276 firefox.exe 2276 firefox.exe 2276 firefox.exe 2276 firefox.exe 2276 firefox.exe 2276 firefox.exe 2276 firefox.exe 2276 firefox.exe 2276 firefox.exe 4552 4T753l.exe 4552 4T753l.exe 4552 4T753l.exe 4552 4T753l.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 4552 4T753l.exe 4552 4T753l.exe 4552 4T753l.exe 4552 4T753l.exe 4552 4T753l.exe 4552 4T753l.exe 4552 4T753l.exe 2276 firefox.exe 2276 firefox.exe 2276 firefox.exe 2276 firefox.exe 2276 firefox.exe 2276 firefox.exe 2276 firefox.exe 2276 firefox.exe 2276 firefox.exe 2276 firefox.exe 2276 firefox.exe 2276 firefox.exe 2276 firefox.exe 2276 firefox.exe 2276 firefox.exe 2276 firefox.exe 2276 firefox.exe 2276 firefox.exe 2276 firefox.exe 2276 firefox.exe 4552 4T753l.exe 4552 4T753l.exe 4552 4T753l.exe 4552 4T753l.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2276 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4532 wrote to memory of 1368 4532 d4d6aaa232271d8e81d2a03d503a73f46a5c5c710fa6128c08284874a6c8ff0c.exe 85 PID 4532 wrote to memory of 1368 4532 d4d6aaa232271d8e81d2a03d503a73f46a5c5c710fa6128c08284874a6c8ff0c.exe 85 PID 4532 wrote to memory of 1368 4532 d4d6aaa232271d8e81d2a03d503a73f46a5c5c710fa6128c08284874a6c8ff0c.exe 85 PID 1368 wrote to memory of 544 1368 k3a89.exe 87 PID 1368 wrote to memory of 544 1368 k3a89.exe 87 PID 1368 wrote to memory of 544 1368 k3a89.exe 87 PID 544 wrote to memory of 3860 544 l3v78.exe 88 PID 544 wrote to memory of 3860 544 l3v78.exe 88 PID 544 wrote to memory of 3860 544 l3v78.exe 88 PID 3860 wrote to memory of 2480 3860 1K20A9.exe 89 PID 3860 wrote to memory of 2480 3860 1K20A9.exe 89 PID 3860 wrote to memory of 2480 3860 1K20A9.exe 89 PID 544 wrote to memory of 704 544 l3v78.exe 90 PID 544 wrote to memory of 704 544 l3v78.exe 90 PID 544 wrote to memory of 704 544 l3v78.exe 90 PID 1368 wrote to memory of 3752 1368 k3a89.exe 93 PID 1368 wrote to memory of 3752 1368 k3a89.exe 93 PID 1368 wrote to memory of 3752 1368 k3a89.exe 93 PID 4532 wrote to memory of 4552 4532 d4d6aaa232271d8e81d2a03d503a73f46a5c5c710fa6128c08284874a6c8ff0c.exe 97 PID 4532 wrote to memory of 4552 4532 d4d6aaa232271d8e81d2a03d503a73f46a5c5c710fa6128c08284874a6c8ff0c.exe 97 PID 4532 wrote to memory of 4552 4532 d4d6aaa232271d8e81d2a03d503a73f46a5c5c710fa6128c08284874a6c8ff0c.exe 97 PID 4552 wrote to memory of 3552 4552 4T753l.exe 98 PID 4552 wrote to memory of 3552 4552 4T753l.exe 98 PID 4552 wrote to memory of 3552 4552 4T753l.exe 98 PID 4552 wrote to memory of 4132 4552 4T753l.exe 102 PID 4552 wrote to memory of 4132 4552 4T753l.exe 102 PID 4552 wrote to memory of 4132 4552 4T753l.exe 102 PID 4552 wrote to memory of 916 4552 4T753l.exe 104 PID 4552 wrote to memory of 916 4552 4T753l.exe 104 PID 4552 wrote to memory of 916 4552 4T753l.exe 104 PID 4552 wrote to memory of 4040 4552 4T753l.exe 106 PID 4552 wrote to memory of 4040 4552 4T753l.exe 106 PID 4552 wrote to memory of 4040 4552 4T753l.exe 106 PID 2480 wrote to memory of 1552 2480 skotes.exe 108 PID 2480 wrote to memory of 1552 2480 skotes.exe 108 PID 2480 wrote to memory of 1552 2480 skotes.exe 108 PID 4552 wrote to memory of 2508 4552 4T753l.exe 109 PID 4552 wrote to memory of 2508 4552 4T753l.exe 109 PID 4552 wrote to memory of 2508 4552 4T753l.exe 109 PID 4552 wrote to memory of 2412 4552 4T753l.exe 111 PID 4552 wrote to memory of 2412 4552 4T753l.exe 111 PID 2412 wrote to memory of 2276 2412 firefox.exe 112 PID 2412 wrote to memory of 2276 2412 firefox.exe 112 PID 2412 wrote to memory of 2276 2412 firefox.exe 112 PID 2412 wrote to memory of 2276 2412 firefox.exe 112 PID 2412 wrote to memory of 2276 2412 firefox.exe 112 PID 2412 wrote to memory of 2276 2412 firefox.exe 112 PID 2412 wrote to memory of 2276 2412 firefox.exe 112 PID 2412 wrote to memory of 2276 2412 firefox.exe 112 PID 2412 wrote to memory of 2276 2412 firefox.exe 112 PID 2412 wrote to memory of 2276 2412 firefox.exe 112 PID 2412 wrote to memory of 2276 2412 firefox.exe 112 PID 2276 wrote to memory of 1032 2276 firefox.exe 114 PID 2276 wrote to memory of 1032 2276 firefox.exe 114 PID 2276 wrote to memory of 1032 2276 firefox.exe 114 PID 2276 wrote to memory of 1032 2276 firefox.exe 114 PID 2276 wrote to memory of 1032 2276 firefox.exe 114 PID 2276 wrote to memory of 1032 2276 firefox.exe 114 PID 2276 wrote to memory of 1032 2276 firefox.exe 114 PID 2276 wrote to memory of 1032 2276 firefox.exe 114 PID 2276 wrote to memory of 1032 2276 firefox.exe 114 PID 2276 wrote to memory of 1032 2276 firefox.exe 114 PID 2276 wrote to memory of 1032 2276 firefox.exe 114 PID 2276 wrote to memory of 1032 2276 firefox.exe 114 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\d4d6aaa232271d8e81d2a03d503a73f46a5c5c710fa6128c08284874a6c8ff0c.exe"C:\Users\Admin\AppData\Local\Temp\d4d6aaa232271d8e81d2a03d503a73f46a5c5c710fa6128c08284874a6c8ff0c.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\k3a89.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\k3a89.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l3v78.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l3v78.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1K20A9.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1K20A9.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3860 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Users\Admin\AppData\Local\Temp\1004988001\b0df76fc8c.exe"C:\Users\Admin\AppData\Local\Temp\1004988001\b0df76fc8c.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1552
-
-
C:\Users\Admin\AppData\Local\Temp\1004989001\838e506220.exe"C:\Users\Admin\AppData\Local\Temp\1004989001\838e506220.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:732
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"6⤵PID:6128
-
-
C:\Users\Admin\AppData\Local\Temp\1004991001\fb3fe0a88f.exe"C:\Users\Admin\AppData\Local\Temp\1004991001\fb3fe0a88f.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5944
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2z8437.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2z8437.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:704
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3s79Z.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3s79Z.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3752
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4T753l.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4T753l.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3552
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4132
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:916
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4040
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2508
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking3⤵
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking4⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2060 -parentBuildID 20240401114208 -prefsHandle 1812 -prefMapHandle 1972 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {6c662184-b5bd-497e-86bc-dffdb048f0be} 2276 "\\.\pipe\gecko-crash-server-pipe.2276" gpu5⤵PID:1032
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2480 -parentBuildID 20240401114208 -prefsHandle 2404 -prefMapHandle 2412 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ae0443d4-c7f6-4a93-b426-8cb07834df8e} 2276 "\\.\pipe\gecko-crash-server-pipe.2276" socket5⤵PID:1504
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3000 -childID 1 -isForBrowser -prefsHandle 3004 -prefMapHandle 3248 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5dd84ebb-5b62-4906-844d-c9f1f818c5a7} 2276 "\\.\pipe\gecko-crash-server-pipe.2276" tab5⤵PID:4476
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3172 -childID 2 -isForBrowser -prefsHandle 3164 -prefMapHandle 2764 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f15e2873-9281-4635-994a-9f020ac44f00} 2276 "\\.\pipe\gecko-crash-server-pipe.2276" tab5⤵PID:5040
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4580 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4612 -prefMapHandle 4608 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f18f576f-8608-405d-aa0a-095533ec2c5d} 2276 "\\.\pipe\gecko-crash-server-pipe.2276" utility5⤵
- Checks processor information in registry
PID:6544
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5564 -childID 3 -isForBrowser -prefsHandle 5616 -prefMapHandle 5592 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {54e05a5e-79d8-4433-9435-4782be6da99b} 2276 "\\.\pipe\gecko-crash-server-pipe.2276" tab5⤵PID:5488
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5740 -childID 4 -isForBrowser -prefsHandle 5816 -prefMapHandle 5812 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {77f82ebd-ac32-4ae8-85f8-5920d420afbb} 2276 "\\.\pipe\gecko-crash-server-pipe.2276" tab5⤵PID:5536
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5580 -childID 5 -isForBrowser -prefsHandle 6000 -prefMapHandle 5996 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {347cd08b-d92b-4eed-8a7a-32cb8bcce1b8} 2276 "\\.\pipe\gecko-crash-server-pipe.2276" tab5⤵PID:5516
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1680
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6376
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1716
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\activity-stream.discovery_stream.json
Filesize24KB
MD5788d413b68fc79aadf17af83cd08b7de
SHA1f7dd8113f08910e52fefc861a122ae2012e59f19
SHA256deb684646d462397f969939f61d21feff08fe91e325cb1a1ba9a71a963f482c3
SHA5127e655bda911fbcc53d00e6f375986254aede9c145e58446601521757d1ef66c7666dd6498fb616f842bcadd31ef05524f7dc645461785a6a8b453d8b0d069d5a
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\cache2\entries\D500AD994A7515157BB2A6ADD5B18B754E4D2F99
Filesize13KB
MD59e6b9b637061696d4f035091e6e07eb2
SHA1e33e876213a8cae7835ed7d354bfee66037d0e5e
SHA256de85678247bf36ff756f9ecc2104511bcaa2be18ed393b29ec98d01aa2879cbb
SHA512c0448775030c71ac9829805416e0c613ac106f038c212a266d4553621df4877a9490e022c33a2429f564914860c912e89e6711bc0094fc0efcec62100295d8c1
-
Filesize
3.1MB
MD59c70a66e10de4d5374ddce5f12bb1b05
SHA1c0e839231d95b2ab7a75190c937b1bb2c0ba1a2e
SHA256e554edba080baa3b153e6cfce6a7e60bf91672816aea798d9eb0a8c46e8ff2f9
SHA512abec5c1927d2476274c2388e3287414783149fc7e6bd191d2ee1dd3f7389eb8b02143c26114782a2b043247252c990fabb7ea13553b4d9e5f348c6731651edaa
-
Filesize
2.1MB
MD56d1973227d581ada32cb4395e84299c7
SHA131522ab4124049f7c11c2289bca299fd7a9623bf
SHA2567866a89c6f42515fa054330c648112c7b1ace05ddaa172a8ca7c20da1136988d
SHA5121e3ef405b41220227874062cb2d8392cc8c412877441a2fef5213647c0f2fdc85a4f6ff23ae9278208a2f552229126d2e6cded467c606baf76344dbba6c7ed56
-
Filesize
2.7MB
MD56394cb5405daa59dd5f51fb5c630723d
SHA1c399137e343445378bfe668f2703d2b187404d9c
SHA256c0063fd3b17eb6e53d8da981ebbe907a7a523c220e73b2e3abc8ecd62b417202
SHA5129ba359b0d53689617421b530c935d9a2242c193aacc0764a6b61b8dcf494b8a7e6acef4adbd67dd979ebede70f864dde8513148d6f2aee54dcfe0b32989308fc
-
Filesize
898KB
MD564bcdca9bb96af42efbc33cc9f1c3cd2
SHA1d9b548d19ac9dedd6c7327f9137836a3d2654535
SHA2566b608be957d976818d816d94893cdb615ac62c465ff264129a2b30d4b3655a3f
SHA512ccbe4c762c6909d2b6a7bf6a99015a0472cfb7cd0f11a8e9ae72f05f3af5e135351f9354d80c4fcc9d6b7eb967fd75840378e2e4115864871ae0f5c880c8d52c
-
Filesize
5.5MB
MD5cc72144ca9b8d0bb78c0123fd358c4fc
SHA1c2c2d2e1751e97b9090726fe4b5c3e15b46770fc
SHA256e941bc8b2ce07c299cd77c80527f7d0dfd99eba2c6747a5b34c7f918479c3cf4
SHA512fb5745c649049704c84420b6f6a59ef5339e50643147cb211835ca26bd90bc1ede243ed6bc4529c3a5180d017533d2579e66dcb5409e81d97a151548eaa62565
-
Filesize
2.0MB
MD5c17ed24e02488677c15a7f9af66a0aba
SHA1222cf4373cb4d9f05dccd3e2745a4b19cb4dd29f
SHA25661503aab6e8bb537631115556cf898894274211cae16c143081c2912532a018e
SHA512031737664e0233b9e3f96bb19263d6b02de181255c9ab78fc7d8bdebd7733e5e67652715222fdfcb6d1303648bdd01a8b5da6f21adf6ad85fafccdf16b7fb451
-
Filesize
3.4MB
MD5b182b851fd9daf3c57ff83c395885605
SHA1326c0fdbf54a7611a23eb3355e81ea0cea342a88
SHA25685f1abbd2317b6ac92db350f007fbe35b88e2f9aed258813355ff5556e69f260
SHA5122c2a258f548f0b05a6be86df7c8793e518add08147ffc7da4f1fa785d33bf2d4cd9b8eea1a27eaf1ac5dcbc5201f0fd27fceeb25d9fbfbd7a4138b6e6377eee5
-
Filesize
3.1MB
MD521db1161d909ce2a68042b26351b8be9
SHA1ee7d6364b250c6a0b02f88c6199b81be7b9bd9e6
SHA2566cc874c452393d59817b0b4a45f728f9de326fa1b8480fdbcce942902c901d85
SHA5128c5ea19306bf85a65a8d4956034c75ca3e1f78c12e0af894aeba8ce0ffd90f19226e992741f125d901ff44d9eea390f6c5c363420ba0eeb01ad752dbe3fdbc9b
-
Filesize
3.0MB
MD5ba28052ecef3449530e0ea8d916fd71e
SHA148757c01438c59588a809862af2b61b225bc73fa
SHA256db5b59c0d354b53a3db4405d6ddda24e240d354180e703604ee5b8bb7e6d22ef
SHA51256ba2ef3f472e1ed691b0887058c72c7e2de7f4f4f6d18ce29f68b1dfd7e625e8c90043a5e15369d2bd4c0b1c6c9e7b9dd438086eb71cb282dd53b47b2743bda
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\AlternateServices.bin
Filesize6KB
MD570f630a18cdb8507a4f2c1f8c6b8d063
SHA1da8818b932b2dfa9a7ee941bfcf64fe65906f61f
SHA256dc14a533209ba2576e7ad37f53f4e00bf31724c1cbef94d5313fc79ecc7c48ad
SHA512f94e10a90b39c90f390ceffcb00020eeda02ea193c18d85e7cff49a7c1e1c5a0a59cd60333e90d4e01b5703f14794619a01b79166b619b1e17d9104ebcabd733
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\AlternateServices.bin
Filesize10KB
MD51ad7045466d082c14cc3287d87c2733d
SHA155b20554661545761654b28fef48f1ee3f5575d9
SHA2568e4aece335f3cec700cba41255d974f435c0c926782bd3b8ee878bb6a389147e
SHA512155b754bc1896eec3f8d6a01c824dfa02ef831befee5d31a6a5260a5f206e17a04b71c2e784b79219dc59fc72847457494feee32f877ae58861e92d2629047f6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.bin
Filesize23KB
MD51270db389f0ce52800362cda12e2d1c2
SHA1a9ce839a724b8c8f3f1421bbd1c82c778b1df829
SHA256f355a6055be502ec950612906736e98313ad2041ff9dc64794717abd76d8e3c3
SHA512f4d3433e346d3b298c5fb709c8f53226f2a4801c76f7b9870d3fcd5681e7fa9f5f04e0e335bce613f655df9a70eed67400e83859c2991205df366b9bf4252836
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.bin
Filesize5KB
MD5762cd6daa2851db4e5e8d33ddac83db1
SHA159a8a9387effd1284fb484448c1af6e7aa42a9dc
SHA256e132c58bdd3c7e7b91fec9836a3607aa86a1c5bc9bc1af9806d76f3cb55bf145
SHA512cf9c64afd9e612dd3de1d6c8a21239adced0f6248b75661ebe2a26539ad4ea9574309271f945cada2b355a2c89ccd0d1189f60884e41c9aeb5e972cf51ccca8a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.bin
Filesize15KB
MD5148b9e465cb83c34f28647ff03497f51
SHA1159b998438ca20147bfc4e1053b1de321cd7a72b
SHA2562dfa7e7b76f15a59e67c19675a357cfe5ded150716528765e2570d808191b6b1
SHA51258bbaac387c7052371a7bb6bfb54b2670e3827da057a72a65d26a83d96c0390d27538c92e0d561be91c9f7e4dc872bf5bf4e794b08e8ae98e5fd1985caef9292
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.bin
Filesize15KB
MD5c974f8156fa0d8711facfce6f3174484
SHA1e0cfe6b5b048edfb5ddeff2f107bec1b09ca9e08
SHA2567cc8c06d6a2db014d595d11be3a0772f9774401c63f992d7de3d86ed0e86c662
SHA51266594ed43ba419e11afcb2ddc84e1f7e38fba785c1f70e17de47ec0a0b573038e5ddd80c4f64f972f546fa8ec7f178ecd47f98d7749a3ff03f37dbfa09b88a7d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD518a43488d43f1726b6de5b4a2632ebbc
SHA151164f6a7d1c9bc314ee4b444bb617e7f5c24a94
SHA256756b4caaefca303c2ab9389c4b3151b3cab730d7d29cc4061eb8bd44df13eb25
SHA5125d8ea4a58a1ad2d7ad5abfb80558ed94c8c1e3fdc709a50976f46ed28e6cf597670428675aaee2321388bacf0e575e4397b9496e7160c4edd6f3794a7763039c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5496f56b6b3bcb20fbd4239d9ae43418e
SHA1fca10c9699e8dc5644d1cca362cd1ca5bf2ef615
SHA256552cdaf8dec423aa5ef5bd819152775bb5fc9cb897c0a114e345e5612a0a686a
SHA512d173cbdabae514981467fbf54b7397b0c2036029b043491edda35c1550e5487c856e0576858971188e4220e0cf77d0e32b2992aec55c983ebbb5d4f3890625d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD50adb244462dc1ffad38229452729c023
SHA1e2dc7bbe963474d9d800a69eca08b39ed53b284c
SHA256795ef5f73cad6d3674222af56458b66de690ed196054dcbc958a9165c86dd8fe
SHA5124640142405dcb80e25b697bf5987a1ddbdc53305ed567176ca642b30f592e455a7f3f9faeccdbd4fa89568ad54dc20ce8e7fadc4abc79d4e8216937da4e666f6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5bbcaab6e3cf8c5673b130914dc23f568
SHA127c02aadbff249d01e9b0645ca725a807a9b243f
SHA256aeb48764e9762af31facf32a6ed103ce287237173936b46f228c32f2bf29fa8e
SHA512fdad7cf583dbd7342fee898202a5806d8b28d167256afbf608cd2865a9adc963812fa5c045b66027021fa5c888144bb227fbbafbc48258c57f9c18580f637455
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD53e994602f19d92d1ed90710b815975fe
SHA159db05774fe7ffaf38cbdd91821620f9d6c0c772
SHA256cda0315df291f69f990d091b22a1796c10511b0b576b30f00156017974bdc0af
SHA5127ad9d4e9c355eed728d6082d9b683d8e56dc24f52d83c1372a2930f4107b01318fd537be125196074a1e0f5dc1d57123d81722734417e40fe44613579fcad186
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD522279c5fae22d42bcb999fe9e11b199f
SHA170bdb741ceacfd0a9d218db6ee4c13484842eaaf
SHA256434ff9d0c3c43b1c3962e51ea268a43311bdbfe66d6f45dbdeb461fb169c3f8a
SHA512c8fa9ae03debec4c35d016483f68932631c5997711f9516e8229a4d80d18f90ded5c0dc9c60cbdea2fea972ca96ca1b9024f268caf9f0078b7350110c22a1bdf
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\2cd6dd1e-9b26-4bf5-b52e-94e4ce81ede2
Filesize671B
MD53c9e2d0faac71d93322af78f87a6ed75
SHA1b165f66efe02dc025d76dc5a9044230afcd91b13
SHA256b5b0d88e453a7c9ebcf307c15c8f4ab3d571841d61047fc0beaeb5f491bf65e0
SHA512881e4b7352ec365fc44f3f5cb2b340772e11caf9eca2b9aadc8c4ea55adae660c8c2f8741e4303d0de07fbb424d06de6e06085fd76d36bdb8a347bb9d68810f0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\4395130a-a930-432e-ad58-cdb377727eed
Filesize26KB
MD540a08f429e429fb9e51a1a42a0110053
SHA18870288d7f4c17c319559b12d3efdb86b51cc921
SHA2567664f0988a87886fb97135938ba5acfff809fa6c4035a30f3c0b288c2a44c5af
SHA51292c51395e96b39fc7dda592a9cb2391b60ed893ef436403448296ecf7cf890d105c4ff16c22543fc7b9e6ee39ffb20538f03f542b54a822890dba44b97bbb528
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\d2677a80-0929-4855-9119-a7a5804ec524
Filesize982B
MD59531c4b8ad6d6a7af6248c64af421701
SHA1ec74c5cc9e04572a9d0e86948e64fff89c614cbd
SHA2565f3079cf5624695b5c0c0667809aae7d8d92988cbf99278a7cbd2233f3dbd5f5
SHA512bac05c85098a10ce0075b9110f67ac8914c456a6270d65628383ce86683f7f0c98235e7c415e7adef8001f183ee1407a22e4462663792e14b90b897cb61e7f81
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
15KB
MD58d95158091fdf5f84a65b2a602e09440
SHA148343f4f54c4215ff1d6422801a1a729bcb5ae8c
SHA2566ea534fe5fa24985cf0a184c7f233aed8186a64e1f540235b59648c18ba4440f
SHA51230441e1d91311a168239a7815d063e3316ae5c959b259bc741ba9133d73f39f5d08bbd2b831857e69a10413ce5df9a01577c03a705a2cbaf6315f2970d6759fb
-
Filesize
12KB
MD513cb625c2816f6e9fd786df91b69cc01
SHA19e145231b1b62cd8ee903d57104b26ecb5cd65a5
SHA2567530f84371f10181602d261bab88ed47a888d56c2b2451d189c7f30e78394903
SHA512692f06164d3cdda290e660e7bfbf73b155cb7db8b5bac6ba1951efaa0ace100a3cc94db43460490baca09fd9a0ebca4796bd32378ce6af815f476e7bfc26a994
-
Filesize
10KB
MD54694d14a2ae74ece8d94baead61326bd
SHA1ff4d4454f2cfbcaaeaaab7fd44b8d2941c7cfe10
SHA25684e2f9290bec2e8d3fa46f12d776c2526b19e690b4431237d67285fddde624e5
SHA51239698f909a1ac72f7c18cc9390026c37a1db5caa93fc21e30f879bed2382422ad466ccacc69887f70b6f7244e1d984b18d7c9bf393cf0697425cf5afbdb2ce58