Analysis
-
max time kernel
113s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 05:18
Static task
static1
General
-
Target
8c9d34a72092fa532c23777a898ae575eb7680c0de4d470b4321c340a04eb56cN.exe
-
Size
6.1MB
-
MD5
fadab97432a4109bfcaaf125846af9a0
-
SHA1
0168f36144594dfee79bcb2a33c06f010864399d
-
SHA256
8c9d34a72092fa532c23777a898ae575eb7680c0de4d470b4321c340a04eb56c
-
SHA512
8a907741c5d8fbaf25c71681d6171e13ebf53963c257eff4547a0a7f2c0e8edea86dd5dfa887ca2f3e9ecd97b650b144f8902f1fb62a1051fea09362d7063e67
-
SSDEEP
196608:kPZ/oLfBNALoX2DeOvKjLphzli+SVsGIat12fo:CZ/UfBNg8MeOvGFZs+e1hY
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Extracted
lumma
https://navygenerayk.store/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" d321ba66e4.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection d321ba66e4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" d321ba66e4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" d321ba66e4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" d321ba66e4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" d321ba66e4.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2V8618.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3cb8901279.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3r29i.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 19dce6be63.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d321ba66e4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1Q37m4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3cb8901279.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2V8618.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 19dce6be63.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 19dce6be63.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3cb8901279.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1Q37m4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2V8618.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3r29i.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d321ba66e4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1Q37m4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d321ba66e4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3r29i.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 1Q37m4.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 3r29i.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 12 IoCs
pid Process 3624 b1N62.exe 2608 M1z06.exe 2448 1Q37m4.exe 3204 skotes.exe 1172 2V8618.exe 2560 3r29i.exe 5012 4J525t.exe 2060 19dce6be63.exe 2560 3cb8901279.exe 6156 d321ba66e4.exe 2840 skotes.exe 5152 skotes.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 2V8618.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 3r29i.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 19dce6be63.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine d321ba66e4.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 1Q37m4.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 3cb8901279.exe -
Loads dropped DLL 1 IoCs
pid Process 2560 3r29i.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" d321ba66e4.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features d321ba66e4.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8c9d34a72092fa532c23777a898ae575eb7680c0de4d470b4321c340a04eb56cN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" b1N62.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" M1z06.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\19dce6be63.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1005462001\\19dce6be63.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\3cb8901279.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1005463001\\3cb8901279.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\d321ba66e4.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1005465001\\d321ba66e4.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0007000000023c73-55.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 2448 1Q37m4.exe 1172 2V8618.exe 3204 skotes.exe 2560 3r29i.exe 2060 19dce6be63.exe 2560 3cb8901279.exe 6156 d321ba66e4.exe 2840 skotes.exe 5152 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1Q37m4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 18 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3cb8901279.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b1N62.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8c9d34a72092fa532c23777a898ae575eb7680c0de4d470b4321c340a04eb56cN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1Q37m4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4J525t.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2V8618.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3r29i.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 19dce6be63.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d321ba66e4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language M1z06.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3r29i.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3r29i.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3692 timeout.exe -
Kills process with taskkill 5 IoCs
pid Process 1408 taskkill.exe 1156 taskkill.exe 1368 taskkill.exe 756 taskkill.exe 1256 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 2448 1Q37m4.exe 2448 1Q37m4.exe 1172 2V8618.exe 1172 2V8618.exe 3204 skotes.exe 3204 skotes.exe 2560 3r29i.exe 2560 3r29i.exe 2560 3r29i.exe 2560 3r29i.exe 2060 19dce6be63.exe 2060 19dce6be63.exe 5012 4J525t.exe 5012 4J525t.exe 2560 3cb8901279.exe 2560 3cb8901279.exe 5012 4J525t.exe 5012 4J525t.exe 6156 d321ba66e4.exe 6156 d321ba66e4.exe 6156 d321ba66e4.exe 6156 d321ba66e4.exe 6156 d321ba66e4.exe 2840 skotes.exe 2840 skotes.exe 5152 skotes.exe 5152 skotes.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 1368 taskkill.exe Token: SeDebugPrivilege 756 taskkill.exe Token: SeDebugPrivilege 1256 taskkill.exe Token: SeDebugPrivilege 1408 taskkill.exe Token: SeDebugPrivilege 1156 taskkill.exe Token: SeDebugPrivilege 920 firefox.exe Token: SeDebugPrivilege 920 firefox.exe Token: SeDebugPrivilege 6156 d321ba66e4.exe -
Suspicious use of FindShellTrayWindow 32 IoCs
pid Process 2448 1Q37m4.exe 5012 4J525t.exe 5012 4J525t.exe 5012 4J525t.exe 5012 4J525t.exe 5012 4J525t.exe 5012 4J525t.exe 5012 4J525t.exe 920 firefox.exe 920 firefox.exe 920 firefox.exe 920 firefox.exe 920 firefox.exe 920 firefox.exe 920 firefox.exe 920 firefox.exe 920 firefox.exe 920 firefox.exe 920 firefox.exe 920 firefox.exe 920 firefox.exe 920 firefox.exe 920 firefox.exe 920 firefox.exe 920 firefox.exe 920 firefox.exe 920 firefox.exe 920 firefox.exe 920 firefox.exe 5012 4J525t.exe 5012 4J525t.exe 5012 4J525t.exe -
Suspicious use of SendNotifyMessage 30 IoCs
pid Process 5012 4J525t.exe 5012 4J525t.exe 5012 4J525t.exe 5012 4J525t.exe 5012 4J525t.exe 5012 4J525t.exe 5012 4J525t.exe 920 firefox.exe 920 firefox.exe 920 firefox.exe 920 firefox.exe 920 firefox.exe 920 firefox.exe 920 firefox.exe 920 firefox.exe 920 firefox.exe 920 firefox.exe 920 firefox.exe 920 firefox.exe 920 firefox.exe 920 firefox.exe 920 firefox.exe 920 firefox.exe 920 firefox.exe 920 firefox.exe 920 firefox.exe 920 firefox.exe 5012 4J525t.exe 5012 4J525t.exe 5012 4J525t.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 920 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4468 wrote to memory of 3624 4468 8c9d34a72092fa532c23777a898ae575eb7680c0de4d470b4321c340a04eb56cN.exe 83 PID 4468 wrote to memory of 3624 4468 8c9d34a72092fa532c23777a898ae575eb7680c0de4d470b4321c340a04eb56cN.exe 83 PID 4468 wrote to memory of 3624 4468 8c9d34a72092fa532c23777a898ae575eb7680c0de4d470b4321c340a04eb56cN.exe 83 PID 3624 wrote to memory of 2608 3624 b1N62.exe 86 PID 3624 wrote to memory of 2608 3624 b1N62.exe 86 PID 3624 wrote to memory of 2608 3624 b1N62.exe 86 PID 2608 wrote to memory of 2448 2608 M1z06.exe 87 PID 2608 wrote to memory of 2448 2608 M1z06.exe 87 PID 2608 wrote to memory of 2448 2608 M1z06.exe 87 PID 2448 wrote to memory of 3204 2448 1Q37m4.exe 89 PID 2448 wrote to memory of 3204 2448 1Q37m4.exe 89 PID 2448 wrote to memory of 3204 2448 1Q37m4.exe 89 PID 2608 wrote to memory of 1172 2608 M1z06.exe 90 PID 2608 wrote to memory of 1172 2608 M1z06.exe 90 PID 2608 wrote to memory of 1172 2608 M1z06.exe 90 PID 3624 wrote to memory of 2560 3624 b1N62.exe 95 PID 3624 wrote to memory of 2560 3624 b1N62.exe 95 PID 3624 wrote to memory of 2560 3624 b1N62.exe 95 PID 2560 wrote to memory of 808 2560 3r29i.exe 96 PID 2560 wrote to memory of 808 2560 3r29i.exe 96 PID 2560 wrote to memory of 808 2560 3r29i.exe 96 PID 4468 wrote to memory of 5012 4468 8c9d34a72092fa532c23777a898ae575eb7680c0de4d470b4321c340a04eb56cN.exe 99 PID 4468 wrote to memory of 5012 4468 8c9d34a72092fa532c23777a898ae575eb7680c0de4d470b4321c340a04eb56cN.exe 99 PID 4468 wrote to memory of 5012 4468 8c9d34a72092fa532c23777a898ae575eb7680c0de4d470b4321c340a04eb56cN.exe 99 PID 808 wrote to memory of 3692 808 cmd.exe 101 PID 808 wrote to memory of 3692 808 cmd.exe 101 PID 808 wrote to memory of 3692 808 cmd.exe 101 PID 5012 wrote to memory of 1368 5012 4J525t.exe 102 PID 5012 wrote to memory of 1368 5012 4J525t.exe 102 PID 5012 wrote to memory of 1368 5012 4J525t.exe 102 PID 3204 wrote to memory of 2060 3204 skotes.exe 104 PID 3204 wrote to memory of 2060 3204 skotes.exe 104 PID 3204 wrote to memory of 2060 3204 skotes.exe 104 PID 5012 wrote to memory of 756 5012 4J525t.exe 106 PID 5012 wrote to memory of 756 5012 4J525t.exe 106 PID 5012 wrote to memory of 756 5012 4J525t.exe 106 PID 5012 wrote to memory of 1256 5012 4J525t.exe 109 PID 5012 wrote to memory of 1256 5012 4J525t.exe 109 PID 5012 wrote to memory of 1256 5012 4J525t.exe 109 PID 5012 wrote to memory of 1408 5012 4J525t.exe 113 PID 5012 wrote to memory of 1408 5012 4J525t.exe 113 PID 5012 wrote to memory of 1408 5012 4J525t.exe 113 PID 5012 wrote to memory of 1156 5012 4J525t.exe 115 PID 5012 wrote to memory of 1156 5012 4J525t.exe 115 PID 5012 wrote to memory of 1156 5012 4J525t.exe 115 PID 5012 wrote to memory of 740 5012 4J525t.exe 117 PID 5012 wrote to memory of 740 5012 4J525t.exe 117 PID 740 wrote to memory of 920 740 firefox.exe 118 PID 740 wrote to memory of 920 740 firefox.exe 118 PID 740 wrote to memory of 920 740 firefox.exe 118 PID 740 wrote to memory of 920 740 firefox.exe 118 PID 740 wrote to memory of 920 740 firefox.exe 118 PID 740 wrote to memory of 920 740 firefox.exe 118 PID 740 wrote to memory of 920 740 firefox.exe 118 PID 740 wrote to memory of 920 740 firefox.exe 118 PID 740 wrote to memory of 920 740 firefox.exe 118 PID 740 wrote to memory of 920 740 firefox.exe 118 PID 740 wrote to memory of 920 740 firefox.exe 118 PID 920 wrote to memory of 4828 920 firefox.exe 119 PID 920 wrote to memory of 4828 920 firefox.exe 119 PID 920 wrote to memory of 4828 920 firefox.exe 119 PID 920 wrote to memory of 4828 920 firefox.exe 119 PID 920 wrote to memory of 4828 920 firefox.exe 119 PID 920 wrote to memory of 4828 920 firefox.exe 119 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c9d34a72092fa532c23777a898ae575eb7680c0de4d470b4321c340a04eb56cN.exe"C:\Users\Admin\AppData\Local\Temp\8c9d34a72092fa532c23777a898ae575eb7680c0de4d470b4321c340a04eb56cN.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\b1N62.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\b1N62.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\M1z06.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\M1z06.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1Q37m4.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1Q37m4.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Users\Admin\AppData\Local\Temp\1005462001\19dce6be63.exe"C:\Users\Admin\AppData\Local\Temp\1005462001\19dce6be63.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2060
-
-
C:\Users\Admin\AppData\Local\Temp\1005463001\3cb8901279.exe"C:\Users\Admin\AppData\Local\Temp\1005463001\3cb8901279.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2560
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"6⤵PID:6388
-
-
C:\Users\Admin\AppData\Local\Temp\1005465001\d321ba66e4.exe"C:\Users\Admin\AppData\Local\Temp\1005465001\d321ba66e4.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6156
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2V8618.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2V8618.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1172
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3r29i.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3r29i.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3r29i.exe" & del "C:\ProgramData\*.dll"" & exit4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Windows\SysWOW64\timeout.exetimeout /t 55⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:3692
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4J525t.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4J525t.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1368
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:756
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1256
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1408
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1156
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking3⤵
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking4⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2024 -parentBuildID 20240401114208 -prefsHandle 1940 -prefMapHandle 1932 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {13a1e8fe-e7a0-489a-92cc-c45879aba2da} 920 "\\.\pipe\gecko-crash-server-pipe.920" gpu5⤵PID:4828
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2460 -parentBuildID 20240401114208 -prefsHandle 2448 -prefMapHandle 2436 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {99f5254f-37c2-467e-ae9a-9c9d3ffb3c77} 920 "\\.\pipe\gecko-crash-server-pipe.920" socket5⤵PID:4200
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3408 -childID 1 -isForBrowser -prefsHandle 2896 -prefMapHandle 3448 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 948 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5552cb2e-aab3-405c-b52d-f85dd5263d6f} 920 "\\.\pipe\gecko-crash-server-pipe.920" tab5⤵PID:1040
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4172 -childID 2 -isForBrowser -prefsHandle 4164 -prefMapHandle 4160 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 948 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {344dd810-6253-4c3e-b650-501d7fee3850} 920 "\\.\pipe\gecko-crash-server-pipe.920" tab5⤵PID:4936
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4720 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4804 -prefMapHandle 4796 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2303db3d-2638-49ee-b5dc-b31edd29a8ff} 920 "\\.\pipe\gecko-crash-server-pipe.920" utility5⤵
- Checks processor information in registry
PID:5912
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5292 -childID 3 -isForBrowser -prefsHandle 5320 -prefMapHandle 5304 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 948 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c9b109bc-0899-4d4d-aad8-1d9875f80b02} 920 "\\.\pipe\gecko-crash-server-pipe.920" tab5⤵PID:5348
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5528 -childID 4 -isForBrowser -prefsHandle 5444 -prefMapHandle 5448 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 948 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9f2a3c1b-fb63-43e5-96cb-04e0d36fea70} 920 "\\.\pipe\gecko-crash-server-pipe.920" tab5⤵PID:5364
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5300 -childID 5 -isForBrowser -prefsHandle 5780 -prefMapHandle 5776 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 948 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {11536017-b4f6-4d71-844c-475f4fe40b92} 920 "\\.\pipe\gecko-crash-server-pipe.920" tab5⤵PID:5412
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2840
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5152
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
676KB
MD5eda18948a989176f4eebb175ce806255
SHA1ff22a3d5f5fb705137f233c36622c79eab995897
SHA25681a4f37c5495800b7cc46aea6535d9180dadb5c151db6f1fd1968d1cd8c1eeb4
SHA512160ed9990c37a4753fc0f5111c94414568654afbedc05308308197df2a99594f2d5d8fe511fd2279543a869ed20248e603d88a0b9b8fb119e8e6131b0c52ff85
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\g9per00b.default-release\activity-stream.discovery_stream.json.tmp
Filesize24KB
MD5886ecfdf4250bec42a90c5e60dd81cde
SHA10226f6e4bd1f48038492a70b1a1ed35636dfbab4
SHA256e9d0b8db437c2d99b33346388e8b645c1d50625f8a0b5591dd8578d35cd396c0
SHA512e066ed28947fcc759274ab2f6a162a60557843f93c27b0f19d2a35054f97da52ccbeaa7410d3d1e9ccc1ee21706dce3e5ecbd0f1633425a2c51cd38195951c1e
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\g9per00b.default-release\cache2\entries\D500AD994A7515157BB2A6ADD5B18B754E4D2F99
Filesize13KB
MD509e42cddf24150a907735f96781bf99f
SHA18694cc44f75742c77bf54bd8b70e3669385f613e
SHA256197bbcea4918b25292d5b202d2f609c87270d9c4109b1f6f23224cb7ce32a323
SHA5128954032986cfd41a1a80579da555d78a0f19984d6566ad73813ab3f32cafec4f695b9e53c80666a53ababf9dfe7669a957500f2dd8ee96b516bba8e5b269c795
-
Filesize
3.1MB
MD51a12570d4a2f052db15464766cdd7d5f
SHA1cad876fc383fa843fa6658e5bbc029f54717055a
SHA256292be7e2bd730db26635c4948028fcf23c912070d8b5f50e8e944508ca836f65
SHA512145e4775e68f459a87fb9b2ebeec7cff67c7b88b754d361666cc34a566083f3e7e4d08d3b13f273e0181709bfedfdc80c0c8f3bf7f5975d695c04cef7ada9a14
-
Filesize
1.7MB
MD588f68d20345c47f60b63dfb01eb2b163
SHA10bdd5523927ec5e9b0f8df85fd7a3c01e1745b75
SHA256f37e2589d0a26f1c33e99efe07cdf0daca60be2d823cd48b72926327701f1df1
SHA512e61cce3f511a4bf1bcf3d23e4d65e3f26c716d3167b27549b1a3bd161dcf29d04ec76448a69dc96ebb277fdb5e64d2700aef610240c86b0a9d612487b6225b1b
-
Filesize
2.6MB
MD51dad84267be8f3a376004f2b4763cf76
SHA1009f06ab5bd389177b26649fa6959446f753bd74
SHA25613d86ff4d5ea1d1a8e47d3cd86dfdf52269d597adf07a380367bb543b36a2a1f
SHA51280b93256707b164ee98c94adbf60d446da2b6ae2669314bfe37861d1016acf17065ee9161195bacdce49595834baa3d23b33d236d6391eef76ee0b38d9ff17c6
-
Filesize
898KB
MD5c63ac8306406068a73f2d1353b3112c0
SHA1a02e30dd2eee5cfef53c6a71e14143a62ed12f4e
SHA256a86d0c52ebdcd34f598a267a8a203f559339b0a1a0d799b86b273d5b5715ee6b
SHA5122c32f6921db4afaf7e7e461cd33fb51c7b2cb71a1650593860c6304b1315cd5b0861ab12ce229db523021d15fb0524a4d4e6491dcc64b05e2c3ea21eed3bbb42
-
Filesize
5.6MB
MD5acb24b7635e497172a4ce83ab8bfbfae
SHA10a633d413960cbdd06b9c63f31b0637dd43dac9e
SHA25641468da8b1df9567997eac4e3c829210322c9f74753ca0954e8404a9c7abd7f9
SHA5121d4314cc6f7946a96824ed76b88cff1f4c57de8efdac57a71f6139f4caa8ff299dd20bcd4b88c9a9afc6bee1c763eaf8a5178ccff43e192dc66d739d49593c3a
-
Filesize
2.1MB
MD51493f45533a0c14a6dcf059001d3f25b
SHA1956511982ebdfeffc6344ea5e67351d7eabca03c
SHA25650f63490ab3bc1756781b88ad152d85fc748bb7a241e57ab1f93e3a9c16e6b88
SHA512380e8521d7a381af448ff2c2d49ea14e5a341e8f570cca11ec11a794f9e9d976c9d1887cfce1f24eb0821a6d88c8c133061cc76c482b9e7b751e781b9d5ad449
-
Filesize
3.5MB
MD562fd9ddec512a5c8ad8bcc5ece88e659
SHA179fd0a7d2e7638dc3d3ff308284218e9cf86f108
SHA2567bf931b5378e81f86ac62fa84a77583aec32af40599e6e3275357842b1f63177
SHA512ab05b20a17ac7648769ab00d5fb51b0b011cee68d5535a3144bba94ddf70d33622243acb4643e963bd1a633882b00063f5b112496f61b56430113cd599d78dd0
-
Filesize
3.2MB
MD5ee6dde45274acf1087e550b85bfbcfa4
SHA160f52da4bbbe47580843f59eea06fa351a5fafb6
SHA256244d356a3ffed73213e37f3a73fb47029367258737f896d8125ebac3c36b50be
SHA512000571ae0c9cce561c66e92b9869fa34726c674543a4b8069f72e7bb7bce7b9ba42644d947b7226dd6244ce312cde25f50b27c9ac53f70864e32d31559bea412
-
Filesize
3.0MB
MD5c2ebdaf90192aa57b795ec9093086024
SHA13069aea4ce372b976d074496021db24da36764bc
SHA25692a42623a9ee5130017c9408eabfb288f85184b9544aa8cdebf7e6e2482a50db
SHA51257e96b2838198961639c0fa984baad762fe5dba76c4080b5e64e369824c15596fb464ea33930f9b95d5cc5f7c143c5a38913e98992f949eb2c508c8bca670dde
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\AlternateServices.bin
Filesize8KB
MD50b4415e1c86dfb0783028700fad09dbe
SHA1d36fd9abdedd8cfe90279ad14001281158cc5faa
SHA256b5f4611c6cfbe824612fa70fdff20c355a2b5aa298e326a848ee33fc9b1df6a5
SHA51250bae2a4eaa53afeee84a9cfb74c34301a88a9cb650cc26484bee24007ca731207b22a79f30d595d7cab912649575d033cc99c44546d0c40632ca5e424ffee60
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.bin
Filesize23KB
MD51746eea0529c77e9a00d6e74aa67be49
SHA154e8bfc485baf30ddd5ae76c1b5aaeeb15f63a45
SHA256f99073a827f5136e17c8d110a4bd6eb572b5fd1c847abd22bd3264e64cad1a37
SHA512129fa617b365e5ecdbda34da1b7a5b6b7c0978b50c1ebf8da2650f883c6a5e7c799e262a7033ccaee9412e01cd9fe60592b49a702fdb3f16e36ff9020033084f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.bin
Filesize15KB
MD57de73deb028e8def5b5512b669ff40dd
SHA13ddb9ddebbd767f4bdcafb59cf0bea2b5af4a214
SHA2563b18972e781fb3ed8d5fffa2016ded50582562acdcf4de4e8a94cf4781b27cf1
SHA5121cd1d7018e58643325492fbb01f0c4a585e82773a266db9517037e82bd480b2afcadc052548899cffb95a3254253ede2d3e688ae6651890dfcabdde26009bc3e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.bin
Filesize5KB
MD506cae8e26573e9a0331f283578b25fb1
SHA1abbf9307f85afad0411c8b7896a41bca7b8de34a
SHA2564b25b60d20643cd9cb8de1ea13532e66ae42f09bc2474f01163248b92bcbb8b2
SHA51254d8f6a1c68c3b3dc3b731e1a9bab99726db9506f92d9bd95d85028a14dbff7c375c1bf932848d3fb8b7fc3fbe8a5987f0d18ef5eacdab0cffa6bec24787e1dc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.bin
Filesize15KB
MD5328df54f10e7e046c59ddab98beac3f0
SHA1db96fdc06def874c715d5f16101be1a4ef8c5532
SHA256e3eb1323150fd1fb1432570202b67f55e3a10dbf025d9279661f9a4653566cb5
SHA5129b9df9ad79dc24810242420bec0a78508fb384db6a64caa21ed0183882a5abb3ad09022d9ba3bcec35968c77d406c391cfb8631ecfb005c9b49d1b3e5a801f4d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD532e14edc6f2667d67098138fabec1961
SHA1c8f343032f087a8469380c32b3b13514488245c8
SHA2568d42ccc9cc28cbca0d4aeee82fb0c7ad4d3c59035c940dee6c177c93a52c624c
SHA512eacfb0d348c88df337037cf13fcfcc1090513508c230aa28c59bc366044b63245fc13f595a90468642e7d9c60eafacd3f76f9752f9e0d241536c83241ff04d19
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5815a5726e82b4b4d4f0a46c2eca0ace6
SHA16fe901ce7742062eb0ac27097ebf6c6404d9dbcc
SHA256efd066742a69388fc5cefe396a552a157dd77e88d7b2e78ee44f606b09d6279d
SHA5127cfd0379fd5114abcd6fa003462e2632f121b65af3765f6930c49e5019a1dc231e28b733a6bc90091eaceb77fdf01bb429bcc7e6ddc932a085e845f9d5284bcc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD58b35fc82a04a58ea544e908303210667
SHA11de16c9ce818a7d233a2ccdc1a68ef836fa1e265
SHA25655f2028f6131dafee9e0f2a6a550c35f56aa6b2ea1cffa8715c8652e3712471e
SHA5127b988c5c0f9134df8f07d03c8f85c94f8ff3ec8e36c1d2287ffc6486a123dfe307082e12b5acd9a588a5917e8e87ed5db3e061e97cfd17332d05f37742c87467
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD594d4a33ac3fd81012472965bc36dea9b
SHA1cf5aef4bcac44a9e01b232f625cb4a7f284d4aa5
SHA25643b02a78cc799a8100aa52ff474d422b9eb92d347c47c21f716df39c545f897b
SHA512889f3e9032961400e8a074605168c6166b16451dd83ef96200e405f1f42ee7061bc5c33227f96bf65b0e24e3cb7c8e78224e0ed03ff700597d24dc92856d853b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5e04c946737245c4fe391fb0909d09dde
SHA17405884d40fc4c45cb1676fcbcbda06419807a7e
SHA256d556da2dc17d44dd3e1fd901aa17375af3c3d775dc88c51a6211496a29cb5251
SHA5128f96696ee936b8b19cba1bba65fd3f07b5ec2a72c1e636485e8473e705c3292038b3932304f770e4b49f25f03730ea6e0ee445929a81f1eaec0c7600dd4dc368
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\pending_pings\291f7560-6da4-4286-b3d4-19fb6c82c928
Filesize671B
MD59eaef1695cac88b103dad4391dac2484
SHA118355e3f052dc394e21476801570b1492a27a9e8
SHA25642d2fd040936588227596d05d85d43188ad1f6d486ac3d1a9a5e514a7ca83708
SHA51232e09838209c6c4f9de1067932fa8c53d4d359147dbb05975700e3032e77e936d137bd7fc65d302d0ecf73aa60afc0446eba37bb7e95cab70a2aaafe84a39fad
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\pending_pings\d59cd824-0a8b-4cdc-8d90-a42ea6891242
Filesize982B
MD5c56344ee737560efac00769e12166f0f
SHA1591dadf3af7cf262ba60c99ff91b9db5e81fe057
SHA25614a1980f19c1b656186f98bbec78a46eaeeade064c90e0b912b752f922309311
SHA512c9c5380fd3c0695b60b8264500408f192c88f44f547e4fc2c992c08260e2475a07a719587097915f0de7e5abead10056629af24fe50797410b5c9f81352a71e7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\pending_pings\f2cbdef5-c8f5-447f-a9f7-9464413a1e72
Filesize27KB
MD540b2caabbdf147569f7831b166afc8a4
SHA194da40ac7f5471fd34271b73fcabe39f9a7426a4
SHA256f3684be672c0ed4cb6575934591341f6102013bee30516c348153a360b4cf5e6
SHA5128a1796d676129818f6fa2e8b2ed1be1296649891ae32073214471be8caad1466e39a77bc4ad7565c1a7e70b27ede2c72824f6dbcb6d955f3d14c7f762c1ddb8a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD51e2f9d4694e8712ed7b626a4b6b55cbe
SHA1023db4cea2f1d7a5c69ef5f3edfddfe223698536
SHA25679caf184a31d96e61e3569aed00fd775356c50ef2c154844e046d194a332f405
SHA51278017c311326b168b770ad51f8ebf2e301d7b654d2c289c9a7eb71ddf7d78b6415fc044a5a0c54ef2502071a861e90df43a5f04bff1546c1192c6447b6a135bb
-
Filesize
15KB
MD5a867eb4ef78454c118d86fead56f24bd
SHA12c58269838cdf269befa45bd4bafe41a82d7f8dd
SHA2565f394d3fc4898a56ad7e205bfd6b60225ad76b4e18991ca5dd4c64448db6f0b6
SHA5126560082d71fbf738b35a909d260c651244f1dda6317a29b92f6288417362faf2b00791e5a03c17d82fff7a24f60041f34d6d6e190b2e0c314e7a2b4cd72cec7d
-
Filesize
10KB
MD5642da0358f4719ee4b4790c05d4a7cc5
SHA1a2dac4cab10b74eae44107f6c519993b9dc780b9
SHA25661241dc71f65638429da6afaf9fbb15d530aaa860bf9bd4f1b7492c465cbe074
SHA512adb5994094e459b427e0896dfb42e755ff609404d1642052f5d489858cd1fdbb574bd78897feb97af58ae7098cda8c55bc3fe30f120f7dae9abddeb3a7e39d2d