Analysis
-
max time kernel
113s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 19:06
Static task
static1
General
-
Target
8c9d34a72092fa532c23777a898ae575eb7680c0de4d470b4321c340a04eb56cN.exe
-
Size
6.1MB
-
MD5
0e45fade1920c06609f778e2391ca49c
-
SHA1
3ef497688c700795c2e8718837bc5c74ea360be1
-
SHA256
5fdb85af757441b2dfa5a0225ae399fa933329eee8a7c92ffad77368cc859946
-
SHA512
24e8878b3869360d910fe007237e0199e43fe092ae9f9163104c67af84b33d44f8a0d5dbd57daa931cff7ad0b883180eabc67db8177a4d4dc6b9407b01a01b0a
-
SSDEEP
196608:kPZ/oLfBNALoX2DeOvKjLphzli+SVsGIat12fo1:CZ/UfBNg8MeOvGFZs+e1hY+
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://scriptyprefej.store
https://navygenerayk.store
https://founpiuer.store
https://necklacedmny.store
https://thumbystriw.store
https://fadehairucw.store
https://crisiwarny.store
https://presticitpo.store
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 9491342109.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 9491342109.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 9491342109.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 9491342109.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 9491342109.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 9491342109.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9491342109.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2V8618.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f842d0f05a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1Q37m4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3r29i.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b061d9b265.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2V8618.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b061d9b265.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9491342109.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1Q37m4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2V8618.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f842d0f05a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1Q37m4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3r29i.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3r29i.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b061d9b265.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9491342109.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f842d0f05a.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 1Q37m4.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 3r29i.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 12 IoCs
pid Process 4260 b1N62.exe 1208 M1z06.exe 3192 1Q37m4.exe 2736 skotes.exe 3544 2V8618.exe 5108 3r29i.exe 1608 4J525t.exe 4072 f842d0f05a.exe 2420 b061d9b265.exe 5556 9491342109.exe 7012 skotes.exe 6892 skotes.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 1Q37m4.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 2V8618.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 3r29i.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine b061d9b265.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 9491342109.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine f842d0f05a.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe -
Loads dropped DLL 1 IoCs
pid Process 5108 3r29i.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 9491342109.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 9491342109.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8c9d34a72092fa532c23777a898ae575eb7680c0de4d470b4321c340a04eb56cN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" b1N62.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" M1z06.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\f842d0f05a.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1005596001\\f842d0f05a.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b061d9b265.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1005597001\\b061d9b265.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\9491342109.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1005599001\\9491342109.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000a000000023b75-54.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 3192 1Q37m4.exe 2736 skotes.exe 3544 2V8618.exe 5108 3r29i.exe 4072 f842d0f05a.exe 2420 b061d9b265.exe 5556 9491342109.exe 7012 skotes.exe 6892 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1Q37m4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 18 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b061d9b265.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b1N62.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language M1z06.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8c9d34a72092fa532c23777a898ae575eb7680c0de4d470b4321c340a04eb56cN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1Q37m4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2V8618.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9491342109.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3r29i.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4J525t.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f842d0f05a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3r29i.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3r29i.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4020 timeout.exe -
Kills process with taskkill 5 IoCs
pid Process 4564 taskkill.exe 3516 taskkill.exe 1712 taskkill.exe 868 taskkill.exe 5060 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 3192 1Q37m4.exe 3192 1Q37m4.exe 2736 skotes.exe 2736 skotes.exe 3544 2V8618.exe 3544 2V8618.exe 5108 3r29i.exe 5108 3r29i.exe 5108 3r29i.exe 5108 3r29i.exe 4072 f842d0f05a.exe 4072 f842d0f05a.exe 1608 4J525t.exe 1608 4J525t.exe 2420 b061d9b265.exe 2420 b061d9b265.exe 1608 4J525t.exe 1608 4J525t.exe 5556 9491342109.exe 5556 9491342109.exe 5556 9491342109.exe 5556 9491342109.exe 5556 9491342109.exe 7012 skotes.exe 7012 skotes.exe 6892 skotes.exe 6892 skotes.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 4564 taskkill.exe Token: SeDebugPrivilege 3516 taskkill.exe Token: SeDebugPrivilege 1712 taskkill.exe Token: SeDebugPrivilege 868 taskkill.exe Token: SeDebugPrivilege 5060 taskkill.exe Token: SeDebugPrivilege 2192 firefox.exe Token: SeDebugPrivilege 2192 firefox.exe Token: SeDebugPrivilege 5556 9491342109.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 3192 1Q37m4.exe 1608 4J525t.exe 1608 4J525t.exe 1608 4J525t.exe 1608 4J525t.exe 1608 4J525t.exe 1608 4J525t.exe 1608 4J525t.exe 1608 4J525t.exe 1608 4J525t.exe 2192 firefox.exe 2192 firefox.exe 2192 firefox.exe 2192 firefox.exe 2192 firefox.exe 2192 firefox.exe 2192 firefox.exe 2192 firefox.exe 2192 firefox.exe 2192 firefox.exe 2192 firefox.exe 2192 firefox.exe 2192 firefox.exe 2192 firefox.exe 2192 firefox.exe 2192 firefox.exe 2192 firefox.exe 2192 firefox.exe 2192 firefox.exe 2192 firefox.exe 2192 firefox.exe 1608 4J525t.exe 1608 4J525t.exe 1608 4J525t.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 1608 4J525t.exe 1608 4J525t.exe 1608 4J525t.exe 1608 4J525t.exe 1608 4J525t.exe 1608 4J525t.exe 1608 4J525t.exe 1608 4J525t.exe 1608 4J525t.exe 2192 firefox.exe 2192 firefox.exe 2192 firefox.exe 2192 firefox.exe 2192 firefox.exe 2192 firefox.exe 2192 firefox.exe 2192 firefox.exe 2192 firefox.exe 2192 firefox.exe 2192 firefox.exe 2192 firefox.exe 2192 firefox.exe 2192 firefox.exe 2192 firefox.exe 2192 firefox.exe 2192 firefox.exe 2192 firefox.exe 2192 firefox.exe 2192 firefox.exe 1608 4J525t.exe 1608 4J525t.exe 1608 4J525t.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2192 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1284 wrote to memory of 4260 1284 8c9d34a72092fa532c23777a898ae575eb7680c0de4d470b4321c340a04eb56cN.exe 83 PID 1284 wrote to memory of 4260 1284 8c9d34a72092fa532c23777a898ae575eb7680c0de4d470b4321c340a04eb56cN.exe 83 PID 1284 wrote to memory of 4260 1284 8c9d34a72092fa532c23777a898ae575eb7680c0de4d470b4321c340a04eb56cN.exe 83 PID 4260 wrote to memory of 1208 4260 b1N62.exe 87 PID 4260 wrote to memory of 1208 4260 b1N62.exe 87 PID 4260 wrote to memory of 1208 4260 b1N62.exe 87 PID 1208 wrote to memory of 3192 1208 M1z06.exe 88 PID 1208 wrote to memory of 3192 1208 M1z06.exe 88 PID 1208 wrote to memory of 3192 1208 M1z06.exe 88 PID 3192 wrote to memory of 2736 3192 1Q37m4.exe 89 PID 3192 wrote to memory of 2736 3192 1Q37m4.exe 89 PID 3192 wrote to memory of 2736 3192 1Q37m4.exe 89 PID 1208 wrote to memory of 3544 1208 M1z06.exe 90 PID 1208 wrote to memory of 3544 1208 M1z06.exe 90 PID 1208 wrote to memory of 3544 1208 M1z06.exe 90 PID 4260 wrote to memory of 5108 4260 b1N62.exe 95 PID 4260 wrote to memory of 5108 4260 b1N62.exe 95 PID 4260 wrote to memory of 5108 4260 b1N62.exe 95 PID 5108 wrote to memory of 3960 5108 3r29i.exe 98 PID 5108 wrote to memory of 3960 5108 3r29i.exe 98 PID 5108 wrote to memory of 3960 5108 3r29i.exe 98 PID 1284 wrote to memory of 1608 1284 8c9d34a72092fa532c23777a898ae575eb7680c0de4d470b4321c340a04eb56cN.exe 100 PID 1284 wrote to memory of 1608 1284 8c9d34a72092fa532c23777a898ae575eb7680c0de4d470b4321c340a04eb56cN.exe 100 PID 1284 wrote to memory of 1608 1284 8c9d34a72092fa532c23777a898ae575eb7680c0de4d470b4321c340a04eb56cN.exe 100 PID 3960 wrote to memory of 4020 3960 cmd.exe 101 PID 3960 wrote to memory of 4020 3960 cmd.exe 101 PID 3960 wrote to memory of 4020 3960 cmd.exe 101 PID 1608 wrote to memory of 4564 1608 4J525t.exe 102 PID 1608 wrote to memory of 4564 1608 4J525t.exe 102 PID 1608 wrote to memory of 4564 1608 4J525t.exe 102 PID 2736 wrote to memory of 4072 2736 skotes.exe 104 PID 2736 wrote to memory of 4072 2736 skotes.exe 104 PID 2736 wrote to memory of 4072 2736 skotes.exe 104 PID 1608 wrote to memory of 3516 1608 4J525t.exe 109 PID 1608 wrote to memory of 3516 1608 4J525t.exe 109 PID 1608 wrote to memory of 3516 1608 4J525t.exe 109 PID 1608 wrote to memory of 1712 1608 4J525t.exe 111 PID 1608 wrote to memory of 1712 1608 4J525t.exe 111 PID 1608 wrote to memory of 1712 1608 4J525t.exe 111 PID 1608 wrote to memory of 868 1608 4J525t.exe 113 PID 1608 wrote to memory of 868 1608 4J525t.exe 113 PID 1608 wrote to memory of 868 1608 4J525t.exe 113 PID 1608 wrote to memory of 5060 1608 4J525t.exe 115 PID 1608 wrote to memory of 5060 1608 4J525t.exe 115 PID 1608 wrote to memory of 5060 1608 4J525t.exe 115 PID 2736 wrote to memory of 2420 2736 skotes.exe 117 PID 2736 wrote to memory of 2420 2736 skotes.exe 117 PID 2736 wrote to memory of 2420 2736 skotes.exe 117 PID 1608 wrote to memory of 8 1608 4J525t.exe 118 PID 1608 wrote to memory of 8 1608 4J525t.exe 118 PID 8 wrote to memory of 2192 8 firefox.exe 119 PID 8 wrote to memory of 2192 8 firefox.exe 119 PID 8 wrote to memory of 2192 8 firefox.exe 119 PID 8 wrote to memory of 2192 8 firefox.exe 119 PID 8 wrote to memory of 2192 8 firefox.exe 119 PID 8 wrote to memory of 2192 8 firefox.exe 119 PID 8 wrote to memory of 2192 8 firefox.exe 119 PID 8 wrote to memory of 2192 8 firefox.exe 119 PID 8 wrote to memory of 2192 8 firefox.exe 119 PID 8 wrote to memory of 2192 8 firefox.exe 119 PID 8 wrote to memory of 2192 8 firefox.exe 119 PID 2192 wrote to memory of 4960 2192 firefox.exe 120 PID 2192 wrote to memory of 4960 2192 firefox.exe 120 PID 2192 wrote to memory of 4960 2192 firefox.exe 120 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c9d34a72092fa532c23777a898ae575eb7680c0de4d470b4321c340a04eb56cN.exe"C:\Users\Admin\AppData\Local\Temp\8c9d34a72092fa532c23777a898ae575eb7680c0de4d470b4321c340a04eb56cN.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\b1N62.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\b1N62.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\M1z06.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\M1z06.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1Q37m4.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1Q37m4.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\1005596001\f842d0f05a.exe"C:\Users\Admin\AppData\Local\Temp\1005596001\f842d0f05a.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4072
-
-
C:\Users\Admin\AppData\Local\Temp\1005597001\b061d9b265.exe"C:\Users\Admin\AppData\Local\Temp\1005597001\b061d9b265.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2420
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"6⤵PID:6732
-
-
C:\Users\Admin\AppData\Local\Temp\1005599001\9491342109.exe"C:\Users\Admin\AppData\Local\Temp\1005599001\9491342109.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5556
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2V8618.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2V8618.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3544
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3r29i.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3r29i.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3r29i.exe" & del "C:\ProgramData\*.dll"" & exit4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Windows\SysWOW64\timeout.exetimeout /t 55⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4020
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4J525t.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4J525t.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4564
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3516
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1712
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:868
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5060
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking3⤵
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking4⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1924 -parentBuildID 20240401114208 -prefsHandle 1864 -prefMapHandle 1856 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b67cb565-2efb-40a5-b389-00011210eb43} 2192 "\\.\pipe\gecko-crash-server-pipe.2192" gpu5⤵PID:4960
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2456 -parentBuildID 20240401114208 -prefsHandle 2448 -prefMapHandle 2444 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fa13e71e-06d4-4d26-a096-92300e17d5c2} 2192 "\\.\pipe\gecko-crash-server-pipe.2192" socket5⤵PID:2064
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1108 -childID 1 -isForBrowser -prefsHandle 3192 -prefMapHandle 1468 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a90f5251-0030-4b3f-9c97-fca45191ce62} 2192 "\\.\pipe\gecko-crash-server-pipe.2192" tab5⤵PID:3284
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4028 -childID 2 -isForBrowser -prefsHandle 4020 -prefMapHandle 4016 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ec31bdce-d68a-4585-bdce-80e049fb82c0} 2192 "\\.\pipe\gecko-crash-server-pipe.2192" tab5⤵PID:868
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4788 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4824 -prefMapHandle 4820 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {75d430a9-3e74-42ab-b8ef-931c197415e8} 2192 "\\.\pipe\gecko-crash-server-pipe.2192" utility5⤵
- Checks processor information in registry
PID:6196
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5184 -childID 3 -isForBrowser -prefsHandle 5176 -prefMapHandle 5172 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {db430c49-5b02-4c0a-9862-4b09a902d0e8} 2192 "\\.\pipe\gecko-crash-server-pipe.2192" tab5⤵PID:7092
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5372 -childID 4 -isForBrowser -prefsHandle 5452 -prefMapHandle 5448 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {11fb071c-7b96-44fc-bed9-b62dbb2efac0} 2192 "\\.\pipe\gecko-crash-server-pipe.2192" tab5⤵PID:7104
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5536 -childID 5 -isForBrowser -prefsHandle 5532 -prefMapHandle 5372 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a81a0146-a2b2-45cf-8057-63495c76c6c1} 2192 "\\.\pipe\gecko-crash-server-pipe.2192" tab5⤵PID:7124
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:7012
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6892
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
676KB
MD5eda18948a989176f4eebb175ce806255
SHA1ff22a3d5f5fb705137f233c36622c79eab995897
SHA25681a4f37c5495800b7cc46aea6535d9180dadb5c151db6f1fd1968d1cd8c1eeb4
SHA512160ed9990c37a4753fc0f5111c94414568654afbedc05308308197df2a99594f2d5d8fe511fd2279543a869ed20248e603d88a0b9b8fb119e8e6131b0c52ff85
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\activity-stream.discovery_stream.json.tmp
Filesize19KB
MD5bc8d2c377f1a622f5dbac8688ef2dc67
SHA10b46b2d196dfe4023b48e1babc449637137bd6a7
SHA2560dfd8fafd60d9051c4cc3c00530367359a43f9413c627eddddce8c55fb3349f2
SHA512e7433d735de936216a9ee9baf1a07c73ea7fb7a4a3fda1a932baf48bce1d75a6031a84e53c5fa3d74b3c2223be1f3f54feae32b02fb342a851a65009e791d993
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\cache2\entries\D500AD994A7515157BB2A6ADD5B18B754E4D2F99
Filesize13KB
MD5e5d717677c173309d41b9871bb0c8127
SHA1e6258f927c9ac6ec943be1ca65f9480968004698
SHA2568b1b6fd7ceeb7c7618140282405b8e24a76080b7bcaac493286a1b02359c6048
SHA5122f6ea7256ff35916ab1989784988d354011fb2738605958e78e6017e8b0d2c48c4c740aecf14ff222a83ae4dd9c6b797444d49b7636624ba63c03ddf753c0c8a
-
Filesize
3.0MB
MD50eb8e45168c931c4451682c65dde3a7e
SHA17ac926652710af765c590c689c589d6d2efb995b
SHA25681de128175c66395a983baf7fcfff8ed062b4e1ce2bd29f8e1ba456bba36a35b
SHA512bf60bfa207d94244f6af1e5b0376fd337973f60667fb63c4efa37ef5443c665c63c86096d5b07fa014b62fd1ec56c87399286ab676ef98acb15ddc2c9fb6118f
-
Filesize
1.7MB
MD57f588fe16ce0b9ae1671cd6db5ce4380
SHA1bca4dc7424985793487d16004e033f3ae92f4d6f
SHA2564fcb7be72c4f45199bf2d28b95c8f709b343efb27ae10eb76bbb2b4d43905638
SHA5127f1834eb9fbc50696432472720e4229b4eb927a4b12741795e82685086c314db8750c11e7f8c3b7821cd7a246ac46210a4edec7f5e17f64efd5b0d77662b63aa
-
Filesize
2.7MB
MD5ddeae720221b8c7e9e167f60a058cde3
SHA19aca419f577090ca34609a1fe422a1d58ea6cc0b
SHA2567552e0dc96b23862d9ca90c4d5ea1b6b842a89b98bfa8e60bba79875e61a97cc
SHA512b5314ff4cf310e6e4736881defc12416b21facca3ea42a97d69d2e4309d7edfb4cf938665c18064eb9b6bc05f97602f4aa4d9c95555c7d718f50e79865268c12
-
Filesize
898KB
MD5c63ac8306406068a73f2d1353b3112c0
SHA1a02e30dd2eee5cfef53c6a71e14143a62ed12f4e
SHA256a86d0c52ebdcd34f598a267a8a203f559339b0a1a0d799b86b273d5b5715ee6b
SHA5122c32f6921db4afaf7e7e461cd33fb51c7b2cb71a1650593860c6304b1315cd5b0861ab12ce229db523021d15fb0524a4d4e6491dcc64b05e2c3ea21eed3bbb42
-
Filesize
5.6MB
MD5acb24b7635e497172a4ce83ab8bfbfae
SHA10a633d413960cbdd06b9c63f31b0637dd43dac9e
SHA25641468da8b1df9567997eac4e3c829210322c9f74753ca0954e8404a9c7abd7f9
SHA5121d4314cc6f7946a96824ed76b88cff1f4c57de8efdac57a71f6139f4caa8ff299dd20bcd4b88c9a9afc6bee1c763eaf8a5178ccff43e192dc66d739d49593c3a
-
Filesize
2.1MB
MD51493f45533a0c14a6dcf059001d3f25b
SHA1956511982ebdfeffc6344ea5e67351d7eabca03c
SHA25650f63490ab3bc1756781b88ad152d85fc748bb7a241e57ab1f93e3a9c16e6b88
SHA512380e8521d7a381af448ff2c2d49ea14e5a341e8f570cca11ec11a794f9e9d976c9d1887cfce1f24eb0821a6d88c8c133061cc76c482b9e7b751e781b9d5ad449
-
Filesize
3.5MB
MD562fd9ddec512a5c8ad8bcc5ece88e659
SHA179fd0a7d2e7638dc3d3ff308284218e9cf86f108
SHA2567bf931b5378e81f86ac62fa84a77583aec32af40599e6e3275357842b1f63177
SHA512ab05b20a17ac7648769ab00d5fb51b0b011cee68d5535a3144bba94ddf70d33622243acb4643e963bd1a633882b00063f5b112496f61b56430113cd599d78dd0
-
Filesize
3.2MB
MD5ee6dde45274acf1087e550b85bfbcfa4
SHA160f52da4bbbe47580843f59eea06fa351a5fafb6
SHA256244d356a3ffed73213e37f3a73fb47029367258737f896d8125ebac3c36b50be
SHA512000571ae0c9cce561c66e92b9869fa34726c674543a4b8069f72e7bb7bce7b9ba42644d947b7226dd6244ce312cde25f50b27c9ac53f70864e32d31559bea412
-
Filesize
3.0MB
MD5c2ebdaf90192aa57b795ec9093086024
SHA13069aea4ce372b976d074496021db24da36764bc
SHA25692a42623a9ee5130017c9408eabfb288f85184b9544aa8cdebf7e6e2482a50db
SHA51257e96b2838198961639c0fa984baad762fe5dba76c4080b5e64e369824c15596fb464ea33930f9b95d5cc5f7c143c5a38913e98992f949eb2c508c8bca670dde
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin
Filesize6KB
MD5cdcf152e8e2c5f8fb92fab686a1cd034
SHA1dd0545f1ec5ef1c20baa61662eff8445934a037b
SHA256f0ba50f95c7604c1bd13a2260d71b06b16b3b1fd9b4315987c5a8b09b091efe1
SHA512005e7a9e730313edf9e666c921758c62db67f9de7a1ff469a63542292afb8e3928f78c33af94cccbe0c59c4a7bd0d53b8adaff1aa4660416166a320d03fdb5db
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin
Filesize10KB
MD5233a0f1928c67f09580f9d88360d028f
SHA149025a56fa13257e15a2cff8b2a9f3f740c8488c
SHA256848de2ce8d983b1917dc462e9a1af0d4dd566c3c26df06468b4d05c66e3d3731
SHA512946c150f8ab2f40461ff632f86d82ba590c983b6e63c9455f1c750fa796073c68a420feae4bfd86511f44aeb5fabfa6a884cb54a380a38edb98994fe7711e8a6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin
Filesize13KB
MD54de0bc39dae87bf1753347c0960680a1
SHA1e3e78b47b0e3557cd1e42ad64d1e806b63c4146a
SHA256b50ab41d0218fb2b5c6a5d9f37a880b4164c9d22dd3ff0302da15ea3aa36a65a
SHA5129c64047019bd9ad0e608ef043d331df89d4aa96b63f2e79b74de81c33db365debd8ab2b671ece99f91f16d0a076f3ef82f40233a493cf1b7b24d64b189bfd9b6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.bin
Filesize15KB
MD58ac4b39545c7237757d5abcfcca89bc8
SHA1ff566e9d5aa4fcce85c049af36d21ca6a9d8085d
SHA2565342e7e547bc794eec8dff1d9fbfadb226bd7f5bda5c8630eaffeeed8171aba6
SHA5124d0ed970535c7cd1f1270a13ad752490deef5ed6a42315263d51b2f2200bc83eb149f9e7961a8ff164c993db062c27e6526a56d1e092566d06b24eca327b1f73
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.bin
Filesize23KB
MD5af0afdae29e1833af3dc9f3e4b3a178e
SHA1e1e288e0501693f350cd3ed4f79b45ecb8216324
SHA256e7f7e9fd2b91da449f79b8a232ba4be1710dde263dfe4145bae34d991819915a
SHA512edc890d096380708823230b75ae59102434cc4df1fd880dadc83bb8ab764224c6c3f1d3d8c4366ee03667166f02cbe5dde62a483c6ded67445ee193c6d178ad9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.bin
Filesize15KB
MD56053e290ea7bef2d43c3686a0a3a5d6c
SHA11fc276cf20ca4439a3c14f0e44b8205f6648f4df
SHA2564ff3342baeefbcbd8efd7f227a18d7cefe34819f4d447c94227d576852a3eaa2
SHA512c9f3d524c498a707ec7b9e1e33589f52bd4fbce6085e682536e55c043ad27d852382d7ba256b5d08df498cc1fcd01db95038cdc0bfd6f7d57370eed16a468124
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.bin
Filesize5KB
MD5dcbc554146103d30ec7a14745445b45d
SHA1bf02e4068e7410943d17a45de96658ec7620c974
SHA256cf7d261590f159dd5309e797502b5cdee4a7225078192d42167f6321ac9dd932
SHA512b32d9826c5164547b4ab70c53a7b90912cc49a5c4dccc5cacaea3075af7ee8151c8af741b400c672ac01a4b4cbf08080dd62189a3de6f9558d80cd2489f3f4ec
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.bin
Filesize6KB
MD54e5e9afe4210f228f0669e5bf10f8009
SHA1bbe1b0207d50ab47a455b2deada3d0453dab19ba
SHA2565d941eccb161745b34bb34f6ef8b734c4fc431cecfdc1117c058bc4a65f68ee9
SHA5127252ae5dbab3fe36e9d18795fb6ea53c566d013881712ec5203fd04e9622247ba9ac30fc01095d1e64f47964ee26e7a8b329a6ee2f4281e47e1f596702dae1e3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize16KB
MD572611e66982d8c3d78e2c8ba296e63b1
SHA11150957b2a11f6aefa06dfa3ba765b6cf4cacd4c
SHA256b95852be81cfc10fe582a1c59930b8b48b2691abec08d1417895f72e687ee0d0
SHA512112cadb72cf96cd0de9a5470b88d2ff96c71fcc2cc24b8646391c57eb530f82dbbdf295908f4bf99223d5dbe79e8fbb5b58ea4d2cac4eb8ccb0abe2e64eb3a82
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD59eef14aed0fc5e4fcac569ebcec80d29
SHA17b3f232e3833e9b522cad2d4b2e06bf8d1d67641
SHA2567d3d389a0238078c4211946549ac271293ca442ced5a2432eab4cccaf4cdcef2
SHA512324efedc0d3d3a05dad29fdcf5f7d18ec7ca28bb6901f79a838e6a810f8049bb098e4e022a485b68e48eebf3aa95a432868f7487fd17508010c5c96174469bf0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5d7d3c744878fc48a5480d80b89be0b91
SHA187a292f190f5005701e1cdd6a3f5550fdb808903
SHA256c2a9e881578cf697a3e53cec37440bfaaecdd2ea541abe3aa49ad128af6a86d3
SHA51237c8c40de944efafc8f6abb36db1821d03d3177aff946401d49be4fb78cba076c916fdcc8c3c7eab74f2e9f24dbf0719067a1a45bdf2d80be4d8757ab769bf88
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD54e34229283c0c960b09b009b59be9b18
SHA1daaa2aa9fef966aeb11064b2821aba9f336639ac
SHA2569d6ccaab6f448af4df69c0b6e3aa98bf8bdbb2153d16455d337cf40460569bb0
SHA5122cf722c86ba423fac9323d38b82b8229faab24e18837b0ea6123fd40e67af351081f91f5db21afeadb3ae1b71fa05084a5b222e99e1b9746871e3b6de0ff17a8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD507ebd8ae2d94de0026191c9aa6eaada1
SHA1215bf7abff68f69aafab320ded7dd4fe487e54f8
SHA256c579ef2d6cbb86fa552079ada16976fb9e99c1bbd3b9c4863d40b8c58ed16db1
SHA5120c5113e2b877cdfbd1402127fd2415596d609ab975f50c52df2cce46b010365850a7e0bfd6d231288cf9a5abcc33cf40db280209d913bc0056d9c824881ee95d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\02296e0f-542d-4b01-a634-6c0df5609f8f
Filesize982B
MD5f6da0ae42064b8b8217ef0554e8e4cad
SHA1ace63bd625b36edb4dcc56fee57e8b6e49e7695c
SHA2564085324bce49efb859c0f2f6bf5b1095249f61a12f5a403518e2762e3d9f0564
SHA512962edc2fe3420b785cdf187490bfefda7cc734a7f3a6be084a3df4316889af5ba123634b44d2df4c73589afcadd32a0d4e638f07c7258e13b444fedece95c688
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\2eda7546-9d7f-4543-be68-48ac23ba1e65
Filesize24KB
MD5b084d0318128ebf85fbaf413159bc223
SHA12b246ebbf6db8520a6b03dabbe626adabfdc88f7
SHA256d7ed1b6fdeb85aaa88387fb6d3f47580b75c0a06f504e1842a73aa514b6e15b4
SHA51246a7f2fc8a498e0022037a3906a54afe8c26cb4f198496fa1aa8023924c95392366a1b6affd8fef703386152cade964bc1fdfd23ac0facc736c3c5ebad8bec1b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\f2644dd6-9d9a-41fc-91d3-ce2be678490c
Filesize671B
MD546ffd37a86189e84c1c4b679db6c0181
SHA13e02dfb8a105f768245e4765340230844c642200
SHA256280c7d1343878a47b7d342273f23ff30e339a05006bd1f9a7358c27352568bd3
SHA512dedd9f10d334c39919956ff901d825c90fc93cac0fd1f5c9920596945fbea7a5991388647fe9c0789749470011b090dd6fe10886ba88bffc28c73ee57f3e1b2f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD57b5cc745be6930e04e03b3770525b28f
SHA12a1f06357d804bd86459baa65181a20a89604a08
SHA256275eefd6318f236c5391949c99284d43481a2ab0f97ae3221a52f2887a566b31
SHA5128b15d3110ac0a58800449f149b959fef43038c04b45f04a3489abd31eda691cbde14d361aa613d3efdcb5f9d53c7011d94086302cfaa7ce34707121598d9d053
-
Filesize
10KB
MD558760932220a3c3bf99dcb46f09111f8
SHA1b8b5635ade59ce60f65becb7570403a0efc5df3f
SHA256a63478b16235544f560f54de017af13f4b92070eca76b3f8fb31dbf6c062123f
SHA5125e1660682cb14cec4de6067f1d2c2a19f296456d536f727e9265ec79f5de1638077522f442a1fc3a55d1d69e20020782886bbd25b151cf8aca09cf81363830f1
-
Filesize
15KB
MD511c9af64c18f475b1dc93a522f754135
SHA1f57db0af44cc633f31315727803770f3755f892d
SHA2561c6e86931d17485cd5fd388d1b6cdf2d4356b0ab0a10635839606753d6418dd3
SHA51246cf61770b53e611c8d091f986207d2b619890b3233973aadd02994534bc9b756291993671888512be6c45b001e50e49bc65bb5d6042ee904eb1826c4420e8bb
-
Filesize
10KB
MD5565deae2bdd6696d519497abb8c40ba9
SHA1d873f6be75dd515c09f695359061f22ac1c4266d
SHA256d1f12e5e8bd7806fc2c31abb2788d94dee54d795387d0722bed86c75699a8912
SHA512c4c8f4a0f0bb4b7b12503a176c21819141de898b9c7c2abb0f121f22dfd555e88f1ebd67c1f3edfe75875b6db14d9c01c2d216068857d5592bc21a98a17e2e21
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize1.1MB
MD51d3f6bbd7d03282993747d29fcd379b7
SHA101a4c0a734dd16ebc4cdff8a0a91eb7d2b1e4f23
SHA2563dd17d7d0fb09a370c368478409e0ad713ab9ec74fa5286f075cf30854912a25
SHA5121574fcc82b5fd849d9f3156331a7b83f28c532cbde953eb2912d750681d8e5ad191b7a75e0861badf027a7808905d536f92fa2367079e6ce9e4075986cf02d81