Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-11-2024 09:21
Static task
static1
Behavioral task
behavioral1
Sample
f65b4f0e91b04fc62e4d6cd10d6b1ec53b29b955496c6e005b9443101d1f1262.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
f65b4f0e91b04fc62e4d6cd10d6b1ec53b29b955496c6e005b9443101d1f1262.exe
Resource
win10v2004-20241007-en
General
-
Target
f65b4f0e91b04fc62e4d6cd10d6b1ec53b29b955496c6e005b9443101d1f1262.exe
-
Size
1.9MB
-
MD5
6a38eeb44e27ba7e351f61180c34981e
-
SHA1
4cf5edee9dbee85ab291bfc6afe35f7d55c4b4f6
-
SHA256
f65b4f0e91b04fc62e4d6cd10d6b1ec53b29b955496c6e005b9443101d1f1262
-
SHA512
436d38e455d95687636966bdb7fe4b30963a57401425c02b94152400920b9c030a1f3173e5975dd04c21a45a280cc13cf242281f86ab5a58a7a9067dec4b43ca
-
SSDEEP
49152:HS1kmlCLzmZlIZJlg+ZIPToTYypd89QmiCqxCpkv:H8BC2folDr8W4qwpkv
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://processhol.sbs/api
https://p10tgrace.sbs/api
https://peepburry828.sbs/api
https://3xp3cts1aim.sbs/api
https://p3ar11fter.sbs/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" f5abb127d0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" f5abb127d0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" f5abb127d0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" f5abb127d0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" f5abb127d0.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection f5abb127d0.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f5abb127d0.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f65b4f0e91b04fc62e4d6cd10d6b1ec53b29b955496c6e005b9443101d1f1262.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8d9c43cc99.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9c5c13d04a.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 5080 chrome.exe 4220 chrome.exe 4224 chrome.exe 2072 chrome.exe -
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8d9c43cc99.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f65b4f0e91b04fc62e4d6cd10d6b1ec53b29b955496c6e005b9443101d1f1262.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8d9c43cc99.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f5abb127d0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f65b4f0e91b04fc62e4d6cd10d6b1ec53b29b955496c6e005b9443101d1f1262.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9c5c13d04a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f5abb127d0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9c5c13d04a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation f65b4f0e91b04fc62e4d6cd10d6b1ec53b29b955496c6e005b9443101d1f1262.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 7 IoCs
pid Process 4464 skotes.exe 1648 8d9c43cc99.exe 3404 9c5c13d04a.exe 4872 9f613f941d.exe 1980 f5abb127d0.exe 6116 skotes.exe 1908 skotes.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine f65b4f0e91b04fc62e4d6cd10d6b1ec53b29b955496c6e005b9443101d1f1262.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 8d9c43cc99.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 9c5c13d04a.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine f5abb127d0.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" f5abb127d0.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features f5abb127d0.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\8d9c43cc99.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007118001\\8d9c43cc99.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\9c5c13d04a.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007119001\\9c5c13d04a.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\9f613f941d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007120001\\9f613f941d.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\f5abb127d0.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007121001\\f5abb127d0.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000a000000023b79-66.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 316 f65b4f0e91b04fc62e4d6cd10d6b1ec53b29b955496c6e005b9443101d1f1262.exe 4464 skotes.exe 1648 8d9c43cc99.exe 3404 9c5c13d04a.exe 1980 f5abb127d0.exe 6116 skotes.exe 1908 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job f65b4f0e91b04fc62e4d6cd10d6b1ec53b29b955496c6e005b9443101d1f1262.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5492 3404 WerFault.exe 96 -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8d9c43cc99.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9c5c13d04a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9f613f941d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f65b4f0e91b04fc62e4d6cd10d6b1ec53b29b955496c6e005b9443101d1f1262.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f5abb127d0.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 9c5c13d04a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 9c5c13d04a.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 5 IoCs
pid Process 3912 taskkill.exe 4528 taskkill.exe 4372 taskkill.exe 2604 taskkill.exe 3208 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 316 f65b4f0e91b04fc62e4d6cd10d6b1ec53b29b955496c6e005b9443101d1f1262.exe 316 f65b4f0e91b04fc62e4d6cd10d6b1ec53b29b955496c6e005b9443101d1f1262.exe 4464 skotes.exe 4464 skotes.exe 1648 8d9c43cc99.exe 1648 8d9c43cc99.exe 3404 9c5c13d04a.exe 3404 9c5c13d04a.exe 3404 9c5c13d04a.exe 3404 9c5c13d04a.exe 3404 9c5c13d04a.exe 3404 9c5c13d04a.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 4872 9f613f941d.exe 4872 9f613f941d.exe 1980 f5abb127d0.exe 1980 f5abb127d0.exe 1980 f5abb127d0.exe 1980 f5abb127d0.exe 1980 f5abb127d0.exe 4872 9f613f941d.exe 4872 9f613f941d.exe 6116 skotes.exe 6116 skotes.exe 1908 skotes.exe 1908 skotes.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeDebugPrivilege 4528 taskkill.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeDebugPrivilege 4372 taskkill.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeDebugPrivilege 2604 taskkill.exe Token: SeDebugPrivilege 3208 taskkill.exe Token: SeDebugPrivilege 3912 taskkill.exe Token: SeDebugPrivilege 3844 firefox.exe Token: SeDebugPrivilege 3844 firefox.exe Token: SeDebugPrivilege 1980 f5abb127d0.exe Token: SeDebugPrivilege 3844 firefox.exe Token: SeDebugPrivilege 3844 firefox.exe Token: SeDebugPrivilege 3844 firefox.exe -
Suspicious use of FindShellTrayWindow 60 IoCs
pid Process 316 f65b4f0e91b04fc62e4d6cd10d6b1ec53b29b955496c6e005b9443101d1f1262.exe 4872 9f613f941d.exe 4872 9f613f941d.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 4872 9f613f941d.exe 4872 9f613f941d.exe 4872 9f613f941d.exe 4872 9f613f941d.exe 4872 9f613f941d.exe 4872 9f613f941d.exe 4872 9f613f941d.exe 3844 firefox.exe 3844 firefox.exe 3844 firefox.exe 3844 firefox.exe 3844 firefox.exe 3844 firefox.exe 3844 firefox.exe 3844 firefox.exe 3844 firefox.exe 3844 firefox.exe 3844 firefox.exe 3844 firefox.exe 3844 firefox.exe 3844 firefox.exe 3844 firefox.exe 3844 firefox.exe 4872 9f613f941d.exe 3844 firefox.exe 3844 firefox.exe 3844 firefox.exe 3844 firefox.exe 3844 firefox.exe 4872 9f613f941d.exe 4872 9f613f941d.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 4872 9f613f941d.exe 4872 9f613f941d.exe 4872 9f613f941d.exe 4872 9f613f941d.exe 4872 9f613f941d.exe 4872 9f613f941d.exe 4872 9f613f941d.exe 4872 9f613f941d.exe 4872 9f613f941d.exe 3844 firefox.exe 3844 firefox.exe 3844 firefox.exe 3844 firefox.exe 3844 firefox.exe 3844 firefox.exe 3844 firefox.exe 3844 firefox.exe 3844 firefox.exe 3844 firefox.exe 3844 firefox.exe 3844 firefox.exe 3844 firefox.exe 3844 firefox.exe 3844 firefox.exe 3844 firefox.exe 4872 9f613f941d.exe 3844 firefox.exe 3844 firefox.exe 3844 firefox.exe 3844 firefox.exe 4872 9f613f941d.exe 4872 9f613f941d.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3844 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 316 wrote to memory of 4464 316 f65b4f0e91b04fc62e4d6cd10d6b1ec53b29b955496c6e005b9443101d1f1262.exe 86 PID 316 wrote to memory of 4464 316 f65b4f0e91b04fc62e4d6cd10d6b1ec53b29b955496c6e005b9443101d1f1262.exe 86 PID 316 wrote to memory of 4464 316 f65b4f0e91b04fc62e4d6cd10d6b1ec53b29b955496c6e005b9443101d1f1262.exe 86 PID 4464 wrote to memory of 1648 4464 skotes.exe 92 PID 4464 wrote to memory of 1648 4464 skotes.exe 92 PID 4464 wrote to memory of 1648 4464 skotes.exe 92 PID 4464 wrote to memory of 3404 4464 skotes.exe 96 PID 4464 wrote to memory of 3404 4464 skotes.exe 96 PID 4464 wrote to memory of 3404 4464 skotes.exe 96 PID 3404 wrote to memory of 5080 3404 9c5c13d04a.exe 101 PID 3404 wrote to memory of 5080 3404 9c5c13d04a.exe 101 PID 5080 wrote to memory of 2080 5080 chrome.exe 102 PID 5080 wrote to memory of 2080 5080 chrome.exe 102 PID 4464 wrote to memory of 4872 4464 skotes.exe 103 PID 4464 wrote to memory of 4872 4464 skotes.exe 103 PID 4464 wrote to memory of 4872 4464 skotes.exe 103 PID 4872 wrote to memory of 4528 4872 9f613f941d.exe 104 PID 4872 wrote to memory of 4528 4872 9f613f941d.exe 104 PID 4872 wrote to memory of 4528 4872 9f613f941d.exe 104 PID 5080 wrote to memory of 3360 5080 chrome.exe 106 PID 5080 wrote to memory of 3360 5080 chrome.exe 106 PID 5080 wrote to memory of 3360 5080 chrome.exe 106 PID 5080 wrote to memory of 3360 5080 chrome.exe 106 PID 5080 wrote to memory of 3360 5080 chrome.exe 106 PID 5080 wrote to memory of 3360 5080 chrome.exe 106 PID 5080 wrote to memory of 3360 5080 chrome.exe 106 PID 5080 wrote to memory of 3360 5080 chrome.exe 106 PID 5080 wrote to memory of 3360 5080 chrome.exe 106 PID 5080 wrote to memory of 3360 5080 chrome.exe 106 PID 5080 wrote to memory of 3360 5080 chrome.exe 106 PID 5080 wrote to memory of 3360 5080 chrome.exe 106 PID 5080 wrote to memory of 3360 5080 chrome.exe 106 PID 5080 wrote to memory of 3360 5080 chrome.exe 106 PID 5080 wrote to memory of 3360 5080 chrome.exe 106 PID 5080 wrote to memory of 3360 5080 chrome.exe 106 PID 5080 wrote to memory of 3360 5080 chrome.exe 106 PID 5080 wrote to memory of 3360 5080 chrome.exe 106 PID 5080 wrote to memory of 3360 5080 chrome.exe 106 PID 5080 wrote to memory of 3360 5080 chrome.exe 106 PID 5080 wrote to memory of 3360 5080 chrome.exe 106 PID 5080 wrote to memory of 3360 5080 chrome.exe 106 PID 5080 wrote to memory of 3360 5080 chrome.exe 106 PID 5080 wrote to memory of 3360 5080 chrome.exe 106 PID 5080 wrote to memory of 3360 5080 chrome.exe 106 PID 5080 wrote to memory of 3360 5080 chrome.exe 106 PID 5080 wrote to memory of 3360 5080 chrome.exe 106 PID 5080 wrote to memory of 3360 5080 chrome.exe 106 PID 5080 wrote to memory of 3360 5080 chrome.exe 106 PID 5080 wrote to memory of 3360 5080 chrome.exe 106 PID 5080 wrote to memory of 5088 5080 chrome.exe 107 PID 5080 wrote to memory of 5088 5080 chrome.exe 107 PID 5080 wrote to memory of 3848 5080 chrome.exe 108 PID 5080 wrote to memory of 3848 5080 chrome.exe 108 PID 5080 wrote to memory of 3848 5080 chrome.exe 108 PID 5080 wrote to memory of 3848 5080 chrome.exe 108 PID 5080 wrote to memory of 3848 5080 chrome.exe 108 PID 5080 wrote to memory of 3848 5080 chrome.exe 108 PID 5080 wrote to memory of 3848 5080 chrome.exe 108 PID 5080 wrote to memory of 3848 5080 chrome.exe 108 PID 5080 wrote to memory of 3848 5080 chrome.exe 108 PID 5080 wrote to memory of 3848 5080 chrome.exe 108 PID 5080 wrote to memory of 3848 5080 chrome.exe 108 PID 5080 wrote to memory of 3848 5080 chrome.exe 108 PID 5080 wrote to memory of 3848 5080 chrome.exe 108 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\f65b4f0e91b04fc62e4d6cd10d6b1ec53b29b955496c6e005b9443101d1f1262.exe"C:\Users\Admin\AppData\Local\Temp\f65b4f0e91b04fc62e4d6cd10d6b1ec53b29b955496c6e005b9443101d1f1262.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Users\Admin\AppData\Local\Temp\1007118001\8d9c43cc99.exe"C:\Users\Admin\AppData\Local\Temp\1007118001\8d9c43cc99.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1648
-
-
C:\Users\Admin\AppData\Local\Temp\1007119001\9c5c13d04a.exe"C:\Users\Admin\AppData\Local\Temp\1007119001\9c5c13d04a.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3404 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff9cf16cc40,0x7ff9cf16cc4c,0x7ff9cf16cc585⤵PID:2080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1912,i,8807290877997980926,17716474872084275634,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1908 /prefetch:25⤵PID:3360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2140,i,8807290877997980926,17716474872084275634,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2160 /prefetch:35⤵PID:5088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2248,i,8807290877997980926,17716474872084275634,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2528 /prefetch:85⤵PID:3848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3160,i,8807290877997980926,17716474872084275634,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3180 /prefetch:15⤵
- Uses browser remote debugging
PID:4220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3192,i,8807290877997980926,17716474872084275634,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3368 /prefetch:15⤵
- Uses browser remote debugging
PID:4224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4512,i,8807290877997980926,17716474872084275634,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4528 /prefetch:15⤵
- Uses browser remote debugging
PID:2072
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3404 -s 15204⤵
- Program crash
PID:5492
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007120001\9f613f941d.exe"C:\Users\Admin\AppData\Local\Temp\1007120001\9f613f941d.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4528
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4372
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2604
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3208
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3912
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:4332
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3844 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1988 -parentBuildID 20240401114208 -prefsHandle 1904 -prefMapHandle 1896 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7fec1392-3ba8-43d0-9511-769acefa67a6} 3844 "\\.\pipe\gecko-crash-server-pipe.3844" gpu6⤵PID:4052
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2468 -parentBuildID 20240401114208 -prefsHandle 2460 -prefMapHandle 2456 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a07b0119-a5fd-4035-82b8-5b2cca6054b6} 3844 "\\.\pipe\gecko-crash-server-pipe.3844" socket6⤵PID:3276
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3344 -childID 1 -isForBrowser -prefsHandle 3292 -prefMapHandle 3288 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1260 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4a3dc1ea-1285-4bf8-8d86-826f3ede922f} 3844 "\\.\pipe\gecko-crash-server-pipe.3844" tab6⤵PID:3432
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4028 -childID 2 -isForBrowser -prefsHandle 4020 -prefMapHandle 3080 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1260 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1238216a-ac32-49b1-81a9-1e0fc9bed8dc} 3844 "\\.\pipe\gecko-crash-server-pipe.3844" tab6⤵PID:1952
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4764 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4712 -prefMapHandle 4728 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {27ca8adf-5731-4b27-8999-f3e04015931a} 3844 "\\.\pipe\gecko-crash-server-pipe.3844" utility6⤵
- Checks processor information in registry
PID:5416
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3080 -childID 3 -isForBrowser -prefsHandle 5480 -prefMapHandle 4772 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1260 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d9db9f09-7da5-4e77-9d8b-fc3e6c165842} 3844 "\\.\pipe\gecko-crash-server-pipe.3844" tab6⤵PID:5520
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5748 -childID 4 -isForBrowser -prefsHandle 5588 -prefMapHandle 5576 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1260 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {03f55998-0709-4372-b71c-65fcc60f72e0} 3844 "\\.\pipe\gecko-crash-server-pipe.3844" tab6⤵PID:5532
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5864 -childID 5 -isForBrowser -prefsHandle 5944 -prefMapHandle 5940 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1260 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1498324f-ee52-4809-8a72-5dffe2e693c1} 3844 "\\.\pipe\gecko-crash-server-pipe.3844" tab6⤵PID:5544
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007121001\f5abb127d0.exe"C:\Users\Admin\AppData\Local\Temp\1007121001\f5abb127d0.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1980
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2068
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3404 -ip 34041⤵PID:5760
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6116
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1908
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\activity-stream.discovery_stream.json
Filesize19KB
MD583af5e5e96b7f188080770863529ba22
SHA1f565209a33b8ea7e69be947481d78893f95de7c8
SHA25630bbfb4d0529a47a2052a047f8187dedc0dcc1b4793016a6d0b0e1cb88dec970
SHA512ecc559dcb0887c11299a907008bb7285e3109e8d43c6a7ec17c06119af763ce76cfaa0f6f3ac28875f0452de4078b1c9eca10030357757bf9e01a8838928a9be
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD5beac21e6c05215bd359cd271acfded8a
SHA1b066e2a78e42cf9303e4fff598638f646fa9a1a6
SHA256873aa370a7502ef3195cddb174681910bef3e82cba75977704d632b1fc3e7cf6
SHA5127266fb3ea3bc3dbea8ff9d51475c4c777b451d74f02efc393d63b3e1843fa393d3ed7e7a6bca9a3a07966302588097d6bf405993ea51615b3d3c6e1245938e00
-
Filesize
1.7MB
MD52fe2ab5b511de6ef48e3eba0378f3e12
SHA1c350d71c99c8c079714e71c219c706c6716a22aa
SHA256ab2e92bf1d70567a32aef956b7d64cbe4d49dadf779fc6d455674fab35509b14
SHA5124beb110952f7f3d6f351149448344f0e5918694bfa3fa958e08690999e16f270abd32100e2d844c5a13564e4c8fd664d17882979e6ca567111983ef62ee4768e
-
Filesize
1.7MB
MD513a85c121414fb45d5693a9ab8910086
SHA1040b4aa8746c65929784f80116bb13c7f125ddb2
SHA256de0db7603189d02c7051013fe43244a3e86fbd2a884a733a64fed84836912e0c
SHA5129c9d7a5e6cf4d76a79870b62a37984783c0ec174b7f2e4557154cd0632d6e2ee7943d9ecc6149eb09277ee1dff4d8eb2692ce60934d69eae97f80451344dc5d6
-
Filesize
900KB
MD55ce51bebf5df5616c0afad430b705cda
SHA197b05e3b842ea60a341e600c12110092a27240cc
SHA25665177fb5a41a621039697bb1c2559cfb544bead0f3a91722008f425fbe89e261
SHA512c141267589f896649c97dae327c98e2abfc5de85c06917a00062acc7bb4e42da94085ea1f6b70f6c8dba4ef1725ae9bf0b64747792f80c824d99eef1f23e7ee8
-
Filesize
2.6MB
MD5bea1589178b4eda7c5b15d47b076f6bd
SHA181a654fe6ca77c26d0c87d9f8fe1786c4ee4582d
SHA256336b2204ee1f34c545ac54145a9db9f548ee478708fe1bc22c679fb037063068
SHA512d8ed0c2b19b94aeb4aed0d2e7525cb3eb8289b9da0d4df8c1b24340060976233af90861fca9ecf259c7cbe40775d1f8fa6ff814bdc542abd9381497ee60d9d98
-
Filesize
1.9MB
MD56a38eeb44e27ba7e351f61180c34981e
SHA14cf5edee9dbee85ab291bfc6afe35f7d55c4b4f6
SHA256f65b4f0e91b04fc62e4d6cd10d6b1ec53b29b955496c6e005b9443101d1f1262
SHA512436d38e455d95687636966bdb7fe4b30963a57401425c02b94152400920b9c030a1f3173e5975dd04c21a45a280cc13cf242281f86ab5a58a7a9067dec4b43ca
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\AlternateServices.bin
Filesize8KB
MD50f940f4837296dff3994e7515f38564f
SHA184588238e4730ba3ad7e96695a9702be153a7c2e
SHA2561def37675f8193bf9fbe9b391dcd1a40f518b97b62880b6c8083302a7b6db897
SHA51236966bd8869e37d543aad0a1fe1acb536ece44350babe017ee5f240cefeb86799796f45cbec719806d44e4a5f3bb4e60a5db4c3a28407d6bc335943ed0a9bbf7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD512e26db0bf7f4e5eee4ee93bf9de46de
SHA1598ec0137c6ab952c620a2819516cae709beccc5
SHA25631b104c7e8ab2438774c1d29d928653f2d0831c717645d976eb9610ac3a02444
SHA512317e0f44c85dc58752a479269b27fecb94d494a938d1637af57ab938b6c9415101ae906737fe5b66c0843262b73432e88befde7b3dfd295dae2f361a19f994dc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5bdac787198976c0f82f42b96195b1abe
SHA1f2f92fc6977405d87c14e2a03e2a6298cb7efd56
SHA2568edbdf9575fc17cb0ff9bc007156fad4b1ba6603ddef1f1e8c0f9d97bf804874
SHA512d59dc3933b6f0545b1dbb2cfcd23258c11465e6263cf798fa6e0fa5519cb46827cda24e0390053d276ea35be0d3ea84f51de88df66bd5f944d0acaa07f46d3c3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD54361ec8289b76dd63d1677c46f8018e2
SHA19e567669adfaa0b8f6f5d48aba07d5f9736c4014
SHA2562ce1a303bbf44b66d364da70fc3a7531614e977934469bc3c85b2ab349a3ba5d
SHA51264f066fbbfe78291664e8ca319d6b5cd66a8d865ff13fbcdb74896a0ee970c2656d30147ea74a991c0dbb6ab0998301b86024df0d060c441e1ef5df55c346b72
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5bf3067776b9af3003f63844271ea73ea
SHA15f3c4c16063cea9e03919b701bd6c578d796b729
SHA2562ec81c1cca2e5cc96b9539b2c533b28ed389dc14732b4175136c3a95508a6852
SHA5122836e1f76d48d65928ee575b0603e00c2d40cdd387d681d91cda9f617fb11fd7c1cd3fbe671902d5c5424154eceb98884a758e6a48b07fae03f1eaa997bfb6de
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\70217262-faba-41e3-b587-faf28dd84ac3
Filesize982B
MD580834266ebc2f9f68f330e5b107f00a6
SHA1eb964b763ad4ff2b87f07dd0d53cab4d0286f752
SHA2561cf90ef8089c70c8e2daad4f30b2e13d7b0054430267698900e8ab27871ceeb7
SHA512e8408379a4be64912613326990bee8902ca11e8c348a9c001811b8a9a7522840dde5e61455d7060c1a33cc0d7675214bc4bd75f7f0cbca33f858e75bbc1ceed7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\93ba7223-df4c-402e-baa2-40f8f7919e25
Filesize25KB
MD557c527a91b13f946a0eab2182366239e
SHA1bc466a483845d51ba42ed55c5887f53c128b6be6
SHA25608479d71846c27e95de02f71295c58aa5e240b455bfe31978fd67feeddd51a17
SHA5123499775123d1302bcae1877b423bb9b3d9aedce0e19928851d314ccac6b689e9946929050aab53128c18156a1e1052ffa1031503c06a9bdafd2589d720dd7bcb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\f33cd5a9-3a0c-4311-bcbd-929707ac4f9c
Filesize671B
MD5cb69031be1d139c117e7e54b1bc2b566
SHA1ee8dca97a9e521ab7555e6d6f0bb7ca91778ba1d
SHA2569e4a09b3b0b4ce083f2bb59a81f5b5946b4cca74b96ff0e85ed8739ecc541600
SHA5122fab8dac15b4ca6b228df8f1b0cebc5ed035607799bba310fc09328ba0985338346253f53c2f0287fde73a9bb5ee696ce926cd64f901eddf05c560141d767c43
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD53618ec759a31989b85e710ce000bce4e
SHA1bf9909c8a87bd62152c37f9630fc380f8c5e5228
SHA2567ec17eb9e91ab15d25142ac302d7784b2c1ef7f195cfb301284df1562edcde10
SHA512d1a4840cd3f1c5401aae3f64207ba3cb0006eb53202b8ef68256090a0a05d242412caddefc8f9df28059518c45be02444146cb57e2924b1f510287f7367d0474
-
Filesize
15KB
MD58ee04361ce588fbeb37761b045517482
SHA1390101cea767e53d7a0665168619abf9abc94da3
SHA25644032aa8a2863d47a394a886a2a7e7de2ee61a91b55eb957df308ff19d7d7ce5
SHA51261d343d9db169f51ac02dc9379f4c501c99c30e34c077ba163e631a39330a614e4441f1bde88a08303eb712f3ab62cfbf228c987b7531c75ab8002b5f48d5693
-
Filesize
10KB
MD51765943137b885614bd2b838dca27158
SHA172c4afe2cdee6ae53aae6805bdeb32cf20c6f356
SHA2565f729296596d60a2788751487519b3e4307742fc38dfb4b843f7a0d4500ffe17
SHA5120ce318bbe2ffeb751cfc8cf35d05e15bcdbb8674a7d0749011a4c9261c9f4a7d12008cd33dd7e9a7e79220c140ce947ae2ddb4ef91f3de3275a58ce979977ad3
-
Filesize
11KB
MD59194ec04cfeb1a7afe9b8b770be7cbc2
SHA1a4d68758468cbd7e85f4a6ab32efea18b2a4ac19
SHA256106c2b12c68c16d3e8b9dad6af503832e07b3fa6570fc1fb414afdd6c79ad20f
SHA5124011c802151b77faf7a0f9028d804e861941d9ad7b89b62c8a66b7f3a49ded3abd63aaaeefdae2fac6e5260d9b83cbe102a839b244e5ff3da086e6b47ddec6bd
-
Filesize
11KB
MD598364c0f32b6f9a4add6ebd41a8601fe
SHA1440d34eaf3bf51de264079ba01f46a9cc3a7288f
SHA2567c1783192a16a4e12162d25cb5f3e50af0b5e1d77a5b859639137aea769dda78
SHA512e7c0b22ae04ed953a2a1405e1c233772f6324106e811a970d8c15c268de1f79551893cdf12749d85f9763c565b2725a22e88f062ef856c2d177727cbdad79239