Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2024 16:36
Static task
static1
General
-
Target
aa4753390d564107863357e270663385174e66c1d75c24aa211fedfef4ef06fa.exe
-
Size
7.0MB
-
MD5
3a41c8a33484f96bc90e2cb48e991b2a
-
SHA1
b54959b4847473baa24620ab2e0dbdc2f0062118
-
SHA256
aa4753390d564107863357e270663385174e66c1d75c24aa211fedfef4ef06fa
-
SHA512
6474a44b0025fdda52c188a8d24b04fcf057356a8551a79aa282807f446e0f97761ea3b87f4654ee6b33ebc58bdbe7190656091593755ecafd0e318be5b5093b
-
SSDEEP
196608:/jofebKHGP/rZGuIWy1hs2RF+4EL4l3Qee:/jofeZP/rZQIY1E8lAZ
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4c900k.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 059608bb77.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 059608bb77.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 059608bb77.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4c900k.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4c900k.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4c900k.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4c900k.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4c900k.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 059608bb77.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 059608bb77.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3h52S.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1U32L7.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2l6357.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4c900k.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0f31b182cf.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 53157ba1e0.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 059608bb77.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 20 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 059608bb77.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1U32L7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2l6357.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3h52S.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4c900k.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4c900k.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 53157ba1e0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1U32L7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2l6357.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3h52S.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0f31b182cf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0f31b182cf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 53157ba1e0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 059608bb77.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 1U32L7.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 13 IoCs
pid Process 4840 x2C66.exe 1736 d4L83.exe 2276 1U32L7.exe 548 skotes.exe 2636 2l6357.exe 4368 3h52S.exe 5040 4c900k.exe 5096 0f31b182cf.exe 4400 53157ba1e0.exe 1372 5da7961cdd.exe 2700 059608bb77.exe 6128 skotes.exe 5208 skotes.exe -
Identifies Wine through registry keys 2 TTPs 10 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 1U32L7.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 2l6357.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 3h52S.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 4c900k.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 0f31b182cf.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 059608bb77.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 53157ba1e0.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4c900k.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4c900k.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 059608bb77.exe -
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\53157ba1e0.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009075001\\53157ba1e0.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5da7961cdd.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009076001\\5da7961cdd.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\059608bb77.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009077001\\059608bb77.exe" skotes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" aa4753390d564107863357e270663385174e66c1d75c24aa211fedfef4ef06fa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x2C66.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" d4L83.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\0f31b182cf.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009074001\\0f31b182cf.exe" skotes.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000b000000023b80-97.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
pid Process 2276 1U32L7.exe 548 skotes.exe 2636 2l6357.exe 4368 3h52S.exe 5040 4c900k.exe 5096 0f31b182cf.exe 4400 53157ba1e0.exe 2700 059608bb77.exe 6128 skotes.exe 5208 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1U32L7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 17 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1U32L7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2l6357.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3h52S.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aa4753390d564107863357e270663385174e66c1d75c24aa211fedfef4ef06fa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d4L83.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4c900k.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0f31b182cf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 059608bb77.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language x2C66.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 53157ba1e0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5da7961cdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 4424 taskkill.exe 4532 taskkill.exe 2952 taskkill.exe 3156 taskkill.exe 4528 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 2276 1U32L7.exe 2276 1U32L7.exe 548 skotes.exe 548 skotes.exe 2636 2l6357.exe 2636 2l6357.exe 4368 3h52S.exe 4368 3h52S.exe 5040 4c900k.exe 5040 4c900k.exe 5040 4c900k.exe 5040 4c900k.exe 5096 0f31b182cf.exe 5096 0f31b182cf.exe 4400 53157ba1e0.exe 4400 53157ba1e0.exe 1372 5da7961cdd.exe 1372 5da7961cdd.exe 1372 5da7961cdd.exe 1372 5da7961cdd.exe 2700 059608bb77.exe 2700 059608bb77.exe 2700 059608bb77.exe 2700 059608bb77.exe 2700 059608bb77.exe 6128 skotes.exe 6128 skotes.exe 5208 skotes.exe 5208 skotes.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 5040 4c900k.exe Token: SeDebugPrivilege 4532 taskkill.exe Token: SeDebugPrivilege 2952 taskkill.exe Token: SeDebugPrivilege 3156 taskkill.exe Token: SeDebugPrivilege 4528 taskkill.exe Token: SeDebugPrivilege 4424 taskkill.exe Token: SeDebugPrivilege 4460 firefox.exe Token: SeDebugPrivilege 4460 firefox.exe Token: SeDebugPrivilege 2700 059608bb77.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 2276 1U32L7.exe 1372 5da7961cdd.exe 1372 5da7961cdd.exe 1372 5da7961cdd.exe 1372 5da7961cdd.exe 1372 5da7961cdd.exe 1372 5da7961cdd.exe 1372 5da7961cdd.exe 4460 firefox.exe 4460 firefox.exe 4460 firefox.exe 4460 firefox.exe 4460 firefox.exe 4460 firefox.exe 4460 firefox.exe 4460 firefox.exe 4460 firefox.exe 4460 firefox.exe 4460 firefox.exe 4460 firefox.exe 4460 firefox.exe 4460 firefox.exe 4460 firefox.exe 4460 firefox.exe 4460 firefox.exe 4460 firefox.exe 4460 firefox.exe 4460 firefox.exe 4460 firefox.exe 1372 5da7961cdd.exe 1372 5da7961cdd.exe 1372 5da7961cdd.exe 1372 5da7961cdd.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 1372 5da7961cdd.exe 1372 5da7961cdd.exe 1372 5da7961cdd.exe 1372 5da7961cdd.exe 1372 5da7961cdd.exe 1372 5da7961cdd.exe 1372 5da7961cdd.exe 4460 firefox.exe 4460 firefox.exe 4460 firefox.exe 4460 firefox.exe 4460 firefox.exe 4460 firefox.exe 4460 firefox.exe 4460 firefox.exe 4460 firefox.exe 4460 firefox.exe 4460 firefox.exe 4460 firefox.exe 4460 firefox.exe 4460 firefox.exe 4460 firefox.exe 4460 firefox.exe 4460 firefox.exe 4460 firefox.exe 4460 firefox.exe 4460 firefox.exe 1372 5da7961cdd.exe 1372 5da7961cdd.exe 1372 5da7961cdd.exe 1372 5da7961cdd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4460 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5076 wrote to memory of 4840 5076 aa4753390d564107863357e270663385174e66c1d75c24aa211fedfef4ef06fa.exe 83 PID 5076 wrote to memory of 4840 5076 aa4753390d564107863357e270663385174e66c1d75c24aa211fedfef4ef06fa.exe 83 PID 5076 wrote to memory of 4840 5076 aa4753390d564107863357e270663385174e66c1d75c24aa211fedfef4ef06fa.exe 83 PID 4840 wrote to memory of 1736 4840 x2C66.exe 84 PID 4840 wrote to memory of 1736 4840 x2C66.exe 84 PID 4840 wrote to memory of 1736 4840 x2C66.exe 84 PID 1736 wrote to memory of 2276 1736 d4L83.exe 85 PID 1736 wrote to memory of 2276 1736 d4L83.exe 85 PID 1736 wrote to memory of 2276 1736 d4L83.exe 85 PID 2276 wrote to memory of 548 2276 1U32L7.exe 86 PID 2276 wrote to memory of 548 2276 1U32L7.exe 86 PID 2276 wrote to memory of 548 2276 1U32L7.exe 86 PID 1736 wrote to memory of 2636 1736 d4L83.exe 87 PID 1736 wrote to memory of 2636 1736 d4L83.exe 87 PID 1736 wrote to memory of 2636 1736 d4L83.exe 87 PID 4840 wrote to memory of 4368 4840 x2C66.exe 95 PID 4840 wrote to memory of 4368 4840 x2C66.exe 95 PID 4840 wrote to memory of 4368 4840 x2C66.exe 95 PID 5076 wrote to memory of 5040 5076 aa4753390d564107863357e270663385174e66c1d75c24aa211fedfef4ef06fa.exe 96 PID 5076 wrote to memory of 5040 5076 aa4753390d564107863357e270663385174e66c1d75c24aa211fedfef4ef06fa.exe 96 PID 5076 wrote to memory of 5040 5076 aa4753390d564107863357e270663385174e66c1d75c24aa211fedfef4ef06fa.exe 96 PID 548 wrote to memory of 5096 548 skotes.exe 101 PID 548 wrote to memory of 5096 548 skotes.exe 101 PID 548 wrote to memory of 5096 548 skotes.exe 101 PID 548 wrote to memory of 4400 548 skotes.exe 103 PID 548 wrote to memory of 4400 548 skotes.exe 103 PID 548 wrote to memory of 4400 548 skotes.exe 103 PID 548 wrote to memory of 1372 548 skotes.exe 106 PID 548 wrote to memory of 1372 548 skotes.exe 106 PID 548 wrote to memory of 1372 548 skotes.exe 106 PID 1372 wrote to memory of 4532 1372 5da7961cdd.exe 107 PID 1372 wrote to memory of 4532 1372 5da7961cdd.exe 107 PID 1372 wrote to memory of 4532 1372 5da7961cdd.exe 107 PID 1372 wrote to memory of 2952 1372 5da7961cdd.exe 109 PID 1372 wrote to memory of 2952 1372 5da7961cdd.exe 109 PID 1372 wrote to memory of 2952 1372 5da7961cdd.exe 109 PID 1372 wrote to memory of 3156 1372 5da7961cdd.exe 111 PID 1372 wrote to memory of 3156 1372 5da7961cdd.exe 111 PID 1372 wrote to memory of 3156 1372 5da7961cdd.exe 111 PID 1372 wrote to memory of 4528 1372 5da7961cdd.exe 113 PID 1372 wrote to memory of 4528 1372 5da7961cdd.exe 113 PID 1372 wrote to memory of 4528 1372 5da7961cdd.exe 113 PID 1372 wrote to memory of 4424 1372 5da7961cdd.exe 115 PID 1372 wrote to memory of 4424 1372 5da7961cdd.exe 115 PID 1372 wrote to memory of 4424 1372 5da7961cdd.exe 115 PID 1372 wrote to memory of 3260 1372 5da7961cdd.exe 117 PID 1372 wrote to memory of 3260 1372 5da7961cdd.exe 117 PID 3260 wrote to memory of 4460 3260 firefox.exe 118 PID 3260 wrote to memory of 4460 3260 firefox.exe 118 PID 3260 wrote to memory of 4460 3260 firefox.exe 118 PID 3260 wrote to memory of 4460 3260 firefox.exe 118 PID 3260 wrote to memory of 4460 3260 firefox.exe 118 PID 3260 wrote to memory of 4460 3260 firefox.exe 118 PID 3260 wrote to memory of 4460 3260 firefox.exe 118 PID 3260 wrote to memory of 4460 3260 firefox.exe 118 PID 3260 wrote to memory of 4460 3260 firefox.exe 118 PID 3260 wrote to memory of 4460 3260 firefox.exe 118 PID 3260 wrote to memory of 4460 3260 firefox.exe 118 PID 4460 wrote to memory of 116 4460 firefox.exe 119 PID 4460 wrote to memory of 116 4460 firefox.exe 119 PID 4460 wrote to memory of 116 4460 firefox.exe 119 PID 4460 wrote to memory of 116 4460 firefox.exe 119 PID 4460 wrote to memory of 116 4460 firefox.exe 119 PID 4460 wrote to memory of 116 4460 firefox.exe 119 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa4753390d564107863357e270663385174e66c1d75c24aa211fedfef4ef06fa.exe"C:\Users\Admin\AppData\Local\Temp\aa4753390d564107863357e270663385174e66c1d75c24aa211fedfef4ef06fa.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2C66.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2C66.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d4L83.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d4L83.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1U32L7.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1U32L7.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Users\Admin\AppData\Local\Temp\1009074001\0f31b182cf.exe"C:\Users\Admin\AppData\Local\Temp\1009074001\0f31b182cf.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5096
-
-
C:\Users\Admin\AppData\Local\Temp\1009075001\53157ba1e0.exe"C:\Users\Admin\AppData\Local\Temp\1009075001\53157ba1e0.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4400
-
-
C:\Users\Admin\AppData\Local\Temp\1009076001\5da7961cdd.exe"C:\Users\Admin\AppData\Local\Temp\1009076001\5da7961cdd.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4532
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2952
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3156
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4528
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4424
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2076 -parentBuildID 20240401114208 -prefsHandle 2000 -prefMapHandle 1992 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {74343252-261b-4b68-8014-790eb53140b7} 4460 "\\.\pipe\gecko-crash-server-pipe.4460" gpu9⤵PID:116
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2508 -parentBuildID 20240401114208 -prefsHandle 2500 -prefMapHandle 2496 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e03be6a4-bd27-48db-897b-3a5070af6182} 4460 "\\.\pipe\gecko-crash-server-pipe.4460" socket9⤵PID:1496
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2944 -childID 1 -isForBrowser -prefsHandle 3116 -prefMapHandle 3372 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {44a89912-6e90-4d53-8228-f4557c72ad34} 4460 "\\.\pipe\gecko-crash-server-pipe.4460" tab9⤵PID:1104
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3936 -childID 2 -isForBrowser -prefsHandle 3940 -prefMapHandle 3196 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8b5bd93c-ce50-4199-b638-454b8dd07dfa} 4460 "\\.\pipe\gecko-crash-server-pipe.4460" tab9⤵PID:756
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3196 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4700 -prefMapHandle 4588 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d679b6ff-f310-48f7-b4e9-d3dbdb3a57a3} 4460 "\\.\pipe\gecko-crash-server-pipe.4460" utility9⤵
- Checks processor information in registry
PID:6168
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5648 -childID 3 -isForBrowser -prefsHandle 5504 -prefMapHandle 5500 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f21c0a86-b482-4246-97d1-e4b1bf3a7172} 4460 "\\.\pipe\gecko-crash-server-pipe.4460" tab9⤵PID:2188
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5904 -childID 4 -isForBrowser -prefsHandle 5896 -prefMapHandle 5892 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0b94d168-83f0-4276-904d-fed122e63690} 4460 "\\.\pipe\gecko-crash-server-pipe.4460" tab9⤵PID:4220
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5808 -childID 5 -isForBrowser -prefsHandle 6040 -prefMapHandle 6044 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3f41f3d1-3f75-4dd8-b46d-e95af4e44783} 4460 "\\.\pipe\gecko-crash-server-pipe.4460" tab9⤵PID:2860
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009077001\059608bb77.exe"C:\Users\Admin\AppData\Local\Temp\1009077001\059608bb77.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2700
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2l6357.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2l6357.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2636
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3h52S.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3h52S.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4368
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4c900k.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4c900k.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5040
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6128
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5208
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\activity-stream.discovery_stream.json
Filesize19KB
MD567eb1056cd8f4f6df600fa2c0b7a60ad
SHA1a532fae69fb71837ba4c6cc7697a6d5df216f102
SHA2563db2fafacaa5588925c3228609d51253aadea76f73e0addf035d211efa2de7f1
SHA5129f61c692557dd2fc4cb2a83cde7ccd3696c4195f831e43b24323ec7ec773dac8289aedd63ad0b1f90d0cfb0daf5b5f370ffa7359d4d20e8f45315f479939533c
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD529bf47d2221126eff57770646e3d9cff
SHA13f054cf33dd269dcafaed710e690b1833c2cf5b5
SHA2569c7ba2584368a349423c2d91bbf1f0560675cf797f58480936f74038f34e119a
SHA512edbcf9dd22198777e7a5f03214c94db142069bb9ed9b816baa15da459b78e848706da021b29c87302c3fe122ff53b58f162e871e84678d521c83da3b036ab483
-
Filesize
901KB
MD57708ca287b5703fd3e733e3abb32c5f5
SHA1bf349adc93f015eae3053e5cb6f69ae287334931
SHA25619ce538d200b7d328f4615475ffa78d2ebb9c5fa8d7f49bc5f5b1a605cf28f45
SHA512e62ae32a27b2e60e3b391f98a4fc1c4bd63b891d42ff64ea16ac3abdd883c88154ed42f4adad5bc1fae1b6f9b84b2713b31cd5eb9fa955eea642e5ee0de638aa
-
Filesize
2.7MB
MD5004ab6e9671359a4b40cefac032cb778
SHA1493eb400d94aae837fcf4a29d76d388d0411e007
SHA25651a6dc406c24cccdcff7f8ed9d38940007bfab29560198805350142b9945cb6d
SHA512e99be2fd72c751a3e990ba52f172f99f3ef83d455f4e93d2a5f8f6720414c606ba032f2b4221ddf121bcfdbe2e46ebe9f53aad7f8d9c1b3afd7659dce9cb6d2c
-
Filesize
5.4MB
MD5a5cfb2c12218b3e50f3f673de458cce1
SHA15131f99518cdf42160a3f564d3902e93b1cf2b1d
SHA2560cf41e5242876a90a8abf49497e591ce7e5bc17308509cfd5faba0bc42b4344a
SHA51213754494bfe1820c39e29fbf87658fcf853f5b3de1569ea8c5e49a6a0f5f18583144cef527e26820973be90bb87ae9cac77053f15b7c4d66bdaf5f7680eb7067
-
Filesize
1.7MB
MD53456608218e19c82196acb63550eac9f
SHA18aac0299aba455e064b65b2ea03e7b7709e26afd
SHA256198e241277eeabe643ccbe84f7c384b5a4f4e276fac38340dc29618ed1dd012a
SHA512307cd22f54ab49ee078a12f290dd32c7260f7abd6cfcf0385c086423ea8e4f71b56712de26850c53e8c721eb033a8b54198322e0f1b5db2191315858d6db0d72
-
Filesize
3.6MB
MD5d6f949b8d4fb0708ac1ddeef0a4bfd6f
SHA1451193e2abaf095834e36adeb46e39548399adee
SHA256e3f69f318470eda80a02d28d3099147a5f537341afadc1a5720288c7c5519028
SHA512d6e818d94d0f3dff6cf3f99c0a46ee6cbe42c8bbfff869d758a3c5a713134682de5f468a43d03e1528e5c90be731c7775f76e60953d1945cd9e9cbd3b855b65b
-
Filesize
1.8MB
MD545ad1540f6f9792ba5bb88e00358ce0c
SHA1317409f6f729e31e9f74633c78526d908f2b8760
SHA2568c0b95971d30bd0f553ef53c17b6e1569a7959c6ae4c00fdbdcf37146506890a
SHA512c025e5b6e9f97f90d6e29a863fff761bc17d44ccdae4c54f7eb7ff6a22fec135de427228b70ad2f80f80e7efe66537e1eb09fd6c9854f4361d166e6d2af8aadd
-
Filesize
1.7MB
MD5ad8c2e682a2304872d34b870c7838533
SHA1270385c022377e941abc235009da0e6e4e9dfb7b
SHA25681bf308c76d66c3c8d93f5202ff2211f2aad1442b9c64b1eb40aef60685b78ba
SHA512078df8229a19289b782e715531812dceb83a4515c644849fc6e5efbb5aa2e0d34569065646ebc14ed847a52ce1b12f7e2d5a061dec39bf03d8fab346a4a5fb02
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin
Filesize8KB
MD53dc986ac66c9377d55ed31c93e7bcfa3
SHA1f2c64003d53bd1b086d21e7e6ecabe95c7e8231e
SHA2569bd4fc9c5c879ac61e77b3c9c3c14c730b80f8e1bc78d13cfe3b739435a835e4
SHA5122a19816f494fffa66049cb8fc145ffd351d945177e3d68484e13a9e0edbb83f08a20bb23797069ec44ef2b4ac5e39f10d0dc770f2588a3a5ef08327b42dcfce1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin
Filesize13KB
MD58fc1184296d0f05c1f80ee3d19bc43b1
SHA119376979968929fa65f0028681449fa4d1cd1cf4
SHA256ef30ae98af8423915a9e884a251697af9bd73ecd4f0ed4dfe279e58bc21716b4
SHA512c7f803c1baa69b1a90f206fed7837eb8dbbd0f2bb0d3f32b9da2b9cf331bc6541a3e38fac64be86039a2407bbc169ac9bf40d4aeba5ef93fb6a7ce068e0a9a99
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.bin
Filesize14KB
MD524863b3fc86bb2c3a30af49b9c1a269b
SHA171ba3aad6387baac8233eaa74eb353dde1e0c121
SHA256238505b80f1dff5081921c023f202c2f8234d1bafbd4b696f3bbe4b0ca688f90
SHA5120d994d846060d1a12a4e6b3ee45eef681365eb97bb456580a258ee30c07fbaaa0740169763ede1c8fc5a753df0a185f7f8fd75b30828dee5216be598424062cc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.bin
Filesize23KB
MD599e8ded5131e7a88d5ac4f80ffd4ae4b
SHA1fb5b37e73a1ebf124d68b86eb71eb7b93c863397
SHA25670bf2a4a7142debb041a00ec29f995bb60a0b53b61e22ef1003ddc9d7c618872
SHA5129f2e71c7bb33a9fe2769c04db2fec85d648b86e081091e3bc2ada12cefa8dc298967898e53f6634bd50beac3beacf86761d40b01c5e52c5a252bddabf785d3c2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.bin
Filesize15KB
MD5f5779100ceee587e8cf04c028803e15a
SHA191809fe252e73532bb3f811c08b1fec88ae9da1b
SHA25613c1d916e1ee17ba0ef3a31c514462dee189b10bb52be25bf2e76ede8e0d6e9e
SHA512572cf76d2c0b62af303c4407a1ee1ed7f77b340d22efb90d36a52a0cbece898947c0fea3b7c4699a923b18ef68670ff49b43f665e36bf893ca7db7b7411bdeac
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.bin
Filesize5KB
MD52824ac07b002bf4ea001cd9ecbdc2790
SHA1601a0e378e89eb74d10ffac17d376e51bb0f6de1
SHA256e0d9b486ee85765ad48e872e91cc6120033951bbf516fa01ea3b860df91be3f2
SHA512cf3b96545b2308deacfe0a35100bfb4e63de6f4a5144140c34b15f7d3e782e6ed696cd0d8d7ddf84aca00ad99417542e0702c47fb9c3486e1e64c2919bdb7324
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5253cabda586df4089beb88cff6fa2cd6
SHA11d3529c4112baa6de3c58146dd90dd550f71078f
SHA25617035a78c0a1be0b1d0a586936fd1f67fa3b5d9f7a3d3ed2ab1db589d438f418
SHA5129a78d1ecd3f42fb3ff2d2827207b5eea1346d2d61ab9fe80bc2dc3968bfbb67362abaf411e6f71c89ce65f71cc0d970d474a7582134218a092d27f2ea85555dc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5e3b0f298d0d2e94a89d2dfa8eb2bb1cf
SHA18530b678942ac5330cb9b74306c12e6db848718b
SHA2560783c517d4f2333a0c85b2af09437d7eb6bfdaf26d8b941908546485628b1ec7
SHA512c70099c3091b7985652593222ebe6214e2426828d3b81264046ae59680ec213834fa26faf1f1fdd207cf6e2f874b42aca92804cc546cd9360957945819368c3a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5bce1f6eb4e13fa95b5d640a9fd48621f
SHA16aebd12c9ad56a3fa398ec41e3e19f20923f3e4e
SHA256a65723aa4500e8d867eeeb334de42076cb7415e6d9b8f302512ede4546b805a0
SHA51203a8a1cc1beaec0f65980f2d2a9fbaf2c4ab4bd30d89156f35fd1a8f0374ddee41a807618fd895a87914d6199aa2b35be7262b9ed34c3b2a85910b171fccbdef
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD57187f8ce205cd9ed34ea0981dd272efc
SHA15efee37caa67d5d72e0ab3492505dc801770a526
SHA256e54181a4fcaffa86f6e4ec3c933142779965dba5cf682823f703f5d2cc9f987a
SHA512e2aa629f8d196af485896f6e6270749489caf97c3c45a576631a6a47d65d959ce5ac27a616eb0fad55c329d938f36e11963f62fac011e9c41c4ea836d5ca6ecf
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\0a2dcd4a-40c9-4735-bc48-2681f43afecd
Filesize25KB
MD5e5ee019d0f5c666e99fbfe4024980462
SHA1404227640b37632a4adfec30feded6dbe1e617c4
SHA2561ac9776178c6c7d9c1bf96ff7f4a55aa4b1e92ff761e4fee0bebd7fd9bbc201d
SHA51206b8cb3968d63a27001e1ba1d926e9eed7bc15d0d4f20d6b7373b3fbb53545e41f5173b8def7c073fffbe7b52b2a6c9794b5bc66fc697b28e4ed0f9235601b29
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\87623de8-930c-45a0-a245-4458ba1b890b
Filesize982B
MD55153c34058592aacfc4a5391485cd90c
SHA1532ef1f1dfc430f4f5b9bfaf1b8a5d8fe0a45961
SHA2565c493ef05382d85acf0c1a05f656b2ac3c87b15634344d15cf8e699747fdbacc
SHA5129a507c681334c53bbd9fa59825d24d37bcffa32bc22c6689d5ea9fd70896d041cdaf820880814e4da2e587dcbc99bc1bb7a8432af09015f598ed9411a4046b53
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\9c3c8e04-3d32-44b8-bb79-7b67f596e149
Filesize671B
MD53ba8993918aaabfe7473569ee807417d
SHA180d5147c7abbd6626d095ca475ef889b877bf0d0
SHA25602cdd939b196cc0ca4afdef3fd5cbdef7b4a8334dedb6b9f11a8194e0f13ff57
SHA51241f705cbc0bea3aae26de87084021234c464c9b31ca1591462179bf535e7e85aa544e9e8f97c3235907ccbee2e4eb61f2ab835b77dcc2c6a16f3fd3503bdc8c4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
11KB
MD53d6649f8e9109b4b939e0069273fb7ba
SHA1acd7f30a0eea8f911b2e94aa6d22e0f93937e7a1
SHA256e14109038e4b395218b518546a8af09cdb4be7ba9f901600424c88fadffb39c1
SHA512fb18125f03deb6dffc1a3829d42d1f9b0505a421e9f67cec120e734efe049605d10ddea98d394bb9e548e80aece925891eb245c78da62200260198e35c4909b0
-
Filesize
15KB
MD5e56203c15514ad153bbf878f210b325d
SHA1e06f643319e5cd19dda2e647e77afdeca0ed889b
SHA2565ef5ae8cfd6453cdb6fb8c93197f632dd7bdffcbb3eb673f232606fc9ec70dea
SHA5126a3d9facf091e8a5d0202009993d9665b9a3881a56ba405eb939d8acfd8cf6901d942351cfbec8b8bcccecc843e7f1e23885dc172b504098660d906f62f36aa5
-
Filesize
10KB
MD5be8182e88e27aaa0a72af10cccf5e414
SHA1db07cc16c23d8650f7642e41958a07600dd9e525
SHA2560ac500c5b2d9e5b38d2e4c49ddabad909e4c090980e4e4b4358f01243b8b8b36
SHA512e21f03ab4df758cb5be07a71c9657ea8aefadb323a14dff0d15e70422307968e35a4d19106c9935ab0fd2a9f42e9f51b5137da8b9b7219022d4bafae6eb72cad