Analysis
-
max time kernel
149s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2024, 22:11
Static task
static1
Behavioral task
behavioral1
Sample
32b754ed2258a0a657ba352db08cb3c9d657836018fd7a3d3f6226ac602d8672.exe
Resource
win7-20241023-en
General
-
Target
32b754ed2258a0a657ba352db08cb3c9d657836018fd7a3d3f6226ac602d8672.exe
-
Size
1.9MB
-
MD5
0afca9260a5cca722153d2af2e383849
-
SHA1
40b92c82d01c374478523af6f100b31df8485dc3
-
SHA256
32b754ed2258a0a657ba352db08cb3c9d657836018fd7a3d3f6226ac602d8672
-
SHA512
e103596e06a55301aba6f3440323ffe242be2b3e9fec2c3559aeeb21e9399a6dd69c63c943fb9e316ea4dab1ddcdda2d3814551c240da7c878a1be7cd3fcff40
-
SSDEEP
49152:dB6Ol4Igl0dtI5kPpAaCyq9fgOU505HU9SD4C2uaylw1CvMePaP:T6mL7fMFU5IoS8C+f1Ua
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://preside-comforter.sbs
https://savvy-steereo.sbs
https://copper-replace.sbs
https://record-envyp.sbs
https://slam-whipp.sbs
https://wrench-creter.sbs
https://looky-marked.sbs
https://plastic-mitten.sbs
https://hallowed-noisy.sbs
Extracted
lumma
https://hallowed-noisy.sbs/api
https://plastic-mitten.sbs/api
https://looky-marked.sbs/api
https://wrench-creter.sbs/api
https://slam-whipp.sbs/api
https://record-envyp.sbs/api
https://copper-replace.sbs/api
https://savvy-steereo.sbs/api
https://preside-comforter.sbs/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 5912a10c87.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 5912a10c87.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 5912a10c87.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 5912a10c87.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 5912a10c87.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 5912a10c87.exe -
Stealc family
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF a321161c91.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 32b754ed2258a0a657ba352db08cb3c9d657836018fd7a3d3f6226ac602d8672.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a321161c91.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c31965955f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f3f8d9b7f0.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5912a10c87.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a2343c1170.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a321161c91.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5912a10c87.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5912a10c87.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 32b754ed2258a0a657ba352db08cb3c9d657836018fd7a3d3f6226ac602d8672.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a321161c91.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a2343c1170.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f3f8d9b7f0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c31965955f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a2343c1170.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f3f8d9b7f0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 32b754ed2258a0a657ba352db08cb3c9d657836018fd7a3d3f6226ac602d8672.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c31965955f.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 32b754ed2258a0a657ba352db08cb3c9d657836018fd7a3d3f6226ac602d8672.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 9 IoCs
pid Process 1208 skotes.exe 2476 a321161c91.exe 3520 c31965955f.exe 2036 a2343c1170.exe 4216 f3f8d9b7f0.exe 4620 cf5eb72659.exe 3572 skotes.exe 5336 5912a10c87.exe 1524 skotes.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine a321161c91.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine 32b754ed2258a0a657ba352db08cb3c9d657836018fd7a3d3f6226ac602d8672.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine c31965955f.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine a2343c1170.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine f3f8d9b7f0.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine 5912a10c87.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine skotes.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 5912a10c87.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 5912a10c87.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\a2343c1170.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009716001\\a2343c1170.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\f3f8d9b7f0.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009717001\\f3f8d9b7f0.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cf5eb72659.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009718001\\cf5eb72659.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5912a10c87.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009719001\\5912a10c87.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000a000000023b94-111.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 2416 32b754ed2258a0a657ba352db08cb3c9d657836018fd7a3d3f6226ac602d8672.exe 1208 skotes.exe 2476 a321161c91.exe 3520 c31965955f.exe 2036 a2343c1170.exe 4216 f3f8d9b7f0.exe 3572 skotes.exe 5336 5912a10c87.exe 1524 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 32b754ed2258a0a657ba352db08cb3c9d657836018fd7a3d3f6226ac602d8672.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5628 3520 WerFault.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a2343c1170.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f3f8d9b7f0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cf5eb72659.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5912a10c87.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 32b754ed2258a0a657ba352db08cb3c9d657836018fd7a3d3f6226ac602d8672.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a321161c91.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c31965955f.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 744 taskkill.exe 3532 taskkill.exe 3564 taskkill.exe 1804 taskkill.exe 2156 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 2416 32b754ed2258a0a657ba352db08cb3c9d657836018fd7a3d3f6226ac602d8672.exe 2416 32b754ed2258a0a657ba352db08cb3c9d657836018fd7a3d3f6226ac602d8672.exe 1208 skotes.exe 1208 skotes.exe 2476 a321161c91.exe 2476 a321161c91.exe 2476 a321161c91.exe 2476 a321161c91.exe 2476 a321161c91.exe 2476 a321161c91.exe 2476 a321161c91.exe 2476 a321161c91.exe 2476 a321161c91.exe 2476 a321161c91.exe 3520 c31965955f.exe 3520 c31965955f.exe 2036 a2343c1170.exe 2036 a2343c1170.exe 4216 f3f8d9b7f0.exe 4216 f3f8d9b7f0.exe 4620 cf5eb72659.exe 4620 cf5eb72659.exe 4620 cf5eb72659.exe 4620 cf5eb72659.exe 3572 skotes.exe 3572 skotes.exe 5336 5912a10c87.exe 5336 5912a10c87.exe 5336 5912a10c87.exe 5336 5912a10c87.exe 5336 5912a10c87.exe 1524 skotes.exe 1524 skotes.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 744 taskkill.exe Token: SeDebugPrivilege 3532 taskkill.exe Token: SeDebugPrivilege 3564 taskkill.exe Token: SeDebugPrivilege 1804 taskkill.exe Token: SeDebugPrivilege 2156 taskkill.exe Token: SeDebugPrivilege 836 firefox.exe Token: SeDebugPrivilege 836 firefox.exe Token: SeDebugPrivilege 5336 5912a10c87.exe Token: SeDebugPrivilege 836 firefox.exe Token: SeDebugPrivilege 836 firefox.exe Token: SeDebugPrivilege 836 firefox.exe -
Suspicious use of FindShellTrayWindow 32 IoCs
pid Process 2416 32b754ed2258a0a657ba352db08cb3c9d657836018fd7a3d3f6226ac602d8672.exe 4620 cf5eb72659.exe 4620 cf5eb72659.exe 4620 cf5eb72659.exe 4620 cf5eb72659.exe 4620 cf5eb72659.exe 4620 cf5eb72659.exe 836 firefox.exe 836 firefox.exe 836 firefox.exe 836 firefox.exe 836 firefox.exe 836 firefox.exe 836 firefox.exe 836 firefox.exe 836 firefox.exe 836 firefox.exe 836 firefox.exe 836 firefox.exe 836 firefox.exe 836 firefox.exe 836 firefox.exe 836 firefox.exe 836 firefox.exe 836 firefox.exe 836 firefox.exe 836 firefox.exe 836 firefox.exe 4620 cf5eb72659.exe 4620 cf5eb72659.exe 4620 cf5eb72659.exe 4620 cf5eb72659.exe -
Suspicious use of SendNotifyMessage 30 IoCs
pid Process 4620 cf5eb72659.exe 4620 cf5eb72659.exe 4620 cf5eb72659.exe 4620 cf5eb72659.exe 4620 cf5eb72659.exe 4620 cf5eb72659.exe 836 firefox.exe 836 firefox.exe 836 firefox.exe 836 firefox.exe 836 firefox.exe 836 firefox.exe 836 firefox.exe 836 firefox.exe 836 firefox.exe 836 firefox.exe 836 firefox.exe 836 firefox.exe 836 firefox.exe 836 firefox.exe 836 firefox.exe 836 firefox.exe 836 firefox.exe 836 firefox.exe 836 firefox.exe 836 firefox.exe 4620 cf5eb72659.exe 4620 cf5eb72659.exe 4620 cf5eb72659.exe 4620 cf5eb72659.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 836 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2416 wrote to memory of 1208 2416 32b754ed2258a0a657ba352db08cb3c9d657836018fd7a3d3f6226ac602d8672.exe 82 PID 2416 wrote to memory of 1208 2416 32b754ed2258a0a657ba352db08cb3c9d657836018fd7a3d3f6226ac602d8672.exe 82 PID 2416 wrote to memory of 1208 2416 32b754ed2258a0a657ba352db08cb3c9d657836018fd7a3d3f6226ac602d8672.exe 82 PID 1208 wrote to memory of 2476 1208 skotes.exe 87 PID 1208 wrote to memory of 2476 1208 skotes.exe 87 PID 1208 wrote to memory of 2476 1208 skotes.exe 87 PID 1208 wrote to memory of 3520 1208 skotes.exe 91 PID 1208 wrote to memory of 3520 1208 skotes.exe 91 PID 1208 wrote to memory of 3520 1208 skotes.exe 91 PID 1208 wrote to memory of 2036 1208 skotes.exe 92 PID 1208 wrote to memory of 2036 1208 skotes.exe 92 PID 1208 wrote to memory of 2036 1208 skotes.exe 92 PID 1208 wrote to memory of 4216 1208 skotes.exe 93 PID 1208 wrote to memory of 4216 1208 skotes.exe 93 PID 1208 wrote to memory of 4216 1208 skotes.exe 93 PID 1208 wrote to memory of 4620 1208 skotes.exe 94 PID 1208 wrote to memory of 4620 1208 skotes.exe 94 PID 1208 wrote to memory of 4620 1208 skotes.exe 94 PID 4620 wrote to memory of 744 4620 cf5eb72659.exe 95 PID 4620 wrote to memory of 744 4620 cf5eb72659.exe 95 PID 4620 wrote to memory of 744 4620 cf5eb72659.exe 95 PID 4620 wrote to memory of 3532 4620 cf5eb72659.exe 97 PID 4620 wrote to memory of 3532 4620 cf5eb72659.exe 97 PID 4620 wrote to memory of 3532 4620 cf5eb72659.exe 97 PID 4620 wrote to memory of 3564 4620 cf5eb72659.exe 99 PID 4620 wrote to memory of 3564 4620 cf5eb72659.exe 99 PID 4620 wrote to memory of 3564 4620 cf5eb72659.exe 99 PID 4620 wrote to memory of 1804 4620 cf5eb72659.exe 101 PID 4620 wrote to memory of 1804 4620 cf5eb72659.exe 101 PID 4620 wrote to memory of 1804 4620 cf5eb72659.exe 101 PID 4620 wrote to memory of 2156 4620 cf5eb72659.exe 103 PID 4620 wrote to memory of 2156 4620 cf5eb72659.exe 103 PID 4620 wrote to memory of 2156 4620 cf5eb72659.exe 103 PID 4620 wrote to memory of 740 4620 cf5eb72659.exe 105 PID 4620 wrote to memory of 740 4620 cf5eb72659.exe 105 PID 740 wrote to memory of 836 740 firefox.exe 106 PID 740 wrote to memory of 836 740 firefox.exe 106 PID 740 wrote to memory of 836 740 firefox.exe 106 PID 740 wrote to memory of 836 740 firefox.exe 106 PID 740 wrote to memory of 836 740 firefox.exe 106 PID 740 wrote to memory of 836 740 firefox.exe 106 PID 740 wrote to memory of 836 740 firefox.exe 106 PID 740 wrote to memory of 836 740 firefox.exe 106 PID 740 wrote to memory of 836 740 firefox.exe 106 PID 740 wrote to memory of 836 740 firefox.exe 106 PID 740 wrote to memory of 836 740 firefox.exe 106 PID 836 wrote to memory of 2168 836 firefox.exe 107 PID 836 wrote to memory of 2168 836 firefox.exe 107 PID 836 wrote to memory of 2168 836 firefox.exe 107 PID 836 wrote to memory of 2168 836 firefox.exe 107 PID 836 wrote to memory of 2168 836 firefox.exe 107 PID 836 wrote to memory of 2168 836 firefox.exe 107 PID 836 wrote to memory of 2168 836 firefox.exe 107 PID 836 wrote to memory of 2168 836 firefox.exe 107 PID 836 wrote to memory of 2168 836 firefox.exe 107 PID 836 wrote to memory of 2168 836 firefox.exe 107 PID 836 wrote to memory of 2168 836 firefox.exe 107 PID 836 wrote to memory of 2168 836 firefox.exe 107 PID 836 wrote to memory of 2168 836 firefox.exe 107 PID 836 wrote to memory of 2168 836 firefox.exe 107 PID 836 wrote to memory of 2168 836 firefox.exe 107 PID 836 wrote to memory of 2168 836 firefox.exe 107 PID 836 wrote to memory of 2168 836 firefox.exe 107 PID 836 wrote to memory of 2168 836 firefox.exe 107 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\32b754ed2258a0a657ba352db08cb3c9d657836018fd7a3d3f6226ac602d8672.exe"C:\Users\Admin\AppData\Local\Temp\32b754ed2258a0a657ba352db08cb3c9d657836018fd7a3d3f6226ac602d8672.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\1009714001\a321161c91.exe"C:\Users\Admin\AppData\Local\Temp\1009714001\a321161c91.exe"3⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2476
-
-
C:\Users\Admin\AppData\Local\Temp\1009715001\c31965955f.exe"C:\Users\Admin\AppData\Local\Temp\1009715001\c31965955f.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3520 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3520 -s 15484⤵
- Program crash
PID:5628
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009716001\a2343c1170.exe"C:\Users\Admin\AppData\Local\Temp\1009716001\a2343c1170.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2036
-
-
C:\Users\Admin\AppData\Local\Temp\1009717001\f3f8d9b7f0.exe"C:\Users\Admin\AppData\Local\Temp\1009717001\f3f8d9b7f0.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4216
-
-
C:\Users\Admin\AppData\Local\Temp\1009718001\cf5eb72659.exe"C:\Users\Admin\AppData\Local\Temp\1009718001\cf5eb72659.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:744
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3532
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3564
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1804
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2156
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2028 -parentBuildID 20240401114208 -prefsHandle 1944 -prefMapHandle 1936 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d83e4c7d-46ae-4571-843c-cb826912cd24} 836 "\\.\pipe\gecko-crash-server-pipe.836" gpu6⤵PID:2168
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2468 -parentBuildID 20240401114208 -prefsHandle 2460 -prefMapHandle 2456 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f8cc6b5c-d8ad-40fe-9ed3-4e1b691de179} 836 "\\.\pipe\gecko-crash-server-pipe.836" socket6⤵PID:4208
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3236 -childID 1 -isForBrowser -prefsHandle 2916 -prefMapHandle 3284 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1296 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7d10ff4f-d664-4ed3-a1cc-6278e9785b46} 836 "\\.\pipe\gecko-crash-server-pipe.836" tab6⤵PID:2896
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3840 -childID 2 -isForBrowser -prefsHandle 3860 -prefMapHandle 3876 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1296 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cffa0e7f-1fd4-4820-9309-f2607d5633f1} 836 "\\.\pipe\gecko-crash-server-pipe.836" tab6⤵PID:4944
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4600 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4556 -prefMapHandle 4628 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {01d6b42f-505b-413e-804d-4202110225b9} 836 "\\.\pipe\gecko-crash-server-pipe.836" utility6⤵
- Checks processor information in registry
PID:5220
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5296 -childID 3 -isForBrowser -prefsHandle 5288 -prefMapHandle 5284 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1296 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9d7a6eda-6e02-49b7-9479-1a75d689cede} 836 "\\.\pipe\gecko-crash-server-pipe.836" tab6⤵PID:5680
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5436 -childID 4 -isForBrowser -prefsHandle 5444 -prefMapHandle 5448 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1296 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a549434b-4223-4767-a612-00dc4253c869} 836 "\\.\pipe\gecko-crash-server-pipe.836" tab6⤵PID:5692
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5720 -childID 5 -isForBrowser -prefsHandle 5712 -prefMapHandle 5708 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1296 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {86b7d649-b48d-402d-9805-36c3ff66dda1} 836 "\\.\pipe\gecko-crash-server-pipe.836" tab6⤵PID:5708
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009719001\5912a10c87.exe"C:\Users\Admin\AppData\Local\Temp\1009719001\5912a10c87.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5336
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3520 -ip 35201⤵PID:5652
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1524
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\n4zftpal.default-release\activity-stream.discovery_stream.json
Filesize19KB
MD5ee9068726814ff344f9182adf29c5d3d
SHA1583db9f6eb3c5b7dc2bccc2fc04a38aa5640cd42
SHA2568a1d090246cd874cd9b96f49c2b35c0c18968bbf568996662902eae0dabc4592
SHA512782b06a05ed5b693a76ed19871cc8d59fd3eff2018d761f5b622a6731bc2a7f6cc63a3aff330f238a66aa1b9780f4d966225860e3987f11c1339ad2f5772f7a8
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\n4zftpal.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD5317986769bd62b2225cc07b485f1e452
SHA1cf9d5caf95d6c9ab7c610da42b13872b71ecefb8
SHA25684f708fc495486599885c31740925c2080374198bb861716655e7c1107fe32ef
SHA512226154983bf40e67940685e57c8b4af663bc5cfac0ef33f4d7959e3fc6444e2f939ab0ebfff14f9893a253ba334c00768eff4dbb98f2876edfe7a59715014f23
-
Filesize
4.2MB
MD54bcd8434cc97b519bca80f43b1d034da
SHA13d79f8ffeba4b4a35a22c906a5d00e7fe9a10806
SHA2560f84f1e318a8dae44ff42a87ac50a1a3ba377581a5e085c63273416f4869782d
SHA51212d02ac1db593bbeb8e58bc2281c039775708c2efc98dd6729a09e695f66167f1ee6cfb054512646a8165277e5ef329e5b9234407236ee132ca32a9bba1dc49d
-
Filesize
1.9MB
MD56ba0ff60198b03afd07582c6aff563d7
SHA18dab834965d3cc0650b097cd125d2c5bc8b6c935
SHA256412d670ac2599ddbcf3981a1792728d52c5fefdc7a3466bfca844e24c6da4cb7
SHA51230f3f2e116119a5dee06004647b81db1e2a9c685a94d304845f475de9a351e1f665abfe3e92fc56fc1217a902a6ade76f4e933f1279d6d1a1312635d3a7cf3f1
-
Filesize
1.8MB
MD5454cdef6025e80e4f5b304c9849a095b
SHA1c7b10c687ef023d6a740f5ba75f8483406acd022
SHA2567e1e613a6fa1a4b4e191163169d91f241a026a3db776f9eca1f082e4894b88d5
SHA512be9ba1c62c5ce07ab8da18f0c2147e5a651588b5f4a72517d783c776a5e5fda78454b9ce33835a567f35f755989a82b7fa4784053eb1c6e3f118f276a6b75c73
-
Filesize
1.7MB
MD5d55ba6659b16992fafe3e7f1da5ab58b
SHA1d9667fd808f66a7a8287b9000189c092804a4524
SHA256fcae58bcbf7a1250f0489dd8e972ce3ed7cbf642498b23e675d5f4d396ac69d2
SHA5126f230c297e856f3c2e84f0b58e1c4749e4d977c177788501d08950f89c10e2c6e7928024831f353bb4fbddb810c3525e92e2487a4855796e1f9d9592e77dfd5d
-
Filesize
901KB
MD56270b504214497411c0409042412b6ce
SHA1c611dc5cdee7e784c4126497b5a275d70b67b3ad
SHA256125affde45a3c9e64a9500ec253fd23ba4c3b54c3dde409afe301b5b39d92ff1
SHA512a8e5b7fbb5f313e361433318121dc46af216735976274f64c8257a08d7334ec1267a21dffa69d6aba32f27a2a10fdc83376ffeb580e0837a6bc113f86a6b6687
-
Filesize
2.6MB
MD5f3a517c2951b081b02d153075d8bd769
SHA1825df1d89678f380ce3a71275ff7c21b6deaf11f
SHA256d5654689a6d6d742802caf876ee4a7ff302a2fd96ac1fca2258acb14df3bdc01
SHA512929e4c37abf85de839c424f180dc8e1ed40bf0ca81814b68d8e4099165b7afee6b46fcc5253dd61131006ecbba56c1c8206f3b47185dcf41b340e0de89c06f1f
-
Filesize
1.9MB
MD50afca9260a5cca722153d2af2e383849
SHA140b92c82d01c374478523af6f100b31df8485dc3
SHA25632b754ed2258a0a657ba352db08cb3c9d657836018fd7a3d3f6226ac602d8672
SHA512e103596e06a55301aba6f3440323ffe242be2b3e9fec2c3559aeeb21e9399a6dd69c63c943fb9e316ea4dab1ddcdda2d3814551c240da7c878a1be7cd3fcff40
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\AlternateServices.bin
Filesize6KB
MD599a261f0b3afa79e71c264c92b3b72a6
SHA1cbaa948130a8b9a76884d76c79a3f2dfcaba1a93
SHA256fdcadb92bc425712b1a5f66570861ed32f8302e77361adbedd0c7456838bffce
SHA51241c5fb3ebc1f00191d99abaff21bce2d62302c0d28296791be25876e4c1c6ce2b4de74a22e4cf980536c356da28d9df39f55c04d9f508890d036ac760cdf9281
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\AlternateServices.bin
Filesize10KB
MD5904d6a166ed29c2d45bdf8d4e93d3d3c
SHA198db7d4ecda2ff17cefc644e1880ff12a594a147
SHA2567bbcdab9eda01e7b626e332e976b828412e3c4c8efd818dc0c134768821f231a
SHA5129aa4d8cb92371d7b487c190132316080fc596341ec235aab13c7ad92c43b35f6d7cac05dd3950f962b192074d4884f63ee098ab8ddc54abb66bbdadcfb90925c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD571ab155f5d58ad4e6a5210c9da3d6edb
SHA11c8ef9c267acd85a19340115786e22560dc2955f
SHA256322c5c6c084974a5ae970235844eb9cda95d81a3dc2d32101780a8b5acc2c962
SHA51230dfdd3eaaca76adce8ea7f0ca4ca77091cff432b32032d7760202a9e5cf07a670828c317d5302ae920e17b782c19c09f390a655e76558740e49cf936a3750fe
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD533967172a01be26720c78739c6afed50
SHA1dfb0b50b243be509dc4abdb3926e66c5a4dafba6
SHA256e46ee36697ffe5c961a443b1f7d480c3cf49af66205181b6c9ed10231bc6cedf
SHA512dc669e4b3e567cfde9ee2baad228e519c0ba44f094a45e51323a2ac9b2f36441d3967c1b0dc7441cb5e53d77a580d11c8ce16aca9905f8c7a4f5062b80a365bb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD55df870cc6948508d0492a09422296d16
SHA1bd9c6beb7547466a9a1ae2b0f5eeabd0f9007c76
SHA2569f7249474558b1a7d8397b1ef087d0fd7659554b5632d79e3b818ef0dd3bb1ad
SHA512a058277b45b79fc1d712e9d9ada65e902cf3efb4e511ff6e0add3e7d550fd765fb32c49ec3cf4ad4b4d7b814f11fe8f67f1257c7b2c5fed424af8409bd688a39
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5c635fd735a497e5938b1c5e988d47068
SHA18619d3c7cca18cbf5bf745f2ba779178fd830cf1
SHA256ea3daa6aa575c20c2fdbbbe384d8717b4d6073820dc94a47bff3a06428c9851d
SHA5123e2c781af43d3dfd15cc92b2df43d5980967ea99ff46798fca9e771669435223970fd7decab1e465b5c199ea9f8bd8a5c3f725dd75cb8796778b5cc85caf9a4c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\pending_pings\08729b81-e1fd-4a1e-af2c-0afaaad416d4
Filesize671B
MD5e05a57fbb397f608b3d0a8d9232f2a62
SHA1baaf79928d0ed438e85d5f79ccd807f002c6e22c
SHA25624bf38760f1e64f23348ef2c8e65ec390d2125ddba75529c899997bef47c22e0
SHA512f6f586123b84944b0f6ed4d4d8de0f24479989d7be55440aa662b783fabd8de29be1df09bc433967bd0d0d074c00e2c1adf68f6f865fbcaead754812b8df5921
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\pending_pings\1a0f14a9-0392-4797-926a-f0e1d5a93ad7
Filesize982B
MD52f4503cf04d44898473e85c90fb0a55f
SHA1731ac020dab5a6bcadf1747ba3d68f11bd90b8c2
SHA256a5e0110a8ce7c74aa8644a6ff029b6a3b27232e7fe89b97f95a93407f073acf2
SHA512f96a901056d0c7ae9e565f1c57942cc4f2b6ea7add815eca1160f5d61f87ac2fe45c5f42093017c098c915f87eae1849cf0e8c41b28ee29fb32deeacedad63bf
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\pending_pings\ee77cd6b-544d-4f2e-981b-6b94d9b81149
Filesize26KB
MD509113957681d1713c0b5288601fa6d6c
SHA172622bded2f39a11c671cd710361aa170db4420d
SHA256fa65ca92e7d5c246350ffba1c2fc8201ad56a80dca0679906193475dfeda64b4
SHA5125b6950f0ef6e278cbc071674682ddc73b55cc91cc60f87a7c7c1e898baa5ec98c5f9cd13bca9542087759955b0e11d42f58db47c56f373c216b5d187a4123213
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
11KB
MD5ab91987217742ffa102504ff77631b43
SHA1ca519ffdc2981b2376f97373865994ff96da9251
SHA2563552ae0a7921ae0b5b474810d92c197b5183360f5bd6886391ccbe1c1b06dcd6
SHA512d644d73c480939c74c96062702df2a3d13bc11271eec305f25339038ece1a66cfbfc094f48a4709a4a40029b26959178a97f893b5c6aeb76cff3a1dd15efc97d
-
Filesize
15KB
MD52e5e59af64e07f04284fc406b767b130
SHA17efca7f0ce87c4f5eb64e2dac36629a28189e37f
SHA2563a0fcca6a4aa0aa00dc90aafb65d40e791901d418bb5931ee6c91bbe6c1e3b7d
SHA5129f962edb99ba4493957fbbb50f2576ef15f84ecedf57d89c9507e2a861d155dda9ae72c7ac0f739b703faba29e017a58eac40f338380ed490dfcb924ba20b6dc