Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2024 01:18
Static task
static1
General
-
Target
b64bbde349b82da7e2a644888ce1ff6b935644ae22cf1f1eaf3cf2082b078ec2.exe
-
Size
7.1MB
-
MD5
6cb8e8277a0e4a699ec12912c6a06d96
-
SHA1
9d16dfbf893dc1cb17f00a7263026883da1cbc75
-
SHA256
b64bbde349b82da7e2a644888ce1ff6b935644ae22cf1f1eaf3cf2082b078ec2
-
SHA512
9d93662ecd191ce12a6b777cb3416463f6698db66b2a9281db598ec3df125d057b67fd3a3c49880f8eda43a159ccc036e78db5f2ef0dbd5e4e5b0c3ef2253dc1
-
SSDEEP
196608:Tqppj4e8Q1JEoNaUDqE4tsu6jj1Wtklwz:TOTrJEoYUDqEut6fbwz
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://powerful-avoids.sbs
https://motion-treesz.sbs
https://disobey-curly.sbs
https://leg-sate-boat.sbs
https://story-tense-faz.sbs
https://blade-govern.sbs
https://occupy-blushi.sbs
https://frogs-severz.sbs
https://property-imper.sbs
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://blade-govern.sbs/api
https://story-tense-faz.sbs/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4z653g.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4z653g.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4z653g.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4z653g.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4z653g.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4z653g.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1c56j1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2G6996.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b02a585018.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 22d966908e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3h01z.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4z653g.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c70b97a90e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 22 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b02a585018.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b02a585018.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c70b97a90e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 22d966908e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2G6996.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3h01z.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2G6996.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4z653g.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c70b97a90e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3h01z.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4z653g.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 22d966908e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1c56j1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1c56j1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 1c56j1.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 14 IoCs
pid Process 4328 j2c19.exe 3428 B4J51.exe 4768 1c56j1.exe 968 skotes.exe 964 2G6996.exe 828 3h01z.exe 5000 4z653g.exe 1648 b02a585018.exe 696 c70b97a90e.exe 2352 0e3ea9d9f3.exe 4616 22d966908e.exe 2948 skotes.exe 3440 skotes.exe 2688 skotes.exe -
Identifies Wine through registry keys 2 TTPs 11 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 2G6996.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 3h01z.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 1c56j1.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 4z653g.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine b02a585018.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine c70b97a90e.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 22d966908e.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4z653g.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4z653g.exe -
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" j2c19.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" B4J51.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b02a585018.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009469001\\b02a585018.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\c70b97a90e.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009470001\\c70b97a90e.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\0e3ea9d9f3.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009471001\\0e3ea9d9f3.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\22d966908e.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009472001\\22d966908e.exe" skotes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b64bbde349b82da7e2a644888ce1ff6b935644ae22cf1f1eaf3cf2082b078ec2.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0007000000023ce2-92.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
pid Process 4768 1c56j1.exe 968 skotes.exe 964 2G6996.exe 828 3h01z.exe 5000 4z653g.exe 1648 b02a585018.exe 696 c70b97a90e.exe 4616 22d966908e.exe 2948 skotes.exe 3440 skotes.exe 2688 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1c56j1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
pid pid_target Process procid_target 3372 964 WerFault.exe 87 64 1648 WerFault.exe 101 2148 1648 WerFault.exe 101 1448 4616 WerFault.exe 134 -
System Location Discovery: System Language Discovery 1 TTPs 17 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1c56j1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4z653g.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0e3ea9d9f3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language j2c19.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3h01z.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c70b97a90e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b64bbde349b82da7e2a644888ce1ff6b935644ae22cf1f1eaf3cf2082b078ec2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2G6996.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 22d966908e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language B4J51.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b02a585018.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 3228 taskkill.exe 3428 taskkill.exe 1688 taskkill.exe 4452 taskkill.exe 1972 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 4768 1c56j1.exe 4768 1c56j1.exe 968 skotes.exe 968 skotes.exe 964 2G6996.exe 964 2G6996.exe 828 3h01z.exe 828 3h01z.exe 5000 4z653g.exe 5000 4z653g.exe 1648 b02a585018.exe 1648 b02a585018.exe 5000 4z653g.exe 5000 4z653g.exe 696 c70b97a90e.exe 696 c70b97a90e.exe 2352 0e3ea9d9f3.exe 2352 0e3ea9d9f3.exe 2352 0e3ea9d9f3.exe 2352 0e3ea9d9f3.exe 4616 22d966908e.exe 4616 22d966908e.exe 2948 skotes.exe 2948 skotes.exe 3440 skotes.exe 3440 skotes.exe 2688 skotes.exe 2688 skotes.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 5000 4z653g.exe Token: SeDebugPrivilege 3428 taskkill.exe Token: SeDebugPrivilege 1688 taskkill.exe Token: SeDebugPrivilege 4452 taskkill.exe Token: SeDebugPrivilege 1972 taskkill.exe Token: SeDebugPrivilege 3228 taskkill.exe Token: SeDebugPrivilege 1604 firefox.exe Token: SeDebugPrivilege 1604 firefox.exe Token: SeDebugPrivilege 1604 firefox.exe Token: SeDebugPrivilege 1604 firefox.exe Token: SeDebugPrivilege 1604 firefox.exe -
Suspicious use of FindShellTrayWindow 32 IoCs
pid Process 4768 1c56j1.exe 2352 0e3ea9d9f3.exe 2352 0e3ea9d9f3.exe 2352 0e3ea9d9f3.exe 2352 0e3ea9d9f3.exe 2352 0e3ea9d9f3.exe 2352 0e3ea9d9f3.exe 1604 firefox.exe 1604 firefox.exe 1604 firefox.exe 1604 firefox.exe 2352 0e3ea9d9f3.exe 1604 firefox.exe 1604 firefox.exe 1604 firefox.exe 1604 firefox.exe 1604 firefox.exe 1604 firefox.exe 1604 firefox.exe 1604 firefox.exe 1604 firefox.exe 1604 firefox.exe 1604 firefox.exe 1604 firefox.exe 1604 firefox.exe 1604 firefox.exe 1604 firefox.exe 1604 firefox.exe 1604 firefox.exe 2352 0e3ea9d9f3.exe 2352 0e3ea9d9f3.exe 2352 0e3ea9d9f3.exe -
Suspicious use of SendNotifyMessage 30 IoCs
pid Process 2352 0e3ea9d9f3.exe 2352 0e3ea9d9f3.exe 2352 0e3ea9d9f3.exe 2352 0e3ea9d9f3.exe 2352 0e3ea9d9f3.exe 2352 0e3ea9d9f3.exe 1604 firefox.exe 1604 firefox.exe 1604 firefox.exe 1604 firefox.exe 2352 0e3ea9d9f3.exe 1604 firefox.exe 1604 firefox.exe 1604 firefox.exe 1604 firefox.exe 1604 firefox.exe 1604 firefox.exe 1604 firefox.exe 1604 firefox.exe 1604 firefox.exe 1604 firefox.exe 1604 firefox.exe 1604 firefox.exe 1604 firefox.exe 1604 firefox.exe 1604 firefox.exe 1604 firefox.exe 2352 0e3ea9d9f3.exe 2352 0e3ea9d9f3.exe 2352 0e3ea9d9f3.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1604 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 548 wrote to memory of 4328 548 b64bbde349b82da7e2a644888ce1ff6b935644ae22cf1f1eaf3cf2082b078ec2.exe 83 PID 548 wrote to memory of 4328 548 b64bbde349b82da7e2a644888ce1ff6b935644ae22cf1f1eaf3cf2082b078ec2.exe 83 PID 548 wrote to memory of 4328 548 b64bbde349b82da7e2a644888ce1ff6b935644ae22cf1f1eaf3cf2082b078ec2.exe 83 PID 4328 wrote to memory of 3428 4328 j2c19.exe 84 PID 4328 wrote to memory of 3428 4328 j2c19.exe 84 PID 4328 wrote to memory of 3428 4328 j2c19.exe 84 PID 3428 wrote to memory of 4768 3428 B4J51.exe 85 PID 3428 wrote to memory of 4768 3428 B4J51.exe 85 PID 3428 wrote to memory of 4768 3428 B4J51.exe 85 PID 4768 wrote to memory of 968 4768 1c56j1.exe 86 PID 4768 wrote to memory of 968 4768 1c56j1.exe 86 PID 4768 wrote to memory of 968 4768 1c56j1.exe 86 PID 3428 wrote to memory of 964 3428 B4J51.exe 87 PID 3428 wrote to memory of 964 3428 B4J51.exe 87 PID 3428 wrote to memory of 964 3428 B4J51.exe 87 PID 4328 wrote to memory of 828 4328 j2c19.exe 97 PID 4328 wrote to memory of 828 4328 j2c19.exe 97 PID 4328 wrote to memory of 828 4328 j2c19.exe 97 PID 548 wrote to memory of 5000 548 b64bbde349b82da7e2a644888ce1ff6b935644ae22cf1f1eaf3cf2082b078ec2.exe 98 PID 548 wrote to memory of 5000 548 b64bbde349b82da7e2a644888ce1ff6b935644ae22cf1f1eaf3cf2082b078ec2.exe 98 PID 548 wrote to memory of 5000 548 b64bbde349b82da7e2a644888ce1ff6b935644ae22cf1f1eaf3cf2082b078ec2.exe 98 PID 968 wrote to memory of 1648 968 skotes.exe 101 PID 968 wrote to memory of 1648 968 skotes.exe 101 PID 968 wrote to memory of 1648 968 skotes.exe 101 PID 968 wrote to memory of 696 968 skotes.exe 111 PID 968 wrote to memory of 696 968 skotes.exe 111 PID 968 wrote to memory of 696 968 skotes.exe 111 PID 968 wrote to memory of 2352 968 skotes.exe 112 PID 968 wrote to memory of 2352 968 skotes.exe 112 PID 968 wrote to memory of 2352 968 skotes.exe 112 PID 2352 wrote to memory of 3428 2352 0e3ea9d9f3.exe 113 PID 2352 wrote to memory of 3428 2352 0e3ea9d9f3.exe 113 PID 2352 wrote to memory of 3428 2352 0e3ea9d9f3.exe 113 PID 2352 wrote to memory of 1688 2352 0e3ea9d9f3.exe 115 PID 2352 wrote to memory of 1688 2352 0e3ea9d9f3.exe 115 PID 2352 wrote to memory of 1688 2352 0e3ea9d9f3.exe 115 PID 2352 wrote to memory of 4452 2352 0e3ea9d9f3.exe 117 PID 2352 wrote to memory of 4452 2352 0e3ea9d9f3.exe 117 PID 2352 wrote to memory of 4452 2352 0e3ea9d9f3.exe 117 PID 2352 wrote to memory of 1972 2352 0e3ea9d9f3.exe 119 PID 2352 wrote to memory of 1972 2352 0e3ea9d9f3.exe 119 PID 2352 wrote to memory of 1972 2352 0e3ea9d9f3.exe 119 PID 2352 wrote to memory of 3228 2352 0e3ea9d9f3.exe 121 PID 2352 wrote to memory of 3228 2352 0e3ea9d9f3.exe 121 PID 2352 wrote to memory of 3228 2352 0e3ea9d9f3.exe 121 PID 2352 wrote to memory of 2172 2352 0e3ea9d9f3.exe 123 PID 2352 wrote to memory of 2172 2352 0e3ea9d9f3.exe 123 PID 2172 wrote to memory of 1604 2172 firefox.exe 124 PID 2172 wrote to memory of 1604 2172 firefox.exe 124 PID 2172 wrote to memory of 1604 2172 firefox.exe 124 PID 2172 wrote to memory of 1604 2172 firefox.exe 124 PID 2172 wrote to memory of 1604 2172 firefox.exe 124 PID 2172 wrote to memory of 1604 2172 firefox.exe 124 PID 2172 wrote to memory of 1604 2172 firefox.exe 124 PID 2172 wrote to memory of 1604 2172 firefox.exe 124 PID 2172 wrote to memory of 1604 2172 firefox.exe 124 PID 2172 wrote to memory of 1604 2172 firefox.exe 124 PID 2172 wrote to memory of 1604 2172 firefox.exe 124 PID 1604 wrote to memory of 1528 1604 firefox.exe 125 PID 1604 wrote to memory of 1528 1604 firefox.exe 125 PID 1604 wrote to memory of 1528 1604 firefox.exe 125 PID 1604 wrote to memory of 1528 1604 firefox.exe 125 PID 1604 wrote to memory of 1528 1604 firefox.exe 125 PID 1604 wrote to memory of 1528 1604 firefox.exe 125 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\b64bbde349b82da7e2a644888ce1ff6b935644ae22cf1f1eaf3cf2082b078ec2.exe"C:\Users\Admin\AppData\Local\Temp\b64bbde349b82da7e2a644888ce1ff6b935644ae22cf1f1eaf3cf2082b078ec2.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\j2c19.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\j2c19.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\B4J51.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\B4J51.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3428 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1c56j1.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1c56j1.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Users\Admin\AppData\Local\Temp\1009469001\b02a585018.exe"C:\Users\Admin\AppData\Local\Temp\1009469001\b02a585018.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1648 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1648 -s 16567⤵
- Program crash
PID:64
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1648 -s 16767⤵
- Program crash
PID:2148
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009470001\c70b97a90e.exe"C:\Users\Admin\AppData\Local\Temp\1009470001\c70b97a90e.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:696
-
-
C:\Users\Admin\AppData\Local\Temp\1009471001\0e3ea9d9f3.exe"C:\Users\Admin\AppData\Local\Temp\1009471001\0e3ea9d9f3.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3428
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1688
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4452
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1972
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3228
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2036 -parentBuildID 20240401114208 -prefsHandle 1952 -prefMapHandle 1940 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {f60ab1c9-1aea-4bec-8457-0e01d7db37b3} 1604 "\\.\pipe\gecko-crash-server-pipe.1604" gpu9⤵PID:1528
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2396 -parentBuildID 20240401114208 -prefsHandle 2484 -prefMapHandle 2480 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7b46bd1a-46f4-43e1-ae53-46308bab25fd} 1604 "\\.\pipe\gecko-crash-server-pipe.1604" socket9⤵PID:1564
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2888 -childID 1 -isForBrowser -prefsHandle 3064 -prefMapHandle 2920 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1228 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c48d81a7-02d6-4e42-96e6-e4d609094f7a} 1604 "\\.\pipe\gecko-crash-server-pipe.1604" tab9⤵PID:4956
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2820 -childID 2 -isForBrowser -prefsHandle 3744 -prefMapHandle 3740 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1228 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {370b682a-0b3f-450b-8ff0-2ed4fb3bfaf9} 1604 "\\.\pipe\gecko-crash-server-pipe.1604" tab9⤵PID:1692
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4552 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4568 -prefMapHandle 4564 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7915f70c-0fd4-4235-bd9c-3b3c7131c3f2} 1604 "\\.\pipe\gecko-crash-server-pipe.1604" utility9⤵
- Checks processor information in registry
PID:5300
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5380 -childID 3 -isForBrowser -prefsHandle 5324 -prefMapHandle 5328 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1228 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b54d5953-4c3c-4014-91d2-e853b6c43edd} 1604 "\\.\pipe\gecko-crash-server-pipe.1604" tab9⤵PID:6808
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5288 -childID 4 -isForBrowser -prefsHandle 5508 -prefMapHandle 5512 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1228 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {397fe8b2-9081-47e8-9ecd-4cf061013786} 1604 "\\.\pipe\gecko-crash-server-pipe.1604" tab9⤵PID:6824
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5692 -childID 5 -isForBrowser -prefsHandle 5700 -prefMapHandle 4612 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1228 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {89959d40-d443-4472-b22e-005848d00aa7} 1604 "\\.\pipe\gecko-crash-server-pipe.1604" tab9⤵PID:6880
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009472001\22d966908e.exe"C:\Users\Admin\AppData\Local\Temp\1009472001\22d966908e.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4616 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4616 -s 8247⤵
- Program crash
PID:1448
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2G6996.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2G6996.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:964 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 964 -s 17005⤵
- Program crash
PID:3372
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3h01z.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3h01z.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:828
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4z653g.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4z653g.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5000
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 964 -ip 9641⤵PID:4504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1648 -ip 16481⤵PID:2744
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1648 -ip 16481⤵PID:4032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4616 -ip 46161⤵PID:3896
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2948
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3440
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2688
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\activity-stream.discovery_stream.json
Filesize28KB
MD5eb79111cc428995638583a2d237ea32d
SHA1799bbaf1c7de6921037784a05287c054e8a6df04
SHA2568c3497ea50442252f86f17134c3659f27ea60f6eea303171a4fa22a898363212
SHA51208d00ae2afbeca5ff66844d5ad2dcd387884b5c6b5c219493f482b7fc65b4113ca210d650852f1064095742340151655f9a263279443dc63c46829ed759b450d
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD5abcd67593d7b8b3bda2e5797d848831e
SHA1e53cd12c986ba9eddb56296738b6cd28b75edd06
SHA256a874773db05fe554481c8a3b6c7b9961caaa0fe9fc0c6af32ffdb1125a716ed1
SHA512f05d75aa8babf930ec241e2334d3f87d5e07d1f7def6c15edf02721821c13b0a058150e77a265f128abc1e254f6f204ce2a7caa312b45a2abed107e332b339f3
-
Filesize
901KB
MD502efc01b5599a6e5f021767a6a16deb4
SHA12eb11d0ed62d8ab3f51143e8e69dad6f596379b8
SHA25603dff2a3ef928cc73243dea6e2b426c14c4889b47a169d4820b1dbbb053c9613
SHA51277f956502bb7ba33d50934668b808e4914a14e28f2f7a534669c2af705d8baac6e11b247cea77da42a24a6c8944cfd12801fe0c0f362d06ba97d45e113b00077
-
Filesize
2.7MB
MD59dea695dfad32ec439d077eb815b0b58
SHA13d817569c6fbcb0757ec47d97492f2a5fa2d2b08
SHA25610a4bfdc91b931d5ed67c58f8db81ca7d3560da9bdd41f7a39b19617a7581ad8
SHA51258c17aab073e20b7d59f3d5d283a86cb512e64e7e895cf181336f620b6be12d27b531e8aadc9518f4a4e665d780072a78ddbb4845f51e463af8f54db54c1c0da
-
Filesize
5.5MB
MD5b53c2307fb16b74db5d8f89f7a961585
SHA1e226d9e50a416524cc0f296d6f8ebef96a3a6c37
SHA25634fe7f711b9e4d3a0d9bf7d05914fe98f6126563eb53d59ac047671d0c4db812
SHA5126559d5bc30ba5b309709cbd56913197f65da7ee22324df50e73c665c9d00a51d94ecaa9f1bcce4d6687c8e2e8e14d4cd7441135dde304e938ce47a1d1b417613
-
Filesize
1.7MB
MD517d580563cbdd3a37f8ef159c70f0b8e
SHA1b0532976bd695b39384aa81d89b54fbde900b778
SHA2569bba12864f0e8b64600e4252b589fd4f1f0b0339ecde4bc1c130a0d96945ffa7
SHA512784fff522205ce44534474cdb26c7b456aeb6e2c42e4de96b3d5f6b4a36a0d329cf05a847f0a292979aaa09935fc9445390063faca4f0f492ee61ade0540f775
-
Filesize
3.8MB
MD5f0c5f81710b930d1837e733ed25f08ec
SHA1caa76c50cd90b0c7cdafb2f0a722be3307824070
SHA2568b93752db008fb23aa0bc5bb5511a23de18d784f54b16ddb7cdcb3d15983c771
SHA512d04a2e0e7a8b50ad1be17a0e70387c14ae8b4d9208ba3a6be34b42f40b863aafaff2ac0ce9568b62e9ad47f9d328aec026a7118de1ba85ba5fafdd2463350e3c
-
Filesize
1.8MB
MD55fcab4c0e9af5adc2963461bf81e0a5d
SHA1f81122d741b6de1503e7625feea68233ae29f670
SHA2568c5f58b2abcbb73f05d0d96bc1dd056bce130ce4f3209cfe02529b6b03ef86f1
SHA5129fb90dbe48aba5ba7ac1e44cc97d5c498d8bb9a4f1fa397c3be1dfc76e1d072a319c13551d56677bcb156a37e8dcb8f464335d9e785c9e262087faa36ac88932
-
Filesize
1.8MB
MD595a269acc2667e85ec3c67f5f76e0fe5
SHA185b4c01a1f5a65cfe084165bbba00493a74b6a1a
SHA256d8bf15f010a88817bfff05c7df61fba23676d5fe4d3a8deb5073fc7fa5255a3c
SHA512be24721f2eec1b3240837a1d42030d58de00cbcd66d6db183a11d3f00e2829859b4813b1a6bcdffcba0c7352975618df95212e723d0bb65a0c360dd8fd1a20dd
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\AlternateServices.bin
Filesize10KB
MD5a8892986eb789ad13db9089879af7afa
SHA1bcaf56a2a5a957dfd3270d165fa404e3766dcb64
SHA2566d8bf7738b3c5d0d6093c460150a9195eda72beb9e71dc6dc03b66b4febbed1c
SHA5126fe52db1e4298eabf4e9dcd1a122db8af050394000c4eb82be961ef2e094198da440bf0aad12d45527f6342cf6ddb8f5df09d6f0ad04d576818ca3e294ae75eb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.bin
Filesize23KB
MD590c5fdfe0908ac35f2191956d1bbad56
SHA1d7e30015e65f450822ba4ea05cc0d1fe091f0797
SHA256f15fcb768a5ea26c24187e4b9547a980e87f2aac0e856cbe181ec625272e4936
SHA512c5a385babec7bba062bc72d0080b832747fb33de63f2988052626e0df4d0f209e1b3464ec64212c9a7fef1727c769a56c9796531cc0f40d501644397ac7bb59e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.bin
Filesize22KB
MD55fd7ee1b9e92dd97fd80db182733bf36
SHA1f911d0304a085a7e9b7275443a2feabee4c924d6
SHA256c6f144c60cb29e8fd4392c4823a0ac8c314061cb6c30d7e56c162ade2f74f5d6
SHA512435e2f2a32ed366ccdcd5924ef6163496deccd6b9f98cf5e74963a9fec82e916ddb4fd9ddf51f044f392400eaa66af65f62c40514a7d954049082fffef8d0389
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.bin
Filesize25KB
MD51628231ac40c9c83a938dd878be18187
SHA1aa54d173b8c473ca1e1bfc7c17a377015a6df767
SHA2565fa176ed3b207c49eab4cab7cd7671df79383a4c244f5fcb65ba544189b526a6
SHA5129f95f3b43cccb490db43faebc56995223f852a555da8b96400fcfb961fa2f99d744fbf35cdd20c48ad32bc64b98c740a0e40714cf45c929ed32f3143833f5f52
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize21KB
MD5d50689752d5d2a85433306856c2aa771
SHA15de8e7b4d9c7d6a22ca32f578bcde0816d969bec
SHA25673a303bea75745dbf07bb4d9fe7a590291a2aa0fddd5d058d1af6694aec8c121
SHA5127f8a075cf7ec89a8b94ed2d7cfa7a1de585e2a1b177cafa8605b62e39d2434820197c6a967d2aa04bfc4ae52aee5a72819bf790ba72c4248524bcfec08309e97
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize24KB
MD5d4e8bc1308cb1cb58c54a1426517fbbb
SHA1019243fc0edca439fb4bd92c461093ec90c3fe96
SHA2562859c4860cd910339b869ebc973428b981aa3071a8187c56679bbd3cc6907e7a
SHA512b5f9cf752e19ce90586c8dd29ae43106da2285b84ebfae6cc69f73a28262b17841422caba81098d9f9915e6637fd9b1a89b872516ac65b6346515539d8b97346
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD5735b464d87cb8f17c8bb5ed135ce9e3f
SHA19d8d1fa7512f581f8b4156520a180394051905fa
SHA25625eec56191b2f6a319b24fdbc21465ab6aec0ff3ff55d1c05f56eeb326501e13
SHA512dc20d3cd728d40b59b5a89de7b9e00714884272bca612d243975089f2db2c506f7dd6a74cc7f4a2cc1c603d778f2d540d4daeed11ee9ed2a36638fff147f9ca6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD5855a42dc269aafd36b9f24fe274d2e7f
SHA117500978c485d45fad5318274e39c5a1a32a67c1
SHA256e479f7727ea6977d330da19088e72a89e4bebba145266e6ca2e78916a9208497
SHA5129e3816113b0629d65746bdb6c2e1ff134357373a9f81a73b95333a99ae2a6f37229c2277711d9d727225b70ad433754e83208cd307ff6cc204d727aa1000a60d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\c90c0140-08b8-4a1e-a4d4-1688a6487a5d
Filesize659B
MD5b118c1dfbaa85b26d0206e2366544e9b
SHA191ea97262ccff0e6e05aec762ab79beac9c632b6
SHA25649d1f286c45c7d00be08a97e28390b0b34f0709edd27e5871fd68e086839b2d1
SHA512cde7b7adf916bafe947b342eebb1ecbce7966e9c94ca2537cebe753044c035eb4c03cc9af211ec16d8598bf01f66c82d6a7379e58907870d3fd3f895ace5c19f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\dab12ce3-4d05-46aa-80d6-e12090a0b5c0
Filesize982B
MD5f492cdac748af3aacc1efbaa7dd61c3a
SHA100112eee25bbd1d88410ca250e2a0e73e80e80ee
SHA256c354d57809e08506b2dffa1f2cb8a53c22aaa0acf996d5ccfa0bc023ffb12624
SHA51211d27cf972f44e95d6d86230e579f965132f05842a7e101e7da273da7ab63f9969a9508a9754a58786161fa39bc9a0e4171d3fe7ec3645dc74e7ec7a02aaf0be
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD5ac0859ecefa776d6ca1153363fd0f7da
SHA1d22f21decf032d0768bb444969670b4cc1b653c7
SHA256a9c04dc4e8bf9fae8d7ff8e78d8af3a68986aa44a4fd7b0afb1826c7dbff824c
SHA512dda3bad49da7ea6140337130a59f2c8473e043e03657309c3bbac7b83736a390e9d2f9ee88e09f544d0f9108d2198be7b8fe41e98b794b6dc90e2d59d4d1432e
-
Filesize
12KB
MD5c50ac31c120fb303b389ed6577ecc6ad
SHA1a6fe885677ed381f6bd14284a2a02e39a755f3f5
SHA256a0346c3208390e7d733a459a04db85b60261d04d2e3509fc488f9c6993ab3ca3
SHA512d7b0259be87eda5fa09e7a6188a57bdcb83367e1bc1ee85c8da64babbb64b7fc55541ddaad1b353db99c5f7b3655defa4e34ee61ca2a91ca1a82673ae3fb8481
-
Filesize
15KB
MD5672f9e92f771642c323d915062fb166d
SHA18f0b709d9165e1bc2786924702411d4b2eb451c4
SHA256ad364bd6972ed98a9447902f8fbcc56bb09a15fc434630531b1d236cd8e545cf
SHA5126912ee7871cd5eeb676f5045840899f8a8bce47522f50db7c6347d007b910908e904ae66fa9cc2926d457339c68bcd05b3beb39911b0cc771caf82b98a146ebd
-
Filesize
11KB
MD53a5d8c6a73296c4229c3f67c3d54eef6
SHA17f04a630bff449c87a79a354b7b7c042377872ed
SHA256b03c5c8c2402e01087f7cfadc78420a05f9cfafd98988923f86edf8d834f0e0d
SHA512f27287afa695df14d52f19355ef6eb687e2a538ed648ff17e4a46fd3bfe24efc1b751a88ff18c6472264a1f7e267128301d5fea321d5284c353d42b38aca677b