Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2024 03:53
Static task
static1
Behavioral task
behavioral1
Sample
b40bca0264f21f6ad389319dd05a41d8168a8ac3e150ac1b2e21293711e62f18.exe
Resource
win7-20240903-en
General
-
Target
b40bca0264f21f6ad389319dd05a41d8168a8ac3e150ac1b2e21293711e62f18.exe
-
Size
1.8MB
-
MD5
f0ecf1a8076890546c2210d5373f498a
-
SHA1
1997eb844617f4770b81cf3c0ff9cefbdc401853
-
SHA256
b40bca0264f21f6ad389319dd05a41d8168a8ac3e150ac1b2e21293711e62f18
-
SHA512
5e0debf6e8a8f8747644bc6bd58ecbd01f6db52f8271d56b1b1f832fb9d201329cf54534316ca9fdd290044236a7b15a5468f2353ad079531a55910587e95a01
-
SSDEEP
49152:P3MT8PW2xYc889iFc/tMLcanXfOK1QZ0aXPJVlTa:P3MD8PLMStMBfLGvPJVla
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
drum
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a875273a7c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a875273a7c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a875273a7c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a875273a7c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a875273a7c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a875273a7c.exe -
Stealc family
-
Enumerates VirtualBox registry keys 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF b2eb139b19.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF 306af33eda.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4848fdaa80.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a4ee149ec0.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 306af33eda.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b2eb139b19.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c12ec72af4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a875273a7c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b40bca0264f21f6ad389319dd05a41d8168a8ac3e150ac1b2e21293711e62f18.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 20 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b2eb139b19.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 306af33eda.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4848fdaa80.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a875273a7c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b40bca0264f21f6ad389319dd05a41d8168a8ac3e150ac1b2e21293711e62f18.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b40bca0264f21f6ad389319dd05a41d8168a8ac3e150ac1b2e21293711e62f18.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c12ec72af4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 306af33eda.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a4ee149ec0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c12ec72af4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4848fdaa80.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a875273a7c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b2eb139b19.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a4ee149ec0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation b40bca0264f21f6ad389319dd05a41d8168a8ac3e150ac1b2e21293711e62f18.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 10 IoCs
pid Process 4220 skotes.exe 4300 b2eb139b19.exe 3520 c12ec72af4.exe 2712 306af33eda.exe 3488 4848fdaa80.exe 1808 a4ee149ec0.exe 1868 8f1e48acd0.exe 2820 a875273a7c.exe 5424 skotes.exe 5136 skotes.exe -
Identifies Wine through registry keys 2 TTPs 10 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine b2eb139b19.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 306af33eda.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine a4ee149ec0.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine b40bca0264f21f6ad389319dd05a41d8168a8ac3e150ac1b2e21293711e62f18.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine c12ec72af4.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 4848fdaa80.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine a875273a7c.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a875273a7c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a875273a7c.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\4848fdaa80.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010120001\\4848fdaa80.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\a4ee149ec0.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010121001\\a4ee149ec0.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\8f1e48acd0.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010122001\\8f1e48acd0.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\a875273a7c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010123001\\a875273a7c.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0008000000023c57-131.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
pid Process 3968 b40bca0264f21f6ad389319dd05a41d8168a8ac3e150ac1b2e21293711e62f18.exe 4220 skotes.exe 4300 b2eb139b19.exe 3520 c12ec72af4.exe 2712 306af33eda.exe 3488 4848fdaa80.exe 1808 a4ee149ec0.exe 2820 a875273a7c.exe 5424 skotes.exe 5136 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job b40bca0264f21f6ad389319dd05a41d8168a8ac3e150ac1b2e21293711e62f18.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5192 3520 WerFault.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a875273a7c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4848fdaa80.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b40bca0264f21f6ad389319dd05a41d8168a8ac3e150ac1b2e21293711e62f18.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c12ec72af4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 306af33eda.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a4ee149ec0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b2eb139b19.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8f1e48acd0.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 2828 taskkill.exe 4568 taskkill.exe 2980 taskkill.exe 1672 taskkill.exe 3552 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 3968 b40bca0264f21f6ad389319dd05a41d8168a8ac3e150ac1b2e21293711e62f18.exe 3968 b40bca0264f21f6ad389319dd05a41d8168a8ac3e150ac1b2e21293711e62f18.exe 4220 skotes.exe 4220 skotes.exe 4300 b2eb139b19.exe 4300 b2eb139b19.exe 4300 b2eb139b19.exe 4300 b2eb139b19.exe 4300 b2eb139b19.exe 4300 b2eb139b19.exe 4300 b2eb139b19.exe 4300 b2eb139b19.exe 4300 b2eb139b19.exe 4300 b2eb139b19.exe 3520 c12ec72af4.exe 3520 c12ec72af4.exe 2712 306af33eda.exe 2712 306af33eda.exe 2712 306af33eda.exe 2712 306af33eda.exe 2712 306af33eda.exe 2712 306af33eda.exe 2712 306af33eda.exe 2712 306af33eda.exe 2712 306af33eda.exe 2712 306af33eda.exe 3488 4848fdaa80.exe 3488 4848fdaa80.exe 1808 a4ee149ec0.exe 1808 a4ee149ec0.exe 1868 8f1e48acd0.exe 1868 8f1e48acd0.exe 2820 a875273a7c.exe 2820 a875273a7c.exe 2820 a875273a7c.exe 2820 a875273a7c.exe 2820 a875273a7c.exe 1868 8f1e48acd0.exe 1868 8f1e48acd0.exe 5424 skotes.exe 5424 skotes.exe 5136 skotes.exe 5136 skotes.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 3552 taskkill.exe Token: SeDebugPrivilege 2828 taskkill.exe Token: SeDebugPrivilege 4568 taskkill.exe Token: SeDebugPrivilege 2980 taskkill.exe Token: SeDebugPrivilege 1672 taskkill.exe Token: SeDebugPrivilege 4512 firefox.exe Token: SeDebugPrivilege 4512 firefox.exe Token: SeDebugPrivilege 2820 a875273a7c.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 3968 b40bca0264f21f6ad389319dd05a41d8168a8ac3e150ac1b2e21293711e62f18.exe 1868 8f1e48acd0.exe 1868 8f1e48acd0.exe 1868 8f1e48acd0.exe 1868 8f1e48acd0.exe 1868 8f1e48acd0.exe 1868 8f1e48acd0.exe 1868 8f1e48acd0.exe 1868 8f1e48acd0.exe 1868 8f1e48acd0.exe 4512 firefox.exe 4512 firefox.exe 4512 firefox.exe 4512 firefox.exe 4512 firefox.exe 4512 firefox.exe 4512 firefox.exe 4512 firefox.exe 4512 firefox.exe 4512 firefox.exe 4512 firefox.exe 4512 firefox.exe 4512 firefox.exe 4512 firefox.exe 4512 firefox.exe 4512 firefox.exe 4512 firefox.exe 4512 firefox.exe 4512 firefox.exe 4512 firefox.exe 4512 firefox.exe 1868 8f1e48acd0.exe 1868 8f1e48acd0.exe 1868 8f1e48acd0.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 1868 8f1e48acd0.exe 1868 8f1e48acd0.exe 1868 8f1e48acd0.exe 1868 8f1e48acd0.exe 1868 8f1e48acd0.exe 1868 8f1e48acd0.exe 1868 8f1e48acd0.exe 1868 8f1e48acd0.exe 1868 8f1e48acd0.exe 4512 firefox.exe 4512 firefox.exe 4512 firefox.exe 4512 firefox.exe 4512 firefox.exe 4512 firefox.exe 4512 firefox.exe 4512 firefox.exe 4512 firefox.exe 4512 firefox.exe 4512 firefox.exe 4512 firefox.exe 4512 firefox.exe 4512 firefox.exe 4512 firefox.exe 4512 firefox.exe 4512 firefox.exe 4512 firefox.exe 4512 firefox.exe 4512 firefox.exe 1868 8f1e48acd0.exe 1868 8f1e48acd0.exe 1868 8f1e48acd0.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4512 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3968 wrote to memory of 4220 3968 b40bca0264f21f6ad389319dd05a41d8168a8ac3e150ac1b2e21293711e62f18.exe 82 PID 3968 wrote to memory of 4220 3968 b40bca0264f21f6ad389319dd05a41d8168a8ac3e150ac1b2e21293711e62f18.exe 82 PID 3968 wrote to memory of 4220 3968 b40bca0264f21f6ad389319dd05a41d8168a8ac3e150ac1b2e21293711e62f18.exe 82 PID 4220 wrote to memory of 4300 4220 skotes.exe 87 PID 4220 wrote to memory of 4300 4220 skotes.exe 87 PID 4220 wrote to memory of 4300 4220 skotes.exe 87 PID 4220 wrote to memory of 3520 4220 skotes.exe 90 PID 4220 wrote to memory of 3520 4220 skotes.exe 90 PID 4220 wrote to memory of 3520 4220 skotes.exe 90 PID 4220 wrote to memory of 2712 4220 skotes.exe 92 PID 4220 wrote to memory of 2712 4220 skotes.exe 92 PID 4220 wrote to memory of 2712 4220 skotes.exe 92 PID 4220 wrote to memory of 3488 4220 skotes.exe 93 PID 4220 wrote to memory of 3488 4220 skotes.exe 93 PID 4220 wrote to memory of 3488 4220 skotes.exe 93 PID 4220 wrote to memory of 1808 4220 skotes.exe 94 PID 4220 wrote to memory of 1808 4220 skotes.exe 94 PID 4220 wrote to memory of 1808 4220 skotes.exe 94 PID 4220 wrote to memory of 1868 4220 skotes.exe 96 PID 4220 wrote to memory of 1868 4220 skotes.exe 96 PID 4220 wrote to memory of 1868 4220 skotes.exe 96 PID 1868 wrote to memory of 3552 1868 8f1e48acd0.exe 97 PID 1868 wrote to memory of 3552 1868 8f1e48acd0.exe 97 PID 1868 wrote to memory of 3552 1868 8f1e48acd0.exe 97 PID 1868 wrote to memory of 2828 1868 8f1e48acd0.exe 100 PID 1868 wrote to memory of 2828 1868 8f1e48acd0.exe 100 PID 1868 wrote to memory of 2828 1868 8f1e48acd0.exe 100 PID 1868 wrote to memory of 4568 1868 8f1e48acd0.exe 102 PID 1868 wrote to memory of 4568 1868 8f1e48acd0.exe 102 PID 1868 wrote to memory of 4568 1868 8f1e48acd0.exe 102 PID 1868 wrote to memory of 2980 1868 8f1e48acd0.exe 104 PID 1868 wrote to memory of 2980 1868 8f1e48acd0.exe 104 PID 1868 wrote to memory of 2980 1868 8f1e48acd0.exe 104 PID 4220 wrote to memory of 2820 4220 skotes.exe 106 PID 4220 wrote to memory of 2820 4220 skotes.exe 106 PID 4220 wrote to memory of 2820 4220 skotes.exe 106 PID 1868 wrote to memory of 1672 1868 8f1e48acd0.exe 107 PID 1868 wrote to memory of 1672 1868 8f1e48acd0.exe 107 PID 1868 wrote to memory of 1672 1868 8f1e48acd0.exe 107 PID 1868 wrote to memory of 4128 1868 8f1e48acd0.exe 109 PID 1868 wrote to memory of 4128 1868 8f1e48acd0.exe 109 PID 4128 wrote to memory of 4512 4128 firefox.exe 110 PID 4128 wrote to memory of 4512 4128 firefox.exe 110 PID 4128 wrote to memory of 4512 4128 firefox.exe 110 PID 4128 wrote to memory of 4512 4128 firefox.exe 110 PID 4128 wrote to memory of 4512 4128 firefox.exe 110 PID 4128 wrote to memory of 4512 4128 firefox.exe 110 PID 4128 wrote to memory of 4512 4128 firefox.exe 110 PID 4128 wrote to memory of 4512 4128 firefox.exe 110 PID 4128 wrote to memory of 4512 4128 firefox.exe 110 PID 4128 wrote to memory of 4512 4128 firefox.exe 110 PID 4128 wrote to memory of 4512 4128 firefox.exe 110 PID 4512 wrote to memory of 2944 4512 firefox.exe 111 PID 4512 wrote to memory of 2944 4512 firefox.exe 111 PID 4512 wrote to memory of 2944 4512 firefox.exe 111 PID 4512 wrote to memory of 2944 4512 firefox.exe 111 PID 4512 wrote to memory of 2944 4512 firefox.exe 111 PID 4512 wrote to memory of 2944 4512 firefox.exe 111 PID 4512 wrote to memory of 2944 4512 firefox.exe 111 PID 4512 wrote to memory of 2944 4512 firefox.exe 111 PID 4512 wrote to memory of 2944 4512 firefox.exe 111 PID 4512 wrote to memory of 2944 4512 firefox.exe 111 PID 4512 wrote to memory of 2944 4512 firefox.exe 111 PID 4512 wrote to memory of 2944 4512 firefox.exe 111 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\b40bca0264f21f6ad389319dd05a41d8168a8ac3e150ac1b2e21293711e62f18.exe"C:\Users\Admin\AppData\Local\Temp\b40bca0264f21f6ad389319dd05a41d8168a8ac3e150ac1b2e21293711e62f18.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Users\Admin\AppData\Local\Temp\1010117001\b2eb139b19.exe"C:\Users\Admin\AppData\Local\Temp\1010117001\b2eb139b19.exe"3⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4300
-
-
C:\Users\Admin\AppData\Local\Temp\1010118001\c12ec72af4.exe"C:\Users\Admin\AppData\Local\Temp\1010118001\c12ec72af4.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3520 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3520 -s 17044⤵
- Program crash
PID:5192
-
-
-
C:\Users\Admin\AppData\Local\Temp\1010119001\306af33eda.exe"C:\Users\Admin\AppData\Local\Temp\1010119001\306af33eda.exe"3⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2712
-
-
C:\Users\Admin\AppData\Local\Temp\1010120001\4848fdaa80.exe"C:\Users\Admin\AppData\Local\Temp\1010120001\4848fdaa80.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3488
-
-
C:\Users\Admin\AppData\Local\Temp\1010121001\a4ee149ec0.exe"C:\Users\Admin\AppData\Local\Temp\1010121001\a4ee149ec0.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1808
-
-
C:\Users\Admin\AppData\Local\Temp\1010122001\8f1e48acd0.exe"C:\Users\Admin\AppData\Local\Temp\1010122001\8f1e48acd0.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3552
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2828
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4568
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2980
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1672
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2016 -parentBuildID 20240401114208 -prefsHandle 1948 -prefMapHandle 1940 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {42b4c27b-4cb1-4332-8512-5a9d400b5bc8} 4512 "\\.\pipe\gecko-crash-server-pipe.4512" gpu6⤵PID:2944
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2452 -parentBuildID 20240401114208 -prefsHandle 2444 -prefMapHandle 2432 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2f9c1ba1-d846-45f7-bca9-4ead49346b95} 4512 "\\.\pipe\gecko-crash-server-pipe.4512" socket6⤵PID:2864
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2992 -childID 1 -isForBrowser -prefsHandle 3092 -prefMapHandle 2996 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1276 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {de5138e8-e889-4e4e-afaf-9a9b78279811} 4512 "\\.\pipe\gecko-crash-server-pipe.4512" tab6⤵PID:1600
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3944 -childID 2 -isForBrowser -prefsHandle 3936 -prefMapHandle 3932 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1276 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b4859607-e259-43a9-827e-91d1b2704b11} 4512 "\\.\pipe\gecko-crash-server-pipe.4512" tab6⤵PID:3228
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4904 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4896 -prefMapHandle 4892 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8dd7b2ac-acb5-4a16-9c8c-3bf395127649} 4512 "\\.\pipe\gecko-crash-server-pipe.4512" utility6⤵
- Checks processor information in registry
PID:5372
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5368 -childID 3 -isForBrowser -prefsHandle 5352 -prefMapHandle 5364 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1276 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {aec6beb5-0068-40db-aad2-187b736877c2} 4512 "\\.\pipe\gecko-crash-server-pipe.4512" tab6⤵PID:6128
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5520 -childID 4 -isForBrowser -prefsHandle 5508 -prefMapHandle 5512 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1276 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c7252cbc-9e6e-43b0-8c6b-359705a57189} 4512 "\\.\pipe\gecko-crash-server-pipe.4512" tab6⤵PID:4176
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5724 -childID 5 -isForBrowser -prefsHandle 5736 -prefMapHandle 5680 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1276 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5a2cbf1b-914e-4501-b6ad-0dce834986a0} 4512 "\\.\pipe\gecko-crash-server-pipe.4512" tab6⤵PID:208
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1010123001\a875273a7c.exe"C:\Users\Admin\AppData\Local\Temp\1010123001\a875273a7c.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2820
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3520 -ip 35201⤵PID:5164
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5424
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5136
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\85mw8mk9.default-release\activity-stream.discovery_stream.json
Filesize25KB
MD503fc38b4a327829cd102b2d8ef688efe
SHA15151b6d3c01e77fb74147f393c32bafb99f0b283
SHA25648ebed6fec87df771f639ad1486c345d3c35a04913cc510cd3568018421719df
SHA512912fb90241c3a696c343e226c0123cf74ae61cac7d6f6b2d34e1e112c8001ca2abe73a663494ff85a17020e448c20c8570c5729b64a0ecc8831ba868e14f24c2
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\85mw8mk9.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD52ab0a55302d4cc3feb36461ca64fb15d
SHA1a0d38a375b0af6320f110e1e9e30570f858400f8
SHA2563898ffcc2db19edaaf83bd066c674e89385801d95f42892e82463e092eeeae05
SHA5123a09e9958d99d71536c4091ee7789aa7d29b219e728fc3bc5e76feb6d93183bdd228ad5364a8eb35946c5703897f1c7c8de05765c2701e2d37ae6b263cf8186f
-
Filesize
4.2MB
MD51b96333c2d7e969db19e45499acb382c
SHA18ff935a94398d47b48cd091ac6e3a31d5f42d021
SHA2567a6b35bfb0a9f57bbffafa55781d2756a63e25d16657d4a7ac06d8306828fa77
SHA51269e035a4b5722072386494310da0039ef96ea1ad61bd6363a2565f9a1b23d4d85e9ce1ea2fa0849a0fc92784a85683ef215009aa1014ede5dc599213b6943ef4
-
Filesize
1.9MB
MD527fe8931f28d9eee4d064e9f0b40ad86
SHA1d69b65a01ce308f68d9826e9d14058ebbb2d54d7
SHA2568cc79dc1775bd6cf9a5b5f9378801b3e53cdb3080e0d650fcb1a920c81282d2a
SHA5121c099d690f970bf7ece4dd849525eec25dfd17bea7c376da40683dbb48a7aa06d4921101e77b6149a08d658834ab508a2c7523e37f191e1d7f631734fc8d7711
-
Filesize
4.2MB
MD5479e479e9b6da43b7f537bebf11f215a
SHA11be500489d22ac87e3145aae783a73ce86c826f9
SHA256380e32141a4dcc32fbec3c561395a1b2ed5e11aefb2d5e2f567533cd2ac93129
SHA51258315197398a6d6b996cd0f85ec285d3278e19ce938567348dd5a0d3636899b392043d008433c3e29a0233a8ff0e8abc46a4b87e70c27eb4ef9821919e3b9981
-
Filesize
1.8MB
MD51762da739387a4d17fe8cc7145e35b88
SHA14b595b0b0f34485910adac82907fcac664ba35a6
SHA2566edffa2f937dec4542b31e8d544e3bdae845a046b7a7e33006b5fbc9ffef18de
SHA5125fd84b69b62044c9a1c389f075f6f823899bd85ea018b065880b6f8b7676a1c97fa9c4958dd476314cd77aa6f3d96a0becea466b003a3cc46db0296a536f2734
-
Filesize
1.7MB
MD5393f5ee48f2ae353b9a4adcc51cb789f
SHA1f522e95e1d96015019e5af3de8da8cecbaee8f68
SHA25659c47a02f630bcdabbb284a05d486479e7e507d9510e246d2c4bc48ad49984bf
SHA512e19a4831ee81a4df5ff75c5000cdd6f2f30e0433afb6f008f45916e838030cad1867e4f55d5a15092fe51e87fb64263fe97fcb3c3f6eb0681ae7d8fcf4968aae
-
Filesize
900KB
MD59cefa135cb65682c3de55fc0de1f2885
SHA16f5569eb25405687297b5a6b0f519440ca3bb497
SHA256dbe1411756eac00edeb1bb952bf7e76e73db0984d7ee881c00a773a90ca1a64a
SHA5121111ea290c1ab1380650432815e00baff6fb83f1631b0c61c34ce96fafe5d2a64de90adf4a38540974d1788928d3d702094253d2fe3712fec2f814bd46e3750a
-
Filesize
2.7MB
MD58ae897f5e66bd28f031b43ac4b58e322
SHA170d2fd9ee78145715da4a6d6fb5132b184a1ad28
SHA2568f27938095cae53183677c487e3b2930e3e8f4df3a95a3b43b1586cc15a7eb70
SHA51272daf56d09cbf924329d2ea0ebbb53347be3e7e84f77d2e6e3f959151a1a1d40b5eb45098d5bff73b432c22ad95bca0ae3b034ddb6ac19e062e38721388696d2
-
Filesize
1.8MB
MD5f0ecf1a8076890546c2210d5373f498a
SHA11997eb844617f4770b81cf3c0ff9cefbdc401853
SHA256b40bca0264f21f6ad389319dd05a41d8168a8ac3e150ac1b2e21293711e62f18
SHA5125e0debf6e8a8f8747644bc6bd58ecbd01f6db52f8271d56b1b1f832fb9d201329cf54534316ca9fdd290044236a7b15a5468f2353ad079531a55910587e95a01
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\AlternateServices.bin
Filesize6KB
MD584a81bb55ca1374de2028f5b2eee155f
SHA1a5a3251335bd132a6d10a0271c03544105e06d79
SHA25678b5d9b0f2c54a63886c9b45bc5301f62b7e2076441fca56f9e53dc2ca3c8191
SHA512cadfae44f7709c8f672007c0065120bfe720431fcd776cab35d99d8beef818897a0a87fec95404a2f2ec4c320bd697a512188a9dfd4ac9a6bcff845db6440990
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\AlternateServices.bin
Filesize8KB
MD5ef7987f75aa8f40426bcab87ee11fdcd
SHA11121753f880cda34e935a701b0289e6203abbea3
SHA2563d210ff8186fe824c3a5654d070b496c88cbdecff7d98b448449ceb14556b8f2
SHA5122f93f7e0093a2a5244ff5cd09da446ef319394c3f3e56b7a22c08248017e5acd904393c8d76878eb6736293c2b7acb1e26d45b728c165cbf01cc4477b9a52302
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp
Filesize23KB
MD508586ab011d492866c5c8dd6f4508388
SHA1eb25303d6217ca9de9a9c540e7729b4b75f2d03b
SHA25639d446dbcbe768b33cb6941ef8bd08b198b92cefd56371ca93118c0c3a0c571f
SHA512c550a841c5f23e206be3a0967a03777e62842ba4cb078b2be3a462775b6788fc86d40e5e96c358a35f6d679a456bd2d9afd27e6cbf2439ad9c44d6369fdf722a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD5e584eee200aff2047ec2c3220c338801
SHA1f2ffe674b8c873ef32b45d25eee2c91d7ae6bb40
SHA256e7b4f83d0858aa10297ef82e7c451b84dba488fd61aa56f6d500a861fbae9d6e
SHA512a6b46e36be4ec283b8c284a4744807617c97cb9eeca5ec4066e9dbb390cac4c974de06b391dd363c1a886f7f111315e7db9da69cc0d293284e64f7c83672fc41
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD56e3eb080396fccf110a22c6cdb0948ec
SHA10e3402485dcc87b22d9d7b61d5d5c85300273d47
SHA256e87afe180ee8f8cbb0a349f3aa1a965cdec34ae834e7ac8dd3b09ce0c1ed5c15
SHA512f6349f0495b843acb26efe551461c8a87deb46ac1d61b8787d0393d7ec7738eb33dba9e1cee8883bb33e57d02fb5c90b3c6b5117b47a91222150d3235387192e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD578cf72e0874790544939818740eb6a3d
SHA16f9e149640afa2ec044ddcd3ef0a2ac962172280
SHA2569a9c6b792681fc54000e71d6bd8d1028427ecd93953ade5a6f461f5add0309d1
SHA512f31ab42ea92cd7a1b96cfb8bab6ba73cbb5dfb545566a21bfc8aca2697dcbd0cb4eb4fb899f3d6433235ea49287397adc7d207843f8cee34ab60c6871531401a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\pending_pings\4fb26ede-4431-4f02-984c-ead05bb340ef
Filesize659B
MD59e4b8673ca89590b0dbeac06898477b1
SHA13f57037feec687dab6424b3292a757cf98a6b9cf
SHA256ebb1e4b370849f890b297398ffdaa128040be0e1073cb5448982143b4afd9943
SHA512d18c5f1c79986ce267e42163ad709860b2ad987c0ae2267dd5bf7c3a97b9e1f63a70912282259ecd9d6c02bbc01c7f5b961779a591599355b6782babfd912fb7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\pending_pings\e4b31906-33ee-40dc-8526-ba8e984f029f
Filesize982B
MD5b0c486b256627bb3c5e47bf7b91a71f0
SHA1694f31fe2d9d883b60c14ad42e9465fdb9638eea
SHA256b2540731fc099cb2f84aadae74a494654b0e6bba4d6903ada2feb026e9ae8a43
SHA51270496126f08fa5d6c54e7cffd0f3014a1868859ef69987b338f34b75e9e018437e71dc167267fa2f5bce574892db351a4a07567810e0bd6d394b9b20867ec488
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
15KB
MD5e51d411893bdf140a0d1863eb02ede94
SHA1a7c662ab37e77b9db64289ae7419131e8ef693ed
SHA256d42bde34dcfa413f33fdb5027d5313571975ee1cf2b6abc0100e8e1227e2597f
SHA51256ea0a4bacb18ff5bbcee73013740143114cd9dcc9cc4bf07027b76f25531974976dca54e79ea29e0ddee10a3abc3e954f67a98bd4dab21d9c11a1c22e0408fe
-
Filesize
10KB
MD5b0ce7d214a38da63e965b53e47f5ecd3
SHA15bfab5c5a576acbfd2fc6c1b2e72a12f0840395b
SHA2563b7259f20b52788e93d20e0a581eed99a11807da0b2e4ad6925a5c329fb451ea
SHA512cde049943b239bffd25c099eb5b671c553404441ad87f7a9ef0a4d1edd7b96dca9ceb928b228bb11f9aad493382040f366494f9ceeccd9b8f9eb0fed6c3aa53f
-
Filesize
10KB
MD58cdc6702c4362d15487adcb1778e8507
SHA14cf702d981d0993b0fc5bf7bbe60a6980dca4de6
SHA25646b02e83570b2a799a8364f99465c19c7bdaa262da2abadd2c625dfcaea464d7
SHA5128dc8b3a04538a1b25fc8b0aa1c1f1b00ad1c83f7adca9d570ac91306301e5f30e7e33f2342d84fa3a0a592e6dc6a1e19d335bbb5d187d7f85c47fdb5736c739b
-
Filesize
11KB
MD54b2db66165ac9328fb8e24191087ed3b
SHA1007b9ac22b4947529ff6f97e215851756935e004
SHA256b92d79d18c58428738b156a557a51ac0219beacf68e0cb3aed6821a02f1bfa2a
SHA51220aa702b020b9ed9b4f1b5bbe3787b8cfd1be8d7b8a46b694009546a569213db796ff3f16d7e65da74eaada450c5decd391ddc88deffb25ca5d13251dde8dafc