Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 17:41
Static task
static1
Behavioral task
behavioral1
Sample
80ea1e48313acf9319d608d3afe7733cd466d8451ad89b61c4b09c0f7c0764a2.exe
Resource
win7-20240708-en
General
-
Target
80ea1e48313acf9319d608d3afe7733cd466d8451ad89b61c4b09c0f7c0764a2.exe
-
Size
1.9MB
-
MD5
7d31fad9b219d539d3c5915dff14a669
-
SHA1
dbe2d2eb17f70be6e9646e56c3a0085fe434988e
-
SHA256
80ea1e48313acf9319d608d3afe7733cd466d8451ad89b61c4b09c0f7c0764a2
-
SHA512
9124347d0f83df486ec445af499b2aa7b01b6a1c4a58d3bfa514988d3593144ccccc25a578908b1fa242389229eeffdb075cd65d45043a8ca74d3663e9adcd9e
-
SSDEEP
24576:rS8nJgJ1C6crpULN+/lCHyXKTD0eja0Qtp5sjH9NWtlJl8XPBP4My9GdOTcc4Fq:rOJKK8/lCH/T3alLshNWzJlL7bTs
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
drum
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 7e55f6080a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 7e55f6080a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 7e55f6080a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 7e55f6080a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 7e55f6080a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 7e55f6080a.exe -
Stealc family
-
Enumerates VirtualBox registry keys 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF b956271170.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF 4ff8d73610.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 80ea1e48313acf9319d608d3afe7733cd466d8451ad89b61c4b09c0f7c0764a2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b956271170.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4ff8d73610.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 946cd7a73c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e091f02b50.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1d10296ffa.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7e55f6080a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 20 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1d10296ffa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7e55f6080a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b956271170.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 80ea1e48313acf9319d608d3afe7733cd466d8451ad89b61c4b09c0f7c0764a2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e091f02b50.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1d10296ffa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 946cd7a73c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 946cd7a73c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4ff8d73610.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4ff8d73610.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 80ea1e48313acf9319d608d3afe7733cd466d8451ad89b61c4b09c0f7c0764a2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b956271170.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e091f02b50.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7e55f6080a.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 80ea1e48313acf9319d608d3afe7733cd466d8451ad89b61c4b09c0f7c0764a2.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 10 IoCs
pid Process 5012 skotes.exe 636 b956271170.exe 1648 946cd7a73c.exe 3792 4ff8d73610.exe 4124 e091f02b50.exe 4560 1d10296ffa.exe 460 ccc6f3f1ac.exe 4320 7e55f6080a.exe 5824 skotes.exe 2724 skotes.exe -
Identifies Wine through registry keys 2 TTPs 10 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 7e55f6080a.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 80ea1e48313acf9319d608d3afe7733cd466d8451ad89b61c4b09c0f7c0764a2.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 946cd7a73c.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 1d10296ffa.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine b956271170.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 4ff8d73610.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine e091f02b50.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 7e55f6080a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 7e55f6080a.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ccc6f3f1ac.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010730001\\ccc6f3f1ac.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\7e55f6080a.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010731001\\7e55f6080a.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e091f02b50.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010728001\\e091f02b50.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\1d10296ffa.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010729001\\1d10296ffa.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000a000000023b9f-116.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
pid Process 2160 80ea1e48313acf9319d608d3afe7733cd466d8451ad89b61c4b09c0f7c0764a2.exe 5012 skotes.exe 636 b956271170.exe 1648 946cd7a73c.exe 3792 4ff8d73610.exe 4124 e091f02b50.exe 4560 1d10296ffa.exe 4320 7e55f6080a.exe 5824 skotes.exe 2724 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 80ea1e48313acf9319d608d3afe7733cd466d8451ad89b61c4b09c0f7c0764a2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e091f02b50.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1d10296ffa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b956271170.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4ff8d73610.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 80ea1e48313acf9319d608d3afe7733cd466d8451ad89b61c4b09c0f7c0764a2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7e55f6080a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 946cd7a73c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ccc6f3f1ac.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 1508 taskkill.exe 4160 taskkill.exe 912 taskkill.exe 3588 taskkill.exe 5008 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 2160 80ea1e48313acf9319d608d3afe7733cd466d8451ad89b61c4b09c0f7c0764a2.exe 2160 80ea1e48313acf9319d608d3afe7733cd466d8451ad89b61c4b09c0f7c0764a2.exe 5012 skotes.exe 5012 skotes.exe 636 b956271170.exe 636 b956271170.exe 636 b956271170.exe 636 b956271170.exe 636 b956271170.exe 636 b956271170.exe 636 b956271170.exe 636 b956271170.exe 636 b956271170.exe 636 b956271170.exe 1648 946cd7a73c.exe 1648 946cd7a73c.exe 3792 4ff8d73610.exe 3792 4ff8d73610.exe 3792 4ff8d73610.exe 3792 4ff8d73610.exe 3792 4ff8d73610.exe 3792 4ff8d73610.exe 3792 4ff8d73610.exe 3792 4ff8d73610.exe 3792 4ff8d73610.exe 3792 4ff8d73610.exe 4124 e091f02b50.exe 4124 e091f02b50.exe 4560 1d10296ffa.exe 4560 1d10296ffa.exe 460 ccc6f3f1ac.exe 460 ccc6f3f1ac.exe 4320 7e55f6080a.exe 4320 7e55f6080a.exe 460 ccc6f3f1ac.exe 460 ccc6f3f1ac.exe 4320 7e55f6080a.exe 4320 7e55f6080a.exe 4320 7e55f6080a.exe 5824 skotes.exe 5824 skotes.exe 2724 skotes.exe 2724 skotes.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 4160 taskkill.exe Token: SeDebugPrivilege 912 taskkill.exe Token: SeDebugPrivilege 3588 taskkill.exe Token: SeDebugPrivilege 5008 taskkill.exe Token: SeDebugPrivilege 1508 taskkill.exe Token: SeDebugPrivilege 4564 firefox.exe Token: SeDebugPrivilege 4564 firefox.exe Token: SeDebugPrivilege 4320 7e55f6080a.exe -
Suspicious use of FindShellTrayWindow 32 IoCs
pid Process 460 ccc6f3f1ac.exe 460 ccc6f3f1ac.exe 460 ccc6f3f1ac.exe 460 ccc6f3f1ac.exe 460 ccc6f3f1ac.exe 460 ccc6f3f1ac.exe 460 ccc6f3f1ac.exe 4564 firefox.exe 4564 firefox.exe 4564 firefox.exe 4564 firefox.exe 4564 firefox.exe 4564 firefox.exe 4564 firefox.exe 4564 firefox.exe 4564 firefox.exe 4564 firefox.exe 4564 firefox.exe 4564 firefox.exe 4564 firefox.exe 4564 firefox.exe 4564 firefox.exe 4564 firefox.exe 4564 firefox.exe 4564 firefox.exe 4564 firefox.exe 4564 firefox.exe 4564 firefox.exe 460 ccc6f3f1ac.exe 460 ccc6f3f1ac.exe 460 ccc6f3f1ac.exe 460 ccc6f3f1ac.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 460 ccc6f3f1ac.exe 460 ccc6f3f1ac.exe 460 ccc6f3f1ac.exe 460 ccc6f3f1ac.exe 460 ccc6f3f1ac.exe 460 ccc6f3f1ac.exe 460 ccc6f3f1ac.exe 4564 firefox.exe 4564 firefox.exe 4564 firefox.exe 4564 firefox.exe 4564 firefox.exe 4564 firefox.exe 4564 firefox.exe 4564 firefox.exe 4564 firefox.exe 4564 firefox.exe 4564 firefox.exe 4564 firefox.exe 4564 firefox.exe 4564 firefox.exe 4564 firefox.exe 4564 firefox.exe 4564 firefox.exe 4564 firefox.exe 4564 firefox.exe 4564 firefox.exe 460 ccc6f3f1ac.exe 460 ccc6f3f1ac.exe 460 ccc6f3f1ac.exe 460 ccc6f3f1ac.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4564 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2160 wrote to memory of 5012 2160 80ea1e48313acf9319d608d3afe7733cd466d8451ad89b61c4b09c0f7c0764a2.exe 83 PID 2160 wrote to memory of 5012 2160 80ea1e48313acf9319d608d3afe7733cd466d8451ad89b61c4b09c0f7c0764a2.exe 83 PID 2160 wrote to memory of 5012 2160 80ea1e48313acf9319d608d3afe7733cd466d8451ad89b61c4b09c0f7c0764a2.exe 83 PID 5012 wrote to memory of 636 5012 skotes.exe 85 PID 5012 wrote to memory of 636 5012 skotes.exe 85 PID 5012 wrote to memory of 636 5012 skotes.exe 85 PID 5012 wrote to memory of 1648 5012 skotes.exe 86 PID 5012 wrote to memory of 1648 5012 skotes.exe 86 PID 5012 wrote to memory of 1648 5012 skotes.exe 86 PID 5012 wrote to memory of 3792 5012 skotes.exe 95 PID 5012 wrote to memory of 3792 5012 skotes.exe 95 PID 5012 wrote to memory of 3792 5012 skotes.exe 95 PID 5012 wrote to memory of 4124 5012 skotes.exe 100 PID 5012 wrote to memory of 4124 5012 skotes.exe 100 PID 5012 wrote to memory of 4124 5012 skotes.exe 100 PID 5012 wrote to memory of 4560 5012 skotes.exe 103 PID 5012 wrote to memory of 4560 5012 skotes.exe 103 PID 5012 wrote to memory of 4560 5012 skotes.exe 103 PID 5012 wrote to memory of 460 5012 skotes.exe 105 PID 5012 wrote to memory of 460 5012 skotes.exe 105 PID 5012 wrote to memory of 460 5012 skotes.exe 105 PID 460 wrote to memory of 4160 460 ccc6f3f1ac.exe 106 PID 460 wrote to memory of 4160 460 ccc6f3f1ac.exe 106 PID 460 wrote to memory of 4160 460 ccc6f3f1ac.exe 106 PID 460 wrote to memory of 912 460 ccc6f3f1ac.exe 108 PID 460 wrote to memory of 912 460 ccc6f3f1ac.exe 108 PID 460 wrote to memory of 912 460 ccc6f3f1ac.exe 108 PID 460 wrote to memory of 3588 460 ccc6f3f1ac.exe 110 PID 460 wrote to memory of 3588 460 ccc6f3f1ac.exe 110 PID 460 wrote to memory of 3588 460 ccc6f3f1ac.exe 110 PID 460 wrote to memory of 5008 460 ccc6f3f1ac.exe 112 PID 460 wrote to memory of 5008 460 ccc6f3f1ac.exe 112 PID 460 wrote to memory of 5008 460 ccc6f3f1ac.exe 112 PID 460 wrote to memory of 1508 460 ccc6f3f1ac.exe 114 PID 460 wrote to memory of 1508 460 ccc6f3f1ac.exe 114 PID 460 wrote to memory of 1508 460 ccc6f3f1ac.exe 114 PID 460 wrote to memory of 1528 460 ccc6f3f1ac.exe 116 PID 460 wrote to memory of 1528 460 ccc6f3f1ac.exe 116 PID 1528 wrote to memory of 4564 1528 firefox.exe 117 PID 1528 wrote to memory of 4564 1528 firefox.exe 117 PID 1528 wrote to memory of 4564 1528 firefox.exe 117 PID 1528 wrote to memory of 4564 1528 firefox.exe 117 PID 1528 wrote to memory of 4564 1528 firefox.exe 117 PID 1528 wrote to memory of 4564 1528 firefox.exe 117 PID 1528 wrote to memory of 4564 1528 firefox.exe 117 PID 1528 wrote to memory of 4564 1528 firefox.exe 117 PID 1528 wrote to memory of 4564 1528 firefox.exe 117 PID 1528 wrote to memory of 4564 1528 firefox.exe 117 PID 1528 wrote to memory of 4564 1528 firefox.exe 117 PID 4564 wrote to memory of 4324 4564 firefox.exe 119 PID 4564 wrote to memory of 4324 4564 firefox.exe 119 PID 4564 wrote to memory of 4324 4564 firefox.exe 119 PID 4564 wrote to memory of 4324 4564 firefox.exe 119 PID 4564 wrote to memory of 4324 4564 firefox.exe 119 PID 4564 wrote to memory of 4324 4564 firefox.exe 119 PID 4564 wrote to memory of 4324 4564 firefox.exe 119 PID 4564 wrote to memory of 4324 4564 firefox.exe 119 PID 4564 wrote to memory of 4324 4564 firefox.exe 119 PID 4564 wrote to memory of 4324 4564 firefox.exe 119 PID 4564 wrote to memory of 4324 4564 firefox.exe 119 PID 4564 wrote to memory of 4324 4564 firefox.exe 119 PID 4564 wrote to memory of 4324 4564 firefox.exe 119 PID 4564 wrote to memory of 4324 4564 firefox.exe 119 PID 4564 wrote to memory of 4324 4564 firefox.exe 119 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\80ea1e48313acf9319d608d3afe7733cd466d8451ad89b61c4b09c0f7c0764a2.exe"C:\Users\Admin\AppData\Local\Temp\80ea1e48313acf9319d608d3afe7733cd466d8451ad89b61c4b09c0f7c0764a2.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Users\Admin\AppData\Local\Temp\1010725001\b956271170.exe"C:\Users\Admin\AppData\Local\Temp\1010725001\b956271170.exe"3⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:636
-
-
C:\Users\Admin\AppData\Local\Temp\1010726001\946cd7a73c.exe"C:\Users\Admin\AppData\Local\Temp\1010726001\946cd7a73c.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1648
-
-
C:\Users\Admin\AppData\Local\Temp\1010727001\4ff8d73610.exe"C:\Users\Admin\AppData\Local\Temp\1010727001\4ff8d73610.exe"3⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3792
-
-
C:\Users\Admin\AppData\Local\Temp\1010728001\e091f02b50.exe"C:\Users\Admin\AppData\Local\Temp\1010728001\e091f02b50.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4124
-
-
C:\Users\Admin\AppData\Local\Temp\1010729001\1d10296ffa.exe"C:\Users\Admin\AppData\Local\Temp\1010729001\1d10296ffa.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4560
-
-
C:\Users\Admin\AppData\Local\Temp\1010730001\ccc6f3f1ac.exe"C:\Users\Admin\AppData\Local\Temp\1010730001\ccc6f3f1ac.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:460 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4160
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:912
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3588
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5008
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1508
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1984 -parentBuildID 20240401114208 -prefsHandle 1900 -prefMapHandle 1892 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5448fc26-39fe-41c7-b40b-e7f07d1fe4c6} 4564 "\\.\pipe\gecko-crash-server-pipe.4564" gpu6⤵PID:4324
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2468 -parentBuildID 20240401114208 -prefsHandle 2440 -prefMapHandle 2436 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {84b62d4c-2c5e-4573-bfbc-d981923728f1} 4564 "\\.\pipe\gecko-crash-server-pipe.4564" socket6⤵PID:4364
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3144 -childID 1 -isForBrowser -prefsHandle 2664 -prefMapHandle 2684 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1200 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d51950e9-146d-44d4-b32b-b816c6a1d385} 4564 "\\.\pipe\gecko-crash-server-pipe.4564" tab6⤵PID:912
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3028 -childID 2 -isForBrowser -prefsHandle 3800 -prefMapHandle 2796 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1200 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1dc9cac7-0f14-4fe9-a68a-c5b1248bb3a1} 4564 "\\.\pipe\gecko-crash-server-pipe.4564" tab6⤵PID:924
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4752 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4876 -prefMapHandle 4872 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cbbd782a-22e0-43bc-a9e8-a46ce30655c4} 4564 "\\.\pipe\gecko-crash-server-pipe.4564" utility6⤵
- Checks processor information in registry
PID:5644
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5412 -childID 3 -isForBrowser -prefsHandle 5020 -prefMapHandle 4764 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 1200 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6f69e29a-c402-4c87-9962-6741db70bd64} 4564 "\\.\pipe\gecko-crash-server-pipe.4564" tab6⤵PID:2972
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5692 -childID 4 -isForBrowser -prefsHandle 5412 -prefMapHandle 5552 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 1200 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e4cf7227-0152-4c8d-8d3e-dcc0643efce4} 4564 "\\.\pipe\gecko-crash-server-pipe.4564" tab6⤵PID:3316
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5868 -childID 5 -isForBrowser -prefsHandle 5944 -prefMapHandle 5940 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 1200 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6947e298-0ab1-4dbc-91ad-518c3c105247} 4564 "\\.\pipe\gecko-crash-server-pipe.4564" tab6⤵PID:3232
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1010731001\7e55f6080a.exe"C:\Users\Admin\AppData\Local\Temp\1010731001\7e55f6080a.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4320
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5824
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2724
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
3Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\activity-stream.discovery_stream.json.tmp
Filesize19KB
MD5dd81abe4152cdf18d46fdda04d852f5d
SHA1280b6722b4937fe2b2d1186b5c2952a06dfe6849
SHA256846530e0afe4fd78362d2bf35fb74150c533961eaf2906b8a0e724d3f5369187
SHA51221c46fd1ea3597db748d70f12247c5e8587d2ec93bea534c367f53d0b5d3d1288f5e8822ad9e553a75316f65a90ecd38a4237554d02eff4e6b9dea86a2f10245
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD5f2c316a71ef35c7c19242be27be65249
SHA156b8cd1888394680d6b7ea99dd5a32ebdce8a27f
SHA25635b26d88a62fa81c8307556095b98ec5bd8a50eed878808dfade85b97620ed89
SHA51223a1cfe162af8f8e74c42d84348023df6fba8047cb81232c8e9280ffea85d8a687812c16d0648088fb66acd83b0666a9af337b7a71fae1fb8441e97b8c6f7ba3
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD59d2769fe6093059408a05905ab80292e
SHA1d1329757e2fd41b13727b5a9a3c9df6213d5b40e
SHA256390174956b5c4d19b54b51e2355f081079aae8e9742d33970347667cbd251ef2
SHA512e5ef19e8064139ca5560a5d7a063f1f37cc8335fbe56751ebd88ceab31e99a92def18807283da646ae6d816b98bc87b0703b4d6286017106a9f4dd4c8af6dca8
-
Filesize
4.2MB
MD5af59ea0ff52e494d6f0be2ea927d5a7e
SHA1648c747d05045e41a9b817f501c704fb07f34bb4
SHA256811ba3d8b98f27898dc8d98f2d76bc744b0216fcd0399cb4c8c11efa649d02db
SHA51242091c89edf553405c617fb3948c78be4714c170e90e1ff62813d3e5cf430f68f4e8a1f1bfe86be5e77843aa981dff878097e760923caf87a2937137df518939
-
Filesize
1.9MB
MD524fd69187bd9cb0bfbae4c051db9e658
SHA1484e593d6f0410027ec108a670a0f2e4b112244a
SHA25631dc48b6c89b00fffa7e3377584085558cc79bec167ba7143cc75915696369e7
SHA512e4e68cdc83cd9a8601f0ba5ec4ddbd232bfb108b32486a339f49664582b5dc7e2db14dbbe5f57c8eec088081b7bd209f527f6002212955eda7dcf216bbca2a82
-
Filesize
4.3MB
MD5d069795f3849005b2905bbcfbe425141
SHA154b122f06dad6d26beddd783614e5ba2f8b73db7
SHA25655a1167770213660ff09cd2211ba5d276bc8ca8cccef2916f29274520b987614
SHA512f5a1b3f94fff9b42cf953627a5caa28b5a92444f146ace11a55079e1db7b487e050f5ee988feefa6c8afea32c0c402ef8996258f8315863905206173a60093e3
-
Filesize
1.7MB
MD5a1966b58cd8058ac37c27bf5e7606d67
SHA15ece7e3113792a96e176d8e2b9e322fdb78660f7
SHA256302285650098a68c454f2856fcdfd7de5389e4c68a2490169857bb24130ea31e
SHA512f5422a7caa9c7e96654186c935f3174a9e2badb3510fd6b245d502e160714f22efd7f058caca44e765b824f334bfeb1856843b3428f1f6b3478db0d78c7ab699
-
Filesize
1.7MB
MD564a26638c1a101af3c4ad85a6ae11537
SHA116a3e2f16c72ad6d0981e42a3211d8929f1739de
SHA256418e2a13eb16faa0651ddb9919ff458f154ef6aef71efad7917e5cd5ff89be06
SHA5125831c9fe80a8d908ca0e315c5047ed244c5a5b67144a8a0d82b805fa043e92618daaba38725eda5e76977dba3ae1a0676084f08f3cf86fcd78589901d13f948d
-
Filesize
901KB
MD5fe7501887175090a706825ffc55e0c72
SHA1d142a0339b890065c98b360237ff62fe7ea5168a
SHA2568b1e80c68e6b0d2e75a5be74bdac71c721f1366a661c9a460510ea8ce5496fd3
SHA512431649aa84e999d826571f052e728724fbca7cd78404b948825fff7d486c32cbf50d103486e4a1236a4287037e88639c9f5c3d25c7467023d95a0b60b2ec437d
-
Filesize
2.6MB
MD5e7b5e2fc0f1dd07bed145b61ff752fee
SHA1af40a3edb1f902366909fd568328476a4dbd46a8
SHA256ea23e5f63429b9016583e8ef3a0856f3676df23b3501d3035d5cebe30e7a2b78
SHA51259d08edcc07ee8b620c6f2bd226e19ef37b2126c7b173eb3df1c1d19fb7048a22b9f26ff78f0f383502861ee2b8735debbf1b3fd455b6d6230fafd8a1492effb
-
Filesize
1.9MB
MD57d31fad9b219d539d3c5915dff14a669
SHA1dbe2d2eb17f70be6e9646e56c3a0085fe434988e
SHA25680ea1e48313acf9319d608d3afe7733cd466d8451ad89b61c4b09c0f7c0764a2
SHA5129124347d0f83df486ec445af499b2aa7b01b6a1c4a58d3bfa514988d3593144ccccc25a578908b1fa242389229eeffdb075cd65d45043a8ca74d3663e9adcd9e
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\AlternateServices.bin
Filesize18KB
MD5ca1247e8d00b9650422599a64d6b8a89
SHA152545635c32e42f960c8e0c4bbe148f628c53fe3
SHA256d31bb65940b06629eb92d981eabafd5e161e72a237a053c3eb9f048fea9b0d15
SHA512e11abb36480e1347df12a0e26938c9f10d8c1b0f19bc12c5197a4b3b5577adb710654269bca57be99b9d1a93009ab47b13657fb3168f7419aa6263d6f94d558d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\AlternateServices.bin
Filesize7KB
MD509d400de35a96469af3be2d343895514
SHA1e3b1ab34b85e59601a08adb3c1bfff219172f951
SHA25658e1d77b58fbde7364c3f6670adc9a153bbe8d2958581f7a95a31591f4162cb6
SHA5128fb03f0938acd079c0de23972f509b2158d0bf0a3f30e9d8584e980acd413c5f88d76ca85f4349d175a0d16438e4be4a30b5d57d35a104968d0767c33397f9b3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\AlternateServices.bin
Filesize8KB
MD547aba99d71677d4e9302d359b5f0f72c
SHA1e272fe31bb194645499d1faec08af4328b62f8e7
SHA256fb1838b3f235a07827d73a0ec13627a4875dc3d3a760c3ac10bc010d51cbc9ef
SHA512f5e86f9e0986edcfd473ed7beb3f7a5662c7160e0a0e26b79e18247e0554a9a9706c2ce82d1a07d0571d43976ef507682bfcbff0718b330c05878060e706edc6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5461b90a0aad2da4d1acd4fce47456f71
SHA1eabd20d9bcd42c5cfe4d26624061fc896dce3c8c
SHA256218e758018f306e10ba3361fd5b95cb488a478dec60230de614817fcd1cf6d8a
SHA512a661745742d6da88d5aecf9f93325f147da2f25e837a53ddc756a9a69702bc441cf127e0c40d7b754d7879b527fb0217c4d785e21cffb225863e6a45e0ffed37
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5eb4c2b7cb3ead0ca5720be5e0ac87736
SHA1fcbfb77d7df43fcce95bbab99b58bfb860004dac
SHA2563160bd5949e423d783040777ff44e5fb4904bcb5fa78be732f34c1b7accfdea3
SHA512696e918e12ab35cb834d2b63d79cb446438d6df595eb6e313684d496fd21b65c4fcc88b64a97a2191a3ac1586a8bb5325d785350f1192c537958b9c3a506b97d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5e23e4e00a705e4602ba135f142cd00c5
SHA1bb19e7b680fc4abaef0230fc7e3bff06984ab4a0
SHA2565719e106dd5416daf69d5582b01b1b3c9d20969b0a8c6b02a7ac83e0096414fa
SHA512bfd9332ad9a768f7196a7b41aba745a521f0112c3ed86db6bc2551cb6dafb8b9a1f2727cbef7c0f5b2c9689a4bfdeb44fa21541d2b5a4bb2af008fb86882fe60
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\pending_pings\cd9214ea-7b14-459a-9ac2-a668e595923a
Filesize671B
MD55f281ada23c434658f4a844391134f95
SHA184cf8ee12e140cc3032cb3df491250dfc99b3c67
SHA256d27b59086f52db9b4110c8a2966bbc947f00e4e71b8453a9ab1a36bd5763a6aa
SHA512066d6c3f59b64d02909570d443410c1f69bbca5cefefc8681a0c4eee2c83496364baaa35fc04d67ef904317b3354d3a3349f9848edb4374069739cf4e1f1b9bf
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\pending_pings\e16e52e5-d80a-42db-9072-11cf3460becf
Filesize982B
MD5c3cf2f4858c4703f4c8bf18d9b0fb10c
SHA1938caf1c1f83caeb8bb0d69ec809f3635c0b57d6
SHA2563e4a6892a3a6295c141a497218636824b346b50b621a43852b786d45ac5a4bee
SHA5128247ad46f4a5930d77f38d81918a1458ce91703f1a9364fa6f1901b90e5e204ea2b9aecfd9be63a115bfef6e2a61cd28983347a1067097871e19e0109f6ff00e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\pending_pings\e39c7262-9b47-48e2-bed6-4a10b449f9d7
Filesize27KB
MD5ec28a4ac2720b32cbca584f36a892b41
SHA1f7809de676fa95903cccd47332669e7ddbd055f7
SHA256bf0ca04c66979489e51310b3f7c45e2fa26eabe16699a02f64a23a8f47d68153
SHA51255bded210fa4f57e5b5ec2f8ca9af50ca655a2a10fd83c5581e2fa53b34300bc8dfd38b3853025ac4a0b28e9aa2389e06e233cc48587259e2fec13cfb5864f58
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD594eec6d12062f0d6438b56d039ce1489
SHA1cbba5d67751116cdf316f3e38d20d70eb97e4a0d
SHA256fdf8b8adc4cf51bf8ca0f55c512789be4b18b7dbad8b0f19d9b3a2cf4e85f897
SHA512357e4aeafed37f1c7a29ef733513f421c25d22e6506776f69b20e1819521fe07c61f39dc7cea684646f9e4d3f659a81cffd590c3e6a4041b28c201edde3b697e
-
Filesize
10KB
MD53fb01268668510f0f6e37ab36c47dd79
SHA1af1679fec0453203120160a906ca5f7e6ab984c6
SHA256a4b697ae2297a25b91921fafbc8d9dee033a04b419a510f26338d05fd8c299b0
SHA512da54704d36e959ce58842c41e8b510d23e024f1bf2da7e290d5aa1ec244486f30569a359f1d904dd362169d98b395481b8bf8149a09c5529c6d9637428972f50
-
Filesize
10KB
MD5af092c0bca7ad69e72a6f6c8257fe646
SHA10fc9f9963a5b9d7dfb45429c8172f919a57d5ffa
SHA2560dd450d94e05d15f1c29e6e4724fa237cfe5741d0da66b6d9932f619399b8e0f
SHA5124d82c866547ab0c1e4fc2ca8d30eac4eaf665bc8401f7d5a0a52ed662bd7a9faaab381d806b8c4179f4d03a26829062c1c55b14c3fc15f045a46307111d8660b
-
Filesize
15KB
MD5bb8b03dcc088594f1ddb7d8d42cb8bc0
SHA119660d854935a06e987662a28e2e32cf62a3c4ec
SHA2564d60641f032ce0227c08e0c4014d2c345d3d753876b5f2ff47f2424b8576dccb
SHA51233cacc9154d6dba7333cbcf4a574f2149f5709833ff0c09fc9c725402a1a16702cb9c7cff29eb5ce4a009ab2928462f88d15d64e68aec8978af30f9599bcb5f3