Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2024 01:08
Static task
static1
Behavioral task
behavioral1
Sample
373ffb138b7376264a307837ef5bd51bd02380376f9fdd27350cf1b65a28bcbb.exe
Resource
win7-20241023-en
General
-
Target
373ffb138b7376264a307837ef5bd51bd02380376f9fdd27350cf1b65a28bcbb.exe
-
Size
1.8MB
-
MD5
3ca635061fa9685d799784f665850565
-
SHA1
549bb2808560d826b7be8ea502b46e3cdc101ce3
-
SHA256
373ffb138b7376264a307837ef5bd51bd02380376f9fdd27350cf1b65a28bcbb
-
SHA512
7812edb799fc4ac60c856c61ecd793fb5499ffe433c9bf60e251d4e3e9d5bb4df8d8f2873bb643036ccbb5bc611cc339ad8e8789feec3b3c5834bb72ed887792
-
SSDEEP
24576:9w/gXXZLf9FpuSVA83ZIaoOD8BR98BpLOKKxsGaC3x5MY0s9r3k7in9tFvGH:9kKpVu8pIO+D8rLOKHRQ5MYR3mV
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
drum
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4043fb2d5c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4043fb2d5c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4043fb2d5c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4043fb2d5c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4043fb2d5c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4043fb2d5c.exe -
Stealc family
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF 8b454a45af.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ae824a2156.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9b35e8cac6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 373ffb138b7376264a307837ef5bd51bd02380376f9fdd27350cf1b65a28bcbb.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8b454a45af.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6c9f1fbd6e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4043fb2d5c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ae824a2156.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4043fb2d5c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 373ffb138b7376264a307837ef5bd51bd02380376f9fdd27350cf1b65a28bcbb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8b454a45af.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ae824a2156.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9b35e8cac6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 373ffb138b7376264a307837ef5bd51bd02380376f9fdd27350cf1b65a28bcbb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6c9f1fbd6e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6c9f1fbd6e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8b454a45af.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9b35e8cac6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4043fb2d5c.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 373ffb138b7376264a307837ef5bd51bd02380376f9fdd27350cf1b65a28bcbb.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 9 IoCs
pid Process 2728 skotes.exe 32 8b454a45af.exe 1280 ae824a2156.exe 3148 6c9f1fbd6e.exe 5052 9b35e8cac6.exe 3732 e4165c7c76.exe 912 4043fb2d5c.exe 6044 skotes.exe 6048 skotes.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 6c9f1fbd6e.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 9b35e8cac6.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 4043fb2d5c.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 373ffb138b7376264a307837ef5bd51bd02380376f9fdd27350cf1b65a28bcbb.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 8b454a45af.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine ae824a2156.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4043fb2d5c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4043fb2d5c.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\4043fb2d5c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010837001\\4043fb2d5c.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\6c9f1fbd6e.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010834001\\6c9f1fbd6e.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\9b35e8cac6.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010835001\\9b35e8cac6.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e4165c7c76.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010836001\\e4165c7c76.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000023cbe-101.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 3284 373ffb138b7376264a307837ef5bd51bd02380376f9fdd27350cf1b65a28bcbb.exe 2728 skotes.exe 32 8b454a45af.exe 1280 ae824a2156.exe 3148 6c9f1fbd6e.exe 5052 9b35e8cac6.exe 912 4043fb2d5c.exe 6044 skotes.exe 6048 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 373ffb138b7376264a307837ef5bd51bd02380376f9fdd27350cf1b65a28bcbb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2704 3148 WerFault.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9b35e8cac6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ae824a2156.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6c9f1fbd6e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8b454a45af.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e4165c7c76.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4043fb2d5c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 373ffb138b7376264a307837ef5bd51bd02380376f9fdd27350cf1b65a28bcbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 1408 taskkill.exe 4896 taskkill.exe 4012 taskkill.exe 1668 taskkill.exe 3780 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 3284 373ffb138b7376264a307837ef5bd51bd02380376f9fdd27350cf1b65a28bcbb.exe 3284 373ffb138b7376264a307837ef5bd51bd02380376f9fdd27350cf1b65a28bcbb.exe 2728 skotes.exe 2728 skotes.exe 32 8b454a45af.exe 32 8b454a45af.exe 32 8b454a45af.exe 32 8b454a45af.exe 32 8b454a45af.exe 32 8b454a45af.exe 32 8b454a45af.exe 32 8b454a45af.exe 32 8b454a45af.exe 32 8b454a45af.exe 1280 ae824a2156.exe 1280 ae824a2156.exe 3148 6c9f1fbd6e.exe 3148 6c9f1fbd6e.exe 5052 9b35e8cac6.exe 5052 9b35e8cac6.exe 3732 e4165c7c76.exe 3732 e4165c7c76.exe 912 4043fb2d5c.exe 912 4043fb2d5c.exe 3732 e4165c7c76.exe 3732 e4165c7c76.exe 912 4043fb2d5c.exe 912 4043fb2d5c.exe 912 4043fb2d5c.exe 6044 skotes.exe 6044 skotes.exe 6048 skotes.exe 6048 skotes.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 3780 taskkill.exe Token: SeDebugPrivilege 1408 taskkill.exe Token: SeDebugPrivilege 4896 taskkill.exe Token: SeDebugPrivilege 4012 taskkill.exe Token: SeDebugPrivilege 1668 taskkill.exe Token: SeDebugPrivilege 4212 firefox.exe Token: SeDebugPrivilege 4212 firefox.exe Token: SeDebugPrivilege 912 4043fb2d5c.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 3284 373ffb138b7376264a307837ef5bd51bd02380376f9fdd27350cf1b65a28bcbb.exe 3732 e4165c7c76.exe 3732 e4165c7c76.exe 3732 e4165c7c76.exe 3732 e4165c7c76.exe 3732 e4165c7c76.exe 3732 e4165c7c76.exe 3732 e4165c7c76.exe 4212 firefox.exe 4212 firefox.exe 4212 firefox.exe 4212 firefox.exe 3732 e4165c7c76.exe 4212 firefox.exe 4212 firefox.exe 4212 firefox.exe 4212 firefox.exe 4212 firefox.exe 4212 firefox.exe 4212 firefox.exe 4212 firefox.exe 4212 firefox.exe 4212 firefox.exe 4212 firefox.exe 4212 firefox.exe 4212 firefox.exe 4212 firefox.exe 4212 firefox.exe 4212 firefox.exe 4212 firefox.exe 3732 e4165c7c76.exe 3732 e4165c7c76.exe 3732 e4165c7c76.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 3732 e4165c7c76.exe 3732 e4165c7c76.exe 3732 e4165c7c76.exe 3732 e4165c7c76.exe 3732 e4165c7c76.exe 3732 e4165c7c76.exe 3732 e4165c7c76.exe 4212 firefox.exe 4212 firefox.exe 4212 firefox.exe 4212 firefox.exe 3732 e4165c7c76.exe 4212 firefox.exe 4212 firefox.exe 4212 firefox.exe 4212 firefox.exe 4212 firefox.exe 4212 firefox.exe 4212 firefox.exe 4212 firefox.exe 4212 firefox.exe 4212 firefox.exe 4212 firefox.exe 4212 firefox.exe 4212 firefox.exe 4212 firefox.exe 4212 firefox.exe 4212 firefox.exe 3732 e4165c7c76.exe 3732 e4165c7c76.exe 3732 e4165c7c76.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4212 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3284 wrote to memory of 2728 3284 373ffb138b7376264a307837ef5bd51bd02380376f9fdd27350cf1b65a28bcbb.exe 82 PID 3284 wrote to memory of 2728 3284 373ffb138b7376264a307837ef5bd51bd02380376f9fdd27350cf1b65a28bcbb.exe 82 PID 3284 wrote to memory of 2728 3284 373ffb138b7376264a307837ef5bd51bd02380376f9fdd27350cf1b65a28bcbb.exe 82 PID 2728 wrote to memory of 32 2728 skotes.exe 83 PID 2728 wrote to memory of 32 2728 skotes.exe 83 PID 2728 wrote to memory of 32 2728 skotes.exe 83 PID 2728 wrote to memory of 1280 2728 skotes.exe 88 PID 2728 wrote to memory of 1280 2728 skotes.exe 88 PID 2728 wrote to memory of 1280 2728 skotes.exe 88 PID 2728 wrote to memory of 3148 2728 skotes.exe 90 PID 2728 wrote to memory of 3148 2728 skotes.exe 90 PID 2728 wrote to memory of 3148 2728 skotes.exe 90 PID 2728 wrote to memory of 5052 2728 skotes.exe 93 PID 2728 wrote to memory of 5052 2728 skotes.exe 93 PID 2728 wrote to memory of 5052 2728 skotes.exe 93 PID 2728 wrote to memory of 3732 2728 skotes.exe 94 PID 2728 wrote to memory of 3732 2728 skotes.exe 94 PID 2728 wrote to memory of 3732 2728 skotes.exe 94 PID 3732 wrote to memory of 3780 3732 e4165c7c76.exe 97 PID 3732 wrote to memory of 3780 3732 e4165c7c76.exe 97 PID 3732 wrote to memory of 3780 3732 e4165c7c76.exe 97 PID 3732 wrote to memory of 1408 3732 e4165c7c76.exe 100 PID 3732 wrote to memory of 1408 3732 e4165c7c76.exe 100 PID 3732 wrote to memory of 1408 3732 e4165c7c76.exe 100 PID 3732 wrote to memory of 4896 3732 e4165c7c76.exe 102 PID 3732 wrote to memory of 4896 3732 e4165c7c76.exe 102 PID 3732 wrote to memory of 4896 3732 e4165c7c76.exe 102 PID 3732 wrote to memory of 4012 3732 e4165c7c76.exe 104 PID 3732 wrote to memory of 4012 3732 e4165c7c76.exe 104 PID 3732 wrote to memory of 4012 3732 e4165c7c76.exe 104 PID 3732 wrote to memory of 1668 3732 e4165c7c76.exe 107 PID 3732 wrote to memory of 1668 3732 e4165c7c76.exe 107 PID 3732 wrote to memory of 1668 3732 e4165c7c76.exe 107 PID 3732 wrote to memory of 3648 3732 e4165c7c76.exe 109 PID 3732 wrote to memory of 3648 3732 e4165c7c76.exe 109 PID 3648 wrote to memory of 4212 3648 firefox.exe 110 PID 3648 wrote to memory of 4212 3648 firefox.exe 110 PID 3648 wrote to memory of 4212 3648 firefox.exe 110 PID 3648 wrote to memory of 4212 3648 firefox.exe 110 PID 3648 wrote to memory of 4212 3648 firefox.exe 110 PID 3648 wrote to memory of 4212 3648 firefox.exe 110 PID 3648 wrote to memory of 4212 3648 firefox.exe 110 PID 3648 wrote to memory of 4212 3648 firefox.exe 110 PID 3648 wrote to memory of 4212 3648 firefox.exe 110 PID 3648 wrote to memory of 4212 3648 firefox.exe 110 PID 3648 wrote to memory of 4212 3648 firefox.exe 110 PID 4212 wrote to memory of 1588 4212 firefox.exe 111 PID 4212 wrote to memory of 1588 4212 firefox.exe 111 PID 4212 wrote to memory of 1588 4212 firefox.exe 111 PID 4212 wrote to memory of 1588 4212 firefox.exe 111 PID 4212 wrote to memory of 1588 4212 firefox.exe 111 PID 4212 wrote to memory of 1588 4212 firefox.exe 111 PID 4212 wrote to memory of 1588 4212 firefox.exe 111 PID 4212 wrote to memory of 1588 4212 firefox.exe 111 PID 4212 wrote to memory of 1588 4212 firefox.exe 111 PID 4212 wrote to memory of 1588 4212 firefox.exe 111 PID 4212 wrote to memory of 1588 4212 firefox.exe 111 PID 4212 wrote to memory of 1588 4212 firefox.exe 111 PID 4212 wrote to memory of 1588 4212 firefox.exe 111 PID 4212 wrote to memory of 1588 4212 firefox.exe 111 PID 4212 wrote to memory of 1588 4212 firefox.exe 111 PID 4212 wrote to memory of 1588 4212 firefox.exe 111 PID 4212 wrote to memory of 1588 4212 firefox.exe 111 PID 4212 wrote to memory of 1588 4212 firefox.exe 111 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\373ffb138b7376264a307837ef5bd51bd02380376f9fdd27350cf1b65a28bcbb.exe"C:\Users\Admin\AppData\Local\Temp\373ffb138b7376264a307837ef5bd51bd02380376f9fdd27350cf1b65a28bcbb.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3284 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\1010832001\8b454a45af.exe"C:\Users\Admin\AppData\Local\Temp\1010832001\8b454a45af.exe"3⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:32
-
-
C:\Users\Admin\AppData\Local\Temp\1010833001\ae824a2156.exe"C:\Users\Admin\AppData\Local\Temp\1010833001\ae824a2156.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1280
-
-
C:\Users\Admin\AppData\Local\Temp\1010834001\6c9f1fbd6e.exe"C:\Users\Admin\AppData\Local\Temp\1010834001\6c9f1fbd6e.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3148 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3148 -s 16164⤵
- Program crash
PID:2704
-
-
-
C:\Users\Admin\AppData\Local\Temp\1010835001\9b35e8cac6.exe"C:\Users\Admin\AppData\Local\Temp\1010835001\9b35e8cac6.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5052
-
-
C:\Users\Admin\AppData\Local\Temp\1010836001\e4165c7c76.exe"C:\Users\Admin\AppData\Local\Temp\1010836001\e4165c7c76.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3780
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1408
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4896
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4012
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1668
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2000 -parentBuildID 20240401114208 -prefsHandle 1928 -prefMapHandle 1888 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5f8852d2-c19b-48dd-aa51-954fd7416c3d} 4212 "\\.\pipe\gecko-crash-server-pipe.4212" gpu6⤵PID:1588
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2440 -parentBuildID 20240401114208 -prefsHandle 2432 -prefMapHandle 2428 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1bd23dba-d3ec-47bc-b07f-ebd6d3a0febf} 4212 "\\.\pipe\gecko-crash-server-pipe.4212" socket6⤵PID:3856
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3180 -childID 1 -isForBrowser -prefsHandle 3372 -prefMapHandle 3124 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1220 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d51435c9-ee84-4185-84fe-bd44451f9d96} 4212 "\\.\pipe\gecko-crash-server-pipe.4212" tab6⤵PID:2732
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3728 -childID 2 -isForBrowser -prefsHandle 3720 -prefMapHandle 2856 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1220 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f0181387-d219-417b-bb86-53250b39d7f0} 4212 "\\.\pipe\gecko-crash-server-pipe.4212" tab6⤵PID:4440
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4704 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4696 -prefMapHandle 4384 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e02929e7-9f64-468d-ac29-386ef84ea3c0} 4212 "\\.\pipe\gecko-crash-server-pipe.4212" utility6⤵
- Checks processor information in registry
PID:5252
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5600 -childID 3 -isForBrowser -prefsHandle 5592 -prefMapHandle 5588 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1220 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3f23927a-154f-4274-88ba-227713eb67b0} 4212 "\\.\pipe\gecko-crash-server-pipe.4212" tab6⤵PID:3944
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5196 -childID 4 -isForBrowser -prefsHandle 5736 -prefMapHandle 5740 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1220 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7ddf7e52-4614-4321-adf8-f59657c68568} 4212 "\\.\pipe\gecko-crash-server-pipe.4212" tab6⤵PID:5084
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5912 -childID 5 -isForBrowser -prefsHandle 5920 -prefMapHandle 5924 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1220 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {776f29b9-fd9b-4012-8e84-2e682493fbbd} 4212 "\\.\pipe\gecko-crash-server-pipe.4212" tab6⤵PID:3532
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1010837001\4043fb2d5c.exe"C:\Users\Admin\AppData\Local\Temp\1010837001\4043fb2d5c.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:912
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3148 -ip 31481⤵PID:4932
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6044
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6048
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
3Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\85mw8mk9.default-release\activity-stream.discovery_stream.json
Filesize24KB
MD57f278016eb41ca1e08825f64e6a1ec0a
SHA13d62195e1b4a9f0e8914a057417a1900e7c04722
SHA2569ff8d4030af083de37580130a9942fcae364f31275323e17eb34c1f992dd0646
SHA51276cc85fe64af47b37ce4a28d374428588594310d1c69672b017838b007f0fd0d4017c3d1a72013192b1746c6cecd3758650cac0b69db0d736a9272d9e8951a6a
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\85mw8mk9.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD58c59e05a2f2ab95b734e25fae16fd6d9
SHA16f6a0fe46927c7fbce67ff188d174c6b3f654231
SHA256029104ef0130cb16d7ab8601a29c81e75d57ff069e8c502f99ab21ad215fa82e
SHA512889c5ef45775e0e4026d7f7416e6f3dce863ab7979d6c1f17232895255adec14eff2b5d2483091ae92d4ff6a7af77b6d356af0f2646ee1c4344d642b96cda836
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\85mw8mk9.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD50ce8801db13e2cfb6c985e54f3c2af6a
SHA131b782cec01cb5babc9583f2a38383da1a0718cc
SHA2569896bea34aeeeefe12cb0cb02287b4d28da283964af518604a1a9a4096ebe596
SHA51293c19e570e9d9327ca866d69b394de7265b8444cc0edf3597e84d6450ad80240666fc6a1d3c90e0e4c108c73e69a99cce12ffbf91c56461c0b04d836ad28297b
-
Filesize
4.2MB
MD5c94feb7d4fe260f53cc227b9833c6b7e
SHA18d1f50a705256b9b8b688ed385799ed297ca0138
SHA2569926ea0046fd1472946e4db23cd38e22ceecb5dd384ed91fc105a6c4d266ca1d
SHA512fe606f2006ba996ca9afda8b42c89e297106541ced3b2cef15689c6e2a361b69cd2275fa21ba333031befc5321f7c463e935da0ee7a18b07d12ec4f24d191ce6
-
Filesize
4.3MB
MD5a3b6fc75e9332e814f8068fc74937028
SHA1aacf898df6cdc6b7da5d97b7a5728108a1551a18
SHA256a28d11a71ff174f3f011ec4b94d0c67c6c07a367f165347ad02d7004dae27a26
SHA5123d5db5aab7952acb8bcdf670a4eaa14b606b6518219ba15ab6bc5f2c9b5feb2d0acf3c5146751965d33f5cb93bd87048f2e5f4e3928aa3358143cc682ac0bc84
-
Filesize
1.8MB
MD51d118d21b56a59293e64999be49fb8d1
SHA1508580f5568eb0640792416745849846680ba6bd
SHA25669400f595fba73b10cbe83c95fffce2cc33d4f5134d9a96c7c9b9e16c898f15a
SHA5121a158c3469cf0f0f375f311960750885bd21557bce25bf53115e2514e7c945dd9e540ffcb760f99a1bcddc1ec0511448441301f24f302714a8489284f7f6ba87
-
Filesize
1.7MB
MD55851c6aa37bcc0a5b5b899cbc5f2518e
SHA11553c526dbf937284eb69d8005276daafd768f11
SHA256eda726274201ab47f594adb46b80559f8a6d057d9feca660143642e3a475fcf5
SHA51226a1ac576d0cfba9de3e769594d54d1b88299664614946e0de5f26bc6a00b68da1414497b31bc586463250f6b9bad69f3c552f45e1fcb2b48013195004986da1
-
Filesize
900KB
MD536945cc772da75aae26bd98962b20cf5
SHA1644291aadfc10b8f25d403d53cb9d3cab93e7088
SHA25674aebd1ac1cd8dad4f39dd7a8a041b874eb567d2996eaab01aa7e1770f844a06
SHA512eaaa83aba45c84019b25b663834b422024d11c217211795cd7c487214821d26afb1014c878de2ee60d061319e4015bd232ad4d065bcf8604943ea73e28b388c2
-
Filesize
2.7MB
MD5944eb68b3615a8ec06e3dee7f5aacfc8
SHA1d0b1a5caa37cb68232ae4f44febc69fcdcefc962
SHA2562214f8f849171ce12a6761de39767107281f59f8b2ceb9b1e745b3f94f3db5ea
SHA512139cf47d341f35030825c1f4d71d20afc94ec9cd2760507bce4b5fa95bfab0ac4bddcc71839e89f02f7bc4b0722b504c8124729e80770843038d216188ae44d3
-
Filesize
1.8MB
MD53ca635061fa9685d799784f665850565
SHA1549bb2808560d826b7be8ea502b46e3cdc101ce3
SHA256373ffb138b7376264a307837ef5bd51bd02380376f9fdd27350cf1b65a28bcbb
SHA5127812edb799fc4ac60c856c61ecd793fb5499ffe433c9bf60e251d4e3e9d5bb4df8d8f2873bb643036ccbb5bc611cc339ad8e8789feec3b3c5834bb72ed887792
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\AlternateServices.bin
Filesize18KB
MD5b59ab8b76fc6a059069ab0198c49da0f
SHA1762f22492a9407cdbcbed46e04f8ac4a2308bdcb
SHA25652d7ac0f0b2cdf6f3710ede23c383e07ccac1ab7ee40405de6812f3033ef3068
SHA5124ecf897cc89564ea52b864c02ff650203cc7eb75e513b37735e82863401b1aede37f0224a7d9dcec15cb968e070d1d0512a6bfecf44162389bd873474fa9d238
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\AlternateServices.bin
Filesize6KB
MD54ae3911dbb2fc0dd9c1ce29a3e67c9eb
SHA1c3dd3dea90feb03e79436eca6e9e1856f007b4ee
SHA25626d2b41ad81c24e690222b8aa6e7dde6812b0f6eaeb3bb4694b9283958896a8c
SHA512263478884808c3956968269d13f1dd1e2920e688d0ae1edc1fa8a4a690bc91b17ccbe4b008865bb2e7dfad5aa5d13fd0ed8df435a0dc615db80d2f802133d671
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\AlternateServices.bin
Filesize10KB
MD5a26221a87bbe3a304fc0152bcdc7540e
SHA120dad924f71701557c23a0b0f160223933f30f3b
SHA25675b2ad53557d8faae7ef9cdb9187af9fb2f2b76734f118d94ed07b3abf6ebb6f
SHA512ffcd3e4caa0e93211c0ba6a0e2270b85c2968eaecb7605e9b179b7cb9b253fe283cecb3717b296fd795253ae1c9e519d9c0736050bd4455dd42dd50eb128af9d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD5d440dec5849e3b9b57b8e3eec1d7a055
SHA189eaf37e24689ccdbdf7672bd03462875db5864a
SHA256cd35d9212f4279f2bf2af8e8d273d18597ed133d68bc57bb08d811e250082c0b
SHA5127be732211086ced56e104582180107d7b1577b89b0de5046755d1123e3290690e2f0ce2b8101f613466dd02247cf90cfe8bf4a1e6fd3d707529295e1a2b309ca
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD5d01915d579a1d154ddf75387dc09873a
SHA197267acdbfa85d8dca7762abd1d5a64e64bea3d8
SHA2567b9120717039b146fcf0b4641729d42accb48a7880a84a0b78f1a8c83cb077ff
SHA512c6d62edb2d61c1dc639251ff933fc417edba37cee06999311013f4aec8ecf95e5d5bec1a020a9fedbd43be97b7a7812ba4c52377cf30e7a5e9d75b1d9d27c323
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD53b06ca22e7493c4796553b31e37269d5
SHA16d28b99f8503a93339118d4294bad826df31337c
SHA256d9b64e8237bf6bdf6bf9b8fb8dfab53ff56df585ddd070b669a01b7ba59676c6
SHA5125eb4ba819b21b1d79eadef27c8cf2f48797b5266e99de4254e61bb830629bbea5304f20398740221fb604207a96a786bf44d0cd43666e509b674a98ba728f124
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\pending_pings\0bad5779-7a58-4bcf-84fb-462280e2091e
Filesize659B
MD5347a30a7a714d208666110ecc5f9a4ea
SHA127f2058a62982116b53a118451f5e0f72b9e826c
SHA25602c36e5f96718e379cb619b33c74e6525d178ff18e576eda3cc74feae784e24f
SHA512e4a8651f458d9362aa55c1e2b6caf36dc05a43484c4ba6e8f16c9fe3f447db3f75100a96ca9c5fe7cfe1aa1fed151ccc01774617748e5e423c997555263d49dc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\pending_pings\6adb2de0-34df-4d9b-bd3b-bdb1edd00d4e
Filesize982B
MD530518896691c3f850f6ee46dcab39a7d
SHA12c2ca0ecedd42ce17475d7a78f4c30a7eea709bf
SHA2560876836b86e30db29ffa3f63ee887821a88c566fcf7ec6d4cd2769176fb2efa5
SHA512684bab71a0773870a8e5266839f216fd2f2f89b72d6a56ebf4fe8c117d96ad1b58bdb0148983cbb7a1325cf07185d4799db788e7ab6f27f4cca05f0ee6274d1b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
15KB
MD5655002ec6347040b5a60a55e5090f7fe
SHA17588407d2ee54320b0a24056dd3baa1a141b5b91
SHA256ab6f93208e1f88a50fb5ba891e63b03b84c3f5a5293ad65d39a8662bbb31cae1
SHA512e967f28e334cc0d567590717672ffc7ef0fba26c6c8544a407f98e59638f76ec1293e4256a100a3e8c08edd618a614ad958d8c245ba6f8a15d67120d90fa6ce9
-
Filesize
10KB
MD51b6a9dbdbe5ee02c67ded1701cdaffa1
SHA18ea5c81df7dc22eaf1f2c672820d1baad127d0af
SHA256c4980ee9a7a7d3617f0fa3e0557d55f20916ce7fea21404222b57ca53a42a482
SHA512bd316c884fab23853bcff055b858abd2dbc0a6d7ba1a3c66c4f13c11406d65d830fc77efbeec8d013fcd90cc89329348138e93a7736ff10d5a598041ebe0432c
-
Filesize
10KB
MD57f84bd29884f2efb08cc1366d319c737
SHA16a8b92c80c2828e4c3ac23362420b801fbe4d422
SHA256cf4485ee905ce09a1976601b3cf4a8e3708414c61a8a062e3bc5b9975a6579fd
SHA512d289cf3fe676f4d78c1317a3829f85b0acdb1334268f945ee9fe3b0f6e453de85289b3a6ee00be32254ba2472b093591979a11a0fa0f8fdcbab60c970eba1770
-
Filesize
12KB
MD57eb727cfc30d237a3f41e97da63c62cb
SHA1e7baa50e6993029ebe68fa2886105493ccf45ddd
SHA256a7eefcb90a50ca998c74a7b825d17f87b92f48a61e80d0444a8c303c94b39fa4
SHA5122620d33c9ba32462dd910590158419467c4f3ca53a33befc378a185069e8261281f01fca3201044609bbeb881234070d3955a894250f431ae0ec94081ac74e04