Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2024 03:01
Static task
static1
Behavioral task
behavioral1
Sample
ccd674dfa452e95b5d4a97d91a8e44d2268a3b8438cc5a4fd17d9b63cdd78e86.exe
Resource
win7-20240903-en
General
-
Target
ccd674dfa452e95b5d4a97d91a8e44d2268a3b8438cc5a4fd17d9b63cdd78e86.exe
-
Size
1.8MB
-
MD5
e4c570fba70843d9127a627d5f627766
-
SHA1
9528c5de55077ba02d941300cc0960b4076b6ae8
-
SHA256
ccd674dfa452e95b5d4a97d91a8e44d2268a3b8438cc5a4fd17d9b63cdd78e86
-
SHA512
07a920c8029b2fbaff0f938702e919bd5ce59dcac3bb09b3fb6cc9057f4cac0d49b3a62a9861de2bedac4eb8fddd8a26798ccebb138f5b25748b979f0b2cd717
-
SSDEEP
24576:aFqinFKLQTO5GZfnT4F/MZfZLaHx8oAw6dR7x9Mc251UmzL0p9/jq4EiP+SnOo4r:aFXFNC5UfnT4VMpZLaRadFEOmzM7PBD
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
drum
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 852be55311.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 852be55311.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 852be55311.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 852be55311.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 852be55311.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 852be55311.exe -
Stealc family
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF 35c5401b05.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 31b0eaa8f5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 852be55311.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ccd674dfa452e95b5d4a97d91a8e44d2268a3b8438cc5a4fd17d9b63cdd78e86.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 35c5401b05.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 19a0ce83c5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2b27839aeb.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ccd674dfa452e95b5d4a97d91a8e44d2268a3b8438cc5a4fd17d9b63cdd78e86.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2b27839aeb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 35c5401b05.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 35c5401b05.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 31b0eaa8f5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ccd674dfa452e95b5d4a97d91a8e44d2268a3b8438cc5a4fd17d9b63cdd78e86.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 19a0ce83c5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 19a0ce83c5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2b27839aeb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 31b0eaa8f5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 852be55311.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 852be55311.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation ccd674dfa452e95b5d4a97d91a8e44d2268a3b8438cc5a4fd17d9b63cdd78e86.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 9 IoCs
pid Process 3880 skotes.exe 4044 35c5401b05.exe 4560 19a0ce83c5.exe 4016 31b0eaa8f5.exe 2984 2b27839aeb.exe 1372 6c1a958e0d.exe 840 852be55311.exe 2696 skotes.exe 5740 skotes.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine ccd674dfa452e95b5d4a97d91a8e44d2268a3b8438cc5a4fd17d9b63cdd78e86.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 19a0ce83c5.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 2b27839aeb.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 852be55311.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 35c5401b05.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 31b0eaa8f5.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 852be55311.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 852be55311.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\852be55311.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010865001\\852be55311.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\31b0eaa8f5.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010862001\\31b0eaa8f5.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2b27839aeb.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010863001\\2b27839aeb.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\6c1a958e0d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010864001\\6c1a958e0d.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000023ca6-99.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 3480 ccd674dfa452e95b5d4a97d91a8e44d2268a3b8438cc5a4fd17d9b63cdd78e86.exe 3880 skotes.exe 4044 35c5401b05.exe 4560 19a0ce83c5.exe 4016 31b0eaa8f5.exe 2984 2b27839aeb.exe 840 852be55311.exe 2696 skotes.exe 5740 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job ccd674dfa452e95b5d4a97d91a8e44d2268a3b8438cc5a4fd17d9b63cdd78e86.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3392 4016 WerFault.exe 96 -
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ccd674dfa452e95b5d4a97d91a8e44d2268a3b8438cc5a4fd17d9b63cdd78e86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 852be55311.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 35c5401b05.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 19a0ce83c5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 31b0eaa8f5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2b27839aeb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6c1a958e0d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 4460 taskkill.exe 1640 taskkill.exe 964 taskkill.exe 3240 taskkill.exe 1064 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 3480 ccd674dfa452e95b5d4a97d91a8e44d2268a3b8438cc5a4fd17d9b63cdd78e86.exe 3480 ccd674dfa452e95b5d4a97d91a8e44d2268a3b8438cc5a4fd17d9b63cdd78e86.exe 3880 skotes.exe 3880 skotes.exe 4044 35c5401b05.exe 4044 35c5401b05.exe 4044 35c5401b05.exe 4044 35c5401b05.exe 4044 35c5401b05.exe 4044 35c5401b05.exe 4044 35c5401b05.exe 4044 35c5401b05.exe 4044 35c5401b05.exe 4044 35c5401b05.exe 4560 19a0ce83c5.exe 4560 19a0ce83c5.exe 4016 31b0eaa8f5.exe 4016 31b0eaa8f5.exe 2984 2b27839aeb.exe 2984 2b27839aeb.exe 1372 6c1a958e0d.exe 1372 6c1a958e0d.exe 840 852be55311.exe 840 852be55311.exe 1372 6c1a958e0d.exe 1372 6c1a958e0d.exe 840 852be55311.exe 840 852be55311.exe 840 852be55311.exe 2696 skotes.exe 2696 skotes.exe 5740 skotes.exe 5740 skotes.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 964 taskkill.exe Token: SeDebugPrivilege 3240 taskkill.exe Token: SeDebugPrivilege 1064 taskkill.exe Token: SeDebugPrivilege 4460 taskkill.exe Token: SeDebugPrivilege 1640 taskkill.exe Token: SeDebugPrivilege 1056 firefox.exe Token: SeDebugPrivilege 1056 firefox.exe Token: SeDebugPrivilege 840 852be55311.exe -
Suspicious use of FindShellTrayWindow 31 IoCs
pid Process 1372 6c1a958e0d.exe 1372 6c1a958e0d.exe 1372 6c1a958e0d.exe 1372 6c1a958e0d.exe 1372 6c1a958e0d.exe 1372 6c1a958e0d.exe 1056 firefox.exe 1056 firefox.exe 1056 firefox.exe 1056 firefox.exe 1372 6c1a958e0d.exe 1056 firefox.exe 1056 firefox.exe 1056 firefox.exe 1056 firefox.exe 1056 firefox.exe 1056 firefox.exe 1056 firefox.exe 1056 firefox.exe 1056 firefox.exe 1056 firefox.exe 1056 firefox.exe 1056 firefox.exe 1056 firefox.exe 1056 firefox.exe 1056 firefox.exe 1056 firefox.exe 1056 firefox.exe 1372 6c1a958e0d.exe 1372 6c1a958e0d.exe 1372 6c1a958e0d.exe -
Suspicious use of SendNotifyMessage 30 IoCs
pid Process 1372 6c1a958e0d.exe 1372 6c1a958e0d.exe 1372 6c1a958e0d.exe 1372 6c1a958e0d.exe 1372 6c1a958e0d.exe 1372 6c1a958e0d.exe 1056 firefox.exe 1056 firefox.exe 1056 firefox.exe 1056 firefox.exe 1372 6c1a958e0d.exe 1056 firefox.exe 1056 firefox.exe 1056 firefox.exe 1056 firefox.exe 1056 firefox.exe 1056 firefox.exe 1056 firefox.exe 1056 firefox.exe 1056 firefox.exe 1056 firefox.exe 1056 firefox.exe 1056 firefox.exe 1056 firefox.exe 1056 firefox.exe 1056 firefox.exe 1056 firefox.exe 1372 6c1a958e0d.exe 1372 6c1a958e0d.exe 1372 6c1a958e0d.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1056 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3480 wrote to memory of 3880 3480 ccd674dfa452e95b5d4a97d91a8e44d2268a3b8438cc5a4fd17d9b63cdd78e86.exe 83 PID 3480 wrote to memory of 3880 3480 ccd674dfa452e95b5d4a97d91a8e44d2268a3b8438cc5a4fd17d9b63cdd78e86.exe 83 PID 3480 wrote to memory of 3880 3480 ccd674dfa452e95b5d4a97d91a8e44d2268a3b8438cc5a4fd17d9b63cdd78e86.exe 83 PID 3880 wrote to memory of 4044 3880 skotes.exe 85 PID 3880 wrote to memory of 4044 3880 skotes.exe 85 PID 3880 wrote to memory of 4044 3880 skotes.exe 85 PID 3880 wrote to memory of 4560 3880 skotes.exe 93 PID 3880 wrote to memory of 4560 3880 skotes.exe 93 PID 3880 wrote to memory of 4560 3880 skotes.exe 93 PID 3880 wrote to memory of 4016 3880 skotes.exe 96 PID 3880 wrote to memory of 4016 3880 skotes.exe 96 PID 3880 wrote to memory of 4016 3880 skotes.exe 96 PID 3880 wrote to memory of 2984 3880 skotes.exe 101 PID 3880 wrote to memory of 2984 3880 skotes.exe 101 PID 3880 wrote to memory of 2984 3880 skotes.exe 101 PID 3880 wrote to memory of 1372 3880 skotes.exe 102 PID 3880 wrote to memory of 1372 3880 skotes.exe 102 PID 3880 wrote to memory of 1372 3880 skotes.exe 102 PID 1372 wrote to memory of 964 1372 6c1a958e0d.exe 103 PID 1372 wrote to memory of 964 1372 6c1a958e0d.exe 103 PID 1372 wrote to memory of 964 1372 6c1a958e0d.exe 103 PID 1372 wrote to memory of 3240 1372 6c1a958e0d.exe 105 PID 1372 wrote to memory of 3240 1372 6c1a958e0d.exe 105 PID 1372 wrote to memory of 3240 1372 6c1a958e0d.exe 105 PID 1372 wrote to memory of 1064 1372 6c1a958e0d.exe 109 PID 1372 wrote to memory of 1064 1372 6c1a958e0d.exe 109 PID 1372 wrote to memory of 1064 1372 6c1a958e0d.exe 109 PID 1372 wrote to memory of 4460 1372 6c1a958e0d.exe 113 PID 1372 wrote to memory of 4460 1372 6c1a958e0d.exe 113 PID 1372 wrote to memory of 4460 1372 6c1a958e0d.exe 113 PID 1372 wrote to memory of 1640 1372 6c1a958e0d.exe 115 PID 1372 wrote to memory of 1640 1372 6c1a958e0d.exe 115 PID 1372 wrote to memory of 1640 1372 6c1a958e0d.exe 115 PID 1372 wrote to memory of 1676 1372 6c1a958e0d.exe 117 PID 1372 wrote to memory of 1676 1372 6c1a958e0d.exe 117 PID 1676 wrote to memory of 1056 1676 firefox.exe 118 PID 1676 wrote to memory of 1056 1676 firefox.exe 118 PID 1676 wrote to memory of 1056 1676 firefox.exe 118 PID 1676 wrote to memory of 1056 1676 firefox.exe 118 PID 1676 wrote to memory of 1056 1676 firefox.exe 118 PID 1676 wrote to memory of 1056 1676 firefox.exe 118 PID 1676 wrote to memory of 1056 1676 firefox.exe 118 PID 1676 wrote to memory of 1056 1676 firefox.exe 118 PID 1676 wrote to memory of 1056 1676 firefox.exe 118 PID 1676 wrote to memory of 1056 1676 firefox.exe 118 PID 1676 wrote to memory of 1056 1676 firefox.exe 118 PID 1056 wrote to memory of 2236 1056 firefox.exe 119 PID 1056 wrote to memory of 2236 1056 firefox.exe 119 PID 1056 wrote to memory of 2236 1056 firefox.exe 119 PID 1056 wrote to memory of 2236 1056 firefox.exe 119 PID 1056 wrote to memory of 2236 1056 firefox.exe 119 PID 1056 wrote to memory of 2236 1056 firefox.exe 119 PID 1056 wrote to memory of 2236 1056 firefox.exe 119 PID 1056 wrote to memory of 2236 1056 firefox.exe 119 PID 1056 wrote to memory of 2236 1056 firefox.exe 119 PID 1056 wrote to memory of 2236 1056 firefox.exe 119 PID 1056 wrote to memory of 2236 1056 firefox.exe 119 PID 1056 wrote to memory of 2236 1056 firefox.exe 119 PID 1056 wrote to memory of 2236 1056 firefox.exe 119 PID 1056 wrote to memory of 2236 1056 firefox.exe 119 PID 1056 wrote to memory of 2236 1056 firefox.exe 119 PID 1056 wrote to memory of 2236 1056 firefox.exe 119 PID 1056 wrote to memory of 2236 1056 firefox.exe 119 PID 1056 wrote to memory of 2236 1056 firefox.exe 119 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ccd674dfa452e95b5d4a97d91a8e44d2268a3b8438cc5a4fd17d9b63cdd78e86.exe"C:\Users\Admin\AppData\Local\Temp\ccd674dfa452e95b5d4a97d91a8e44d2268a3b8438cc5a4fd17d9b63cdd78e86.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Users\Admin\AppData\Local\Temp\1010860001\35c5401b05.exe"C:\Users\Admin\AppData\Local\Temp\1010860001\35c5401b05.exe"3⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4044
-
-
C:\Users\Admin\AppData\Local\Temp\1010861001\19a0ce83c5.exe"C:\Users\Admin\AppData\Local\Temp\1010861001\19a0ce83c5.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4560
-
-
C:\Users\Admin\AppData\Local\Temp\1010862001\31b0eaa8f5.exe"C:\Users\Admin\AppData\Local\Temp\1010862001\31b0eaa8f5.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4016 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4016 -s 16284⤵
- Program crash
PID:3392
-
-
-
C:\Users\Admin\AppData\Local\Temp\1010863001\2b27839aeb.exe"C:\Users\Admin\AppData\Local\Temp\1010863001\2b27839aeb.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2984
-
-
C:\Users\Admin\AppData\Local\Temp\1010864001\6c1a958e0d.exe"C:\Users\Admin\AppData\Local\Temp\1010864001\6c1a958e0d.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:964
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3240
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1064
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4460
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1640
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2028 -parentBuildID 20240401114208 -prefsHandle 1912 -prefMapHandle 1920 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {10060f51-f33d-4204-9649-84b54476dbad} 1056 "\\.\pipe\gecko-crash-server-pipe.1056" gpu6⤵PID:2236
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2464 -parentBuildID 20240401114208 -prefsHandle 2432 -prefMapHandle 2428 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9e1a5e8c-f407-48c0-b662-90c946916757} 1056 "\\.\pipe\gecko-crash-server-pipe.1056" socket6⤵PID:3632
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3284 -childID 1 -isForBrowser -prefsHandle 3196 -prefMapHandle 2976 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1040 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {343ba97c-eb6c-4bf8-bcaf-2f6298968139} 1056 "\\.\pipe\gecko-crash-server-pipe.1056" tab6⤵PID:1560
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3940 -childID 2 -isForBrowser -prefsHandle 3932 -prefMapHandle 3232 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1040 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {585ce8bb-021d-428c-b11b-9ab0bad1cdd5} 1056 "\\.\pipe\gecko-crash-server-pipe.1056" tab6⤵PID:1152
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4624 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4660 -prefMapHandle 4656 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b40b2897-b052-4883-8a6d-1ee4686042f0} 1056 "\\.\pipe\gecko-crash-server-pipe.1056" utility6⤵
- Checks processor information in registry
PID:5296
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5036 -childID 3 -isForBrowser -prefsHandle 5052 -prefMapHandle 5048 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1040 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {67b31b52-11d5-4490-b98c-beb3f9bee8f4} 1056 "\\.\pipe\gecko-crash-server-pipe.1056" tab6⤵PID:5700
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5192 -childID 4 -isForBrowser -prefsHandle 5208 -prefMapHandle 5292 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1040 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d476a427-c258-4c7c-bcc3-7bbe74a0368d} 1056 "\\.\pipe\gecko-crash-server-pipe.1056" tab6⤵PID:5728
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5500 -childID 5 -isForBrowser -prefsHandle 5424 -prefMapHandle 5428 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1040 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {02419b81-d02a-4b58-bedf-6e4f19a88168} 1056 "\\.\pipe\gecko-crash-server-pipe.1056" tab6⤵PID:5784
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1010865001\852be55311.exe"C:\Users\Admin\AppData\Local\Temp\1010865001\852be55311.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:840
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4016 -ip 40161⤵PID:2384
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2696
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5740
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
3Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\activity-stream.discovery_stream.json.tmp
Filesize24KB
MD597391a93cb7e8c4c08e21e1765fba79b
SHA1a8cbb81c2cc49b4b817fdc71ca451b262f5ec433
SHA2562c27e915e78bb4babe058b44a9bb9e1defa422733b2ff80d5c96138ae2a40139
SHA512442f932560b559a980ec493bcff90552adc0339affbcfefcbd56ea7e7fdbf8272a9a6035a6b35c68f175899f4f4f16a22b7dead937c1493c078a8c224533698e
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD556790880735306178b939b44b3c78498
SHA1a5724a52286a487013c27ad564f54ce594f8fefd
SHA256b5fbb9b57b1e183fca42804b449175486f2d08ca41e079508df6466648c3c8f1
SHA5123d9eb72f1839f9576d1eabab9499c6a0d668d54b0abc54c36ab695afe6d928b2a026040744a943d9cb63a8023507b5262c2589a20fae4ce303a7ddcfe2607943
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD576338309c6aecb4fb0687dae6454f6f8
SHA1ba6c826eae1b6509c8c46e946dd0b7916013aee7
SHA2563fc3428013f651e14b574aa1cf60cb94c57211c08b62e172a89a3067fe1e03fe
SHA5128a9e292d9a74c4d2fb185d747012bbcf77513499f13a2d296fb27705b8597995ba68ea9981c7bd04c20b369b3777902c4e4ab8995acf77ee74bb1c242c895e2f
-
Filesize
4.2MB
MD5c94feb7d4fe260f53cc227b9833c6b7e
SHA18d1f50a705256b9b8b688ed385799ed297ca0138
SHA2569926ea0046fd1472946e4db23cd38e22ceecb5dd384ed91fc105a6c4d266ca1d
SHA512fe606f2006ba996ca9afda8b42c89e297106541ced3b2cef15689c6e2a361b69cd2275fa21ba333031befc5321f7c463e935da0ee7a18b07d12ec4f24d191ce6
-
Filesize
4.3MB
MD5a3b6fc75e9332e814f8068fc74937028
SHA1aacf898df6cdc6b7da5d97b7a5728108a1551a18
SHA256a28d11a71ff174f3f011ec4b94d0c67c6c07a367f165347ad02d7004dae27a26
SHA5123d5db5aab7952acb8bcdf670a4eaa14b606b6518219ba15ab6bc5f2c9b5feb2d0acf3c5146751965d33f5cb93bd87048f2e5f4e3928aa3358143cc682ac0bc84
-
Filesize
1.8MB
MD5fb259c5ebc086a3062f5f3dd9e2955ac
SHA114a87eb04c4339f770d55b7f64e0728c87c7b840
SHA2563af486387a0869f29281558b0d919337c181c10999865d3db09fae595b45f9c1
SHA512ebe1b3691ab0c860b2bf8bfdf28d916e29f6d96705eaf6861715f651ec8d50a3ec06f958cebfb469dde0dc70ca844c0dda891a640aa7c3b6a9e836004b2d58e9
-
Filesize
1.7MB
MD5a8d083b25843d8b182146793d9665ac5
SHA17d64723ba2c0fa76e3f1126d3583331364e8815e
SHA2564597e4ff598b3353854bce87b300cc65cab353aad474b32fb2768b6931983973
SHA5129503ec6a8959f4619108c21abf8911a721474ac486146be44362f9ceeccc5cc8a2c751546aa28215c5a0683f3785548e8ba038b74cf8fb56f8b2953afec0cd40
-
Filesize
900KB
MD550baad51f9e2989fcea4f3252e2988b5
SHA19f263b9eff9e5b7dcb2d24d6c03665c539a44bde
SHA25612ad13ced35f5d6e2d72bda3e9b5ae9ecd878a89f1bf23b546c7c03272e6aa44
SHA5125c72df3914f0368d3775db02487fec618f262df8bc2b9d7b0d34f96465aed6f18af5575ad52c8bec759bbd8cd4f2379dedf6f6926c9fdaf42a0ec3ddf823433c
-
Filesize
2.7MB
MD58d795116f27f70e8b4aba914ace93ca2
SHA1574bee1fc44d913eeb64fedfb1f25dcd51f18983
SHA256ab786f60075ddca4452dc133bc333368c8677507fe0e995f6a6a60f5a4053899
SHA512bcb29613e2e94f8447a98a0dcc10a787b6fb47e1c0fa519c71ba831b6bca03a71f06dd69ee2617181cedfc73204a9b2fb9d2a339a4e4479b5f84a0f6317d016a
-
Filesize
1.8MB
MD5e4c570fba70843d9127a627d5f627766
SHA19528c5de55077ba02d941300cc0960b4076b6ae8
SHA256ccd674dfa452e95b5d4a97d91a8e44d2268a3b8438cc5a4fd17d9b63cdd78e86
SHA51207a920c8029b2fbaff0f938702e919bd5ce59dcac3bb09b3fb6cc9057f4cac0d49b3a62a9861de2bedac4eb8fddd8a26798ccebb138f5b25748b979f0b2cd717
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin
Filesize6KB
MD5fb5f632221a9420abc3882c9f7d0633a
SHA1bab584fc69aafc02ba11472f9bd1f933e09b66c0
SHA256fe726bfc18a73cd5fd480893fcc62bc2eba1ad2b417985ab8ad7dea09cb0a622
SHA512c0660e2e03f6c6067eaa5f466167ce6f25456787da486ef527408aa440795bf89c55311104f4db702fe833087c3b95addd33b4757048177cca65ff44fe70af02
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin
Filesize11KB
MD5518a58fac6168e72dc4035a42d984cd1
SHA1a2c1f50e5e59b47507f547a582557b802bc12063
SHA256f6bff0263ec2daf7131d1a113ff05930ac8e0872f0fb6f65364cb2432eb56bf0
SHA51266747979d212fecf79055e3602f1311ef5ee0d378af17fe2d5ce4a32a4334c400999a751cd3fb914c6a47158b687a0a10b5d784d3cf15f28eddbf1b37fab6695
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin
Filesize13KB
MD5e3a49e55987f2122c4a206d03abf75a9
SHA148298210114eb803aa658d024d4011a25b924435
SHA256fdbb43ee10ccb2b63327075d2fbdfa4bfd9af945b3fdab3cb7cd4f80b200fcc0
SHA51215713acd480bc76b88d5d0b172e381e3dcf323f8a56f305c289d9dc761173124aeae9ac18b7df800c5914f58d00c9ee8038c021fe699c410937830bb89dac0c6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD51462ca2e4b36b5c5e0ca90e351b11c83
SHA1eb9b2690dca8357bc81c0c3b87400f312e7a0afa
SHA256aecf3f5e0246d4e4d77f15fd1cbdadb7e3cdbb893647ca6b86813d4ba0001bd4
SHA5121056baf47de306b39b2527fbca9363aff63a92153ac70e2327520ace6eef2ae73be4e2f0a9bdafc384a73ba762e2b483ad029756d739729014644dd7223ce3db
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD5f0b3961787d7ba51d861598cd7ae7d17
SHA17deb370b531843d457e213db299c6407c734a472
SHA2562a3cc705a38904d76c6e817ed03895723ab9f158f7126674e40291a3010ea07a
SHA512446f9d8d87908549428911cbfa91bfd04f615068ad939a2597ef3885bc7133b3aa8664629eb792d14b6903ef248cc597626197a402091be3d887d2b04ae6158f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize21KB
MD5be6a4a1f1b92e8e0c447f93981579098
SHA1e3002a335889b342ff0c65d1c1479673739101a0
SHA256b5a666adc2154a3ed4e8bce8d30b5b4cd805a2259490af6bfca8901b9cc439c2
SHA5127cd3c39f32d72a4ec6b062768939274325af4fe7b4303d29e38e07f3cef029a414d16afb7425b11e9e6913d358e88799c44d1efe670df355245fcd2f3db0c169
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\5fd7d8d3-e3f2-4d22-8c42-395bbeb88c20
Filesize982B
MD5ac686154f464816df0fd6f5bab6dda41
SHA1ca744744f518225de10ba976fc3210c622057a9a
SHA256ba0cedd118a324a448c5dfe6462716002071f8a5ec5b1d8e081c2ed1aa7e8c02
SHA512103b1f9b2a15b392b2a534bfe1eb2f195f41df234c8401583637bfbe3e320705fb15c259d58ac072ee10310e04017a78a1b938b3770898422d94aab39c60c23b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\6ca81f5c-f2a6-4fb8-8c60-d7a87e71d0d2
Filesize659B
MD550bf1309c50660f677d3208c7af8d6b6
SHA1a3a00f165e4f95227dfc47310b58cc0a45b554df
SHA2565af319ee4ed966a0eafd941f4da20caf6ddc82639ceae3d6ee973ec47837065e
SHA5127ea68cad86bdd4468a45be80c5911899901068391f5f8441b571bfc017927f062c37b256a16a512e3dabdea9a6c5d2efd80053d184549595ca969bad0e9d4fac
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD5bf3db5c6bc80427914cab6f01d5f298b
SHA1c9566ecc28a3394dc76cff19f0f34f0c3970a207
SHA256db9f3329a474095db435f9bea6e6d5b85f28970112b034e3ead0b95fddfa2ca3
SHA51226c7cad9d79da4eaffd63e02bdf80f4a9479f2d147f4cfe32b0f5378880e787df3e454c7b4e0df7fb74d97d41789982a7a69049ec123d78f21ecea132e81b026
-
Filesize
15KB
MD583fd61224e322e8fdac0e28af9f7dd44
SHA1dc85ba81e4b12789222461eea7a6aa88e267cc15
SHA256b7dae63e6cebb567d603f69c447205114ca3820d3b47993ad623f322e448ab7f
SHA5120420fb482ebe0079d4727c2e66c1106ebf8927f4ccec1fb9387ab6a918ce59de2000583ec04478e4a46bd002364c69fcf57bce062c1d529a6f9f914edff91406
-
Filesize
11KB
MD5f007df6894b050bf729228feab37b77d
SHA1eaf7af6895e479f6f84cfe43678e378c14489ba8
SHA25613d38fc0b8593b62d3fdb4c8591ae19bd2a87737065e2e473b8411492977a02a
SHA5122700ca7105dc61c203c97b462b02016a68e04f04cee5ab06eb829812c9ac7d5463e3691f6055516c23056009def5d6c75e706edbfdf6219a7e38396cd838301c
-
Filesize
10KB
MD5b89184d376363372f6024017a693c4c9
SHA1c87fa6938e328d8b357dcf186ca5de4fd6e6dbd3
SHA2565c0fbc840c17fe88d8b2a0cfae2050cf12320bbf65ee1e347de7a943fa2777bd
SHA51217a4690e3c596095cf665ae0a66b99f2a70af41ad4eafa208ce9a9b4c79f198a92203589203210eb14feef50cc38d6ec683c94f098cb6906ceee62c87ce6b443