Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2024, 03:06
Static task
static1
Behavioral task
behavioral1
Sample
c5bac7238f730c212ee80e3c8e0a4b789908b1cdf3004a43330f8780460d3d0b.exe
Resource
win7-20240903-en
General
-
Target
c5bac7238f730c212ee80e3c8e0a4b789908b1cdf3004a43330f8780460d3d0b.exe
-
Size
1.8MB
-
MD5
9ec3d5ed65bf8dc11d766f25c0860001
-
SHA1
dc7c8af390895418dc67e9fbd9cce4010b71478d
-
SHA256
c5bac7238f730c212ee80e3c8e0a4b789908b1cdf3004a43330f8780460d3d0b
-
SHA512
d4f87ff7eeb3eeaf96247ebaa70a5e774d23664c3226bc5fd49fc2523eceac433dd9d0d2121247128c2e59cb4d9ee24747ca26a2bc35db09252087dc8427827c
-
SSDEEP
24576:I6y3+4gnUPo3oxelWpYrt8mM31z90huKcgNGaWYbWzl+U3XTg3RwpB9KJ1MohLGO:9A+4UyOWpYJM31k8l7ppSHrg9k0zs4
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
drum
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" e6ac380afb.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection e6ac380afb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" e6ac380afb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" e6ac380afb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" e6ac380afb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" e6ac380afb.exe -
Stealc family
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF 0ada8c1b8d.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c5bac7238f730c212ee80e3c8e0a4b789908b1cdf3004a43330f8780460d3d0b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 32766f4739.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0ada8c1b8d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1028fe20fa.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8f3aa176bb.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e6ac380afb.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8f3aa176bb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c5bac7238f730c212ee80e3c8e0a4b789908b1cdf3004a43330f8780460d3d0b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1028fe20fa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8f3aa176bb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e6ac380afb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0ada8c1b8d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1028fe20fa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 32766f4739.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 32766f4739.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c5bac7238f730c212ee80e3c8e0a4b789908b1cdf3004a43330f8780460d3d0b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0ada8c1b8d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e6ac380afb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation c5bac7238f730c212ee80e3c8e0a4b789908b1cdf3004a43330f8780460d3d0b.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 9 IoCs
pid Process 2736 skotes.exe 2680 0ada8c1b8d.exe 3872 1028fe20fa.exe 3248 8f3aa176bb.exe 4976 32766f4739.exe 2980 906fdb6219.exe 2084 e6ac380afb.exe 5780 skotes.exe 5780 skotes.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine 0ada8c1b8d.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine 1028fe20fa.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine 8f3aa176bb.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine 32766f4739.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine e6ac380afb.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine c5bac7238f730c212ee80e3c8e0a4b789908b1cdf3004a43330f8780460d3d0b.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine skotes.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features e6ac380afb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" e6ac380afb.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\8f3aa176bb.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010862001\\8f3aa176bb.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\32766f4739.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010863001\\32766f4739.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\906fdb6219.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010864001\\906fdb6219.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e6ac380afb.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010865001\\e6ac380afb.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000023cd3-99.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 5076 c5bac7238f730c212ee80e3c8e0a4b789908b1cdf3004a43330f8780460d3d0b.exe 2736 skotes.exe 2680 0ada8c1b8d.exe 3872 1028fe20fa.exe 3248 8f3aa176bb.exe 4976 32766f4739.exe 2084 e6ac380afb.exe 5780 skotes.exe 5780 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job c5bac7238f730c212ee80e3c8e0a4b789908b1cdf3004a43330f8780460d3d0b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3352 3248 WerFault.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1028fe20fa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 32766f4739.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 906fdb6219.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c5bac7238f730c212ee80e3c8e0a4b789908b1cdf3004a43330f8780460d3d0b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0ada8c1b8d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8f3aa176bb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e6ac380afb.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 1800 taskkill.exe 1900 taskkill.exe 4084 taskkill.exe 3188 taskkill.exe 5092 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 5076 c5bac7238f730c212ee80e3c8e0a4b789908b1cdf3004a43330f8780460d3d0b.exe 5076 c5bac7238f730c212ee80e3c8e0a4b789908b1cdf3004a43330f8780460d3d0b.exe 2736 skotes.exe 2736 skotes.exe 2680 0ada8c1b8d.exe 2680 0ada8c1b8d.exe 2680 0ada8c1b8d.exe 2680 0ada8c1b8d.exe 2680 0ada8c1b8d.exe 2680 0ada8c1b8d.exe 2680 0ada8c1b8d.exe 2680 0ada8c1b8d.exe 2680 0ada8c1b8d.exe 2680 0ada8c1b8d.exe 3872 1028fe20fa.exe 3872 1028fe20fa.exe 3248 8f3aa176bb.exe 3248 8f3aa176bb.exe 4976 32766f4739.exe 4976 32766f4739.exe 2980 906fdb6219.exe 2980 906fdb6219.exe 2084 e6ac380afb.exe 2084 e6ac380afb.exe 2980 906fdb6219.exe 2980 906fdb6219.exe 2084 e6ac380afb.exe 2084 e6ac380afb.exe 2084 e6ac380afb.exe 5780 skotes.exe 5780 skotes.exe 5780 skotes.exe 5780 skotes.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 5092 taskkill.exe Token: SeDebugPrivilege 1800 taskkill.exe Token: SeDebugPrivilege 1900 taskkill.exe Token: SeDebugPrivilege 4084 taskkill.exe Token: SeDebugPrivilege 3188 taskkill.exe Token: SeDebugPrivilege 3320 firefox.exe Token: SeDebugPrivilege 3320 firefox.exe Token: SeDebugPrivilege 2084 e6ac380afb.exe Token: SeDebugPrivilege 3320 firefox.exe Token: SeDebugPrivilege 3320 firefox.exe Token: SeDebugPrivilege 3320 firefox.exe -
Suspicious use of FindShellTrayWindow 32 IoCs
pid Process 5076 c5bac7238f730c212ee80e3c8e0a4b789908b1cdf3004a43330f8780460d3d0b.exe 2980 906fdb6219.exe 2980 906fdb6219.exe 2980 906fdb6219.exe 2980 906fdb6219.exe 2980 906fdb6219.exe 2980 906fdb6219.exe 3320 firefox.exe 3320 firefox.exe 3320 firefox.exe 3320 firefox.exe 2980 906fdb6219.exe 3320 firefox.exe 3320 firefox.exe 3320 firefox.exe 3320 firefox.exe 3320 firefox.exe 3320 firefox.exe 3320 firefox.exe 3320 firefox.exe 3320 firefox.exe 3320 firefox.exe 3320 firefox.exe 3320 firefox.exe 3320 firefox.exe 3320 firefox.exe 3320 firefox.exe 3320 firefox.exe 3320 firefox.exe 2980 906fdb6219.exe 2980 906fdb6219.exe 2980 906fdb6219.exe -
Suspicious use of SendNotifyMessage 30 IoCs
pid Process 2980 906fdb6219.exe 2980 906fdb6219.exe 2980 906fdb6219.exe 2980 906fdb6219.exe 2980 906fdb6219.exe 2980 906fdb6219.exe 3320 firefox.exe 3320 firefox.exe 3320 firefox.exe 3320 firefox.exe 2980 906fdb6219.exe 3320 firefox.exe 3320 firefox.exe 3320 firefox.exe 3320 firefox.exe 3320 firefox.exe 3320 firefox.exe 3320 firefox.exe 3320 firefox.exe 3320 firefox.exe 3320 firefox.exe 3320 firefox.exe 3320 firefox.exe 3320 firefox.exe 3320 firefox.exe 3320 firefox.exe 3320 firefox.exe 2980 906fdb6219.exe 2980 906fdb6219.exe 2980 906fdb6219.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3320 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5076 wrote to memory of 2736 5076 c5bac7238f730c212ee80e3c8e0a4b789908b1cdf3004a43330f8780460d3d0b.exe 84 PID 5076 wrote to memory of 2736 5076 c5bac7238f730c212ee80e3c8e0a4b789908b1cdf3004a43330f8780460d3d0b.exe 84 PID 5076 wrote to memory of 2736 5076 c5bac7238f730c212ee80e3c8e0a4b789908b1cdf3004a43330f8780460d3d0b.exe 84 PID 2736 wrote to memory of 2680 2736 skotes.exe 85 PID 2736 wrote to memory of 2680 2736 skotes.exe 85 PID 2736 wrote to memory of 2680 2736 skotes.exe 85 PID 2736 wrote to memory of 3872 2736 skotes.exe 86 PID 2736 wrote to memory of 3872 2736 skotes.exe 86 PID 2736 wrote to memory of 3872 2736 skotes.exe 86 PID 2736 wrote to memory of 3248 2736 skotes.exe 89 PID 2736 wrote to memory of 3248 2736 skotes.exe 89 PID 2736 wrote to memory of 3248 2736 skotes.exe 89 PID 2736 wrote to memory of 4976 2736 skotes.exe 92 PID 2736 wrote to memory of 4976 2736 skotes.exe 92 PID 2736 wrote to memory of 4976 2736 skotes.exe 92 PID 2736 wrote to memory of 2980 2736 skotes.exe 94 PID 2736 wrote to memory of 2980 2736 skotes.exe 94 PID 2736 wrote to memory of 2980 2736 skotes.exe 94 PID 2980 wrote to memory of 5092 2980 906fdb6219.exe 97 PID 2980 wrote to memory of 5092 2980 906fdb6219.exe 97 PID 2980 wrote to memory of 5092 2980 906fdb6219.exe 97 PID 2980 wrote to memory of 1800 2980 906fdb6219.exe 102 PID 2980 wrote to memory of 1800 2980 906fdb6219.exe 102 PID 2980 wrote to memory of 1800 2980 906fdb6219.exe 102 PID 2980 wrote to memory of 1900 2980 906fdb6219.exe 104 PID 2980 wrote to memory of 1900 2980 906fdb6219.exe 104 PID 2980 wrote to memory of 1900 2980 906fdb6219.exe 104 PID 2980 wrote to memory of 4084 2980 906fdb6219.exe 106 PID 2980 wrote to memory of 4084 2980 906fdb6219.exe 106 PID 2980 wrote to memory of 4084 2980 906fdb6219.exe 106 PID 2980 wrote to memory of 3188 2980 906fdb6219.exe 108 PID 2980 wrote to memory of 3188 2980 906fdb6219.exe 108 PID 2980 wrote to memory of 3188 2980 906fdb6219.exe 108 PID 2980 wrote to memory of 3256 2980 906fdb6219.exe 110 PID 2980 wrote to memory of 3256 2980 906fdb6219.exe 110 PID 3256 wrote to memory of 3320 3256 firefox.exe 111 PID 3256 wrote to memory of 3320 3256 firefox.exe 111 PID 3256 wrote to memory of 3320 3256 firefox.exe 111 PID 3256 wrote to memory of 3320 3256 firefox.exe 111 PID 3256 wrote to memory of 3320 3256 firefox.exe 111 PID 3256 wrote to memory of 3320 3256 firefox.exe 111 PID 3256 wrote to memory of 3320 3256 firefox.exe 111 PID 3256 wrote to memory of 3320 3256 firefox.exe 111 PID 3256 wrote to memory of 3320 3256 firefox.exe 111 PID 3256 wrote to memory of 3320 3256 firefox.exe 111 PID 3256 wrote to memory of 3320 3256 firefox.exe 111 PID 3320 wrote to memory of 4860 3320 firefox.exe 112 PID 3320 wrote to memory of 4860 3320 firefox.exe 112 PID 3320 wrote to memory of 4860 3320 firefox.exe 112 PID 3320 wrote to memory of 4860 3320 firefox.exe 112 PID 3320 wrote to memory of 4860 3320 firefox.exe 112 PID 3320 wrote to memory of 4860 3320 firefox.exe 112 PID 3320 wrote to memory of 4860 3320 firefox.exe 112 PID 3320 wrote to memory of 4860 3320 firefox.exe 112 PID 3320 wrote to memory of 4860 3320 firefox.exe 112 PID 3320 wrote to memory of 4860 3320 firefox.exe 112 PID 3320 wrote to memory of 4860 3320 firefox.exe 112 PID 3320 wrote to memory of 4860 3320 firefox.exe 112 PID 3320 wrote to memory of 4860 3320 firefox.exe 112 PID 3320 wrote to memory of 4860 3320 firefox.exe 112 PID 3320 wrote to memory of 4860 3320 firefox.exe 112 PID 3320 wrote to memory of 4860 3320 firefox.exe 112 PID 3320 wrote to memory of 4860 3320 firefox.exe 112 PID 3320 wrote to memory of 4860 3320 firefox.exe 112 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\c5bac7238f730c212ee80e3c8e0a4b789908b1cdf3004a43330f8780460d3d0b.exe"C:\Users\Admin\AppData\Local\Temp\c5bac7238f730c212ee80e3c8e0a4b789908b1cdf3004a43330f8780460d3d0b.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\1010860001\0ada8c1b8d.exe"C:\Users\Admin\AppData\Local\Temp\1010860001\0ada8c1b8d.exe"3⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2680
-
-
C:\Users\Admin\AppData\Local\Temp\1010861001\1028fe20fa.exe"C:\Users\Admin\AppData\Local\Temp\1010861001\1028fe20fa.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3872
-
-
C:\Users\Admin\AppData\Local\Temp\1010862001\8f3aa176bb.exe"C:\Users\Admin\AppData\Local\Temp\1010862001\8f3aa176bb.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3248 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3248 -s 16644⤵
- Program crash
PID:3352
-
-
-
C:\Users\Admin\AppData\Local\Temp\1010863001\32766f4739.exe"C:\Users\Admin\AppData\Local\Temp\1010863001\32766f4739.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4976
-
-
C:\Users\Admin\AppData\Local\Temp\1010864001\906fdb6219.exe"C:\Users\Admin\AppData\Local\Temp\1010864001\906fdb6219.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5092
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1800
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1900
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4084
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3188
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:3256 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2032 -parentBuildID 20240401114208 -prefsHandle 1960 -prefMapHandle 1952 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {58133a9c-24b7-4d6c-bce4-646482e2b2fa} 3320 "\\.\pipe\gecko-crash-server-pipe.3320" gpu6⤵PID:4860
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2468 -parentBuildID 20240401114208 -prefsHandle 2436 -prefMapHandle 2432 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {358786c7-053f-4c7f-a62d-23b18038d80e} 3320 "\\.\pipe\gecko-crash-server-pipe.3320" socket6⤵PID:3652
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3172 -childID 1 -isForBrowser -prefsHandle 2756 -prefMapHandle 2752 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1228 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f96decb3-db49-4b3b-9abe-e87d269c268b} 3320 "\\.\pipe\gecko-crash-server-pipe.3320" tab6⤵PID:5040
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2796 -childID 2 -isForBrowser -prefsHandle 3988 -prefMapHandle 3224 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1228 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a18c4c1d-a902-4bd6-a4ad-59c1de3fe9d2} 3320 "\\.\pipe\gecko-crash-server-pipe.3320" tab6⤵PID:1256
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4720 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4588 -prefMapHandle 4604 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e99228fc-753c-4421-9275-99251a5fd6c1} 3320 "\\.\pipe\gecko-crash-server-pipe.3320" utility6⤵
- Checks processor information in registry
PID:5340
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5512 -childID 3 -isForBrowser -prefsHandle 5500 -prefMapHandle 5440 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1228 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {86213bfe-16ab-4859-b9a4-998b39d06447} 3320 "\\.\pipe\gecko-crash-server-pipe.3320" tab6⤵PID:316
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4576 -childID 4 -isForBrowser -prefsHandle 4916 -prefMapHandle 5712 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1228 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {748aaef5-1540-4fad-9d63-bc0901c3fabb} 3320 "\\.\pipe\gecko-crash-server-pipe.3320" tab6⤵PID:4752
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5788 -childID 5 -isForBrowser -prefsHandle 5796 -prefMapHandle 5800 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1228 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0a925e9e-fa4b-4593-966e-cd5c2bbf5d79} 3320 "\\.\pipe\gecko-crash-server-pipe.3320" tab6⤵PID:4980
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1010865001\e6ac380afb.exe"C:\Users\Admin\AppData\Local\Temp\1010865001\e6ac380afb.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2084
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3248 -ip 32481⤵PID:3940
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5780
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5780
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
3Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\n4zftpal.default-release\activity-stream.discovery_stream.json
Filesize21KB
MD51ef4c08b4221fb70d168ffe4e12cbe98
SHA1c1d4673d8d64cda36dc7e454b1e85d063ba9ffcf
SHA2564c874ffe841132fec067b36566421e75d5111ece4713bc6fea3164c6b807fb4f
SHA512daac4db949d66568f1f6729b881884478fc1f6965a308748086c044bdf187c3e5710a7fdc0ee558bccc5d662dc0dd22726b9ff494e94dc60e7d1deb9d46048a6
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\n4zftpal.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD58d73b189d9973a49a18a112ba255071f
SHA1fbb2038fb81ed16dcd78d8b62cfe3d5f8a6dc48a
SHA256f7feb2ce18c4640fa0e695e1abe0db36f6a0d605d78a04b18b6d167b3eb7fba3
SHA51253bcd4b95bdced0fd80b657fb9d8a3de5d91c10f758b1d37fb40d2b9a5d046979b51844d1c0f3f5d55e74f9f52c262f326dd52ead5c79833a85e5e90db0ce48d
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\n4zftpal.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD5b213a2100e3a385124404855cbf25f3a
SHA1ec6a200f593db3055ebc8a82af4f33aede5c70af
SHA25653994a21dccfe985739cf3ee585fbb3dcf2ef63e1424d04187867388e619f8b7
SHA512d5c8cb02420c1b21fdc8c23e8b41d155d28fca2ebb624bdd1630364c9f15a5f8d8bd6ca3940319fbdbd4fe5f17c53bdc1f966782779d8efb61de1040ba8aa223
-
Filesize
4.2MB
MD56c4c61c48a26ede8f3f90ecff53a580e
SHA18ec369f0b04dc404236cc6413aae7b1f4741e369
SHA256d98deedd3f4e5ead06704ad629f473ab908d7522f1a81dfb0bd2d423f18f814d
SHA51241012f90a873ad791344cd53fdda100896f70fd03d0e4006ca818ae6c53252868178dd6cb3a62365ee897a5806c924e2a2f310b42b4daee0ddb723182a66e50e
-
Filesize
4.2MB
MD5dad8ca996f7637ba8ec788b6d78e7a54
SHA199ca456ff49b9fb2380a84bce0e7500181d911bf
SHA256f560774162ae0f657dcd34c015ea5a83b4cea91c709dffe93725af6c49324afb
SHA512bab10837e2271f63d7450abe62e2409d5b758d61d3896a2ee6903e58428435e054c8acfe16d2202e5e7e3d55738f6842d984266a29ee8f5def6c732581298f9d
-
Filesize
1.8MB
MD5fb259c5ebc086a3062f5f3dd9e2955ac
SHA114a87eb04c4339f770d55b7f64e0728c87c7b840
SHA2563af486387a0869f29281558b0d919337c181c10999865d3db09fae595b45f9c1
SHA512ebe1b3691ab0c860b2bf8bfdf28d916e29f6d96705eaf6861715f651ec8d50a3ec06f958cebfb469dde0dc70ca844c0dda891a640aa7c3b6a9e836004b2d58e9
-
Filesize
1.7MB
MD5a8d083b25843d8b182146793d9665ac5
SHA17d64723ba2c0fa76e3f1126d3583331364e8815e
SHA2564597e4ff598b3353854bce87b300cc65cab353aad474b32fb2768b6931983973
SHA5129503ec6a8959f4619108c21abf8911a721474ac486146be44362f9ceeccc5cc8a2c751546aa28215c5a0683f3785548e8ba038b74cf8fb56f8b2953afec0cd40
-
Filesize
900KB
MD550baad51f9e2989fcea4f3252e2988b5
SHA19f263b9eff9e5b7dcb2d24d6c03665c539a44bde
SHA25612ad13ced35f5d6e2d72bda3e9b5ae9ecd878a89f1bf23b546c7c03272e6aa44
SHA5125c72df3914f0368d3775db02487fec618f262df8bc2b9d7b0d34f96465aed6f18af5575ad52c8bec759bbd8cd4f2379dedf6f6926c9fdaf42a0ec3ddf823433c
-
Filesize
2.7MB
MD58d795116f27f70e8b4aba914ace93ca2
SHA1574bee1fc44d913eeb64fedfb1f25dcd51f18983
SHA256ab786f60075ddca4452dc133bc333368c8677507fe0e995f6a6a60f5a4053899
SHA512bcb29613e2e94f8447a98a0dcc10a787b6fb47e1c0fa519c71ba831b6bca03a71f06dd69ee2617181cedfc73204a9b2fb9d2a339a4e4479b5f84a0f6317d016a
-
Filesize
1.8MB
MD59ec3d5ed65bf8dc11d766f25c0860001
SHA1dc7c8af390895418dc67e9fbd9cce4010b71478d
SHA256c5bac7238f730c212ee80e3c8e0a4b789908b1cdf3004a43330f8780460d3d0b
SHA512d4f87ff7eeb3eeaf96247ebaa70a5e774d23664c3226bc5fd49fc2523eceac433dd9d0d2121247128c2e59cb4d9ee24747ca26a2bc35db09252087dc8427827c
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\AlternateServices.bin
Filesize6KB
MD5a89d73dc1597b3970405d4f681ed1e70
SHA15446929c9a14ac152ceacc62d4f1fc868d8a5d12
SHA256615544ab4acbf54676307e34591e0d27fff95e63fd4e0ca8b7b0998fa1d03f58
SHA5129eac05a9e6b3f4c9dd443e71eb754ccf6a4183b5704c33f7eaf34b2b1da7f51037bad5bd3725ef25f07efdef49bff324d1004e4b7a270bbe2aa4b0e5948f434d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\AlternateServices.bin
Filesize18KB
MD5549b83cc44d19adb46228229d9bcc872
SHA1c435b89be63680bfa70a25691090af23e66c573b
SHA256da163ea2df46ec3058e25ec445a2d18577e20da6a755fca96c897115363091ac
SHA5124f36590a95b3fbea97818d7360606fd6ce834ba483a1339bbc7be89ca8433940310f3cd6b24967cfe8c311e5dded8f0bf4a077f730da64aa79da3dd14e1d620d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\AlternateServices.bin
Filesize8KB
MD5b6188a7ff24b6e2c5979d066c8b8df77
SHA157f21f889ff0251ebdfedbb4e92b25d1782c5abf
SHA2568173219e138b23822cdcaf22598219bdd261a0ff7269a2f2a5bb24bdead9c239
SHA5129eb70623c971e037363179d2380f51b43f92924286537af19806142271aacba4ab5fa59f7546d059784cf5e40439c8a3a6157a7ddf32cfb967631c7c16e9242a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\AlternateServices.bin
Filesize12KB
MD5187f8595fa84542376184482d89ca581
SHA1af6e1140accf51a0a544983355e499f425389fbf
SHA25673e6382c4377c155174298ed8408e381fe2314b6dca7dcc96df88ead82ca5f6b
SHA51260fa6254b1ceaab185a4aae250edd7df81bb8696c5e00e9fac22428059a803c6c7c29522f5c77affcb99453cac8ae5c37a268468f7aa9e860a213ef2663a0bdb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.tmp
Filesize24KB
MD5fb70fd761c624e8c981d020775033428
SHA13c26161a793b902d6a5a40849a967a2e051629ac
SHA256d95caf24956c9a0d37563611bd389132c97c70f125f6226ff6d6cd00a214379b
SHA512a67f2c794c06bc3c45a797baab213e44dd6297c2ad68d342ca98ab48f2e76c082336e7d97b5ad13e3ed27918d4a0365d9a6e2fab34ce969eb0e821112b47f646
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD5d2b8ce44263301ce4d2686b48d8f3f1c
SHA1d52195e44d58668fb4fd5c0511c0a397b52f6222
SHA256316bde8d5a684825f934e45e12d9f72924ef4dd00a2b8748708c68d8e75eaa1d
SHA5129cdc4ad6d447f1819df7921c191ba56d7c64a069aabd3e803cdab9a0760c4d5fd4716ecda19fa5a1786961ce3cec9b4760c0b79ea58c85fa9a182bb0cbdc3a95
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.tmp
Filesize21KB
MD5daea4f6e0d78f8e1c4e753356369c115
SHA1e47c7f1ec93eb0b75195b0875426443b6511a509
SHA25644072ee076120fe97f19834cfcfff443f5f177f73a6124679c1bd88bce06245d
SHA512dccb87655f9fb5e8a7f114541e579c093362ab0faffcb4f4e46e8db14e0e8c120c30d49e2c1f2a2836703f24aa3212fb9b66b6232dc55bd9fe3c7bb1c0eb9f7b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\pending_pings\42ba9ab9-6cf5-4701-9a42-4da4df315838
Filesize982B
MD5b4494e22b53ee3bef4775400e1ea4d0a
SHA1109c412a62adcc0dc2c86dcb49f1f9d6540d8bbf
SHA25644d609569dd0322c2963e309c91aae13df840216b148a3db24cdaf301fdf0d0e
SHA512867750e83ca8ae7b97079f59433257af50ecaa4fe87f3819343806aef3afe3b84c5b5a162b0a8f0468b0aeb77a2a1f3b90c990effa5fc254d602d596b8427818
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\pending_pings\e43d95cf-5a21-4e27-9b42-24e24e0d0bd0
Filesize659B
MD5f5e84b3b97aa21917bccedae71a1c0ab
SHA15a87f31a225a59f026c7cd914b75dbb62ddd742e
SHA2562fce5a6e1a16ca6b47c2df0cc929d214edc6a90ceab2927a86bf5f05be9007e4
SHA512c6d04feaff0a0517d4fe789beb9087a802913828e6b06f5124227e50c25ba12533b267d07e51c17a712d23aae4d98ed4d12c8a26f5af009db365de3e3a3f7467
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD5d78bc451d54566cf18857e16afc09059
SHA1945a0f0b0c4cc9ebbf0db16c43bceff1127fcc02
SHA2564eb26cc0a4a85c3f0da595859215bab631b1294b54bc20f9123a82d6e856bacf
SHA51297dd2c72881a4a4463308bda822f8ae67a128bd74d0356976f7b7f6de48a29fc71a75e9cb6d09817183e281cf16bc1f1f747779c24fafa82a8a42e28f49f04eb
-
Filesize
15KB
MD5debcd22adbdd522b9d7e6bd3c66f525c
SHA1d8fe0447a98fa3e88705b7839aea35bc3b16853c
SHA256a1baa7ece5b71f019e6bf79d10eff907bc56e2b20be1fbbd9e4ed29272dcbc33
SHA512a9770609c26af141b20c1c8918fab2465e55d64a9a6518dfa07547bd7b948cb422623c2a6033103c759fb3cba5ff93e6819f7ef89ff56cb82523d8e2ca8742ed
-
Filesize
10KB
MD51a2750872e49585ecf5294aae32f5628
SHA1ef27193831e68e007630275e674efd9f0d44f58b
SHA256a37a97b6a86bcd429a3eb5c8c1662a5a80613d1dafdd0ba9bd678a82635e7090
SHA512b8312fd2afd5a06540a2806eb92c62782ffe7d627e9df5896514d9e92f1201413765ce3ff64ac8f706c4d53d6ae7e6796223270d16bb2b784f3fa719de8c4123
-
Filesize
11KB
MD5b2704a8fc87d258c5d37848fec57f6e7
SHA13fb0fb517a092db28f5d33a0ec5a08ffd30c1f38
SHA256c16a089b1a4ae44f4792c1c956929e4fb91c2242281f96c4d4d42ffb68db0999
SHA512b824a43b6993f94752806ec04663c84fa7a5d1cb8cda97a0b19926f7afc06fef151d01786378051a7afa5da23399dce7f0b02e0a6c40e8af0ff18e44f9704f33