Analysis
-
max time kernel
113s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2024 03:12
Static task
static1
Behavioral task
behavioral1
Sample
87fbaa9b3ef4e605aaf8ad54819726540bea7b6393e213090dda98bc33f3d647N.exe
Resource
win7-20240729-en
General
-
Target
87fbaa9b3ef4e605aaf8ad54819726540bea7b6393e213090dda98bc33f3d647N.exe
-
Size
1.8MB
-
MD5
3c8d4f3ec21d783b2f3707d8b3032f60
-
SHA1
887569a68eafe58323538229a1c89a5681449a31
-
SHA256
87fbaa9b3ef4e605aaf8ad54819726540bea7b6393e213090dda98bc33f3d647
-
SHA512
9013cdd7985e2103cfb985126e4022697309abb705716fa3099e45dc2a4b7537be2e0df1bb9b489ea83cc159c3f8c36140fd0e4183a83b6eeea3a3cd19d93bed
-
SSDEEP
24576:GiZI3q/ZYhTUvu4XYCK7mqtpvp8GPlAdD/9zmt26WeQcEcPH8GLMOMGEP0d:G0IqwUVXN+8GPap9iOrGLJM/P
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
Extracted
stealc
drum
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 09e1215de7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 09e1215de7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 09e1215de7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 09e1215de7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 09e1215de7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 09e1215de7.exe -
Stealc family
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF 1a863387f7.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 87fbaa9b3ef4e605aaf8ad54819726540bea7b6393e213090dda98bc33f3d647N.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1a863387f7.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rhnew.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 88b5f569b2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 09e1215de7.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ da0fd66dd9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3d4b1706a9.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 20 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3d4b1706a9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 88b5f569b2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 87fbaa9b3ef4e605aaf8ad54819726540bea7b6393e213090dda98bc33f3d647N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion da0fd66dd9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rhnew.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 09e1215de7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 87fbaa9b3ef4e605aaf8ad54819726540bea7b6393e213090dda98bc33f3d647N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion da0fd66dd9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1a863387f7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rhnew.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3d4b1706a9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 88b5f569b2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1a863387f7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 09e1215de7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 87fbaa9b3ef4e605aaf8ad54819726540bea7b6393e213090dda98bc33f3d647N.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 10 IoCs
pid Process 4216 skotes.exe 2292 da0fd66dd9.exe 1888 1a863387f7.exe 2824 rhnew.exe 1252 3d4b1706a9.exe 2916 88b5f569b2.exe 4452 720c8aca65.exe 3620 skotes.exe 2768 09e1215de7.exe 5312 skotes.exe -
Identifies Wine through registry keys 2 TTPs 10 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 87fbaa9b3ef4e605aaf8ad54819726540bea7b6393e213090dda98bc33f3d647N.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 1a863387f7.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 3d4b1706a9.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 88b5f569b2.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 09e1215de7.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine da0fd66dd9.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine rhnew.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 09e1215de7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 09e1215de7.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\3d4b1706a9.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1012229001\\3d4b1706a9.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\88b5f569b2.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1012230001\\88b5f569b2.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\720c8aca65.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1012231001\\720c8aca65.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\09e1215de7.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1012232001\\09e1215de7.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0008000000023c0a-150.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
pid Process 3336 87fbaa9b3ef4e605aaf8ad54819726540bea7b6393e213090dda98bc33f3d647N.exe 4216 skotes.exe 2292 da0fd66dd9.exe 1888 1a863387f7.exe 2824 rhnew.exe 1252 3d4b1706a9.exe 2916 88b5f569b2.exe 3620 skotes.exe 2768 09e1215de7.exe 5312 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 87fbaa9b3ef4e605aaf8ad54819726540bea7b6393e213090dda98bc33f3d647N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 3604 1252 WerFault.exe 93 1376 1252 WerFault.exe 93 -
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 09e1215de7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1a863387f7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 88b5f569b2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da0fd66dd9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 720c8aca65.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 87fbaa9b3ef4e605aaf8ad54819726540bea7b6393e213090dda98bc33f3d647N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 720c8aca65.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3d4b1706a9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 720c8aca65.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rhnew.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 4160 taskkill.exe 3068 taskkill.exe 3064 taskkill.exe 3240 taskkill.exe 1276 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 35 IoCs
pid Process 3336 87fbaa9b3ef4e605aaf8ad54819726540bea7b6393e213090dda98bc33f3d647N.exe 3336 87fbaa9b3ef4e605aaf8ad54819726540bea7b6393e213090dda98bc33f3d647N.exe 4216 skotes.exe 4216 skotes.exe 2292 da0fd66dd9.exe 2292 da0fd66dd9.exe 1888 1a863387f7.exe 1888 1a863387f7.exe 1888 1a863387f7.exe 1888 1a863387f7.exe 1888 1a863387f7.exe 1888 1a863387f7.exe 1888 1a863387f7.exe 1888 1a863387f7.exe 1888 1a863387f7.exe 1888 1a863387f7.exe 2824 rhnew.exe 2824 rhnew.exe 1252 3d4b1706a9.exe 1252 3d4b1706a9.exe 2916 88b5f569b2.exe 2916 88b5f569b2.exe 3620 skotes.exe 3620 skotes.exe 4452 720c8aca65.exe 4452 720c8aca65.exe 2768 09e1215de7.exe 2768 09e1215de7.exe 2768 09e1215de7.exe 2768 09e1215de7.exe 2768 09e1215de7.exe 4452 720c8aca65.exe 4452 720c8aca65.exe 5312 skotes.exe 5312 skotes.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 3068 taskkill.exe Token: SeDebugPrivilege 3064 taskkill.exe Token: SeDebugPrivilege 3240 taskkill.exe Token: SeDebugPrivilege 1276 taskkill.exe Token: SeDebugPrivilege 4160 taskkill.exe Token: SeDebugPrivilege 4448 firefox.exe Token: SeDebugPrivilege 4448 firefox.exe Token: SeDebugPrivilege 2768 09e1215de7.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 3336 87fbaa9b3ef4e605aaf8ad54819726540bea7b6393e213090dda98bc33f3d647N.exe 4452 720c8aca65.exe 4452 720c8aca65.exe 4452 720c8aca65.exe 4452 720c8aca65.exe 4452 720c8aca65.exe 4452 720c8aca65.exe 4452 720c8aca65.exe 4452 720c8aca65.exe 4452 720c8aca65.exe 4452 720c8aca65.exe 4448 firefox.exe 4448 firefox.exe 4448 firefox.exe 4448 firefox.exe 4448 firefox.exe 4448 firefox.exe 4448 firefox.exe 4448 firefox.exe 4448 firefox.exe 4448 firefox.exe 4448 firefox.exe 4448 firefox.exe 4448 firefox.exe 4448 firefox.exe 4448 firefox.exe 4448 firefox.exe 4448 firefox.exe 4448 firefox.exe 4448 firefox.exe 4448 firefox.exe 4448 firefox.exe 4452 720c8aca65.exe 4452 720c8aca65.exe 4452 720c8aca65.exe -
Suspicious use of SendNotifyMessage 33 IoCs
pid Process 4452 720c8aca65.exe 4452 720c8aca65.exe 4452 720c8aca65.exe 4452 720c8aca65.exe 4452 720c8aca65.exe 4452 720c8aca65.exe 4452 720c8aca65.exe 4452 720c8aca65.exe 4452 720c8aca65.exe 4452 720c8aca65.exe 4448 firefox.exe 4448 firefox.exe 4448 firefox.exe 4448 firefox.exe 4448 firefox.exe 4448 firefox.exe 4448 firefox.exe 4448 firefox.exe 4448 firefox.exe 4448 firefox.exe 4448 firefox.exe 4448 firefox.exe 4448 firefox.exe 4448 firefox.exe 4448 firefox.exe 4448 firefox.exe 4448 firefox.exe 4448 firefox.exe 4448 firefox.exe 4448 firefox.exe 4452 720c8aca65.exe 4452 720c8aca65.exe 4452 720c8aca65.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4448 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3336 wrote to memory of 4216 3336 87fbaa9b3ef4e605aaf8ad54819726540bea7b6393e213090dda98bc33f3d647N.exe 82 PID 3336 wrote to memory of 4216 3336 87fbaa9b3ef4e605aaf8ad54819726540bea7b6393e213090dda98bc33f3d647N.exe 82 PID 3336 wrote to memory of 4216 3336 87fbaa9b3ef4e605aaf8ad54819726540bea7b6393e213090dda98bc33f3d647N.exe 82 PID 4216 wrote to memory of 2292 4216 skotes.exe 88 PID 4216 wrote to memory of 2292 4216 skotes.exe 88 PID 4216 wrote to memory of 2292 4216 skotes.exe 88 PID 4216 wrote to memory of 1888 4216 skotes.exe 91 PID 4216 wrote to memory of 1888 4216 skotes.exe 91 PID 4216 wrote to memory of 1888 4216 skotes.exe 91 PID 4216 wrote to memory of 2824 4216 skotes.exe 92 PID 4216 wrote to memory of 2824 4216 skotes.exe 92 PID 4216 wrote to memory of 2824 4216 skotes.exe 92 PID 4216 wrote to memory of 1252 4216 skotes.exe 93 PID 4216 wrote to memory of 1252 4216 skotes.exe 93 PID 4216 wrote to memory of 1252 4216 skotes.exe 93 PID 4216 wrote to memory of 2916 4216 skotes.exe 94 PID 4216 wrote to memory of 2916 4216 skotes.exe 94 PID 4216 wrote to memory of 2916 4216 skotes.exe 94 PID 4216 wrote to memory of 4452 4216 skotes.exe 96 PID 4216 wrote to memory of 4452 4216 skotes.exe 96 PID 4216 wrote to memory of 4452 4216 skotes.exe 96 PID 4452 wrote to memory of 3068 4452 720c8aca65.exe 102 PID 4452 wrote to memory of 3068 4452 720c8aca65.exe 102 PID 4452 wrote to memory of 3068 4452 720c8aca65.exe 102 PID 4452 wrote to memory of 3064 4452 720c8aca65.exe 106 PID 4452 wrote to memory of 3064 4452 720c8aca65.exe 106 PID 4452 wrote to memory of 3064 4452 720c8aca65.exe 106 PID 4216 wrote to memory of 2768 4216 skotes.exe 108 PID 4216 wrote to memory of 2768 4216 skotes.exe 108 PID 4216 wrote to memory of 2768 4216 skotes.exe 108 PID 4452 wrote to memory of 3240 4452 720c8aca65.exe 109 PID 4452 wrote to memory of 3240 4452 720c8aca65.exe 109 PID 4452 wrote to memory of 3240 4452 720c8aca65.exe 109 PID 4452 wrote to memory of 1276 4452 720c8aca65.exe 111 PID 4452 wrote to memory of 1276 4452 720c8aca65.exe 111 PID 4452 wrote to memory of 1276 4452 720c8aca65.exe 111 PID 4452 wrote to memory of 4160 4452 720c8aca65.exe 113 PID 4452 wrote to memory of 4160 4452 720c8aca65.exe 113 PID 4452 wrote to memory of 4160 4452 720c8aca65.exe 113 PID 4452 wrote to memory of 3096 4452 720c8aca65.exe 115 PID 4452 wrote to memory of 3096 4452 720c8aca65.exe 115 PID 3096 wrote to memory of 4448 3096 firefox.exe 116 PID 3096 wrote to memory of 4448 3096 firefox.exe 116 PID 3096 wrote to memory of 4448 3096 firefox.exe 116 PID 3096 wrote to memory of 4448 3096 firefox.exe 116 PID 3096 wrote to memory of 4448 3096 firefox.exe 116 PID 3096 wrote to memory of 4448 3096 firefox.exe 116 PID 3096 wrote to memory of 4448 3096 firefox.exe 116 PID 3096 wrote to memory of 4448 3096 firefox.exe 116 PID 3096 wrote to memory of 4448 3096 firefox.exe 116 PID 3096 wrote to memory of 4448 3096 firefox.exe 116 PID 3096 wrote to memory of 4448 3096 firefox.exe 116 PID 4448 wrote to memory of 3920 4448 firefox.exe 117 PID 4448 wrote to memory of 3920 4448 firefox.exe 117 PID 4448 wrote to memory of 3920 4448 firefox.exe 117 PID 4448 wrote to memory of 3920 4448 firefox.exe 117 PID 4448 wrote to memory of 3920 4448 firefox.exe 117 PID 4448 wrote to memory of 3920 4448 firefox.exe 117 PID 4448 wrote to memory of 3920 4448 firefox.exe 117 PID 4448 wrote to memory of 3920 4448 firefox.exe 117 PID 4448 wrote to memory of 3920 4448 firefox.exe 117 PID 4448 wrote to memory of 3920 4448 firefox.exe 117 PID 4448 wrote to memory of 3920 4448 firefox.exe 117 PID 4448 wrote to memory of 3920 4448 firefox.exe 117 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\87fbaa9b3ef4e605aaf8ad54819726540bea7b6393e213090dda98bc33f3d647N.exe"C:\Users\Admin\AppData\Local\Temp\87fbaa9b3ef4e605aaf8ad54819726540bea7b6393e213090dda98bc33f3d647N.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3336 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Users\Admin\AppData\Local\Temp\1012226001\da0fd66dd9.exe"C:\Users\Admin\AppData\Local\Temp\1012226001\da0fd66dd9.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2292
-
-
C:\Users\Admin\AppData\Local\Temp\1012227001\1a863387f7.exe"C:\Users\Admin\AppData\Local\Temp\1012227001\1a863387f7.exe"3⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1888
-
-
C:\Users\Admin\AppData\Local\Temp\1012228001\rhnew.exe"C:\Users\Admin\AppData\Local\Temp\1012228001\rhnew.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2824
-
-
C:\Users\Admin\AppData\Local\Temp\1012229001\3d4b1706a9.exe"C:\Users\Admin\AppData\Local\Temp\1012229001\3d4b1706a9.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1252 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1252 -s 15444⤵
- Program crash
PID:1376
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1252 -s 15324⤵
- Program crash
PID:3604
-
-
-
C:\Users\Admin\AppData\Local\Temp\1012230001\88b5f569b2.exe"C:\Users\Admin\AppData\Local\Temp\1012230001\88b5f569b2.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2916
-
-
C:\Users\Admin\AppData\Local\Temp\1012231001\720c8aca65.exe"C:\Users\Admin\AppData\Local\Temp\1012231001\720c8aca65.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3068
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3064
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3240
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1276
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4160
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2008 -parentBuildID 20240401114208 -prefsHandle 1924 -prefMapHandle 1916 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {64a2e00a-89d4-4dbb-94c0-c9947a97aeda} 4448 "\\.\pipe\gecko-crash-server-pipe.4448" gpu6⤵PID:3920
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2448 -parentBuildID 20240401114208 -prefsHandle 2424 -prefMapHandle 2420 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fdfd3e7e-cfd4-4f98-8792-074c5be2a11b} 4448 "\\.\pipe\gecko-crash-server-pipe.4448" socket6⤵PID:2720
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3088 -childID 1 -isForBrowser -prefsHandle 3080 -prefMapHandle 1572 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7f1fb439-4af8-4f47-b68a-8cf57b3e9c4e} 4448 "\\.\pipe\gecko-crash-server-pipe.4448" tab6⤵PID:3480
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4084 -childID 2 -isForBrowser -prefsHandle 4188 -prefMapHandle 4184 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e66d7c90-6611-444c-8188-bdbe30b180bc} 4448 "\\.\pipe\gecko-crash-server-pipe.4448" tab6⤵PID:2216
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4856 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4848 -prefMapHandle 4812 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {905c09e2-e02a-46e0-a5e6-a22d86ae78da} 4448 "\\.\pipe\gecko-crash-server-pipe.4448" utility6⤵
- Checks processor information in registry
PID:1468
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5352 -childID 3 -isForBrowser -prefsHandle 5264 -prefMapHandle 5388 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8814419a-4cd2-4527-8ecc-596ece5ca33c} 4448 "\\.\pipe\gecko-crash-server-pipe.4448" tab6⤵PID:5208
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5480 -childID 4 -isForBrowser -prefsHandle 5612 -prefMapHandle 5616 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {bc13ec89-37ce-4183-9fa0-6fc4928d5386} 4448 "\\.\pipe\gecko-crash-server-pipe.4448" tab6⤵PID:5184
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5788 -childID 5 -isForBrowser -prefsHandle 5868 -prefMapHandle 5864 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c62680fd-39ef-4202-8e1d-9380b3a26d64} 4448 "\\.\pipe\gecko-crash-server-pipe.4448" tab6⤵PID:5168
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1012232001\09e1215de7.exe"C:\Users\Admin\AppData\Local\Temp\1012232001\09e1215de7.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2768
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 280 -p 1252 -ip 12521⤵PID:3316
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1252 -ip 12521⤵PID:2808
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3620
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5312
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\85mw8mk9.default-release\activity-stream.discovery_stream.json
Filesize27KB
MD560261d1ee75bf27ac31cec20710c99b8
SHA17e08be75806dc08377f4ef756275513ff9217739
SHA2560b5c17ded5f09374860e837e5fbb025f7085b5839c30bd243851b6ca5dfbfa79
SHA5125634fe12c1381be4f709daaccf5d9b38e8d11ee90e716f26abc569e534499737583f720ee0ce72560ee80553220e42b20240a1419c5ecfed9b1770d5122a48ee
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\85mw8mk9.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD5d5a39907fd924d71598a7e566e55f90f
SHA13e022baba15b4de9b0ae6f9aefde4f599fca15e1
SHA256acfbe0876eb152b227eb8fdfe91dead04e0e7935799edcd547b30e058862fabd
SHA51252b3ae041ba329046fe6c0d03ed79bea91bc0138ad048fa3b9c9484634de3f5c16380518dcf118a20d436538ecaa81f433132a09176da0feb2e602aeb0eebfb0
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\85mw8mk9.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
612B
MD5e3eb0a1df437f3f97a64aca5952c8ea0
SHA17dd71afcfb14e105e80b0c0d7fce370a28a41f0a
SHA25638ffd4972ae513a0c79a8be4573403edcd709f0f572105362b08ff50cf6de521
SHA51243573b0cbaac6e2e1646e6217d2d10c40ad10b9db1f4492d6740545e793c891b5e39283a082896c0392b88eb319dfa9392421b1c89c094c9ce9f31b53d37ebaf
-
Filesize
1.8MB
MD506b66556e8a2389c099c0da6e0db3dd2
SHA153f96909c6ae94499b790eba12ec355a275388df
SHA256ccd13fcd2302d16a0fd2d9cc2653869ce0551d464145bf264f75163f03f874bc
SHA5128623c835b552b000749405788eba8cc221f505d5285ff5fe8c5d79d81ae5d9a18985427e1f98c4baf2defd38ece14af11683524de636612d69d9b913a6869ce5
-
Filesize
4.2MB
MD5e93c5f56c3eb85ea13429c5f631abbcb
SHA1a2e3646cf1d680184765e257882457c63ff848e2
SHA25680b77c9eb6dcf6dc2a80196125fd25ed50438cdba14056a6651a394c3ca39b9c
SHA51267e17aada73f4114b81aa46841915e800a89ab34ba748280bcb68196c11aa90a4924432ec758f9c8f9c0150478e5390a7d661977b94f0b8f1911fa910fb9c5bd
-
Filesize
1.8MB
MD5f7286fef9317fe91e24cda721ec0be81
SHA10e0197c0f87200f7c1ebb4bba314f7bb875a638c
SHA2564dcf1cc20990dace1f3e7c5a4b94ea7b823f90eb6de639b2b1b6494838f1cc62
SHA512314b3f5cf1a0c15db568d33647b97887b37e987ba253ee9f5ded045446328307ebd04acd832fbdf66ad29be9510bd0c378e2fcb889509dca84df9b9106602c6e
-
Filesize
1.8MB
MD523ddcfde817deaeb84b5663a72ad720f
SHA10b57ed7a5173e8f11bd9c8ab8960263898add6a1
SHA256a3f1ba6a38de8f4eb4ee0f2a75292adee59c326277f958f2c5bb683c8c2fdeaa
SHA5120f48e55c9dd797299ceee896ed377cb4b11aa6301c89a0192a6a3ee655a7556d776f87a334e83d211058390f3626026f2e465397052e719d4b104060845c2c4b
-
Filesize
1.8MB
MD5895df85058f2f0ee82555cc8ce5e063a
SHA156d2e3f7083fade6f66031e27dd5c47bb77b6697
SHA25663c64dd8eeeffcad0b37e07d0341eda4d717f1cb48a144d9c5865a82894ea4aa
SHA51209269697012216b82c5a1b8fadcb54f359787b59bc94748087a02dd2a60007dac10830ae6213cfc4f2b4e09171b361cc601e9ef63c955fe5bcf8ae1a630fac0d
-
Filesize
945KB
MD54649397a6a1968ac5b2074177c742043
SHA12392e580fb137377088054476ec87e06ab52d46b
SHA256463161b9fadfc8e981a4d30534122db23b67b9f510638c9e16100a61edbe4fe5
SHA5128459683597ce97a7f06eb750b15b5d4cfe2393de13e94b1913851a8ba6ea3959c5ac83922284668ab7d6c8ff89ca2f4bf1860a39dd130b6a12becd9183a6c69e
-
Filesize
2.6MB
MD581b7948e620003ab2853170a2b8b43d4
SHA189df6a91073699adf7f3d6a5d15813ddd4c3a687
SHA256d90dc3e94ebc7ec7a9d1464e7e91a3356d42607beb85d25b780c61faf6d67421
SHA512ae2e183d4730b01720fd160a24c179c9b24b9f22b828294420f94f74d0e9d6f85520be5b329e7daf81c845dd8f5dbd9e1a50a1775a19d69c2085606e7362aa50
-
Filesize
1.8MB
MD53c8d4f3ec21d783b2f3707d8b3032f60
SHA1887569a68eafe58323538229a1c89a5681449a31
SHA25687fbaa9b3ef4e605aaf8ad54819726540bea7b6393e213090dda98bc33f3d647
SHA5129013cdd7985e2103cfb985126e4022697309abb705716fa3099e45dc2a4b7537be2e0df1bb9b489ea83cc159c3f8c36140fd0e4183a83b6eeea3a3cd19d93bed
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\AlternateServices.bin
Filesize6KB
MD512f37c573cbef2ee2653320869f3a08f
SHA183f40dc490d74492f75dce308d62917aa018b547
SHA256bdaf5584a63a95f673c8d812e65443ceef408a18a9713f9a9a292b69c7bbeb58
SHA5126b40b523240c81af9d8cec317b33c136e90825c1a1db9a9fbb6e57bc3c8bdea15b9247b79099bc1cb112e01ca9364fc5b227b4b44c632c12e4b8ab3a607ecea7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\AlternateServices.bin
Filesize8KB
MD50ddcb6e94e1e33132833f3038706d6c8
SHA15f361be9dc331909ddc52afbdc10110345510c3b
SHA256ee43ee85d62395e67bdc71f1f0dc255e1d941122a88b9de38f678fb0c720e4c1
SHA512de0c5c20d4bbd7e17f0900e87f046d33a9c506ce1fc0eec9963a92f3fbc1b5a9b00403ff1c62f17059c0e5121ac61bfe25090cf493b44b42b8ec224f104672cb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD5d087bcf35653279e099baddfb8cbd11d
SHA1b5022058b1de4b73deff9c55bcf9b538813e3ea1
SHA25622682ef460f71f675a040a4a3e9c414a1b3ae675f8f31a5eb292b03b5a4a32cb
SHA5127d73c2e138767881a4e4ceb509adcdc51f2e5f487d9ef2372b3ff52e37893deddc289c44c4708517155aaf547fe209230f8761a10bb6e869424e4e7411d95d79
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD5e6213a9ed3fdf349d4f88dbe28ceaed2
SHA1b641e952cc33fb039e5f3d664e07a25dc92c1279
SHA256e6db81737829751f080f30f43cc7b6cfd2d4e06f12f3014f1ae42c7f2e8c70e4
SHA5123215fb112450dce45569ebc90758379393b1c5af4e2a9b6f8ec6de0f7385895111e1de1bdf4db6b0e24150367793d4d04b8503170dd40fae1cfdf4bc72980e56
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD5850abd194437871875c3b8c6322391cb
SHA12e1f3f8b7d318dcfa5e29fe0f3a3341877edefd6
SHA2562a121bd692aaf7a2716993c4a761eac7d1fd7915c2730408d49808918beaa48e
SHA512b9950b9d6582d5e09afbc8b68720bbd1766ccd8a84fec7f2eef836d89518c540572f48671a85c79d37db7faa45aa4a3c72136fcbef98e1d89c47094a6f7fa6c9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD58faed014cee8b3358e548bbc0795e218
SHA1cffaa73929b734bc2c05a9a124bb9dba56ddf143
SHA256728231b4fbeb66590960e7bf526537c8cd85864213b5edd8de7491b2df1b0b1d
SHA5128688ec75a8c940a8f0fb92a8101a14101ae3f919eb984c71bb276312efed885e6024de8f0167cc152487f8d726dbe978ab1119bcb890d11bf9f6b1289ffefd9b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\pending_pings\30d872e4-d32b-4dbc-bef6-bb61a894e962
Filesize659B
MD5ea0858d04c2f2d9e903679663e260f70
SHA13ba6cb3447cbf63995014dae08969ff580401aea
SHA25641bc050c7127575017f3734b1538a0434d0de7e47d99bdd80324cbcafda66d8e
SHA5128dcbf00220a8a41626d2b340c573d791b2ed9aaa93f0cbf97d0d51d948296cdef0aec049c0f55b0a5c07b3d6cbb599931b51ee4060d65f2898ccf66fc9dd13f7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\pending_pings\4724527f-6ac6-498c-9f06-bbf6311bcaf6
Filesize982B
MD58660b51b3e593a8b9945bedbc2b5e5fe
SHA18481c7afce9008fd8cd54ffc6a02962d7b903ab9
SHA2569e8fd78e1e655eb2eed5a7aab1d4da02bd09cd7119ed26724d4f2f39b89dcbd1
SHA512db0755759cf7bdcfd80f255f8639072b51adffbeefa5ae576e2de55279c47e646c7f6b862940700d41e79823f9e5502759779e48a83c401cc11bce834ae7722b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD5800a9dc2ccc7acf50e810c90d3a3399e
SHA19ab430b25685bd93466d25ff437d7f37ecce1680
SHA256f21716664d3b6f4bf98185bbefbf353a6dd9d622284838ea32200f680686d0da
SHA51235931aaf53bcf1d7665e8a83b7fbbd9ade972d8d844eb8f8cb8841e0919e8222258e529dc13af7abee57abdc8e8049eecc9f199490afeba6f8a25caba2a3db8a
-
Filesize
15KB
MD5c741e7a54c25a2e46b642af31da1e22c
SHA14baa372a280d141a1c04cab01d132a8822980a64
SHA2563053ab131bc15090796224f7d58fb3c02a4e99fe124b859cc541fb33df1d50d2
SHA51285d5f40788fc9e7ea3106d10f8b3f1051c6384a6f167e04a1bf873a654e46d1d990298ae097b3ba2396a85c244f9af1d96682c219397bdafc9c80b04abb6c4e5
-
Filesize
10KB
MD5c24cfa12c04c2a51386b08b08d3d25e8
SHA18ae7b50b15df68892e321b7b599e2bf11a7d65c4
SHA2562c44f524ebe8e2b8b3586f57bd9f23f4264528d6758f38b7488199079a66e692
SHA512fc06923ffd09b0120563ab4369f7e5794d77b329a761c7434e62a147d85308ec88e2b818240251e82e9f8d9eab17243121ffee1ad25e1f676ba5c0f515fb2176