Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2024 06:44
Static task
static1
Behavioral task
behavioral1
Sample
25ac3dbca8a16245b4cdc2b1688cf6095dd8f4674a826ce284bcd2cc9990dafe.exe
Resource
win7-20241023-en
General
-
Target
25ac3dbca8a16245b4cdc2b1688cf6095dd8f4674a826ce284bcd2cc9990dafe.exe
-
Size
3.1MB
-
MD5
adb44a697cc6aad041b5c3ab464b44b6
-
SHA1
fcad1763327064b7400880b2f27730c800c83d8c
-
SHA256
25ac3dbca8a16245b4cdc2b1688cf6095dd8f4674a826ce284bcd2cc9990dafe
-
SHA512
57c4c66abeb362d576e548eab31494345a2352ec60e8fc618a7c5d4b32347a3559c5845ac58cb9ced5499727f75aae2f99f2d19863716f7ad52523d77c90bd67
-
SSDEEP
49152:Dn5xyz06ge8oxguIqbl1zPDmRay+VPYm/kQK+UMqIFr6kZkrt:D5xyzNge8vuIqB1zHVAm8QKfakR
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
gcleaner
92.63.197.221
45.91.200.135
Extracted
stealc
drum
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
https://atten-supporse.biz/api
Extracted
lumma
https://atten-supporse.biz/api
https://se-blurry.biz/api
https://zinc-sneark.biz/api
Signatures
-
Amadey family
-
Gcleaner family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 3fe47781e8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 3fe47781e8.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 3fe47781e8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 3fe47781e8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 3fe47781e8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 3fe47781e8.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ aacb06e38c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 52d7d82d28.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3fe47781e8.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 25ac3dbca8a16245b4cdc2b1688cf6095dd8f4674a826ce284bcd2cc9990dafe.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8a0bf72981.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8a0bf72981.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8a0bf72981.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 25ac3dbca8a16245b4cdc2b1688cf6095dd8f4674a826ce284bcd2cc9990dafe.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion aacb06e38c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 52d7d82d28.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 25ac3dbca8a16245b4cdc2b1688cf6095dd8f4674a826ce284bcd2cc9990dafe.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion aacb06e38c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 52d7d82d28.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3fe47781e8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3fe47781e8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 25ac3dbca8a16245b4cdc2b1688cf6095dd8f4674a826ce284bcd2cc9990dafe.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 9 IoCs
pid Process 3280 skotes.exe 1656 skotes.exe 4200 aacb06e38c.exe 4048 8a0bf72981.exe 4672 52d7d82d28.exe 4668 22dcc28758.exe 5448 3fe47781e8.exe 5756 skotes.exe 5340 skotes.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 25ac3dbca8a16245b4cdc2b1688cf6095dd8f4674a826ce284bcd2cc9990dafe.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 3fe47781e8.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine aacb06e38c.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 8a0bf72981.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 52d7d82d28.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 3fe47781e8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 3fe47781e8.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\52d7d82d28.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1012630001\\52d7d82d28.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\22dcc28758.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1012631001\\22dcc28758.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\3fe47781e8.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1012632001\\3fe47781e8.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\8a0bf72981.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1012629001\\8a0bf72981.exe" skotes.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000a000000023b8c-92.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 4784 25ac3dbca8a16245b4cdc2b1688cf6095dd8f4674a826ce284bcd2cc9990dafe.exe 3280 skotes.exe 1656 skotes.exe 4200 aacb06e38c.exe 4048 8a0bf72981.exe 4672 52d7d82d28.exe 5448 3fe47781e8.exe 5756 skotes.exe 5340 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 25ac3dbca8a16245b4cdc2b1688cf6095dd8f4674a826ce284bcd2cc9990dafe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 1728 4048 WerFault.exe 93 444 4048 WerFault.exe 93 -
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aacb06e38c.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 22dcc28758.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 52d7d82d28.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 22dcc28758.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 22dcc28758.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3fe47781e8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 25ac3dbca8a16245b4cdc2b1688cf6095dd8f4674a826ce284bcd2cc9990dafe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8a0bf72981.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 956 taskkill.exe 4500 taskkill.exe 1960 taskkill.exe 4144 taskkill.exe 868 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 4784 25ac3dbca8a16245b4cdc2b1688cf6095dd8f4674a826ce284bcd2cc9990dafe.exe 4784 25ac3dbca8a16245b4cdc2b1688cf6095dd8f4674a826ce284bcd2cc9990dafe.exe 3280 skotes.exe 3280 skotes.exe 1656 skotes.exe 1656 skotes.exe 4200 aacb06e38c.exe 4200 aacb06e38c.exe 4048 8a0bf72981.exe 4048 8a0bf72981.exe 4672 52d7d82d28.exe 4672 52d7d82d28.exe 4668 22dcc28758.exe 4668 22dcc28758.exe 5448 3fe47781e8.exe 5448 3fe47781e8.exe 4668 22dcc28758.exe 4668 22dcc28758.exe 5448 3fe47781e8.exe 5448 3fe47781e8.exe 5448 3fe47781e8.exe 5756 skotes.exe 5756 skotes.exe 5340 skotes.exe 5340 skotes.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 1960 taskkill.exe Token: SeDebugPrivilege 4144 taskkill.exe Token: SeDebugPrivilege 868 taskkill.exe Token: SeDebugPrivilege 956 taskkill.exe Token: SeDebugPrivilege 4500 taskkill.exe Token: SeDebugPrivilege 3988 firefox.exe Token: SeDebugPrivilege 3988 firefox.exe Token: SeDebugPrivilege 5448 3fe47781e8.exe Token: SeDebugPrivilege 3988 firefox.exe Token: SeDebugPrivilege 3988 firefox.exe Token: SeDebugPrivilege 3988 firefox.exe -
Suspicious use of FindShellTrayWindow 32 IoCs
pid Process 4668 22dcc28758.exe 4668 22dcc28758.exe 4668 22dcc28758.exe 4668 22dcc28758.exe 4668 22dcc28758.exe 4668 22dcc28758.exe 4668 22dcc28758.exe 3988 firefox.exe 3988 firefox.exe 3988 firefox.exe 3988 firefox.exe 3988 firefox.exe 3988 firefox.exe 3988 firefox.exe 3988 firefox.exe 3988 firefox.exe 3988 firefox.exe 3988 firefox.exe 3988 firefox.exe 3988 firefox.exe 3988 firefox.exe 3988 firefox.exe 3988 firefox.exe 3988 firefox.exe 3988 firefox.exe 3988 firefox.exe 3988 firefox.exe 3988 firefox.exe 4668 22dcc28758.exe 4668 22dcc28758.exe 4668 22dcc28758.exe 4668 22dcc28758.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 4668 22dcc28758.exe 4668 22dcc28758.exe 4668 22dcc28758.exe 4668 22dcc28758.exe 4668 22dcc28758.exe 4668 22dcc28758.exe 4668 22dcc28758.exe 3988 firefox.exe 3988 firefox.exe 3988 firefox.exe 3988 firefox.exe 3988 firefox.exe 3988 firefox.exe 3988 firefox.exe 3988 firefox.exe 3988 firefox.exe 3988 firefox.exe 3988 firefox.exe 3988 firefox.exe 3988 firefox.exe 3988 firefox.exe 3988 firefox.exe 3988 firefox.exe 3988 firefox.exe 3988 firefox.exe 3988 firefox.exe 3988 firefox.exe 4668 22dcc28758.exe 4668 22dcc28758.exe 4668 22dcc28758.exe 4668 22dcc28758.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3988 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4784 wrote to memory of 3280 4784 25ac3dbca8a16245b4cdc2b1688cf6095dd8f4674a826ce284bcd2cc9990dafe.exe 83 PID 4784 wrote to memory of 3280 4784 25ac3dbca8a16245b4cdc2b1688cf6095dd8f4674a826ce284bcd2cc9990dafe.exe 83 PID 4784 wrote to memory of 3280 4784 25ac3dbca8a16245b4cdc2b1688cf6095dd8f4674a826ce284bcd2cc9990dafe.exe 83 PID 3280 wrote to memory of 4200 3280 skotes.exe 85 PID 3280 wrote to memory of 4200 3280 skotes.exe 85 PID 3280 wrote to memory of 4200 3280 skotes.exe 85 PID 3280 wrote to memory of 4048 3280 skotes.exe 93 PID 3280 wrote to memory of 4048 3280 skotes.exe 93 PID 3280 wrote to memory of 4048 3280 skotes.exe 93 PID 3280 wrote to memory of 4672 3280 skotes.exe 97 PID 3280 wrote to memory of 4672 3280 skotes.exe 97 PID 3280 wrote to memory of 4672 3280 skotes.exe 97 PID 3280 wrote to memory of 4668 3280 skotes.exe 108 PID 3280 wrote to memory of 4668 3280 skotes.exe 108 PID 3280 wrote to memory of 4668 3280 skotes.exe 108 PID 4668 wrote to memory of 1960 4668 22dcc28758.exe 110 PID 4668 wrote to memory of 1960 4668 22dcc28758.exe 110 PID 4668 wrote to memory of 1960 4668 22dcc28758.exe 110 PID 4668 wrote to memory of 4144 4668 22dcc28758.exe 112 PID 4668 wrote to memory of 4144 4668 22dcc28758.exe 112 PID 4668 wrote to memory of 4144 4668 22dcc28758.exe 112 PID 4668 wrote to memory of 868 4668 22dcc28758.exe 114 PID 4668 wrote to memory of 868 4668 22dcc28758.exe 114 PID 4668 wrote to memory of 868 4668 22dcc28758.exe 114 PID 4668 wrote to memory of 956 4668 22dcc28758.exe 116 PID 4668 wrote to memory of 956 4668 22dcc28758.exe 116 PID 4668 wrote to memory of 956 4668 22dcc28758.exe 116 PID 4668 wrote to memory of 4500 4668 22dcc28758.exe 118 PID 4668 wrote to memory of 4500 4668 22dcc28758.exe 118 PID 4668 wrote to memory of 4500 4668 22dcc28758.exe 118 PID 4668 wrote to memory of 1360 4668 22dcc28758.exe 120 PID 4668 wrote to memory of 1360 4668 22dcc28758.exe 120 PID 1360 wrote to memory of 3988 1360 firefox.exe 121 PID 1360 wrote to memory of 3988 1360 firefox.exe 121 PID 1360 wrote to memory of 3988 1360 firefox.exe 121 PID 1360 wrote to memory of 3988 1360 firefox.exe 121 PID 1360 wrote to memory of 3988 1360 firefox.exe 121 PID 1360 wrote to memory of 3988 1360 firefox.exe 121 PID 1360 wrote to memory of 3988 1360 firefox.exe 121 PID 1360 wrote to memory of 3988 1360 firefox.exe 121 PID 1360 wrote to memory of 3988 1360 firefox.exe 121 PID 1360 wrote to memory of 3988 1360 firefox.exe 121 PID 1360 wrote to memory of 3988 1360 firefox.exe 121 PID 3988 wrote to memory of 4832 3988 firefox.exe 122 PID 3988 wrote to memory of 4832 3988 firefox.exe 122 PID 3988 wrote to memory of 4832 3988 firefox.exe 122 PID 3988 wrote to memory of 4832 3988 firefox.exe 122 PID 3988 wrote to memory of 4832 3988 firefox.exe 122 PID 3988 wrote to memory of 4832 3988 firefox.exe 122 PID 3988 wrote to memory of 4832 3988 firefox.exe 122 PID 3988 wrote to memory of 4832 3988 firefox.exe 122 PID 3988 wrote to memory of 4832 3988 firefox.exe 122 PID 3988 wrote to memory of 4832 3988 firefox.exe 122 PID 3988 wrote to memory of 4832 3988 firefox.exe 122 PID 3988 wrote to memory of 4832 3988 firefox.exe 122 PID 3988 wrote to memory of 4832 3988 firefox.exe 122 PID 3988 wrote to memory of 4832 3988 firefox.exe 122 PID 3988 wrote to memory of 4832 3988 firefox.exe 122 PID 3988 wrote to memory of 4832 3988 firefox.exe 122 PID 3988 wrote to memory of 4832 3988 firefox.exe 122 PID 3988 wrote to memory of 4832 3988 firefox.exe 122 PID 3988 wrote to memory of 4832 3988 firefox.exe 122 PID 3988 wrote to memory of 4832 3988 firefox.exe 122 PID 3988 wrote to memory of 4832 3988 firefox.exe 122 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\25ac3dbca8a16245b4cdc2b1688cf6095dd8f4674a826ce284bcd2cc9990dafe.exe"C:\Users\Admin\AppData\Local\Temp\25ac3dbca8a16245b4cdc2b1688cf6095dd8f4674a826ce284bcd2cc9990dafe.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3280 -
C:\Users\Admin\AppData\Local\Temp\1012628001\aacb06e38c.exe"C:\Users\Admin\AppData\Local\Temp\1012628001\aacb06e38c.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4200
-
-
C:\Users\Admin\AppData\Local\Temp\1012629001\8a0bf72981.exe"C:\Users\Admin\AppData\Local\Temp\1012629001\8a0bf72981.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4048 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4048 -s 15164⤵
- Program crash
PID:1728
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4048 -s 15044⤵
- Program crash
PID:444
-
-
-
C:\Users\Admin\AppData\Local\Temp\1012630001\52d7d82d28.exe"C:\Users\Admin\AppData\Local\Temp\1012630001\52d7d82d28.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4672
-
-
C:\Users\Admin\AppData\Local\Temp\1012631001\22dcc28758.exe"C:\Users\Admin\AppData\Local\Temp\1012631001\22dcc28758.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1960
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4144
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:868
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:956
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4500
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1980 -parentBuildID 20240401114208 -prefsHandle 1896 -prefMapHandle 1888 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d0ef81d4-b414-4b0d-bacf-93c941a0d5bd} 3988 "\\.\pipe\gecko-crash-server-pipe.3988" gpu6⤵PID:4832
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2420 -parentBuildID 20240401114208 -prefsHandle 2412 -prefMapHandle 2400 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c0ddd1e0-1f28-4c9a-9f8d-2919cb4d5f3a} 3988 "\\.\pipe\gecko-crash-server-pipe.3988" socket6⤵PID:4376
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3000 -childID 1 -isForBrowser -prefsHandle 2840 -prefMapHandle 2872 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1252 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fa308b3e-ef12-4221-a341-0a29b25632a3} 3988 "\\.\pipe\gecko-crash-server-pipe.3988" tab6⤵PID:4652
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3928 -childID 2 -isForBrowser -prefsHandle 3084 -prefMapHandle 2836 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1252 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e2d586f1-4769-49c1-9af5-faeb4dba07d0} 3988 "\\.\pipe\gecko-crash-server-pipe.3988" tab6⤵PID:4100
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3824 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4616 -prefMapHandle 1612 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b4e27bb0-9cc0-4007-9f73-5b3dbfa77f8b} 3988 "\\.\pipe\gecko-crash-server-pipe.3988" utility6⤵
- Checks processor information in registry
PID:2716
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5484 -childID 3 -isForBrowser -prefsHandle 5528 -prefMapHandle 5524 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1252 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7ad610ff-da74-4438-b97b-57cf58999644} 3988 "\\.\pipe\gecko-crash-server-pipe.3988" tab6⤵PID:1116
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5472 -childID 4 -isForBrowser -prefsHandle 5592 -prefMapHandle 5588 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1252 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6ec9b25e-7549-4b28-b36b-a2b543dee1a7} 3988 "\\.\pipe\gecko-crash-server-pipe.3988" tab6⤵PID:4128
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5800 -childID 5 -isForBrowser -prefsHandle 5976 -prefMapHandle 5972 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1252 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c31c19a0-8020-4b60-b936-c865cb7d0a61} 3988 "\\.\pipe\gecko-crash-server-pipe.3988" tab6⤵PID:4936
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1012632001\3fe47781e8.exe"C:\Users\Admin\AppData\Local\Temp\1012632001\3fe47781e8.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5448
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4048 -ip 40481⤵PID:4784
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4048 -ip 40481⤵PID:2044
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5756
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5340
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lhmx4teg.default-release\activity-stream.discovery_stream.json
Filesize27KB
MD53f4ea6060a038aca9205b224b6eebf6b
SHA183f15027298ef5853b1da5de719c929005a8b29a
SHA25636cfda6ace4837fb40c074aac5e31f4e57b7585b0c89c735ee03914ad1aeafd2
SHA5123da42b4fe669d7c195df7576f3216672a95a8cd3ebca5593437986e512b515981abc2c489f73d187dc7c24b19df08017b0c1fa3e8b8962c55d367cffbca3eca6
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lhmx4teg.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD536e564b179722a32a87eeb4d762686cd
SHA1b9e7598b2e8777ebcb15d3338c484a22377ddb13
SHA256eab9b4a5c1e5e708b0bf3e12aee927982ec2140d522d70c16cc29fc7227a0bc7
SHA5125d1b53964ed481aa52018bd99eadb85e59fe1344417e6ab787fb1426cb7edb023990ed6b18d6729410b7c8dd2732cbdbd0c3b22483be92f748a34be2ae48269e
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lhmx4teg.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
1.9MB
MD5c9420e178724864d8be4caa3e0600b89
SHA10a50a13ada835b4f831a4e47d08a9672efe13bfa
SHA2568d74dff63ca291a7a5457b6924722959319ff92d8130954bfd8a816d117e6160
SHA512734081b83a3213906960d9bcd6573218a22721005d7d7e1250f34de2485c49db17a9f27f34f4da33afc6c2db1ebe9be299ce4ba31a6ec20d2a78ec91dda57947
-
Filesize
1.8MB
MD54fad8d319caf757925298077224994c6
SHA17b9a56f22cb27e335bbcf79c1b87607ee0725f47
SHA2567f6f12ac7230f88338f2fee645f83f064ec05b76b2900c4267189b06efccda62
SHA512853640c1bd66ad10516551e5696e44b9099d4aa353231ffb6b45c5067ef261c63481d2cce322f536b6a2ecb1c4c0f5f0cfb61d99c8f1a1d607aacd56f2efe4a2
-
Filesize
4.9MB
MD50725f1cbe54d3f3523d950c2bfda2331
SHA11955f4ed8036db33f8c556f66e3789466957be8d
SHA256dd6bbafdd895585e82f07b0cb50e2cfc41e57d21060b80098e1018a2729db975
SHA51226c750d5e6932d26a73450771e02f70d36f318e9b1a930a69a57e13b6fdd7f5c1deb91b998ccb2c356f271de2dab789fb1c720c1f0747ff40aa7c894be00a9a9
-
Filesize
947KB
MD56b34ffe574e9fe52d4d2726e06dc9724
SHA1fd838c42cc6d55864901f548d98abc4f019b895f
SHA2567ffa2a7712d48443a2ab520d3536f62b06b04cffdc6ecdc609372a57fa526fb4
SHA5124ac5936cdeb598963f02b4828333fbf4c41e50bb738709d1e91ba574c23fda5a6de9ffc993117dd85a3b54a3f287a17e50b27f14f84f32e11fc2f37395093ee4
-
Filesize
2.7MB
MD52d4351ba2544c52f579a5af3259a4d70
SHA1c48b260375c09c4d0f6c0301d0baaab3e6330636
SHA256937f684a9b33782223e4a7c2af7009173fa4fccc21803bbb6c9affa5e38f70dc
SHA512b90f6be16558e2356b597978c57eecc294d3559a3e0a1719f3468f22f6f0d23ab30358d67792afbc0917733730ecda22ea0728793db9576ac0cdc4cb4940b2f5
-
Filesize
3.1MB
MD5adb44a697cc6aad041b5c3ab464b44b6
SHA1fcad1763327064b7400880b2f27730c800c83d8c
SHA25625ac3dbca8a16245b4cdc2b1688cf6095dd8f4674a826ce284bcd2cc9990dafe
SHA51257c4c66abeb362d576e548eab31494345a2352ec60e8fc618a7c5d4b32347a3559c5845ac58cb9ced5499727f75aae2f99f2d19863716f7ad52523d77c90bd67
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\AlternateServices.bin
Filesize6KB
MD5da53aabde7de8491c6ba813badccd3ea
SHA1a9b65eab363833ac6197c57923bff5d5a3256b37
SHA256d163ac3cd61c8ec7185bff47e7e0268c4747fea654fb5f3af2f28e37de546d62
SHA512c829ae358bcf4f4060dbeca9b66cbd43699225ff1dbd1bc34233a36cc6e76f7852cc6fa8e05357ffeb2ceb68bc2cbcda71e042eac5d64f35fd469a39387b8321
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\AlternateServices.bin
Filesize8KB
MD5195818faa68d27d64ceb1b8b234510c0
SHA1a0d9cbb0ee0d3a728058e1860e87e0764dd8e509
SHA2568cce3e831e8f8041e9edaacf5407646d2cc9e1c2b7c56359a7ecb88b7cff8bfd
SHA512b458732f9dbecd3aae02abd0ad3b94a4e7583d298502db445a3fa38176c28382f11aa396ba2390dbf55f282102d830201dcaa3903553d1ed586f0b1855b7622b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\AlternateServices.bin
Filesize13KB
MD5e4dd3616dd0a2f78fb7dbfa2af95dd6a
SHA1ee516c0602c0be84beb08209a6583a398e5bd5c6
SHA2569126c9b42ddffafa364a3a9afd54f4b90a0d8bd052653204cd9fb341ef19a0a6
SHA512f6264a720f7e94f143785731796d380690e7655df5e6fbe764aba3a5efea11769a57cdbdcd4a4c0af4218bdb103885d50b7cd6ffb2d6520d45eb0dc08eb28c34
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp
Filesize4KB
MD506b918a9f5fa75d15e6d37c51edd0a7b
SHA1bed12a4277d0b8cfa522fefc196c92b690a1ae8b
SHA25615e7b9886ea8ae4c64af512e4d38f50305f0553418d631ca61cec56701d49c06
SHA512a08180f34375c6b96a1fd06c51c504d28055e7547cb903dda81050360d03320c086438bfaa649dc711111b1e3ad648572809ccc275015e3cecf9072489b5dc68
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5db6a5446f0b66fa2bd96b4f12867d918
SHA174e6e4bee6a6f0a18b282c36c7371c7cd1ac1a70
SHA25636e96fafd978845480350c9dec9cee2202e61dd95c339b566c96880db3b428b8
SHA5123bd4a8aae9d6cc61e458f82ee22026af2401a2ba0e7b489cb69641476cfe3ad484cd16625ae0f3e75e3b987683628b1cfddb1722969ad140a13f80f1fafd5783
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD522f93b5a1b0307c5b0b091f0e304c840
SHA16ec77cf5968fa1cccdcb93355ea98d72f480340b
SHA256a6eaf0ee2f40f84a89bba79385720a538daf7c0ed3187e9cf118a2e41e163603
SHA512754a6e5f4e53fa39d0869cb4af13f3f69aaee2eec36b4963e133792a189dc8b98deefd785a4fff6ac6dc0f291b6163a4faa1f0548e33cba4eb0a3be4a45a7f7c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD502674d6b1db3465be9d688634e73ecee
SHA1ed7a471a8c5dd67c735393b0e7193505a5a31f46
SHA2564231371592e6a75269772cdd5f0cca7be210c711ead7fad45dff26da126d35c0
SHA512d4d89b6697129288f0f57c718acd63c1f4078f1486042b3c744194f1de1d27e88af5489492399a3bd17932539321a627b9a0c64bd2c832e0ff7633252db7a903
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\pending_pings\01f06edb-50ae-409d-a69b-689cdf0b0339
Filesize26KB
MD56b594c46638259dbf3db4e60144f6c0b
SHA1ca4c13dd3d5b9b7888d442a488f770a3defc8a50
SHA2566df4a23e96ec8cdecffaa5d630291eda9b702fd55086a2a9692e144abc2bdea4
SHA51219e06ee2b16bf1e085224ae704dddc0b13793f031ccdedc396c7f8ff4f4aa9b521a28baf9d6d613d2b5849102c17d1592dd1c2c36bb6ad29319b400f8159fa9d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\pending_pings\4c91200f-2bd2-4657-bbf8-63f87d0e36d4
Filesize982B
MD51d6cc71843610fe04e1a51627e0cd83d
SHA19fa0c8960426574492b4820412ffc476c7724539
SHA2566e92fa68032465afac8bd10bfeb888e1acb8f988921c89e2939e09d542d1119e
SHA512b74ab61f258333a966ab68fba54c998a38cc828c9baab5432e312c5c14dc05b6dacb642ad9809735ddf8be14d29e9c9463c3a53e5e418b7d140000b607277532
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\pending_pings\bb79b977-5b87-419d-9468-42d2ab858894
Filesize671B
MD5eab08e0e38af9a3cac243e7006d9389e
SHA1160b8969b9b54c9d72d9208d7699fc59c1637dd3
SHA256d2f563685bd1e5ab56bf4205ef5558b7bbdf1f542842ab5c5bb406f914296a70
SHA512a2bdf9e35dddfd65106c769cd6e0cfbd07faef1faef21f6e2e6e9c078a2dbf875bb065494477a88e8e706f7d4ade39d37f779203b690cf5d4d32be942486e70b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD5a3a6da7a998cfbfbe7a7e6bec43d9c56
SHA1a44f777e1212053cc44c4cff7a1d0b14cea56cd8
SHA256b551d43bb41b725b4cf22124163e9f60e3305b634b584ba61625b3e3864a3ace
SHA5126dd836bb6dca58703223fecb7c5740759567a8d99e6debd83aef26e88282614063193248793d18737405207e02bb8eb011336e3cc4f7a6a408c0e59d5eca54a7
-
Filesize
15KB
MD591cc421e954b710eeb7efb3d00ad5303
SHA18455c6a5368b19af583ad81f905852f5c827969d
SHA2567eccf152c03f5de6c8342c27167755a11d7855a6b21b69de80050856f8b82cff
SHA512223a9e9186c5a0f9b203357b4425402d4c576d1c5775ba141fd4e66623a5621a28001f969e3113de58ec78e3b09a74ed45dc61b8e43673e7c73749fa6e437631
-
Filesize
10KB
MD58138873cb94854e3b303a78d24105911
SHA1160afb6e36efd9b080b3ff40a7b799b7531531be
SHA25695d1cbc1ea7ee952d8b99fde71fe27ddb45363f9630d8b045fbadb15aa4128c0
SHA5125087d9ae40ea0f6817dac7ca4c0103a6986ec3afbb409cd322745103ad508f77d94d4737711515a8d908e6287e54a2b4928fa259fb52ef2ae7bad01f99990702