Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2024 11:40
Static task
static1
Behavioral task
behavioral1
Sample
66edbe7caadfd044a51e0d9fb309e931723f4a471c9d405fbcce0291b828f06d.exe
Resource
win7-20240903-en
General
-
Target
66edbe7caadfd044a51e0d9fb309e931723f4a471c9d405fbcce0291b828f06d.exe
-
Size
1.8MB
-
MD5
17d94dc8f579018a4491a19cfca59866
-
SHA1
f8e210e08da2f53ffce5be2839a296b33ace72d8
-
SHA256
66edbe7caadfd044a51e0d9fb309e931723f4a471c9d405fbcce0291b828f06d
-
SHA512
0e4aa55d08bf2d1ee780a0730105a23e4479abe3eb5c147d639bf28fdb698e34f24ead91db1d5ce410979a45a83a9ffecdd4e88b1ed94041763fe7fc60665d3c
-
SSDEEP
24576:c6aKEeSuuI1l4wI3O0GH7OKDfm5GWJTph4VKXAiXecS6+gNpp9MHoFtlgs7o3/TT:TRKW4wmkSKLmrtCjiXtpKKg319
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
drum
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
cryptbot
Extracted
lumma
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
https://atten-supporse.biz/api
Extracted
lumma
https://atten-supporse.biz/api
https://se-blurry.biz/api
https://zinc-sneark.biz/api
Signatures
-
Amadey family
-
Cryptbot family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" e962158860.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection e962158860.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" e962158860.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" e962158860.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" e962158860.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" e962158860.exe -
Stealc family
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF eb533f15ed.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ fe2240327b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e962158860.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 66edbe7caadfd044a51e0d9fb309e931723f4a471c9d405fbcce0291b828f06d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ eb533f15ed.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b3866d3ff1.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion fe2240327b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e962158860.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion eb533f15ed.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion fe2240327b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e962158860.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 66edbe7caadfd044a51e0d9fb309e931723f4a471c9d405fbcce0291b828f06d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion eb533f15ed.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b3866d3ff1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b3866d3ff1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 66edbe7caadfd044a51e0d9fb309e931723f4a471c9d405fbcce0291b828f06d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 66edbe7caadfd044a51e0d9fb309e931723f4a471c9d405fbcce0291b828f06d.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 8 IoCs
pid Process 4036 skotes.exe 1512 eb533f15ed.exe 2688 b3866d3ff1.exe 1404 fe2240327b.exe 3616 f8f161fa81.exe 4836 skotes.exe 4884 e962158860.exe 3940 skotes.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine b3866d3ff1.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine fe2240327b.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine e962158860.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 66edbe7caadfd044a51e0d9fb309e931723f4a471c9d405fbcce0291b828f06d.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine eb533f15ed.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features e962158860.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" e962158860.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b3866d3ff1.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1012684001\\b3866d3ff1.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fe2240327b.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1012685001\\fe2240327b.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\f8f161fa81.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1012686001\\f8f161fa81.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e962158860.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1012687001\\e962158860.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000a000000023b61-81.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 4936 66edbe7caadfd044a51e0d9fb309e931723f4a471c9d405fbcce0291b828f06d.exe 4036 skotes.exe 1512 eb533f15ed.exe 2688 b3866d3ff1.exe 1404 fe2240327b.exe 4836 skotes.exe 4884 e962158860.exe 3940 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 66edbe7caadfd044a51e0d9fb309e931723f4a471c9d405fbcce0291b828f06d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 844 2688 WerFault.exe 91 3348 2688 WerFault.exe 91 5704 2688 WerFault.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage f8f161fa81.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fe2240327b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f8f161fa81.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 66edbe7caadfd044a51e0d9fb309e931723f4a471c9d405fbcce0291b828f06d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb533f15ed.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language f8f161fa81.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e962158860.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b3866d3ff1.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 4144 taskkill.exe 1820 taskkill.exe 1792 taskkill.exe 3320 taskkill.exe 3520 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 4936 66edbe7caadfd044a51e0d9fb309e931723f4a471c9d405fbcce0291b828f06d.exe 4936 66edbe7caadfd044a51e0d9fb309e931723f4a471c9d405fbcce0291b828f06d.exe 4036 skotes.exe 4036 skotes.exe 1512 eb533f15ed.exe 1512 eb533f15ed.exe 1512 eb533f15ed.exe 1512 eb533f15ed.exe 1512 eb533f15ed.exe 1512 eb533f15ed.exe 1512 eb533f15ed.exe 1512 eb533f15ed.exe 1512 eb533f15ed.exe 1512 eb533f15ed.exe 2688 b3866d3ff1.exe 2688 b3866d3ff1.exe 1404 fe2240327b.exe 1404 fe2240327b.exe 3616 f8f161fa81.exe 3616 f8f161fa81.exe 4836 skotes.exe 4836 skotes.exe 4884 e962158860.exe 4884 e962158860.exe 3616 f8f161fa81.exe 3616 f8f161fa81.exe 4884 e962158860.exe 4884 e962158860.exe 4884 e962158860.exe 3940 skotes.exe 3940 skotes.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 1820 taskkill.exe Token: SeDebugPrivilege 1792 taskkill.exe Token: SeDebugPrivilege 3320 taskkill.exe Token: SeDebugPrivilege 3520 taskkill.exe Token: SeDebugPrivilege 4144 taskkill.exe Token: SeDebugPrivilege 4344 firefox.exe Token: SeDebugPrivilege 4344 firefox.exe Token: SeDebugPrivilege 4884 e962158860.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 4936 66edbe7caadfd044a51e0d9fb309e931723f4a471c9d405fbcce0291b828f06d.exe 3616 f8f161fa81.exe 3616 f8f161fa81.exe 3616 f8f161fa81.exe 3616 f8f161fa81.exe 3616 f8f161fa81.exe 3616 f8f161fa81.exe 3616 f8f161fa81.exe 3616 f8f161fa81.exe 4344 firefox.exe 4344 firefox.exe 4344 firefox.exe 4344 firefox.exe 4344 firefox.exe 4344 firefox.exe 4344 firefox.exe 4344 firefox.exe 4344 firefox.exe 4344 firefox.exe 4344 firefox.exe 4344 firefox.exe 4344 firefox.exe 4344 firefox.exe 4344 firefox.exe 4344 firefox.exe 4344 firefox.exe 4344 firefox.exe 4344 firefox.exe 4344 firefox.exe 3616 f8f161fa81.exe 4344 firefox.exe 3616 f8f161fa81.exe 3616 f8f161fa81.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 3616 f8f161fa81.exe 3616 f8f161fa81.exe 3616 f8f161fa81.exe 3616 f8f161fa81.exe 3616 f8f161fa81.exe 3616 f8f161fa81.exe 3616 f8f161fa81.exe 3616 f8f161fa81.exe 4344 firefox.exe 4344 firefox.exe 4344 firefox.exe 4344 firefox.exe 4344 firefox.exe 4344 firefox.exe 4344 firefox.exe 4344 firefox.exe 4344 firefox.exe 4344 firefox.exe 4344 firefox.exe 4344 firefox.exe 4344 firefox.exe 4344 firefox.exe 4344 firefox.exe 4344 firefox.exe 4344 firefox.exe 4344 firefox.exe 4344 firefox.exe 3616 f8f161fa81.exe 4344 firefox.exe 3616 f8f161fa81.exe 3616 f8f161fa81.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4344 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4936 wrote to memory of 4036 4936 66edbe7caadfd044a51e0d9fb309e931723f4a471c9d405fbcce0291b828f06d.exe 83 PID 4936 wrote to memory of 4036 4936 66edbe7caadfd044a51e0d9fb309e931723f4a471c9d405fbcce0291b828f06d.exe 83 PID 4936 wrote to memory of 4036 4936 66edbe7caadfd044a51e0d9fb309e931723f4a471c9d405fbcce0291b828f06d.exe 83 PID 4036 wrote to memory of 1512 4036 skotes.exe 87 PID 4036 wrote to memory of 1512 4036 skotes.exe 87 PID 4036 wrote to memory of 1512 4036 skotes.exe 87 PID 4036 wrote to memory of 2688 4036 skotes.exe 91 PID 4036 wrote to memory of 2688 4036 skotes.exe 91 PID 4036 wrote to memory of 2688 4036 skotes.exe 91 PID 4036 wrote to memory of 1404 4036 skotes.exe 99 PID 4036 wrote to memory of 1404 4036 skotes.exe 99 PID 4036 wrote to memory of 1404 4036 skotes.exe 99 PID 4036 wrote to memory of 3616 4036 skotes.exe 100 PID 4036 wrote to memory of 3616 4036 skotes.exe 100 PID 4036 wrote to memory of 3616 4036 skotes.exe 100 PID 3616 wrote to memory of 1820 3616 f8f161fa81.exe 102 PID 3616 wrote to memory of 1820 3616 f8f161fa81.exe 102 PID 3616 wrote to memory of 1820 3616 f8f161fa81.exe 102 PID 3616 wrote to memory of 1792 3616 f8f161fa81.exe 110 PID 3616 wrote to memory of 1792 3616 f8f161fa81.exe 110 PID 3616 wrote to memory of 1792 3616 f8f161fa81.exe 110 PID 3616 wrote to memory of 3320 3616 f8f161fa81.exe 112 PID 3616 wrote to memory of 3320 3616 f8f161fa81.exe 112 PID 3616 wrote to memory of 3320 3616 f8f161fa81.exe 112 PID 3616 wrote to memory of 3520 3616 f8f161fa81.exe 115 PID 3616 wrote to memory of 3520 3616 f8f161fa81.exe 115 PID 3616 wrote to memory of 3520 3616 f8f161fa81.exe 115 PID 3616 wrote to memory of 4144 3616 f8f161fa81.exe 117 PID 3616 wrote to memory of 4144 3616 f8f161fa81.exe 117 PID 3616 wrote to memory of 4144 3616 f8f161fa81.exe 117 PID 4036 wrote to memory of 4884 4036 skotes.exe 119 PID 4036 wrote to memory of 4884 4036 skotes.exe 119 PID 4036 wrote to memory of 4884 4036 skotes.exe 119 PID 3616 wrote to memory of 1404 3616 f8f161fa81.exe 120 PID 3616 wrote to memory of 1404 3616 f8f161fa81.exe 120 PID 1404 wrote to memory of 4344 1404 firefox.exe 121 PID 1404 wrote to memory of 4344 1404 firefox.exe 121 PID 1404 wrote to memory of 4344 1404 firefox.exe 121 PID 1404 wrote to memory of 4344 1404 firefox.exe 121 PID 1404 wrote to memory of 4344 1404 firefox.exe 121 PID 1404 wrote to memory of 4344 1404 firefox.exe 121 PID 1404 wrote to memory of 4344 1404 firefox.exe 121 PID 1404 wrote to memory of 4344 1404 firefox.exe 121 PID 1404 wrote to memory of 4344 1404 firefox.exe 121 PID 1404 wrote to memory of 4344 1404 firefox.exe 121 PID 1404 wrote to memory of 4344 1404 firefox.exe 121 PID 4344 wrote to memory of 1776 4344 firefox.exe 122 PID 4344 wrote to memory of 1776 4344 firefox.exe 122 PID 4344 wrote to memory of 1776 4344 firefox.exe 122 PID 4344 wrote to memory of 1776 4344 firefox.exe 122 PID 4344 wrote to memory of 1776 4344 firefox.exe 122 PID 4344 wrote to memory of 1776 4344 firefox.exe 122 PID 4344 wrote to memory of 1776 4344 firefox.exe 122 PID 4344 wrote to memory of 1776 4344 firefox.exe 122 PID 4344 wrote to memory of 1776 4344 firefox.exe 122 PID 4344 wrote to memory of 1776 4344 firefox.exe 122 PID 4344 wrote to memory of 1776 4344 firefox.exe 122 PID 4344 wrote to memory of 1776 4344 firefox.exe 122 PID 4344 wrote to memory of 1776 4344 firefox.exe 122 PID 4344 wrote to memory of 1776 4344 firefox.exe 122 PID 4344 wrote to memory of 1776 4344 firefox.exe 122 PID 4344 wrote to memory of 1776 4344 firefox.exe 122 PID 4344 wrote to memory of 1776 4344 firefox.exe 122 PID 4344 wrote to memory of 1776 4344 firefox.exe 122 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\66edbe7caadfd044a51e0d9fb309e931723f4a471c9d405fbcce0291b828f06d.exe"C:\Users\Admin\AppData\Local\Temp\66edbe7caadfd044a51e0d9fb309e931723f4a471c9d405fbcce0291b828f06d.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Users\Admin\AppData\Local\Temp\1012683001\eb533f15ed.exe"C:\Users\Admin\AppData\Local\Temp\1012683001\eb533f15ed.exe"3⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1512
-
-
C:\Users\Admin\AppData\Local\Temp\1012684001\b3866d3ff1.exe"C:\Users\Admin\AppData\Local\Temp\1012684001\b3866d3ff1.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2688 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2688 -s 15164⤵
- Program crash
PID:3348
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2688 -s 14964⤵
- Program crash
PID:844
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2688 -s 15164⤵
- Program crash
PID:5704
-
-
-
C:\Users\Admin\AppData\Local\Temp\1012685001\fe2240327b.exe"C:\Users\Admin\AppData\Local\Temp\1012685001\fe2240327b.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1404
-
-
C:\Users\Admin\AppData\Local\Temp\1012686001\f8f161fa81.exe"C:\Users\Admin\AppData\Local\Temp\1012686001\f8f161fa81.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1820
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1792
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3320
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3520
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4144
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2016 -parentBuildID 20240401114208 -prefsHandle 1932 -prefMapHandle 1716 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b25d4400-b3cf-4035-82af-e2c6378c2366} 4344 "\\.\pipe\gecko-crash-server-pipe.4344" gpu6⤵PID:1776
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2468 -parentBuildID 20240401114208 -prefsHandle 2460 -prefMapHandle 2456 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cb48f764-2b6a-4e57-b6d8-6ceaf6103933} 4344 "\\.\pipe\gecko-crash-server-pipe.4344" socket6⤵PID:3812
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3204 -childID 1 -isForBrowser -prefsHandle 3288 -prefMapHandle 3284 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1c32261b-33bc-4aed-8260-5fda063df678} 4344 "\\.\pipe\gecko-crash-server-pipe.4344" tab6⤵PID:3644
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3592 -childID 2 -isForBrowser -prefsHandle 3584 -prefMapHandle 3576 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {29c85130-47f2-4593-82c3-84565830b48a} 4344 "\\.\pipe\gecko-crash-server-pipe.4344" tab6⤵PID:1772
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2824 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 2820 -prefMapHandle 4536 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c31f6cfb-89a0-4924-b4df-443ae3f73b13} 4344 "\\.\pipe\gecko-crash-server-pipe.4344" utility6⤵
- Checks processor information in registry
PID:5584
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5376 -childID 3 -isForBrowser -prefsHandle 5024 -prefMapHandle 5352 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {025254b2-b346-45b2-94c1-2275d590c122} 4344 "\\.\pipe\gecko-crash-server-pipe.4344" tab6⤵PID:6108
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4824 -childID 4 -isForBrowser -prefsHandle 5520 -prefMapHandle 5524 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ecfb2fc3-ef7e-4fec-a736-045e6b29e8ed} 4344 "\\.\pipe\gecko-crash-server-pipe.4344" tab6⤵PID:856
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5700 -childID 5 -isForBrowser -prefsHandle 5708 -prefMapHandle 5712 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {105b1fcb-722e-4e82-97a2-ebe5da59953a} 4344 "\\.\pipe\gecko-crash-server-pipe.4344" tab6⤵PID:824
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1012687001\e962158860.exe"C:\Users\Admin\AppData\Local\Temp\1012687001\e962158860.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4884
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2688 -ip 26881⤵PID:868
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2688 -ip 26881⤵PID:644
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2688 -ip 26881⤵PID:5668
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3940
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
3Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ws2kncw.default-release\activity-stream.discovery_stream.json
Filesize19KB
MD58b0882cfca465748214654bd12db9b67
SHA18204d8478e37f65624cd350752cc5b5b96ef66ff
SHA2561986420460a0617ab7ac772d0b83e46ffa3cf206738f1d97d7b5ed778fc0bd6d
SHA5124a7755d80b5bde980c6f6776e4e99288fb7a3106f1e8290345af104bc39cc3038fdd7b5a3a69ae7f9aa52dc281c0c803cadb018fc553c5267eae0f9217c0a028
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ws2kncw.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD55ef9aad087dce1d4ac84bc2e3c4e4f38
SHA150e1897a7cca80087bde4839a3638ecc78ceb1c3
SHA2568cfe4ccfd96ab92d31fb9b1211f52975c4382ad5a8bf3eadd0ae0b791f5a2633
SHA512ce1cfac0d662307e3e2be9225d932326da729a1ecdc3f805297d37f652bc54cc95e5fddd00759e43477d851c403a0dd0bf850049382f68129c2bf3e38691a69a
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ws2kncw.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
4.3MB
MD5cdee2aadc9a1d83264d60129891ca8c7
SHA12ffc082892de4d483f53791ef35d5bc45dc96dcd
SHA25674211c92533f725825f0d2c05815b44d8b89c370a202007b46d3b09c5ef19ec9
SHA512a6280b9759fb1764ea8b755c9f2beb0cad450a273e2d7bfc38b374a4ca7da3bc7ccb84b74e2fdf39d23dd4f5713a84364386f8e8877b44b9de625543812cf35f
-
Filesize
1.8MB
MD53f51a440b6d3829b76804b42f88241c7
SHA189accaafc2b826c91540a93a995cba2583082964
SHA256d24a735b78ff246515f1fe6637e665b421206cebbae39cc6d51b331c57a836fc
SHA5120c2bbfcefda0e9fa80e33d651c99d910e92883b166274851239f27cc60fae4533c42938aa1021f1c487d34efab0febbf2783a00b4eb41773be605ea7965328ff
-
Filesize
4.9MB
MD5dd1e9c04fa5779a6ec694c9cb79fa76d
SHA12b1f19dfeba983bb53ed719874d9ccd12825696b
SHA256b153e60adeeb0491a8c8104c95164b24908bee959554ba4390d5f419b6103ee6
SHA512c3c710197b4a271236bd62445af7c4853c316a541edf6b1c23ba6602e7af5f49a655806aedb5b97b0d672f94650dd651b449d2567ff874f4a3d83741e8ac615d
-
Filesize
949KB
MD51d6b1dbe393632f2b5b163ff84e765ff
SHA125bb3138f98b7835fbffd92dfcf47ed7a1eb02fe
SHA2567fab527f9c268507f0b7bf5402b14d1a15804fd0e8f85bc740d6d99819ca08b8
SHA512f1e711682db1fb36e3eea60742fa864ca43bf64bc298754c50018424ceb3cb933338d426d7446de71ce08970d0e141786d7ce0ee527f274ebc4f091d59f1fd48
-
Filesize
2.6MB
MD5ba94c3f899308afd6791dea129cafbb0
SHA1ea3f5c745cf068566f86eecf2263c5b4cab1d368
SHA25601b54741882619d98188cc903a4770f8e72a06c8dd2e11f758176deab7fd94ac
SHA51211e5f779ace64899e93b3659d57660a89f57e7930afdd57e32baee70b929e9bbb184bdf6ad87bd9074f90156039191de6f54fe593e3c9d4c9960d718b469b3fb
-
Filesize
1.8MB
MD517d94dc8f579018a4491a19cfca59866
SHA1f8e210e08da2f53ffce5be2839a296b33ace72d8
SHA25666edbe7caadfd044a51e0d9fb309e931723f4a471c9d405fbcce0291b828f06d
SHA5120e4aa55d08bf2d1ee780a0730105a23e4479abe3eb5c147d639bf28fdb698e34f24ead91db1d5ce410979a45a83a9ffecdd4e88b1ed94041763fe7fc60665d3c
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin
Filesize6KB
MD58b319f6b3bb302e8dc88ded704a4632c
SHA1dd88bf6d59982edcb72a5af684d272eeef7595c3
SHA256c26b68086f39a0af98a3cedfccded4d109d80f6c6269c6b2e944e230c9a78dc0
SHA512d6caaa3f948eafab7a778ec589db8fdf2ee0d7f259995a80a7e58cbf5f8ef623eefb0ad2e51184b2c2b0233e9cbf92e530c09f7a8de79f060070d66eb68c8868
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin
Filesize8KB
MD5ef989eb5e996465d31c97c5a19d530b7
SHA16baa400347999833794b3db4d0683a0102651314
SHA25659a49710e43ba8eb0cf6e5a3b7c2f54a27de39512e050f0b353fe20e2c756889
SHA51209c08d47c32ea539b85257d4a19a061d77e13b44ddf3603263326d873bd5d4840564e492f436f1941245ce0c46fa77cea4a46799ce191dd6d37b3cd7ee178c6c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin
Filesize12KB
MD5490134a6f7af1265446d42ca35e6108e
SHA18a7fc410bc09313eee8eb82edec3ab412d763f16
SHA25666736c7c4aaea46195c87a6d0a0d47e7bb912ccdf71032b8e8c07476c56c61ab
SHA512c97de7c872917d86191515959f783d66e510dbcc98429c17c4057fc607c1bf3477ab0b8a5afb82ee0d6d5a06d64c764b2599a80a79dafce1880bfa87053fd8ab
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin
Filesize17KB
MD5a5bee14951c7519d724569d5eae44f32
SHA1ee99d47b82942d548834eb6041b99adeb13e71dc
SHA2562f7a532496586d6d8096b49e75e43c55b10845e95f5c4d6a9f8f0e0ca595ac28
SHA512fb1f58d8b58ee5e85059f2bb60d4c56510afe365fed250294ba83f5af409513203fd253d7bbd72d1780b6cd9264c2f9944c74041601585321c276b4aaddcc6cd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5ff9ef8da28e5fb99b703fe45888e08ad
SHA1f2a4ec184a6f238d81a26c665f9e752dd23fcb0f
SHA256de3b89b18d4652cb085f3947d8a7445373a4791c6e70f32776684b88857b45bc
SHA512023aeb835a8e30f1fd9163a7c7f03f14a0be62e682fadd977d16f402b5522ccc2a75e49f1aca988b21f68ea63415fc765049b9fc512d60939306c969ac04c676
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp
Filesize16KB
MD58187225ad49a0148071dacff0382fddf
SHA146170333c6ec431c63828ee7e6a2670a1383f59e
SHA256deb75726ca361fbe4e979db13dcf5dfc792bf41b2580f266ccdd9f5a1482d6cc
SHA512f6175d41c03eba8fca63369b7acc8f23d6b3c13f5be63560fcd9ee65f56cbde6f342d8f69a816efde99c583c6612c6742d49e738f028cb01dcaffab7abf75b14
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp
Filesize16KB
MD5b9a8e61c78c597337acbfb8110e389a3
SHA1c80a65b5646bd926d1d94e4bf9c957b8e089a451
SHA2561ba307b353803ccbbebde47f3929ec482686383c27a91e1e1c10e9928386e978
SHA512b0501afc2cacc35ffd9b28bfdf7c028e916e424e07aef999acf72e65d64603a6270c0886522aa9b30d2ce7b873da15c97ddc0a72d81aa9c59b68bc1d15357014
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5ee0ff068a6ffa810d2e3fb7db217f149
SHA1a7c9685db3308ebdf8f814f7511da46b6a1539be
SHA256bada3d70a5dfc6b96c2bfcae035ff3cd7756546a544ba4d24dcf7e48fe7aab14
SHA51224cba302fe0581827339a5755a4ba2f69c2269c0e38d16ec734b32bbd68be572b458b5a0cd938f42e180cc71d0c88b53b2dfc93616dde8c8ed3e7e882e69c767
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\0ea359f0-fa2e-4b9b-893a-49a69b76840a
Filesize671B
MD529148253c270a009a8a3d2d199de7ff4
SHA154f0842d086da063aa516d6fdaf59ae97e9126d7
SHA256805bf5a70e67c3aa55ab266ba16964d726502f9c9087c01d5ce52300c74a7e4e
SHA5128b4f5853dd649c45c8a763e1e08b604e51af7f97f8df5509422430ca8c9b5d4378e578027534d778b394b94d4666077f82f33718f19b1ebdebc60d03c7de49a0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\4f722995-0fec-44fc-a0b2-b56911423555
Filesize26KB
MD5cbff8b32b72c0507e6cae198fb121a5e
SHA16a1279d83c1899485f8298d1f48283f422c25ce5
SHA25643ac0768bd18ae800606a1836aaebb6dd0bf4433ab9a56303e49183843844619
SHA51224bc5565f642078ab7005abdc7cd6c667204ea4ee78040c3355b60e1407242c9a6650be43dd4200aa9c49169e33936fdd1aa81cf3a462fccfea4a87bfe0a16b0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\9507c41f-96b1-4acd-86db-2b9fdf18b8d4
Filesize982B
MD558b12c737d4ef482a47aacd0be3f22d4
SHA1670634edcd276e66e8f6bbbcd30440f4e67f5d53
SHA256d1ff1fac55e6cda8f8224176a05f6ad633d3fa2459b3659189fd2b43b1afaba3
SHA5126945e51f41ce31e943b669243b3f3d809af8dceac918ee8a83c8d011b6e291af1e7bab96ca1aa98c57a5e44d5141e52055dd1048e2690d15fd3f29ac809a2bf3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
13KB
MD54860723e73ef2bf50e8c4e37b5cbd3d5
SHA1105cd854fff630ca2ad2dfef348682bdd24cda7d
SHA25604eabae6bf20f140a560338ac7643fa37515f4922b185bce956bdb9c03e02ebe
SHA5122a79de42cfad3b26e0f80e4309c0662838429f9f8fe2457603cfd9dfbaaad9cf854bc07cde3733d4528db6bfbe8770e2d0467200c5a10692500d1738944d4f22
-
Filesize
11KB
MD57a8245454eff591f1825a5257dedfeff
SHA1284aefd93932dc1fef51a6f19c5250d0a306b6e2
SHA256a7b56ca9176e66e29f91017c5ac914180c3406837834df8ea7b32ff9ce1933d6
SHA5121d8f5189143151c7b3069a9637db93d15e1a646e7f0cc1b86b2f1698d761a4b184fb234f75e66ea49c8f316615196b3907f6418f4c8421639ba6d8f5c0e7d27e
-
Filesize
12KB
MD50923ac12665769edc54e955848ff93c9
SHA1e5c20a2f4025a73e0f1412be18ac03a876bf9d6f
SHA256cee3af724986c4be43d4d66c5209dd22e7b109b44b4ce0375fb90a10cec4ccb4
SHA51201ede9c6827ea6a65c60a5c63525038c16f6cfb3bfb2415cad7f1111339ec92bfd97bfda0a4be11b8f58a445c68ed97651de4c50a81ea48562f60f98de9f284b
-
Filesize
10KB
MD575a1779c1cb258208b461376b8a91c6c
SHA1fb4b3e910d03a239a5e9c1405baa4935f1bb5468
SHA256c07f4599845568bbfd0a256c93058bde5a08be712eb8ad866f4e29d9431e30ab
SHA512d581534590d79543b00407e8d283f11e0ec8378678ac5caea5f0a3e84580fa6554ef22fe39ef02fe9a63472c9f40aabe1d1b0d14a5a311f80c4ffac622c7e605
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize1.8MB
MD52fb6f4094f5a1e8c9c05c9d89c032e82
SHA10c7731f44fe54682bed26318d30dba9c7d36e310
SHA25686e16cb0c31dfce79fc58d5570849d6069452ca8acd3d460b18ce6d4f821aada
SHA5124beaed3a1a8763732031e16aa396630156ae839dc34074ccf3daccf6aafbd4ad8d4c7ba15cc394ab3c889ac51e1a9d6e1f776fccf2524a00975980f77616dc9c