Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
11-12-2024 03:35
Static task
static1
General
-
Target
c6c6d9ef82f7cdadcb9c3354a1cd15632a61da7bff9359320ee21080799f7c02.exe
-
Size
3.1MB
-
MD5
aeaac78d0572bbf1a71cd4248596dc86
-
SHA1
cb40fd161911a5d0962efcd2abcab9f81c0efb1a
-
SHA256
c6c6d9ef82f7cdadcb9c3354a1cd15632a61da7bff9359320ee21080799f7c02
-
SHA512
62435385587410222b92d445c96438a72d16a35d0ac2033238cd2b062057e56f8a5940e478908d161f51b761edffd1191b3a03e90acaeaf1fe5c0997ee549fba
-
SSDEEP
98304:93wp6wCTOhWlc+pgf3BK0mKas7Ceivt3xp8/+l5P:OWamKBCeez
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
xworm
5.0
127.0.0.1:8080
101.99.92.189:8080
d5gQ6Zf7Tzih1Pi1
-
install_file
USB.exe
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
https://atten-supporse.biz/api
Extracted
lumma
https://atten-supporse.biz/api
https://covery-mover.biz/api
Signatures
-
Amadey family
-
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral1/memory/2484-779-0x00000000037B0000-0x00000000037BE000-memory.dmp disable_win_def -
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/memory/2484-204-0x00000000001B0000-0x0000000000626000-memory.dmp family_xworm behavioral1/memory/2484-205-0x00000000001B0000-0x0000000000626000-memory.dmp family_xworm -
Gcleaner family
-
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 1a3e271399.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 1a3e271399.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 1a3e271399.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 1a3e271399.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 1a3e271399.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 1a3e271399.exe -
Stealc family
-
Xworm family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 555f741466.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c6c6d9ef82f7cdadcb9c3354a1cd15632a61da7bff9359320ee21080799f7c02.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3EUEYgl.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9feskIx.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8caf706b98.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ fa537ade6b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1a3e271399.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3EUEYgl.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9feskIx.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9feskIx.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8caf706b98.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion fa537ade6b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c6c6d9ef82f7cdadcb9c3354a1cd15632a61da7bff9359320ee21080799f7c02.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c6c6d9ef82f7cdadcb9c3354a1cd15632a61da7bff9359320ee21080799f7c02.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 555f741466.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion fa537ade6b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1a3e271399.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3EUEYgl.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8caf706b98.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1a3e271399.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 555f741466.exe -
Executes dropped EXE 13 IoCs
pid Process 592 skotes.exe 3020 yiklfON.exe 1048 3EUEYgl.exe 2484 9feskIx.exe 1600 8caf706b98.exe 2472 fa537ade6b.exe 2824 faf634476f.exe 3168 1a3e271399.exe 3964 674d1690d0.exe 1904 555f741466.exe 3076 djvmiy.exe 3536 djvmiy.exe 1284 Process not Found -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine fa537ade6b.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine 1a3e271399.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine 555f741466.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine c6c6d9ef82f7cdadcb9c3354a1cd15632a61da7bff9359320ee21080799f7c02.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine 3EUEYgl.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine 9feskIx.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine 8caf706b98.exe -
Loads dropped DLL 19 IoCs
pid Process 2776 c6c6d9ef82f7cdadcb9c3354a1cd15632a61da7bff9359320ee21080799f7c02.exe 2776 c6c6d9ef82f7cdadcb9c3354a1cd15632a61da7bff9359320ee21080799f7c02.exe 592 skotes.exe 592 skotes.exe 592 skotes.exe 592 skotes.exe 592 skotes.exe 592 skotes.exe 592 skotes.exe 592 skotes.exe 592 skotes.exe 592 skotes.exe 592 skotes.exe 592 skotes.exe 592 skotes.exe 2484 9feskIx.exe 3076 djvmiy.exe 3536 djvmiy.exe 1904 555f741466.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 1a3e271399.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 1a3e271399.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\8caf706b98.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013898001\\8caf706b98.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\fa537ade6b.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013899001\\fa537ade6b.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\faf634476f.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013900001\\faf634476f.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\1a3e271399.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013901001\\1a3e271399.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000500000001a075-342.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 2776 c6c6d9ef82f7cdadcb9c3354a1cd15632a61da7bff9359320ee21080799f7c02.exe 592 skotes.exe 1048 3EUEYgl.exe 2484 9feskIx.exe 1600 8caf706b98.exe 2472 fa537ade6b.exe 3168 1a3e271399.exe 1904 555f741466.exe -
resource yara_rule behavioral1/files/0x000400000001c95f-774.dat upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job c6c6d9ef82f7cdadcb9c3354a1cd15632a61da7bff9359320ee21080799f7c02.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 20 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9feskIx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 674d1690d0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage faf634476f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1a3e271399.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 555f741466.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yiklfON.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fa537ade6b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c6c6d9ef82f7cdadcb9c3354a1cd15632a61da7bff9359320ee21080799f7c02.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3EUEYgl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8caf706b98.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language faf634476f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language faf634476f.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3EUEYgl.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3EUEYgl.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1984 timeout.exe -
Kills process with taskkill 5 IoCs
pid Process 3028 taskkill.exe 3000 taskkill.exe 2964 taskkill.exe 2424 taskkill.exe 2308 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_Classes\Local Settings firefox.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 8caf706b98.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 3EUEYgl.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 3EUEYgl.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 3EUEYgl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 8caf706b98.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2484 9feskIx.exe -
Suspicious behavior: EnumeratesProcesses 17 IoCs
pid Process 2776 c6c6d9ef82f7cdadcb9c3354a1cd15632a61da7bff9359320ee21080799f7c02.exe 592 skotes.exe 1048 3EUEYgl.exe 2484 9feskIx.exe 1048 3EUEYgl.exe 1600 8caf706b98.exe 2472 fa537ade6b.exe 2824 faf634476f.exe 3168 1a3e271399.exe 3168 1a3e271399.exe 2824 faf634476f.exe 2824 faf634476f.exe 2484 9feskIx.exe 3168 1a3e271399.exe 3168 1a3e271399.exe 1904 555f741466.exe 1904 555f741466.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 2964 taskkill.exe Token: SeDebugPrivilege 2424 taskkill.exe Token: SeDebugPrivilege 2308 taskkill.exe Token: SeDebugPrivilege 3028 taskkill.exe Token: SeDebugPrivilege 3000 taskkill.exe Token: SeDebugPrivilege 2784 firefox.exe Token: SeDebugPrivilege 2784 firefox.exe Token: SeDebugPrivilege 2484 9feskIx.exe Token: SeDebugPrivilege 3168 1a3e271399.exe -
Suspicious use of FindShellTrayWindow 15 IoCs
pid Process 2776 c6c6d9ef82f7cdadcb9c3354a1cd15632a61da7bff9359320ee21080799f7c02.exe 2824 faf634476f.exe 2824 faf634476f.exe 2824 faf634476f.exe 2824 faf634476f.exe 2824 faf634476f.exe 2824 faf634476f.exe 2784 firefox.exe 2784 firefox.exe 2784 firefox.exe 2784 firefox.exe 2824 faf634476f.exe 2824 faf634476f.exe 2824 faf634476f.exe 2824 faf634476f.exe -
Suspicious use of SendNotifyMessage 13 IoCs
pid Process 2824 faf634476f.exe 2824 faf634476f.exe 2824 faf634476f.exe 2824 faf634476f.exe 2824 faf634476f.exe 2824 faf634476f.exe 2784 firefox.exe 2784 firefox.exe 2784 firefox.exe 2824 faf634476f.exe 2824 faf634476f.exe 2824 faf634476f.exe 2824 faf634476f.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2484 9feskIx.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2776 wrote to memory of 592 2776 c6c6d9ef82f7cdadcb9c3354a1cd15632a61da7bff9359320ee21080799f7c02.exe 30 PID 2776 wrote to memory of 592 2776 c6c6d9ef82f7cdadcb9c3354a1cd15632a61da7bff9359320ee21080799f7c02.exe 30 PID 2776 wrote to memory of 592 2776 c6c6d9ef82f7cdadcb9c3354a1cd15632a61da7bff9359320ee21080799f7c02.exe 30 PID 2776 wrote to memory of 592 2776 c6c6d9ef82f7cdadcb9c3354a1cd15632a61da7bff9359320ee21080799f7c02.exe 30 PID 592 wrote to memory of 3020 592 skotes.exe 32 PID 592 wrote to memory of 3020 592 skotes.exe 32 PID 592 wrote to memory of 3020 592 skotes.exe 32 PID 592 wrote to memory of 3020 592 skotes.exe 32 PID 592 wrote to memory of 1048 592 skotes.exe 34 PID 592 wrote to memory of 1048 592 skotes.exe 34 PID 592 wrote to memory of 1048 592 skotes.exe 34 PID 592 wrote to memory of 1048 592 skotes.exe 34 PID 592 wrote to memory of 2484 592 skotes.exe 36 PID 592 wrote to memory of 2484 592 skotes.exe 36 PID 592 wrote to memory of 2484 592 skotes.exe 36 PID 592 wrote to memory of 2484 592 skotes.exe 36 PID 592 wrote to memory of 1600 592 skotes.exe 37 PID 592 wrote to memory of 1600 592 skotes.exe 37 PID 592 wrote to memory of 1600 592 skotes.exe 37 PID 592 wrote to memory of 1600 592 skotes.exe 37 PID 1048 wrote to memory of 928 1048 3EUEYgl.exe 38 PID 1048 wrote to memory of 928 1048 3EUEYgl.exe 38 PID 1048 wrote to memory of 928 1048 3EUEYgl.exe 38 PID 1048 wrote to memory of 928 1048 3EUEYgl.exe 38 PID 928 wrote to memory of 1984 928 cmd.exe 40 PID 928 wrote to memory of 1984 928 cmd.exe 40 PID 928 wrote to memory of 1984 928 cmd.exe 40 PID 928 wrote to memory of 1984 928 cmd.exe 40 PID 592 wrote to memory of 2472 592 skotes.exe 41 PID 592 wrote to memory of 2472 592 skotes.exe 41 PID 592 wrote to memory of 2472 592 skotes.exe 41 PID 592 wrote to memory of 2472 592 skotes.exe 41 PID 592 wrote to memory of 2824 592 skotes.exe 42 PID 592 wrote to memory of 2824 592 skotes.exe 42 PID 592 wrote to memory of 2824 592 skotes.exe 42 PID 592 wrote to memory of 2824 592 skotes.exe 42 PID 2824 wrote to memory of 2964 2824 faf634476f.exe 43 PID 2824 wrote to memory of 2964 2824 faf634476f.exe 43 PID 2824 wrote to memory of 2964 2824 faf634476f.exe 43 PID 2824 wrote to memory of 2964 2824 faf634476f.exe 43 PID 2824 wrote to memory of 2424 2824 faf634476f.exe 46 PID 2824 wrote to memory of 2424 2824 faf634476f.exe 46 PID 2824 wrote to memory of 2424 2824 faf634476f.exe 46 PID 2824 wrote to memory of 2424 2824 faf634476f.exe 46 PID 2824 wrote to memory of 2308 2824 faf634476f.exe 48 PID 2824 wrote to memory of 2308 2824 faf634476f.exe 48 PID 2824 wrote to memory of 2308 2824 faf634476f.exe 48 PID 2824 wrote to memory of 2308 2824 faf634476f.exe 48 PID 2824 wrote to memory of 3028 2824 faf634476f.exe 50 PID 2824 wrote to memory of 3028 2824 faf634476f.exe 50 PID 2824 wrote to memory of 3028 2824 faf634476f.exe 50 PID 2824 wrote to memory of 3028 2824 faf634476f.exe 50 PID 2824 wrote to memory of 3000 2824 faf634476f.exe 52 PID 2824 wrote to memory of 3000 2824 faf634476f.exe 52 PID 2824 wrote to memory of 3000 2824 faf634476f.exe 52 PID 2824 wrote to memory of 3000 2824 faf634476f.exe 52 PID 2824 wrote to memory of 2908 2824 faf634476f.exe 54 PID 2824 wrote to memory of 2908 2824 faf634476f.exe 54 PID 2824 wrote to memory of 2908 2824 faf634476f.exe 54 PID 2824 wrote to memory of 2908 2824 faf634476f.exe 54 PID 2908 wrote to memory of 2784 2908 firefox.exe 55 PID 2908 wrote to memory of 2784 2908 firefox.exe 55 PID 2908 wrote to memory of 2784 2908 firefox.exe 55 PID 2908 wrote to memory of 2784 2908 firefox.exe 55 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\c6c6d9ef82f7cdadcb9c3354a1cd15632a61da7bff9359320ee21080799f7c02.exe"C:\Users\Admin\AppData\Local\Temp\c6c6d9ef82f7cdadcb9c3354a1cd15632a61da7bff9359320ee21080799f7c02.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:592 -
C:\Users\Admin\AppData\Local\Temp\1013765001\yiklfON.exe"C:\Users\Admin\AppData\Local\Temp\1013765001\yiklfON.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3020
-
-
C:\Users\Admin\AppData\Local\Temp\1013771001\3EUEYgl.exe"C:\Users\Admin\AppData\Local\Temp\1013771001\3EUEYgl.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\1013771001\3EUEYgl.exe" & rd /s /q "C:\ProgramData\79R16XLF3EKN" & exit4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Windows\SysWOW64\timeout.exetimeout /t 105⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1984
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013829001\9feskIx.exe"C:\Users\Admin\AppData\Local\Temp\1013829001\9feskIx.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\djvmiy.exe"C:\Users\Admin\AppData\Local\Temp\djvmiy.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3076 -
C:\Users\Admin\AppData\Local\Temp\djvmiy.exe"C:\Users\Admin\AppData\Local\Temp\djvmiy.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3536
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013898001\8caf706b98.exe"C:\Users\Admin\AppData\Local\Temp\1013898001\8caf706b98.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:1600
-
-
C:\Users\Admin\AppData\Local\Temp\1013899001\fa537ade6b.exe"C:\Users\Admin\AppData\Local\Temp\1013899001\fa537ade6b.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2472
-
-
C:\Users\Admin\AppData\Local\Temp\1013900001\faf634476f.exe"C:\Users\Admin\AppData\Local\Temp\1013900001\faf634476f.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2964
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2424
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2308
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3028
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3000
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2784 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2784.0.1073109173\2066535775" -parentBuildID 20221007134813 -prefsHandle 1200 -prefMapHandle 1104 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7d81d882-4838-4cb3-bf06-f78b4a7e1a9a} 2784 "\\.\pipe\gecko-crash-server-pipe.2784" 1312 111d8158 gpu6⤵PID:2436
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2784.1.959516970\884691197" -parentBuildID 20221007134813 -prefsHandle 1492 -prefMapHandle 1488 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b3c31ff7-5c57-4fdd-a70e-c917f5dbbe64} 2784 "\\.\pipe\gecko-crash-server-pipe.2784" 1520 44d4b58 socket6⤵PID:676
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2784.2.901279899\1557653959" -childID 1 -isForBrowser -prefsHandle 1996 -prefMapHandle 1992 -prefsLen 21811 -prefMapSize 233444 -jsInitHandle 668 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {bff449ab-0344-4a34-93af-00da4457a419} 2784 "\\.\pipe\gecko-crash-server-pipe.2784" 2008 1a198558 tab6⤵PID:944
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2784.3.323215314\1552652020" -childID 2 -isForBrowser -prefsHandle 2660 -prefMapHandle 2656 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 668 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {4c99491e-a66d-465f-b93e-c4b175856b1e} 2784 "\\.\pipe\gecko-crash-server-pipe.2784" 2672 1d385558 tab6⤵PID:1588
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2784.4.1092710306\356307706" -childID 3 -isForBrowser -prefsHandle 3756 -prefMapHandle 3764 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 668 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {091ce8f3-f8c1-48e6-aeb2-114a4939bd59} 2784 "\\.\pipe\gecko-crash-server-pipe.2784" 3772 1f9b1558 tab6⤵PID:1416
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2784.5.1896657909\1897668712" -childID 4 -isForBrowser -prefsHandle 3880 -prefMapHandle 3884 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 668 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {853fe3c3-e9ba-429f-b5fa-80f37d4d652d} 2784 "\\.\pipe\gecko-crash-server-pipe.2784" 3868 1f9afa58 tab6⤵PID:924
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2784.6.807476587\262454899" -childID 5 -isForBrowser -prefsHandle 4036 -prefMapHandle 4040 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 668 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c35faa6c-0837-433a-a23c-84074b116b26} 2784 "\\.\pipe\gecko-crash-server-pipe.2784" 4024 1f9b0358 tab6⤵PID:1172
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013901001\1a3e271399.exe"C:\Users\Admin\AppData\Local\Temp\1013901001\1a3e271399.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3168
-
-
C:\Users\Admin\AppData\Local\Temp\1013902001\674d1690d0.exe"C:\Users\Admin\AppData\Local\Temp\1013902001\674d1690d0.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3964
-
-
C:\Users\Admin\AppData\Local\Temp\1013903001\555f741466.exe"C:\Users\Admin\AppData\Local\Temp\1013903001\555f741466.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1904
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\40WV1DY9\download[1].htm
Filesize1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\n3lsnn48.default-release\activity-stream.discovery_stream.json.tmp
Filesize32KB
MD5323b9b1e3b0243b42850ab698c2032af
SHA1c649ad4c5623014a0b429de6e12263d520cfdcbf
SHA2565a3355c50adb6aa10087ae736117ff1520f562844213e45b053c4dc777b064d2
SHA512e094d55c727a1d3025c700eda785158e9a7def21c803c49a5e2d222d782fbe896b5227c7a07349ba030c11ac3cb2d33ea2a7a3d6e9de29e0c07ac587ebb02e0b
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\n3lsnn48.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
7.4MB
MD5d71d031f039f8fb153488c26fb7d410f
SHA15b15fd6f94bdbb35ecd02bf9aa51912d698ebf45
SHA25636541a0e062085fed175a4a5eae45aa9e3563fff4a816a1bffa1b2c6f8280e5b
SHA512d97c801c73f14ae20b11529d0b0f58afc3981d92bd00f88dda59881f24d89d3b325a8c61b88adc77753cebb1c320afc64af7522c61c34b2a4916b13bddc278cf
-
Filesize
1.8MB
MD53b8b3018e3283830627249d26305419d
SHA140fa5ef5594f9e32810c023aba5b6b8cea82f680
SHA256258e444e78225f74d47ba4698d49a33e6d1f6ed1f3f710186be426078e2bf1cb
SHA5122e9a42e53406446b503f150abfa16b994ee34211830d14ccbfbf52d86019dc5cca95c40222e5c6aed910c90988f999560ff972c575f9c207d7834abba6f04aa0
-
Filesize
1.8MB
MD558f824a8f6a71da8e9a1acc97fc26d52
SHA1b0e199e6f85626edebbecd13609a011cf953df69
SHA2565e5b808ed64c4f40e07a4894e1da294e364383f0a51adb7ec8c7568afba3eb17
SHA5127d6c752369ea83bad34873d8603c413e9372ff66adcaad11e7f23d3ce85827e057444b30eadf927329191825aef4dc37a1e68c30b71fae4ce6f53708102fb461
-
Filesize
1.8MB
MD5719480c4f73c830893d08399c6a28e37
SHA1a18b01c17a8d55347ab4cb381d0b961d1ac6d394
SHA2569ef1a0b94108d45652caccbe54b3a195754d2003bcf576387aa13c9654d885e6
SHA51200406a6de7beb21734ab38146cb4e06667f205baab97bd16d58b210bf62ac293f5781a3254538a7d58c7fc74af7e9bd756143c109d62b526b0548d77bfe0a4ad
-
Filesize
1.7MB
MD5d82b625392210c587a83e1a715e45027
SHA159843a77555f2c54eb9dd8433bb1531355b17ba1
SHA256a3f8691893e0c7d830ac824bcd52157a6ffba5774079498f512430b98570f50a
SHA512dce397ce054bd44a64cb145f05777b73b99775d156d7b1922328ced64fb8adca0dd6b6820cfc113e11fab5eba2df812e4b87ce1810fc0a68643720327a1a13f0
-
Filesize
945KB
MD56efe5d32c4b2be1875909d96749a6f64
SHA1eb8138589d2ba7a0eb7f554ead0f905c0e7457f3
SHA25659742f88d83be3be74ebc24b0bc8630389047ab5c9cbc76894ca779d28591c95
SHA512e2b37bfae5585be0f85b34b750dc57e00e16fa41330ea349e42cb97973b8218f2ecf3d03859a2189b1cf3a06b576e89213cb1d9f97ed4847de7a03c4223c93d9
-
Filesize
2.6MB
MD5c62b5a02187d6e325137e3cd78b72050
SHA1ec9f092e1297cc7d592dec309f7f539d0e60f879
SHA256191a78d1ddcc555657de6a73a5eb959c526572fbadef76d8ebff6a9c12013b27
SHA51242e8cb2c8bc452b017b5b300815debea61392ff4db74c588a649653a77da5d6160da46c0dd6aef8663aafe7823271a8886721f04b46c1c6d078d27600f4a4391
-
Filesize
2.5MB
MD52a78ce9f3872f5e591d643459cabe476
SHA19ac947dfc71a868bc9c2eb2bd78dfb433067682e
SHA25621a2ac44acd7a640735870eebfd04b8dc57bc66877cb5be3b929299e86a43dae
SHA51203e2cd8161a1394ee535a2ea7d197791ab715d69a02ffab98121ec5ac8150d2b17a9a32a59307042c4bbeffad7425b55efa047651de6ed39277dba80711454f9
-
Filesize
1.8MB
MD5698a8a44a582069786987528959a65e7
SHA1e1ee8653f2fdba438640d577ac991409d678df37
SHA256dc142dc2722e214b0d20b66ea3fe687ab370d82a2b1cdfa888bdb1f623035b62
SHA512961a70ec4988508db086f7a043024076ce0837225fa59c4afdc84f3f7803625db7e4d37b6d762de950ceee910d91d0ba23ca2ba197575912a4792098c4e513af
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
1.7MB
MD52996cbf9598eb07a64d66d4c3aba4b10
SHA1ac176ab53cdef472770d27a38db5bd6eb71a5627
SHA256feba57a74856dedb9d9734d12c640ca7f808ead2db1e76a0f2bcf1e4561cd03f
SHA512667e117683d94ae13e15168c477800f1cd8d840e316890ec6f41a6e4cefd608536655f3f6d7065c51c6b1b8e60dd19aa44da3f9e8a70b94161fd7dc3abf5726c
-
Filesize
3.1MB
MD5aeaac78d0572bbf1a71cd4248596dc86
SHA1cb40fd161911a5d0962efcd2abcab9f81c0efb1a
SHA256c6c6d9ef82f7cdadcb9c3354a1cd15632a61da7bff9359320ee21080799f7c02
SHA51262435385587410222b92d445c96438a72d16a35d0ac2033238cd2b062057e56f8a5940e478908d161f51b761edffd1191b3a03e90acaeaf1fe5c0997ee549fba
-
Filesize
442KB
MD585430baed3398695717b0263807cf97c
SHA1fffbee923cea216f50fce5d54219a188a5100f41
SHA256a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA51206511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1
-
Filesize
8.0MB
MD5a01c5ecd6108350ae23d2cddf0e77c17
SHA1c6ac28a2cd979f1f9a75d56271821d5ff665e2b6
SHA256345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42
SHA512b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\datareporting\glean\db\data.safe.bin
Filesize9KB
MD5a10a664b7e702333be966a4ed94053ae
SHA1d07826288be2508dcbafe517777ac4defd2775eb
SHA256b20e5e1fce03ac1c08bee4943de9a3f132f3cd6712f14b13563f3fe5c4a16e9d
SHA512328ec66c99e8cde681cdd65a498c424839be366febf8cb49a09ca24728a64accd53c08e04b76668d9a6fbd66da6eebb4adaca34f5df3a9ad07394f3027b76a5b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\datareporting\glean\pending_pings\8ff0216e-0442-4342-a3ca-659e7b4f3c6b
Filesize733B
MD56f98ccae23564962c9f4a2de40a25abb
SHA18dfd4f151f985e02b950fa1b0f75539115e57a2b
SHA256c2018ba19157cc1e9097bc1c63dedf3a6e2d5c1cba006561b15c0aabba68a222
SHA512842e2d13f7af380d6b27cbb8188a9e4b9fa1f9735d40cb5b52d2ffaf611423500350c376e9b33d9ddb7a60ba10c0988df524136fad27f9e285518a7c2b05d47d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll
Filesize997KB
MD5fe3355639648c417e8307c6d051e3e37
SHA1f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA2561ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA5128f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info
Filesize116B
MD53d33cdc0b3d281e67dd52e14435dd04f
SHA14db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json
Filesize372B
MD58be33af717bb1b67fbd61c3f4b807e9e
SHA17cf17656d174d951957ff36810e874a134dd49e0
SHA256e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd
SHA5126125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll
Filesize11.8MB
MD533bf7b0439480effb9fb212efce87b13
SHA1cee50f2745edc6dc291887b6075ca64d716f495a
SHA2568ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e
SHA512d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig
Filesize1KB
MD5937326fead5fd401f6cca9118bd9ade9
SHA14526a57d4ae14ed29b37632c72aef3c408189d91
SHA25668a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81
SHA512b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2
-
Filesize
7KB
MD5d7032518aeff4ce5655e1b5ff6ee330b
SHA1e624bf76dd837ded70a77028c27daabbaafd0410
SHA256747a0b703bb7aa552799596148fef03374a1147138b0ace0ac093f568b9b00ba
SHA51212a7792d51b72833af9702ee334c54da50395874c7e74ee055f0b95c46a8616e1d80d0b81dc5b29bdaf2489356d49be72aa06302f59570442663c15f3fa612e5
-
Filesize
7KB
MD5431b7e69837cd2fcafb5443ea58a0254
SHA1395ed88bcd3e1f84ee1c51cbb28054cc7bf43fe3
SHA256616846f079df127ebbbfa00984a4ffc9553083bc55175e5771519fbb35c3a7ca
SHA512d08b535e11a5a18100082265f1d87e4b5ee5eca6f3808603a6622299266e7a0a7d28acd5a4262209c390a3190146a3b1eaec81dd6a677de6dc8a530f73ed927e
-
Filesize
6KB
MD5483b2693d71407d14328fb8e7eb70020
SHA1ef4201ac2b88620d276e4382c901b921e3318c2a
SHA25673c115380c1cfcc46300c95fa6e652f4d24850f7108cc33ee70fa1b95a2ef892
SHA51219532b9a7e18f97562764c409b1c1ed202144e97c86f64156986535dc46f4d4d986e727c495939854d956f81d522e95c92172b0e96b983772b067694f7f44eba
-
Filesize
6KB
MD537c6e92023697f4482b6678dc06ad062
SHA1516cdbe42ecf0ddba61659662ee8980592deabdd
SHA256c439181d998c9b96b2cd8adb25260f376c27f89c999f7e85025c72ce56662df6
SHA512d4085f92f0876f194509c59159da94f9f79bd418efba05003a92e0d48c4f018d2924f63547b804cb7fb9869784e5a23c0d10cf6799142aa6c559b5e21bc8dfe5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD5b619818bb8c115865a7cf9af5f552e19
SHA1ad7df3a0d7a73e3ca9dbfac6b3772dc3aec8aa98
SHA25604c0dfe20d6fa340e7c3dc891c7ba0cbb7da4a3bb2a7c73224e02f7d716dc0bf
SHA512d1378f8df4346ec6f43316546381fee605cafd031eb2aca801f51b0a108fea0641ffaeb46a8e8be97e975741c1475c635f53a875da2417c7d2440a91c95d4875
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize184KB
MD5bece0acf9d7f19d01c7943c54d2ad372
SHA1aef59ca4b0fe97f32db128e103bfb98aee3b5e29
SHA256ce40f79585195148ac86928d18da80b963cc98d6feb83c1c2e75e8b6d6ef39f8
SHA512105fb01521fca054766d1d1e46cf3bf177b8bab44800f7bbad9a84f388af32e745474b3cc4f70c1fd779b4e7bcf0912502860092e1824f7ba4b52c612ba5a70b
-
Filesize
7.3MB
MD529713ebba8304896f257a90d12389de0
SHA18d5553b1931d7b1138163b681c191ee7f681ac83
SHA25694196eb7588daa100a08d5075e5e03b4ae5bc05eaacf3d9ce77c84eaa3d1e9cd
SHA512de2249cd067258e7a7bdb7f23f4d459ef4f1be0433fef7f6d3317b93c968a792f6ae8a8a6b6eab272b8e5047d6ff4099e6bee10c565d3fea7b6245edfaa3ac83
-
Filesize
1.4MB
MD5a8cf5621811f7fac55cfe8cb3fa6b9f6
SHA1121356839e8138a03141f5f5856936a85bd2a474
SHA256614a0362ab87cee48d0935b5bb957d539be1d94c6fdeb3fe42fac4fbe182c10c
SHA5124479d951435f222ca7306774002f030972c9f1715d6aaf512fca9420dd79cb6d08240f80129f213851773290254be34f0ff63c7b1f4d554a7db5f84b69e84bdd