Analysis
-
max time kernel
15s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-12-2024 08:26
Static task
static1
General
-
Target
057f8de06b85f862db512be87247d7ea09f78b2e3cca2b807e7c4604cc8a6e11.exe
-
Size
7.0MB
-
MD5
ce110af11d4a4c6f906f1520fab57653
-
SHA1
5324842314291ad007179c213d30a0273b208288
-
SHA256
057f8de06b85f862db512be87247d7ea09f78b2e3cca2b807e7c4604cc8a6e11
-
SHA512
8b35385bbc65a053ee601bc0eb48a3d00257c5a91d26ca4dc55b267f7ecf9d60bc18899ce8f18e70f5f295defe2aeb835e9c61fb9cdca4955c068745eb457cea
-
SSDEEP
196608:yRKiN99JzKxz9+Tj6jBU2eOXv2M0oD4dCcTyTYU42zqeA0WFjfS7:yUiN3Jzaz9+H6jVtXv2cD4kfYUQ0uq7
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
https://atten-supporse.biz/api
https://sordid-snaked.cyou/api
https://awake-weaves.cyou/api
https://wrathful-jammy.cyou/api
https://debonairnukk.xyz/api
https://diffuculttan.xyz/api
https://effecterectz.xyz/api
https://deafeninggeh.biz/api
https://immureprech.biz/api
https://drive-connect.cyou/api
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://atten-supporse.biz/api
https://covery-mover.biz/api
https://immureprech.biz/api
https://deafeninggeh.biz/api
https://effecterectz.xyz/api
Signatures
-
Amadey family
-
Gcleaner family
-
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4t499E.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4t499E.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4t499E.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4t499E.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4t499E.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4t499E.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2x9380.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3w06Q.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4t499E.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1x97k9.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2x9380.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4t499E.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1x97k9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1x97k9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2x9380.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3w06Q.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4t499E.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3w06Q.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 1x97k9.exe -
Executes dropped EXE 12 IoCs
pid Process 4220 X3v01.exe 3584 B0g44.exe 2728 1x97k9.exe 1996 skotes.exe 1148 2x9380.exe 3764 3w06Q.exe 2468 IGEaNGi.exe 4280 4t499E.exe 4088 IGEaNGi.exe 5024 IGEaNGi.exe 460 TdDkUco.exe 4496 pcrndBC.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine 4t499E.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine 1x97k9.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine 2x9380.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine 3w06Q.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4t499E.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4t499E.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" B0g44.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 057f8de06b85f862db512be87247d7ea09f78b2e3cca2b807e7c4604cc8a6e11.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" X3v01.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0007000000023cbf-164.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 2728 1x97k9.exe 1996 skotes.exe 1148 2x9380.exe 3764 3w06Q.exe 4280 4t499E.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2468 set thread context of 4088 2468 IGEaNGi.exe 92 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1x97k9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 4308 460 WerFault.exe 95 2796 5820 WerFault.exe 137 -
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2x9380.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IGEaNGi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TdDkUco.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pcrndBC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 057f8de06b85f862db512be87247d7ea09f78b2e3cca2b807e7c4604cc8a6e11.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language X3v01.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language B0g44.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1x97k9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3w06Q.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IGEaNGi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4t499E.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4672 timeout.exe -
Kills process with taskkill 5 IoCs
pid Process 3276 taskkill.exe 4596 taskkill.exe 2324 taskkill.exe 3968 taskkill.exe 2696 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2728 1x97k9.exe 2728 1x97k9.exe 1996 skotes.exe 1996 skotes.exe 1148 2x9380.exe 1148 2x9380.exe 3764 3w06Q.exe 3764 3w06Q.exe 4280 4t499E.exe 4280 4t499E.exe 4280 4t499E.exe 4280 4t499E.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4280 4t499E.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2728 1x97k9.exe -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 4688 wrote to memory of 4220 4688 057f8de06b85f862db512be87247d7ea09f78b2e3cca2b807e7c4604cc8a6e11.exe 82 PID 4688 wrote to memory of 4220 4688 057f8de06b85f862db512be87247d7ea09f78b2e3cca2b807e7c4604cc8a6e11.exe 82 PID 4688 wrote to memory of 4220 4688 057f8de06b85f862db512be87247d7ea09f78b2e3cca2b807e7c4604cc8a6e11.exe 82 PID 4220 wrote to memory of 3584 4220 X3v01.exe 83 PID 4220 wrote to memory of 3584 4220 X3v01.exe 83 PID 4220 wrote to memory of 3584 4220 X3v01.exe 83 PID 3584 wrote to memory of 2728 3584 B0g44.exe 84 PID 3584 wrote to memory of 2728 3584 B0g44.exe 84 PID 3584 wrote to memory of 2728 3584 B0g44.exe 84 PID 2728 wrote to memory of 1996 2728 1x97k9.exe 85 PID 2728 wrote to memory of 1996 2728 1x97k9.exe 85 PID 2728 wrote to memory of 1996 2728 1x97k9.exe 85 PID 3584 wrote to memory of 1148 3584 B0g44.exe 86 PID 3584 wrote to memory of 1148 3584 B0g44.exe 86 PID 3584 wrote to memory of 1148 3584 B0g44.exe 86 PID 4220 wrote to memory of 3764 4220 X3v01.exe 87 PID 4220 wrote to memory of 3764 4220 X3v01.exe 87 PID 4220 wrote to memory of 3764 4220 X3v01.exe 87 PID 1996 wrote to memory of 2468 1996 skotes.exe 88 PID 1996 wrote to memory of 2468 1996 skotes.exe 88 PID 1996 wrote to memory of 2468 1996 skotes.exe 88 PID 4688 wrote to memory of 4280 4688 057f8de06b85f862db512be87247d7ea09f78b2e3cca2b807e7c4604cc8a6e11.exe 90 PID 4688 wrote to memory of 4280 4688 057f8de06b85f862db512be87247d7ea09f78b2e3cca2b807e7c4604cc8a6e11.exe 90 PID 4688 wrote to memory of 4280 4688 057f8de06b85f862db512be87247d7ea09f78b2e3cca2b807e7c4604cc8a6e11.exe 90 PID 2468 wrote to memory of 5024 2468 IGEaNGi.exe 91 PID 2468 wrote to memory of 5024 2468 IGEaNGi.exe 91 PID 2468 wrote to memory of 5024 2468 IGEaNGi.exe 91 PID 2468 wrote to memory of 4088 2468 IGEaNGi.exe 92 PID 2468 wrote to memory of 4088 2468 IGEaNGi.exe 92 PID 2468 wrote to memory of 4088 2468 IGEaNGi.exe 92 PID 2468 wrote to memory of 4088 2468 IGEaNGi.exe 92 PID 2468 wrote to memory of 4088 2468 IGEaNGi.exe 92 PID 2468 wrote to memory of 4088 2468 IGEaNGi.exe 92 PID 2468 wrote to memory of 4088 2468 IGEaNGi.exe 92 PID 2468 wrote to memory of 4088 2468 IGEaNGi.exe 92 PID 2468 wrote to memory of 4088 2468 IGEaNGi.exe 92 PID 2468 wrote to memory of 4088 2468 IGEaNGi.exe 92 PID 1996 wrote to memory of 460 1996 skotes.exe 95 PID 1996 wrote to memory of 460 1996 skotes.exe 95 PID 1996 wrote to memory of 460 1996 skotes.exe 95 PID 1996 wrote to memory of 4496 1996 skotes.exe 98 PID 1996 wrote to memory of 4496 1996 skotes.exe 98 PID 1996 wrote to memory of 4496 1996 skotes.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\057f8de06b85f862db512be87247d7ea09f78b2e3cca2b807e7c4604cc8a6e11.exe"C:\Users\Admin\AppData\Local\Temp\057f8de06b85f862db512be87247d7ea09f78b2e3cca2b807e7c4604cc8a6e11.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\X3v01.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\X3v01.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\B0g44.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\B0g44.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1x97k9.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1x97k9.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\1014305001\IGEaNGi.exe"C:\Users\Admin\AppData\Local\Temp\1014305001\IGEaNGi.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\1014305001\IGEaNGi.exe"C:\Users\Admin\AppData\Local\Temp\1014305001\IGEaNGi.exe"7⤵
- Executes dropped EXE
PID:5024
-
-
C:\Users\Admin\AppData\Local\Temp\1014305001\IGEaNGi.exe"C:\Users\Admin\AppData\Local\Temp\1014305001\IGEaNGi.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4088
-
-
-
C:\Users\Admin\AppData\Local\Temp\1014321001\TdDkUco.exe"C:\Users\Admin\AppData\Local\Temp\1014321001\TdDkUco.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:460 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\1014321001\TdDkUco.exe" & rd /s /q "C:\ProgramData\MYU379ZC2VAI" & exit7⤵PID:3736
-
C:\Windows\SysWOW64\timeout.exetimeout /t 108⤵
- Delays execution with timeout.exe
PID:4672
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 460 -s 21927⤵
- Program crash
PID:4308
-
-
-
C:\Users\Admin\AppData\Local\Temp\1014323001\pcrndBC.exe"C:\Users\Admin\AppData\Local\Temp\1014323001\pcrndBC.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4496
-
-
C:\Users\Admin\AppData\Local\Temp\1014324001\687e84460c.exe"C:\Users\Admin\AppData\Local\Temp\1014324001\687e84460c.exe"6⤵PID:3748
-
C:\Users\Admin\AppData\Local\Temp\1014324001\687e84460c.exe"C:\Users\Admin\AppData\Local\Temp\1014324001\687e84460c.exe"7⤵PID:3744
-
-
-
C:\Users\Admin\AppData\Local\Temp\1014325001\ce0fada097.exe"C:\Users\Admin\AppData\Local\Temp\1014325001\ce0fada097.exe"6⤵PID:1632
-
-
C:\Users\Admin\AppData\Local\Temp\1014326001\e169d40e9e.exe"C:\Users\Admin\AppData\Local\Temp\1014326001\e169d40e9e.exe"6⤵PID:3772
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- Kills process with taskkill
PID:3276
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- Kills process with taskkill
PID:4596
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- Kills process with taskkill
PID:2324
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- Kills process with taskkill
PID:3968
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- Kills process with taskkill
PID:2696
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵PID:5020
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵PID:4048
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2012 -parentBuildID 20240401114208 -prefsHandle 1928 -prefMapHandle 1920 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {dc80d5ad-5f2f-4750-980e-2f82a6fd7f8c} 4048 "\\.\pipe\gecko-crash-server-pipe.4048" gpu9⤵PID:4828
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2472 -parentBuildID 20240401114208 -prefsHandle 2464 -prefMapHandle 2452 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {537af4fb-59d1-40c7-8b5f-722f870ce64d} 4048 "\\.\pipe\gecko-crash-server-pipe.4048" socket9⤵PID:3348
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3156 -childID 1 -isForBrowser -prefsHandle 3004 -prefMapHandle 3328 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ff47b495-b231-4bc6-9c23-e7a4512902c3} 4048 "\\.\pipe\gecko-crash-server-pipe.4048" tab9⤵PID:3912
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4080 -childID 2 -isForBrowser -prefsHandle 4072 -prefMapHandle 4068 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {02268a2c-52eb-4d37-b4aa-cd13a2540ad1} 4048 "\\.\pipe\gecko-crash-server-pipe.4048" tab9⤵PID:3168
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4768 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4756 -prefMapHandle 4680 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e71e5b28-5b86-4b4e-9845-0425c1dcf7fc} 4048 "\\.\pipe\gecko-crash-server-pipe.4048" utility9⤵PID:6384
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5168 -childID 3 -isForBrowser -prefsHandle 5196 -prefMapHandle 5188 -prefsLen 27050 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e8f33cf0-a97f-4e2f-a2ca-cc1bd25b08ad} 4048 "\\.\pipe\gecko-crash-server-pipe.4048" tab9⤵PID:7048
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5324 -childID 4 -isForBrowser -prefsHandle 5328 -prefMapHandle 5332 -prefsLen 27050 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {303ab193-760c-4180-9f1c-d8da609cb0f3} 4048 "\\.\pipe\gecko-crash-server-pipe.4048" tab9⤵PID:7060
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5516 -childID 5 -isForBrowser -prefsHandle 5524 -prefMapHandle 5532 -prefsLen 27050 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b7fb6152-404b-4919-8007-768b1af29d63} 4048 "\\.\pipe\gecko-crash-server-pipe.4048" tab9⤵PID:5880
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1014327001\2e7b98f2ff.exe"C:\Users\Admin\AppData\Local\Temp\1014327001\2e7b98f2ff.exe"6⤵PID:1944
-
-
C:\Users\Admin\AppData\Local\Temp\1014328001\7e660d3283.exe"C:\Users\Admin\AppData\Local\Temp\1014328001\7e660d3283.exe"6⤵PID:5148
-
-
C:\Users\Admin\AppData\Local\Temp\1014329001\0cd54590a9.exe"C:\Users\Admin\AppData\Local\Temp\1014329001\0cd54590a9.exe"6⤵PID:5820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5820 -s 15367⤵
- Program crash
PID:2796
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2x9380.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2x9380.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1148
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3w06Q.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3w06Q.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3764
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4t499E.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4t499E.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4280
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 460 -ip 4601⤵PID:2420
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵PID:4404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 5820 -ip 58201⤵PID:4652
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵PID:1780
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵PID:5676
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
717B
MD5822467b728b7a66b081c91795373789a
SHA1d8f2f02e1eef62485a9feffd59ce837511749865
SHA256af2343382b88335eea72251ad84949e244ff54b6995063e24459a7216e9576b9
SHA512bacea07d92c32078ca6a0161549b4e18edab745dd44947e5f181d28cc24468e07769d6835816cdfb944fd3d0099bde5e21b48f4966824c5c16c1801712303eb6
-
Filesize
345B
MD5b7896b50af5e87b166787ca6990fe0f6
SHA186591f092ea7eb55c6c4db7bbec76204d95e69b8
SHA256be60d9c4534a7d25de54922942ea611b6399a5cded28bd5ba170de9cf4462801
SHA512097fce9a60561012d9a5ddb9ab8be79f7f82e14b3c3355fb227e8383f6d7f58dfd29a76eb47b2d0b182ea532039b0860409bd4c732ac9b5de14d5a0fb65a9398
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751
Filesize192B
MD53bbb08b591ac5634a984f5e16d2197ee
SHA1c073f43088070a2f5054a34a82f9c8a34ae49dd7
SHA25606405245cbab530db63556955f32aabccc1383a0ce9602917409dfc4dd4988bc
SHA5128f7ae3370546434eac752319ac26e3f8f8eac59292ed4d153e806aaed21c7bc92ed0d90b87aab181cdafab169e6ee334f9d92176baa6f4c6c5eecbb670cebb01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\9452F411289BE952D2567554C2622C59
Filesize548B
MD5f557fc89103eedc83ed3902a6596ac1e
SHA1ffb8f58e70ff6a1e44534f3d61deb550261e7ace
SHA2565da0c097b97644e18c13392faec74db9330c3ca4f99a8d78f4ae7e3bdebfa114
SHA51291bfe56a2ebce6c3f9c54c1c4c40763b7016a69c61a07bf69306e23630aba1c4db3c536c9f27065b11d5a6e09c5b563c4a8c091eb234af66692f76c847cf5e58
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\n4zftpal.default-release\activity-stream.discovery_stream.json
Filesize24KB
MD5375f6f856c1d6a4c600ccb2f92db8d7a
SHA1ee87aa4ac8253855d888d76f346bddc7d31c9fdb
SHA256b1993f7b8e0da069d6a82b36adbe8cac55791e2e268e4ffadf1a48c5bb4f1db5
SHA51247734603651a84058111625374527ddfeaa64419a8d52581e2a733cfbb6a3a905f0d0c23262c63551872fbe5d3cf4ee6a423f0dab6434403a491a18670e82f2a
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\n4zftpal.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD5402c8d3d208a5852e7e3ee4bd838c16d
SHA12fe6698d2046b8aafdef0c4d59c87fa7b08303c2
SHA25642573f689cec5500670df4b749b7605a4301b6c62aa5d9717bc755f044c4198e
SHA5126c1b2500424c9e019feca3fe35dc08d07afd95bee9f7320dc7ea1243da54799ab8906dfdd1489de6521d8433a819a8844edd1910d7b48f17ee455e34327b9313
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\n4zftpal.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
419KB
MD5ec5e3bc0d1d207a45d0f7e27e8f111c7
SHA12de3cb791c7e3aa0826c59b2f85fdb4335d9b84f
SHA2564d0126ee20144c065da90de50807354877e8015c020a99a1d3f7cf3e051b5817
SHA512cb660188329b067b69dc0e7d291b9fe545688c79ce9b0f117a63d0596e6a27f8cd7a1b199abc6f07284077213ac2a42ce0ad18376824fabbdd4437a5e10b5a34
-
Filesize
384KB
MD5dfd5f78a711fa92337010ecc028470b4
SHA11a389091178f2be8ce486cd860de16263f8e902e
SHA256da96f2eb74e60de791961ef3800c36a5e12202fe97ae5d2fcfc1fe404bc13c0d
SHA512a3673074919039a2dc854b0f91d1e1a69724056594e33559741f53594e0f6e61e3d99ec664d541b17f09ffdebc2de1b042eec19ca8477fac86359c703f8c9656
-
Filesize
710KB
MD528e568616a7b792cac1726deb77d9039
SHA139890a418fb391b823ed5084533e2e24dff021e1
SHA2569597798f7789adc29fbe97707b1bd8ca913c4d5861b0ad4fdd6b913af7c7a8e2
SHA51285048799e6d2756f1d6af77f34e6a1f454c48f2f43042927845931b7ecff2e5de45f864627a3d4aa061252401225bbb6c2caa8532320ccbe401e97c9c79ac8e5
-
Filesize
2.5MB
MD52a78ce9f3872f5e591d643459cabe476
SHA19ac947dfc71a868bc9c2eb2bd78dfb433067682e
SHA25621a2ac44acd7a640735870eebfd04b8dc57bc66877cb5be3b929299e86a43dae
SHA51203e2cd8161a1394ee535a2ea7d197791ab715d69a02ffab98121ec5ac8150d2b17a9a32a59307042c4bbeffad7425b55efa047651de6ed39277dba80711454f9
-
Filesize
950KB
MD55a30131ff609593aba81d808f59a4a11
SHA11217671bcfd98434f4beac6406e0ae7f1f13c890
SHA256f1b8f480e3d3b92a659b6c87a181a99b17e726c3e138af3f7d0717a8e285a892
SHA512eab7bdaaaa7ac911b3180f6e879eed913356a7675422685d6f1ac71828e8ef53299cbe71644e10a9151a330e1a6ba2c7ed236bada34c02470f801253d305caf3
-
Filesize
1.7MB
MD5fa8bc0aa526b9961adf9260dc7ec9399
SHA1044527ce83eb090a0c1ec2cdaddedc5f5405bf2d
SHA2561722fc2ecb85459ab3e76adc12f5c29d3e3ee2b4b18dd48c5ef0e5d79b77330e
SHA5122f0244f7f3cf90b0dd1e5d04db4e4d443a16e7779bf791dc68ed54f6d734e1d620193967e96ee881b03e5b6ef6a8609efdb890f5345db340d94fe70c2807c31b
-
Filesize
2.7MB
MD5f150e060b781896b4e6e1029ee1f5b74
SHA1ef52c884174df898a956d9a40304e586e2382e2d
SHA2560316ba41b0629155197d29677225f77581c470a5f91aea8dd6a38850cd510516
SHA51240dc0453b3feece1d0ad5ed8de9cfd45465347190c1031791c6a035dc0e74bd842fa21e56b86feebe89892dfbd8bcdbf8d44bc658c0afcfb6deb6d0b5e18c18f
-
Filesize
1.8MB
MD5e72fd16086a8ecf58337b89509435373
SHA18352b01f92cdfa8e5c932513e2ef6363a6a5871c
SHA2561e76927aa56820767353dd841c3f309f91eb10decead250755a984791efad821
SHA5123cb26d20b5138ebcdef1adaea9b8fa0bfc7b56862c3ac5b7500a419a6836e3e2656aab697f6459131b0d8672123411dc60d1e15d7c745aa881580ec5c6d3c841
-
Filesize
2.7MB
MD55fd000eb60d3b5d283f071bde8877c78
SHA169f20a4a53208a92f4add436dffe8750b783e744
SHA25685872bd7c5acaa4857aa4c40c80fee0fb6b299d84491b0c1591e97748c17b3de
SHA512d6a9c91e311340df60921cdeca7d144e8b056e4b00a00ab7840d8d2b5c15ac128ca7fc24210cfee93edc35541bc3f5b05defb3b4f6627918066b36a6c4dd814b
-
Filesize
5.4MB
MD5081a21b207f1bfa93c5200d1978d9f65
SHA11960c8bb7e6c8f83a42a136fbd70d8187f01729c
SHA256ea439587078ef0a43616b142b81ded806405a2c459dc7ee8141f6b2fd8676514
SHA5125dcf757574d6f0ed935bc3bffd9582d8f258087c9498ffc92f80f1f01145d1a4767f258485d79088853b4cedf452f7a082b4308c05279cc2b23f0a064138c4f2
-
Filesize
1.7MB
MD5005cead84d34b1b48a78dd2abbb19550
SHA16ddf8d4031dac55a742ef768cdd1dc5f8ab3b55e
SHA2561666382723f07e8d7aaaab8340bef960686c5561ae731a8e3c70c53ce0540275
SHA5127446bc48643564289a94619d00f113510671bea41d754feaae020e37143d091da614f40afbbdd3d545c7e40de61d254584690a537b5eb896644bae67ddd4df49
-
Filesize
3.6MB
MD51e542607bbdce9813dc2e43101773757
SHA1126b9d7eda253d8928d4227d4e4a8e85d5e341f5
SHA2568657a7e4439c9e3355358a4e19bfe1c82f03c726127febc8f5bf01dcd7a31d4b
SHA512dc1638c5f4e0a6ef829c5e01abcddf0d0ff2b64f44dddecc311759b1421920dfca36f23e684246c19d3d88956c803d7fc52709f95a4fc272ece4edf40a7d5864
-
Filesize
3.1MB
MD5c55e38d57fef9812269597d2f23d0d3f
SHA1cb868ad16bdcefecc9392bdf494f62775d4547fd
SHA256ae55b79e19c6c52a9716daea842579ee4a765604c6fa227e3ac3e3a3fe66215f
SHA512911acba5f1f0a71fdb7f47dd07ec1698ce4eaea34a3ce642701344ac9df18e6a5a6ea372f07e94bbc8e2ab819ee0c00288536c5cea574ca64204eb8cb949d530
-
Filesize
1.8MB
MD54208cb745b3416b4cabe99cf5bfd5471
SHA1e42b11e63bbde6a1a11cb3ce82787f0ff33b679e
SHA25614048c09f2c87e6af49e49f4e6770fd0a1641088f619fb8abcc0d94bf9150670
SHA5122282f89b333be041c5e106dffa49f7afd911dae3b44cd8746ece2bfcb7cb8f6bce57f7c8ae1b1d5ce8c90f7c96730847c851a2cd68114c87fcf904348714b88d
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\AlternateServices.bin
Filesize12KB
MD5a6a8ec9c082b3332bc8e992209644ac3
SHA1c7e47d3b2e1e2f99c0a60a19ef509baa6b4177a2
SHA256946e0f5a371573a4e44d942daa7d5a9d4c19769544f32d0f769ba9b85d1ede94
SHA512150590fb911406e567205934c8d770f090071d48aacdc1adb6a25b69f979111885488334a46b687c322617c06ace2cfb785342b858d9235c9ec666780afbc745
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\AlternateServices.bin
Filesize7KB
MD5d44875cb9672620e063cb20e25ee70c7
SHA12c6e6d7149b156badde084310c514d6fe48bf94e
SHA256798dd078670425d82fc85c19ebd53b2a73c7809bddb518c2d151c7444a527bb1
SHA512bfccf38af54c13aa0c95e704173ab73e9cdbb237c3c10fd2be6cf9d037c27d47781cfb6dc869b5e965a7019c93b6ace9559a356478cc1125c07de2763ed9c46c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.bin
Filesize23KB
MD5351b136f0e37b6d0343305006a9d6dd9
SHA1e033c8ea5fef1f59ee51fa4d5f634119222baa26
SHA2567e67f8151084ad62ff17318ac8e8c17114c68a00a607bbefa7665538ac26469a
SHA512d8c0604ef4272a00e2a388d6df02661ce06cc02adb6766edc849cd88bc5d1cb249a5ea7bd5b9a6f2b5001bcb090288451025636175f3c02f99d07b28a00f9f05
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.bin
Filesize14KB
MD573f70ab2476d7368c1a94c543f7e6592
SHA130a4f8f05fe9c79ba90a7c117247399580e238b3
SHA2567ba81df761a91bdb9578939f94a6ea8a43a61d4cbd8c0258b8d5c66deec4d376
SHA5123b5b0bace4243aa5c95684c2a450e5191dbf105398619779dcde4f75724bfb9f5dd06f8162731ba1dfe6dbaa5616aa44e8e440567b59d5884e53730991084a2a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.bin
Filesize14KB
MD56563c8467825910f82d24434e5360ed5
SHA136625618a0c567af81fc91a019b85eead2947d53
SHA25637728ece413bee8769d73f27049e3e9470757e32175f354abeec428e963e44ed
SHA512931ca3a660ba8e04d2a7544c299cc8d5e6c6e329d9160a6957cfcea0d38d17da14d5ecfafdd8c39b7f34e93da5622efe2d108c17e12c3862c48b91acdbe89091
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.bin
Filesize14KB
MD5f1d646cc6a77b594091de668cb913bd0
SHA16aded08df49c9e512170181759dfab69b978d4d0
SHA256e63bfe84ae2c42480e279dc0657a9441070ea5a0529ef3ba54dce69acebe1e89
SHA512738a9b4584118fbb153661ddd08053dde26f6319399d3d3ca28ba745ff4157d1fe33b94e0dae1ace0fa0dba84a3f65c0bc2a94b9b3e728eda9d320dd60e1fbc0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.bin
Filesize5KB
MD5be01da4aebd09665c5e9920d9c5bff89
SHA1ffba79d22f96448d2a6ea9b212e5b11f2c167d4d
SHA25642fb1f2762d1285948f21c9cd67e1a8fd0cc9b7691c9328a4ee09033c96f252e
SHA5127535e8fcdd45ba253c337048d0eb694342f06a59fec858a4f8f8496842063275531a22ec1fba3e4ae2f24a0d798a227c0853a368e3c2085c9dab5463d94d0813
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.tmp
Filesize14KB
MD594ef12bfccac6c02b269ea4b9060e02a
SHA1ef18a7a46d9bad635ecf7ef72555dda81eaa4f01
SHA2560394765f15df12e8381a8ae3f7a9bbf7ae28aced8f9a4a1f0b65857551bbb815
SHA512caf683f73fd74542cae21adf1059c893b181750aa155b33b99126288358697a526f2ff2c009fda3effc8b917dfa9e5c509d7ac8832b0877ed2e05eb9d2066512
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5c7207e3136ed460348eaff4754b78b3a
SHA16e190eedf88103bf85c287dd83b4d3cb0da83719
SHA25668df3e8febc2ba5c0c01eca4d7ece6f3fadf4a62cf9d1955815a5dd3fff9cc81
SHA512d08aea844ba4d3c2529dd6750d341bb06e8cb0375308cbb2c72f91ce778de42958642f32cf799ac126eb4dd49d6488552f5451d7443bd5afe22f337ec6b45fdc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5dd00d8357e0cf4b71e2b6d534a94dc6e
SHA1a85f46a76f141738f1fe57a70c16f130bcf0d746
SHA256293a68614a6f98f59eb16288acc8c337f19af858b12b3bc7b619ecc53ccc4e84
SHA5124fc322fc63d960ee3cfcc9678a0a839cfce640cbda85e106171332c9e2eeda89e47865d4225fff4f3a4b513faf724300253b2094afe01da4f6f1fd0a9cbf6875
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD50c242cfb5f24d765626f87a3e244d5ea
SHA1e75afbf94e00c12c65c0be4add3c69d58e879009
SHA25651a20b3415fa585eca244852b7450e059c020d66634b113252b7eab1329bcf68
SHA512a6f089c05bc33578557e1c17abe285f478c4355e28b51a8e44fb958d2919ebb8f4c97f84b4cd40efb1882efaad48c4bfdab421db277cffd2c31276389973c41b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\pending_pings\780ba3bc-5e0a-4310-9d39-62b2b69ec490
Filesize25KB
MD568a81b225eb666b234f906cbd25dc106
SHA1f0f7d29d63f9bb7e46ea7e062e3682679a2e9079
SHA25604812b33b35136182cdd8cfb3a51c525b38b41f9133c40b79f1ce5d9b4492b0f
SHA512b231990384dbe2b4bf19b329765e8757c87fa9cc594b74617f45fbc8d2acc05b014ee2e822e0bd1be781d9ffd7fa286d4590a0b2cc7f3d4d9c17cb6e5b1b6d28
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\pending_pings\bbb6b8a1-7a44-4bd7-8431-5e3f74378933
Filesize982B
MD56c6f7dff0a49229ca6e702dda07602fd
SHA1052734b86bdb4fc536d72be018dae9b00090e461
SHA2561fce559bded16c3e514a899e845909d0c4f3d5b41f63b4d3cf9014e0d7e5a004
SHA5125e1ebe29cc3463e8b247d9a10fe416b1c4534f753f3caba4b1a1c4928fbd890df676e5de6c7c83782b1654f7fac6e6aa09de50d8517087257219ba50ee9b70a6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\pending_pings\dc1eec50-2535-4b43-8b49-579396553b29
Filesize671B
MD58aa6280c73dc2b6dec596f308e37cd67
SHA15e34f42a347ad9810edb15b4bdba947059a67da3
SHA256994619c9f3421624b4f3a81103cd4657de840d843aba1df90218b2478752975f
SHA5129ac322284e4d9ea249f40b1a663e9579b87cc6eb2c3e2fca7bda31fd06e9867e3d00b1ad43ec63bc20c99a3e27de54993f63f631b45638d3751f0c7c4cde2853
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD5970b57aab8eb3db4159afd35b8d0c82e
SHA1f19767811fa60d8d4e873cc3f8f538b94efbb6a4
SHA256d4f2dec6e79ecef7c5ead201fcd9377b59d68e0c01872f7d0eac339fb32b1c74
SHA512e70a112bdf04012c46de6ae3546f4da7e5570ff0e9b3a6a309fe7c5d8c2723b54ec463b5f1aa5fa119f79d838b869067e1964b00263ba4ddeeb503d73e2338d9
-
Filesize
11KB
MD59c5f8ea0026439931b72778a4e08c7af
SHA168ba5e4c60a286a421d0796e10b129936a12deed
SHA256004e8553c1b17d87cc94364497d084e002d35c16d39314ddbd9016b75ee70b99
SHA5124f0bafeb3728e9da46aa0114796f1dca892311132496d902a44bfcd009948a46ed19f5c002569b759a8f1e05294d0ba666dfc1d5551ea51325d45e09a3fac3f6
-
Filesize
13KB
MD5301b1ae136812c448e094ac4afd08da8
SHA10e3ce36c36af3b99f1c06b07520fb11621c5536c
SHA256a4fa6f4e2ee2d40550b74f0d4cfc6ca3982f6a2e5855cac8485bfb5f70c9124d
SHA512c8f9433f7c0e3751512d5ce8f98f9476f289cc323b19004b86451c1c176974ad032ef5cb76632e69dc09b449196d778e3c1960587f71f0fe84082e9751f2ca7f
-
Filesize
11KB
MD5cd3a52e350e942b329dafbe28b348861
SHA1d565e5d92ffbdd91996828b889b5f1bfb6aaaa77
SHA256cf800efb1a0625e2809ae893deb3ab155ca0bb2341c11146d5b5e9ba48d0d802
SHA512a6a50db1d8f9b121f52a254c511c7e0b85812e4db4b389145fc3e31825167cb8ccfc1ea3affa61cf4db394009e2e94ef964b3f62876e3476cbe34a1cd8b18646
-
Filesize
10KB
MD52520c2d0f40ec1967a533b26799f1b96
SHA1be5f68c2427f44d1980bf6b7643b2301630af4ee
SHA256dfecd73ca8bb99073c8cd48e1bd30828d5886137d85d5ea62a56606fc47147cc
SHA512d3416174c7a16b9aaafad80771562a15411b826f3f72b78e599b9f1364f8af2500e4485fd2051f0a67e387e51050ef1263daa74cee7c502d1565336dd24c4ed4
-
Filesize
10KB
MD529b12d6bf691fe2e5cbdd172039b12f6
SHA1e4dd8699dc9dd5399f02475875f536885ca9ab7b
SHA2568feebf1f8f29472fe236f0cdb62ba26522a4cc51b1cd5b25f40017660fafeaf3
SHA512c707c3b2e5cf41642e7fe63cced545f81f0e4e8777e5ed3fa51b423840be80725edc3c71aa0e114a5be5427b27a64f3ac1ee2f2c3f07b2485d61419d74101adf
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\sessionstore-backups\recovery.baklz4
Filesize1KB
MD5b4c64a79d7173530b70cef603361f0fc
SHA1d09c6024429f677ee0770452b897804531188b2e
SHA2562a60664a36cbdcd5935695633b7754bff7757e04cde570302a783bbb0711f7d4
SHA5124bd7c2f247970b6503f81f9e238ec9b9e89cd59a88e73c017521780c846f953aa79eaaada3a3da698626b8857be722e7f295230e51f181580916736bf95f96f5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize3.1MB
MD5fbee495eef4fb429888357b74484d453
SHA16c1ef181f6099d9148aa344ab4b7c531e9042fa2
SHA256bb2700288ab7574b460eaaff55bb97da7dee1a63db6c6a8762bc0589ae69716d
SHA512b7f2cbe90d89b75bf36cd0aa09abdf87b19f32a588bce18b3d1ad00c9027381c21f67b574b784c415e2c2981f5251f18fb037afd1049e261e96d4c2cd2dfc3d6