Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-12-2024 13:28
Static task
static1
General
-
Target
0a7428f3f91be66d8d3243fc5b29a4176da5b9541cd61245d431457299c84b47.exe
-
Size
5.3MB
-
MD5
718f53eb11f4730fac1f40bd5a1ea164
-
SHA1
1646f7000d950f7de88c60d8c10e07a0c3de896e
-
SHA256
0a7428f3f91be66d8d3243fc5b29a4176da5b9541cd61245d431457299c84b47
-
SHA512
1178289c2e70d5314459605554bdeefbc80edd5056aa2988b5766a3c4762f0612f88174aa237d36115c5b16a21263fba93682d3c6e1f40b12589a6ab4d9f531a
-
SSDEEP
98304:YHs+3pzhKjT6ocqacT3h1UJDiQdzAKv6u94DS/xo7bS0L73nPl17ghShHYquXPW:YM+3ZhKHNclczQkUzAMne25GSgtBgiHG
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://sordid-snaked.cyou/api
https://awake-weaves.cyou/api
https://wrathful-jammy.cyou/api
https://debonairnukk.xyz/api
https://diffuculttan.xyz/api
https://effecterectz.xyz/api
https://deafeninggeh.biz/api
https://immureprech.biz/api
https://tacitglibbr.biz/api
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://tacitglibbr.biz/api
https://immureprech.biz/api
https://deafeninggeh.biz/api
https://wrathful-jammy.cyou/api
https://awake-weaves.cyou/api
https://sordid-snaked.cyou/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 37b26a93b1.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 37b26a93b1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 37b26a93b1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 37b26a93b1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 37b26a93b1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 37b26a93b1.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2e1328.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3J69Q.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 48b3c3eca4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 37b26a93b1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1u83S5.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2e1328.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2e1328.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 48b3c3eca4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 37b26a93b1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1u83S5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 48b3c3eca4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 37b26a93b1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1u83S5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3J69Q.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3J69Q.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 1u83S5.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 10 IoCs
pid Process 2312 f6x27.exe 4592 1u83S5.exe 832 skotes.exe 1260 2e1328.exe 4748 6cb49cba8b.exe 3216 3J69Q.exe 2332 48b3c3eca4.exe 1564 37b26a93b1.exe 6768 skotes.exe 2468 skotes.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 1u83S5.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 2e1328.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 3J69Q.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 48b3c3eca4.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 37b26a93b1.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 37b26a93b1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 37b26a93b1.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\6cb49cba8b.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1014405001\\6cb49cba8b.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\48b3c3eca4.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1014406001\\48b3c3eca4.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\37b26a93b1.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1014407001\\37b26a93b1.exe" skotes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0a7428f3f91be66d8d3243fc5b29a4176da5b9541cd61245d431457299c84b47.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" f6x27.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0007000000023c9c-41.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 4592 1u83S5.exe 832 skotes.exe 1260 2e1328.exe 3216 3J69Q.exe 2332 48b3c3eca4.exe 6768 skotes.exe 2468 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1u83S5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f6x27.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1u83S5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6cb49cba8b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 6cb49cba8b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 48b3c3eca4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3J69Q.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 37b26a93b1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0a7428f3f91be66d8d3243fc5b29a4176da5b9541cd61245d431457299c84b47.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2e1328.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 6cb49cba8b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 1956 taskkill.exe 3192 taskkill.exe 2700 taskkill.exe 1476 taskkill.exe 4812 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 4592 1u83S5.exe 4592 1u83S5.exe 832 skotes.exe 832 skotes.exe 1260 2e1328.exe 1260 2e1328.exe 3216 3J69Q.exe 3216 3J69Q.exe 4748 6cb49cba8b.exe 4748 6cb49cba8b.exe 2332 48b3c3eca4.exe 2332 48b3c3eca4.exe 4748 6cb49cba8b.exe 4748 6cb49cba8b.exe 6768 skotes.exe 6768 skotes.exe 2468 skotes.exe 2468 skotes.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 1956 taskkill.exe Token: SeDebugPrivilege 3192 taskkill.exe Token: SeDebugPrivilege 2700 taskkill.exe Token: SeDebugPrivilege 1476 taskkill.exe Token: SeDebugPrivilege 4812 taskkill.exe Token: SeDebugPrivilege 4932 firefox.exe Token: SeDebugPrivilege 4932 firefox.exe Token: SeDebugPrivilege 4932 firefox.exe Token: SeDebugPrivilege 4932 firefox.exe Token: SeDebugPrivilege 4932 firefox.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 4592 1u83S5.exe 4748 6cb49cba8b.exe 4748 6cb49cba8b.exe 4748 6cb49cba8b.exe 4748 6cb49cba8b.exe 4748 6cb49cba8b.exe 4748 6cb49cba8b.exe 4748 6cb49cba8b.exe 4748 6cb49cba8b.exe 4932 firefox.exe 4932 firefox.exe 4932 firefox.exe 4932 firefox.exe 4748 6cb49cba8b.exe 4932 firefox.exe 4932 firefox.exe 4932 firefox.exe 4932 firefox.exe 4932 firefox.exe 4932 firefox.exe 4932 firefox.exe 4932 firefox.exe 4932 firefox.exe 4932 firefox.exe 4932 firefox.exe 4932 firefox.exe 4932 firefox.exe 4932 firefox.exe 4932 firefox.exe 4932 firefox.exe 4932 firefox.exe 4748 6cb49cba8b.exe 4748 6cb49cba8b.exe 4748 6cb49cba8b.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 4748 6cb49cba8b.exe 4748 6cb49cba8b.exe 4748 6cb49cba8b.exe 4748 6cb49cba8b.exe 4748 6cb49cba8b.exe 4748 6cb49cba8b.exe 4748 6cb49cba8b.exe 4748 6cb49cba8b.exe 4932 firefox.exe 4932 firefox.exe 4932 firefox.exe 4932 firefox.exe 4748 6cb49cba8b.exe 4932 firefox.exe 4932 firefox.exe 4932 firefox.exe 4932 firefox.exe 4932 firefox.exe 4932 firefox.exe 4932 firefox.exe 4932 firefox.exe 4932 firefox.exe 4932 firefox.exe 4932 firefox.exe 4932 firefox.exe 4932 firefox.exe 4932 firefox.exe 4932 firefox.exe 4932 firefox.exe 4748 6cb49cba8b.exe 4748 6cb49cba8b.exe 4748 6cb49cba8b.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4932 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3168 wrote to memory of 2312 3168 0a7428f3f91be66d8d3243fc5b29a4176da5b9541cd61245d431457299c84b47.exe 82 PID 3168 wrote to memory of 2312 3168 0a7428f3f91be66d8d3243fc5b29a4176da5b9541cd61245d431457299c84b47.exe 82 PID 3168 wrote to memory of 2312 3168 0a7428f3f91be66d8d3243fc5b29a4176da5b9541cd61245d431457299c84b47.exe 82 PID 2312 wrote to memory of 4592 2312 f6x27.exe 83 PID 2312 wrote to memory of 4592 2312 f6x27.exe 83 PID 2312 wrote to memory of 4592 2312 f6x27.exe 83 PID 4592 wrote to memory of 832 4592 1u83S5.exe 84 PID 4592 wrote to memory of 832 4592 1u83S5.exe 84 PID 4592 wrote to memory of 832 4592 1u83S5.exe 84 PID 2312 wrote to memory of 1260 2312 f6x27.exe 85 PID 2312 wrote to memory of 1260 2312 f6x27.exe 85 PID 2312 wrote to memory of 1260 2312 f6x27.exe 85 PID 832 wrote to memory of 4748 832 skotes.exe 86 PID 832 wrote to memory of 4748 832 skotes.exe 86 PID 832 wrote to memory of 4748 832 skotes.exe 86 PID 3168 wrote to memory of 3216 3168 0a7428f3f91be66d8d3243fc5b29a4176da5b9541cd61245d431457299c84b47.exe 89 PID 3168 wrote to memory of 3216 3168 0a7428f3f91be66d8d3243fc5b29a4176da5b9541cd61245d431457299c84b47.exe 89 PID 3168 wrote to memory of 3216 3168 0a7428f3f91be66d8d3243fc5b29a4176da5b9541cd61245d431457299c84b47.exe 89 PID 4748 wrote to memory of 1956 4748 6cb49cba8b.exe 90 PID 4748 wrote to memory of 1956 4748 6cb49cba8b.exe 90 PID 4748 wrote to memory of 1956 4748 6cb49cba8b.exe 90 PID 832 wrote to memory of 2332 832 skotes.exe 94 PID 832 wrote to memory of 2332 832 skotes.exe 94 PID 832 wrote to memory of 2332 832 skotes.exe 94 PID 4748 wrote to memory of 3192 4748 6cb49cba8b.exe 95 PID 4748 wrote to memory of 3192 4748 6cb49cba8b.exe 95 PID 4748 wrote to memory of 3192 4748 6cb49cba8b.exe 95 PID 4748 wrote to memory of 2700 4748 6cb49cba8b.exe 97 PID 4748 wrote to memory of 2700 4748 6cb49cba8b.exe 97 PID 4748 wrote to memory of 2700 4748 6cb49cba8b.exe 97 PID 4748 wrote to memory of 1476 4748 6cb49cba8b.exe 99 PID 4748 wrote to memory of 1476 4748 6cb49cba8b.exe 99 PID 4748 wrote to memory of 1476 4748 6cb49cba8b.exe 99 PID 4748 wrote to memory of 4812 4748 6cb49cba8b.exe 102 PID 4748 wrote to memory of 4812 4748 6cb49cba8b.exe 102 PID 4748 wrote to memory of 4812 4748 6cb49cba8b.exe 102 PID 4748 wrote to memory of 4296 4748 6cb49cba8b.exe 104 PID 4748 wrote to memory of 4296 4748 6cb49cba8b.exe 104 PID 4296 wrote to memory of 4932 4296 firefox.exe 105 PID 4296 wrote to memory of 4932 4296 firefox.exe 105 PID 4296 wrote to memory of 4932 4296 firefox.exe 105 PID 4296 wrote to memory of 4932 4296 firefox.exe 105 PID 4296 wrote to memory of 4932 4296 firefox.exe 105 PID 4296 wrote to memory of 4932 4296 firefox.exe 105 PID 4296 wrote to memory of 4932 4296 firefox.exe 105 PID 4296 wrote to memory of 4932 4296 firefox.exe 105 PID 4296 wrote to memory of 4932 4296 firefox.exe 105 PID 4296 wrote to memory of 4932 4296 firefox.exe 105 PID 4296 wrote to memory of 4932 4296 firefox.exe 105 PID 4932 wrote to memory of 5028 4932 firefox.exe 106 PID 4932 wrote to memory of 5028 4932 firefox.exe 106 PID 4932 wrote to memory of 5028 4932 firefox.exe 106 PID 4932 wrote to memory of 5028 4932 firefox.exe 106 PID 4932 wrote to memory of 5028 4932 firefox.exe 106 PID 4932 wrote to memory of 5028 4932 firefox.exe 106 PID 4932 wrote to memory of 5028 4932 firefox.exe 106 PID 4932 wrote to memory of 5028 4932 firefox.exe 106 PID 4932 wrote to memory of 5028 4932 firefox.exe 106 PID 4932 wrote to memory of 5028 4932 firefox.exe 106 PID 4932 wrote to memory of 5028 4932 firefox.exe 106 PID 4932 wrote to memory of 5028 4932 firefox.exe 106 PID 4932 wrote to memory of 5028 4932 firefox.exe 106 PID 4932 wrote to memory of 5028 4932 firefox.exe 106 PID 4932 wrote to memory of 5028 4932 firefox.exe 106 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a7428f3f91be66d8d3243fc5b29a4176da5b9541cd61245d431457299c84b47.exe"C:\Users\Admin\AppData\Local\Temp\0a7428f3f91be66d8d3243fc5b29a4176da5b9541cd61245d431457299c84b47.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\f6x27.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\f6x27.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1u83S5.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1u83S5.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Users\Admin\AppData\Local\Temp\1014405001\6cb49cba8b.exe"C:\Users\Admin\AppData\Local\Temp\1014405001\6cb49cba8b.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1956
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3192
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2700
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1476
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4812
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking6⤵
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking7⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2076 -parentBuildID 20240401114208 -prefsHandle 2000 -prefMapHandle 1992 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {77e7e59d-a4e1-43ee-b689-b36184765478} 4932 "\\.\pipe\gecko-crash-server-pipe.4932" gpu8⤵PID:5028
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2508 -parentBuildID 20240401114208 -prefsHandle 2500 -prefMapHandle 2496 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e002da81-b3c5-47db-865f-81fbdef67cc5} 4932 "\\.\pipe\gecko-crash-server-pipe.4932" socket8⤵PID:2544
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3556 -childID 1 -isForBrowser -prefsHandle 3532 -prefMapHandle 3112 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {75035bb5-a613-4752-9b2f-341a82986d79} 4932 "\\.\pipe\gecko-crash-server-pipe.4932" tab8⤵PID:2944
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2912 -childID 2 -isForBrowser -prefsHandle 3448 -prefMapHandle 3780 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8da7bfd3-0a22-4089-833e-48c4ffbdae25} 4932 "\\.\pipe\gecko-crash-server-pipe.4932" tab8⤵PID:4160
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4656 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4684 -prefMapHandle 4680 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {36709886-1c12-45fb-89c3-50784e45c66f} 4932 "\\.\pipe\gecko-crash-server-pipe.4932" utility8⤵
- Checks processor information in registry
PID:5968
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5308 -childID 3 -isForBrowser -prefsHandle 5300 -prefMapHandle 5280 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f259fb7c-7505-4b20-9343-33a26d5b0901} 4932 "\\.\pipe\gecko-crash-server-pipe.4932" tab8⤵PID:6824
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5440 -childID 4 -isForBrowser -prefsHandle 5448 -prefMapHandle 5452 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b9278f4c-ec98-4309-b5f5-f2c814c46dcf} 4932 "\\.\pipe\gecko-crash-server-pipe.4932" tab8⤵PID:6836
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5632 -childID 5 -isForBrowser -prefsHandle 5640 -prefMapHandle 5644 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a1c7c870-2747-4e68-9af1-69533363ea61} 4932 "\\.\pipe\gecko-crash-server-pipe.4932" tab8⤵PID:6848
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1014406001\48b3c3eca4.exe"C:\Users\Admin\AppData\Local\Temp\1014406001\48b3c3eca4.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2332
-
-
C:\Users\Admin\AppData\Local\Temp\1014407001\37b26a93b1.exe"C:\Users\Admin\AppData\Local\Temp\1014407001\37b26a93b1.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- System Location Discovery: System Language Discovery
PID:1564
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2e1328.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2e1328.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1260
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3J69Q.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3J69Q.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3216
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6768
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2468
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\activity-stream.discovery_stream.json
Filesize19KB
MD5b7dfd04f42a39d1a43d6f2d29b95612f
SHA1679a4cad2a6b301c7de091ef4a6382f55e7cbfaf
SHA2563454c5181688a1fbc97d3372df45a07be14d944f6a35baa7841e5baef7dfef09
SHA5124ede27cbee141b7747ee8118834c71c944b3f5e00ee866b8b880c7af79a92da73bb2d0e060f4c429c63a4752360f0d09234604e920b89cf02afde1067d6585d9
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD566592a7568c5d87caa1d9e695e6bd60a
SHA1ac23779366722e5f4d6ca0dbf7362e6cedd05ef2
SHA256d47e07c1c153d27d8392086ac2c8796b3705119a8445b66d4cfa83c2a80ee55f
SHA5127f39b5c72e8557569ff274c2d1cce49226b6a29a2b52d9c4db125d781fabe3187fc588a530933e317f551f3f567518efd81f52ff1b18ddb96ad28b3c23dc0bb9
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
943KB
MD54853be4f2bb74b706effcc60fc06446b
SHA1405666e3bfc16348677d5fe2224d7bd8b739d94f
SHA2561fff6fb9300916f4d128a5b2df8ca413f1d820660b8f61b54a203a9e0fd76372
SHA51202ffabd11493e0aec0d62fe5f980cb91e587e9dafe36fbf7ed67733bf3f68757f2a09ad53af6d610ba1125b486ebcb695a719b2dfa30ecca0c2950c2735f8ccf
-
Filesize
1.7MB
MD598c5024a596c5c548d36bc33ae113a73
SHA1b30aefb89057c1c6bab845df896777bc97230ae3
SHA25663f607b4cd4804876dd817163529180a18a30245aefc92e1ea79eaea6348a121
SHA512d6853305f9f26a09e98ad270498d57f52a604667984c754c3f7aab5d5f3270416e25e9c328981d63b2675c661da5f454c290cf291c932338593ae80f8e85fc9d
-
Filesize
2.7MB
MD548d72055c656230bed2ebc5831008349
SHA1158a1540a163a2e47eae9426e89b10febb86d7ec
SHA25628bbe25cec4284374cd34fcb0bc1b203a5663de1383927640cc6c9ed40788634
SHA512c72186e9deb21e811923f128da31c9053271826f9acdebe18c38d5730bb34eda9a9dc4cf0baf5926e071fb388272799a180c827c04a1b953523876dc7af04e3f
-
Filesize
1.7MB
MD50db86f415beec566f74ae32230607940
SHA159ad2e80445397031efa8cb4cf90488ca03e809e
SHA2564f3f3cebaedafaca661c5852c61b1cc62377805ddb893891c795097cc4d90216
SHA512b4f1fe2f7805091a7fd6611dede047f35fa403770f6351bf3cba4243a74d4539bd84cb687569b60c7a58b8664f549202b4009c75cc82392a5b16507c7f8dfaf8
-
Filesize
3.5MB
MD5a00bf8c789c0077688fbdc4bad39ce3e
SHA1604f468b6d065731aae511360cfcb16bc10258a2
SHA256c5ba3e08e8b4c60113430fefc63b67149d1690a0c9f8dbe29cadf1bf49ce8ca1
SHA5125b01c45b6a87366de516ab27257d4642c8a3372b69563e4cfbfd9e4b44bc53f79186bb6cc659c9b18a63dbabeca022718d4b23bd4bf365605eee7cdcc00d2b7b
-
Filesize
3.1MB
MD5bfafb8154be49c061ea87bb8f1b1d2e3
SHA128aea3a6010fa9ed6587b9a3ec48399f7e2cd3e3
SHA25606dd79ee8be1ee3c3e51c2499e84a9823cf51c0049d12383b1e333157d56d43a
SHA512a6941502929f5f708191df88005e8734b07b0a34538ff030131edce34f7f2672ac586abd75855ac001d8a1e182e4d632f0516b687d74c78d950e77bbfb79e5f9
-
Filesize
1.8MB
MD59c44476a000428e61f66dc47e2c5cc34
SHA1e427c00e570aa70c5cb083e56e48a2b4b4990235
SHA2569e48bf805ff254a4b2c920460a8ba4348a65132a574dd3702d15be9f5470080e
SHA512c11e86955068a68c164ab2fcab24419d751a6c0948308104d8502c27d52aca33c8fad7f367d8c455a56d23ea8d316d83584625e41778e07c360d11ccf2652aa0
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\AlternateServices.bin
Filesize6KB
MD54f49a3dd28583aad261ecf3c10fb8e5b
SHA1eeca5f9cd8478780692b4ba69a97a5b4a574d895
SHA2564cae986a54a04db30fbd1dc27cdd53b2acdfd5d1a48db20253f6f8e64327a19f
SHA512903bbc5f2278873271e7c69ae34a1d49020f2f3481ac455a6efb71c5527a0911b3413a48a795b4839cb636d5967075680b5e9e4ccd05e472c1dc943ae8df158c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.bin
Filesize23KB
MD521d70081e42d6b3c775152aa21bf2066
SHA161c5c47ed3c4a8715646bf1207d809ffba86c318
SHA25639f4b8ae896d291472e48bee38fbaa041ab678557083fe8ceb97e8d6a4f09134
SHA5121a564f54701de7b803b733148d279f6b9757b103656e52e7378399f367a99c93c50ca3874ea5543df8e71a01e6f5c3adba5a034063e07b7530969093d9773efb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.bin
Filesize5KB
MD55dee675a41d7c64d6c8136bfda86be91
SHA1273627cfe8f6a286022e99d8bc1bd02624c92725
SHA25635b1fdf7b779b6c30f6733c38b7ea109b72259b8d813a6241635f7acc2a6e2f9
SHA512fd70cf2fba93c67f82aed6a33e90a455491cc9e743069dfb50ab641955cc7edfaaed00191891802641e40a6914232030d4a643845e29df9989bd91e445bf2282
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.bin
Filesize15KB
MD533d380cd5fea71865b84732a1fb93b72
SHA19d15724f379829c77f63128eb4b844f6535f3339
SHA25690fdc4ff896d8f47cf2e5c4b53bdd0b4b8ceec29fd012c0f453a5253474917c1
SHA5125ec2158f6615fcecd9ef016e122ac6820a84e62fca2cc4170e662af9fe12df2afafbe301f6463e801d7b85fd911342f6cfca76f3165ca1b2617374b6cf724a2b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.bin
Filesize15KB
MD5418154a6b6882e8b2e6947ba78498cae
SHA166b52b3be8b386179cb04476180e23c0dc7438ee
SHA2564d261b0b814223a49bf14940b720b2c715614ca63e2ef84d8bf47feed8fd5095
SHA512af6eaca01d86d97a0588647e17feb9909cefec847176ea5acc978458fa04c2e5993bd1f6ce7ec8a8b61ac20224eadedca9d850f19cf7c455f11eb918d572fee6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5b3e13f56b42b726961b62e4bf1266422
SHA1075ad470034f5985fb202d70563e314467d39d42
SHA25614af252103d30ab2030b3f6cb7e14dabe5934da8db5e434525d341bb8c18085b
SHA512636017aad4f115f07782ea92cb28f1b72b88b2e32027980efe4f60c6a765da9eb2810750c8098e3decef0d00042d8f04b9b32aefc10d167a27c6bb4948837b55
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5719dae37f5db27f82e5903c163a85aaa
SHA17ba71441fcd7fe8c437b0bdd8132fd11e3a4fb84
SHA25602e317ea0d87496e466d6395cdde1a0784c34279b71eedd30fd6cf25e369a116
SHA512d52380df09252c1b3b38e877d6ddbc3303a9d98167fd54b9f3e2d08285f3514263d661a6338189f91f7c9bff6e0a1119e4f4ec1d443d6fdbe8a2dfe164c641c5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD50e425af85aca6367508dc664b17ac7e7
SHA16bb98248146c8d38130c119d23da4f6f4fe8c588
SHA256ba541a8cee8b4127b1d4f3525e538862464eb067540ee2ae625e1a778896d19b
SHA5123da4442cf44386607be15a843104eb7a0f3690855612522e0a82ebac3265cf296983ff0c95060f3e1a03007a642bd8a3f628b1818598453a693f8ff440c2539c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\26d19458-4908-4323-9821-46801e9573ca
Filesize671B
MD569ada89391fc2d7d3dea69f25d003983
SHA16363832ec565d81152c3fe4f926e77ea49e21a99
SHA256472c887493279ca8beb9b362cc38f8af97d531eea9d26095407a94b0dcc5d40f
SHA51209177f0c9bcdc6706b66b9a60c29023e66747428fc27b4936b8054ea3c80940ba6e27c6c856209428a75ca20b7c798aa5ff68ac7c73846f74cb9a6cc37b1bafd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\d1067e4d-7fc5-488d-850f-e3496d43c92b
Filesize25KB
MD55750166f85e5c8f37437696c31f7aa0c
SHA13097b15dd34f37ac02f399c1df544adc62021a8f
SHA2565bc7322c67b2ab40a4cbb9513cc996ec0439e7cc9026aa0fad1955a92ae92a30
SHA512594075a92dd89ad0a1fb6d4540bd9f8bd7408b0f2499fff500dc33f87ee48cc3ac367ca9602b86612bf9965764a230113c1afabdf45616112c1eab968e29f214
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\db5faba4-8de7-403c-937e-d83e753562b5
Filesize982B
MD5a889bd7a77da9220b7a214d88a3df065
SHA17f9e9179990f55ac64071397e3aa73441b3d965f
SHA256055a6350ff7f7adf76f1cb83d3f09427345e07ee593ba7cc616084969eae005a
SHA512269ab6d03089c21aed41f7a002b60706e3b74f814b651e79afb9d303e1ae86091611e7f721b1eaf5d3518bd97b2a3f16700afb31e66ebf4f5cf0b9b8e1d15b31
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD538b7b93056fb1ede00bec7677383bd7b
SHA1c7e0e546e82398ed803e3ceda3597784c5534f1c
SHA256b9a1c4f9bd9dc3ef042b0888f6977809a5a5239e24c2aa945b7b68606267cfcd
SHA512f1ac20bedd28a53f27c25a7299b124f2798afc545fde3838ce04100c51877cf3d0330a8660d6397ed7590054abee798b8604f80db379aa74ad5f82eb78bdf733
-
Filesize
11KB
MD5bf6a09448edbfa72de23b6383b970f2c
SHA1fdfdd94da76ceb089b66ccb5e08abca3c7cf218c
SHA2563c470ac582be7333149419f26e7b2eef394f5c9b46cb63b180e6a28ce5d3a57e
SHA512c535e896117246b00ce7cfbc859822312b9e024bd3672152b246af67598797303c1365fde713b9c9632603bbb421056186b25169120481c2a61fad91df5e6bd7
-
Filesize
15KB
MD5f53cc975993ca1bd367ffb907b4c1150
SHA10024de778cb6ac940de28db710103baab4efa41d
SHA2561c515cb4566c7affee764042b4020244f461bd7439dc551e44ca9386d87bfe60
SHA51212fb13458c0d4633182e4101c20564c9edf195219c93337dbd19a9c47a20032d844711ab80975b92e56dc2379dfa32aa4560e202502866e73a6b4c7828894d83
-
Filesize
10KB
MD5a5367cc4a339c51cbeb151c4385437fd
SHA1f00c25812b525334ef70f271114dd5182a4117f6
SHA2569a965a35e7a6c8062af1507e286b51f32b7ad24a7455071b7b1f562188dbddf2
SHA5129c8894a0d169c9037fe0867031d041fc932990a681fbde62e74b5f88d127cd32dc5976826b1e71bd23a061ca5abc47726f8d7f172fa3ca0f1f131afcf366983b