Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-12-2024 20:19
Static task
static1
General
-
Target
977e7a47f360bba3fb56459cf88313a5e33a58f9012e8f2afa152ddd12a21ffd.exe
-
Size
5.0MB
-
MD5
acb3266d0eaf73aeed8ca7cf72db2048
-
SHA1
5c9a7988f19f35a56ca71db05e35bfaa3c047b97
-
SHA256
977e7a47f360bba3fb56459cf88313a5e33a58f9012e8f2afa152ddd12a21ffd
-
SHA512
a3077d5cce730f935b704908eb9846b57ca7738aa9ff245a904b3f5daf507fd75a77665e5dc1d3316c909ee7cc0bd1c7ff516ef56244926c2aafed0c3ebbb168
-
SSDEEP
98304:N+QLZhpPUpY4Rhq5KJ1PM/4smlOUHs9GhMeJq0ubY4MorvL:4yZ8pYwtP+Jmld8eQBrv
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4T553e.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4T553e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4T553e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4T553e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4T553e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4T553e.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3Y23N.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4T553e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 272266e041.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1o74Y4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 00e2ff7990.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 00e2ff7990.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 272266e041.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1o74Y4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4T553e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 00e2ff7990.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3Y23N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 272266e041.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1o74Y4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3Y23N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4T553e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 1o74Y4.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 3c279c4003.exe -
Executes dropped EXE 12 IoCs
pid Process 3264 e0S78.exe 3804 1o74Y4.exe 3928 skotes.exe 4688 3Y23N.exe 4980 4T553e.exe 636 skotes.exe 2608 58ddf8d482.exe 4260 00e2ff7990.exe 5380 272266e041.exe 5908 3c279c4003.exe 6896 skotes.exe 5000 skotes.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 00e2ff7990.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 272266e041.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 3Y23N.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 4T553e.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 1o74Y4.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4T553e.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4T553e.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 977e7a47f360bba3fb56459cf88313a5e33a58f9012e8f2afa152ddd12a21ffd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" e0S78.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\58ddf8d482.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1014514001\\58ddf8d482.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\00e2ff7990.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1014515001\\00e2ff7990.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\272266e041.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1014516001\\272266e041.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0008000000023cbb-52.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 3804 1o74Y4.exe 3928 skotes.exe 4688 3Y23N.exe 4980 4T553e.exe 636 skotes.exe 4260 00e2ff7990.exe 5380 272266e041.exe 6896 skotes.exe 5000 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1o74Y4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 5640 5380 WerFault.exe 117 6176 5908 WerFault.exe 125 -
System Location Discovery: System Language Discovery 1 TTPs 19 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1o74Y4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 58ddf8d482.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4T553e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 272266e041.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 977e7a47f360bba3fb56459cf88313a5e33a58f9012e8f2afa152ddd12a21ffd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3Y23N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 58ddf8d482.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 00e2ff7990.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3c279c4003.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e0S78.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 58ddf8d482.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3c279c4003.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3c279c4003.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 6204 timeout.exe -
Kills process with taskkill 5 IoCs
pid Process 5100 taskkill.exe 1992 taskkill.exe 540 taskkill.exe 1840 taskkill.exe 3896 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 3804 1o74Y4.exe 3804 1o74Y4.exe 3928 skotes.exe 3928 skotes.exe 4688 3Y23N.exe 4688 3Y23N.exe 4980 4T553e.exe 4980 4T553e.exe 4980 4T553e.exe 4980 4T553e.exe 636 skotes.exe 636 skotes.exe 2608 58ddf8d482.exe 2608 58ddf8d482.exe 4260 00e2ff7990.exe 4260 00e2ff7990.exe 2608 58ddf8d482.exe 2608 58ddf8d482.exe 5380 272266e041.exe 5380 272266e041.exe 5908 3c279c4003.exe 5908 3c279c4003.exe 6896 skotes.exe 6896 skotes.exe 5000 skotes.exe 5000 skotes.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 4980 4T553e.exe Token: SeDebugPrivilege 5100 taskkill.exe Token: SeDebugPrivilege 1992 taskkill.exe Token: SeDebugPrivilege 540 taskkill.exe Token: SeDebugPrivilege 1840 taskkill.exe Token: SeDebugPrivilege 3896 taskkill.exe Token: SeDebugPrivilege 5072 firefox.exe Token: SeDebugPrivilege 5072 firefox.exe Token: SeDebugPrivilege 5072 firefox.exe Token: SeDebugPrivilege 5072 firefox.exe Token: SeDebugPrivilege 5072 firefox.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 3804 1o74Y4.exe 2608 58ddf8d482.exe 2608 58ddf8d482.exe 2608 58ddf8d482.exe 2608 58ddf8d482.exe 2608 58ddf8d482.exe 2608 58ddf8d482.exe 2608 58ddf8d482.exe 5072 firefox.exe 5072 firefox.exe 5072 firefox.exe 5072 firefox.exe 5072 firefox.exe 5072 firefox.exe 5072 firefox.exe 5072 firefox.exe 5072 firefox.exe 5072 firefox.exe 5072 firefox.exe 5072 firefox.exe 5072 firefox.exe 5072 firefox.exe 5072 firefox.exe 5072 firefox.exe 5072 firefox.exe 5072 firefox.exe 5072 firefox.exe 5072 firefox.exe 5072 firefox.exe 2608 58ddf8d482.exe 2608 58ddf8d482.exe 2608 58ddf8d482.exe 2608 58ddf8d482.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 2608 58ddf8d482.exe 2608 58ddf8d482.exe 2608 58ddf8d482.exe 2608 58ddf8d482.exe 2608 58ddf8d482.exe 2608 58ddf8d482.exe 2608 58ddf8d482.exe 5072 firefox.exe 5072 firefox.exe 5072 firefox.exe 5072 firefox.exe 5072 firefox.exe 5072 firefox.exe 5072 firefox.exe 5072 firefox.exe 5072 firefox.exe 5072 firefox.exe 5072 firefox.exe 5072 firefox.exe 5072 firefox.exe 5072 firefox.exe 5072 firefox.exe 5072 firefox.exe 5072 firefox.exe 5072 firefox.exe 5072 firefox.exe 5072 firefox.exe 2608 58ddf8d482.exe 2608 58ddf8d482.exe 2608 58ddf8d482.exe 2608 58ddf8d482.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5072 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4732 wrote to memory of 3264 4732 977e7a47f360bba3fb56459cf88313a5e33a58f9012e8f2afa152ddd12a21ffd.exe 84 PID 4732 wrote to memory of 3264 4732 977e7a47f360bba3fb56459cf88313a5e33a58f9012e8f2afa152ddd12a21ffd.exe 84 PID 4732 wrote to memory of 3264 4732 977e7a47f360bba3fb56459cf88313a5e33a58f9012e8f2afa152ddd12a21ffd.exe 84 PID 3264 wrote to memory of 3804 3264 e0S78.exe 85 PID 3264 wrote to memory of 3804 3264 e0S78.exe 85 PID 3264 wrote to memory of 3804 3264 e0S78.exe 85 PID 3804 wrote to memory of 3928 3804 1o74Y4.exe 86 PID 3804 wrote to memory of 3928 3804 1o74Y4.exe 86 PID 3804 wrote to memory of 3928 3804 1o74Y4.exe 86 PID 3264 wrote to memory of 4688 3264 e0S78.exe 87 PID 3264 wrote to memory of 4688 3264 e0S78.exe 87 PID 3264 wrote to memory of 4688 3264 e0S78.exe 87 PID 4732 wrote to memory of 4980 4732 977e7a47f360bba3fb56459cf88313a5e33a58f9012e8f2afa152ddd12a21ffd.exe 88 PID 4732 wrote to memory of 4980 4732 977e7a47f360bba3fb56459cf88313a5e33a58f9012e8f2afa152ddd12a21ffd.exe 88 PID 4732 wrote to memory of 4980 4732 977e7a47f360bba3fb56459cf88313a5e33a58f9012e8f2afa152ddd12a21ffd.exe 88 PID 3928 wrote to memory of 2608 3928 skotes.exe 90 PID 3928 wrote to memory of 2608 3928 skotes.exe 90 PID 3928 wrote to memory of 2608 3928 skotes.exe 90 PID 2608 wrote to memory of 5100 2608 58ddf8d482.exe 91 PID 2608 wrote to memory of 5100 2608 58ddf8d482.exe 91 PID 2608 wrote to memory of 5100 2608 58ddf8d482.exe 91 PID 2608 wrote to memory of 1992 2608 58ddf8d482.exe 97 PID 2608 wrote to memory of 1992 2608 58ddf8d482.exe 97 PID 2608 wrote to memory of 1992 2608 58ddf8d482.exe 97 PID 2608 wrote to memory of 540 2608 58ddf8d482.exe 99 PID 2608 wrote to memory of 540 2608 58ddf8d482.exe 99 PID 2608 wrote to memory of 540 2608 58ddf8d482.exe 99 PID 2608 wrote to memory of 1840 2608 58ddf8d482.exe 101 PID 2608 wrote to memory of 1840 2608 58ddf8d482.exe 101 PID 2608 wrote to memory of 1840 2608 58ddf8d482.exe 101 PID 2608 wrote to memory of 3896 2608 58ddf8d482.exe 103 PID 2608 wrote to memory of 3896 2608 58ddf8d482.exe 103 PID 2608 wrote to memory of 3896 2608 58ddf8d482.exe 103 PID 3928 wrote to memory of 4260 3928 skotes.exe 105 PID 3928 wrote to memory of 4260 3928 skotes.exe 105 PID 3928 wrote to memory of 4260 3928 skotes.exe 105 PID 2608 wrote to memory of 1620 2608 58ddf8d482.exe 106 PID 2608 wrote to memory of 1620 2608 58ddf8d482.exe 106 PID 1620 wrote to memory of 5072 1620 firefox.exe 107 PID 1620 wrote to memory of 5072 1620 firefox.exe 107 PID 1620 wrote to memory of 5072 1620 firefox.exe 107 PID 1620 wrote to memory of 5072 1620 firefox.exe 107 PID 1620 wrote to memory of 5072 1620 firefox.exe 107 PID 1620 wrote to memory of 5072 1620 firefox.exe 107 PID 1620 wrote to memory of 5072 1620 firefox.exe 107 PID 1620 wrote to memory of 5072 1620 firefox.exe 107 PID 1620 wrote to memory of 5072 1620 firefox.exe 107 PID 1620 wrote to memory of 5072 1620 firefox.exe 107 PID 1620 wrote to memory of 5072 1620 firefox.exe 107 PID 5072 wrote to memory of 100 5072 firefox.exe 108 PID 5072 wrote to memory of 100 5072 firefox.exe 108 PID 5072 wrote to memory of 100 5072 firefox.exe 108 PID 5072 wrote to memory of 100 5072 firefox.exe 108 PID 5072 wrote to memory of 100 5072 firefox.exe 108 PID 5072 wrote to memory of 100 5072 firefox.exe 108 PID 5072 wrote to memory of 100 5072 firefox.exe 108 PID 5072 wrote to memory of 100 5072 firefox.exe 108 PID 5072 wrote to memory of 100 5072 firefox.exe 108 PID 5072 wrote to memory of 100 5072 firefox.exe 108 PID 5072 wrote to memory of 100 5072 firefox.exe 108 PID 5072 wrote to memory of 100 5072 firefox.exe 108 PID 5072 wrote to memory of 100 5072 firefox.exe 108 PID 5072 wrote to memory of 100 5072 firefox.exe 108 PID 5072 wrote to memory of 100 5072 firefox.exe 108 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\977e7a47f360bba3fb56459cf88313a5e33a58f9012e8f2afa152ddd12a21ffd.exe"C:\Users\Admin\AppData\Local\Temp\977e7a47f360bba3fb56459cf88313a5e33a58f9012e8f2afa152ddd12a21ffd.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e0S78.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e0S78.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3264 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1o74Y4.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1o74Y4.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Users\Admin\AppData\Local\Temp\1014514001\58ddf8d482.exe"C:\Users\Admin\AppData\Local\Temp\1014514001\58ddf8d482.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5100
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1992
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:540
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1840
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3896
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking6⤵
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking7⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2012 -parentBuildID 20240401114208 -prefsHandle 1936 -prefMapHandle 1928 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {4c4ccfc3-16bc-4a96-9562-25377c7a77a4} 5072 "\\.\pipe\gecko-crash-server-pipe.5072" gpu8⤵PID:100
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2444 -parentBuildID 20240401114208 -prefsHandle 2420 -prefMapHandle 2408 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1e9be7a9-b2bd-4a66-a080-e35d9c1e4510} 5072 "\\.\pipe\gecko-crash-server-pipe.5072" socket8⤵PID:4700
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3280 -childID 1 -isForBrowser -prefsHandle 2860 -prefMapHandle 3292 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 944 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {66b86419-c805-4e5e-aa2c-3e2e407239c1} 5072 "\\.\pipe\gecko-crash-server-pipe.5072" tab8⤵PID:2448
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4064 -childID 2 -isForBrowser -prefsHandle 2572 -prefMapHandle 2568 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 944 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9d3d1569-6f38-459a-9ddc-c0331782bbaf} 5072 "\\.\pipe\gecko-crash-server-pipe.5072" tab8⤵PID:5096
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4844 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4804 -prefMapHandle 4744 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {63c3ba0b-3711-4181-b200-235c03b67ca6} 5072 "\\.\pipe\gecko-crash-server-pipe.5072" utility8⤵
- Checks processor information in registry
PID:6552
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5536 -childID 3 -isForBrowser -prefsHandle 5528 -prefMapHandle 5152 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 944 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8f147846-2767-4392-8d6e-d2a37f77a0f4} 5072 "\\.\pipe\gecko-crash-server-pipe.5072" tab8⤵PID:1456
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5648 -childID 4 -isForBrowser -prefsHandle 5724 -prefMapHandle 5720 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 944 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {04d5727b-dffc-4c7b-8cd6-cbd4b4c3b510} 5072 "\\.\pipe\gecko-crash-server-pipe.5072" tab8⤵PID:5032
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5628 -childID 5 -isForBrowser -prefsHandle 5840 -prefMapHandle 5844 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 944 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a4b5bc03-8233-42f1-92d9-7843eb8141f6} 5072 "\\.\pipe\gecko-crash-server-pipe.5072" tab8⤵PID:968
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1014515001\00e2ff7990.exe"C:\Users\Admin\AppData\Local\Temp\1014515001\00e2ff7990.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4260
-
-
C:\Users\Admin\AppData\Local\Temp\1014516001\272266e041.exe"C:\Users\Admin\AppData\Local\Temp\1014516001\272266e041.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5380 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5380 -s 8446⤵
- Program crash
PID:5640
-
-
-
C:\Users\Admin\AppData\Local\Temp\1014517001\3c279c4003.exe"C:\Users\Admin\AppData\Local\Temp\1014517001\3c279c4003.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:5908 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\1014517001\3c279c4003.exe" & rd /s /q "C:\ProgramData\HLXTR1D2DTRI" & exit6⤵
- System Location Discovery: System Language Discovery
PID:6120 -
C:\Windows\SysWOW64\timeout.exetimeout /t 107⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:6204
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5908 -s 20406⤵
- Program crash
PID:6176
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3Y23N.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3Y23N.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4688
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4T553e.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4T553e.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4980
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 5380 -ip 53801⤵PID:5604
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 5380 -ip 53801⤵PID:5688
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5908 -ip 59081⤵PID:6128
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6896
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5000
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\activity-stream.discovery_stream.json.tmp
Filesize19KB
MD5e9cbad55e1832ffe204bf211eaea1a20
SHA19388dd10448281b75fc532bf603ac0d8153a7fd1
SHA256eaa53d347ec988beb3063421e67979990778b5d3057fcaf582946ba51cc3a883
SHA51212dbc93497f75f2a77bf761586fc9f2e98f38ef14b52b887d4b99ed430f4c546290891dd586f110f91df19c9beb14e371f06acb39bf9e762b0a807027290faa2
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD50149eb4201a129b3a43f22621dead8db
SHA144e767f5a8d516446d207726e87fe65de3328777
SHA256a9d552cb836cf4e69ab206967c0603a74229a7e627d3468c1d911c9f87f8b0b1
SHA5123d720a3b043e8291f8b3512e51854b539feb6529052796851076e1bafd23520ba41cdf3e77e428f9dc790646fc42887791e8c62d6db207102e0bcd93ad082bbd
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
944KB
MD589f43935dd16af2945da61db6c46a02d
SHA134d9961fd89eec180030abb87c4da5dddca4a5d6
SHA256fc35c405e322a7f4ffb96c76b76d62dbb3297925e47a492e657f48a28312c793
SHA512c087f473db2ab38e8dabf71eb5d859e723b1102926777144696bf45bf8eb8741fca53cb3683b845911e74c756b5a065a6320b5cd32d3199800941007fcc577c3
-
Filesize
1.7MB
MD536ce95040ed17e3c4ccf84ef67666738
SHA16bd06628eb201fb91f20e3905bbf1f052bab16c5
SHA256888781cacec83eae2a8ea38778dc47d6787ef7bf54f6e05122b9c75a9349c84b
SHA5123ed7c233e6f90ecd461073db2e80e321416cdc1da6c6c3295ff321357084f6ad1232bd537d715b8ca979177287b19a7efca9d804060682bb559055c9239e0e7d
-
Filesize
2.6MB
MD539d7cc067a59d8f1770a51c3bbef5b32
SHA179c6ae975688b81552a74bad9d0b4c59210b5f4d
SHA2562126a93fc9cd6b40d454914419705a7d70c19d79b1c7beb11aeaa39a1c8a566f
SHA5125f211708fd7353499d73314056798665ebad1e8a7cf4b3818018d0fe3978062aea35d2e15f8d7782d7d97e04353f04cfefaedb12b84c3c2e691888fc0a0d63f3
-
Filesize
384KB
MD5dfd5f78a711fa92337010ecc028470b4
SHA11a389091178f2be8ce486cd860de16263f8e902e
SHA256da96f2eb74e60de791961ef3800c36a5e12202fe97ae5d2fcfc1fe404bc13c0d
SHA512a3673074919039a2dc854b0f91d1e1a69724056594e33559741f53594e0f6e61e3d99ec664d541b17f09ffdebc2de1b042eec19ca8477fac86359c703f8c9656
-
Filesize
2.7MB
MD548d72055c656230bed2ebc5831008349
SHA1158a1540a163a2e47eae9426e89b10febb86d7ec
SHA25628bbe25cec4284374cd34fcb0bc1b203a5663de1383927640cc6c9ed40788634
SHA512c72186e9deb21e811923f128da31c9053271826f9acdebe18c38d5730bb34eda9a9dc4cf0baf5926e071fb388272799a180c827c04a1b953523876dc7af04e3f
-
Filesize
3.5MB
MD525ed2cc135ab396ce63c0cbf8bc4d6c2
SHA14da8779af170c6c756fd5e51ed52506a01d91135
SHA2560800862db7ec6343ee1a0b4fb6f91603e0f97fdfd9b8c8cd10174a9384e79d08
SHA51298df2d5c028a27b0c149df373283aa6dec98caa93668519a57a4a2953669558229c82238e2f0d3343e357fefa5f0e89442879e167fb7872bdc8954fbd4753521
-
Filesize
3.0MB
MD5f00748070014e907402d3b74efe95914
SHA1f76796b85089b5265a8ef437317220d407f2e5a4
SHA2562c822ca7c7bd7975474d0d8049a0116f9adbca9edc9af681971aa236a2e0976c
SHA512cf4854b3d016767b658baa8eafcf9f0d0737fa65c7595d652c0f684994797a562f79923b5da6b1d8492a68601bf2d4f56a877a53f3f25d9637ce3acadbeeec7f
-
Filesize
1.7MB
MD598c5024a596c5c548d36bc33ae113a73
SHA1b30aefb89057c1c6bab845df896777bc97230ae3
SHA25663f607b4cd4804876dd817163529180a18a30245aefc92e1ea79eaea6348a121
SHA512d6853305f9f26a09e98ad270498d57f52a604667984c754c3f7aab5d5f3270416e25e9c328981d63b2675c661da5f454c290cf291c932338593ae80f8e85fc9d
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\AlternateServices.bin
Filesize6KB
MD5e38a22c2bc6823ee689e768ff24aa6f5
SHA14b1e9f5612b6a6f62f1585be01c869f2371b362d
SHA256e2d73e2cee08f518e0ba6e8f4b3f328152e306c31c799819e50dad5f9aa51726
SHA5125d1724efcfbcf09c6ce79818d96414173bbf61a9b56c0fade2c09b6831d519db66d6a740a53940ef4198ae781c096771776df635df46282faef32a43ca866dd9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\AlternateServices.bin
Filesize18KB
MD51867da40f9737e3e25ac05cd8cf01ff4
SHA1572bef4aed17384737fdff44880f82af96a0787f
SHA256f50fd3161d74204d3ad01a79eb0b440a68b45d487830cd7fbece713de60ada36
SHA5126f295c8f41bf4b0bb0be8862afce26b26ff387b9729edad8d53d0409114f820b5bea3ea1581d2cf9943254d7a7b1bba67dfb5c075d8d878a5320a4f270f17bad
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\AlternateServices.bin
Filesize10KB
MD5f19230f457825aafffef9f944c09b64b
SHA13e36b3526e725021be4b55a184da964f13b7d28b
SHA256336b10f3f7c83909e85dbeb384215b6b07b6acbe4df422390d319b1191bbf6b2
SHA512ca1ccdbdd80f43b9cd765739f93c989046e5838be982ba1fc73bff4b2cb98d93cf53159e68f86aefa49bdcb7c0e109bad3d21a48255deb62028f2e60a761a6bc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.bin
Filesize22KB
MD593873b914b51659c5ab99f9954d71825
SHA18aef762c6e522abdaf7f3eedbb8ec7bab2332fec
SHA256a2de4298983e43f240bd1df4bd69451e07e3ed0e442829a1a2fb9374c603bd86
SHA512c78ec09fff95c10658460835c6bbdd98db7c36b26e6b90924d15cf4aa33d20f670423dea1dc1ee6348d7973040113f95326cbcdb1c260a19c4e1adfba985b4a1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.bin
Filesize15KB
MD5b9f1ab55d9c661925b3b6b86806378a9
SHA1e5b0bec133c31d84d2794744fd80351fce6cb8b0
SHA25677ce63d881a00f56e0df079bc8e4070d057bda9ce6d277acf7a2f0e748836c3e
SHA5126b344a26e2073b93a77f54836915a85422cc210cbc4b6e16a644ba1ccdea48ec460c6dfaf6aa105bc893577b7b13a7c43a4cf3bb22745342e5b0c18b299b3aba
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.bin
Filesize15KB
MD549977a6d54e166192132d181eacd2bd2
SHA1c7305e18c5bc916927d53ebc10489dd25e5e4e09
SHA256fb273e349d47f58e963656a3dca8fdf1de40bc2308a49b294fe259622951bfa8
SHA51254161c76aa6a4c74dec93448da8f8035cfc01d29884988703115b2f86f9496aa6c5a774eca29dcbcd1f389fd288342e8c95cdc20c4b69c44c4ec02e41906edaf
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.bin
Filesize5KB
MD5940b3ed0d3d8ed70ea751a90d0bcdc18
SHA141decbf16d2c14139eed9958ee6a3e3335531f03
SHA256a6a30f59f87a7cd2b0ad4117a333bf34f0ebd8c28e3dd01718aa07e734822fa0
SHA5129bc3fcd73fd2e3f1b381da34e4a5d48693026efa6e55f73e60a1a27f149a8ef674da4132f4b889a980d9c0af19096e1ff19c253561fc3c2dd7612015fbee19d7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD545dbcb3b7b9164bc32da96462c24fa36
SHA1aad7e0ee9c076732b236095825e427367ad4af95
SHA256e9a68562e0203843df2eed6a1c82cd614fc454f5a504d5b3253b6412ed942260
SHA51294db811b23eadf58d0f40d216518fd43beecfb2a4303eece612f726831ffc95ac68449a7b93c2a27e0e0e63dd2aa3d21395a0b8e9585ef29029a82a2d39d71b0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD51f4ff4a4eb9ed3dfa80be88075cf9545
SHA1858ae428ea5fa7d87a11794d3c2b9861a5227178
SHA256923e2719cdeba9a264e7edbbeafb63a0007fcbb86d62771ffdf8010c8ca8570e
SHA5122c6d6e34352695534c0853f6acd8c4ded584535685aff8295dd0fe77484ee865d55ad3a814bc43de9f7e610e57743ab4f0ce7ae737b088dbd598f8a222c0dc91
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5cd1b3bb40f4b96f1fd250f43c804fd34
SHA1e6b2bdec5625c5019a633710f176a25d020b71aa
SHA2561196bec12c88373af28141425aa2633f17285fbdcc461b64f22e382330dd4f34
SHA5124c66a946259fd5a8b121866517fabe234c78f8dddd39de137a12eb001f41de737437e8cfcb398a654b75076a6489dd5914c24aa300fd4ff33d03cf4cc679bedc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5852c984efb800d16764272c9dc9de048
SHA1e117baf1faac636a11f605230b338a09b39ecaa4
SHA256be66729f2b3a1ab03deb24325a7a7e506cae6bfc0095c22202c765b4bc2353bf
SHA512436ea979df1fe376075acaf85a84c159c29010f9240cffcd271e3d8f216ce447d4147fcc5452e5bf6a5f9a945b34d3f70b9aa900539bf36afb440f95af9d58eb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\3a549859-142f-47b3-abc9-5c0bf5cd521f
Filesize982B
MD54b37a050082daeb7af7db15f0c291ef5
SHA1399fdba3f2b48e31a15b9b467b7239231ae4d67f
SHA256119898f2776d557f6283ebbe3874c9d19ed419a6de3312f432eff4f53f239ae1
SHA5125e0d0ee4ddc8c54fd72ff90e88e3901bfcf3aebc4cb8658af074a10189d6bd30136421ed12b67a6dc06756d006797c52f39aaa5e4a81146dae99f00f92d73d75
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\949d1d06-17bd-4953-8f40-20f17c5d01b6
Filesize25KB
MD5a7ae1521cb6ddb68446cc1a172ca59a5
SHA1c6f1de59ad4f2fe7c3fb91f1026177c97d64633b
SHA256041e8536b38208a2f30bef8c8f10817074d4c5621261fcd717fb75dceb088951
SHA512f964ff1b08e15dae198f4e143813aa135163088df9c5b9b9971e98f36082af94d5a31437fadc3061a88441a11f7c787f908266c1e51e87b334d8be8b88ecc552
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\d8a6841e-0982-4195-89d6-e89f541f0b90
Filesize671B
MD586b013c67502034def81710b2845b650
SHA1a88287521ce723e80a8e373f2f0365839beac833
SHA2563dd30212bc23a5fb8dda6882280c31cf69a90e10811e79ad8c69091b414f623c
SHA512ab7febb7b0e0cb741141910d2703f8132f484d22dce1e3b559aefa24004bd114689886498c5f5a218b813c01db31879d72088250dfa2a0e947fc392d9121020f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD566d644335dd74ac64e76699917bd02c8
SHA1ffb7d8fdd1601db91a933d4829e86d0366e06921
SHA256c83b82a2e5f5c377f1304fa902598cebb01489a621abe1d4e96dd19fa2bd3ce6
SHA512e4888bb6af96008026f61a8cacdbf6e0632af1a9d0f1a42678a54c4e6f0e69673c9def4ef510002ab1ae7185e5c5609ddba07ceae2984b7df7d5db82a2964597
-
Filesize
15KB
MD5833539f0b19e70754261271a63269a46
SHA1a49410ac1e18462a0df557213a6cca71576476ee
SHA2563cfea8bcbf5f1ff2c4274db7152f9b745a7f830591bb0af304d109e8d63a8db1
SHA512c424a5467bdd733518d0216caaf8edec7b88549fb3948fe4f5e4b3bb762baeb8d07b0d1881e77f805518b5c85b78417d789813eefa0f6d193463204ca4a439b2
-
Filesize
10KB
MD5ec11e54c79e03648f68f8a70b61e6d92
SHA1ae58d1beb059e9e2500096e83d9d94a885bd15fd
SHA256f5f1dadb1a5417ae6a7151fe58c88b7b2a6cbcc11ca10d00d952749419ec940d
SHA512b08bdaae27c20c7b136636b6bfe161bfb8527f8f937039232800a0f20ba6d968ae7a2637bd486891a08ec83300e83f0e780538d85401e315a8c04694c495ea39
-
Filesize
10KB
MD524d17de96ca19551cf93ac067d723674
SHA1d7dc7bc050803cae5ddc533ba04758fcbc125a3c
SHA2568f9144192305c77d44cd2f06b01471b90a8c56c165b90770b89b279eb7d4e301
SHA51293288b1404bb596220791e972a3f28a6edff0da609382178a08f9d2b41cbd2562cc34a1b2d78728d3baecd4fed7f4d976a61200b1fa818d049766977aba725e6
-
Filesize
10KB
MD5db09b630f208b04df8454c7e0d047ec7
SHA1159958b2ea2a2c3e13381a33b25c6d409f6499d7
SHA256220a600edb35b62dcd15616b56209bacf2979f5ac7f95be7a8380db2a044d8ba
SHA512341df96a66ae446be90afb7101cae3fad4700a5a3cf09dfb6c31ab19d693c7e121e0f79153fe5f3b220644fe423dc989c91eba0743487e87cb0df751bec8f722