Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-12-2024 02:12
Static task
static1
General
-
Target
3e8ae41e05e6ea1741384f390d6e781a270035469ff2cf08678f55e0dae67401.exe
-
Size
2.8MB
-
MD5
9dc0a5ebbf0646a38b1bb1b955db0fa0
-
SHA1
49d4045a7429e901ca1e549d07aa1e92947d6648
-
SHA256
3e8ae41e05e6ea1741384f390d6e781a270035469ff2cf08678f55e0dae67401
-
SHA512
c4aac730ece0c6e55187590727242afad77765c777ea36447ba54cd47c92b49e2c54311f4115f21caff963a3f3a705958e94d96df3a79f3ebf2059f2b80a64a2
-
SSDEEP
49152:47+vMFnbzAfQORD1U3Ny3Gpdjn1/oWq33pN+OTDZcKkcmO6:4KubcfQORD1U303GpdbZoWq35N+sZXk+
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://sordid-snaked.cyou/api
https://awake-weaves.cyou/api
https://wrathful-jammy.cyou/api
https://debonairnukk.xyz/api
https://diffuculttan.xyz/api
https://effecterectz.xyz/api
https://deafeninggeh.biz/api
https://immureprech.biz/api
https://tacitglibbr.biz/api
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://tacitglibbr.biz/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection TJSH9R4C0B72GPZ1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" TJSH9R4C0B72GPZ1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" TJSH9R4C0B72GPZ1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" TJSH9R4C0B72GPZ1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" bde3c1626d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" bde3c1626d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" TJSH9R4C0B72GPZ1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" TJSH9R4C0B72GPZ1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" bde3c1626d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" bde3c1626d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" bde3c1626d.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3e8ae41e05e6ea1741384f390d6e781a270035469ff2cf08678f55e0dae67401.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b52a9d7c0e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TJSH9R4C0B72GPZ1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d4d61d63b4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 56DI58P9Z84WCQD6G7G85Z6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ bde3c1626d.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TJSH9R4C0B72GPZ1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3e8ae41e05e6ea1741384f390d6e781a270035469ff2cf08678f55e0dae67401.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b52a9d7c0e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TJSH9R4C0B72GPZ1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion bde3c1626d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 56DI58P9Z84WCQD6G7G85Z6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3e8ae41e05e6ea1741384f390d6e781a270035469ff2cf08678f55e0dae67401.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d4d61d63b4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d4d61d63b4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b52a9d7c0e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 56DI58P9Z84WCQD6G7G85Z6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion bde3c1626d.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 3e8ae41e05e6ea1741384f390d6e781a270035469ff2cf08678f55e0dae67401.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 9 IoCs
pid Process 4652 skotes.exe 3220 d4d61d63b4.exe 1756 b52a9d7c0e.exe 5096 96f1b70d25.exe 2500 TJSH9R4C0B72GPZ1.exe 2280 56DI58P9Z84WCQD6G7G85Z6.exe 5756 bde3c1626d.exe 6096 skotes.exe 2808 skotes.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine b52a9d7c0e.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine TJSH9R4C0B72GPZ1.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine bde3c1626d.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 3e8ae41e05e6ea1741384f390d6e781a270035469ff2cf08678f55e0dae67401.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine d4d61d63b4.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 56DI58P9Z84WCQD6G7G85Z6.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features TJSH9R4C0B72GPZ1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" TJSH9R4C0B72GPZ1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" bde3c1626d.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bde3c1626d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1015883001\\bde3c1626d.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\d4d61d63b4.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1015880001\\d4d61d63b4.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b52a9d7c0e.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1015881001\\b52a9d7c0e.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\96f1b70d25.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1015882001\\96f1b70d25.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000a000000023b87-64.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 1408 3e8ae41e05e6ea1741384f390d6e781a270035469ff2cf08678f55e0dae67401.exe 4652 skotes.exe 3220 d4d61d63b4.exe 1756 b52a9d7c0e.exe 2500 TJSH9R4C0B72GPZ1.exe 2280 56DI58P9Z84WCQD6G7G85Z6.exe 5756 bde3c1626d.exe 6096 skotes.exe 2808 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 3e8ae41e05e6ea1741384f390d6e781a270035469ff2cf08678f55e0dae67401.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 56DI58P9Z84WCQD6G7G85Z6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 96f1b70d25.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b52a9d7c0e.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 96f1b70d25.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TJSH9R4C0B72GPZ1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d4d61d63b4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96f1b70d25.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bde3c1626d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3e8ae41e05e6ea1741384f390d6e781a270035469ff2cf08678f55e0dae67401.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 4088 taskkill.exe 1816 taskkill.exe 4000 taskkill.exe 4584 taskkill.exe 4572 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 1408 3e8ae41e05e6ea1741384f390d6e781a270035469ff2cf08678f55e0dae67401.exe 1408 3e8ae41e05e6ea1741384f390d6e781a270035469ff2cf08678f55e0dae67401.exe 4652 skotes.exe 4652 skotes.exe 3220 d4d61d63b4.exe 3220 d4d61d63b4.exe 3220 d4d61d63b4.exe 3220 d4d61d63b4.exe 3220 d4d61d63b4.exe 3220 d4d61d63b4.exe 1756 b52a9d7c0e.exe 1756 b52a9d7c0e.exe 2500 TJSH9R4C0B72GPZ1.exe 2500 TJSH9R4C0B72GPZ1.exe 5096 96f1b70d25.exe 5096 96f1b70d25.exe 2280 56DI58P9Z84WCQD6G7G85Z6.exe 2280 56DI58P9Z84WCQD6G7G85Z6.exe 2500 TJSH9R4C0B72GPZ1.exe 2500 TJSH9R4C0B72GPZ1.exe 5756 bde3c1626d.exe 5756 bde3c1626d.exe 5096 96f1b70d25.exe 5096 96f1b70d25.exe 5756 bde3c1626d.exe 5756 bde3c1626d.exe 5756 bde3c1626d.exe 6096 skotes.exe 6096 skotes.exe 2808 skotes.exe 2808 skotes.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 4088 taskkill.exe Token: SeDebugPrivilege 1816 taskkill.exe Token: SeDebugPrivilege 4000 taskkill.exe Token: SeDebugPrivilege 4584 taskkill.exe Token: SeDebugPrivilege 4572 taskkill.exe Token: SeDebugPrivilege 2500 TJSH9R4C0B72GPZ1.exe Token: SeDebugPrivilege 1896 firefox.exe Token: SeDebugPrivilege 1896 firefox.exe Token: SeDebugPrivilege 5756 bde3c1626d.exe Token: SeDebugPrivilege 1896 firefox.exe Token: SeDebugPrivilege 1896 firefox.exe Token: SeDebugPrivilege 1896 firefox.exe -
Suspicious use of FindShellTrayWindow 32 IoCs
pid Process 1408 3e8ae41e05e6ea1741384f390d6e781a270035469ff2cf08678f55e0dae67401.exe 5096 96f1b70d25.exe 5096 96f1b70d25.exe 5096 96f1b70d25.exe 5096 96f1b70d25.exe 5096 96f1b70d25.exe 5096 96f1b70d25.exe 1896 firefox.exe 1896 firefox.exe 1896 firefox.exe 1896 firefox.exe 1896 firefox.exe 1896 firefox.exe 1896 firefox.exe 1896 firefox.exe 1896 firefox.exe 1896 firefox.exe 1896 firefox.exe 1896 firefox.exe 1896 firefox.exe 1896 firefox.exe 1896 firefox.exe 1896 firefox.exe 1896 firefox.exe 1896 firefox.exe 1896 firefox.exe 1896 firefox.exe 1896 firefox.exe 5096 96f1b70d25.exe 5096 96f1b70d25.exe 5096 96f1b70d25.exe 5096 96f1b70d25.exe -
Suspicious use of SendNotifyMessage 30 IoCs
pid Process 5096 96f1b70d25.exe 5096 96f1b70d25.exe 5096 96f1b70d25.exe 5096 96f1b70d25.exe 5096 96f1b70d25.exe 5096 96f1b70d25.exe 1896 firefox.exe 1896 firefox.exe 1896 firefox.exe 1896 firefox.exe 1896 firefox.exe 1896 firefox.exe 1896 firefox.exe 1896 firefox.exe 1896 firefox.exe 1896 firefox.exe 1896 firefox.exe 1896 firefox.exe 1896 firefox.exe 1896 firefox.exe 1896 firefox.exe 1896 firefox.exe 1896 firefox.exe 1896 firefox.exe 1896 firefox.exe 1896 firefox.exe 5096 96f1b70d25.exe 5096 96f1b70d25.exe 5096 96f1b70d25.exe 5096 96f1b70d25.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1896 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1408 wrote to memory of 4652 1408 3e8ae41e05e6ea1741384f390d6e781a270035469ff2cf08678f55e0dae67401.exe 83 PID 1408 wrote to memory of 4652 1408 3e8ae41e05e6ea1741384f390d6e781a270035469ff2cf08678f55e0dae67401.exe 83 PID 1408 wrote to memory of 4652 1408 3e8ae41e05e6ea1741384f390d6e781a270035469ff2cf08678f55e0dae67401.exe 83 PID 4652 wrote to memory of 3220 4652 skotes.exe 85 PID 4652 wrote to memory of 3220 4652 skotes.exe 85 PID 4652 wrote to memory of 3220 4652 skotes.exe 85 PID 4652 wrote to memory of 1756 4652 skotes.exe 89 PID 4652 wrote to memory of 1756 4652 skotes.exe 89 PID 4652 wrote to memory of 1756 4652 skotes.exe 89 PID 4652 wrote to memory of 5096 4652 skotes.exe 90 PID 4652 wrote to memory of 5096 4652 skotes.exe 90 PID 4652 wrote to memory of 5096 4652 skotes.exe 90 PID 5096 wrote to memory of 4088 5096 96f1b70d25.exe 92 PID 5096 wrote to memory of 4088 5096 96f1b70d25.exe 92 PID 5096 wrote to memory of 4088 5096 96f1b70d25.exe 92 PID 3220 wrote to memory of 2500 3220 d4d61d63b4.exe 94 PID 3220 wrote to memory of 2500 3220 d4d61d63b4.exe 94 PID 3220 wrote to memory of 2500 3220 d4d61d63b4.exe 94 PID 3220 wrote to memory of 2280 3220 d4d61d63b4.exe 100 PID 3220 wrote to memory of 2280 3220 d4d61d63b4.exe 100 PID 3220 wrote to memory of 2280 3220 d4d61d63b4.exe 100 PID 5096 wrote to memory of 1816 5096 96f1b70d25.exe 101 PID 5096 wrote to memory of 1816 5096 96f1b70d25.exe 101 PID 5096 wrote to memory of 1816 5096 96f1b70d25.exe 101 PID 5096 wrote to memory of 4000 5096 96f1b70d25.exe 103 PID 5096 wrote to memory of 4000 5096 96f1b70d25.exe 103 PID 5096 wrote to memory of 4000 5096 96f1b70d25.exe 103 PID 5096 wrote to memory of 4584 5096 96f1b70d25.exe 105 PID 5096 wrote to memory of 4584 5096 96f1b70d25.exe 105 PID 5096 wrote to memory of 4584 5096 96f1b70d25.exe 105 PID 5096 wrote to memory of 4572 5096 96f1b70d25.exe 107 PID 5096 wrote to memory of 4572 5096 96f1b70d25.exe 107 PID 5096 wrote to memory of 4572 5096 96f1b70d25.exe 107 PID 5096 wrote to memory of 4700 5096 96f1b70d25.exe 109 PID 5096 wrote to memory of 4700 5096 96f1b70d25.exe 109 PID 4700 wrote to memory of 1896 4700 firefox.exe 110 PID 4700 wrote to memory of 1896 4700 firefox.exe 110 PID 4700 wrote to memory of 1896 4700 firefox.exe 110 PID 4700 wrote to memory of 1896 4700 firefox.exe 110 PID 4700 wrote to memory of 1896 4700 firefox.exe 110 PID 4700 wrote to memory of 1896 4700 firefox.exe 110 PID 4700 wrote to memory of 1896 4700 firefox.exe 110 PID 4700 wrote to memory of 1896 4700 firefox.exe 110 PID 4700 wrote to memory of 1896 4700 firefox.exe 110 PID 4700 wrote to memory of 1896 4700 firefox.exe 110 PID 4700 wrote to memory of 1896 4700 firefox.exe 110 PID 1896 wrote to memory of 864 1896 firefox.exe 111 PID 1896 wrote to memory of 864 1896 firefox.exe 111 PID 1896 wrote to memory of 864 1896 firefox.exe 111 PID 1896 wrote to memory of 864 1896 firefox.exe 111 PID 1896 wrote to memory of 864 1896 firefox.exe 111 PID 1896 wrote to memory of 864 1896 firefox.exe 111 PID 1896 wrote to memory of 864 1896 firefox.exe 111 PID 1896 wrote to memory of 864 1896 firefox.exe 111 PID 1896 wrote to memory of 864 1896 firefox.exe 111 PID 1896 wrote to memory of 864 1896 firefox.exe 111 PID 1896 wrote to memory of 864 1896 firefox.exe 111 PID 1896 wrote to memory of 864 1896 firefox.exe 111 PID 1896 wrote to memory of 864 1896 firefox.exe 111 PID 1896 wrote to memory of 864 1896 firefox.exe 111 PID 1896 wrote to memory of 864 1896 firefox.exe 111 PID 1896 wrote to memory of 864 1896 firefox.exe 111 PID 1896 wrote to memory of 864 1896 firefox.exe 111 PID 1896 wrote to memory of 864 1896 firefox.exe 111 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e8ae41e05e6ea1741384f390d6e781a270035469ff2cf08678f55e0dae67401.exe"C:\Users\Admin\AppData\Local\Temp\3e8ae41e05e6ea1741384f390d6e781a270035469ff2cf08678f55e0dae67401.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Users\Admin\AppData\Local\Temp\1015880001\d4d61d63b4.exe"C:\Users\Admin\AppData\Local\Temp\1015880001\d4d61d63b4.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Users\Admin\AppData\Local\Temp\TJSH9R4C0B72GPZ1.exe"C:\Users\Admin\AppData\Local\Temp\TJSH9R4C0B72GPZ1.exe"4⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2500
-
-
C:\Users\Admin\AppData\Local\Temp\56DI58P9Z84WCQD6G7G85Z6.exe"C:\Users\Admin\AppData\Local\Temp\56DI58P9Z84WCQD6G7G85Z6.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2280
-
-
-
C:\Users\Admin\AppData\Local\Temp\1015881001\b52a9d7c0e.exe"C:\Users\Admin\AppData\Local\Temp\1015881001\b52a9d7c0e.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1756
-
-
C:\Users\Admin\AppData\Local\Temp\1015882001\96f1b70d25.exe"C:\Users\Admin\AppData\Local\Temp\1015882001\96f1b70d25.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4088
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1816
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4000
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4584
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4572
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2020 -parentBuildID 20240401114208 -prefsHandle 1936 -prefMapHandle 1928 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {4aff5edb-e395-4d34-b461-80f186f1f64b} 1896 "\\.\pipe\gecko-crash-server-pipe.1896" gpu6⤵PID:864
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2436 -parentBuildID 20240401114208 -prefsHandle 2424 -prefMapHandle 2420 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {676ffeb8-caa6-4ffa-895c-5af2ac9a7b63} 1896 "\\.\pipe\gecko-crash-server-pipe.1896" socket6⤵PID:3892
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2588 -childID 1 -isForBrowser -prefsHandle 2884 -prefMapHandle 1492 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1340 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b80d223b-0cc1-4c6c-b758-0c85602de1b7} 1896 "\\.\pipe\gecko-crash-server-pipe.1896" tab6⤵PID:4976
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4040 -childID 2 -isForBrowser -prefsHandle 4012 -prefMapHandle 4008 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1340 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {aacdfeb1-6103-4c41-8ee8-d6ef9ccf2b73} 1896 "\\.\pipe\gecko-crash-server-pipe.1896" tab6⤵PID:220
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4672 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4700 -prefMapHandle 4696 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e486d8db-bb51-4b79-8d1c-5c6af8dfa4a8} 1896 "\\.\pipe\gecko-crash-server-pipe.1896" utility6⤵
- Checks processor information in registry
PID:3596
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5212 -childID 3 -isForBrowser -prefsHandle 5184 -prefMapHandle 5208 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1340 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {db63a398-ccc1-449b-8ee1-b7dfbe02407f} 1896 "\\.\pipe\gecko-crash-server-pipe.1896" tab6⤵PID:5776
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4684 -childID 4 -isForBrowser -prefsHandle 5344 -prefMapHandle 5312 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1340 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d169df97-1050-424c-b9fc-03c2275a6887} 1896 "\\.\pipe\gecko-crash-server-pipe.1896" tab6⤵PID:5796
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5508 -childID 5 -isForBrowser -prefsHandle 5516 -prefMapHandle 5520 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1340 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {589d6b0b-78f7-4866-8148-9e180a1b4cea} 1896 "\\.\pipe\gecko-crash-server-pipe.1896" tab6⤵PID:5808
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1015883001\bde3c1626d.exe"C:\Users\Admin\AppData\Local\Temp\1015883001\bde3c1626d.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5756
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6096
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2808
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lhmx4teg.default-release\activity-stream.discovery_stream.json.tmp
Filesize28KB
MD5f06202d808eaabaaa264ffee8f849aaa
SHA12ca16a55161f710f0f525c674fc435c046173b8b
SHA25645a3d8b6e24798f5b37c2a435a7fc0268e33dd4c3ddea52c7b06a4ff23e66d0b
SHA512cb96831b6d679bc21174fd6f085c2994dbecbd473a344ccc4688f1a8fa639cdc14f4486f7e1911060fc7c7896defc389db64cd6f8747b08e8555e0382fbc1524
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lhmx4teg.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD54441556b6301b9af0cc334a9bcd38995
SHA1da3be07664c98ee722c151ccacaaab1ef5f5d55c
SHA2561a6be442c9afffd7efd696b77b827c778045183e5b4b7bf4f3f55c507a6a5461
SHA512760a103fbe8ff0b137ef93eb5642aab1008c03cd1f4216b90bdfe32ca6b0850e119e392fa7db5c2448be2703cbcd8cc791a09e8b3f8e086a00a98342ef1d6b4a
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lhmx4teg.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
1.8MB
MD5f9694cb15c258cf8125cf0c317c77479
SHA1ad7ab004164e247a32fb8eb4187103a1eaf73657
SHA25637aafa95a96bdc9144593c820466f3f063cd0e9fb3c6d2bcfab4c1bf0b61e51b
SHA51241504ae13f21e126508b91cdacc3d993790b7ce6001a0d58353860ad4eccb76858f553f4dd49d1960fae09a777160493932c0bb9acebd3bad3aae6e0dc2e2351
-
Filesize
1.7MB
MD5f660a7ff99befe7ae52d2636a0e8db46
SHA141b7e90dbf2ce54bd4e3048d0dc1b7e9d59d81ee
SHA256526d8ce745c14bac28de547ee616d66bec13517e558da772982b41cb9d6dda62
SHA5124f13dc0b5c8003b3dc7a5f3faa02c4e103da106722d53494a74e419756d1ce8c35b308641e7690bb932002b0d16411caedb60e63138d33cbfe78520ca8bd0240
-
Filesize
946KB
MD56bf59db9dafe72201466700ea8cb334d
SHA1e3649b55eb5141245e634374aa4a6385dba214e6
SHA256acdc360a0c9680c407d43df48f143af92d99d5c034a152e78b5da5220dbeb249
SHA512f44354e412d85b7025c486d2582976f684a57216267c37dbc2fea2b6ba5e9808a098f663258569a5a998d849e97b15a15d617f834e9b768e01391daf0ff261bd
-
Filesize
2.6MB
MD5e5cfad81f5397d7eeed2e7251b7e6e7a
SHA184184161e1b542773e5c74909ce37bb1f8f2238e
SHA25646cb31f14f15b4f13d203fe4138401adccf3163cf405fe907e7ee86bbd1c2387
SHA512fad966d925810d75be01d20b2b2bbf45755a30d385754878764fec0f1d45100490ba8c4ea279429f91c627cfa8f6b0e2abc70abdb8b645dddf1abd4cf021656a
-
Filesize
2.8MB
MD59dc0a5ebbf0646a38b1bb1b955db0fa0
SHA149d4045a7429e901ca1e549d07aa1e92947d6648
SHA2563e8ae41e05e6ea1741384f390d6e781a270035469ff2cf08678f55e0dae67401
SHA512c4aac730ece0c6e55187590727242afad77765c777ea36447ba54cd47c92b49e2c54311f4115f21caff963a3f3a705958e94d96df3a79f3ebf2059f2b80a64a2
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\AlternateServices.bin
Filesize6KB
MD57f155aa4c16d1a8d1e06efb1da1f8c4e
SHA141dea19b72136312a36ed730b2e8e9f36ea61a90
SHA2568adafe93fc0a0ad281456b5328413ef23152e4420d2f37b26f318069bdbe01df
SHA512865416cb3119709a20e6386ede179fa2c3343d24c9cee24a262d78425524e5a29838c74cabac9e45c0cdd7488cbbd117b16c9e03c53745839ca7a63e46eec639
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\AlternateServices.bin
Filesize10KB
MD5db60cf3889f718ac936bcd1a28c87615
SHA1178837508290909086ea60282546380dde376d7f
SHA256237165255156f808017858bee2ae296137578328b448d22c6aaaa3487c32d921
SHA5127adc5d721ea7fee9af8361e2ffd63054d1c6960b89cc28fab49fd1bc696ee76728a28fb184bd91cc53efefad09c99ccaf0ee0aea75b0351c99ffcad8bf28f052
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp
Filesize21KB
MD5f5796120f7b8e17ff1f0ad431e81a08e
SHA124e7d6fcbe2d959328c01d4b5684f65d962ededf
SHA25677d27f8a48c8075e0e7009e20d28783d1483221266e69b9f5bf96c36c81c950b
SHA51234dbfbaf6b0d8eebabfb794b203854de1efcd4b0bf5bf6d72b31dc6f5d78fe529473a4ca161b8f900d7470d171e5dceb5952eea7908f1ed28c004b07c078abd3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp
Filesize24KB
MD56d6f453bde1373c575b0e74ae9205846
SHA11931359bfce13d5c2fec45521e4177046212c1ab
SHA25636c7fcb5ec6a687ac4b4891cca4e3662cb476b10e5e4fd363ae37ca5183050de
SHA51203f5d4c64ad59e27623d4070ec130ce3af326c1dfdad236c35831305fcd18184ef0c8a57c2ee531d9fdeba391cb7ff0a321f941ab151b1f1f87038d7a4fa365c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp
Filesize24KB
MD5e06aca42957ccca07c0cb9f886b5bc6f
SHA120c29bca282617b5cd4418757db33ae231c10b83
SHA2563567467fc3dfc84e8a607dad3cd46df7767283a5e7b7b870b55efb7958f40c80
SHA5124907902859344741583a6af5039f9dda0404d06377b2aae875fe58b1f4a4c16a6849ffeccd4bb7295a496d7a565299cd2805cf000e0a97c49f9ba1cddd124fb1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp
Filesize21KB
MD58ac5ee146928bb26d4932ffb997c7620
SHA196c8dc52a083d2160d669c006f4832ee075240f6
SHA25623240c4f5a606caefafb57ceb1b72dbb091b28d16243f5a828c1e2dfce7b35a6
SHA512f95afa652b9fe1ded19e8b6885b5a7ed614e2cc7065054f87b3ea880cd3a7ad262446499e18b3ac8a6068f65033d79998601cab42857af3eccf531e87e55492f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\pending_pings\6db89eeb-1c75-4fb1-81ec-28b130cb6c9e
Filesize982B
MD5b12c12f4221292dba9ce1987788bb513
SHA18fd14ba1f6c289d16d3d48c6e423f97aa028f9d9
SHA256d3f56b1431af247e9f0e05c832bdec77d2f0f0c215a7537623ece2e76fe29c5d
SHA512577f954e2a108e57fa3722fafb23c376e0a8a9dd546dc5dfe3947706253bf2208655f75c4cb36fc70e2ec5418052a080b7d56e9fb1a5a6241575583b6f2e5bdd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\pending_pings\ba239f80-e484-41a6-8961-dac6ff437a71
Filesize659B
MD5666127b17875c361a3cd6350ffab52f1
SHA15521fb702141ebc81b156e61705550e1615dc8be
SHA256a9b8f6d69ad6dacc04d60e4914cbafca51848cc454fa9bac05c4ab5be5713302
SHA512847ca767fd7ce3e48192c589e8432461a0c97877397d2e9d871d535495934f50f6ea3a6ded7cc28a293e20fd93bbb1816a515c01b4f61cfd8ce5c5f4989b8aaf
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
15KB
MD54512c011402ccfd59710a92f5d7ae42f
SHA1cc1703f10f554eddcb8eaf7959ed9304b12c958d
SHA256df78ba7efa62ef9d7beb339109013782ec90b2d28e446794460640536fb911d6
SHA512ddb37269ad1ebbea70be48fa144e40fb49b4a9f799a1b0c774832deb5776836f471471d60875fe49174579b517d441a6e12b0b57f98b526fb3161fe15306b811
-
Filesize
12KB
MD59a8012aa0dc6287a8ebe5538e672ec29
SHA1174ac77dc8a87b80013952b3895d8c4a2ad41080
SHA2569cbfde29525ed1dc70c8e63753c54e426822ced360c7f9c07963dad7cfb54d75
SHA51240658dc12889a0f8495d39cff3bee2590e4a6364fc825874587da08cfc05ff0a389e60130d672ca09a0826e0b8745b22d33c5d3a9394f28a7bf129319db15b32
-
Filesize
10KB
MD54aa90c861961d804cce100af88f6f2e0
SHA1db868a9bcb5ed0b8c7537c5c5c22ff45cd92c940
SHA256d790edbc0577c59f4f05e46b63385e556941837514501789dac665597b7f7d33
SHA5129f2da19ca9e26224b890339041ba33434a2106130d8c45404d3ad5def9d61b3adf59d17c7d4c65b58cb04d3042f96c47a69ef8d2aeab962f8c75452812020810
-
Filesize
11KB
MD558d542c3fa4798129cad4877ffc690a5
SHA1eeb8cbec903da71ee2158a51379b6df90b39ad74
SHA25673e1641df61dd34837fb4c2a271a6f3073a06268b33036b7b3c681e63a9f5cf6
SHA512c8ff0f75abfd98b95f5440f67c2da171f60dc5e82678a5a2f3e4e47bbcfe56ad1ccf839645e832cd59aa6e76ac0783bca9840c589fb459518b8433ad6032beb4