Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-11-2024 03:43
Static task
static1
Behavioral task
behavioral1
Sample
3249120efabffee3a89f01ee29088d9eaa90a8fc5cc8d09b244cf1214ba074df.exe
Resource
win7-20240903-en
General
-
Target
3249120efabffee3a89f01ee29088d9eaa90a8fc5cc8d09b244cf1214ba074df.exe
-
Size
1.8MB
-
MD5
69580a2704c6b5c8ad94e693c94d6da1
-
SHA1
fe68f828c0b57c72236dbc319fc2ca4e5250bf2d
-
SHA256
3249120efabffee3a89f01ee29088d9eaa90a8fc5cc8d09b244cf1214ba074df
-
SHA512
4f0d7b630e6423c7bad47d6a8bddf8b79e9b9b158c28c7aaae30047fe75f7cc1b299d4aa9c5994ec59d330b9522654d01ce194bb42516716593e75f7fe68cee9
-
SSDEEP
49152:FH70wHidmZFO0UaBF8CSbFx6+oGAr8577xXz:F47mT7UaBy7t9AIXxD
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Extracted
lumma
https://goalyfeastz.site/api
https://contemteny.site/api
https://dilemmadu.site/api
https://authorisev.site/api
https://necklacedmny.store/api
https://founpiuer.store/api
https://navygenerayk.store/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 724cd3af06.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 724cd3af06.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 724cd3af06.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 724cd3af06.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 724cd3af06.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 724cd3af06.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3249120efabffee3a89f01ee29088d9eaa90a8fc5cc8d09b244cf1214ba074df.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ be4aaecbe8.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 724cd3af06.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 222.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 55eabe7419.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 222.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 55eabe7419.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion be4aaecbe8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 222.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 55eabe7419.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 724cd3af06.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3249120efabffee3a89f01ee29088d9eaa90a8fc5cc8d09b244cf1214ba074df.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3249120efabffee3a89f01ee29088d9eaa90a8fc5cc8d09b244cf1214ba074df.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion be4aaecbe8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 724cd3af06.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 3249120efabffee3a89f01ee29088d9eaa90a8fc5cc8d09b244cf1214ba074df.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 9 IoCs
pid Process 844 skotes.exe 2324 skotes.exe 2732 222.exe 4052 55eabe7419.exe 848 be4aaecbe8.exe 1648 8476b7d834.exe 1980 724cd3af06.exe 5200 skotes.exe 5080 skotes.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 3249120efabffee3a89f01ee29088d9eaa90a8fc5cc8d09b244cf1214ba074df.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 222.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 55eabe7419.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine be4aaecbe8.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 724cd3af06.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 724cd3af06.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 724cd3af06.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\55eabe7419.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1003318001\\55eabe7419.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\be4aaecbe8.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1003319001\\be4aaecbe8.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\8476b7d834.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1003320001\\8476b7d834.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\724cd3af06.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1003321001\\724cd3af06.exe" skotes.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000023cb1-93.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 5080 3249120efabffee3a89f01ee29088d9eaa90a8fc5cc8d09b244cf1214ba074df.exe 844 skotes.exe 2324 skotes.exe 2732 222.exe 4052 55eabe7419.exe 848 be4aaecbe8.exe 1980 724cd3af06.exe 5200 skotes.exe 5080 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 3249120efabffee3a89f01ee29088d9eaa90a8fc5cc8d09b244cf1214ba074df.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 3776 2732 WerFault.exe 94 3268 2732 WerFault.exe 94 -
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3249120efabffee3a89f01ee29088d9eaa90a8fc5cc8d09b244cf1214ba074df.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 55eabe7419.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 222.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language be4aaecbe8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8476b7d834.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 724cd3af06.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 3492 taskkill.exe 1088 taskkill.exe 4364 taskkill.exe 3268 taskkill.exe 2744 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 5080 3249120efabffee3a89f01ee29088d9eaa90a8fc5cc8d09b244cf1214ba074df.exe 5080 3249120efabffee3a89f01ee29088d9eaa90a8fc5cc8d09b244cf1214ba074df.exe 844 skotes.exe 844 skotes.exe 2324 skotes.exe 2324 skotes.exe 2732 222.exe 2732 222.exe 4052 55eabe7419.exe 4052 55eabe7419.exe 848 be4aaecbe8.exe 848 be4aaecbe8.exe 1648 8476b7d834.exe 1648 8476b7d834.exe 1648 8476b7d834.exe 1648 8476b7d834.exe 1980 724cd3af06.exe 1980 724cd3af06.exe 1980 724cd3af06.exe 1980 724cd3af06.exe 1980 724cd3af06.exe 5200 skotes.exe 5200 skotes.exe 5080 skotes.exe 5080 skotes.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 3492 taskkill.exe Token: SeDebugPrivilege 1088 taskkill.exe Token: SeDebugPrivilege 4364 taskkill.exe Token: SeDebugPrivilege 3268 taskkill.exe Token: SeDebugPrivilege 2744 taskkill.exe Token: SeDebugPrivilege 1308 firefox.exe Token: SeDebugPrivilege 1308 firefox.exe Token: SeDebugPrivilege 1980 724cd3af06.exe Token: SeDebugPrivilege 1308 firefox.exe Token: SeDebugPrivilege 1308 firefox.exe Token: SeDebugPrivilege 1308 firefox.exe -
Suspicious use of FindShellTrayWindow 31 IoCs
pid Process 1648 8476b7d834.exe 1648 8476b7d834.exe 1648 8476b7d834.exe 1648 8476b7d834.exe 1648 8476b7d834.exe 1648 8476b7d834.exe 1648 8476b7d834.exe 1308 firefox.exe 1308 firefox.exe 1308 firefox.exe 1308 firefox.exe 1308 firefox.exe 1308 firefox.exe 1308 firefox.exe 1308 firefox.exe 1308 firefox.exe 1308 firefox.exe 1308 firefox.exe 1308 firefox.exe 1308 firefox.exe 1308 firefox.exe 1308 firefox.exe 1308 firefox.exe 1308 firefox.exe 1308 firefox.exe 1308 firefox.exe 1308 firefox.exe 1308 firefox.exe 1648 8476b7d834.exe 1648 8476b7d834.exe 1648 8476b7d834.exe -
Suspicious use of SendNotifyMessage 30 IoCs
pid Process 1648 8476b7d834.exe 1648 8476b7d834.exe 1648 8476b7d834.exe 1648 8476b7d834.exe 1648 8476b7d834.exe 1648 8476b7d834.exe 1648 8476b7d834.exe 1308 firefox.exe 1308 firefox.exe 1308 firefox.exe 1308 firefox.exe 1308 firefox.exe 1308 firefox.exe 1308 firefox.exe 1308 firefox.exe 1308 firefox.exe 1308 firefox.exe 1308 firefox.exe 1308 firefox.exe 1308 firefox.exe 1308 firefox.exe 1308 firefox.exe 1308 firefox.exe 1308 firefox.exe 1308 firefox.exe 1308 firefox.exe 1308 firefox.exe 1648 8476b7d834.exe 1648 8476b7d834.exe 1648 8476b7d834.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1308 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5080 wrote to memory of 844 5080 3249120efabffee3a89f01ee29088d9eaa90a8fc5cc8d09b244cf1214ba074df.exe 87 PID 5080 wrote to memory of 844 5080 3249120efabffee3a89f01ee29088d9eaa90a8fc5cc8d09b244cf1214ba074df.exe 87 PID 5080 wrote to memory of 844 5080 3249120efabffee3a89f01ee29088d9eaa90a8fc5cc8d09b244cf1214ba074df.exe 87 PID 844 wrote to memory of 2732 844 skotes.exe 94 PID 844 wrote to memory of 2732 844 skotes.exe 94 PID 844 wrote to memory of 2732 844 skotes.exe 94 PID 844 wrote to memory of 4052 844 skotes.exe 102 PID 844 wrote to memory of 4052 844 skotes.exe 102 PID 844 wrote to memory of 4052 844 skotes.exe 102 PID 844 wrote to memory of 848 844 skotes.exe 103 PID 844 wrote to memory of 848 844 skotes.exe 103 PID 844 wrote to memory of 848 844 skotes.exe 103 PID 844 wrote to memory of 1648 844 skotes.exe 104 PID 844 wrote to memory of 1648 844 skotes.exe 104 PID 844 wrote to memory of 1648 844 skotes.exe 104 PID 1648 wrote to memory of 3492 1648 8476b7d834.exe 105 PID 1648 wrote to memory of 3492 1648 8476b7d834.exe 105 PID 1648 wrote to memory of 3492 1648 8476b7d834.exe 105 PID 1648 wrote to memory of 1088 1648 8476b7d834.exe 107 PID 1648 wrote to memory of 1088 1648 8476b7d834.exe 107 PID 1648 wrote to memory of 1088 1648 8476b7d834.exe 107 PID 1648 wrote to memory of 4364 1648 8476b7d834.exe 109 PID 1648 wrote to memory of 4364 1648 8476b7d834.exe 109 PID 1648 wrote to memory of 4364 1648 8476b7d834.exe 109 PID 1648 wrote to memory of 3268 1648 8476b7d834.exe 111 PID 1648 wrote to memory of 3268 1648 8476b7d834.exe 111 PID 1648 wrote to memory of 3268 1648 8476b7d834.exe 111 PID 1648 wrote to memory of 2744 1648 8476b7d834.exe 113 PID 1648 wrote to memory of 2744 1648 8476b7d834.exe 113 PID 1648 wrote to memory of 2744 1648 8476b7d834.exe 113 PID 1648 wrote to memory of 400 1648 8476b7d834.exe 115 PID 1648 wrote to memory of 400 1648 8476b7d834.exe 115 PID 400 wrote to memory of 1308 400 firefox.exe 116 PID 400 wrote to memory of 1308 400 firefox.exe 116 PID 400 wrote to memory of 1308 400 firefox.exe 116 PID 400 wrote to memory of 1308 400 firefox.exe 116 PID 400 wrote to memory of 1308 400 firefox.exe 116 PID 400 wrote to memory of 1308 400 firefox.exe 116 PID 400 wrote to memory of 1308 400 firefox.exe 116 PID 400 wrote to memory of 1308 400 firefox.exe 116 PID 400 wrote to memory of 1308 400 firefox.exe 116 PID 400 wrote to memory of 1308 400 firefox.exe 116 PID 400 wrote to memory of 1308 400 firefox.exe 116 PID 1308 wrote to memory of 432 1308 firefox.exe 117 PID 1308 wrote to memory of 432 1308 firefox.exe 117 PID 1308 wrote to memory of 432 1308 firefox.exe 117 PID 1308 wrote to memory of 432 1308 firefox.exe 117 PID 1308 wrote to memory of 432 1308 firefox.exe 117 PID 1308 wrote to memory of 432 1308 firefox.exe 117 PID 1308 wrote to memory of 432 1308 firefox.exe 117 PID 1308 wrote to memory of 432 1308 firefox.exe 117 PID 1308 wrote to memory of 432 1308 firefox.exe 117 PID 1308 wrote to memory of 432 1308 firefox.exe 117 PID 1308 wrote to memory of 432 1308 firefox.exe 117 PID 1308 wrote to memory of 432 1308 firefox.exe 117 PID 1308 wrote to memory of 432 1308 firefox.exe 117 PID 1308 wrote to memory of 432 1308 firefox.exe 117 PID 1308 wrote to memory of 432 1308 firefox.exe 117 PID 1308 wrote to memory of 432 1308 firefox.exe 117 PID 1308 wrote to memory of 432 1308 firefox.exe 117 PID 1308 wrote to memory of 432 1308 firefox.exe 117 PID 1308 wrote to memory of 432 1308 firefox.exe 117 PID 1308 wrote to memory of 432 1308 firefox.exe 117 PID 1308 wrote to memory of 432 1308 firefox.exe 117 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\3249120efabffee3a89f01ee29088d9eaa90a8fc5cc8d09b244cf1214ba074df.exe"C:\Users\Admin\AppData\Local\Temp\3249120efabffee3a89f01ee29088d9eaa90a8fc5cc8d09b244cf1214ba074df.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Users\Admin\AppData\Local\Temp\1003309001\222.exe"C:\Users\Admin\AppData\Local\Temp\1003309001\222.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2732 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2732 -s 14964⤵
- Program crash
PID:3776
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2732 -s 15164⤵
- Program crash
PID:3268
-
-
-
C:\Users\Admin\AppData\Local\Temp\1003318001\55eabe7419.exe"C:\Users\Admin\AppData\Local\Temp\1003318001\55eabe7419.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4052
-
-
C:\Users\Admin\AppData\Local\Temp\1003319001\be4aaecbe8.exe"C:\Users\Admin\AppData\Local\Temp\1003319001\be4aaecbe8.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:848
-
-
C:\Users\Admin\AppData\Local\Temp\1003320001\8476b7d834.exe"C:\Users\Admin\AppData\Local\Temp\1003320001\8476b7d834.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3492
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1088
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4364
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3268
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2744
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1996 -parentBuildID 20240401114208 -prefsHandle 1924 -prefMapHandle 1916 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {aa22d2bf-828b-4131-90bb-a2e1b2377f6d} 1308 "\\.\pipe\gecko-crash-server-pipe.1308" gpu6⤵PID:432
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2432 -parentBuildID 20240401114208 -prefsHandle 2424 -prefMapHandle 2420 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8d9e15c0-42f0-4065-af60-622a3fee4872} 1308 "\\.\pipe\gecko-crash-server-pipe.1308" socket6⤵PID:2664
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2852 -childID 1 -isForBrowser -prefsHandle 3088 -prefMapHandle 3000 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c0c16119-810c-4ee0-a74e-efbc4993122e} 1308 "\\.\pipe\gecko-crash-server-pipe.1308" tab6⤵PID:3016
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3436 -childID 2 -isForBrowser -prefsHandle 3808 -prefMapHandle 3432 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7ab0a641-f6da-4280-bdd4-4be2095a1220} 1308 "\\.\pipe\gecko-crash-server-pipe.1308" tab6⤵PID:2412
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4804 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4796 -prefMapHandle 4792 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c6b5b996-1afe-4fda-8307-25c1bacf50a4} 1308 "\\.\pipe\gecko-crash-server-pipe.1308" utility6⤵
- Checks processor information in registry
PID:5372
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5148 -childID 3 -isForBrowser -prefsHandle 5176 -prefMapHandle 5172 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0eee45ee-4a72-4eeb-8a56-f10895d0849e} 1308 "\\.\pipe\gecko-crash-server-pipe.1308" tab6⤵PID:5796
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5368 -childID 4 -isForBrowser -prefsHandle 5376 -prefMapHandle 5380 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f8db0477-f3bb-47e4-9b64-defeaf6af791} 1308 "\\.\pipe\gecko-crash-server-pipe.1308" tab6⤵PID:5816
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5576 -childID 5 -isForBrowser -prefsHandle 5212 -prefMapHandle 5164 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fe7abe2e-d35b-41f2-8265-a39d85ccb9d0} 1308 "\\.\pipe\gecko-crash-server-pipe.1308" tab6⤵PID:5828
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1003321001\724cd3af06.exe"C:\Users\Admin\AppData\Local\Temp\1003321001\724cd3af06.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1980
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2324
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2732 -ip 27321⤵PID:1548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2732 -ip 27321⤵PID:4392
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5200
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5080
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\activity-stream.discovery_stream.json
Filesize24KB
MD5825de345e174887b6f4eed1affcc95df
SHA1e38c5f96a4b3beb700bc037d139185682e16f9ab
SHA2560fdfb9c1537fc083615e605596f06b3fc9a9484c803b8423228c8655aabbbf0d
SHA512b3b73f5659b5103b2af1548e822be862d5840ead6df3f79b0c0cdd6e8f797e9de7ce411c2a7cfbe482ecb54b852657b4df99f2467b1550be78a9de44b6d29991
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\cache2\entries\D500AD994A7515157BB2A6ADD5B18B754E4D2F99
Filesize13KB
MD538223edbf3a3879440abef5b939f16eb
SHA129d252581f8a0c71a95b3065f5fa77d17a07bdfa
SHA256b8dca01c07852d4613bb419f13bc9547a8bfdf26258aee90d76ed65fbcdb974e
SHA5129200943c846335c3f0caa3ee596420d346308182aba32cdfbdd3dfe6333403b88d6c1fd5d431697ecd76cd446f7b8813ce01b5f23f4eb1a947cd9ea98c313728
-
Filesize
2.9MB
MD5e470e1efdf057bf0cb67f5f8e7d146f5
SHA19c1db682706e84bc5c62eb94ba286d040d21bd16
SHA256cb15ac6b923950cc436643ca20417973952a9bee1c80d1c0f1bd9c564bd55b0a
SHA51249eaafe4840d8244aab845e762e1027cb32130c7b3f8891c259512429ba1fff69fe27a94fc604f9d4bf01d17e05ab6bad91cfe46476c175034d7b4d40b968220
-
Filesize
2.8MB
MD574ce0c33923116eb0668ba3302893ef9
SHA1f69c905e2976b0c107649392072976e9e3a0e445
SHA2564f14a84b40dba7b3b4cfdf6eeb1ff46933c092b69f47e9dbca4ce20110c8a722
SHA5126fbd66fecccc6d92530e6a65211c9dbab597780fc80afaa57f5b37fe0b3cbad7a12c590df2127360b2a4f624f83e6b193d4e628ff45718fe3177fc02a1193b0e
-
Filesize
2.0MB
MD586f793173f02f6c3e82962700f9d0393
SHA16f31095841204037ef18db8dc314037cd41eea6e
SHA256b81182e20f0c54c1b903045a3d0bf63f58942ea66e70c4a9516c8338ecdae03c
SHA51294cc0b09d70ddec5bf74eee5ba89a06a90610c7c949a76a08e3464a9082db180365b094e81de3705157584f138b803b0eb61102cd5cf435186d16eab5cce84b2
-
Filesize
898KB
MD5bbc53ae97792e01a59f15c720e3c795d
SHA1527f1a54af96340f7ba550490baf0bcb8a3c9ef7
SHA256dbac565acacfb21ca3e175bc8598cc184c336b8e2d735d896723429d0818b0cc
SHA5122b2994b35ababc1d626f587d6bd552d7c288b674de673703de2f28163bd6b3c475393e5c85d4f30d92bfc0d3c1962d20b918caba92f36e26aa839dffc16f5d13
-
Filesize
2.7MB
MD5a86da568d2a3e57aed2e9c11e34ef68f
SHA196e12208fe17db6ebf7d84b90f398a3b04c25f1b
SHA256d50ab9f44bb9bfc47d146824756ecac5cd2fd71891a8f62829b9ad47246be7d8
SHA5124dcfe5c171f8f242a7e34793a00268bdf58829bd20c1afe573f05dd8cb1c5f486c54d0fa7790288b0dd54d45ca6cd033968458dea198c6d06444efdbbe5dd9d0
-
Filesize
1.8MB
MD569580a2704c6b5c8ad94e693c94d6da1
SHA1fe68f828c0b57c72236dbc319fc2ca4e5250bf2d
SHA2563249120efabffee3a89f01ee29088d9eaa90a8fc5cc8d09b244cf1214ba074df
SHA5124f0d7b630e6423c7bad47d6a8bddf8b79e9b9b158c28c7aaae30047fe75f7cc1b299d4aa9c5994ec59d330b9522654d01ce194bb42516716593e75f7fe68cee9
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin
Filesize13KB
MD58cac68fc9eb2379f98464649ed14be41
SHA1d877845d73378d4408955aabc9cc870b55ea3ce2
SHA256fceef66103f00fed4593fe0272bfc49e8bcd607db06f59de6c9338fc1dc39014
SHA51209de3cdbd9cc3e999a70ab1dad9ffe65c4ccb9f342138f5533b723d6d85ee53f4c39816bf7fac7a19407d819ba9e51273c083200151b91868e0b5a067023f459
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin
Filesize13KB
MD50079ae91544da42fe2e50251e02d36ec
SHA1b11b5c4cc1d9f62e3a9b8df90d0fca25b5937ac6
SHA25628c1f115669ed6362f0df74c655c0245a12cd223f7c34e03a64b953a4d5e8b38
SHA512a76be0785fc434b971a26f97bc82b778343e65cdb7dd8910c4384ec4de86cab69336fd8eea488c8367f8fdbc91a5fc10d970587b1ef549e71f2ef6a6ff3d4bcc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin
Filesize18KB
MD5368eb17828299bcbc9f1d3fe903790d2
SHA11ecff31774b0e67aa1a6f9a7354be175acaefbe7
SHA256728ea6408c3ebbfe946b963232450a65d315079b4d08206cc90a856836b6ed34
SHA5122bf970b93dc7f7816b890fb83a978f089eed35d27ef5f6f7d38df1b92620f2624c482496ac12f2637a2b7cca7e9999fb9e182712c0b9b8b4aae610e9f12fbdf1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize21KB
MD5764ba50ec8e3babe230ecd00f42976f3
SHA152e3cc3f25540dcdbff4807da942bdc4d41ada1e
SHA25623e2687ef390cb237e2109f98bb86db55b167ad2de439097757a033dab48ef1a
SHA51292af515f8106992a629b3080fb9ed2dbac313100bcee18cf4ec244d7a6cbce58dc9bb9ea91807d75aa87b5bc179a753955afb2de99cb4bf19f1d6e00eb4c34c2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD5820a6650b34b73aa5cefb8b8edf4975c
SHA12ade1e55f32fefdf8855b62f6455a89788c2befb
SHA2568ac6a24ab4f5fdcc52d1daf85c0b7d811c7b8814d5694a8f0e8555d139c6e7b5
SHA5126ecbd4f44f2958c83525e80a23e3a928a28ae457c5ef95b05c708881f46746c0492c2ced25e8850a2529d0d4864135702748349c1ee9d23bb61b0a7275ede587
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD5acdda762689e6c6f024a3372a084badc
SHA1140c378174fdb6f36b202474105dba97957036ea
SHA2560f558cccdd7d1b57858122faba5eaf37d5d3ce2d4c5c1d253228a57fe0b88a9e
SHA512b1f7eccd95bbea47091972b0f2fa5c899c2116f60d88ea3413e55678902a169c1ac7efdc5666ffe212d97213a9eee803e69cfed0963f51d9f0eb56fd484d8225
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD58cd902e1d6fbb1191b48d0081f5ea30f
SHA1ad20dbebf9534af596ec5d01d15de825410f4214
SHA2567362616dd27701c55f5046c38b0169532c500ffac929189e702ca4e73ebb0499
SHA512106be7bbd9097954198cd9f725d0ca30c8faa4e1ff6c0a72d14ea229cacc023b1a1b562887107708eb243514f9a7ab6763f82aadce62814ca04708418f14231d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\c1674e74-1a2a-4392-9415-2274d9533c9c
Filesize982B
MD5281ee4a6b91e6c04527da2ca89f0bf8e
SHA1e13d47ef451040fabf556f96ec2d276f730f91b8
SHA256ccf851bf2239b0fa3b3502c11e10b6395b75cd992ee2f1b0784701ca88947f81
SHA51271d25e2bab34720aded65de9a2abb83212a86b3fa91b61f303965d1138f2fe9507b7623bd37f5d3bdafc619789e6f33ff7ef4d6d396564d5e28806a1ff1f4c7c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\c78d675c-b4f3-4cbe-84d5-f16677d84daa
Filesize659B
MD576eb4b2503d5bde817eeb4ea756085b4
SHA1f5386b4fa782f05cb3c1da2bbb44974e03f3e5b4
SHA2566c0b22daeb0ae9990352fb802b938f976ec186950e8bcd225858ff34b26cd6ff
SHA512bfe55d2a8037ab760d29ec76e411b6d5f154ab3f219a86ef8083a012a988bc0d52c5e99da84eb19830c9a6276ad5beb82ee59542f7ee563554aedc83ee7c2b79
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD5b83ef82c52b573fc501697e25873d53c
SHA10107473c1a35c3b11ff1db754c41ffe29b676fb2
SHA256020b9f75326cde4d4afc502dc400ba05b33d015f4da4564af6d426a20edf476a
SHA5126f4440cbb442edf6cf69db2b5bd1dca777a8dc3f0ff15a105836c062c1bbecaba17f7b33cca84387d9202955267d11bd4b6d3797eeba70f6b26d0eb0bac77480
-
Filesize
15KB
MD5e793ac73cabcd6335dc6abb0676abf3e
SHA1ba4cd5b71f3430c7077e2467ec082a2be0e50b46
SHA256d98d52f50488ce9042889349654d6da6083acf517568e8f8e8b75b73d5805786
SHA512f456459d622734ebc6043909856100f1d33138669f71d894c3517511c54d4c9c35f086ef54cf8a1c3d915c2ed5ee561ed3196df24258d767f512236bfceb7fcc
-
Filesize
11KB
MD50fc64f272101253f65161ab4193d0450
SHA1dbe66a1c69f9bb7dd35f9deb5d193cb8a48a05b9
SHA2569e531e20f551152e5baf6eaa60526b456240e3d277c5b8cbb325ac6745d3896a
SHA512ed69dc44f187a09322e8c967e20527589d055f968b7263b0257c02f157700353c2672f7240a7073bb90d9fe70cded078f14efd6c68dc20d7fe9547f4b29e158e
-
Filesize
10KB
MD554ac035fe8264cf7c3babee0d0b87546
SHA1b8238e4da016347ac74bb9c8ebfe237726c3ca3e
SHA2563a2e6be821ae0dec82feda62202f4cbd61105d528a173f06623c4131af6af282
SHA51215bd0b40aa5dac26a1cf62596021d042f1cd23e66ba297a350f0c32aa80e07de3cc2f026605b5e7425b0dbb7b5e788d95a3dd7b96430b2b9b628dac8bf1fd12c