Analysis
-
max time kernel
145s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 03:22
Static task
static1
Behavioral task
behavioral1
Sample
c7b59dea2273e4ebd8fe978be25b382793dcfd9fda75a70b8e47729019102645.exe
Resource
win7-20241023-en
General
-
Target
c7b59dea2273e4ebd8fe978be25b382793dcfd9fda75a70b8e47729019102645.exe
-
Size
1.8MB
-
MD5
946e0d79b6edda9e5ab8153aa408d19d
-
SHA1
a21e757593cbb76bf2577e005d49cc1ac4a3e2f9
-
SHA256
c7b59dea2273e4ebd8fe978be25b382793dcfd9fda75a70b8e47729019102645
-
SHA512
480286484c5365bd62040c1f5aec39707c82d6e84fc9c8e9f7d7fc6c55c9f0fbbb92b83bc2a3dc1731d32525488a4ce468bdf0b4c0dcf067caf8154f4760b293
-
SSDEEP
49152:eMgDvfXfXaSDycRZQmCBFWpWlzlioNECaKvgz:fgD/a+x5diwopaKvgz
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Processes:
3bf365eebe.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 3bf365eebe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 3bf365eebe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 3bf365eebe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 3bf365eebe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 3bf365eebe.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 3bf365eebe.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
Processes:
skotes.exeskotes.exec7b59dea2273e4ebd8fe978be25b382793dcfd9fda75a70b8e47729019102645.exeskotes.exe00ce09bf00.exe40ffe7e804.exe3bf365eebe.exeskotes.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c7b59dea2273e4ebd8fe978be25b382793dcfd9fda75a70b8e47729019102645.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 00ce09bf00.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 40ffe7e804.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3bf365eebe.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
skotes.exe00ce09bf00.exe3bf365eebe.exeskotes.exe40ffe7e804.exec7b59dea2273e4ebd8fe978be25b382793dcfd9fda75a70b8e47729019102645.exeskotes.exeskotes.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 00ce09bf00.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3bf365eebe.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 00ce09bf00.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 40ffe7e804.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 40ffe7e804.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3bf365eebe.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c7b59dea2273e4ebd8fe978be25b382793dcfd9fda75a70b8e47729019102645.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c7b59dea2273e4ebd8fe978be25b382793dcfd9fda75a70b8e47729019102645.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
c7b59dea2273e4ebd8fe978be25b382793dcfd9fda75a70b8e47729019102645.exeskotes.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation c7b59dea2273e4ebd8fe978be25b382793dcfd9fda75a70b8e47729019102645.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 8 IoCs
Processes:
skotes.exe00ce09bf00.exe40ffe7e804.exeb262ab70e9.exe3bf365eebe.exeskotes.exeskotes.exeskotes.exepid process 4008 skotes.exe 4056 00ce09bf00.exe 4580 40ffe7e804.exe 4276 b262ab70e9.exe 5460 3bf365eebe.exe 4028 skotes.exe 4524 skotes.exe 5512 skotes.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
skotes.exec7b59dea2273e4ebd8fe978be25b382793dcfd9fda75a70b8e47729019102645.exeskotes.exe00ce09bf00.exe40ffe7e804.exe3bf365eebe.exeskotes.exeskotes.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine c7b59dea2273e4ebd8fe978be25b382793dcfd9fda75a70b8e47729019102645.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 00ce09bf00.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 40ffe7e804.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 3bf365eebe.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe -
Processes:
3bf365eebe.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 3bf365eebe.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 3bf365eebe.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
skotes.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\00ce09bf00.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007564001\\00ce09bf00.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\40ffe7e804.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007565001\\40ffe7e804.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b262ab70e9.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007566001\\b262ab70e9.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\3bf365eebe.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007567001\\3bf365eebe.exe" skotes.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\1007566001\b262ab70e9.exe autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
Processes:
c7b59dea2273e4ebd8fe978be25b382793dcfd9fda75a70b8e47729019102645.exeskotes.exe00ce09bf00.exe40ffe7e804.exe3bf365eebe.exeskotes.exeskotes.exeskotes.exepid process 1648 c7b59dea2273e4ebd8fe978be25b382793dcfd9fda75a70b8e47729019102645.exe 4008 skotes.exe 4056 00ce09bf00.exe 4580 40ffe7e804.exe 5460 3bf365eebe.exe 4028 skotes.exe 4524 skotes.exe 5512 skotes.exe -
Drops file in Windows directory 1 IoCs
Processes:
c7b59dea2273e4ebd8fe978be25b382793dcfd9fda75a70b8e47729019102645.exedescription ioc process File created C:\Windows\Tasks\skotes.job c7b59dea2273e4ebd8fe978be25b382793dcfd9fda75a70b8e47729019102645.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
40ffe7e804.exeb262ab70e9.exetaskkill.exetaskkill.exe3bf365eebe.exec7b59dea2273e4ebd8fe978be25b382793dcfd9fda75a70b8e47729019102645.exeskotes.exe00ce09bf00.exetaskkill.exetaskkill.exetaskkill.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40ffe7e804.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b262ab70e9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3bf365eebe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7b59dea2273e4ebd8fe978be25b382793dcfd9fda75a70b8e47729019102645.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 00ce09bf00.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exefirefox.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe -
Kills process with taskkill 5 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 1628 taskkill.exe 1656 taskkill.exe 2252 taskkill.exe 752 taskkill.exe 1652 taskkill.exe -
Modifies registry class 1 IoCs
Processes:
firefox.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
Processes:
c7b59dea2273e4ebd8fe978be25b382793dcfd9fda75a70b8e47729019102645.exeskotes.exe00ce09bf00.exe40ffe7e804.exeb262ab70e9.exe3bf365eebe.exeskotes.exeskotes.exeskotes.exepid process 1648 c7b59dea2273e4ebd8fe978be25b382793dcfd9fda75a70b8e47729019102645.exe 1648 c7b59dea2273e4ebd8fe978be25b382793dcfd9fda75a70b8e47729019102645.exe 4008 skotes.exe 4008 skotes.exe 4056 00ce09bf00.exe 4056 00ce09bf00.exe 4580 40ffe7e804.exe 4580 40ffe7e804.exe 4276 b262ab70e9.exe 4276 b262ab70e9.exe 5460 3bf365eebe.exe 5460 3bf365eebe.exe 4276 b262ab70e9.exe 4276 b262ab70e9.exe 4028 skotes.exe 4028 skotes.exe 5460 3bf365eebe.exe 5460 3bf365eebe.exe 5460 3bf365eebe.exe 4524 skotes.exe 4524 skotes.exe 5512 skotes.exe 5512 skotes.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exefirefox.exe3bf365eebe.exedescription pid process Token: SeDebugPrivilege 1628 taskkill.exe Token: SeDebugPrivilege 1656 taskkill.exe Token: SeDebugPrivilege 2252 taskkill.exe Token: SeDebugPrivilege 752 taskkill.exe Token: SeDebugPrivilege 1652 taskkill.exe Token: SeDebugPrivilege 4776 firefox.exe Token: SeDebugPrivilege 4776 firefox.exe Token: SeDebugPrivilege 5460 3bf365eebe.exe Token: SeDebugPrivilege 4776 firefox.exe Token: SeDebugPrivilege 4776 firefox.exe Token: SeDebugPrivilege 4776 firefox.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
Processes:
c7b59dea2273e4ebd8fe978be25b382793dcfd9fda75a70b8e47729019102645.exeb262ab70e9.exefirefox.exepid process 1648 c7b59dea2273e4ebd8fe978be25b382793dcfd9fda75a70b8e47729019102645.exe 4276 b262ab70e9.exe 4276 b262ab70e9.exe 4276 b262ab70e9.exe 4276 b262ab70e9.exe 4276 b262ab70e9.exe 4276 b262ab70e9.exe 4276 b262ab70e9.exe 4776 firefox.exe 4776 firefox.exe 4776 firefox.exe 4776 firefox.exe 4776 firefox.exe 4776 firefox.exe 4776 firefox.exe 4776 firefox.exe 4776 firefox.exe 4776 firefox.exe 4776 firefox.exe 4776 firefox.exe 4776 firefox.exe 4776 firefox.exe 4776 firefox.exe 4776 firefox.exe 4776 firefox.exe 4776 firefox.exe 4776 firefox.exe 4776 firefox.exe 4776 firefox.exe 4276 b262ab70e9.exe 4276 b262ab70e9.exe 4276 b262ab70e9.exe 4276 b262ab70e9.exe -
Suspicious use of SendNotifyMessage 31 IoCs
Processes:
b262ab70e9.exefirefox.exepid process 4276 b262ab70e9.exe 4276 b262ab70e9.exe 4276 b262ab70e9.exe 4276 b262ab70e9.exe 4276 b262ab70e9.exe 4276 b262ab70e9.exe 4276 b262ab70e9.exe 4776 firefox.exe 4776 firefox.exe 4776 firefox.exe 4776 firefox.exe 4776 firefox.exe 4776 firefox.exe 4776 firefox.exe 4776 firefox.exe 4776 firefox.exe 4776 firefox.exe 4776 firefox.exe 4776 firefox.exe 4776 firefox.exe 4776 firefox.exe 4776 firefox.exe 4776 firefox.exe 4776 firefox.exe 4776 firefox.exe 4776 firefox.exe 4776 firefox.exe 4276 b262ab70e9.exe 4276 b262ab70e9.exe 4276 b262ab70e9.exe 4276 b262ab70e9.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
firefox.exepid process 4776 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
c7b59dea2273e4ebd8fe978be25b382793dcfd9fda75a70b8e47729019102645.exeskotes.exeb262ab70e9.exefirefox.exefirefox.exedescription pid process target process PID 1648 wrote to memory of 4008 1648 c7b59dea2273e4ebd8fe978be25b382793dcfd9fda75a70b8e47729019102645.exe skotes.exe PID 1648 wrote to memory of 4008 1648 c7b59dea2273e4ebd8fe978be25b382793dcfd9fda75a70b8e47729019102645.exe skotes.exe PID 1648 wrote to memory of 4008 1648 c7b59dea2273e4ebd8fe978be25b382793dcfd9fda75a70b8e47729019102645.exe skotes.exe PID 4008 wrote to memory of 4056 4008 skotes.exe 00ce09bf00.exe PID 4008 wrote to memory of 4056 4008 skotes.exe 00ce09bf00.exe PID 4008 wrote to memory of 4056 4008 skotes.exe 00ce09bf00.exe PID 4008 wrote to memory of 4580 4008 skotes.exe 40ffe7e804.exe PID 4008 wrote to memory of 4580 4008 skotes.exe 40ffe7e804.exe PID 4008 wrote to memory of 4580 4008 skotes.exe 40ffe7e804.exe PID 4008 wrote to memory of 4276 4008 skotes.exe b262ab70e9.exe PID 4008 wrote to memory of 4276 4008 skotes.exe b262ab70e9.exe PID 4008 wrote to memory of 4276 4008 skotes.exe b262ab70e9.exe PID 4276 wrote to memory of 1628 4276 b262ab70e9.exe taskkill.exe PID 4276 wrote to memory of 1628 4276 b262ab70e9.exe taskkill.exe PID 4276 wrote to memory of 1628 4276 b262ab70e9.exe taskkill.exe PID 4276 wrote to memory of 1656 4276 b262ab70e9.exe taskkill.exe PID 4276 wrote to memory of 1656 4276 b262ab70e9.exe taskkill.exe PID 4276 wrote to memory of 1656 4276 b262ab70e9.exe taskkill.exe PID 4276 wrote to memory of 2252 4276 b262ab70e9.exe taskkill.exe PID 4276 wrote to memory of 2252 4276 b262ab70e9.exe taskkill.exe PID 4276 wrote to memory of 2252 4276 b262ab70e9.exe taskkill.exe PID 4276 wrote to memory of 752 4276 b262ab70e9.exe taskkill.exe PID 4276 wrote to memory of 752 4276 b262ab70e9.exe taskkill.exe PID 4276 wrote to memory of 752 4276 b262ab70e9.exe taskkill.exe PID 4276 wrote to memory of 1652 4276 b262ab70e9.exe taskkill.exe PID 4276 wrote to memory of 1652 4276 b262ab70e9.exe taskkill.exe PID 4276 wrote to memory of 1652 4276 b262ab70e9.exe taskkill.exe PID 4276 wrote to memory of 2040 4276 b262ab70e9.exe firefox.exe PID 4276 wrote to memory of 2040 4276 b262ab70e9.exe firefox.exe PID 2040 wrote to memory of 4776 2040 firefox.exe firefox.exe PID 2040 wrote to memory of 4776 2040 firefox.exe firefox.exe PID 2040 wrote to memory of 4776 2040 firefox.exe firefox.exe PID 2040 wrote to memory of 4776 2040 firefox.exe firefox.exe PID 2040 wrote to memory of 4776 2040 firefox.exe firefox.exe PID 2040 wrote to memory of 4776 2040 firefox.exe firefox.exe PID 2040 wrote to memory of 4776 2040 firefox.exe firefox.exe PID 2040 wrote to memory of 4776 2040 firefox.exe firefox.exe PID 2040 wrote to memory of 4776 2040 firefox.exe firefox.exe PID 2040 wrote to memory of 4776 2040 firefox.exe firefox.exe PID 2040 wrote to memory of 4776 2040 firefox.exe firefox.exe PID 4776 wrote to memory of 868 4776 firefox.exe firefox.exe PID 4776 wrote to memory of 868 4776 firefox.exe firefox.exe PID 4776 wrote to memory of 868 4776 firefox.exe firefox.exe PID 4776 wrote to memory of 868 4776 firefox.exe firefox.exe PID 4776 wrote to memory of 868 4776 firefox.exe firefox.exe PID 4776 wrote to memory of 868 4776 firefox.exe firefox.exe PID 4776 wrote to memory of 868 4776 firefox.exe firefox.exe PID 4776 wrote to memory of 868 4776 firefox.exe firefox.exe PID 4776 wrote to memory of 868 4776 firefox.exe firefox.exe PID 4776 wrote to memory of 868 4776 firefox.exe firefox.exe PID 4776 wrote to memory of 868 4776 firefox.exe firefox.exe PID 4776 wrote to memory of 868 4776 firefox.exe firefox.exe PID 4776 wrote to memory of 868 4776 firefox.exe firefox.exe PID 4776 wrote to memory of 868 4776 firefox.exe firefox.exe PID 4776 wrote to memory of 868 4776 firefox.exe firefox.exe PID 4776 wrote to memory of 868 4776 firefox.exe firefox.exe PID 4776 wrote to memory of 868 4776 firefox.exe firefox.exe PID 4776 wrote to memory of 868 4776 firefox.exe firefox.exe PID 4776 wrote to memory of 868 4776 firefox.exe firefox.exe PID 4776 wrote to memory of 868 4776 firefox.exe firefox.exe PID 4776 wrote to memory of 868 4776 firefox.exe firefox.exe PID 4776 wrote to memory of 868 4776 firefox.exe firefox.exe PID 4776 wrote to memory of 868 4776 firefox.exe firefox.exe PID 4776 wrote to memory of 868 4776 firefox.exe firefox.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\c7b59dea2273e4ebd8fe978be25b382793dcfd9fda75a70b8e47729019102645.exe"C:\Users\Admin\AppData\Local\Temp\c7b59dea2273e4ebd8fe978be25b382793dcfd9fda75a70b8e47729019102645.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Users\Admin\AppData\Local\Temp\1007564001\00ce09bf00.exe"C:\Users\Admin\AppData\Local\Temp\1007564001\00ce09bf00.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4056
-
-
C:\Users\Admin\AppData\Local\Temp\1007565001\40ffe7e804.exe"C:\Users\Admin\AppData\Local\Temp\1007565001\40ffe7e804.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4580
-
-
C:\Users\Admin\AppData\Local\Temp\1007566001\b262ab70e9.exe"C:\Users\Admin\AppData\Local\Temp\1007566001\b262ab70e9.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1628
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1656
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2252
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:752
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1652
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2000 -parentBuildID 20240401114208 -prefsHandle 1928 -prefMapHandle 1920 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {4bd9da19-b830-447d-8a2a-0d21f6c8f88b} 4776 "\\.\pipe\gecko-crash-server-pipe.4776" gpu6⤵PID:868
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2428 -parentBuildID 20240401114208 -prefsHandle 2420 -prefMapHandle 2416 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3f8705b3-38be-4635-b54c-1749b59bc9a3} 4776 "\\.\pipe\gecko-crash-server-pipe.4776" socket6⤵PID:4504
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3216 -childID 1 -isForBrowser -prefsHandle 3080 -prefMapHandle 3224 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fda4f62f-a9ab-4bec-af25-262cb1579deb} 4776 "\\.\pipe\gecko-crash-server-pipe.4776" tab6⤵PID:4368
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3956 -childID 2 -isForBrowser -prefsHandle 4048 -prefMapHandle 4044 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {29251eb1-6b6f-48b9-8f19-eeb036845d65} 4776 "\\.\pipe\gecko-crash-server-pipe.4776" tab6⤵PID:3980
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4832 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4824 -prefMapHandle 4840 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8c5e94db-513d-486c-8145-a89fba244ac5} 4776 "\\.\pipe\gecko-crash-server-pipe.4776" utility6⤵
- Checks processor information in registry
PID:5476
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5400 -childID 3 -isForBrowser -prefsHandle 5328 -prefMapHandle 5320 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ccc75054-a449-4a5e-b56c-cf2bb3abf753} 4776 "\\.\pipe\gecko-crash-server-pipe.4776" tab6⤵PID:2272
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5584 -childID 4 -isForBrowser -prefsHandle 5576 -prefMapHandle 5572 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {899022a1-7438-436c-8f1b-4caba3a33308} 4776 "\\.\pipe\gecko-crash-server-pipe.4776" tab6⤵PID:2040
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4416 -childID 5 -isForBrowser -prefsHandle 5760 -prefMapHandle 5756 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a89de4e3-b328-4a82-a3f4-ddc42c70de4a} 4776 "\\.\pipe\gecko-crash-server-pipe.4776" tab6⤵PID:4076
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007567001\3bf365eebe.exe"C:\Users\Admin\AppData\Local\Temp\1007567001\3bf365eebe.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5460
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4028
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4524
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5512
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\activity-stream.discovery_stream.json
Filesize28KB
MD57adeb143eef2ca816478b20bbaf0dc0a
SHA12f70e2039ba175a7aee70d21b59a0228f1b7f5e7
SHA256c75c9c4b219f4f6bc8b9326e71e08655949f2f143881258e9574e176adf7ce4c
SHA5124af2552ff81747e8aae747940000f015cd15310edc404b2daaf470d4682b296eefc00259dc36e3291799a7ec11df5c58c2d21405df0d0d3778290797dc4e5473
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD50858c6a94d7759b59ee9b5ef765214bf
SHA1ee76da296531165173bc6f4782c0a5c9525179e7
SHA256f63dec88868e8898f2211fa294b87224903b362e47af4c66810279a119360f85
SHA512b6ef43d3b5158dfe6ffa62f37f33e35459c1a4430215a5f1d3b9a1bf433a86d03e1d45486520feb7d25eb76e2f5d55d0a395310113035c1a096bfca7c2153d64
-
Filesize
1.8MB
MD5f3af22da807cf5c72595c605883ede37
SHA1ce837c6fef442d5f397cf3b032a358b1b0eaf31d
SHA256259341feaa61530a621669e04289d7800c332b31a3c3a9e9f70a1ed8e407641b
SHA51258ce0a665a74c367c5389a378d81e8fe34f99e3b23b7745d128bb7894b73d757d0f67ef78942b498a682e7a1824a5f69b716a59f4a2cc1e3cba0fbe12dd3fc4d
-
Filesize
1.7MB
MD571a545e3b2110df4ce7ccec9dc2a4f9a
SHA1e3a2be77d404af85e1251918a9c8f01c5586ce49
SHA256e45f5355f8b2bb64ba940220e643d632ea4469c2be61ca107d8af31709efb458
SHA512249dd250472763c76934610e5838620e2e21b6c66ffc7d9de88a0d74600a63de79545db98dda43e8f07d5261bbdbd94bb6c5099a00f905f0ddc18a4ba7b11831
-
Filesize
900KB
MD5a659242a2961656ffef9f7a58e4901c1
SHA1f00e59994ad40eeac38e4f26535a259c0d48ae2b
SHA256960b3f024f7045d23c28149e4e935ee2bbc0aded4ae09a86f24928080e00caab
SHA5123464a9248c45d12a38c288ae297c86e706ff57d1bd3aa1d37c5f5f91557ef785f51d8e118191b7f1cc05f31b8f20b238bd1911874c34533d463ba707b4beefba
-
Filesize
2.7MB
MD54d8a4d824fe07691f48374a04428d3d0
SHA1a8c0d0c6837b0886f357a02541b1cb11e7fbcf67
SHA2564670a2971ce2acf600f4eb00541037cab93cfc57f61ee09af167c7e52f5aaa4c
SHA5128d5ded542030fd4a836dd5971c52b14f571f81f8de69d202343e402fc1285fd4a9a276a45248d58efce87b8947b67c65c994caa222322996da81ff869edeb74d
-
Filesize
1.8MB
MD5946e0d79b6edda9e5ab8153aa408d19d
SHA1a21e757593cbb76bf2577e005d49cc1ac4a3e2f9
SHA256c7b59dea2273e4ebd8fe978be25b382793dcfd9fda75a70b8e47729019102645
SHA512480286484c5365bd62040c1f5aec39707c82d6e84fc9c8e9f7d7fc6c55c9f0fbbb92b83bc2a3dc1731d32525488a4ce468bdf0b4c0dcf067caf8154f4760b293
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin
Filesize10KB
MD5b69b614c95c363bb15eb1caf5abe02b8
SHA15d98802192acfc29454cf5346a09580552ab1f77
SHA256bde72dfa02fd95e110092ef185e1836eff020ed169fcddfe6bc0936890de7e83
SHA512b87818efbe1a70ee9f97ae4fadc016eb37757619cf8c2c766f71eb78a0d188117a25ad874e4805a1f8878ccdeed844b1cd9fbde08ae3445100a94a0b0d12f910
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin
Filesize18KB
MD56cd9531b3508e828202d1023868db4ea
SHA138439b8580e154d0fbcf138ff5c5431274189c70
SHA256c6c6a5d7c6455c4e709891c722653984cd95886371de752664c36b2f30b6db44
SHA51225618b33525f29ca1ce46d2013bd5a02aef30a0957bd6ac42890b03f4d6befb392092fa4e2c252867b342ca5ded3b8e3bcfeb0138127cb6000722fab395269b4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin
Filesize6KB
MD5931ab2781279815963962de0df60a307
SHA18857b8ab03a637afaa5150d951f678c8478775b1
SHA256f5f7af5662c5f48472b8949b1c92505757c0d3bf1d42ec6e117fb5780de58360
SHA512ae21e00905fd6770ba09b66994fb9a63186691559ad88a86c4a9479e1893f51a348d28864410b1dc191e3d121a7b014e487fabfe7b4a5e7f1d8e95b61295f640
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize24KB
MD5267173b329b78c4cdcae81063a371b6f
SHA14a9627cf9415c787219f4601b0f160ab13372d9e
SHA2561db0e427bc238db844055bb63145c7ca531e381a0498b21c57cf9319baa4eb5e
SHA512abceda49bd666f70f6c39010f2177d0d33f047218d563cba516bbc6ece60c1df62e0c641d56bfde16f52b17f0fa4773cb25c88752754979d97db4762af60b5a5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD5fc484f85299270089865b71ffec48305
SHA1b72faeafc9a0ef1647072b32a1e89d10bea67e30
SHA25675f3b305db1bd1b402baf5de372a1cada46470c3dd0ed8358a8bb81691fdd88f
SHA51237b8dd170526c98b35ae3d1ccddf4e9eb9f5b4504cc0b126c53e45d434060ad31650047700160e5c6554e5c44033ffbffb77b44ae342d20dcf0498dbb9cb4ac7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD5d9010da9e49fc7f3a895e8822cfa71f5
SHA11d5a24ffc9d1cde2b29754cb60692442167cc68d
SHA256b9b07426ef3ab47d8a2f3b9fd9f7ab31ed16942ef7c0062c06346fabacae73f1
SHA51235411649a27a540c39e650332aa89ec9796fe82bd24cde103ea18e2d4b960404906220a5c2e4501f1a39e0318501680fad0564eaeb256e313eefcdf7a8675670
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize21KB
MD51a9ad5dc4d0effaf4b78acbaf8d85fa3
SHA180619896fbd016d5201b34f83d0e685cb4df1794
SHA2560f271f350a232c5fa9398646d4defee27e7cf843aff8abc84a23d66b6b092bc4
SHA512f8bfd236a5dddfeb9b0a990bb6c7eb507dfef5b96a5afe946d718e3ecff43bafef505953a3a28026ccbfcdbbda538e661f60aff15b75fc07c33d6768f0a1214c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD5d7f9df5bdd888e12c45cdeb3a940b2fa
SHA18fe0ca3e88a79ee36dab24d601d979cbf03a3e35
SHA256c0828b02ab3ed1c597766a91c7f61e33bd91d65a24dd8c5fe469596708112a23
SHA512831e26eea53d714b405c83da0b8a0211042c17717ce5cf2ae50ab48893e62b576b34bfd078598373efb3d5706e642c152230a605022db397f7097d50fe057d0d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD5ad72d75f25abd992b7151c5857a27c69
SHA151f1a74a2e4d68a9470737f3aa61bc6208317d14
SHA2566a4f7dc48db83e84c5477f4ec61fe6aeac505d3e7e96a96d423ec85ab787c829
SHA51200fea2fc1bf320ee346fe45e1afbcb35e33feab06f40ec31e5deb45ea51a8ac4b2cacf28c5bddb8c619e6e48ed0e84fac90d1b1aaefa3d0fcca6f542194019ed
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\bbb2db3b-3cf1-4fb1-bb48-752d1ab09d68
Filesize659B
MD58754ca9139403668de42769dc1a08e74
SHA128a66dee98810f7aa7f938fdb7f6665bd93ab1c7
SHA256a8a37cc015ca68b9c18ca423b5b1910bba4747c6d43d0a29366762d66435eb93
SHA51200c108214bb94050bf5651eac32cdae3dec3f8d74580b4f4fb25ef6554a72083a0a821372586696d2a6d7f23b3627bed3a25103f5690874041efc0b0506a673a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\bdcb9038-3b60-45c3-8fd6-68758297c171
Filesize982B
MD5f0ae5d90a02e2a2cacc08105b805f656
SHA13c8897cc7dd9e752638744a098c6f45d93f91406
SHA25641e27d2de2e8ad7e48fecb659b6671120647281266893b47d6b6834176ec2c36
SHA512d901621b1f14b884ab4c332a6d3137b6926662674af224fab5637b12e2b7ee22102a1bbc56387caac7fb989d08a6863ca533773724579e6705f76c9982a7d681
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD5a45681c8ebc3123c7036225250494b4f
SHA16b9e8f4c083fffeafea532f2bcf816cf103f1226
SHA2566331455b9980bed9cda769d13600b477ff64bb198c816adad065446158b69744
SHA512896320ebd20eeda4f29cdc6bc1615a528d66116c94290e591136a9cd88513795b334a31e49d392c7841d61698ee3a00ce5ef0defa585e206a736ded17f014605
-
Filesize
10KB
MD57ba219c464aa23913f890cef40bc514c
SHA153e38c74eda3888932b23e1e9be0137630419919
SHA2561360a28d3878ca4f61440a9aec0a135a8e663d62394ead2faee7b4397ba7b0d0
SHA512072edff499f0a23943907fa906d5c4f815e13e411c38af5150c70d4a9fd01e1cb7bf0772aa1d0a314d9f55d2198050b069380a6bc4dd70cd4b4f164da0861590
-
Filesize
15KB
MD516372a2cd36f9f02d6936d10a309b873
SHA1da2843c3cbda6c812009ee16743632ce648c8122
SHA256ddacf1d4b225fbf7b5e9c1f3a6c6891de2d8d400e0b56579d8c9079d9ba64b1c
SHA5127083d203127cbc2025bff0c3d1d7fb95900c476cbe711ef41043ca435aa3d82a15e5d8e244a778aff3c6dbb73151ea72530c1ecc9ebb9f2fdc4252d9929a0aae
-
Filesize
10KB
MD564efd0e0cc464c794a01547fab2ea472
SHA12b63682f29c5f59e223e8a42437600ba47a13714
SHA25603f7b5b23cd9d22e88967329d420776394950604d2001f1b96207dbd7c159006
SHA512c84e71b16f07061234b161d7ac8b6e0dd909a0e4813b8019b02565efdddbd47c8911d48feb6a46a5d9623fa2b823c6c8f3abfc8044bd92399925b2a9b8257a49