Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2024 22:30
Static task
static1
Behavioral task
behavioral1
Sample
5358eec7605247602552deca5b148bfd9e5c9880dcb09991e0de9885d095653b.exe
Resource
win7-20240729-en
General
-
Target
5358eec7605247602552deca5b148bfd9e5c9880dcb09991e0de9885d095653b.exe
-
Size
1.8MB
-
MD5
add4bf165f7138d46d9fb140a1237b9b
-
SHA1
6aee0aa45ec0cac927f48eed41213d07ace05e81
-
SHA256
5358eec7605247602552deca5b148bfd9e5c9880dcb09991e0de9885d095653b
-
SHA512
08b581b5d9473c725aa33fe26f07cf291016b5f738a3a262e41d11cc2e0edbb25bf4cafd4a2859d30525ca90a46eeeddf03f2160053e96d65df5bfe8988742e0
-
SSDEEP
24576:7sK8LXOfFyi7iFo3mV1V5GlCqjS8ZpZUNmYc1QO758iFt1pXE6ZE4qoPpNq:7s3zKYi7iFUmV1yCqe8quV8iT06LN
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 23b5739e7e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 23b5739e7e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 23b5739e7e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 23b5739e7e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 23b5739e7e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 23b5739e7e.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ bbefafb868.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6017abab0d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5358eec7605247602552deca5b148bfd9e5c9880dcb09991e0de9885d095653b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 87d22be945.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 23b5739e7e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5358eec7605247602552deca5b148bfd9e5c9880dcb09991e0de9885d095653b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5358eec7605247602552deca5b148bfd9e5c9880dcb09991e0de9885d095653b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion bbefafb868.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6017abab0d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 23b5739e7e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion bbefafb868.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 87d22be945.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6017abab0d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 87d22be945.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 23b5739e7e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 5358eec7605247602552deca5b148bfd9e5c9880dcb09991e0de9885d095653b.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 10 IoCs
pid Process 4636 skotes.exe 1012 9PFgzLM.exe 4336 bbefafb868.exe 5072 6017abab0d.exe 4372 skotes.exe 3476 87d22be945.exe 1588 82a19fbffa.exe 4868 23b5739e7e.exe 5168 skotes.exe 4356 skotes.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 5358eec7605247602552deca5b148bfd9e5c9880dcb09991e0de9885d095653b.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine bbefafb868.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 6017abab0d.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 87d22be945.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 23b5739e7e.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 23b5739e7e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 23b5739e7e.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\6017abab0d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008871001\\6017abab0d.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\87d22be945.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008872001\\87d22be945.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\82a19fbffa.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008873001\\82a19fbffa.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\23b5739e7e.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008874001\\23b5739e7e.exe" skotes.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0008000000023c6b-108.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 4460 5358eec7605247602552deca5b148bfd9e5c9880dcb09991e0de9885d095653b.exe 4636 skotes.exe 4336 bbefafb868.exe 5072 6017abab0d.exe 4372 skotes.exe 3476 87d22be945.exe 4868 23b5739e7e.exe 5168 skotes.exe 4356 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 5358eec7605247602552deca5b148bfd9e5c9880dcb09991e0de9885d095653b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5284 4868 WerFault.exe 119 -
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5358eec7605247602552deca5b148bfd9e5c9880dcb09991e0de9885d095653b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9PFgzLM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbefafb868.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 23b5739e7e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6017abab0d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 87d22be945.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 82a19fbffa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 4880 taskkill.exe 2680 taskkill.exe 2092 taskkill.exe 4536 taskkill.exe 452 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 4460 5358eec7605247602552deca5b148bfd9e5c9880dcb09991e0de9885d095653b.exe 4460 5358eec7605247602552deca5b148bfd9e5c9880dcb09991e0de9885d095653b.exe 4636 skotes.exe 4636 skotes.exe 4336 bbefafb868.exe 4336 bbefafb868.exe 5072 6017abab0d.exe 5072 6017abab0d.exe 4372 skotes.exe 4372 skotes.exe 3476 87d22be945.exe 3476 87d22be945.exe 1588 82a19fbffa.exe 1588 82a19fbffa.exe 1588 82a19fbffa.exe 1588 82a19fbffa.exe 4868 23b5739e7e.exe 4868 23b5739e7e.exe 4868 23b5739e7e.exe 4868 23b5739e7e.exe 4868 23b5739e7e.exe 5168 skotes.exe 5168 skotes.exe 4356 skotes.exe 4356 skotes.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 452 taskkill.exe Token: SeDebugPrivilege 4880 taskkill.exe Token: SeDebugPrivilege 2680 taskkill.exe Token: SeDebugPrivilege 2092 taskkill.exe Token: SeDebugPrivilege 4536 taskkill.exe Token: SeDebugPrivilege 3932 firefox.exe Token: SeDebugPrivilege 3932 firefox.exe Token: SeDebugPrivilege 4868 23b5739e7e.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 4460 5358eec7605247602552deca5b148bfd9e5c9880dcb09991e0de9885d095653b.exe 1588 82a19fbffa.exe 1588 82a19fbffa.exe 1588 82a19fbffa.exe 1588 82a19fbffa.exe 1588 82a19fbffa.exe 1588 82a19fbffa.exe 1588 82a19fbffa.exe 3932 firefox.exe 3932 firefox.exe 3932 firefox.exe 3932 firefox.exe 3932 firefox.exe 3932 firefox.exe 3932 firefox.exe 3932 firefox.exe 3932 firefox.exe 3932 firefox.exe 3932 firefox.exe 3932 firefox.exe 3932 firefox.exe 3932 firefox.exe 3932 firefox.exe 3932 firefox.exe 3932 firefox.exe 3932 firefox.exe 3932 firefox.exe 3932 firefox.exe 3932 firefox.exe 1588 82a19fbffa.exe 1588 82a19fbffa.exe 1588 82a19fbffa.exe 1588 82a19fbffa.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 1588 82a19fbffa.exe 1588 82a19fbffa.exe 1588 82a19fbffa.exe 1588 82a19fbffa.exe 1588 82a19fbffa.exe 1588 82a19fbffa.exe 1588 82a19fbffa.exe 3932 firefox.exe 3932 firefox.exe 3932 firefox.exe 3932 firefox.exe 3932 firefox.exe 3932 firefox.exe 3932 firefox.exe 3932 firefox.exe 3932 firefox.exe 3932 firefox.exe 3932 firefox.exe 3932 firefox.exe 3932 firefox.exe 3932 firefox.exe 3932 firefox.exe 3932 firefox.exe 3932 firefox.exe 3932 firefox.exe 3932 firefox.exe 3932 firefox.exe 1588 82a19fbffa.exe 1588 82a19fbffa.exe 1588 82a19fbffa.exe 1588 82a19fbffa.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3932 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4460 wrote to memory of 4636 4460 5358eec7605247602552deca5b148bfd9e5c9880dcb09991e0de9885d095653b.exe 82 PID 4460 wrote to memory of 4636 4460 5358eec7605247602552deca5b148bfd9e5c9880dcb09991e0de9885d095653b.exe 82 PID 4460 wrote to memory of 4636 4460 5358eec7605247602552deca5b148bfd9e5c9880dcb09991e0de9885d095653b.exe 82 PID 4636 wrote to memory of 1012 4636 skotes.exe 88 PID 4636 wrote to memory of 1012 4636 skotes.exe 88 PID 4636 wrote to memory of 1012 4636 skotes.exe 88 PID 4636 wrote to memory of 4336 4636 skotes.exe 92 PID 4636 wrote to memory of 4336 4636 skotes.exe 92 PID 4636 wrote to memory of 4336 4636 skotes.exe 92 PID 4636 wrote to memory of 5072 4636 skotes.exe 93 PID 4636 wrote to memory of 5072 4636 skotes.exe 93 PID 4636 wrote to memory of 5072 4636 skotes.exe 93 PID 4636 wrote to memory of 3476 4636 skotes.exe 95 PID 4636 wrote to memory of 3476 4636 skotes.exe 95 PID 4636 wrote to memory of 3476 4636 skotes.exe 95 PID 4636 wrote to memory of 1588 4636 skotes.exe 98 PID 4636 wrote to memory of 1588 4636 skotes.exe 98 PID 4636 wrote to memory of 1588 4636 skotes.exe 98 PID 1588 wrote to memory of 452 1588 82a19fbffa.exe 99 PID 1588 wrote to memory of 452 1588 82a19fbffa.exe 99 PID 1588 wrote to memory of 452 1588 82a19fbffa.exe 99 PID 1588 wrote to memory of 4880 1588 82a19fbffa.exe 101 PID 1588 wrote to memory of 4880 1588 82a19fbffa.exe 101 PID 1588 wrote to memory of 4880 1588 82a19fbffa.exe 101 PID 1588 wrote to memory of 2680 1588 82a19fbffa.exe 103 PID 1588 wrote to memory of 2680 1588 82a19fbffa.exe 103 PID 1588 wrote to memory of 2680 1588 82a19fbffa.exe 103 PID 1588 wrote to memory of 2092 1588 82a19fbffa.exe 105 PID 1588 wrote to memory of 2092 1588 82a19fbffa.exe 105 PID 1588 wrote to memory of 2092 1588 82a19fbffa.exe 105 PID 1588 wrote to memory of 4536 1588 82a19fbffa.exe 107 PID 1588 wrote to memory of 4536 1588 82a19fbffa.exe 107 PID 1588 wrote to memory of 4536 1588 82a19fbffa.exe 107 PID 1588 wrote to memory of 3256 1588 82a19fbffa.exe 109 PID 1588 wrote to memory of 3256 1588 82a19fbffa.exe 109 PID 3256 wrote to memory of 3932 3256 firefox.exe 110 PID 3256 wrote to memory of 3932 3256 firefox.exe 110 PID 3256 wrote to memory of 3932 3256 firefox.exe 110 PID 3256 wrote to memory of 3932 3256 firefox.exe 110 PID 3256 wrote to memory of 3932 3256 firefox.exe 110 PID 3256 wrote to memory of 3932 3256 firefox.exe 110 PID 3256 wrote to memory of 3932 3256 firefox.exe 110 PID 3256 wrote to memory of 3932 3256 firefox.exe 110 PID 3256 wrote to memory of 3932 3256 firefox.exe 110 PID 3256 wrote to memory of 3932 3256 firefox.exe 110 PID 3256 wrote to memory of 3932 3256 firefox.exe 110 PID 3932 wrote to memory of 652 3932 firefox.exe 111 PID 3932 wrote to memory of 652 3932 firefox.exe 111 PID 3932 wrote to memory of 652 3932 firefox.exe 111 PID 3932 wrote to memory of 652 3932 firefox.exe 111 PID 3932 wrote to memory of 652 3932 firefox.exe 111 PID 3932 wrote to memory of 652 3932 firefox.exe 111 PID 3932 wrote to memory of 652 3932 firefox.exe 111 PID 3932 wrote to memory of 652 3932 firefox.exe 111 PID 3932 wrote to memory of 652 3932 firefox.exe 111 PID 3932 wrote to memory of 652 3932 firefox.exe 111 PID 3932 wrote to memory of 652 3932 firefox.exe 111 PID 3932 wrote to memory of 652 3932 firefox.exe 111 PID 3932 wrote to memory of 652 3932 firefox.exe 111 PID 3932 wrote to memory of 652 3932 firefox.exe 111 PID 3932 wrote to memory of 652 3932 firefox.exe 111 PID 3932 wrote to memory of 652 3932 firefox.exe 111 PID 3932 wrote to memory of 652 3932 firefox.exe 111 PID 3932 wrote to memory of 652 3932 firefox.exe 111 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\5358eec7605247602552deca5b148bfd9e5c9880dcb09991e0de9885d095653b.exe"C:\Users\Admin\AppData\Local\Temp\5358eec7605247602552deca5b148bfd9e5c9880dcb09991e0de9885d095653b.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Users\Admin\AppData\Local\Temp\1008861001\9PFgzLM.exe"C:\Users\Admin\AppData\Local\Temp\1008861001\9PFgzLM.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1012
-
-
C:\Users\Admin\AppData\Local\Temp\1008866001\bbefafb868.exe"C:\Users\Admin\AppData\Local\Temp\1008866001\bbefafb868.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4336
-
-
C:\Users\Admin\AppData\Local\Temp\1008871001\6017abab0d.exe"C:\Users\Admin\AppData\Local\Temp\1008871001\6017abab0d.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5072
-
-
C:\Users\Admin\AppData\Local\Temp\1008872001\87d22be945.exe"C:\Users\Admin\AppData\Local\Temp\1008872001\87d22be945.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3476
-
-
C:\Users\Admin\AppData\Local\Temp\1008873001\82a19fbffa.exe"C:\Users\Admin\AppData\Local\Temp\1008873001\82a19fbffa.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:452
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4880
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2680
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2092
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4536
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:3256 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2032 -parentBuildID 20240401114208 -prefsHandle 1948 -prefMapHandle 1940 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {81a254a2-5a12-46db-a5a9-9352ad7d930f} 3932 "\\.\pipe\gecko-crash-server-pipe.3932" gpu6⤵PID:652
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2464 -parentBuildID 20240401114208 -prefsHandle 2456 -prefMapHandle 2452 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e7ef71e2-3837-40f2-a731-35c96d2b6d0e} 3932 "\\.\pipe\gecko-crash-server-pipe.3932" socket6⤵PID:2652
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3168 -childID 1 -isForBrowser -prefsHandle 3064 -prefMapHandle 3332 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1332 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9cc0bddd-1d7a-49f3-a747-89b42e3d3cbc} 3932 "\\.\pipe\gecko-crash-server-pipe.3932" tab6⤵PID:1576
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3716 -childID 2 -isForBrowser -prefsHandle 3708 -prefMapHandle 3704 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1332 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {dc5abd0d-303e-4494-a14b-c97481eae415} 3932 "\\.\pipe\gecko-crash-server-pipe.3932" tab6⤵PID:3048
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4312 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4296 -prefMapHandle 4136 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ef2e966f-e502-4aa5-831c-c2de838bb965} 3932 "\\.\pipe\gecko-crash-server-pipe.3932" utility6⤵
- Checks processor information in registry
PID:5152
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5724 -childID 3 -isForBrowser -prefsHandle 5680 -prefMapHandle 5684 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1332 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3b58637d-a8e1-449f-8e42-4b3c8e39179a} 3932 "\\.\pipe\gecko-crash-server-pipe.3932" tab6⤵PID:5976
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5936 -childID 4 -isForBrowser -prefsHandle 5724 -prefMapHandle 5704 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1332 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0efbaa70-75be-4d69-8ce9-ae31b1eb33cd} 3932 "\\.\pipe\gecko-crash-server-pipe.3932" tab6⤵PID:5996
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6068 -childID 5 -isForBrowser -prefsHandle 6076 -prefMapHandle 6080 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1332 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {64389646-6790-4f90-bef0-19cc583baeeb} 3932 "\\.\pipe\gecko-crash-server-pipe.3932" tab6⤵PID:6008
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1008874001\23b5739e7e.exe"C:\Users\Admin\AppData\Local\Temp\1008874001\23b5739e7e.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4868 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4868 -s 11324⤵
- Program crash
PID:5284
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4372
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5168
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 376 -p 4868 -ip 48681⤵PID:5372
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4356
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\activity-stream.discovery_stream.json
Filesize19KB
MD5c09d21b2430ccaa92bee51f0e5979819
SHA172cbd6c95483bbe736bd2b1bf975243efa9b9164
SHA256e16e560da1a22e737647de4125414b1ea0b032bd018cfbbed4069b055ba71cc6
SHA512cb20067ae5004341850d51023d1da645317b8c5dd8c0c81f7ec5e4e0519dc03a825978cd012a170f265a3a2110cb08c94507f9cba97d8ba7c590653451a134a6
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD54a7c0acaf7646a904f8b930e36bfb172
SHA1fcfa4a95b0f719d17d842632bd218ba0b2e375a4
SHA2562ad7e09f4f4f0bf593348b987ebf88173006837282dc71b47dab30f47d94f5b8
SHA5128f086b056551b76b9dcd4976dea1b1851e753a8ed9ec15a3673cd4b24dffe856c12a948b97e7fe00938cc2e55d3b0f29a1d690dbfd3bb1fa9b43352696478fd6
-
Filesize
1.9MB
MD577f26249620c649cb0f488fb1e8872a3
SHA1c0aed36a57e0b3f88845f2f2c4a623724716e3b3
SHA256f7905c0fa8eb13a30cdbc40f432aa54bc0b546f7ab97d2d4923f244f9c7407af
SHA512261bbe3906e4cdd554a93798465fbeacaaeac4c25e8dda0f6e06efd586deea1454f178547fc72b6a952a01baa891ea7328bd2226cb0738ec448db3bcf3e6f3b5
-
Filesize
4.2MB
MD56c2e06aafb4acb8c62410c0e7e31bc49
SHA1834df800ddb24027200ee7bc3913601b7233897f
SHA2563943d3d4ea41f1da39b9a5af2b0770c62e81779d2f20852c21e1608c5e6bfdfc
SHA512ae7a2335cfc39fffc503e55a3f903f3cdc5b63ed960b49128607ee7247316345d74497afa7c40847499625f90556523d2c3219e246fecf3b8e631cac715b5684
-
Filesize
1.8MB
MD53a68742dc50809ac2ea0f339d3a1f1c5
SHA1b2f1b40240f651c2849928a1c6f3d1b1a4c91b2c
SHA2561d94cf7ba1566319f76cf67973ca6aa32efec7783a40d2f52652df47231f4475
SHA5120d0b43db112772e6b631e95c8aad41a6b5365c0dc8031c9894450d123e8ccb15d21fb477f9159575314a0a2c9e300fd17dd1e39d6e76f641e4b72e89bfee064b
-
Filesize
1.7MB
MD56467f0b3f7c25edc1259d28371015177
SHA13fbde0653380909d0a4a35c032c9fe80131c0925
SHA25632ebf905a6ed43b5e163ba71f7a836fd3b6d2f866c18294278cb86e85ec01a3c
SHA512b88fe4f81932f235691e1f0a3a1b8b69e5dc747b04d5838b907bb477fc7aa9c49673db9149b693c94f9814d9f138bdfeb391ac3ef6c0a78bb80d87c3ed86a651
-
Filesize
901KB
MD5ff11ae234a4cc63ae952def66174b9fb
SHA1dbd5118361c76bdd0912f2cdf30329885d554f6d
SHA25684f2a6dec84bba3c40a0b36d426045c4d34b815385cf98773957b625f3d63c64
SHA512e33d4c14296941e9a4a47a4a33c1afeafb31acfc8f011f487fef845dc89a31969296a932d83563c35eff266b5a93f71d5b732495eab4c0fbc40338e3c54416b7
-
Filesize
2.6MB
MD5ab936f1daab5747602a65d0303bacf25
SHA149c7172b67628fb2cb85fd7fa351d38aee3ce893
SHA256fc83e1d55a08f7c0d0b7561304be2f02425d1e3b4fe43d033cc5eb2d0aabc6c9
SHA512ee001bd48ba62c4b578576e02fc21b8314310321e8f7d2b17c565f07c6aaa18e1dc77630982be3f760233d1d1cd85915452524e69c7e0634bbd4caf6dc28b689
-
Filesize
1.8MB
MD5add4bf165f7138d46d9fb140a1237b9b
SHA16aee0aa45ec0cac927f48eed41213d07ace05e81
SHA2565358eec7605247602552deca5b148bfd9e5c9880dcb09991e0de9885d095653b
SHA51208b581b5d9473c725aa33fe26f07cf291016b5f738a3a262e41d11cc2e0edbb25bf4cafd4a2859d30525ca90a46eeeddf03f2160053e96d65df5bfe8988742e0
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin
Filesize18KB
MD5d606fa6059d010aa86b4a47ccddf74a8
SHA1321aa41f0c8d5e3c20d0c98dc9bdfa7dbc349071
SHA2561cc6db01d15218feddfcfe410bb715cb76cd80475efc823a35fb8e971a925a8e
SHA512bc0524177ea32e102869e58ad1b009a26345f4b0c7041423f1c521f972a3460b06f6e6f69c6040c74397da342c8114aec7840a1c126830fb61d132ccf81bc2af
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin
Filesize6KB
MD5832ba61bac2eee78baadda633cafc0fa
SHA1cd534b0e104834d99b6edd596f0478ede51c1d0a
SHA256eb02e3060b530812c1dba36ae598e1682a7b1583ddb0c90b33891023b6c19ce4
SHA51214fcb535f3ec894ff845de60e88b7abd9c175d47a819b452ed81574ac26419ea3ee33c901358d64b0f88552bfb807fd2972bd182a36a2c4373b7596a345b130f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin
Filesize8KB
MD553477160220c8eae87e77890028d0b7d
SHA1235623b5a10279f92aa91f9bb88ac674d3101d25
SHA256a293c7439f29339680f1f1ce4b9288de36ea7c1c4e25bc6d07f5fca3565e5d97
SHA51227bf5774200200ce61ff871b6bc41cdf3a8bbe3ddd259a500825312da344600f593f115baeff14d888f2575957eebf1f43b86c2bc3f3a85a3cd86dd825a2bf00
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin
Filesize10KB
MD561f48d3b4651773b2209bece1f6ff1b1
SHA17fad600f075333cc64398a90c5a4b9533dacbe20
SHA2568f5a2ec8dbd89459d1b45d5132c6ebccb6bdf51539e0d230d543831da2997cb2
SHA5129e45623974b1d882f5399fa216a90227dbfd97c12c7398a7e32c1e5b4453f11c599aa740dae993089f949457a6f15092ab661d3a3d795c6338044a105311e589
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD53465d65c0bc948060be17696c4674214
SHA1648398b91868cba768ba3f9cf87f0c19cf4d5cb1
SHA2562db00efe1be55cfcd84c621e57f545f7fec16c3b96aea316060e0cdc4a1832ac
SHA5121879e3c7e62800ef0059926cf933c5f0bb2d57f441de12ae5758ae018b7a81d3143d08567e5adb031e45b679f1eef9ee4205cb7a64fe828eb45dbf07d35de86b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD54c84ca1eb9c91621602e0cb8cedec4fc
SHA17b3704f66ed2c31c411069d9381ee97ede11fabd
SHA256cc04ca6207267443026731814c458d4b8873872af960697a97049d0023848869
SHA5121417ccd3a8b9b9776a02638072863321c1cb432c50e793cf656f907e7f9b2a44e25d569df1a17204ccd22ea3d8e838c7fd50ed972f9cc07b48d0ae0765dacb99
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD573bad4b14768133a8db9f19b6fcf597e
SHA196cfb55b69601c287cc5d54817e0f737f307bee7
SHA2568dc01c58059494d1b23bc968df07190c0c39d0efe17b7763a38871399298927b
SHA512e50e74e804dac5a140585efdb20e1108d20bd7a0269abdc00f8dba407ff888f033e8ca6a4f4d8a7c5f995c960bccabb35bada51f981ac31a3390bb19140b935e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5dc930f5fbd8507d3b33b617ad2778380
SHA156ba0f52ab9c15a919a0355ca4377a6db1465f52
SHA25664d8871b764c8477528931b40ad4d9094f69b048374b87da840424c140dafa97
SHA51256470d9d99878f58ee1276aeaa2ff478cc91ea5d2f5bfd50de60179bc9bad10825d914106f980e101285e928174ea00972fa21682bd6e0c7c6880bbaa2a3d19d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\4c86b608-46c5-40be-bbca-26da19484bf2
Filesize29KB
MD58e2e54218dc331b0d1d5e30634a3378b
SHA17ca565da1190eb8adf620fda5ce9647edd0ec828
SHA2568344746cba307e3bff0de6a07e5839cd26e8fb449f23819d9e8ad9e578a8fad8
SHA512faadd9e498c1b1f381e7a251b2a7c0e7e08490c343fffa7abff8db15af069cfc2c133cfd6030c1c11a3f0c65a4a120f9200fb806cb4aeacdecc773274f8f0923
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\8d06cf99-052f-48d4-a616-f0980de2f858
Filesize982B
MD5d19eae1048511f6a9182bd61e8faf3e0
SHA192379dbf3221f1ff921f87a286c6e01fa66f6761
SHA256edb17f1979d00108b1abe52b90275782e7967037abfd649ec4206caf651981c3
SHA512c8e34112c2f6a0c611fec9f7aeceb38225b166f34b55a34753ed5b3758afe61187d188a94919e858193a37d4dac1d1bd9ff5fcd32db555bf1e0a2525a41d790a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\96eda08a-a0d1-41da-9728-182813f2aa62
Filesize671B
MD5a66dfaf7a1b998f3d1b970d6e622b2a8
SHA1cb8a7e6d67d208a9630bf55c2f14cab7dbb16ae9
SHA2568e0de4d9e013f2b42130cb28a215d1109205ef65af3ed3084423bc867fc5d6a7
SHA512a816212629efae792a0ea056d2109a610112f0a914c4936356d9f80d8ef913e7cdb1c4faae975b278215c065ee96df865bb20934e09c3d41a4ed74344cee7fb6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD593c33fe85921235f955d5c7b11775f69
SHA1a9d442a07968c4cdcddfc2a2418b8a20fb3e0793
SHA256f3fba51e342c276572d110da3cd01979bd4f42346f40be52a5d17e93e900b427
SHA51250820bd96e52a9c6264ec80d0f8a5191efb4764ea4b97c4a58e717922c78620ed82d5334e42ea5dffcd094f3f61451e6c027c33f7aa4d587ac71eed73fbcb83f
-
Filesize
15KB
MD54f392b18301c81cbb91b6fb262df7f33
SHA1e2464957d68b8fa8211c5c9e693f692cbe2272f1
SHA25663370582ccc7d931e66c7c36bf72ef493165f31d82fb42cff2a9ffef76711402
SHA512e1656e45dafd7a1e2a03cf7439466d9c3d635127126b42f31f03584c002b9e25bbf22e5244a707de915999f90f4238d292065e1f556f36444a7dc9666c74f3f4
-
Filesize
11KB
MD5bcb0322b000b69024f6adb63f319b24e
SHA12ad478c5cdfcf5bdcfde6b24c75970041c746048
SHA25698c006c63f7910fc44a61d210b14ba28dace5e9b64763ab2475a107ec7590d5e
SHA512787547811c72b9acee0a743023ed87bfc7a262e58eab1d75612eeb1984a059b0fc16dca9b2cd6cc8a84388e073bd2eb28e8a029b90a2a39d1ba3f6e2d2a31358
-
Filesize
10KB
MD53848bddbe8731461dcbfe713fe16b413
SHA1dd3265c0b5f393b7b1046655c4c36b745a27038a
SHA256e5953844b0ba0bc207bac431c74a9457e9c1b06ce1bb2d0a4a2fc5ea1213c1a6
SHA512a6496a926aa8d8fd8e2677e232092d705561cc3f3c8de9df02d9265c361fa0b685e728f28801e0783da62847b603a7ef5b594a1f6e0395b356b4df07edad948b