Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2024 03:21
Static task
static1
General
-
Target
file.exe
-
Size
1.8MB
-
MD5
5ca58d76edc0e7291bf3d6bad7edbbe9
-
SHA1
694124bf2e8d817b7f188706bbc49d0088317fe2
-
SHA256
d4e13faefc09eb85be337713e8899e9f6761d45593e33d19b14ac6f986b2a103
-
SHA512
82b990ce963247c140161ce9ab28c79c5b4d648ddf46d622e152e3c0d79842be1cf1009a493b7af37b83976f36c05b56e353c6f7166dfc701979f87447f51fad
-
SSDEEP
49152:JzqRbJAOwImTwJuvYsiI5kDbZF6j9FWHK:wRVA8xobiI566j9Aq
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Processes:
afaac3e617.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" afaac3e617.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" afaac3e617.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" afaac3e617.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" afaac3e617.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection afaac3e617.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" afaac3e617.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
Processes:
skotes.exeb8f604c4ff.exee53997e7be.exeafaac3e617.exeskotes.exeskotes.exefile.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b8f604c4ff.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e53997e7be.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ afaac3e617.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
b8f604c4ff.exee53997e7be.exeskotes.exeskotes.exefile.exeskotes.exeafaac3e617.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b8f604c4ff.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e53997e7be.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e53997e7be.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion afaac3e617.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b8f604c4ff.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion afaac3e617.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
file.exeskotes.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation file.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 7 IoCs
Processes:
skotes.exeb8f604c4ff.exee53997e7be.exe80facd8a8e.exeafaac3e617.exeskotes.exeskotes.exepid Process 3316 skotes.exe 2236 b8f604c4ff.exe 1100 e53997e7be.exe 1848 80facd8a8e.exe 948 afaac3e617.exe 1756 skotes.exe 5240 skotes.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
file.exeskotes.exeb8f604c4ff.exee53997e7be.exeafaac3e617.exeskotes.exeskotes.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine file.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine b8f604c4ff.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine e53997e7be.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine afaac3e617.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe -
Processes:
afaac3e617.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features afaac3e617.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" afaac3e617.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
skotes.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b8f604c4ff.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008610001\\b8f604c4ff.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e53997e7be.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008611001\\e53997e7be.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\80facd8a8e.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008612001\\80facd8a8e.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\afaac3e617.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008613001\\afaac3e617.exe" skotes.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/files/0x0007000000023cca-148.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
Processes:
file.exeskotes.exeb8f604c4ff.exee53997e7be.exeafaac3e617.exeskotes.exeskotes.exepid Process 5056 file.exe 3316 skotes.exe 2236 b8f604c4ff.exe 1100 e53997e7be.exe 948 afaac3e617.exe 1756 skotes.exe 5240 skotes.exe -
Drops file in Windows directory 1 IoCs
Processes:
file.exedescription ioc Process File created C:\Windows\Tasks\skotes.job file.exe -
Processes:
powershell.exepowershell.exepowershell.exepid Process 872 powershell.exe 1680 powershell.exe 5792 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
b8f604c4ff.exetaskkill.exeskotes.exee53997e7be.exetaskkill.exepowershell.exepowershell.exefile.exepowershell.exe80facd8a8e.exetaskkill.exetaskkill.exetaskkill.exeafaac3e617.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b8f604c4ff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e53997e7be.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 80facd8a8e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language afaac3e617.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exefirefox.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Kills process with taskkill 5 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid Process 2112 taskkill.exe 2544 taskkill.exe 3592 taskkill.exe 460 taskkill.exe 524 taskkill.exe -
Modifies registry class 1 IoCs
Processes:
firefox.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
Processes:
file.exeskotes.exepowershell.exepowershell.exeb8f604c4ff.exee53997e7be.exe80facd8a8e.exeafaac3e617.exepowershell.exeskotes.exeskotes.exepid Process 5056 file.exe 5056 file.exe 3316 skotes.exe 3316 skotes.exe 872 powershell.exe 872 powershell.exe 1680 powershell.exe 1680 powershell.exe 2236 b8f604c4ff.exe 2236 b8f604c4ff.exe 1100 e53997e7be.exe 1100 e53997e7be.exe 1848 80facd8a8e.exe 1848 80facd8a8e.exe 948 afaac3e617.exe 948 afaac3e617.exe 5792 powershell.exe 5792 powershell.exe 948 afaac3e617.exe 948 afaac3e617.exe 948 afaac3e617.exe 1848 80facd8a8e.exe 1848 80facd8a8e.exe 5792 powershell.exe 1756 skotes.exe 1756 skotes.exe 5240 skotes.exe 5240 skotes.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
Processes:
powershell.exepowershell.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exefirefox.exepowershell.exeafaac3e617.exedescription pid Process Token: SeDebugPrivilege 872 powershell.exe Token: SeDebugPrivilege 1680 powershell.exe Token: SeDebugPrivilege 2544 taskkill.exe Token: SeDebugPrivilege 3592 taskkill.exe Token: SeDebugPrivilege 460 taskkill.exe Token: SeDebugPrivilege 524 taskkill.exe Token: SeDebugPrivilege 2112 taskkill.exe Token: SeDebugPrivilege 3552 firefox.exe Token: SeDebugPrivilege 3552 firefox.exe Token: SeDebugPrivilege 5792 powershell.exe Token: SeDebugPrivilege 948 afaac3e617.exe Token: SeDebugPrivilege 3552 firefox.exe Token: SeDebugPrivilege 3552 firefox.exe Token: SeDebugPrivilege 3552 firefox.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
Processes:
80facd8a8e.exefirefox.exepid Process 1848 80facd8a8e.exe 1848 80facd8a8e.exe 1848 80facd8a8e.exe 1848 80facd8a8e.exe 1848 80facd8a8e.exe 1848 80facd8a8e.exe 1848 80facd8a8e.exe 1848 80facd8a8e.exe 1848 80facd8a8e.exe 3552 firefox.exe 3552 firefox.exe 3552 firefox.exe 3552 firefox.exe 3552 firefox.exe 3552 firefox.exe 3552 firefox.exe 3552 firefox.exe 3552 firefox.exe 3552 firefox.exe 3552 firefox.exe 3552 firefox.exe 3552 firefox.exe 3552 firefox.exe 3552 firefox.exe 3552 firefox.exe 3552 firefox.exe 3552 firefox.exe 3552 firefox.exe 3552 firefox.exe 3552 firefox.exe 1848 80facd8a8e.exe 1848 80facd8a8e.exe 1848 80facd8a8e.exe -
Suspicious use of SendNotifyMessage 32 IoCs
Processes:
80facd8a8e.exefirefox.exepid Process 1848 80facd8a8e.exe 1848 80facd8a8e.exe 1848 80facd8a8e.exe 1848 80facd8a8e.exe 1848 80facd8a8e.exe 1848 80facd8a8e.exe 1848 80facd8a8e.exe 1848 80facd8a8e.exe 1848 80facd8a8e.exe 3552 firefox.exe 3552 firefox.exe 3552 firefox.exe 3552 firefox.exe 3552 firefox.exe 3552 firefox.exe 3552 firefox.exe 3552 firefox.exe 3552 firefox.exe 3552 firefox.exe 3552 firefox.exe 3552 firefox.exe 3552 firefox.exe 3552 firefox.exe 3552 firefox.exe 3552 firefox.exe 3552 firefox.exe 3552 firefox.exe 3552 firefox.exe 3552 firefox.exe 1848 80facd8a8e.exe 1848 80facd8a8e.exe 1848 80facd8a8e.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
firefox.exepid Process 3552 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
file.exeskotes.exe80facd8a8e.exefirefox.exefirefox.exedescription pid Process procid_target PID 5056 wrote to memory of 3316 5056 file.exe 83 PID 5056 wrote to memory of 3316 5056 file.exe 83 PID 5056 wrote to memory of 3316 5056 file.exe 83 PID 3316 wrote to memory of 872 3316 skotes.exe 91 PID 3316 wrote to memory of 872 3316 skotes.exe 91 PID 3316 wrote to memory of 872 3316 skotes.exe 91 PID 3316 wrote to memory of 1680 3316 skotes.exe 95 PID 3316 wrote to memory of 1680 3316 skotes.exe 95 PID 3316 wrote to memory of 1680 3316 skotes.exe 95 PID 3316 wrote to memory of 2236 3316 skotes.exe 100 PID 3316 wrote to memory of 2236 3316 skotes.exe 100 PID 3316 wrote to memory of 2236 3316 skotes.exe 100 PID 3316 wrote to memory of 1100 3316 skotes.exe 101 PID 3316 wrote to memory of 1100 3316 skotes.exe 101 PID 3316 wrote to memory of 1100 3316 skotes.exe 101 PID 3316 wrote to memory of 1848 3316 skotes.exe 102 PID 3316 wrote to memory of 1848 3316 skotes.exe 102 PID 3316 wrote to memory of 1848 3316 skotes.exe 102 PID 1848 wrote to memory of 2544 1848 80facd8a8e.exe 103 PID 1848 wrote to memory of 2544 1848 80facd8a8e.exe 103 PID 1848 wrote to memory of 2544 1848 80facd8a8e.exe 103 PID 1848 wrote to memory of 3592 1848 80facd8a8e.exe 105 PID 1848 wrote to memory of 3592 1848 80facd8a8e.exe 105 PID 1848 wrote to memory of 3592 1848 80facd8a8e.exe 105 PID 1848 wrote to memory of 460 1848 80facd8a8e.exe 107 PID 1848 wrote to memory of 460 1848 80facd8a8e.exe 107 PID 1848 wrote to memory of 460 1848 80facd8a8e.exe 107 PID 1848 wrote to memory of 524 1848 80facd8a8e.exe 109 PID 1848 wrote to memory of 524 1848 80facd8a8e.exe 109 PID 1848 wrote to memory of 524 1848 80facd8a8e.exe 109 PID 1848 wrote to memory of 2112 1848 80facd8a8e.exe 111 PID 1848 wrote to memory of 2112 1848 80facd8a8e.exe 111 PID 1848 wrote to memory of 2112 1848 80facd8a8e.exe 111 PID 3316 wrote to memory of 948 3316 skotes.exe 113 PID 3316 wrote to memory of 948 3316 skotes.exe 113 PID 3316 wrote to memory of 948 3316 skotes.exe 113 PID 1848 wrote to memory of 232 1848 80facd8a8e.exe 114 PID 1848 wrote to memory of 232 1848 80facd8a8e.exe 114 PID 232 wrote to memory of 3552 232 firefox.exe 115 PID 232 wrote to memory of 3552 232 firefox.exe 115 PID 232 wrote to memory of 3552 232 firefox.exe 115 PID 232 wrote to memory of 3552 232 firefox.exe 115 PID 232 wrote to memory of 3552 232 firefox.exe 115 PID 232 wrote to memory of 3552 232 firefox.exe 115 PID 232 wrote to memory of 3552 232 firefox.exe 115 PID 232 wrote to memory of 3552 232 firefox.exe 115 PID 232 wrote to memory of 3552 232 firefox.exe 115 PID 232 wrote to memory of 3552 232 firefox.exe 115 PID 232 wrote to memory of 3552 232 firefox.exe 115 PID 3552 wrote to memory of 3260 3552 firefox.exe 116 PID 3552 wrote to memory of 3260 3552 firefox.exe 116 PID 3552 wrote to memory of 3260 3552 firefox.exe 116 PID 3552 wrote to memory of 3260 3552 firefox.exe 116 PID 3552 wrote to memory of 3260 3552 firefox.exe 116 PID 3552 wrote to memory of 3260 3552 firefox.exe 116 PID 3552 wrote to memory of 3260 3552 firefox.exe 116 PID 3552 wrote to memory of 3260 3552 firefox.exe 116 PID 3552 wrote to memory of 3260 3552 firefox.exe 116 PID 3552 wrote to memory of 3260 3552 firefox.exe 116 PID 3552 wrote to memory of 3260 3552 firefox.exe 116 PID 3552 wrote to memory of 3260 3552 firefox.exe 116 PID 3552 wrote to memory of 3260 3552 firefox.exe 116 PID 3552 wrote to memory of 3260 3552 firefox.exe 116 PID 3552 wrote to memory of 3260 3552 firefox.exe 116 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3316 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1008608041\J2W0oF3.ps1"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:872
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1008609041\EM2BsXU.ps1"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1680
-
-
C:\Users\Admin\AppData\Local\Temp\1008610001\b8f604c4ff.exe"C:\Users\Admin\AppData\Local\Temp\1008610001\b8f604c4ff.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2236
-
-
C:\Users\Admin\AppData\Local\Temp\1008611001\e53997e7be.exe"C:\Users\Admin\AppData\Local\Temp\1008611001\e53997e7be.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1100
-
-
C:\Users\Admin\AppData\Local\Temp\1008612001\80facd8a8e.exe"C:\Users\Admin\AppData\Local\Temp\1008612001\80facd8a8e.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2544
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3592
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:460
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:524
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2112
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1984 -parentBuildID 20240401114208 -prefsHandle 1900 -prefMapHandle 1892 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7bcf047f-185f-4db9-a49d-3ad436eed1ed} 3552 "\\.\pipe\gecko-crash-server-pipe.3552" gpu6⤵PID:3260
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2412 -parentBuildID 20240401114208 -prefsHandle 2404 -prefMapHandle 2400 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b14e22c5-8837-44f5-87fb-a7058a1c7246} 3552 "\\.\pipe\gecko-crash-server-pipe.3552" socket6⤵PID:4512
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3400 -childID 1 -isForBrowser -prefsHandle 1512 -prefMapHandle 2996 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1280 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {bc2535d3-f21d-4a1d-aa8a-9dae2e143ab6} 3552 "\\.\pipe\gecko-crash-server-pipe.3552" tab6⤵PID:1304
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2772 -childID 2 -isForBrowser -prefsHandle 2596 -prefMapHandle 3880 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1280 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {93191004-734a-4289-a330-84ff662d7ee3} 3552 "\\.\pipe\gecko-crash-server-pipe.3552" tab6⤵PID:2640
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4880 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4848 -prefMapHandle 4844 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3d81d8f7-5d04-49bb-8e19-f1bff8460c37} 3552 "\\.\pipe\gecko-crash-server-pipe.3552" utility6⤵
- Checks processor information in registry
PID:5304
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5316 -childID 3 -isForBrowser -prefsHandle 5308 -prefMapHandle 3904 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1280 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e7951465-e847-4f2b-a984-77344b6ee695} 3552 "\\.\pipe\gecko-crash-server-pipe.3552" tab6⤵PID:5872
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5448 -childID 4 -isForBrowser -prefsHandle 5456 -prefMapHandle 5460 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1280 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7e3984d7-37f5-4921-b5f0-2904fe17fc88} 3552 "\\.\pipe\gecko-crash-server-pipe.3552" tab6⤵PID:5904
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5640 -childID 5 -isForBrowser -prefsHandle 5648 -prefMapHandle 5652 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1280 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6791aa54-5553-47b4-8959-40b42694f6a3} 3552 "\\.\pipe\gecko-crash-server-pipe.3552" tab6⤵PID:5920
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1008613001\afaac3e617.exe"C:\Users\Admin\AppData\Local\Temp\1008613001\afaac3e617.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:948
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1008614041\wE2lFM5.ps1"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5792
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1756
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5240
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
Filesize
18KB
MD5fa817a42815ca7d2470b952cf51e6093
SHA1f2be90814b3076ecea2ddd3fb4bf76315e04291c
SHA256c14fcc7e6860ef6192b2dc1e13cb0d16c36838e672a59f141bd97340e63a319c
SHA5127f02deb93c289b971d319b5d09abb2e39fc904a0c5abbb5b3d4f254060b6bc85ae0a3127e1c2a82688c7e31e89e7220a03f7dd7854467370b3a778a38f33ee77
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\activity-stream.discovery_stream.json
Filesize27KB
MD59c413023ea1338668d82ad56d3c49971
SHA137be6436448572087cced1c83319caafdabfcbe5
SHA25645e913c7c36b43ecf5a0843a3088a99b2b5dc6a85c6c4f0cdcc3d2ae8cf90ec4
SHA512fbedb0480f3d90340f71298281eb2c7016879b1fd6e1d23c5891cb94b2f5f38a3487af6bb60986d1127a6ed180d02dfbdf51cd971c4c8f2a84c76d3559b28cce
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD5c463c4e14f499c3ee8c9761e497193ee
SHA1889e8bdfdf28ecf8b3450295c97c208f67c4e4b4
SHA256218c3b50d75492b1486c109a02524fc6b3cb110e6eb87e3afc78129fd4df6ed6
SHA512366406da5c204b515bb28276114dcfe322262dc079a63c3c7cb4b3ee0e7b7c947f6eb64058f2c6c3f30873ce6669e24dc7f29684b9337bc3b6f31fe84003e333
-
Filesize
612B
MD5e3eb0a1df437f3f97a64aca5952c8ea0
SHA17dd71afcfb14e105e80b0c0d7fce370a28a41f0a
SHA25638ffd4972ae513a0c79a8be4573403edcd709f0f572105362b08ff50cf6de521
SHA51243573b0cbaac6e2e1646e6217d2d10c40ad10b9db1f4492d6740545e793c891b5e39283a082896c0392b88eb319dfa9392421b1c89c094c9ce9f31b53d37ebaf
-
Filesize
1.8MB
MD564f25a20bc6a8730e6d230e5d63dac8e
SHA1f1c8a90fefc9e7789013cf9228827634ad8410f3
SHA256daa2f6c445600573a591de7b8ad352699dcc9ff8b5bd2e1a6f93dc373572ceae
SHA5124b0e9001c5304b3deee2dd463ab5d310cf61423d773983994167093299878f28833772a746336aaa583b036a7a6510051602bc2064f7df983ae5999aae487c87
-
Filesize
1.7MB
MD5d3fb62af150353d3cb05f84d328d5601
SHA198be84b348beaf1abb2a9327c5918322e840a274
SHA2563a0642019f4c38e2b2b89e00492dfa809723534f7753ce480e01482ca191b950
SHA512428034b57853c7b0a9e1fd47590f9816a53ef497cad88bba5bf1094a12089c2022ce75be1cfe760da9342ef8d3adb853d70d01fe05f2cc6622e9c6decb91d0aa
-
Filesize
900KB
MD54676050a0ef5a185953ab79d47cb8585
SHA1dec41077d44ded9ce6d7bcf29848ebf49a89b6fe
SHA256bba632ef9970be97837b7cd9fad3df8c7a0f8476cb2bb8805e1f05c6b5167fd0
SHA5123c5f5c50c9c75ebd664fe4b962f0b70791472f33e731dac34547aea673cd65253d31d51f146ad181ddd6bd173636ddf3d0768098d1ba1dd76d853f1e4d72e350
-
Filesize
2.6MB
MD5439e7c18eefd3d53793669e1c9575d84
SHA18d6cf9ea7bcecbce59a28430636f3a6920b97d85
SHA2560926fb4154569379a0a942b34acf902d259a7e8d89b0c033ca8858a5503e3965
SHA5125f75a4b985dc1d05772a03a3cac8283be54c1cea5a4a6a093796b260b44f8f0ce0549ad979b31c06ae1ea16dd29a5c742ced0fc7f849940c07009df48cd59df9
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1.8MB
MD55ca58d76edc0e7291bf3d6bad7edbbe9
SHA1694124bf2e8d817b7f188706bbc49d0088317fe2
SHA256d4e13faefc09eb85be337713e8899e9f6761d45593e33d19b14ac6f986b2a103
SHA51282b990ce963247c140161ce9ab28c79c5b4d648ddf46d622e152e3c0d79842be1cf1009a493b7af37b83976f36c05b56e353c6f7166dfc701979f87447f51fad
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin
Filesize8KB
MD560ea34c3d6b0f680863061a97f48d209
SHA1b64497f1de6db57ff0c4f6739eb0d72c54d47eff
SHA256d087c6bc1e36e028231443cfadffd5708bcc8d9b18b992efade579e4c61c2b00
SHA512443aa8eda57f4539a23aac0dab94eee5ea6f6a90a93a0d0b49dc6a6de2e8d5483bc385a10973417d45572d01113361005d39f9884b054897b5721bdbf70a35b7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin
Filesize11KB
MD5d1f57587952d5ca33541d2dd0b8687d3
SHA17e367d0e49a1ba443b6d58b8226f080dd922028f
SHA2569cba4f9834e8e27d7a64fa40df2ac6169edc1adf48a779a6f508373ede469637
SHA512e3b7d91f32cf25dbf976a44041549ab37f1117864b5d4982bf57d5a990f7512c998c835e02bb37b399835c5e1951710e77a5c75552f79c0c8317fb18e42ecd9f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin
Filesize13KB
MD5cf8497eb64f483813d2a99f260341380
SHA1ee35954a86e4d7c0313e8fbec839ed33490c874a
SHA2568c3213df9dd9575bf5056941691db3dbe5df46d1f0755bd289a934c860032798
SHA512ce7601923cd1f0c4efc5d5444daf2e34fc7fba86b262cbe28e0039880ffc83f58e74def50bb173461a76270350240e4c7d5a3e275e1c6b51f8cbc59b5dcb8959
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize21KB
MD58de15121ddb1307fbc24a1e890679456
SHA1359bb3ff7e8b1d294d8505eb4f328f6482c6bffd
SHA2564bdf3631070d162376b3fe60034348f6fb60f362a8fbdf66c43d267a45fd355f
SHA512867b190de43ffa67dddda724bcab1ab69b0a8f255216cab8687be84d4149576485659e867542970024187c2935e034a33d4b8f54a7ae55b0c45317a53e424ef2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD5d346b0d26774d5c38213563409d64718
SHA190a4bf6f169c25f73bf0412b1274b1111aa0d9d9
SHA2561b873bdfb59d6f7301af69b192eae37d47f4e588bcf39092e489856d5a5d7c3d
SHA512a6eac2c9acccd50927bd98c207a45913c1b870624722c0e9398c182bc5492953c760c56610c48e21ccca437e2a2c1ea485efce3ca6328a3c9f580f568687bebb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD5659582e896862841df0841a16bc652d2
SHA1b752f53feeaaf9aba0e0ac0d22fd850adc3c6adb
SHA256c5154b87f398fedb8269267757615686fb2d13f4e8e7a4c10846e448f1638aca
SHA51228d48d685eaed30c04a63bfc26ceaaa2bb6e6809073b3c75179374bc500e2653b068c3d37b8cd45c59ed3c45b3f79ac02965d5011e252ea6c3859227c4332807
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD5bb2215847d439a8abfcbb7f06158dee0
SHA1d313a3a2ca23f7eb1acb18858c8a6259417b18b9
SHA256963a58c8488693214e49897f5e7eeaec8720561f2d7f98e063c65fe7caec0677
SHA5125b1d29e801304ed2aa8c59d0ddeb3a67eba50ecf683b16e184f836ce7745386414717e8a222979f2c7cfca63b04e3adca3799539363d12c1332fb9726d7a9260
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize24KB
MD5c28ed8251f19273f26711f43803aefa2
SHA1dd12cfbd4c8bc489076d293efd01d03b7ae41f56
SHA256341c7634f531980e342cb1d8af21c738b4e99a65e9f140207ea6299889940e15
SHA512e900320439bbf704bf6081c39e989475a6706cee3dc0ecf9556890ac5c648cb7239a62dfaa1cd0f90245103813229567ed108094b24688f85f88d70e9f258b66
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD5c44dd9975953d7ca2e5e3b5ef755db18
SHA1f1b1c9baf36b9b946eb97250cdd8d20fb1c12dac
SHA256a133c3d52f96d7dc6ef1adbf7a4f299d96931a8cebc65ecacef1b4b49b4f3ba7
SHA51270ffa16f0813698e6f6e1d1cae80b0790078141ac90b2ea95540f1f18ab948663116779c56a69fa04a21b38c3cc779bdf2bf25ce206d6b8872196aa7c8e87882
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\05f2a91f-75c7-437f-9ebd-f4479bc830c7
Filesize659B
MD51ed3482a9c431c2779a238714585a6bc
SHA1bd1b77c029ac6069df4f456428a9a683f8ff49d8
SHA25683f4cd630bbd72ff227ed2a31571ea405fc05086c55dd157bb5aaa79fcd60a61
SHA512fef1b3a80403af7708749cb591bf6fe91c4c0d5c595d202660e7dc823d5e000065cd4ba28ca333283d3e0b53b962e91727635c98fa3d5b136b2e57c1c23da324
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\b8c94435-ab46-4b50-993b-80c6d93219ac
Filesize982B
MD58bfbe579b765e8792ed4cb480fd2f5f2
SHA1072ae692986c18c45a79007a5862fa3378601b90
SHA2560c777c4322e6c1406f7089a5e93624b59edefa673b3a58813d03ccbe06088b2b
SHA5127a8e56329354ccec442a4af9134a7af19b5bca508869518c8bdde5f940e7412447890e16de609e9c7c0703e70eb42adf5323ca692d25349598065b18cb623fe6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
11KB
MD55b51daab6f6c7a917ec5a6fdaf420bd1
SHA1692747dc765011e72c7c4526748e658caa1a85c9
SHA2561476484c95903eaa8bb3b082b38b7967f530452e95daa31a40c4117d7f5c9aea
SHA51237a1701e0b7e5da0e4361930ce9a624adc708829ec00ea106f706a11d602e0ab8108036a24d3640e0c81138600dcd3d7311809f031eb4e64cdabdf29973a74d7
-
Filesize
15KB
MD53c6abcd2cfe8758d4a26f2e3e9be0b0c
SHA16fd53ffe81c04da4dbd3dd16e6c6b6b4d00cdfaf
SHA2564255bb992034dcbc4fbcba9176fcdbeb2d3a789aad7cd888e9bf8b47e4cd8ed5
SHA512a33456dafe008aeb7bf9fb6639b6e9360be0e5b442f0799ed2b433cde78f8cb953fb8540b5ffdb7eaf9917ac7a45ee23947348b8759e74ff066024058d6c1d2a
-
Filesize
10KB
MD579f73443487af3d16ad1d91002751e8a
SHA1498267aa7972f3b4a9a1679f9457eee00383e50b
SHA2564f9e6c53c2881d3aaa07d180bbd3aaebcbf21769a7f1641e8f35b41288827cbf
SHA51255e75a21586e4464312bee2625d8b5d32a4f179f0d02b6e8070b80c58257675df4f67d1c38e5cf3d1bb34f2bd479724e5c561f4f44fab91e244235a0c8ba68ef
-
Filesize
11KB
MD5d7b9b101898379bcf95ebfec0251cc5e
SHA15154e4d630294f0e1f92fd63f58a21bfe96444d7
SHA25675df76560e20696a6c5828b0563684b90c4674fe1cb55e270ba71eacf76226d1
SHA512d81ba07c90adfd825721ff95f1febdacd6a48ee81f8d3fd655ecb500ec3f4200ca36b79d51600fefb7f2d67d4753e3acc1da6a104875ca7862c74b84d888a72c