Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2024 16:46
Static task
static1
Behavioral task
behavioral1
Sample
ac5169df44566536bc577609929c41a792dc173cab200a053392648915efe5c8.exe
Resource
win7-20240903-en
General
-
Target
ac5169df44566536bc577609929c41a792dc173cab200a053392648915efe5c8.exe
-
Size
1.8MB
-
MD5
1d38050f2e929378eea7f8b59bb52b64
-
SHA1
1e553a68a08aba0fe2b467279118046d657785e5
-
SHA256
ac5169df44566536bc577609929c41a792dc173cab200a053392648915efe5c8
-
SHA512
0a8830df3e63dddb5b8c27c51653680f64230d7ad69d5af791ee04f07a6a62f4a1dc3968129ce1b76fa55b2b391951302bdf08de2d211c0ad923226027daa8ca
-
SSDEEP
49152:sFEIzJcXeStlKy4hsBrGDtECqFGSLSRBcOT8ilnMuLgrGjV9:kEogee54h7tDqFGP+MuuLtV9
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://powerful-avoids.sbs
https://motion-treesz.sbs
https://disobey-curly.sbs
https://leg-sate-boat.sbs
https://story-tense-faz.sbs
https://blade-govern.sbs
https://occupy-blushi.sbs
https://frogs-severz.sbs
https://property-imper.sbs
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://blade-govern.sbs/api
https://story-tense-faz.sbs/api
https://disobey-curly.sbs/api
https://motion-treesz.sbs/api
https://powerful-avoids.sbs/api
Signatures
-
Amadey family
-
Lumma family
-
Processes:
08b68995b2.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 08b68995b2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 08b68995b2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 08b68995b2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 08b68995b2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 08b68995b2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 08b68995b2.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
Processes:
skotes.exe23df3ff1a6.exee810c06bf6.exe08b68995b2.exeskotes.exeskotes.exeac5169df44566536bc577609929c41a792dc173cab200a053392648915efe5c8.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 23df3ff1a6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e810c06bf6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 08b68995b2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ac5169df44566536bc577609929c41a792dc173cab200a053392648915efe5c8.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
ac5169df44566536bc577609929c41a792dc173cab200a053392648915efe5c8.exe23df3ff1a6.exeskotes.exeskotes.exe08b68995b2.exee810c06bf6.exeskotes.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ac5169df44566536bc577609929c41a792dc173cab200a053392648915efe5c8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ac5169df44566536bc577609929c41a792dc173cab200a053392648915efe5c8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 23df3ff1a6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 23df3ff1a6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 08b68995b2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 08b68995b2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e810c06bf6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e810c06bf6.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ac5169df44566536bc577609929c41a792dc173cab200a053392648915efe5c8.exeskotes.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation ac5169df44566536bc577609929c41a792dc173cab200a053392648915efe5c8.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 9 IoCs
Processes:
skotes.exeDPQSEDd.exeDPQSEDd.exe23df3ff1a6.exee810c06bf6.execdae7e9068.exe08b68995b2.exeskotes.exeskotes.exepid Process 1400 skotes.exe 4432 DPQSEDd.exe 3656 DPQSEDd.exe 1844 23df3ff1a6.exe 4440 e810c06bf6.exe 3804 cdae7e9068.exe 1756 08b68995b2.exe 5540 skotes.exe 1584 skotes.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
skotes.exeac5169df44566536bc577609929c41a792dc173cab200a053392648915efe5c8.exeskotes.exe23df3ff1a6.exee810c06bf6.exe08b68995b2.exeskotes.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine ac5169df44566536bc577609929c41a792dc173cab200a053392648915efe5c8.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 23df3ff1a6.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine e810c06bf6.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 08b68995b2.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine skotes.exe -
Processes:
08b68995b2.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 08b68995b2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 08b68995b2.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
skotes.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\23df3ff1a6.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009330001\\23df3ff1a6.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e810c06bf6.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009331001\\e810c06bf6.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cdae7e9068.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009332001\\cdae7e9068.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\08b68995b2.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009333001\\08b68995b2.exe" skotes.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/files/0x000a000000023b86-86.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
Processes:
ac5169df44566536bc577609929c41a792dc173cab200a053392648915efe5c8.exeskotes.exe23df3ff1a6.exee810c06bf6.exe08b68995b2.exeskotes.exeskotes.exepid Process 4876 ac5169df44566536bc577609929c41a792dc173cab200a053392648915efe5c8.exe 1400 skotes.exe 1844 23df3ff1a6.exe 4440 e810c06bf6.exe 1756 08b68995b2.exe 5540 skotes.exe 1584 skotes.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
DPQSEDd.exedescription pid Process procid_target PID 4432 set thread context of 3656 4432 DPQSEDd.exe 92 -
Drops file in Windows directory 1 IoCs
Processes:
ac5169df44566536bc577609929c41a792dc173cab200a053392648915efe5c8.exedescription ioc Process File created C:\Windows\Tasks\skotes.job ac5169df44566536bc577609929c41a792dc173cab200a053392648915efe5c8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
DPQSEDd.exe23df3ff1a6.exee810c06bf6.exetaskkill.exetaskkill.exetaskkill.exeac5169df44566536bc577609929c41a792dc173cab200a053392648915efe5c8.exeskotes.exeDPQSEDd.execdae7e9068.exetaskkill.exetaskkill.exe08b68995b2.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DPQSEDd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 23df3ff1a6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e810c06bf6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ac5169df44566536bc577609929c41a792dc173cab200a053392648915efe5c8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DPQSEDd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cdae7e9068.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 08b68995b2.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exefirefox.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Kills process with taskkill 5 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid Process 3400 taskkill.exe 2012 taskkill.exe 5044 taskkill.exe 1628 taskkill.exe 3108 taskkill.exe -
Modifies registry class 1 IoCs
Processes:
firefox.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
Processes:
ac5169df44566536bc577609929c41a792dc173cab200a053392648915efe5c8.exeskotes.exe23df3ff1a6.exee810c06bf6.execdae7e9068.exe08b68995b2.exeskotes.exeskotes.exepid Process 4876 ac5169df44566536bc577609929c41a792dc173cab200a053392648915efe5c8.exe 4876 ac5169df44566536bc577609929c41a792dc173cab200a053392648915efe5c8.exe 1400 skotes.exe 1400 skotes.exe 1844 23df3ff1a6.exe 1844 23df3ff1a6.exe 4440 e810c06bf6.exe 4440 e810c06bf6.exe 3804 cdae7e9068.exe 3804 cdae7e9068.exe 1756 08b68995b2.exe 1756 08b68995b2.exe 3804 cdae7e9068.exe 3804 cdae7e9068.exe 1756 08b68995b2.exe 1756 08b68995b2.exe 1756 08b68995b2.exe 5540 skotes.exe 5540 skotes.exe 1584 skotes.exe 1584 skotes.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exefirefox.exe08b68995b2.exedescription pid Process Token: SeDebugPrivilege 3400 taskkill.exe Token: SeDebugPrivilege 2012 taskkill.exe Token: SeDebugPrivilege 5044 taskkill.exe Token: SeDebugPrivilege 1628 taskkill.exe Token: SeDebugPrivilege 3108 taskkill.exe Token: SeDebugPrivilege 3244 firefox.exe Token: SeDebugPrivilege 3244 firefox.exe Token: SeDebugPrivilege 1756 08b68995b2.exe Token: SeDebugPrivilege 3244 firefox.exe Token: SeDebugPrivilege 3244 firefox.exe Token: SeDebugPrivilege 3244 firefox.exe -
Suspicious use of FindShellTrayWindow 32 IoCs
Processes:
ac5169df44566536bc577609929c41a792dc173cab200a053392648915efe5c8.execdae7e9068.exefirefox.exepid Process 4876 ac5169df44566536bc577609929c41a792dc173cab200a053392648915efe5c8.exe 3804 cdae7e9068.exe 3804 cdae7e9068.exe 3804 cdae7e9068.exe 3804 cdae7e9068.exe 3804 cdae7e9068.exe 3804 cdae7e9068.exe 3804 cdae7e9068.exe 3244 firefox.exe 3244 firefox.exe 3244 firefox.exe 3244 firefox.exe 3244 firefox.exe 3244 firefox.exe 3244 firefox.exe 3244 firefox.exe 3244 firefox.exe 3244 firefox.exe 3244 firefox.exe 3244 firefox.exe 3244 firefox.exe 3244 firefox.exe 3244 firefox.exe 3244 firefox.exe 3244 firefox.exe 3244 firefox.exe 3244 firefox.exe 3244 firefox.exe 3244 firefox.exe 3804 cdae7e9068.exe 3804 cdae7e9068.exe 3804 cdae7e9068.exe -
Suspicious use of SendNotifyMessage 30 IoCs
Processes:
cdae7e9068.exefirefox.exepid Process 3804 cdae7e9068.exe 3804 cdae7e9068.exe 3804 cdae7e9068.exe 3804 cdae7e9068.exe 3804 cdae7e9068.exe 3804 cdae7e9068.exe 3804 cdae7e9068.exe 3244 firefox.exe 3244 firefox.exe 3244 firefox.exe 3244 firefox.exe 3244 firefox.exe 3244 firefox.exe 3244 firefox.exe 3244 firefox.exe 3244 firefox.exe 3244 firefox.exe 3244 firefox.exe 3244 firefox.exe 3244 firefox.exe 3244 firefox.exe 3244 firefox.exe 3244 firefox.exe 3244 firefox.exe 3244 firefox.exe 3244 firefox.exe 3244 firefox.exe 3804 cdae7e9068.exe 3804 cdae7e9068.exe 3804 cdae7e9068.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
firefox.exepid Process 3244 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
ac5169df44566536bc577609929c41a792dc173cab200a053392648915efe5c8.exeskotes.exeDPQSEDd.execdae7e9068.exefirefox.exefirefox.exedescription pid Process procid_target PID 4876 wrote to memory of 1400 4876 ac5169df44566536bc577609929c41a792dc173cab200a053392648915efe5c8.exe 83 PID 4876 wrote to memory of 1400 4876 ac5169df44566536bc577609929c41a792dc173cab200a053392648915efe5c8.exe 83 PID 4876 wrote to memory of 1400 4876 ac5169df44566536bc577609929c41a792dc173cab200a053392648915efe5c8.exe 83 PID 1400 wrote to memory of 4432 1400 skotes.exe 90 PID 1400 wrote to memory of 4432 1400 skotes.exe 90 PID 1400 wrote to memory of 4432 1400 skotes.exe 90 PID 4432 wrote to memory of 3656 4432 DPQSEDd.exe 92 PID 4432 wrote to memory of 3656 4432 DPQSEDd.exe 92 PID 4432 wrote to memory of 3656 4432 DPQSEDd.exe 92 PID 4432 wrote to memory of 3656 4432 DPQSEDd.exe 92 PID 4432 wrote to memory of 3656 4432 DPQSEDd.exe 92 PID 4432 wrote to memory of 3656 4432 DPQSEDd.exe 92 PID 4432 wrote to memory of 3656 4432 DPQSEDd.exe 92 PID 4432 wrote to memory of 3656 4432 DPQSEDd.exe 92 PID 4432 wrote to memory of 3656 4432 DPQSEDd.exe 92 PID 4432 wrote to memory of 3656 4432 DPQSEDd.exe 92 PID 1400 wrote to memory of 1844 1400 skotes.exe 97 PID 1400 wrote to memory of 1844 1400 skotes.exe 97 PID 1400 wrote to memory of 1844 1400 skotes.exe 97 PID 1400 wrote to memory of 4440 1400 skotes.exe 101 PID 1400 wrote to memory of 4440 1400 skotes.exe 101 PID 1400 wrote to memory of 4440 1400 skotes.exe 101 PID 1400 wrote to memory of 3804 1400 skotes.exe 102 PID 1400 wrote to memory of 3804 1400 skotes.exe 102 PID 1400 wrote to memory of 3804 1400 skotes.exe 102 PID 3804 wrote to memory of 3400 3804 cdae7e9068.exe 103 PID 3804 wrote to memory of 3400 3804 cdae7e9068.exe 103 PID 3804 wrote to memory of 3400 3804 cdae7e9068.exe 103 PID 3804 wrote to memory of 2012 3804 cdae7e9068.exe 105 PID 3804 wrote to memory of 2012 3804 cdae7e9068.exe 105 PID 3804 wrote to memory of 2012 3804 cdae7e9068.exe 105 PID 3804 wrote to memory of 5044 3804 cdae7e9068.exe 107 PID 3804 wrote to memory of 5044 3804 cdae7e9068.exe 107 PID 3804 wrote to memory of 5044 3804 cdae7e9068.exe 107 PID 3804 wrote to memory of 1628 3804 cdae7e9068.exe 109 PID 3804 wrote to memory of 1628 3804 cdae7e9068.exe 109 PID 3804 wrote to memory of 1628 3804 cdae7e9068.exe 109 PID 3804 wrote to memory of 3108 3804 cdae7e9068.exe 111 PID 3804 wrote to memory of 3108 3804 cdae7e9068.exe 111 PID 3804 wrote to memory of 3108 3804 cdae7e9068.exe 111 PID 3804 wrote to memory of 1788 3804 cdae7e9068.exe 113 PID 3804 wrote to memory of 1788 3804 cdae7e9068.exe 113 PID 1788 wrote to memory of 3244 1788 firefox.exe 114 PID 1788 wrote to memory of 3244 1788 firefox.exe 114 PID 1788 wrote to memory of 3244 1788 firefox.exe 114 PID 1788 wrote to memory of 3244 1788 firefox.exe 114 PID 1788 wrote to memory of 3244 1788 firefox.exe 114 PID 1788 wrote to memory of 3244 1788 firefox.exe 114 PID 1788 wrote to memory of 3244 1788 firefox.exe 114 PID 1788 wrote to memory of 3244 1788 firefox.exe 114 PID 1788 wrote to memory of 3244 1788 firefox.exe 114 PID 1788 wrote to memory of 3244 1788 firefox.exe 114 PID 1788 wrote to memory of 3244 1788 firefox.exe 114 PID 3244 wrote to memory of 2400 3244 firefox.exe 115 PID 3244 wrote to memory of 2400 3244 firefox.exe 115 PID 3244 wrote to memory of 2400 3244 firefox.exe 115 PID 3244 wrote to memory of 2400 3244 firefox.exe 115 PID 3244 wrote to memory of 2400 3244 firefox.exe 115 PID 3244 wrote to memory of 2400 3244 firefox.exe 115 PID 3244 wrote to memory of 2400 3244 firefox.exe 115 PID 3244 wrote to memory of 2400 3244 firefox.exe 115 PID 3244 wrote to memory of 2400 3244 firefox.exe 115 PID 3244 wrote to memory of 2400 3244 firefox.exe 115 PID 3244 wrote to memory of 2400 3244 firefox.exe 115 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac5169df44566536bc577609929c41a792dc173cab200a053392648915efe5c8.exe"C:\Users\Admin\AppData\Local\Temp\ac5169df44566536bc577609929c41a792dc173cab200a053392648915efe5c8.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Users\Admin\AppData\Local\Temp\1009278001\DPQSEDd.exe"C:\Users\Admin\AppData\Local\Temp\1009278001\DPQSEDd.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Users\Admin\AppData\Local\Temp\1009278001\DPQSEDd.exe"C:\Users\Admin\AppData\Local\Temp\1009278001\DPQSEDd.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3656
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009330001\23df3ff1a6.exe"C:\Users\Admin\AppData\Local\Temp\1009330001\23df3ff1a6.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1844
-
-
C:\Users\Admin\AppData\Local\Temp\1009331001\e810c06bf6.exe"C:\Users\Admin\AppData\Local\Temp\1009331001\e810c06bf6.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4440
-
-
C:\Users\Admin\AppData\Local\Temp\1009332001\cdae7e9068.exe"C:\Users\Admin\AppData\Local\Temp\1009332001\cdae7e9068.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3400
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2012
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5044
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1628
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3108
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2000 -parentBuildID 20240401114208 -prefsHandle 1928 -prefMapHandle 1920 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {3afff89c-5fd6-4313-a822-cdaa6ed929c2} 3244 "\\.\pipe\gecko-crash-server-pipe.3244" gpu6⤵PID:2400
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2436 -parentBuildID 20240401114208 -prefsHandle 2428 -prefMapHandle 2416 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cdbf69c8-f2f1-4297-bca2-1ed56d7c80c7} 3244 "\\.\pipe\gecko-crash-server-pipe.3244" socket6⤵PID:2060
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3160 -childID 1 -isForBrowser -prefsHandle 3104 -prefMapHandle 3052 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1140 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e7b2c694-87a9-4b74-baed-cd86947e1227} 3244 "\\.\pipe\gecko-crash-server-pipe.3244" tab6⤵PID:2384
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4112 -childID 2 -isForBrowser -prefsHandle 4104 -prefMapHandle 4100 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1140 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8abafbbb-84a3-4e56-9fc5-89a196d4f3c2} 3244 "\\.\pipe\gecko-crash-server-pipe.3244" tab6⤵PID:2484
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4572 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4716 -prefMapHandle 4708 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {50660040-b39a-40ab-86e1-86a5cae15e7d} 3244 "\\.\pipe\gecko-crash-server-pipe.3244" utility6⤵
- Checks processor information in registry
PID:5240
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5260 -childID 3 -isForBrowser -prefsHandle 5188 -prefMapHandle 5232 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1140 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ff37421f-0fd2-432e-8594-d71b3e418201} 3244 "\\.\pipe\gecko-crash-server-pipe.3244" tab6⤵PID:5976
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5400 -childID 4 -isForBrowser -prefsHandle 5480 -prefMapHandle 5476 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1140 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {23fa7765-d2cf-4e28-96d8-153e5677e706} 3244 "\\.\pipe\gecko-crash-server-pipe.3244" tab6⤵PID:5988
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5668 -childID 5 -isForBrowser -prefsHandle 5592 -prefMapHandle 5596 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1140 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5efba368-b762-42cd-8a23-8c6158274245} 3244 "\\.\pipe\gecko-crash-server-pipe.3244" tab6⤵PID:6000
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009333001\08b68995b2.exe"C:\Users\Admin\AppData\Local\Temp\1009333001\08b68995b2.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1756
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5540
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1584
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\g9per00b.default-release\activity-stream.discovery_stream.json
Filesize22KB
MD538301fa1d91a06abdf0276d6f8e1ac8d
SHA1d1374abc482bbed5176fba59fae68a08b2768c0d
SHA256e88490823ddacabf4323a9d4848ef1d7d1574eda8ed6a6852387e90ca8296ce1
SHA51265ced1067083f78313218f2e28e63b936b3de19a2ef35f171e733fa764ec76a15ba8ec5e26e4caf827463f66325a75ea8ca1d0289710bc32c68842b3259dbbf3
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\g9per00b.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD56c1bbe4b17df39fff016a34cb1b8b02d
SHA1d2138dc767277988e4e399035fb9785665282c3a
SHA2569d72eaeb263fb91696c8a08c347414412e1e3f72ded22face27f37e6d2ac26dc
SHA51289c08cf3ebd9eb8ddeceb59fba9ccb65d4f0b6947001e96c13e171a381d16707cc2454b2fb07b7bcba5cded9edb47dc66fcaa74980425eb424e629cfdbd0c8f2
-
Filesize
458KB
MD5666df1d57e2a047b9edc5a7ad3525ea0
SHA192b4144346f873d5afc2e528f914afa6c7323fef
SHA256fcff3ae0e71747322f9c628736788ceb419c9f04bdfa8a5bdb3a628e8d91af6e
SHA5123a114e0c3412c8396f40191ebc24d44733f8ebf35b72ad3a4ed26691174de5292fe4213b72d1034262ff16616d5cf01703058a61c4a578773d16f728db082b1d
-
Filesize
1.8MB
MD5cdd5f94d07f51880aac7820d436dbfb0
SHA11788017509acc93f8acc5be6c03bb0c05905d0ad
SHA25659492c239987c11dac31153e0588926b4262589e19da4288915cc49a09a7b43e
SHA512eeb077e5f834ce539240c5a778d00f7dcbfb01ef46784ccb370bdcd56266f1bb538beff359cd8cdd6bcaa04585378a827b103c5187ea3f6f4d851a8139d3e137
-
Filesize
1.7MB
MD5f43db48ebbb2d24d306982493e1b1e37
SHA1dd542a47ed05c36174441b94d9f5adf540a0b13e
SHA256d83effe6c4258c6f20a3ea796d9595ed0fccfa1e3eb27cb549a193e2ccc284d0
SHA5127121e4ab05a49666aabc4be3a0fe38f136727e8ac3bea0850810f3fc92255f5be08b4225e820a485800f1067396514f47618a37c641c0498ebcf772dd66b3bb6
-
Filesize
901KB
MD571ba5683d7ca32e6f749128d64d09e0a
SHA18a3499f7d1733288d9bbb01938b118f27030a6f2
SHA2565e1ce6da827cf06403a1c0cbaf519ab97a11fc1dc31d03cd4403959bbadfca13
SHA5122d4cfa545f7ad1021ad9518e2686d7ad378eb23df833cf392bb6398b29c9eb100f186f537703ae69752753d7bb4852cb0f2b30ee32fd012fe532f54935360ad7
-
Filesize
2.7MB
MD551bf0eb329518b7c2bf58d495458257c
SHA16ff472f161e0cea1ea5b40796dad605175bfd422
SHA256ed56b2dd50ee59f47cfd7337521d2fce0c7220bf1a85b4e39c8e65fd5f297f06
SHA51245b322cbdd68d85417e13b0b471433ea037447de5dbbdb0b747d283756461a2678b88246bc59f222d4890fb1e97df3ce5ab3d96cf511cfd07a9323846d43613f
-
Filesize
1.8MB
MD51d38050f2e929378eea7f8b59bb52b64
SHA11e553a68a08aba0fe2b467279118046d657785e5
SHA256ac5169df44566536bc577609929c41a792dc173cab200a053392648915efe5c8
SHA5120a8830df3e63dddb5b8c27c51653680f64230d7ad69d5af791ee04f07a6a62f4a1dc3968129ce1b76fa55b2b391951302bdf08de2d211c0ad923226027daa8ca
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\AlternateServices.bin
Filesize6KB
MD54fc630bf0520fc3dd9410ed2d4f902a0
SHA1452117ed97b1e9ce597bab3d5d01914126a0608f
SHA2565cbbdc93c2953f5130ee5fb8978f33192c2e2f75a2dadeba93fb8b7b1dc30784
SHA5125926826b0733a4cb36139c1c37a3c26ebf28fccea371bfd3836c6dcb5e568e81c220207cd71121cb645a2ee6eddd30587c7d02dcc15d94355c7069645693f3ba
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\AlternateServices.bin
Filesize8KB
MD5d6680e5ca7abad14d8efb0c2083902a7
SHA160a25649f7f4a08e99229f8341077bfe3b002451
SHA2569502a1a86afef153a0d6419f31ce712c18a8122160ed90c4ba0799e522e3290b
SHA512d2c6cef16a1d54311201ddf1dbf6ad3819ff04751bdf13ff5ac0c274b019b0d722c874d4b148835d326d842a68d8d788da5ad5cf176a69741c395259512ed4b2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5664dbc9636844f55f14bd3958b08279e
SHA1c913c56b0f1452a30fa0d339907982fcf7b2a9cd
SHA25666f22e42faa7c3c3fb818e374fa59bcf0b457621c5fcd8b62220e61372650e31
SHA51245f4989c1e12195d27891be483ec137613ceb8ca0907a5eef36e3432e6d394ce42103c07b99826739cff0ef04102ce82246d1872c2f2d0ae32d9d7b1a045fef1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD52b22378667c4ff4d9f511c3bc242891e
SHA1cc1878c565a1b88e68b7a472e3a0f7193b1e15bf
SHA256cf5d98d707fc0a8e67bf69daa70f056daeb53235893dc21570424b05c80834ef
SHA512e799561c4d8ee07b07e9bee50b5e631806422896f499d6545667a634e50b5c63d87d484f6b23bcd973481c6fef6a38caf898a785bf04a902a553743681f67548
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5091f6c26553142cb1532919f05212f28
SHA1b76823c8eca1bebdbe7085267154e5373e7abda9
SHA256a19cabdc6c5e14f0990f48f8eecd90320c43c8590ad619d1cfc52209de9a7e5d
SHA512b894c675196639aa235f88da7c0f792089500f8b658d614448403cfdbb93d319221fa55b9d31b295395282a46da5f0a2167d470ab909caeaf60f4a4cdd86ab63
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD51b941373d5ba68c9991bdf2a7aa040eb
SHA1c6fcac9a52c25315715dbac74d8c98089be8b90a
SHA2567a865c8fe503a5e3a04ade3523065272413008e503e79a244c5e3f66fe90cd11
SHA51293a25587a92ad6892699c1497951d4914eddfdad18ff6755e7a770b4376ac66322c2f16e86f6a08af0c738f863e47bf205a5a5b52c24b15af8df1a07d87fa826
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD50bda08f320cb7cd260d5895f32ad79a6
SHA1ab9c0843b0b3344871acd19a4f35f8c4b10619a9
SHA256a110e46c62fbe9a46b95f16b4585c002352c6998738b371432ba0ee7d5c77dbc
SHA5122ed1225542d3689f47d3bc740774febd64317af29765b59ae6403639360461b4f6012ee1a469ce61a7958faa60f37cdc60b8869ec9688426dad981757f824647
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\pending_pings\0339d41b-1380-4e61-b2c9-3b075a471f51
Filesize982B
MD5a3fae93c5398bbfbcee6a1218bbb3c34
SHA1749c1f619c0ffca298c14469877999ace697b97c
SHA25624010e471051987ba9bbaa3ce0120972ecf3f30e646f06ac9a2a9a5b640d3dee
SHA5125f5f062bc0c360298c8fef7b2ba173007742bb730d6cb9f50109d4e6e68346d2ab4bbff723b33de42663e390db0a5a0072191e08b7a39721328b26e1e73d31cf
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\pending_pings\2db23e78-e614-4ed1-8af0-6f8ce1f8ba83
Filesize27KB
MD547299fa655246814eaa2086b6a3b1e4d
SHA1d86aae4f9a333f16b37493b9118111a5a0fb36d5
SHA256c82c2ef833b011d89c421e23277c05633e131ab116a80fbd2c1b24d13a1be9a5
SHA512c165153d8d742e870b27134ca5ccefc60daae673e60cf975d7a9cca708a6d12489a396c16f97f45a53e3f19ae57ade505ebf713155424bbc2e1df7534079af4c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\pending_pings\59ecacff-1681-4822-aabf-9da50d5d76be
Filesize671B
MD5f49e5dae33254a969929f3f5590b8440
SHA17a877f82d297f866edc4864397757d5784f1ebb8
SHA2560dfdff0b150382001ffb207644dba3c19fe6e87bd6ae497f95295f37fa4550a6
SHA512b53851c96e627fdb40c570224c90327cc08e263850f6f2738875107a556a1a35114429602aacbb5890db14387ed6554ce4ee4eac98c8069d95955fd945025980
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD5aeeedf86bbcbbacc37a5fed3506b1352
SHA1f97e7cf2acf3ddc3e841aea6f483a6e66a6b7c41
SHA256bc20a6f230a8ffb40303c0abe1cb64e8197f1ebbad6134606c2f3a4ebd602b7e
SHA512e8d0b2cd3fb3e22c4dbd5896bf96acd0520943b8bb7ea9762a84c76781495252fec834053e82b727de0585099a320a79eee105a0f828f37f3ee2f1f38f71424e
-
Filesize
11KB
MD56e5a7f976ef0a73196f7fd8f49196bf3
SHA16029b6d08dfd7e4fa2740865b5d9eb84f766ee4e
SHA2563d694e065f3d08b90f75a6ff906ee65c0398a1b7efe1ad8a129f34a960b7985e
SHA5127ef6fcf16f03712c9ab6c1264c6194d51d445f3c6683e107f6cd3298fdc9b016e1855199ed3184ab222ab809345ca9cb122777ec2f73ca7060243fe568d3e8cc
-
Filesize
15KB
MD58a6004c831a6004d1ac92db4e7f9346b
SHA14196822cc8e44c407e7f20d5c1e8cc808793a796
SHA2565ebc19f8c8ea9c1a4a15a0f9511a8dbaa412dc9bb09cceacea2dc1374513b873
SHA512bb6705f73c870470d7fabc0fe61a2a792864bc147decadf27108f83848255cd6a0b82e118e8be12ac4acca7ca49f09922f930b5eac814682b6fdba422106509a
-
Filesize
10KB
MD58e9b8dafc34237a6be2a18659eb6b520
SHA1bf68d78b3e766d61b68f8d7329f81fa4f49c8db3
SHA256d747aa629920949d3a556296007d259214b55c2b17e73977cdddf504c03ef6c2
SHA512ada0b1070f533ccb82e0c968b851ee5d437b3e0eb2e6bb97401132d3b4e83f5087eeed604af10bcdd192761ce1324de13258d8349b25c3d919d0fea7605a60ff