Analysis
-
max time kernel
143s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 05:04
Static task
static1
General
-
Target
file.exe
-
Size
1.8MB
-
MD5
96c1a1b70f47f88edff0fc615aae0c6b
-
SHA1
d9676fea886264dae4c2164cf392da1a9ac38e3a
-
SHA256
c326252a4700a59f6250b3a8f090996a80a4912bdc5de66021c20091879c2cfb
-
SHA512
fb26db4bf804d8fedb40203c737afdfcf9f581c1e370195fb03ac36ff38643b3ca437396c6a1574759c86075ee41dbe2106a4e0f484123d6a902d454eff3666b
-
SSDEEP
49152:BU3M/NF3eOV8d94fGPrYFOa0GW8V34+M:4M/eY8kfGzYFOa0GW8V
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
Extracted
stealc
drum
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c8ded6c27d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c8ded6c27d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c8ded6c27d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c8ded6c27d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c8ded6c27d.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c8ded6c27d.exe -
Stealc family
-
Enumerates VirtualBox registry keys 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF c960acae56.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF 8501e18abe.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 084904edf7.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c960acae56.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ db64d1bd08.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8501e18abe.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2d433cbefa.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c8ded6c27d.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 20 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2d433cbefa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c8ded6c27d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 084904edf7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c960acae56.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c960acae56.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion db64d1bd08.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2d433cbefa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 084904edf7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion db64d1bd08.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8501e18abe.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8501e18abe.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c8ded6c27d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation file.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 10 IoCs
pid Process 1584 skotes.exe 4212 2d433cbefa.exe 4880 084904edf7.exe 3988 2bd4e48073.exe 4480 c8ded6c27d.exe 4508 c960acae56.exe 5404 db64d1bd08.exe 3984 8501e18abe.exe 5260 skotes.exe 1444 skotes.exe -
Identifies Wine through registry keys 2 TTPs 10 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 2d433cbefa.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine c960acae56.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine c8ded6c27d.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine db64d1bd08.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 8501e18abe.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine file.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 084904edf7.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c8ded6c27d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c8ded6c27d.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2d433cbefa.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010513001\\2d433cbefa.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\084904edf7.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010514001\\084904edf7.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2bd4e48073.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010515001\\2bd4e48073.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\c8ded6c27d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010516001\\c8ded6c27d.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000a000000023b69-65.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
pid Process 3736 file.exe 1584 skotes.exe 4212 2d433cbefa.exe 4880 084904edf7.exe 4480 c8ded6c27d.exe 4508 c960acae56.exe 5404 db64d1bd08.exe 3984 8501e18abe.exe 5260 skotes.exe 1444 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2848 5404 WerFault.exe 121 -
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 084904edf7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c8ded6c27d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8501e18abe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2d433cbefa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2bd4e48073.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c960acae56.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language db64d1bd08.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 912 taskkill.exe 796 taskkill.exe 4356 taskkill.exe 3344 taskkill.exe 2804 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 3736 file.exe 3736 file.exe 1584 skotes.exe 1584 skotes.exe 4212 2d433cbefa.exe 4212 2d433cbefa.exe 4880 084904edf7.exe 4880 084904edf7.exe 3988 2bd4e48073.exe 3988 2bd4e48073.exe 3988 2bd4e48073.exe 3988 2bd4e48073.exe 4480 c8ded6c27d.exe 4480 c8ded6c27d.exe 4480 c8ded6c27d.exe 4480 c8ded6c27d.exe 4480 c8ded6c27d.exe 4508 c960acae56.exe 4508 c960acae56.exe 4508 c960acae56.exe 4508 c960acae56.exe 4508 c960acae56.exe 4508 c960acae56.exe 4508 c960acae56.exe 4508 c960acae56.exe 4508 c960acae56.exe 4508 c960acae56.exe 5404 db64d1bd08.exe 5404 db64d1bd08.exe 3984 8501e18abe.exe 3984 8501e18abe.exe 3984 8501e18abe.exe 3984 8501e18abe.exe 3984 8501e18abe.exe 3984 8501e18abe.exe 3984 8501e18abe.exe 3984 8501e18abe.exe 3984 8501e18abe.exe 3984 8501e18abe.exe 5260 skotes.exe 5260 skotes.exe 1444 skotes.exe 1444 skotes.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 912 taskkill.exe Token: SeDebugPrivilege 796 taskkill.exe Token: SeDebugPrivilege 4356 taskkill.exe Token: SeDebugPrivilege 3344 taskkill.exe Token: SeDebugPrivilege 2804 taskkill.exe Token: SeDebugPrivilege 4020 firefox.exe Token: SeDebugPrivilege 4020 firefox.exe Token: SeDebugPrivilege 4480 c8ded6c27d.exe Token: SeDebugPrivilege 4020 firefox.exe Token: SeDebugPrivilege 4020 firefox.exe Token: SeDebugPrivilege 4020 firefox.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 3736 file.exe 3988 2bd4e48073.exe 3988 2bd4e48073.exe 3988 2bd4e48073.exe 3988 2bd4e48073.exe 3988 2bd4e48073.exe 3988 2bd4e48073.exe 3988 2bd4e48073.exe 4020 firefox.exe 4020 firefox.exe 4020 firefox.exe 4020 firefox.exe 4020 firefox.exe 4020 firefox.exe 4020 firefox.exe 4020 firefox.exe 4020 firefox.exe 4020 firefox.exe 4020 firefox.exe 4020 firefox.exe 4020 firefox.exe 4020 firefox.exe 4020 firefox.exe 4020 firefox.exe 4020 firefox.exe 4020 firefox.exe 4020 firefox.exe 4020 firefox.exe 4020 firefox.exe 3988 2bd4e48073.exe 3988 2bd4e48073.exe 3988 2bd4e48073.exe 3988 2bd4e48073.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 3988 2bd4e48073.exe 3988 2bd4e48073.exe 3988 2bd4e48073.exe 3988 2bd4e48073.exe 3988 2bd4e48073.exe 3988 2bd4e48073.exe 3988 2bd4e48073.exe 4020 firefox.exe 4020 firefox.exe 4020 firefox.exe 4020 firefox.exe 4020 firefox.exe 4020 firefox.exe 4020 firefox.exe 4020 firefox.exe 4020 firefox.exe 4020 firefox.exe 4020 firefox.exe 4020 firefox.exe 4020 firefox.exe 4020 firefox.exe 4020 firefox.exe 4020 firefox.exe 4020 firefox.exe 4020 firefox.exe 4020 firefox.exe 4020 firefox.exe 3988 2bd4e48073.exe 3988 2bd4e48073.exe 3988 2bd4e48073.exe 3988 2bd4e48073.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4020 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3736 wrote to memory of 1584 3736 file.exe 83 PID 3736 wrote to memory of 1584 3736 file.exe 83 PID 3736 wrote to memory of 1584 3736 file.exe 83 PID 1584 wrote to memory of 4212 1584 skotes.exe 85 PID 1584 wrote to memory of 4212 1584 skotes.exe 85 PID 1584 wrote to memory of 4212 1584 skotes.exe 85 PID 1584 wrote to memory of 4880 1584 skotes.exe 87 PID 1584 wrote to memory of 4880 1584 skotes.exe 87 PID 1584 wrote to memory of 4880 1584 skotes.exe 87 PID 1584 wrote to memory of 3988 1584 skotes.exe 93 PID 1584 wrote to memory of 3988 1584 skotes.exe 93 PID 1584 wrote to memory of 3988 1584 skotes.exe 93 PID 3988 wrote to memory of 912 3988 2bd4e48073.exe 94 PID 3988 wrote to memory of 912 3988 2bd4e48073.exe 94 PID 3988 wrote to memory of 912 3988 2bd4e48073.exe 94 PID 3988 wrote to memory of 796 3988 2bd4e48073.exe 98 PID 3988 wrote to memory of 796 3988 2bd4e48073.exe 98 PID 3988 wrote to memory of 796 3988 2bd4e48073.exe 98 PID 3988 wrote to memory of 4356 3988 2bd4e48073.exe 100 PID 3988 wrote to memory of 4356 3988 2bd4e48073.exe 100 PID 3988 wrote to memory of 4356 3988 2bd4e48073.exe 100 PID 3988 wrote to memory of 3344 3988 2bd4e48073.exe 102 PID 3988 wrote to memory of 3344 3988 2bd4e48073.exe 102 PID 3988 wrote to memory of 3344 3988 2bd4e48073.exe 102 PID 3988 wrote to memory of 2804 3988 2bd4e48073.exe 104 PID 3988 wrote to memory of 2804 3988 2bd4e48073.exe 104 PID 3988 wrote to memory of 2804 3988 2bd4e48073.exe 104 PID 3988 wrote to memory of 1360 3988 2bd4e48073.exe 106 PID 3988 wrote to memory of 1360 3988 2bd4e48073.exe 106 PID 1360 wrote to memory of 4020 1360 firefox.exe 107 PID 1360 wrote to memory of 4020 1360 firefox.exe 107 PID 1360 wrote to memory of 4020 1360 firefox.exe 107 PID 1360 wrote to memory of 4020 1360 firefox.exe 107 PID 1360 wrote to memory of 4020 1360 firefox.exe 107 PID 1360 wrote to memory of 4020 1360 firefox.exe 107 PID 1360 wrote to memory of 4020 1360 firefox.exe 107 PID 1360 wrote to memory of 4020 1360 firefox.exe 107 PID 1360 wrote to memory of 4020 1360 firefox.exe 107 PID 1360 wrote to memory of 4020 1360 firefox.exe 107 PID 1360 wrote to memory of 4020 1360 firefox.exe 107 PID 4020 wrote to memory of 4444 4020 firefox.exe 108 PID 4020 wrote to memory of 4444 4020 firefox.exe 108 PID 4020 wrote to memory of 4444 4020 firefox.exe 108 PID 4020 wrote to memory of 4444 4020 firefox.exe 108 PID 4020 wrote to memory of 4444 4020 firefox.exe 108 PID 4020 wrote to memory of 4444 4020 firefox.exe 108 PID 4020 wrote to memory of 4444 4020 firefox.exe 108 PID 4020 wrote to memory of 4444 4020 firefox.exe 108 PID 4020 wrote to memory of 4444 4020 firefox.exe 108 PID 4020 wrote to memory of 4444 4020 firefox.exe 108 PID 4020 wrote to memory of 4444 4020 firefox.exe 108 PID 4020 wrote to memory of 4444 4020 firefox.exe 108 PID 4020 wrote to memory of 4444 4020 firefox.exe 108 PID 4020 wrote to memory of 4444 4020 firefox.exe 108 PID 4020 wrote to memory of 4444 4020 firefox.exe 108 PID 4020 wrote to memory of 4444 4020 firefox.exe 108 PID 4020 wrote to memory of 4444 4020 firefox.exe 108 PID 4020 wrote to memory of 4444 4020 firefox.exe 108 PID 4020 wrote to memory of 4444 4020 firefox.exe 108 PID 4020 wrote to memory of 4444 4020 firefox.exe 108 PID 4020 wrote to memory of 4444 4020 firefox.exe 108 PID 4020 wrote to memory of 4444 4020 firefox.exe 108 PID 4020 wrote to memory of 4444 4020 firefox.exe 108 PID 4020 wrote to memory of 4444 4020 firefox.exe 108 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Users\Admin\AppData\Local\Temp\1010513001\2d433cbefa.exe"C:\Users\Admin\AppData\Local\Temp\1010513001\2d433cbefa.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4212
-
-
C:\Users\Admin\AppData\Local\Temp\1010514001\084904edf7.exe"C:\Users\Admin\AppData\Local\Temp\1010514001\084904edf7.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4880
-
-
C:\Users\Admin\AppData\Local\Temp\1010515001\2bd4e48073.exe"C:\Users\Admin\AppData\Local\Temp\1010515001\2bd4e48073.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:912
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:796
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4356
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3344
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2804
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2016 -parentBuildID 20240401114208 -prefsHandle 1944 -prefMapHandle 1936 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {58bf5c7c-2a8c-4d53-a6d9-c0aee5f57836} 4020 "\\.\pipe\gecko-crash-server-pipe.4020" gpu6⤵PID:4444
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2452 -parentBuildID 20240401114208 -prefsHandle 2444 -prefMapHandle 2440 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c1e78794-5a9d-498d-8e3d-3dcbb56620b2} 4020 "\\.\pipe\gecko-crash-server-pipe.4020" socket6⤵PID:716
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3000 -childID 1 -isForBrowser -prefsHandle 3188 -prefMapHandle 3248 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1264 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {90ed7615-9329-4a62-b41d-aae785140c04} 4020 "\\.\pipe\gecko-crash-server-pipe.4020" tab6⤵PID:2168
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3672 -childID 2 -isForBrowser -prefsHandle 3696 -prefMapHandle 3692 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1264 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1438ed3b-c8e0-495a-b3d6-df428d7f9132} 4020 "\\.\pipe\gecko-crash-server-pipe.4020" tab6⤵PID:3332
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4580 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4548 -prefMapHandle 4540 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fa7afd15-d951-4787-b71e-47ea01c86ac7} 4020 "\\.\pipe\gecko-crash-server-pipe.4020" utility6⤵
- Checks processor information in registry
PID:5236
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5260 -childID 3 -isForBrowser -prefsHandle 5252 -prefMapHandle 5144 -prefsLen 27097 -prefMapSize 244658 -jsInitHandle 1264 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {67d90203-5c7b-4933-a344-7c62bf5130dc} 4020 "\\.\pipe\gecko-crash-server-pipe.4020" tab6⤵PID:5548
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5412 -childID 4 -isForBrowser -prefsHandle 5420 -prefMapHandle 5424 -prefsLen 27097 -prefMapSize 244658 -jsInitHandle 1264 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {aba80e4e-a919-4a00-88eb-0e15a5e35ec0} 4020 "\\.\pipe\gecko-crash-server-pipe.4020" tab6⤵PID:5568
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5600 -childID 5 -isForBrowser -prefsHandle 5608 -prefMapHandle 5612 -prefsLen 27097 -prefMapSize 244658 -jsInitHandle 1264 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7158180c-811d-4cab-8a09-d346f7d5ea0d} 4020 "\\.\pipe\gecko-crash-server-pipe.4020" tab6⤵PID:5580
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1010516001\c8ded6c27d.exe"C:\Users\Admin\AppData\Local\Temp\1010516001\c8ded6c27d.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4480
-
-
C:\Users\Admin\AppData\Local\Temp\1010517001\c960acae56.exe"C:\Users\Admin\AppData\Local\Temp\1010517001\c960acae56.exe"3⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4508
-
-
C:\Users\Admin\AppData\Local\Temp\1010518001\db64d1bd08.exe"C:\Users\Admin\AppData\Local\Temp\1010518001\db64d1bd08.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5404 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5404 -s 17124⤵
- Program crash
PID:2848
-
-
-
C:\Users\Admin\AppData\Local\Temp\1010519001\8501e18abe.exe"C:\Users\Admin\AppData\Local\Temp\1010519001\8501e18abe.exe"3⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3984
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5260
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 5404 -ip 54041⤵PID:3928
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1444
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ws2kncw.default-release\activity-stream.discovery_stream.json
Filesize25KB
MD51be3e021e50f7db1f059ee3391f76e28
SHA1292508176b91af313c8908398472afd9b1fe5637
SHA2560920914a6431f2cf2630f9b433096a648a95feee97931fb518d20ff2ab2a5b60
SHA51209e6bcc743375cc07edcaa965a7aca6dac327939903381c266693ef13b243cd47108bfb2a3bb42b52521c0dc0d278d277ad36dbc26630f6d076d03d2871b2d1e
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ws2kncw.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD5c01cb85943dd6c7c46c8336ba5ff0279
SHA1ffd01148c712915ce55d80bc6a85a71ffdbcd6b5
SHA256baf57686caca551a3b4fb89c07d3f7b8f1873c68ed2d6fb06a1cb7ad0f20897e
SHA51250fa52af153e9c88bb4879dbd61ff10e650bc5228363167ea841cc841ba8e2653526cbe9d01fbb35f182ff816e9d67d35d98e1e1f30772abc6e99fb0721f306a
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ws2kncw.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD5b3af8e7c489b6ebd3cae2a8d9a5add30
SHA1b6e614f14733efebbaab5a2011faed1f24b9cf33
SHA25699ba7bc5155f0463396fad0584fcb7f8d555d9c0aa70ccd801f68e964e432652
SHA512f7399fea2bb62a2f007ec7709a0dafcd9fb556c67d7704f1800b5ad26d9c150a213c7b57ae9300ef5eae98448c181d0d7433e9336d4b400f0a24c0159e061e8c
-
Filesize
1.8MB
MD53d834c7d2af18d01157fd54cb394567a
SHA1f74649292365953e787be057e615f20d2cf6349f
SHA256d17d5943bce6e643f8c75fa9d7ce4dfb0869ef8c701b9122eaed7251aa5626ab
SHA5129c1830acbc896b013e0629f719b452b51a340ea36c8c1be005c0254f42ebd13c88b8ef7bc8e983d9280d4f699508bc8ddfcf1325843f0b705d38a40b715f5b9f
-
Filesize
1.7MB
MD53a8e4485dffff1de900b30449b33e56a
SHA1b932de6fd713fcdc1f97c8b5f5144ef654f77ac3
SHA256624a02ea536c673b4939e19f0509d585afebc7a8d73177d466f1b2b58aa5a901
SHA512b16b4dba6b82c5982731dfa44989e14910363c619baa39bcb70b2b64d52adeb8ddb23fc0fc367ef48b0c1f19db365ea8998c199744950d5c81aada5345ebc00b
-
Filesize
900KB
MD5a9e989ef5eb79aeeb328a104849f4a85
SHA12350a9ecc6c9012f34a1206487d96f9912b6b2a9
SHA256b5c318e6f3e8af90f8d3bcd87bfd270195d238dba7ab2fe277c0bf9d57e6fdd0
SHA512f8b7685846b3efdb253b1c3ef5e45b308a240f9ee56f2f30b07777628b573247291b654b43d8029bada68896b456aeba3c98865914d9f96b3eb8db3cdb1e8ba3
-
Filesize
2.7MB
MD5dbe102896da778132a021cda8f323df0
SHA1f7903a9d367df15fa3cc30b3025ec432df23169b
SHA2560199fbd0e92c15d3300bea2d557e553da953ea8bd7554be3f495861b8b88ffc9
SHA5124737832a09cc765ca5aef70a4c55e0f766ffd1222fc4d0e2f0bab2118c0ae6f9db236068747d7e33e7e1d013d7f057028cfdd7455b58f24b6d22ce96458a6236
-
Filesize
4.3MB
MD508f54694fcdf9433d8f3aa581903c4ca
SHA108d738cc1c80c55c2835b23e24e8e211b4fb437c
SHA2563c87e8c4b46af6850934553b22a5bd2d0d1b648938fec52cd2f3b664b1dceb68
SHA512ff582e5e8a6e1f711a8b0f2a108acf49965cae3bcdbf68ecbfce0f90590673b961ad1325b5cdbfb4295db820a8093031279e841a9ebad67dea5585421a281ec5
-
Filesize
1.9MB
MD59d2eed099096486e2ae388b2b220497c
SHA1c84457bca7db83641fd56925c6496b4c9a8c6c5b
SHA2565d5a9d7c44e0dbd125b577319dcad5274121c38b6cde03658eb83c49e316d307
SHA512c289c2e38dc49ef5495baf8873f02866c53ce398f991a246148b29db81870e41dba5353691d9b73b071720ad98dfca438b5f5143eb65979e25220971c167dd35
-
Filesize
4.3MB
MD5245042b39f7fe432daf72c046d5000d3
SHA1f3ae48a9bd52536b83b76ed988558e5681009e96
SHA2561c4b207bb8d58a6068ed2be0eb27653a7245dfe8fee548c4720d14510453c27c
SHA512fedb81cb96239c8e2456872914155d54d2cb9c5c98b2a59554113de6b8987df01d2e4dd7bdadc26c8749020cf59d74fd4d2229806882bcf62b5b4083bc98622c
-
Filesize
1.8MB
MD596c1a1b70f47f88edff0fc615aae0c6b
SHA1d9676fea886264dae4c2164cf392da1a9ac38e3a
SHA256c326252a4700a59f6250b3a8f090996a80a4912bdc5de66021c20091879c2cfb
SHA512fb26db4bf804d8fedb40203c737afdfcf9f581c1e370195fb03ac36ff38643b3ca437396c6a1574759c86075ee41dbe2106a4e0f484123d6a902d454eff3666b
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin
Filesize8KB
MD5da7d34d1228b6f4b21ec4cc4b9dbe38b
SHA11723fa60cd3bf1225017a6a7bf662c770a8fe8dd
SHA256a451e33699d55c236d08bd553e1d1d3233bad340d3ce8fb5d974b3471d5422e6
SHA512b9d0d03c7909cc7b2daa670514e2556591b98174cb395556860997b92e8b481c589dcdbef7fc7f76e867c4548fc3433172c30502606ca84786d3dd406cea0f51
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin
Filesize12KB
MD564bf7e744e901d1ca7c9f981df59afab
SHA1afb65430e782d81cbe43c0a270c27917aabb4fa5
SHA256052e1865c0ceac7f5466e340338f40141b0f9d5717aecf87b88757d9b044ab8a
SHA5121ccaae25c35af901d595e033b4de3e92e2e301caa16dde5954d328118e370b919261119e9259761282b1a36617eba887f5e8eb54f1c6a642eef3a5ba169ac8aa
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5335c1790f8d6f9fc93ffda7f3237bb9c
SHA1aacdbb02a5ef47e847a631a1d9930fd329a37272
SHA25631a6490e8388cd7c3aef89dff591c018a5cb8f7e1df364ced20e92315b04580d
SHA5120c7fc9f535c4957e789addbe5b6d81b906d5d688df88b9cfe6b57dd02788317b8111e325e76eed469e2c192202d4afb08ce55a8d83d91e59634a623062df3126
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD556c114e9ece15faa2e0e19f8ab66a8a2
SHA1a7776a81d794272c0b0041356a0142a47c8a1415
SHA25666ce4ab5fa3e09bc038be8d67b13feb1cc523cde1d21bb30de1e1cb332f05baf
SHA5125616925ee3340e90451c2b229c8b0e3e5f6de083df24dd1cb8a21fb4196189e32485cd9c2649e5bf0d2ba1cf826b67425441bc84e40bd88eee3e9c722faa8d9d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5989b38bb951dfb6decf1bc52203893ea
SHA13154787bc928843d6620303d795e21788aca92e0
SHA256b2639d32edb83054b52b0c9fe41fbd9e055b9e80d5e93666ca9c2470905d3855
SHA512ee74b0c3e4fe3b6b201aa88106fb6155651aa9f79af88a9d73692d2705c3dee4827d6aca16d921b530de970721d0246359f0289017a359a9f51a3d6b1facd246
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\a016580f-9184-496c-be4e-36c3ce0f5941
Filesize671B
MD5c2fdd3a4e8c1cab85a39030aba70c64b
SHA181b88e128a106de56744ea1ef05fa0fcf7ca92a3
SHA2566f08e084961bdb484c8d9b8b3a005d9ff0dca564ec08a3a92183b77f02c2b5b5
SHA512d7e8402cd995d07e085908d5d46dbcd6ec3694a0b5997563954881e6172ad43c610ee8930ff8dfdbb183ed2e3a8b1cfbc93a8ee56bd31821e328e1af1e7876a5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\a8d0b6e2-b5cd-4136-835a-48c486f2cea0
Filesize26KB
MD50e193e2a2b23a0297ff88d479733804c
SHA10ebc287d7fbf34e5b5d726afea5a860964beda1c
SHA256b2c6bfe44793d6ac090935b4f177dac0566bd54773ca4299a716ed0280c45787
SHA512ffffe080c8ea599dd8f80b10887bff41046f8d4f73b0bd81792664d58eb858eba270bc8713f156fb1443110507be184b5e4e975055efd2e95e66b4cfb2b3081f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\e11a94ed-c8da-4ab4-af1d-690a5fdf9f3c
Filesize982B
MD5893279ec4d1a115a522bce94273d1bac
SHA120be0a27bf9965a6040b43cc95eb0f464a3b2bf4
SHA2567e93ae961e94672fd31d83f53e275d799c0f76d20e06c8f3d24ce04465fc5ad4
SHA512eb89ebd9c948de2b81c0ac0c76e620e8352f1cee01cd9d914f0a1e48f8d5b392d2606b0f5678bedc097f165b44546f29e394b55992c4b9dea38189cd5fcfa956
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD59ea2d03b7a370444d4284b95502db596
SHA1233fbe3e20fd7bdfd24f2ffe550144d29f9fd48e
SHA25637357d1e8239e57a18bb317f4edb315d619dfe741441ce6870b61ea6574193c5
SHA512a1a91cc2b4d941945111ebc97695919d10a449e978b0da3e9aa88b820e573344839e49e419d8bb56fd017829f33ad9271885e3c8e3f9a3d4138c42971cd4728a
-
Filesize
15KB
MD5227a4feed5cdd562be8b1648acd31634
SHA1b56a2a762dabe73603c1ad90351c85a17c05acd5
SHA2563fa67708d6cdbc65223086d8a328310a0d76d67fbaea5b00b5f444894fdb5a49
SHA512063bba08612ceb43e946791523e6834fb28d26008ea39a8461e6fc45efab3f01bce9bcb70ee10c71b92b6284de753f275390c1224803413481713dbb737281bb
-
Filesize
10KB
MD58a5197c01a80b4f0f308fa197aa81882
SHA1c29d9678faf34e537ee6d26053564398d6c33c5e
SHA256ad952230075d76794736997731c538c77a8eeb36a6b8f6d93ed8cc60074d92bb
SHA5121e616968d9c9c2ddd8c5d559f4d55a24c86b5697c0937d1fb6a19183b6c90673ad8e327998e9a399743aef5770ffc5d53d3145e6ce47637603b0e6986d9cf704
-
Filesize
10KB
MD51d5dc76a23ddd1acc9cd63411ee0b512
SHA1785d42318abe5fbd8c9089dd9cb86c829ef577ac
SHA256883bcf94bbadd28c5d27a2b87d731ea216a9b25d0cf170a73a99c9ef7735c97e
SHA51298aac8f300140f9ba056f7880ea14b5d8b4ec013096050f7ad3f523ded52bb71500668d9310bf6a4a0db465a5c50370e10e57474bc486d15f7f7f0efa01ca619
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize2.4MB
MD5c8fc55c8c72a87e670e7ba988be7b7f5
SHA12e99cbdadd0635762d29cee39b14e11e0d8c4b7d
SHA256ca298480a783c35376b1e2938a0df27c17cc323e7a425548e1207b2456dfe1a1
SHA51298955c31eefa881ad929eb057771b824ea0dc6be6e6a24a2883502fd448dc96c1c25c6da8fbe5aa36cc583433e25a3151bc8461497e2daca447fcae6fbd3598e