Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2024 00:14
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240903-en
General
-
Target
file.exe
-
Size
1.8MB
-
MD5
e3de94bdf55236120866adf5d4e5bb3a
-
SHA1
a4b892f63685458c1be28e02a89c37d94b18b67d
-
SHA256
58a7419810fcd51ee607619cfd09707c75c0dff2c074c36e880f6d69dd51737d
-
SHA512
c4ed595a85ae10ad11fe77f8e06f195b6958f355d43895dce9ac400d24c5bd862a8b68a611ca73db030c5f49123eb7cef39d320b4317b48a6e77a3dc19b0f5ac
-
SSDEEP
49152:geqjROWGRpqYltSXjkp1zkfJ+nYFbLJYFBt0:lWG+Y681QRjFaF
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
drum
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 5d8b495b57.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 5d8b495b57.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 5d8b495b57.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 5d8b495b57.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 5d8b495b57.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 5d8b495b57.exe -
Stealc family
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF aec7027bba.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ac58b5eed5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 42faf4e576.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f193c6a735.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5d8b495b57.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ aec7027bba.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 20 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f193c6a735.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f193c6a735.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ac58b5eed5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ac58b5eed5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 42faf4e576.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5d8b495b57.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion aec7027bba.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 42faf4e576.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5d8b495b57.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion aec7027bba.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation file.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 10 IoCs
pid Process 2000 skotes.exe 3040 ac58b5eed5.exe 3984 f193c6a735.exe 1516 5c8a71cdab.exe 3744 5d8b495b57.exe 5172 skotes.exe 6048 aec7027bba.exe 5520 42faf4e576.exe 5356 skotes.exe 2960 skotes.exe -
Identifies Wine through registry keys 2 TTPs 10 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine file.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 5d8b495b57.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine aec7027bba.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 42faf4e576.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine ac58b5eed5.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine f193c6a735.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 5d8b495b57.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 5d8b495b57.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ac58b5eed5.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010818001\\ac58b5eed5.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\f193c6a735.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010819001\\f193c6a735.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5c8a71cdab.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010820001\\5c8a71cdab.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5d8b495b57.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010821001\\5d8b495b57.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000a000000023b4f-64.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
pid Process 1892 file.exe 2000 skotes.exe 3040 ac58b5eed5.exe 3984 f193c6a735.exe 3744 5d8b495b57.exe 5172 skotes.exe 6048 aec7027bba.exe 5520 42faf4e576.exe 5356 skotes.exe 2960 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5504 3040 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ac58b5eed5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5c8a71cdab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 42faf4e576.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aec7027bba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f193c6a735.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5d8b495b57.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 1184 taskkill.exe 3080 taskkill.exe 2408 taskkill.exe 3700 taskkill.exe 3452 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 35 IoCs
pid Process 1892 file.exe 1892 file.exe 2000 skotes.exe 2000 skotes.exe 3040 ac58b5eed5.exe 3040 ac58b5eed5.exe 3984 f193c6a735.exe 3984 f193c6a735.exe 1516 5c8a71cdab.exe 1516 5c8a71cdab.exe 3744 5d8b495b57.exe 3744 5d8b495b57.exe 1516 5c8a71cdab.exe 1516 5c8a71cdab.exe 5172 skotes.exe 5172 skotes.exe 3744 5d8b495b57.exe 3744 5d8b495b57.exe 3744 5d8b495b57.exe 6048 aec7027bba.exe 6048 aec7027bba.exe 6048 aec7027bba.exe 6048 aec7027bba.exe 6048 aec7027bba.exe 6048 aec7027bba.exe 6048 aec7027bba.exe 6048 aec7027bba.exe 6048 aec7027bba.exe 6048 aec7027bba.exe 5520 42faf4e576.exe 5520 42faf4e576.exe 5356 skotes.exe 5356 skotes.exe 2960 skotes.exe 2960 skotes.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 1184 taskkill.exe Token: SeDebugPrivilege 3080 taskkill.exe Token: SeDebugPrivilege 2408 taskkill.exe Token: SeDebugPrivilege 3700 taskkill.exe Token: SeDebugPrivilege 3452 taskkill.exe Token: SeDebugPrivilege 1892 firefox.exe Token: SeDebugPrivilege 1892 firefox.exe Token: SeDebugPrivilege 3744 5d8b495b57.exe Token: SeDebugPrivilege 1892 firefox.exe Token: SeDebugPrivilege 1892 firefox.exe Token: SeDebugPrivilege 1892 firefox.exe -
Suspicious use of FindShellTrayWindow 32 IoCs
pid Process 1892 file.exe 1516 5c8a71cdab.exe 1516 5c8a71cdab.exe 1516 5c8a71cdab.exe 1516 5c8a71cdab.exe 1516 5c8a71cdab.exe 1516 5c8a71cdab.exe 1516 5c8a71cdab.exe 1892 firefox.exe 1892 firefox.exe 1892 firefox.exe 1892 firefox.exe 1892 firefox.exe 1892 firefox.exe 1892 firefox.exe 1892 firefox.exe 1892 firefox.exe 1892 firefox.exe 1892 firefox.exe 1892 firefox.exe 1892 firefox.exe 1892 firefox.exe 1892 firefox.exe 1892 firefox.exe 1892 firefox.exe 1892 firefox.exe 1892 firefox.exe 1892 firefox.exe 1892 firefox.exe 1516 5c8a71cdab.exe 1516 5c8a71cdab.exe 1516 5c8a71cdab.exe -
Suspicious use of SendNotifyMessage 30 IoCs
pid Process 1516 5c8a71cdab.exe 1516 5c8a71cdab.exe 1516 5c8a71cdab.exe 1516 5c8a71cdab.exe 1516 5c8a71cdab.exe 1516 5c8a71cdab.exe 1516 5c8a71cdab.exe 1892 firefox.exe 1892 firefox.exe 1892 firefox.exe 1892 firefox.exe 1892 firefox.exe 1892 firefox.exe 1892 firefox.exe 1892 firefox.exe 1892 firefox.exe 1892 firefox.exe 1892 firefox.exe 1892 firefox.exe 1892 firefox.exe 1892 firefox.exe 1892 firefox.exe 1892 firefox.exe 1892 firefox.exe 1892 firefox.exe 1892 firefox.exe 1892 firefox.exe 1516 5c8a71cdab.exe 1516 5c8a71cdab.exe 1516 5c8a71cdab.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1892 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1892 wrote to memory of 2000 1892 file.exe 83 PID 1892 wrote to memory of 2000 1892 file.exe 83 PID 1892 wrote to memory of 2000 1892 file.exe 83 PID 2000 wrote to memory of 3040 2000 skotes.exe 85 PID 2000 wrote to memory of 3040 2000 skotes.exe 85 PID 2000 wrote to memory of 3040 2000 skotes.exe 85 PID 2000 wrote to memory of 3984 2000 skotes.exe 87 PID 2000 wrote to memory of 3984 2000 skotes.exe 87 PID 2000 wrote to memory of 3984 2000 skotes.exe 87 PID 2000 wrote to memory of 1516 2000 skotes.exe 94 PID 2000 wrote to memory of 1516 2000 skotes.exe 94 PID 2000 wrote to memory of 1516 2000 skotes.exe 94 PID 1516 wrote to memory of 1184 1516 5c8a71cdab.exe 95 PID 1516 wrote to memory of 1184 1516 5c8a71cdab.exe 95 PID 1516 wrote to memory of 1184 1516 5c8a71cdab.exe 95 PID 1516 wrote to memory of 3080 1516 5c8a71cdab.exe 99 PID 1516 wrote to memory of 3080 1516 5c8a71cdab.exe 99 PID 1516 wrote to memory of 3080 1516 5c8a71cdab.exe 99 PID 1516 wrote to memory of 2408 1516 5c8a71cdab.exe 101 PID 1516 wrote to memory of 2408 1516 5c8a71cdab.exe 101 PID 1516 wrote to memory of 2408 1516 5c8a71cdab.exe 101 PID 1516 wrote to memory of 3700 1516 5c8a71cdab.exe 103 PID 1516 wrote to memory of 3700 1516 5c8a71cdab.exe 103 PID 1516 wrote to memory of 3700 1516 5c8a71cdab.exe 103 PID 1516 wrote to memory of 3452 1516 5c8a71cdab.exe 105 PID 1516 wrote to memory of 3452 1516 5c8a71cdab.exe 105 PID 1516 wrote to memory of 3452 1516 5c8a71cdab.exe 105 PID 1516 wrote to memory of 2292 1516 5c8a71cdab.exe 107 PID 1516 wrote to memory of 2292 1516 5c8a71cdab.exe 107 PID 2292 wrote to memory of 1892 2292 firefox.exe 108 PID 2292 wrote to memory of 1892 2292 firefox.exe 108 PID 2292 wrote to memory of 1892 2292 firefox.exe 108 PID 2292 wrote to memory of 1892 2292 firefox.exe 108 PID 2292 wrote to memory of 1892 2292 firefox.exe 108 PID 2292 wrote to memory of 1892 2292 firefox.exe 108 PID 2292 wrote to memory of 1892 2292 firefox.exe 108 PID 2292 wrote to memory of 1892 2292 firefox.exe 108 PID 2292 wrote to memory of 1892 2292 firefox.exe 108 PID 2292 wrote to memory of 1892 2292 firefox.exe 108 PID 2292 wrote to memory of 1892 2292 firefox.exe 108 PID 2000 wrote to memory of 3744 2000 skotes.exe 109 PID 2000 wrote to memory of 3744 2000 skotes.exe 109 PID 2000 wrote to memory of 3744 2000 skotes.exe 109 PID 1892 wrote to memory of 4888 1892 firefox.exe 110 PID 1892 wrote to memory of 4888 1892 firefox.exe 110 PID 1892 wrote to memory of 4888 1892 firefox.exe 110 PID 1892 wrote to memory of 4888 1892 firefox.exe 110 PID 1892 wrote to memory of 4888 1892 firefox.exe 110 PID 1892 wrote to memory of 4888 1892 firefox.exe 110 PID 1892 wrote to memory of 4888 1892 firefox.exe 110 PID 1892 wrote to memory of 4888 1892 firefox.exe 110 PID 1892 wrote to memory of 4888 1892 firefox.exe 110 PID 1892 wrote to memory of 4888 1892 firefox.exe 110 PID 1892 wrote to memory of 4888 1892 firefox.exe 110 PID 1892 wrote to memory of 4888 1892 firefox.exe 110 PID 1892 wrote to memory of 4888 1892 firefox.exe 110 PID 1892 wrote to memory of 4888 1892 firefox.exe 110 PID 1892 wrote to memory of 4888 1892 firefox.exe 110 PID 1892 wrote to memory of 4888 1892 firefox.exe 110 PID 1892 wrote to memory of 4888 1892 firefox.exe 110 PID 1892 wrote to memory of 4888 1892 firefox.exe 110 PID 1892 wrote to memory of 4888 1892 firefox.exe 110 PID 1892 wrote to memory of 4888 1892 firefox.exe 110 PID 1892 wrote to memory of 4888 1892 firefox.exe 110 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\1010818001\ac58b5eed5.exe"C:\Users\Admin\AppData\Local\Temp\1010818001\ac58b5eed5.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3040 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3040 -s 16324⤵
- Program crash
PID:5504
-
-
-
C:\Users\Admin\AppData\Local\Temp\1010819001\f193c6a735.exe"C:\Users\Admin\AppData\Local\Temp\1010819001\f193c6a735.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3984
-
-
C:\Users\Admin\AppData\Local\Temp\1010820001\5c8a71cdab.exe"C:\Users\Admin\AppData\Local\Temp\1010820001\5c8a71cdab.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1184
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3080
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2408
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3700
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3452
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2032 -parentBuildID 20240401114208 -prefsHandle 1948 -prefMapHandle 1940 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {139bc85d-be84-4ac1-aa52-f932c2ce4f4a} 1892 "\\.\pipe\gecko-crash-server-pipe.1892" gpu6⤵PID:4888
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2452 -parentBuildID 20240401114208 -prefsHandle 2444 -prefMapHandle 2432 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ce269840-53f4-4ddd-b3ac-4d46bca3b1b4} 1892 "\\.\pipe\gecko-crash-server-pipe.1892" socket6⤵PID:2544
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2856 -childID 1 -isForBrowser -prefsHandle 3324 -prefMapHandle 2952 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {78312a64-52b2-4bdb-b557-4dd9871e1877} 1892 "\\.\pipe\gecko-crash-server-pipe.1892" tab6⤵PID:1592
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4028 -childID 2 -isForBrowser -prefsHandle 4020 -prefMapHandle 4016 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4b8a6dbe-4157-4a4d-aa40-19d45d73368a} 1892 "\\.\pipe\gecko-crash-server-pipe.1892" tab6⤵PID:5076
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4888 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4884 -prefMapHandle 4880 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1e01727c-deb1-4f88-b59b-1ff9be3e2646} 1892 "\\.\pipe\gecko-crash-server-pipe.1892" utility6⤵
- Checks processor information in registry
PID:5584
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5200 -childID 3 -isForBrowser -prefsHandle 5176 -prefMapHandle 5172 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c43ca6b1-5a20-4339-9698-89dd9ee4b237} 1892 "\\.\pipe\gecko-crash-server-pipe.1892" tab6⤵PID:5832
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5424 -childID 4 -isForBrowser -prefsHandle 5416 -prefMapHandle 5412 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b69f92b8-d60a-4a6d-894a-0a2ec27da85d} 1892 "\\.\pipe\gecko-crash-server-pipe.1892" tab6⤵PID:5852
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5560 -childID 5 -isForBrowser -prefsHandle 5544 -prefMapHandle 5548 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f808accd-be98-436c-aaae-faedf8f9364d} 1892 "\\.\pipe\gecko-crash-server-pipe.1892" tab6⤵PID:5888
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1010821001\5d8b495b57.exe"C:\Users\Admin\AppData\Local\Temp\1010821001\5d8b495b57.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3744
-
-
C:\Users\Admin\AppData\Local\Temp\1010822001\aec7027bba.exe"C:\Users\Admin\AppData\Local\Temp\1010822001\aec7027bba.exe"3⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:6048
-
-
C:\Users\Admin\AppData\Local\Temp\1010823001\42faf4e576.exe"C:\Users\Admin\AppData\Local\Temp\1010823001\42faf4e576.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5520
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5172
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3040 -ip 30401⤵PID:5412
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3040 -ip 30401⤵PID:5628
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5356
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2960
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
3Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ws2kncw.default-release\activity-stream.discovery_stream.json.tmp
Filesize19KB
MD5dc4c988e09f5048827ddc15a26eebd9c
SHA1e04dbfd8e6c9b9116e9da26461394bef078333f2
SHA256e59345de9a60b3453c0ec7dc05b6bd8015bc98815a520ac933832961c1574f2e
SHA5128cf3c86f821bd3a20d63e2d1ae76f685cb8477b0958895a377fbf77b509fcde669d95b22ca20566f742b88706945108bb9882417716e0abb5c73561ee472b5d2
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ws2kncw.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD5101090e5d9e8f07afd071c1da7ec92c7
SHA10737027e025254da27b9ddd06f41806c634f0e25
SHA2569a50b61e345c01a02d8c6275c55774badb082c71696ffd1c673b4926b1e96f1a
SHA51249bb527005485574cdd5af96cfd40221cbbcddfcf34b98c22b5c3158de6d108556be7f5f16b7aea1b83a150f031c5400ac35e0c2e26ed83060dda94ed6ae5738
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ws2kncw.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD58040f65bfc62e4e28c54ad7f293d5fdb
SHA1dae7870606f2893024b5f893dfe482af9c6fa086
SHA256445de6856ccb49ae651060731ad63913aab78fee4f2a6080fc4f3164b2321a63
SHA512e73d524ca05de81b03c50f2b432f75abdeb09220f4a49c2c9757bc9b6b8ee6dc75a9d205414103fc99201e74719ed3fcd37c616c2f67932538dfe947b0a8a50f
-
Filesize
1.8MB
MD58e44aaa57d6c65814f5d510414e4f787
SHA11c84e8876b9942670386dce325e84bdd6d742de6
SHA256eac2c611bc206c9b54ad4b767257e04c1b016689497f198616feb1067f4de659
SHA512bab4cd9a0ba0c47964eaf17c272a32dc679b4139704321a7cebb7e5a6c99a0cf29b6a2c6242f87892bc69d45416bbb3bda021346bcc7b756206ed2f18a4cab2e
-
Filesize
1.7MB
MD5d1f32a469b2da17906d42f14c0befb8c
SHA17f47142f04c3320e63d004bacaae19af60abce8d
SHA25620cccf36f663d70a417cad8a65f74616ba2af12464bc464cb85bbbfc87215600
SHA512be12af93aa1a9249fb0ac83c431e72bddabf44120b25f4de97e2fe2bc08728d452fbd734f62f4d22b89138d8981d5e9f137698f99c1fad0893d3aac5d9bb98c7
-
Filesize
900KB
MD5f2e5a1b4ee68843baefc6734c18d3579
SHA11db7d7779b32a593cc74274998fe342e909f3f14
SHA256d9b63db4374c010a6cb25843e0947f48a9850ebeaf716d8fe85714ecaa5e2c70
SHA5129f5eab4452360cb473746eae463610464807dfec9f5cf737d7dd79aaa24d05d40fc780a362dc50b0ced317ab3d398ef6eb3a1e3ab8a2c2226012404a1b45a1e6
-
Filesize
2.7MB
MD5b1d02b73a80c0e66c33420cab77bf107
SHA11790271fc42881f51d38d746f3e8c09c7d57b734
SHA2566dd2aeef4792ded68ce79ed476920d41a65e7c61556606af66cb38c95f5c4ffc
SHA512bc23a84c708b57ec20c8d7f1f64c78bd6834ab52055f54086c02986321d908c4cf698f6525909acdccfef641c7e0a52d8c2c929c624b832156f03699b2408686
-
Filesize
4.3MB
MD5c26e3f53542e0d2ced4c9ba5b7e01893
SHA152eeee9bc32917a4abf2485f4a06ac561ee258f1
SHA2565c5aa96869a646a5f17ccb399b6f4e594bc1a38b869361bc2ebf6b3aa5f57305
SHA512810df12f96c0f0f27be2af0199266cd8d9489ca1357d55148a84c2ea5c29832e3c4e057ff4a78ed0cbfab6e7d2bb6097ab40f6058fc126d7b3dc00c566c9ea84
-
Filesize
4.2MB
MD5127bde72d7b94787451f54c7eda3d50e
SHA10da06d5e7139dcaeccf6d3b21d58211ee47a559d
SHA25676c63bea40f16a6c32d828917e0a18b614d802c58daf5ae591d3db393db4b781
SHA5120cce483db5c2823a02b9bcfa7b88705aeec0a51785190a6444e1e7bc1f5e54c2b7045ea50aea99e2567fad6edc25a3a39575fd6b5bf3bd58207c471142ead01e
-
Filesize
1.8MB
MD5e3de94bdf55236120866adf5d4e5bb3a
SHA1a4b892f63685458c1be28e02a89c37d94b18b67d
SHA25658a7419810fcd51ee607619cfd09707c75c0dff2c074c36e880f6d69dd51737d
SHA512c4ed595a85ae10ad11fe77f8e06f195b6958f355d43895dce9ac400d24c5bd862a8b68a611ca73db030c5f49123eb7cef39d320b4317b48a6e77a3dc19b0f5ac
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin
Filesize6KB
MD58b319f6b3bb302e8dc88ded704a4632c
SHA1dd88bf6d59982edcb72a5af684d272eeef7595c3
SHA256c26b68086f39a0af98a3cedfccded4d109d80f6c6269c6b2e944e230c9a78dc0
SHA512d6caaa3f948eafab7a778ec589db8fdf2ee0d7f259995a80a7e58cbf5f8ef623eefb0ad2e51184b2c2b0233e9cbf92e530c09f7a8de79f060070d66eb68c8868
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin
Filesize8KB
MD57e7cae79656a0a8a2ed9afd1486efe44
SHA1a3dc4f6d079b72c253e946e29f12b0e4153cf46f
SHA2562156e51527b4b2d0befecc6486d4227e67c01ad18298d6c677a842c958196f4b
SHA5123bfe5b68b2f8219cf5c5d8fa17fa07d3c147788e8dad54f2e70d991565e8a30eb9cf118239c6cdf9ba6ab3723ef1601ce350c05885b310ffb859dbe6db2a597e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin
Filesize10KB
MD52439b1f4aaceef33ca80c6e4001690ed
SHA10b096c0e70b3ffe518123cf2eca939e306b0b7d0
SHA2566e1e4353e05a673fff831b2ca60f7f25d73b4e9204a9d5bcb7ec30e6a53b4fe9
SHA512d2c3107cc5a04451de39370b41f5314a7885c4caf8d808200a3500c5b4d9b3fa5d2711c4ae764006304ebec2eaed255525455226c31bbc63ae50054b83ca21dc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD575f8ca2421079a80ad54f0ceb49fceeb
SHA1a85cd7a9d55c4c5fb848d21a32e364a8b5a7b6ac
SHA256fcf845d5331e1f18a51c5558d6ea7b13abfd57924d4b051360ac1d18cf98a11d
SHA5125fbd676abd0aecd5128fba1241dc230028c8a7aaaa181a10f665e1db21015022e6d405322bb49ff5508834b6a6c58fdb3b32c77efab15421a4feea68893fa2e4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp
Filesize21KB
MD5d9690fd2ee12e5f39032525b3044ad4b
SHA1ade6abd5acae3f0a8b8df2e1db7d1f119ac0c44b
SHA2562dd34fd2780b137b34d6eee4ef31c715a8d6472037db09375619056336da5b14
SHA512a195b642774ada374abac1ba73e7e398bb5860dfc0a70c649654574525f0abb656e0b79175965c2042cd076b0b55cbf168fa46199e177afee029ab116dca8edb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD5982944fe502e44d5e54f3bf944ee809f
SHA1de4927995c50c4d51f749a77b47082bbedd7582f
SHA25653dbffa104f661bf706b3373be48ec3ab043340931933ec0b8f0875c5f5b3919
SHA5120a684596058cbc1f0c08cbbe6dd2132005ac801911d8f42223c02259734e5782d59469339244b07ec2057e28935398a0a73c48633209549551fcb5f4d2fea547
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD5706c1b26e2a3c4527c154ae460eb6165
SHA1be4efca5deb9e7c65a1f7b8cd95edadd783a8e96
SHA2565fe63598f4ca4c4d8730bc420a24463df93c28f8dc18889ba3763688f0068d31
SHA512cb72540f68e7b168528e656103a59a63c2c1b292b126959dc6e74654c7c80d9d6220c3a3df39792315175850e8f4c927517e8eff470daabcb0042841080a7d1e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\071316c6-dd13-4138-9c29-a243e3989814
Filesize659B
MD5f93a65fc72bcb2060a8910ff532745bc
SHA1ecb733a9d67ad1ea4cf23bfccc6466914820a6f1
SHA2562d549d59b1f7809b103583517f6bb8cd6300fd84a04bebd03110ea820f55bf11
SHA512e7138ee846bc3d110a5e5df33e7e3bcc261d535a43a27c2cfe7a8344371ced8cfd14998fc7c9d7359792f71cfcaa313232c77f6d45ccd495875ab6a12994344f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\49369536-3b6c-4eca-8388-177e6777cc0c
Filesize982B
MD568c2de9750b21ba3df458e699b5e662f
SHA15a62bfba3d3d5f6ef6077aa423473296956908ae
SHA25662b054bb54a5684e9f3194f33258f3a79b1d45e4ea0c45be431c2a07df9c1d9b
SHA5127ff80058f1a2fe8f87f58ec465b2ab5a5b3b57c248ce92a30c628b22eb20f81a10a2e1d35a24be340402012210212663cbefd3c005c1ab48d79b34d3476e612b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
15KB
MD5b4400dc3e290a9f5ed16a374f748c93f
SHA197c1d77ee335ff84139dc87f19d3d05547848a41
SHA256f7154dc49ac17d18934dc1fbeda26480a2de17b8be525ec38fbdb899735fb40d
SHA51283c1b3953761509a4654e7ab12e34bd71f9c915a6b64bdc25b98c6ddc0e28f5ff3328b7fdd97788e4417a612ec66a92e13afe6bfbb7109a1cddf16352212f8ee
-
Filesize
11KB
MD5dce43148398b3acbe659f274a4b8e0f1
SHA135fb83afa2307b1bc846ab227157cebcf5d0dbdb
SHA256b37817c130b30156075e1877b813ccd98479cae463e1e3fd99346cde83c48a3b
SHA512adb19c9f86b32f11f208df2126ccce6dc2a6c0e365ac6b3d5ea271dd1f59a817e808dc540ccce8de3bd979b5a5b01ad1ee60a404183e790b1319c26dbd028e13
-
Filesize
10KB
MD5746d89dfeb5105b7d7b1ce2e386c1240
SHA14f7c7df8407faba765a95530570a873450afb59a
SHA256040cf112e035255bccd1cb459fa9ad447baeff0b615a79d75923136525e58a26
SHA512e8f4a7465c157aa1662119128646ab195dc6691d48a058cb7d7c6901a19e642e41b02397d53c1c5287e5a52ade0f1685ecd56158cb02017e969731e4b6664ff4
-
Filesize
11KB
MD51ad53677b4f1fb78e6acc1ea7c12c6de
SHA1b4c5457aa3ed8b751acef39021eb3c2a584452f8
SHA256ff200b41bccc4116b03e5b00e7187dbbc8758303dcba7fdeb76c401ecb5c473b
SHA512b3516e2d671775c5debead8efe0ae0a757729011da8e138807c48089035855b7430d57076fc47d578e3c4b49be8fee4df3a54d4453a42ace11c9cf10d5d4a80f