Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2024 02:36
Static task
static1
Behavioral task
behavioral1
Sample
6f9612016e158ddaef7b0963e8b8962cd9adf36e16bd9a079b9cd5cc9ac37009.exe
Resource
win7-20240903-en
General
-
Target
6f9612016e158ddaef7b0963e8b8962cd9adf36e16bd9a079b9cd5cc9ac37009.exe
-
Size
1.9MB
-
MD5
69f7588863e91f123d7cf2fef9452c0c
-
SHA1
1c60375348fadf76013f96d4a1122a85d7004a5b
-
SHA256
6f9612016e158ddaef7b0963e8b8962cd9adf36e16bd9a079b9cd5cc9ac37009
-
SHA512
2421dfa803a4c1754f1ffa7b3ce596150fceadd33b7f67d9e0f8f6c0f09bdd2e0d88523e095af4da8777133daf1de1d5d60afc5aaa2901197cd2a4ae7eeaab78
-
SSDEEP
49152:8zQ3t4rgxVs5wqQuewfkDBuo16D3eCFhI/BlR1P:8ziteV+qQ1w0BuWo3XFaR1P
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
drum
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 42f6aa0b6f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 42f6aa0b6f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 42f6aa0b6f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 42f6aa0b6f.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 42f6aa0b6f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 42f6aa0b6f.exe -
Stealc family
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF 7c098a6482.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4a4fbf7689.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d4e60a613d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 42f6aa0b6f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6f9612016e158ddaef7b0963e8b8962cd9adf36e16bd9a079b9cd5cc9ac37009.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7c098a6482.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 66ba59cc89.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4a4fbf7689.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4a4fbf7689.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 42f6aa0b6f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6f9612016e158ddaef7b0963e8b8962cd9adf36e16bd9a079b9cd5cc9ac37009.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7c098a6482.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7c098a6482.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 66ba59cc89.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d4e60a613d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 42f6aa0b6f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6f9612016e158ddaef7b0963e8b8962cd9adf36e16bd9a079b9cd5cc9ac37009.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 66ba59cc89.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d4e60a613d.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 6f9612016e158ddaef7b0963e8b8962cd9adf36e16bd9a079b9cd5cc9ac37009.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 9 IoCs
pid Process 3932 skotes.exe 3024 7c098a6482.exe 3104 66ba59cc89.exe 1856 4a4fbf7689.exe 3944 d4e60a613d.exe 4624 69d4f66e6a.exe 5444 42f6aa0b6f.exe 5412 skotes.exe 112 skotes.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 6f9612016e158ddaef7b0963e8b8962cd9adf36e16bd9a079b9cd5cc9ac37009.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 7c098a6482.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 4a4fbf7689.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 66ba59cc89.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine d4e60a613d.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 42f6aa0b6f.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 42f6aa0b6f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 42f6aa0b6f.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\4a4fbf7689.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010856001\\4a4fbf7689.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\d4e60a613d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010857001\\d4e60a613d.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\69d4f66e6a.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010858001\\69d4f66e6a.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\42f6aa0b6f.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010859001\\42f6aa0b6f.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000a000000023ba8-100.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 2100 6f9612016e158ddaef7b0963e8b8962cd9adf36e16bd9a079b9cd5cc9ac37009.exe 3932 skotes.exe 3024 7c098a6482.exe 3104 66ba59cc89.exe 1856 4a4fbf7689.exe 3944 d4e60a613d.exe 5444 42f6aa0b6f.exe 5412 skotes.exe 112 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 6f9612016e158ddaef7b0963e8b8962cd9adf36e16bd9a079b9cd5cc9ac37009.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 5804 1856 WerFault.exe 92 5824 1856 WerFault.exe 92 -
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d4e60a613d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6f9612016e158ddaef7b0963e8b8962cd9adf36e16bd9a079b9cd5cc9ac37009.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7c098a6482.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 66ba59cc89.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4a4fbf7689.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 69d4f66e6a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 42f6aa0b6f.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 1488 taskkill.exe 5020 taskkill.exe 2336 taskkill.exe 1780 taskkill.exe 4596 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 2100 6f9612016e158ddaef7b0963e8b8962cd9adf36e16bd9a079b9cd5cc9ac37009.exe 2100 6f9612016e158ddaef7b0963e8b8962cd9adf36e16bd9a079b9cd5cc9ac37009.exe 3932 skotes.exe 3932 skotes.exe 3024 7c098a6482.exe 3024 7c098a6482.exe 3024 7c098a6482.exe 3024 7c098a6482.exe 3024 7c098a6482.exe 3024 7c098a6482.exe 3024 7c098a6482.exe 3024 7c098a6482.exe 3024 7c098a6482.exe 3024 7c098a6482.exe 3104 66ba59cc89.exe 3104 66ba59cc89.exe 1856 4a4fbf7689.exe 1856 4a4fbf7689.exe 3944 d4e60a613d.exe 3944 d4e60a613d.exe 4624 69d4f66e6a.exe 4624 69d4f66e6a.exe 5444 42f6aa0b6f.exe 5444 42f6aa0b6f.exe 4624 69d4f66e6a.exe 4624 69d4f66e6a.exe 5444 42f6aa0b6f.exe 5444 42f6aa0b6f.exe 5444 42f6aa0b6f.exe 5412 skotes.exe 5412 skotes.exe 112 skotes.exe 112 skotes.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 1488 taskkill.exe Token: SeDebugPrivilege 5020 taskkill.exe Token: SeDebugPrivilege 2336 taskkill.exe Token: SeDebugPrivilege 1780 taskkill.exe Token: SeDebugPrivilege 4596 taskkill.exe Token: SeDebugPrivilege 1572 firefox.exe Token: SeDebugPrivilege 1572 firefox.exe Token: SeDebugPrivilege 5444 42f6aa0b6f.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 2100 6f9612016e158ddaef7b0963e8b8962cd9adf36e16bd9a079b9cd5cc9ac37009.exe 4624 69d4f66e6a.exe 4624 69d4f66e6a.exe 4624 69d4f66e6a.exe 4624 69d4f66e6a.exe 4624 69d4f66e6a.exe 4624 69d4f66e6a.exe 4624 69d4f66e6a.exe 1572 firefox.exe 1572 firefox.exe 1572 firefox.exe 1572 firefox.exe 1572 firefox.exe 1572 firefox.exe 1572 firefox.exe 1572 firefox.exe 1572 firefox.exe 1572 firefox.exe 1572 firefox.exe 1572 firefox.exe 1572 firefox.exe 1572 firefox.exe 1572 firefox.exe 1572 firefox.exe 1572 firefox.exe 1572 firefox.exe 1572 firefox.exe 1572 firefox.exe 1572 firefox.exe 4624 69d4f66e6a.exe 4624 69d4f66e6a.exe 4624 69d4f66e6a.exe 4624 69d4f66e6a.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 4624 69d4f66e6a.exe 4624 69d4f66e6a.exe 4624 69d4f66e6a.exe 4624 69d4f66e6a.exe 4624 69d4f66e6a.exe 4624 69d4f66e6a.exe 4624 69d4f66e6a.exe 1572 firefox.exe 1572 firefox.exe 1572 firefox.exe 1572 firefox.exe 1572 firefox.exe 1572 firefox.exe 1572 firefox.exe 1572 firefox.exe 1572 firefox.exe 1572 firefox.exe 1572 firefox.exe 1572 firefox.exe 1572 firefox.exe 1572 firefox.exe 1572 firefox.exe 1572 firefox.exe 1572 firefox.exe 1572 firefox.exe 1572 firefox.exe 1572 firefox.exe 4624 69d4f66e6a.exe 4624 69d4f66e6a.exe 4624 69d4f66e6a.exe 4624 69d4f66e6a.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1572 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2100 wrote to memory of 3932 2100 6f9612016e158ddaef7b0963e8b8962cd9adf36e16bd9a079b9cd5cc9ac37009.exe 82 PID 2100 wrote to memory of 3932 2100 6f9612016e158ddaef7b0963e8b8962cd9adf36e16bd9a079b9cd5cc9ac37009.exe 82 PID 2100 wrote to memory of 3932 2100 6f9612016e158ddaef7b0963e8b8962cd9adf36e16bd9a079b9cd5cc9ac37009.exe 82 PID 3932 wrote to memory of 3024 3932 skotes.exe 86 PID 3932 wrote to memory of 3024 3932 skotes.exe 86 PID 3932 wrote to memory of 3024 3932 skotes.exe 86 PID 3932 wrote to memory of 3104 3932 skotes.exe 91 PID 3932 wrote to memory of 3104 3932 skotes.exe 91 PID 3932 wrote to memory of 3104 3932 skotes.exe 91 PID 3932 wrote to memory of 1856 3932 skotes.exe 92 PID 3932 wrote to memory of 1856 3932 skotes.exe 92 PID 3932 wrote to memory of 1856 3932 skotes.exe 92 PID 3932 wrote to memory of 3944 3932 skotes.exe 93 PID 3932 wrote to memory of 3944 3932 skotes.exe 93 PID 3932 wrote to memory of 3944 3932 skotes.exe 93 PID 3932 wrote to memory of 4624 3932 skotes.exe 94 PID 3932 wrote to memory of 4624 3932 skotes.exe 94 PID 3932 wrote to memory of 4624 3932 skotes.exe 94 PID 4624 wrote to memory of 1488 4624 69d4f66e6a.exe 95 PID 4624 wrote to memory of 1488 4624 69d4f66e6a.exe 95 PID 4624 wrote to memory of 1488 4624 69d4f66e6a.exe 95 PID 4624 wrote to memory of 5020 4624 69d4f66e6a.exe 97 PID 4624 wrote to memory of 5020 4624 69d4f66e6a.exe 97 PID 4624 wrote to memory of 5020 4624 69d4f66e6a.exe 97 PID 4624 wrote to memory of 2336 4624 69d4f66e6a.exe 99 PID 4624 wrote to memory of 2336 4624 69d4f66e6a.exe 99 PID 4624 wrote to memory of 2336 4624 69d4f66e6a.exe 99 PID 4624 wrote to memory of 1780 4624 69d4f66e6a.exe 101 PID 4624 wrote to memory of 1780 4624 69d4f66e6a.exe 101 PID 4624 wrote to memory of 1780 4624 69d4f66e6a.exe 101 PID 4624 wrote to memory of 4596 4624 69d4f66e6a.exe 104 PID 4624 wrote to memory of 4596 4624 69d4f66e6a.exe 104 PID 4624 wrote to memory of 4596 4624 69d4f66e6a.exe 104 PID 4624 wrote to memory of 2028 4624 69d4f66e6a.exe 106 PID 4624 wrote to memory of 2028 4624 69d4f66e6a.exe 106 PID 2028 wrote to memory of 1572 2028 firefox.exe 107 PID 2028 wrote to memory of 1572 2028 firefox.exe 107 PID 2028 wrote to memory of 1572 2028 firefox.exe 107 PID 2028 wrote to memory of 1572 2028 firefox.exe 107 PID 2028 wrote to memory of 1572 2028 firefox.exe 107 PID 2028 wrote to memory of 1572 2028 firefox.exe 107 PID 2028 wrote to memory of 1572 2028 firefox.exe 107 PID 2028 wrote to memory of 1572 2028 firefox.exe 107 PID 2028 wrote to memory of 1572 2028 firefox.exe 107 PID 2028 wrote to memory of 1572 2028 firefox.exe 107 PID 2028 wrote to memory of 1572 2028 firefox.exe 107 PID 1572 wrote to memory of 4456 1572 firefox.exe 108 PID 1572 wrote to memory of 4456 1572 firefox.exe 108 PID 1572 wrote to memory of 4456 1572 firefox.exe 108 PID 1572 wrote to memory of 4456 1572 firefox.exe 108 PID 1572 wrote to memory of 4456 1572 firefox.exe 108 PID 1572 wrote to memory of 4456 1572 firefox.exe 108 PID 1572 wrote to memory of 4456 1572 firefox.exe 108 PID 1572 wrote to memory of 4456 1572 firefox.exe 108 PID 1572 wrote to memory of 4456 1572 firefox.exe 108 PID 1572 wrote to memory of 4456 1572 firefox.exe 108 PID 1572 wrote to memory of 4456 1572 firefox.exe 108 PID 1572 wrote to memory of 4456 1572 firefox.exe 108 PID 1572 wrote to memory of 4456 1572 firefox.exe 108 PID 1572 wrote to memory of 4456 1572 firefox.exe 108 PID 1572 wrote to memory of 4456 1572 firefox.exe 108 PID 1572 wrote to memory of 4456 1572 firefox.exe 108 PID 1572 wrote to memory of 4456 1572 firefox.exe 108 PID 1572 wrote to memory of 4456 1572 firefox.exe 108 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f9612016e158ddaef7b0963e8b8962cd9adf36e16bd9a079b9cd5cc9ac37009.exe"C:\Users\Admin\AppData\Local\Temp\6f9612016e158ddaef7b0963e8b8962cd9adf36e16bd9a079b9cd5cc9ac37009.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Users\Admin\AppData\Local\Temp\1010854001\7c098a6482.exe"C:\Users\Admin\AppData\Local\Temp\1010854001\7c098a6482.exe"3⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3024
-
-
C:\Users\Admin\AppData\Local\Temp\1010855001\66ba59cc89.exe"C:\Users\Admin\AppData\Local\Temp\1010855001\66ba59cc89.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3104
-
-
C:\Users\Admin\AppData\Local\Temp\1010856001\4a4fbf7689.exe"C:\Users\Admin\AppData\Local\Temp\1010856001\4a4fbf7689.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1856 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1856 -s 16444⤵
- Program crash
PID:5804
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1856 -s 16364⤵
- Program crash
PID:5824
-
-
-
C:\Users\Admin\AppData\Local\Temp\1010857001\d4e60a613d.exe"C:\Users\Admin\AppData\Local\Temp\1010857001\d4e60a613d.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3944
-
-
C:\Users\Admin\AppData\Local\Temp\1010858001\69d4f66e6a.exe"C:\Users\Admin\AppData\Local\Temp\1010858001\69d4f66e6a.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1488
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5020
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2336
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1780
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4596
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2024 -parentBuildID 20240401114208 -prefsHandle 1960 -prefMapHandle 1800 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {154ba18f-7268-4e01-8d6a-7069eb15a531} 1572 "\\.\pipe\gecko-crash-server-pipe.1572" gpu6⤵PID:4456
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2472 -parentBuildID 20240401114208 -prefsHandle 2448 -prefMapHandle 2444 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3c90c3f5-38d5-4660-bed0-8babe9d43110} 1572 "\\.\pipe\gecko-crash-server-pipe.1572" socket6⤵PID:4040
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3156 -childID 1 -isForBrowser -prefsHandle 3008 -prefMapHandle 3140 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1200 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e34fb682-0318-4f6d-a4c8-940e330baa77} 1572 "\\.\pipe\gecko-crash-server-pipe.1572" tab6⤵PID:3148
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4076 -childID 2 -isForBrowser -prefsHandle 4072 -prefMapHandle 4068 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1200 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1b3b1f3f-00cf-4784-bf2f-9a56b0521aee} 1572 "\\.\pipe\gecko-crash-server-pipe.1572" tab6⤵PID:956
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4796 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4784 -prefMapHandle 4780 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {82188ad2-1a6f-46f4-8f99-d99df8cf953b} 1572 "\\.\pipe\gecko-crash-server-pipe.1572" utility6⤵
- Checks processor information in registry
PID:5276
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5440 -childID 3 -isForBrowser -prefsHandle 5432 -prefMapHandle 5388 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1200 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1bfa5986-1cd6-408a-9dfa-bfaefce4b401} 1572 "\\.\pipe\gecko-crash-server-pipe.1572" tab6⤵PID:3992
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5588 -childID 4 -isForBrowser -prefsHandle 5664 -prefMapHandle 5660 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1200 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d6b4d85d-4cde-4b79-8d3f-e1e6cf3007d1} 1572 "\\.\pipe\gecko-crash-server-pipe.1572" tab6⤵PID:2344
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5760 -childID 5 -isForBrowser -prefsHandle 5848 -prefMapHandle 5844 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1200 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {664551e4-7848-45fe-b6de-78982b034691} 1572 "\\.\pipe\gecko-crash-server-pipe.1572" tab6⤵PID:3656
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1010859001\42f6aa0b6f.exe"C:\Users\Admin\AppData\Local\Temp\1010859001\42f6aa0b6f.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5444
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5412
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1856 -ip 18561⤵PID:5676
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 1856 -ip 18561⤵PID:5704
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:112
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
3Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\activity-stream.discovery_stream.json.tmp
Filesize24KB
MD5dd4045c5de967f0452f89335d6f01521
SHA177f8b5806079a093c275467af7caebbdffc94cae
SHA256b4612e576cddb88ce62e8ed856fb41faf756bb8c5ff57d38fabbd5a656736e2f
SHA512d8016f933e71fa8eafa4f3777dc68d79a3a806c7f630603a550e6ea24947dad6fb9e3adb1ee3cef36f2c7cebe08895d13cf209aee4504db3b9c41cc44c144aaf
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD58f96606181cd02832b471314f3f7ee9c
SHA144d2eb1314e4922964d3115473c4c1ca45ac20b2
SHA256ed449c130437675b5b2086139a3141f06b45cb36549a3757ec9f98301b9fdfde
SHA51204a660952aa7dafb462d0c3fb2c9b3bfe58ff740d5e34bf6a34ebfe38fda2efc5d60591a7d7b20037f31126c90a0302448ddc6e17311ed0f0ead1512f23789e6
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD5d10c7fcd4b9e7ad08f6d410455c043d0
SHA157e5a5a42dbeb2b63aedce7f6671c39569765424
SHA256e79b31e4fe7d74287f1ac5eca03974196cb36e8010920df7796401afc340dd9f
SHA512b7b365772dd7bbceb41dd91847e78b641219f05535e627d08b2a1f8d139177712162e767b3a1fbfe405f0f377df5fceace419e1a6fba3c6b13dd19e09b5c0233
-
Filesize
4.2MB
MD5c94feb7d4fe260f53cc227b9833c6b7e
SHA18d1f50a705256b9b8b688ed385799ed297ca0138
SHA2569926ea0046fd1472946e4db23cd38e22ceecb5dd384ed91fc105a6c4d266ca1d
SHA512fe606f2006ba996ca9afda8b42c89e297106541ced3b2cef15689c6e2a361b69cd2275fa21ba333031befc5321f7c463e935da0ee7a18b07d12ec4f24d191ce6
-
Filesize
4.3MB
MD5a3b6fc75e9332e814f8068fc74937028
SHA1aacf898df6cdc6b7da5d97b7a5728108a1551a18
SHA256a28d11a71ff174f3f011ec4b94d0c67c6c07a367f165347ad02d7004dae27a26
SHA5123d5db5aab7952acb8bcdf670a4eaa14b606b6518219ba15ab6bc5f2c9b5feb2d0acf3c5146751965d33f5cb93bd87048f2e5f4e3928aa3358143cc682ac0bc84
-
Filesize
1.8MB
MD5fb259c5ebc086a3062f5f3dd9e2955ac
SHA114a87eb04c4339f770d55b7f64e0728c87c7b840
SHA2563af486387a0869f29281558b0d919337c181c10999865d3db09fae595b45f9c1
SHA512ebe1b3691ab0c860b2bf8bfdf28d916e29f6d96705eaf6861715f651ec8d50a3ec06f958cebfb469dde0dc70ca844c0dda891a640aa7c3b6a9e836004b2d58e9
-
Filesize
1.7MB
MD5a8d083b25843d8b182146793d9665ac5
SHA17d64723ba2c0fa76e3f1126d3583331364e8815e
SHA2564597e4ff598b3353854bce87b300cc65cab353aad474b32fb2768b6931983973
SHA5129503ec6a8959f4619108c21abf8911a721474ac486146be44362f9ceeccc5cc8a2c751546aa28215c5a0683f3785548e8ba038b74cf8fb56f8b2953afec0cd40
-
Filesize
900KB
MD550baad51f9e2989fcea4f3252e2988b5
SHA19f263b9eff9e5b7dcb2d24d6c03665c539a44bde
SHA25612ad13ced35f5d6e2d72bda3e9b5ae9ecd878a89f1bf23b546c7c03272e6aa44
SHA5125c72df3914f0368d3775db02487fec618f262df8bc2b9d7b0d34f96465aed6f18af5575ad52c8bec759bbd8cd4f2379dedf6f6926c9fdaf42a0ec3ddf823433c
-
Filesize
2.7MB
MD58d795116f27f70e8b4aba914ace93ca2
SHA1574bee1fc44d913eeb64fedfb1f25dcd51f18983
SHA256ab786f60075ddca4452dc133bc333368c8677507fe0e995f6a6a60f5a4053899
SHA512bcb29613e2e94f8447a98a0dcc10a787b6fb47e1c0fa519c71ba831b6bca03a71f06dd69ee2617181cedfc73204a9b2fb9d2a339a4e4479b5f84a0f6317d016a
-
Filesize
1.9MB
MD569f7588863e91f123d7cf2fef9452c0c
SHA11c60375348fadf76013f96d4a1122a85d7004a5b
SHA2566f9612016e158ddaef7b0963e8b8962cd9adf36e16bd9a079b9cd5cc9ac37009
SHA5122421dfa803a4c1754f1ffa7b3ce596150fceadd33b7f67d9e0f8f6c0f09bdd2e0d88523e095af4da8777133daf1de1d5d60afc5aaa2901197cd2a4ae7eeaab78
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin
Filesize8KB
MD5b0ec876753377626998a8f055ace4e8b
SHA193b902b70b9918ceef1a98bb70ac75f51abe4f33
SHA256861e1a6c48475fdae17340638684482b13069b9c287d83db2e1183d5d4323c34
SHA5128cd718ce558e6fa54035a6efb38eb384e32724ee3b94a7e4af7ee5f58bf372d81c7c1152b05278e80122be075c47a31da2c0018625fde0cae851bfcb48e66985
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin
Filesize18KB
MD555354492d9a216284bb294c5f938abde
SHA192ae606939b2ee53668400e20111097667f515b4
SHA256386754c35b206847517ec9bb3f43e98ddaa6201fa0436b5c49373ae45531043d
SHA512017b5cfe68602146088f6ed2f1b282699e20d25761262823c5d167adc7b823f60b0869bf274bea9816f9a7ee717b6cda403be7625d7fa8db5a47a081165b455e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD5ea6148ecf99a5041a07ba6e7286e1cff
SHA12c2465d0da3eb4c89530f1d303ac2d49ae328793
SHA2566f66fd015ff230458e38d80b1b5fea352302aa88ea4e3be9149684cd2aa43660
SHA5123da9f5b2a934d3da5abfb38bd70a15489176e7e92527a1620a65389d001d001b8fec94379c205a8f86b8926b71348bc351c55b047c1b879aa65a18b9cfb991f2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD597c02a0991db9bd6557d76728b68beb0
SHA1e2f3faeb30a89a119a7263def91246da3c3686c2
SHA25658bb5f9d4d6a7ce787318a09059aaae56fb0abe2f1e21021b048eeb7249b36e7
SHA512a8ef419c59b0148f1068fa9f951c9eec017d61a24f838a263bfa0863013418405fc9b41d283cb6c54fc7cdc4aa17818136d047f5be3d57c31b465341f7103c8c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize21KB
MD5e8b47723adedfa01c741ade0d31baab8
SHA142106b7743e1620aab876bba51c7068b1c70f1f0
SHA256ff563e113a2648fa9b0fb3692daf2563484dae85d9d1de745148008f48912c90
SHA512f7e61f5f30c1235a2b6a75f27f3bd31b8ca559f073014f05abe0675c095118252453f58a1d128e5dde0cf3104844ed0f4e23fd79aeaee232e174bda7d1655a20
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\1dd2e198-7e86-4b2f-ba9a-15d61ffac9ff
Filesize982B
MD562d3ff47723edfd1d0afa7931bcef117
SHA187b1989c856af3342e5c3c2fb9784cd1c2166235
SHA256ce7f5e246cbce803d46e9692b7a954b6af91ab32476a8d1029b6df14ccf4a83a
SHA512a725c835996c2dd083998984a8cea08a24163571ec09b486808f87daeb089508e75b03c3d9b64d0eaa83aa83b495dbebee0c5d357e63e9acbc39c2929c2cca53
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\d977be39-6d2c-4105-ac5b-369d280ba9da
Filesize659B
MD54fbf192ce86f4ccc704624855ad60dd4
SHA18f9068d9d640f82468b4533ae6acf0c8cf37d2ef
SHA25636401327febd38090587bdc4d7568ef5a49368640e1d1995b55f578f570b7f28
SHA512502499c7d14963740ccc97f58346219e6e2e1f0c996902cbe4073f6ea7e606bbc1da447cb498209a5abf00839f1b199f4fec93907e6f1d78a99b770c3463e357
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD597bf4d9f076382e2eb615c70253b5703
SHA147e239fc04340dc46c663a204cf601a3d49edb2c
SHA25688465405050d25b27e4fafd0d6a860b0ff34a7fbecbed5c05a4271b64cd517bc
SHA5128b65850f226c6d84d7af8aa1f894c2c9262818daf03f8bdbc8aa897bff925b002d10e1328fa66720fbdb10b9745ee2fc83ae4fd15b31b6a2fe323b6b42cfb3dd
-
Filesize
10KB
MD516b877564514e6e21c8f8a9abe0d000d
SHA1dd1267122f69afa3f21fede315499380229dc3af
SHA256f128c879f5b908cd08fa5c2fc6b15a5ab9b5af0cfcba8f303ec8cae0d03d0551
SHA512105f2444ab85b9eee04c89751fcd78b556cd888f8a11a42e788bd6297b3b667b21ed7a7d85b75ab88cee3466337dce071b92636d5d2f34e743ea8851f6132d96
-
Filesize
15KB
MD57d29ba8edfa742600511809de0583b1a
SHA15c67b5dd798a3257db243f56a2028e1a5be1f879
SHA25609e19e946df4e6973694f54f61416c754dd2a292b82fe0be09126fe3a818a8e2
SHA5126ed8c48e4946327cee58cbef9db3a49ed6279254fcee60701de0cc9922dba9bafcacb4437f75f612b9e5c1dd15a2956ef2a6d98cc304c23e2e0bc5503bdce298
-
Filesize
10KB
MD57127984db466b327a8d41435e2ddd05b
SHA116c62b63745ce18864cc7409f35e5e538b001011
SHA256a0fc82772dbe6c493ea0bc48522b0b6ef96de99b6ec18774039006cb309311c0
SHA512ca2f473b44903e516ac0ef64204885b0e632742fa736320a7321c02afe52e19f628bb0b805e906e6b19f1a39daf5539ae8a9211761931d2c211932cb44199b5a