Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2024 06:07
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240903-en
General
-
Target
file.exe
-
Size
1.8MB
-
MD5
d1b29b0ff83aa7f8e807cc52766659eb
-
SHA1
1f3b40f5a291a55ec205fac1263561eedf47cf08
-
SHA256
394b16dc5413a40962c9520922ea279976b220c1c044610ae8e8746da50d6398
-
SHA512
73f5440c328743face39aa0fb0ec3fa15c4395d52fbf6ccf514d10d49d682fafadc5147fca872ab7bb137e127bc9ac57af85513e6aa994773e39474348e57df7
-
SSDEEP
49152:xdGVoo1d1jzZZ4BpzJXYZ4WdbshaY9VS4u:XwooBjzZZ4B3Xo4eY90
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
Extracted
stealc
drum
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 2bdc4916a6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 2bdc4916a6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 2bdc4916a6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 2bdc4916a6.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 2bdc4916a6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 2bdc4916a6.exe -
Stealc family
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF 469cfbcdc9.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 854c1f93cc.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 469cfbcdc9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1240a4bf01.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 40ef26f89d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2bdc4916a6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1240a4bf01.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 854c1f93cc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 40ef26f89d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 469cfbcdc9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 854c1f93cc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 40ef26f89d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2bdc4916a6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2bdc4916a6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 469cfbcdc9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1240a4bf01.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation file.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 9 IoCs
pid Process 1952 skotes.exe 4780 854c1f93cc.exe 968 40ef26f89d.exe 1896 ee21940234.exe 2696 2bdc4916a6.exe 5264 469cfbcdc9.exe 5620 1240a4bf01.exe 1020 skotes.exe 5348 skotes.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 40ef26f89d.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 2bdc4916a6.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine file.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 854c1f93cc.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 469cfbcdc9.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 1240a4bf01.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 2bdc4916a6.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 2bdc4916a6.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\854c1f93cc.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010896001\\854c1f93cc.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\40ef26f89d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010897001\\40ef26f89d.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ee21940234.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010898001\\ee21940234.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2bdc4916a6.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010899001\\2bdc4916a6.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0009000000023cd2-68.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 1144 file.exe 1952 skotes.exe 4780 854c1f93cc.exe 968 40ef26f89d.exe 2696 2bdc4916a6.exe 5264 469cfbcdc9.exe 5620 1240a4bf01.exe 1020 skotes.exe 5348 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2996 4780 WerFault.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 469cfbcdc9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 854c1f93cc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40ef26f89d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ee21940234.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2bdc4916a6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1240a4bf01.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 4832 taskkill.exe 208 taskkill.exe 4636 taskkill.exe 1520 taskkill.exe 4044 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 1144 file.exe 1144 file.exe 1952 skotes.exe 1952 skotes.exe 4780 854c1f93cc.exe 4780 854c1f93cc.exe 968 40ef26f89d.exe 968 40ef26f89d.exe 1896 ee21940234.exe 1896 ee21940234.exe 1896 ee21940234.exe 1896 ee21940234.exe 2696 2bdc4916a6.exe 2696 2bdc4916a6.exe 2696 2bdc4916a6.exe 2696 2bdc4916a6.exe 2696 2bdc4916a6.exe 5264 469cfbcdc9.exe 5264 469cfbcdc9.exe 5264 469cfbcdc9.exe 5264 469cfbcdc9.exe 5264 469cfbcdc9.exe 5264 469cfbcdc9.exe 5264 469cfbcdc9.exe 5264 469cfbcdc9.exe 5264 469cfbcdc9.exe 5264 469cfbcdc9.exe 5620 1240a4bf01.exe 5620 1240a4bf01.exe 1020 skotes.exe 1020 skotes.exe 5348 skotes.exe 5348 skotes.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 1520 taskkill.exe Token: SeDebugPrivilege 4044 taskkill.exe Token: SeDebugPrivilege 4832 taskkill.exe Token: SeDebugPrivilege 208 taskkill.exe Token: SeDebugPrivilege 4636 taskkill.exe Token: SeDebugPrivilege 4360 firefox.exe Token: SeDebugPrivilege 4360 firefox.exe Token: SeDebugPrivilege 2696 2bdc4916a6.exe Token: SeDebugPrivilege 4360 firefox.exe Token: SeDebugPrivilege 4360 firefox.exe Token: SeDebugPrivilege 4360 firefox.exe -
Suspicious use of FindShellTrayWindow 32 IoCs
pid Process 1144 file.exe 1896 ee21940234.exe 1896 ee21940234.exe 1896 ee21940234.exe 1896 ee21940234.exe 1896 ee21940234.exe 1896 ee21940234.exe 4360 firefox.exe 4360 firefox.exe 4360 firefox.exe 4360 firefox.exe 1896 ee21940234.exe 4360 firefox.exe 4360 firefox.exe 4360 firefox.exe 4360 firefox.exe 4360 firefox.exe 4360 firefox.exe 4360 firefox.exe 4360 firefox.exe 4360 firefox.exe 4360 firefox.exe 4360 firefox.exe 4360 firefox.exe 4360 firefox.exe 4360 firefox.exe 4360 firefox.exe 4360 firefox.exe 4360 firefox.exe 1896 ee21940234.exe 1896 ee21940234.exe 1896 ee21940234.exe -
Suspicious use of SendNotifyMessage 30 IoCs
pid Process 1896 ee21940234.exe 1896 ee21940234.exe 1896 ee21940234.exe 1896 ee21940234.exe 1896 ee21940234.exe 1896 ee21940234.exe 4360 firefox.exe 4360 firefox.exe 4360 firefox.exe 4360 firefox.exe 1896 ee21940234.exe 4360 firefox.exe 4360 firefox.exe 4360 firefox.exe 4360 firefox.exe 4360 firefox.exe 4360 firefox.exe 4360 firefox.exe 4360 firefox.exe 4360 firefox.exe 4360 firefox.exe 4360 firefox.exe 4360 firefox.exe 4360 firefox.exe 4360 firefox.exe 4360 firefox.exe 4360 firefox.exe 1896 ee21940234.exe 1896 ee21940234.exe 1896 ee21940234.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4360 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1144 wrote to memory of 1952 1144 file.exe 82 PID 1144 wrote to memory of 1952 1144 file.exe 82 PID 1144 wrote to memory of 1952 1144 file.exe 82 PID 1952 wrote to memory of 4780 1952 skotes.exe 88 PID 1952 wrote to memory of 4780 1952 skotes.exe 88 PID 1952 wrote to memory of 4780 1952 skotes.exe 88 PID 1952 wrote to memory of 968 1952 skotes.exe 91 PID 1952 wrote to memory of 968 1952 skotes.exe 91 PID 1952 wrote to memory of 968 1952 skotes.exe 91 PID 1952 wrote to memory of 1896 1952 skotes.exe 95 PID 1952 wrote to memory of 1896 1952 skotes.exe 95 PID 1952 wrote to memory of 1896 1952 skotes.exe 95 PID 1896 wrote to memory of 1520 1896 ee21940234.exe 96 PID 1896 wrote to memory of 1520 1896 ee21940234.exe 96 PID 1896 wrote to memory of 1520 1896 ee21940234.exe 96 PID 1896 wrote to memory of 4044 1896 ee21940234.exe 98 PID 1896 wrote to memory of 4044 1896 ee21940234.exe 98 PID 1896 wrote to memory of 4044 1896 ee21940234.exe 98 PID 1896 wrote to memory of 4832 1896 ee21940234.exe 100 PID 1896 wrote to memory of 4832 1896 ee21940234.exe 100 PID 1896 wrote to memory of 4832 1896 ee21940234.exe 100 PID 1896 wrote to memory of 208 1896 ee21940234.exe 102 PID 1896 wrote to memory of 208 1896 ee21940234.exe 102 PID 1896 wrote to memory of 208 1896 ee21940234.exe 102 PID 1896 wrote to memory of 4636 1896 ee21940234.exe 104 PID 1896 wrote to memory of 4636 1896 ee21940234.exe 104 PID 1896 wrote to memory of 4636 1896 ee21940234.exe 104 PID 1896 wrote to memory of 3276 1896 ee21940234.exe 106 PID 1896 wrote to memory of 3276 1896 ee21940234.exe 106 PID 3276 wrote to memory of 4360 3276 firefox.exe 107 PID 3276 wrote to memory of 4360 3276 firefox.exe 107 PID 3276 wrote to memory of 4360 3276 firefox.exe 107 PID 3276 wrote to memory of 4360 3276 firefox.exe 107 PID 3276 wrote to memory of 4360 3276 firefox.exe 107 PID 3276 wrote to memory of 4360 3276 firefox.exe 107 PID 3276 wrote to memory of 4360 3276 firefox.exe 107 PID 3276 wrote to memory of 4360 3276 firefox.exe 107 PID 3276 wrote to memory of 4360 3276 firefox.exe 107 PID 3276 wrote to memory of 4360 3276 firefox.exe 107 PID 3276 wrote to memory of 4360 3276 firefox.exe 107 PID 4360 wrote to memory of 2580 4360 firefox.exe 108 PID 4360 wrote to memory of 2580 4360 firefox.exe 108 PID 4360 wrote to memory of 2580 4360 firefox.exe 108 PID 4360 wrote to memory of 2580 4360 firefox.exe 108 PID 4360 wrote to memory of 2580 4360 firefox.exe 108 PID 4360 wrote to memory of 2580 4360 firefox.exe 108 PID 4360 wrote to memory of 2580 4360 firefox.exe 108 PID 4360 wrote to memory of 2580 4360 firefox.exe 108 PID 4360 wrote to memory of 2580 4360 firefox.exe 108 PID 4360 wrote to memory of 2580 4360 firefox.exe 108 PID 4360 wrote to memory of 2580 4360 firefox.exe 108 PID 4360 wrote to memory of 2580 4360 firefox.exe 108 PID 4360 wrote to memory of 2580 4360 firefox.exe 108 PID 4360 wrote to memory of 2580 4360 firefox.exe 108 PID 4360 wrote to memory of 2580 4360 firefox.exe 108 PID 4360 wrote to memory of 2580 4360 firefox.exe 108 PID 4360 wrote to memory of 2580 4360 firefox.exe 108 PID 4360 wrote to memory of 2580 4360 firefox.exe 108 PID 4360 wrote to memory of 2580 4360 firefox.exe 108 PID 4360 wrote to memory of 2580 4360 firefox.exe 108 PID 4360 wrote to memory of 2580 4360 firefox.exe 108 PID 4360 wrote to memory of 2580 4360 firefox.exe 108 PID 4360 wrote to memory of 2580 4360 firefox.exe 108 PID 4360 wrote to memory of 2580 4360 firefox.exe 108 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\1010896001\854c1f93cc.exe"C:\Users\Admin\AppData\Local\Temp\1010896001\854c1f93cc.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4780 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4780 -s 16404⤵
- Program crash
PID:2996
-
-
-
C:\Users\Admin\AppData\Local\Temp\1010897001\40ef26f89d.exe"C:\Users\Admin\AppData\Local\Temp\1010897001\40ef26f89d.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:968
-
-
C:\Users\Admin\AppData\Local\Temp\1010898001\ee21940234.exe"C:\Users\Admin\AppData\Local\Temp\1010898001\ee21940234.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1520
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4044
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4832
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:208
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4636
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2032 -parentBuildID 20240401114208 -prefsHandle 1960 -prefMapHandle 1952 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {2f1a32f8-25be-4843-8f2a-c95b16d5718f} 4360 "\\.\pipe\gecko-crash-server-pipe.4360" gpu6⤵PID:2580
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2468 -parentBuildID 20240401114208 -prefsHandle 2460 -prefMapHandle 2356 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {746be70a-451e-4732-9d2b-da756d685e6c} 4360 "\\.\pipe\gecko-crash-server-pipe.4360" socket6⤵PID:3856
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3120 -childID 1 -isForBrowser -prefsHandle 2852 -prefMapHandle 2980 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1012 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0844cee2-7840-4d04-b99b-c466cafcf300} 4360 "\\.\pipe\gecko-crash-server-pipe.4360" tab6⤵PID:3784
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4016 -childID 2 -isForBrowser -prefsHandle 4000 -prefMapHandle 3996 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1012 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5f3c47ed-3721-41ec-a2e8-5bdc4aef9c15} 4360 "\\.\pipe\gecko-crash-server-pipe.4360" tab6⤵PID:4780
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4792 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4836 -prefMapHandle 4832 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9bf9e523-1142-497f-b45b-289ad0796f97} 4360 "\\.\pipe\gecko-crash-server-pipe.4360" utility6⤵
- Checks processor information in registry
PID:5208
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5464 -childID 3 -isForBrowser -prefsHandle 5460 -prefMapHandle 5344 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1012 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {08830904-4334-4ac2-ab1c-5d43ac3abefa} 4360 "\\.\pipe\gecko-crash-server-pipe.4360" tab6⤵PID:5816
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5180 -childID 4 -isForBrowser -prefsHandle 5176 -prefMapHandle 5328 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1012 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8210339b-f6df-4071-a274-7913b3ecf8ac} 4360 "\\.\pipe\gecko-crash-server-pipe.4360" tab6⤵PID:5856
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5804 -childID 5 -isForBrowser -prefsHandle 5792 -prefMapHandle 5796 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1012 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2f11499e-ec98-4a2a-ba33-ebf30031f2e8} 4360 "\\.\pipe\gecko-crash-server-pipe.4360" tab6⤵PID:5868
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1010899001\2bdc4916a6.exe"C:\Users\Admin\AppData\Local\Temp\1010899001\2bdc4916a6.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2696
-
-
C:\Users\Admin\AppData\Local\Temp\1010900001\469cfbcdc9.exe"C:\Users\Admin\AppData\Local\Temp\1010900001\469cfbcdc9.exe"3⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5264
-
-
C:\Users\Admin\AppData\Local\Temp\1010901001\1240a4bf01.exe"C:\Users\Admin\AppData\Local\Temp\1010901001\1240a4bf01.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5620
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4780 -ip 47801⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1020
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5348
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
3Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\activity-stream.discovery_stream.json
Filesize24KB
MD5b2fd1a9c480830a5909791bb2faa4b48
SHA16c6aa5993de98eeb73c2d39af7a4f6f5d8d934ef
SHA2566eca8be7d4cef1a3d16287a2adf29241707413239c11f3dac0373b880b7b9466
SHA512207e65ddfb410a85a10c2f517e2c6eb2d833059e19b7e7b7b6558abaac6fd662d16f73041d2cc260d8965be93befbb8a67e5f3f1a07e51ffbde84b782bc6c243
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD55ed2193ac22b23c942994608ec9a29a8
SHA1ceff4403495904558aa4f9d0e93e2bb1ee6dd88b
SHA25652f390571649f7a7a8bed349f0f049a4fe5793e8995b24e0a3ba15c9435329ca
SHA51203b06cc15eb0f30b9083c3fbc7f203c09983f6f62e5435bc66b04ac094d02f5f4c443ecd0265e3f83b9e343bbb70b0b7773a32a02a88dd5f8cc59baf46f9889c
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD5463616afb25769984326906171ada6f0
SHA1776a0a7f560a2d0895b40ac6be8c523ba81c59de
SHA256e82364458f89bfb5ca4f067fbadf50644cf7d62e5fa9855d84bd7393e9fc9325
SHA512f0314c96c905c31fbe6accf1cea21afc8f89b2012af858f702caa8acb76521adbc23cc923ed1187956c56a2c67f6f0e38a6febd81c02fd0356ea4f542dc3fda5
-
Filesize
1.8MB
MD5cc06ea6e27d6d401e66c8877b9e8c1ca
SHA1efeaabd266f1712623dbb8d9b0284950a4557bc2
SHA25656734b13664b70827d27a64f6eef528bcb68280fb44d43903f2ef7f46cbd73cb
SHA51205f7b9d2dcf2ea8e23cba6719bfec96bf669c1e94329a21840496bc966176ff050af1e48d493f3aa1a0cc35380fb89c0c3c5c1cd7c3aed276ba4e2238181a1a2
-
Filesize
1.7MB
MD5593f5a3fcba1c7432b115f9ee19bb38b
SHA12852ad10a4d10314744a5e90745c89434f8588aa
SHA256d16280ff0c61238227084cf15ed98e3a9277ee451165b43cfdeb7f57301e25ab
SHA5124cdfc93324f0585860d7542f78d12e794d30f604d0237e695bd70ec500960899795d7c473ffacb784c88d7e8fc6a417219cf03c6f9d5c1008abde2ac0164ac8d
-
Filesize
900KB
MD555f033e828bc78bc86bfcd3331417b8d
SHA1fa8caf4486d5d9d461c1cb239cb47271a963f1d9
SHA25661477c3ec5a8f73ef52b85ffabfe56e1d899f1d589daa8c713491f063ce3e42c
SHA512d924aef82d41342cf334b5f0c27a3907e5248cce17504fdfc0098f72df51099bd517204bb935a6f4ed586aa927b589aec7e721e28b00f0b9a9414664929dc42b
-
Filesize
2.7MB
MD5946d8d09cf59d09a279a0b6d31622734
SHA1bba4cbbd9843075beffa8c5b6d3e5f9930b6ef05
SHA256e3fc04478244104b8048573d3273a92557cb2204ee762dac2f689c0539555af3
SHA5121c18461c3b960ffb7c24e5b895221ee80125d30c63351e94b1fdfb0bdb6280e1e28ca436fe8d0c50f56a04431bb29d1e2d273f66874a9c9a7df14e145f358694
-
Filesize
4.2MB
MD51b02a98e354a2d529fd81d9701859f40
SHA17b7f2324df7bd662e94d9ed90426d4dd3595f2a9
SHA256eec0f8a8ad88b9d311cb716101e4a85f30354183af23ca6872aadd81425d636f
SHA5120c1d657dd6524dffadbe1883278e1de7b3e5b2c30ea1ea8caf5a188cf5d9aebe6db339462cb2f12f56b77b820c1b245ec4db83519aec62ab565fbdad6dde23a4
-
Filesize
4.2MB
MD542af26f80b61bd2b7b55d53244b2dcfa
SHA1de2a9d72e0813bf44476c92c314819aa74b6b735
SHA256020331b794615aff2393d3eb2307dd2b73e3a83ffc26f057e3bdcd28f15641b9
SHA512b5d8031d27cc3ceb259bf14050a935ba55e01609798dc0bfb263b24f4a4d4c26a6ff0ef1422313a9a17410f29b13620e60c4e91d22fcdc3382eb154d6f9c0e62
-
Filesize
1.8MB
MD5d1b29b0ff83aa7f8e807cc52766659eb
SHA11f3b40f5a291a55ec205fac1263561eedf47cf08
SHA256394b16dc5413a40962c9520922ea279976b220c1c044610ae8e8746da50d6398
SHA51273f5440c328743face39aa0fb0ec3fa15c4395d52fbf6ccf514d10d49d682fafadc5147fca872ab7bb137e127bc9ac57af85513e6aa994773e39474348e57df7
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin
Filesize10KB
MD5c34c8cde9c4b99f5d9c98bce5c2d152c
SHA177a126d6f4ec6b7713696c1d24969e78e6966554
SHA256e5c4b2f0d37c224980ef02f3ec38e87ebb98b1d4bce6d30676d68ca76d84ebeb
SHA512af6fd2b71c81f009332c131cc6a56ebecca9b2565624ab9ed322b6b7248088681231e46ebeb6eee468a499c3f1261a54dc57d1df526d7172306cb9f04a9d8f8e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin
Filesize18KB
MD570a4314f81fd78868ad88c88c7ddf1ac
SHA193b214ffcdbb1b5c22a1b3ef988238fb14e42a87
SHA25688aabc99f577fa5af2c85d1c2a7c85e5565c011bdae569384dfad3f93ea6e7ed
SHA5125d6892f44e0fac24533471c94346c7bf970e79234c353faa349b2a033e9e679ed41b10f37c2ae5a094f2222aa49dc13a217d9c21ab5c22a18bfbb9c7fd1980f0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin
Filesize6KB
MD5b51500ef8d9d6c4470b61a189e086e9f
SHA140a5b5ae424e0a7f7aecd237e79dfe1ce9445188
SHA25661bfee75c96082f3e0dc2754da5afb596bcd8060d325da64d40c5e526f7871ce
SHA512cf44088b36e13e140067162f5a54bbe1ad17b69e70c91fcdcf068d635d748b94f81729c91047737a47aab0db0294ffc13f0453489316776a3a7c7c15c7c3c5ef
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD58ec846a22648d369b0e54efcf35c84bf
SHA198a80df864a93963fbc3be8c657e9ed00c5e9e3b
SHA256a43dad64e7046439e6c75f98225fcb5bbcb87ee6e88b9564aac0ed1305b6faff
SHA512cc761cd1610f858d69d429b8b232c716e9cda3f6d385adc8684f23ec294d2f0fd34302ab3968aabb5d965970ca3faa2ce994fe81eebe7fb0e0a7ac892aba1b50
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5aa00f1fbf81802854c18de74c36bb692
SHA1618ef2ec71cec7e05d4dea51f829095a34ee3d7a
SHA2562b934222c8e967aa980c5f835461b9f5cf3bfc9f32d8ec74c42360a7c31dcf53
SHA5120bf40a3403f1d55ab3a3cf68528710e10f194799081e4925e286692d34ad43c0789a8f9016021640ae6a72f951d4232262d13629a5b5e3bd49d6b865cd60871a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5841d0a52af03a4ef8e3f12ab03a57db5
SHA18151b63123c346fcdcaace79a0d07f2a5eba6756
SHA256366d722e498d155bbf36fa96728633db67610c8440a9c2869c98bc8b58d22a03
SHA51297bedb03a209353ff8a55fdd78542c57517a15a46d97db4cd81832ceb5a3c0aecadfff3bce73f9e48b54a7827a3bdc88d8a32789394bffbc73c90528e7476fa8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD567a310fbf7174ddcb7c90b06efff31d4
SHA1dfd1318bc545c9e5ba598345f859f66933feb6b9
SHA256da8aaf1242a504355dacf68b6d585e76803a9de3f07adef829ab23332ec41000
SHA51265c406f417ae793aeedaca1997bfc74a68a8ca63eb21f64a7875b5f7f23e15f8caf4291be97f19679dbffbfa16b3bb88e9f5af6acc35fc472bbe25669c1fb304
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\02b30f32-76aa-4776-af70-3bfd9f8dae42
Filesize671B
MD5c874f55a50392994f837e42c93f7b153
SHA13dc21d9cab3778f5a80bafa73a674a3c3f8e5b89
SHA256ac979869acbf01c3af429cf1b99afdfadaf9ccd0665a0b1c4f006d5d882dbebd
SHA5129ba74061589742da2752fd09c32b32247c288e4d145db01ab30413a7573812172ec070a85faadbe564184c4f59a518ae83a644eefa99bb683050b8653d5e22e0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\b0da9cb1-08df-40c1-b667-e4afda965110
Filesize27KB
MD5fcb3510af1a7737810ba07025648750d
SHA18ab0a9c91aafa75299064120300c3750ab52c399
SHA2562201e11537c606f1fb9d15177adf759c213785a3495f0b5a45ba4b772b99cf9e
SHA512a73eb89dde36b37814cd6b238544fa3df61c4d0b656af4b12377195a1babb609f46f490d5869cfb6c9d35c6671cf9963d2deb5b2a91c7290fba76d02f4dc2321
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\cb2bf792-89bc-4901-86c7-0437e2d13f2a
Filesize982B
MD565db7ed9fa5dc93dc807cc4cda3c2872
SHA17fccc50e8759da1ef9f50e3f790ae7ad8f785b8f
SHA256270a9dfb9bf2d7d21bdb502bbe73b5f9bbe8feccdcd8672f9a7f3d2d8dc37e67
SHA512d618af7446912563faa01e0eb6f0d8d4c0b6b69edaeaabfe21f4559360e43c7327b96da7b6e23072cce3c48ac03c1dd0fe99069bfa8951d85741817ba8124664
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
15KB
MD5c58123824f91a31fee6dc52fd406e9fd
SHA1f6212d18994faf54f7c1e6e669cae5bd8f0dbcb4
SHA256e23c7270667d16cf94c8d5d0f486630ab9eb0cc63db010cca010be404b962cbb
SHA51228ffd85b8d772659aa4dd4574ce9bbea0190676ee3dcaa71256cb805567f28011c145a1a88e76edf85e57dc2ffaf5e94d108b2515464bfc551b731417cfcda81
-
Filesize
10KB
MD5ad908ff89a3abdaf362cf6f38eacfe97
SHA17e3607d7ec39a294071f14afc7ec3a472707c574
SHA256370dec2ba9a2f04a2e3fdbdbbed90e84122bb7cc46ca428760b71d1ef389b03b
SHA512bca9ad5e75ed825f658bb12dc9286c0c18ba39bf626939254ae8c5dc59e31e14be0c24527fd091a3ef9c7b07dfac18ff6375c9249fb8245f19f93b4808983892
-
Filesize
12KB
MD52a75018a27909e057c5705372a2002c2
SHA19f4625dcbc4f7682104b2527baa01fdc218c0bf2
SHA256a1eb1e2ade8811bdbaadbd35719af2aea1e21df05a0bdaf457a0c6586db84caf
SHA5123d23e8ff9773fde30437c96b0335e12bd50f895752b322662251d1ee2e14ecba2ea9762612e007b543c99c34cc00e8bb21a5729f08fc115246dadbbe28676317
-
Filesize
10KB
MD54601d6abcb2c2e88b43e09177c08f497
SHA15eba9fc7fea34b3e7277a2f204558d26655a356b
SHA256e6454c68462dad264605f23f83f7c0392b3df097db964a9676cc542519f16458
SHA5125a8386a828373cdce4586f030afcdfe6572c47c664d32ca4d29526c6fea7b2f9f7839f3b2cdc05f8613c34c604068cfdae55ed1501e6095f3db806861c11dbe0