Analysis
-
max time kernel
142s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-12-2024 02:19
Static task
static1
Behavioral task
behavioral1
Sample
5d6ad40672e983babdcec63f661fe3090b5b419f61b537223496a24225f07dc3.exe
Resource
win7-20241023-en
General
-
Target
5d6ad40672e983babdcec63f661fe3090b5b419f61b537223496a24225f07dc3.exe
-
Size
1.9MB
-
MD5
c801c7a0284db76d7e8774811061ec52
-
SHA1
856a65d648fa4f89ec16f4e68703314445b601a9
-
SHA256
5d6ad40672e983babdcec63f661fe3090b5b419f61b537223496a24225f07dc3
-
SHA512
0c2197f830aa8fc57cd0904a17847ec4d956d0aeefd76da7d594c7320cc5bdd251474df06ced72b42241c9e097395abe9374ffff317009d2d422b2ebc5835282
-
SSDEEP
49152:DAPad9zzlGb1kW6gLzW1qngDOg0ZPzh2qQM2VBj:DMa/lGv6GzW2gDOggPZQM2V
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
Extracted
stealc
drum
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" ef8ddc71d7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" ef8ddc71d7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" ef8ddc71d7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" ef8ddc71d7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" ef8ddc71d7.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection ef8ddc71d7.exe -
Stealc family
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF 231ba856a6.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 278ebadec5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b5f54673b2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ef8ddc71d7.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5d6ad40672e983babdcec63f661fe3090b5b419f61b537223496a24225f07dc3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 231ba856a6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 81a91f6730.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 20 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ef8ddc71d7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 231ba856a6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b5f54673b2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 81a91f6730.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 231ba856a6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5d6ad40672e983babdcec63f661fe3090b5b419f61b537223496a24225f07dc3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5d6ad40672e983babdcec63f661fe3090b5b419f61b537223496a24225f07dc3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 278ebadec5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 81a91f6730.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ef8ddc71d7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 278ebadec5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b5f54673b2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 5d6ad40672e983babdcec63f661fe3090b5b419f61b537223496a24225f07dc3.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 11 IoCs
pid Process 4856 skotes.exe 392 HRFuUub.exe 3444 278ebadec5.exe 1136 231ba856a6.exe 2024 skotes.exe 4104 b5f54673b2.exe 3624 81a91f6730.exe 2736 e9b342a1fb.exe 5140 ef8ddc71d7.exe 5556 skotes.exe 5424 skotes.exe -
Identifies Wine through registry keys 2 TTPs 10 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 278ebadec5.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine b5f54673b2.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 5d6ad40672e983babdcec63f661fe3090b5b419f61b537223496a24225f07dc3.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine ef8ddc71d7.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 231ba856a6.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 81a91f6730.exe -
Loads dropped DLL 1 IoCs
pid Process 392 HRFuUub.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features ef8ddc71d7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" ef8ddc71d7.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b5f54673b2.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1011132001\\b5f54673b2.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\81a91f6730.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1011133001\\81a91f6730.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e9b342a1fb.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1011134001\\e9b342a1fb.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ef8ddc71d7.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1011135001\\ef8ddc71d7.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000a000000023bb0-144.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
pid Process 972 5d6ad40672e983babdcec63f661fe3090b5b419f61b537223496a24225f07dc3.exe 4856 skotes.exe 3444 278ebadec5.exe 1136 231ba856a6.exe 2024 skotes.exe 4104 b5f54673b2.exe 3624 81a91f6730.exe 5140 ef8ddc71d7.exe 5556 skotes.exe 5424 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 5d6ad40672e983babdcec63f661fe3090b5b419f61b537223496a24225f07dc3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1436 392 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 81a91f6730.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e9b342a1fb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language e9b342a1fb.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage e9b342a1fb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HRFuUub.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 278ebadec5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b5f54673b2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ef8ddc71d7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5d6ad40672e983babdcec63f661fe3090b5b419f61b537223496a24225f07dc3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 231ba856a6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 4324 taskkill.exe 4976 taskkill.exe 4432 taskkill.exe 4320 taskkill.exe 4404 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 35 IoCs
pid Process 972 5d6ad40672e983babdcec63f661fe3090b5b419f61b537223496a24225f07dc3.exe 972 5d6ad40672e983babdcec63f661fe3090b5b419f61b537223496a24225f07dc3.exe 4856 skotes.exe 4856 skotes.exe 3444 278ebadec5.exe 3444 278ebadec5.exe 1136 231ba856a6.exe 1136 231ba856a6.exe 2024 skotes.exe 2024 skotes.exe 1136 231ba856a6.exe 1136 231ba856a6.exe 1136 231ba856a6.exe 1136 231ba856a6.exe 1136 231ba856a6.exe 1136 231ba856a6.exe 1136 231ba856a6.exe 1136 231ba856a6.exe 4104 b5f54673b2.exe 4104 b5f54673b2.exe 3624 81a91f6730.exe 3624 81a91f6730.exe 2736 e9b342a1fb.exe 2736 e9b342a1fb.exe 2736 e9b342a1fb.exe 2736 e9b342a1fb.exe 5140 ef8ddc71d7.exe 5140 ef8ddc71d7.exe 5140 ef8ddc71d7.exe 5140 ef8ddc71d7.exe 5140 ef8ddc71d7.exe 5556 skotes.exe 5556 skotes.exe 5424 skotes.exe 5424 skotes.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 4432 taskkill.exe Token: SeDebugPrivilege 4320 taskkill.exe Token: SeDebugPrivilege 4404 taskkill.exe Token: SeDebugPrivilege 4324 taskkill.exe Token: SeDebugPrivilege 4976 taskkill.exe Token: SeDebugPrivilege 1712 firefox.exe Token: SeDebugPrivilege 1712 firefox.exe Token: SeDebugPrivilege 5140 ef8ddc71d7.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 972 5d6ad40672e983babdcec63f661fe3090b5b419f61b537223496a24225f07dc3.exe 2736 e9b342a1fb.exe 2736 e9b342a1fb.exe 2736 e9b342a1fb.exe 2736 e9b342a1fb.exe 2736 e9b342a1fb.exe 2736 e9b342a1fb.exe 2736 e9b342a1fb.exe 2736 e9b342a1fb.exe 1712 firefox.exe 1712 firefox.exe 1712 firefox.exe 1712 firefox.exe 1712 firefox.exe 1712 firefox.exe 1712 firefox.exe 1712 firefox.exe 1712 firefox.exe 1712 firefox.exe 1712 firefox.exe 1712 firefox.exe 1712 firefox.exe 1712 firefox.exe 1712 firefox.exe 1712 firefox.exe 1712 firefox.exe 1712 firefox.exe 1712 firefox.exe 1712 firefox.exe 1712 firefox.exe 2736 e9b342a1fb.exe 2736 e9b342a1fb.exe 2736 e9b342a1fb.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 2736 e9b342a1fb.exe 2736 e9b342a1fb.exe 2736 e9b342a1fb.exe 2736 e9b342a1fb.exe 2736 e9b342a1fb.exe 2736 e9b342a1fb.exe 2736 e9b342a1fb.exe 2736 e9b342a1fb.exe 1712 firefox.exe 1712 firefox.exe 1712 firefox.exe 1712 firefox.exe 1712 firefox.exe 1712 firefox.exe 1712 firefox.exe 1712 firefox.exe 1712 firefox.exe 1712 firefox.exe 1712 firefox.exe 1712 firefox.exe 1712 firefox.exe 1712 firefox.exe 1712 firefox.exe 1712 firefox.exe 1712 firefox.exe 1712 firefox.exe 1712 firefox.exe 1712 firefox.exe 2736 e9b342a1fb.exe 2736 e9b342a1fb.exe 2736 e9b342a1fb.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1712 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 972 wrote to memory of 4856 972 5d6ad40672e983babdcec63f661fe3090b5b419f61b537223496a24225f07dc3.exe 82 PID 972 wrote to memory of 4856 972 5d6ad40672e983babdcec63f661fe3090b5b419f61b537223496a24225f07dc3.exe 82 PID 972 wrote to memory of 4856 972 5d6ad40672e983babdcec63f661fe3090b5b419f61b537223496a24225f07dc3.exe 82 PID 4856 wrote to memory of 392 4856 skotes.exe 83 PID 4856 wrote to memory of 392 4856 skotes.exe 83 PID 4856 wrote to memory of 392 4856 skotes.exe 83 PID 392 wrote to memory of 3472 392 HRFuUub.exe 85 PID 392 wrote to memory of 3472 392 HRFuUub.exe 85 PID 392 wrote to memory of 3472 392 HRFuUub.exe 85 PID 392 wrote to memory of 3472 392 HRFuUub.exe 85 PID 392 wrote to memory of 3472 392 HRFuUub.exe 85 PID 392 wrote to memory of 3472 392 HRFuUub.exe 85 PID 392 wrote to memory of 3472 392 HRFuUub.exe 85 PID 392 wrote to memory of 3472 392 HRFuUub.exe 85 PID 392 wrote to memory of 3472 392 HRFuUub.exe 85 PID 392 wrote to memory of 3472 392 HRFuUub.exe 85 PID 392 wrote to memory of 3472 392 HRFuUub.exe 85 PID 392 wrote to memory of 3472 392 HRFuUub.exe 85 PID 392 wrote to memory of 3472 392 HRFuUub.exe 85 PID 392 wrote to memory of 3472 392 HRFuUub.exe 85 PID 392 wrote to memory of 3472 392 HRFuUub.exe 85 PID 392 wrote to memory of 3472 392 HRFuUub.exe 85 PID 392 wrote to memory of 3472 392 HRFuUub.exe 85 PID 392 wrote to memory of 3472 392 HRFuUub.exe 85 PID 392 wrote to memory of 3472 392 HRFuUub.exe 85 PID 392 wrote to memory of 3472 392 HRFuUub.exe 85 PID 392 wrote to memory of 3472 392 HRFuUub.exe 85 PID 4856 wrote to memory of 3444 4856 skotes.exe 93 PID 4856 wrote to memory of 3444 4856 skotes.exe 93 PID 4856 wrote to memory of 3444 4856 skotes.exe 93 PID 4856 wrote to memory of 1136 4856 skotes.exe 97 PID 4856 wrote to memory of 1136 4856 skotes.exe 97 PID 4856 wrote to memory of 1136 4856 skotes.exe 97 PID 4856 wrote to memory of 4104 4856 skotes.exe 99 PID 4856 wrote to memory of 4104 4856 skotes.exe 99 PID 4856 wrote to memory of 4104 4856 skotes.exe 99 PID 4856 wrote to memory of 3624 4856 skotes.exe 100 PID 4856 wrote to memory of 3624 4856 skotes.exe 100 PID 4856 wrote to memory of 3624 4856 skotes.exe 100 PID 4856 wrote to memory of 2736 4856 skotes.exe 102 PID 4856 wrote to memory of 2736 4856 skotes.exe 102 PID 4856 wrote to memory of 2736 4856 skotes.exe 102 PID 2736 wrote to memory of 4432 2736 e9b342a1fb.exe 103 PID 2736 wrote to memory of 4432 2736 e9b342a1fb.exe 103 PID 2736 wrote to memory of 4432 2736 e9b342a1fb.exe 103 PID 2736 wrote to memory of 4320 2736 e9b342a1fb.exe 106 PID 2736 wrote to memory of 4320 2736 e9b342a1fb.exe 106 PID 2736 wrote to memory of 4320 2736 e9b342a1fb.exe 106 PID 2736 wrote to memory of 4404 2736 e9b342a1fb.exe 108 PID 2736 wrote to memory of 4404 2736 e9b342a1fb.exe 108 PID 2736 wrote to memory of 4404 2736 e9b342a1fb.exe 108 PID 2736 wrote to memory of 4324 2736 e9b342a1fb.exe 110 PID 2736 wrote to memory of 4324 2736 e9b342a1fb.exe 110 PID 2736 wrote to memory of 4324 2736 e9b342a1fb.exe 110 PID 2736 wrote to memory of 4976 2736 e9b342a1fb.exe 112 PID 2736 wrote to memory of 4976 2736 e9b342a1fb.exe 112 PID 2736 wrote to memory of 4976 2736 e9b342a1fb.exe 112 PID 2736 wrote to memory of 1804 2736 e9b342a1fb.exe 114 PID 2736 wrote to memory of 1804 2736 e9b342a1fb.exe 114 PID 1804 wrote to memory of 1712 1804 firefox.exe 115 PID 1804 wrote to memory of 1712 1804 firefox.exe 115 PID 1804 wrote to memory of 1712 1804 firefox.exe 115 PID 1804 wrote to memory of 1712 1804 firefox.exe 115 PID 1804 wrote to memory of 1712 1804 firefox.exe 115 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d6ad40672e983babdcec63f661fe3090b5b419f61b537223496a24225f07dc3.exe"C:\Users\Admin\AppData\Local\Temp\5d6ad40672e983babdcec63f661fe3090b5b419f61b537223496a24225f07dc3.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Users\Admin\AppData\Local\Temp\1011118001\HRFuUub.exe"C:\Users\Admin\AppData\Local\Temp\1011118001\HRFuUub.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"4⤵PID:3472
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 392 -s 10084⤵
- Program crash
PID:1436
-
-
-
C:\Users\Admin\AppData\Local\Temp\1011130001\278ebadec5.exe"C:\Users\Admin\AppData\Local\Temp\1011130001\278ebadec5.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3444
-
-
C:\Users\Admin\AppData\Local\Temp\1011131001\231ba856a6.exe"C:\Users\Admin\AppData\Local\Temp\1011131001\231ba856a6.exe"3⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1136
-
-
C:\Users\Admin\AppData\Local\Temp\1011132001\b5f54673b2.exe"C:\Users\Admin\AppData\Local\Temp\1011132001\b5f54673b2.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4104
-
-
C:\Users\Admin\AppData\Local\Temp\1011133001\81a91f6730.exe"C:\Users\Admin\AppData\Local\Temp\1011133001\81a91f6730.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3624
-
-
C:\Users\Admin\AppData\Local\Temp\1011134001\e9b342a1fb.exe"C:\Users\Admin\AppData\Local\Temp\1011134001\e9b342a1fb.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4432
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4320
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4404
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4324
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4976
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1712 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2000 -parentBuildID 20240401114208 -prefsHandle 1916 -prefMapHandle 1908 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {646593f5-266e-436d-a4f0-61e559ef41f8} 1712 "\\.\pipe\gecko-crash-server-pipe.1712" gpu6⤵PID:4840
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2436 -parentBuildID 20240401114208 -prefsHandle 2428 -prefMapHandle 2416 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {bff1fbc3-3b03-4747-9b46-22294df58ff8} 1712 "\\.\pipe\gecko-crash-server-pipe.1712" socket6⤵PID:1444
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2844 -childID 1 -isForBrowser -prefsHandle 2820 -prefMapHandle 3156 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b54388b1-c763-48a8-8a9c-030066124e60} 1712 "\\.\pipe\gecko-crash-server-pipe.1712" tab6⤵PID:1732
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3964 -childID 2 -isForBrowser -prefsHandle 980 -prefMapHandle 3060 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {849dcee9-7aa9-4396-8da2-552db86cc509} 1712 "\\.\pipe\gecko-crash-server-pipe.1712" tab6⤵PID:2520
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4876 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4868 -prefMapHandle 4864 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {47a36c55-8ae6-44f7-b030-8d9077b74ba2} 1712 "\\.\pipe\gecko-crash-server-pipe.1712" utility6⤵
- Checks processor information in registry
PID:5596
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5208 -childID 3 -isForBrowser -prefsHandle 5268 -prefMapHandle 5272 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5ba985e9-47d6-49d1-8050-22f32391bd26} 1712 "\\.\pipe\gecko-crash-server-pipe.1712" tab6⤵PID:5844
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5400 -childID 4 -isForBrowser -prefsHandle 5408 -prefMapHandle 5416 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {803d8878-49cd-40d6-ad63-dcda5fa471b3} 1712 "\\.\pipe\gecko-crash-server-pipe.1712" tab6⤵PID:5920
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5608 -childID 5 -isForBrowser -prefsHandle 5688 -prefMapHandle 5684 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {bba8a92e-f7cc-43a4-9da0-2ead33d896fe} 1712 "\\.\pipe\gecko-crash-server-pipe.1712" tab6⤵PID:5936
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1011135001\ef8ddc71d7.exe"C:\Users\Admin\AppData\Local\Temp\1011135001\ef8ddc71d7.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5140
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 208 -p 392 -ip 3921⤵PID:4608
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2024
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5556
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5424
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\activity-stream.discovery_stream.json
Filesize27KB
MD53b1828f25dc15d0140553cec7c861347
SHA180f067cffb978d65bae7fe420d5d121436168365
SHA2565e8b0d3d1a33ac9c051667cf83210d114e5f28bf55f622a166f10d918838fb5f
SHA512d7267035d4a5c70e3cc981fe680b232b59e38bc2c2d76344fe561ed57a9b2bde95b35925bd5e2ec76ede881250ffb97eed687234a211cc3f091843f21eb81f2e
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD5fe84bce9ecb0dab71a824935128d353e
SHA1082c4645e79c4f43a600c2f546abd8058694f1f5
SHA25638dd22290aea22919c7e8a32d78802a973314c1664daa1a6a483f666687e4305
SHA5126d0643fa6458f7115be7e68084f9c516c28084ba0004b37e886b22a66e0fe5fdf8713e673c9322f11d10a46a6ff42d60da6b1a74f86a5662ed268cd4bf002c0f
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD5aa5659f230bc9e525986a12b75065f7e
SHA1d144d26a06d4485caf3c848375efdb81a9b55ea3
SHA256e311f98249124017a3c9533d114667719bd309d62394af4d8105b4547728ff97
SHA5123f5a0c912e0cea72f91d82d9a89f97f362f1d12debad31fa1b23dd9d0ee7a5da8a5fc882326078850d952c94d51c24d2c711c4ee30b7f326f841e10545d3e123
-
Filesize
217KB
MD598da391545b4823ca67e6cc3a927dae9
SHA1d2f66837884d6d65dfe21372501cc7ba1d91ef29
SHA25612862b60140f019b0c251da7be59caf90d93eca6a30d016609cf2ff1da4652a7
SHA51259130547c169768310d57c075f2cec01a71704e9658955ef8eb1c6b2c30a24a801623f189eac14a84357aa597f5d5c96c5c9f8e96ee4ddf7bcf911dcf6bcb7b9
-
Filesize
1.9MB
MD5870c92cf89253baeaf80574aaad15adc
SHA1feefb55fa434ceb4aa10997bedfccd5597852078
SHA25665238eee07b00d608d030a601ebe0878656466084e1f55e9e41258bec1370b59
SHA512fe1cf7efa897c4c4fada01ba67ef38e7491d96870ab32354b0acbf2bb0cfa32faf914d05037d6e813fcc9b1241466acdaa178adeacc2451ea371f1189e7923c6
-
Filesize
4.2MB
MD5bd6d6662b11f947d8480c6e9815c3ef3
SHA1b5ecc2be2f54b7849b8c948bbd91cef25028ce41
SHA2567191093754402a6cc5ee460bafef859de07ac2bbf91ce56c6b56a91d3020c2e2
SHA512242a995d3c3a123401d7776b1b5b373d7d117566a897e3e8ed2fe07faaff3dfda01daca76cc60012a6480412f6118b5185926677bb61678bdb3cca336a36e8fa
-
Filesize
1.8MB
MD52426e5ac8ee0bbb03e63d7467cba1df2
SHA16cfd84d6f98b4a9d1b9d5bd724ec59cd4e8533c3
SHA2564b6f652aa6df9d8078f869655c18ac854262d94c3b3a547488a2ece1b184a7b5
SHA5125697de737cf9ee10433c57a1f0d214b0d8344ad33306b243624542ead2375e6c3a4ca5a8d4e3b806cb5bbad17b1612881b1f1064d03b18da01c5f96c57e9751c
-
Filesize
1.7MB
MD566bcb6e17b5fb8da5c8791b5fd6cadec
SHA1a7ef8cd29018bce43618425c1f211ab4d7d3c88e
SHA256cc9109ffeede3b8f3117ccb1bae82347c4506e08e2a06c3bffd15608dad16cfd
SHA51276708812f23247c7ab921adb69f1fe3c79e3bef5f2fd374021ab120644a7c4e9768b202c3283edcfb9b7b42647e86f880021eb340594b0cbc0b07938408a8aed
-
Filesize
947KB
MD54932e7c10bb027cec9de8696ecf6901d
SHA1aef2197b802633e3453dd7c221bbd889b99a5b90
SHA2566bbbe9d1fa289f9bcdfa962f16c09f8035064becce76871a60c9db490bc6df9c
SHA5129253a415c4f826b09ab01f2afb7f0b2c35534aa093209e72223ab23392822b50d3edc1949c66d1f39aa59198e9275a1b7729df6a9fb39008e9bb28c6f245c8b3
-
Filesize
2.7MB
MD53834ead0f530e99a0d9810e6866e893a
SHA1a051a6bc8dcd18dcc71af7861c8031f0bfade6c1
SHA256c7c57fb214ae177ef2cf143775c2131cbdcd8965bf55540a3422ebd03494d436
SHA512e2e0b2907f28016ec5a22976dd211a73d0ee9aeee1859740e31ca073a17a79f4624415a216939f80b4746e731b98c1066c5e854307950d8c73c4dfc67854b24c
-
Filesize
1.9MB
MD5c801c7a0284db76d7e8774811061ec52
SHA1856a65d648fa4f89ec16f4e68703314445b601a9
SHA2565d6ad40672e983babdcec63f661fe3090b5b419f61b537223496a24225f07dc3
SHA5120c2197f830aa8fc57cd0904a17847ec4d956d0aeefd76da7d594c7320cc5bdd251474df06ced72b42241c9e097395abe9374ffff317009d2d422b2ebc5835282
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin
Filesize7KB
MD568b9a8d7a51f7e17523e6eb74ecdde95
SHA1b2a81e5f9d9cd727b751945b8da0fb7c90533ae1
SHA256791f768999ecbb26714d89b2f8de86c35eca78647a5b998a5989523006c3a186
SHA512ec6bc3596141b7bbc706aff2a3f54a69b897a023b40204ddade18df09c45fc4dfb00db8cbd82b3f4c150897b307339c1363e8dbea84a22ef4bdd42d943f4ae5f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin
Filesize10KB
MD5c134332acea8760fa3e398e7c54383a4
SHA1700916f5fe5c3204b301b6277085eaf593178c97
SHA256cec02d5e63aa4fc39c111ea5487fbe5ed7c2470aae118d08ccbad6cc79ff69f1
SHA512c96408b1d15af8d0c64144a9e0728609e529e5592f327e511273c7cb729f6afb9858c1a575ee55dfcc251f9f15703abd32ec73c8bdc262b133e5eb0331b6bffc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD57d97c90d678c5df53140f3ed3614b24d
SHA1d077e54c8e2a8176578451e91facaa7bf1350bbd
SHA256e985b4ea9814c24ffd0a9e237b4e1fbfa41a3852f4f7254baa27611cc15c21d0
SHA512a6fdc56a0c3b90ad2bad9ba9e9364940761c14680db02428fbf8ad70a34af5bfb34983c4fafa6971904c6e961868e70ce074ef548b1ca3f218070866b91d64b6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD54ba3b88e336bbf372664c33ca7feba45
SHA1914ccde23e72770fae14ad37b54477621d391ff4
SHA25692cb53dbe53ca8e5c688aca159246cd32d8778ab05be29b84d6869d2dc8995ac
SHA5127b9d07a2178905b3b4f6a5453783d7dea4d318c039898ab64f288ffcdfd7e95c7cff3dad1c6b52c1e2ff959b6457e6965cc02ecf4e027b7929ea2112d6f8c6d5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\3110663e-19ed-4993-b5c3-b11736fa1731
Filesize659B
MD5fd245c68c868506439f7ec16983c9092
SHA1bd7ddc39816445a4faad9406fea40ca0b364081a
SHA256ca5bb7896a7ddae9c39482c47d929ac9ab563c98d8e297396db6bc8d75876043
SHA512ab68c55cedd87a8a18e2168c14655d19a95fbf1d8f59c796aaccdd8f15ef523f97c5e365c47d73b25c21308fcfa81761c116e1af6191322c5b8ba5c32e537f18
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\fd09ed79-52a9-4595-b0fe-4ae36b9da3d9
Filesize982B
MD51c0315d90f9b414565d95afb6a534039
SHA1e4a8d0ac4be514e2000f8d2b287606b9bb271e65
SHA25608892bafb7136df392218bbe097c152bc343af12bf8e6f846ed96a3d1bd75d22
SHA51252c13962fd40457c73b48cd12ba360872653ffc3e3143c276b8c4fdac29260b515f66d5465736fa83cb34aecaaa47aa969215f4da6527270394844280fb5c5d1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD54c5be5604dd787ac032b69012ee2ae11
SHA16827421afecb9221a117cdd92ca2977f13943d06
SHA25610c8653e26db37ff97e91755003026e8ae1bd2914a529fea5dbf02c0ab3f128f
SHA5126a8d48a1463aa9a6ff8dbdcd9c41c3853363bbb29e3f7d8fb96062be7af6f84422f50c03aee3a6ddbfaea9c4f2673614a51dafbe845b2a2a4594515808d8270d
-
Filesize
10KB
MD594c73a2c80f06d9d06114adeda4df070
SHA1323c6b9d3c129ee3bd3626937b2c1130caea4dbc
SHA25651e3133e461f32d9b57c073206d9b9f2b5bd890f60c70cb5d646a4622b03a8d4
SHA512f6736307abb4fd3a9915fb9e5b4ccfc07e692d162f52c8771a63bd2c5685ab57a8c96f1026b01a4bcd09058c42a101818a6116e714eeb54e44ffe73b4243dfc0
-
Filesize
15KB
MD5a6df03c50d076111e02145815c15fe22
SHA117d6bd50c39f5d20a49b60d499bb00a47353ea7d
SHA256ddff8c6fb5afd8470e96d0ccf33c3399a9e045099eb9488c4fa1abda916c4204
SHA512f87c2137bf928e2ca3478715cd193bdb0022970286edf78e8c1c1f18fbe38b878f281b2d2afdecc1aab342fa2142ddef08c3b61d0f97422e82820c4883e31e8f
-
Filesize
10KB
MD564ccb81d7f83a15349ee831976ff3791
SHA1b46fd9954cef82008f65cf5e13090700bf5150e8
SHA256838a512eec19b89a259849ba6ddec63955c30f18fa7abbcaa75f27e4482cd416
SHA512dc2001e6cf98d48daa4ccf979f41ccfac86b194e9a749d2b09fd70ee4fece319cfd3a9f9a48186d338208803df37f7db3cdca7baec5a84576f9d323e5d00592b
-
Filesize
126KB
MD5b48e172f02c22894ad766c52303f087a
SHA161da0ff26dfc3759f7cd79696430b52f85073141
SHA256712e46f7a4f9da7fabd0b1acd5e848527bd70b6c4444dc92c8479ac108d71753
SHA5125b8a888a9d87a4ee34f57799d3d6baf69cd556a2d1336afb109adc488a5efa1c7cd094c3785cf9af726a0c41be3a56a0ffac933b7fa7fb5dec9643f3af08bdfd