Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-12-2024 18:11
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240903-en
General
-
Target
file.exe
-
Size
3.1MB
-
MD5
15b76a99689a0848492b8f18b1bd5da2
-
SHA1
dbca0e40351e381e74197727b828b994e213c026
-
SHA256
10d2510d6fc86f243c205de49633e0962a8b6ad0c2a5da4a8b90ee7e75c961c2
-
SHA512
bd12091df875e3218af40597c7ecf982cb390faa3c6dc29f32494efc2ddc8b0753864b538c257e2fd999eade55d9a88f923e21dfcf6e6ee5a2e22f2e16a89a42
-
SSDEEP
98304:aShznfdspf/1g8w/rZ8dAaYqnG07VyMSg6Le83Bytkxa+FpI3XQt/Uqh+kbIYKjL:5h+IMKHVzE
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
https://atten-supporse.biz/api
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://atten-supporse.biz/api
https://se-blurry.biz/api
https://zinc-sneark.biz/api
Signatures
-
Amadey family
-
Gcleaner family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 1566d4b054.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 1566d4b054.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 1566d4b054.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 1566d4b054.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 1566d4b054.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 1566d4b054.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ fe9b4d0c4d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 012f267157.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1566d4b054.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5088b81a0c.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1566d4b054.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 012f267157.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5088b81a0c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1566d4b054.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5088b81a0c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion fe9b4d0c4d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion fe9b4d0c4d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 012f267157.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation file.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 9 IoCs
pid Process 3508 skotes.exe 3956 Nr9Eazj.exe 2288 fe9b4d0c4d.exe 3960 012f267157.exe 4304 9ac4020970.exe 4280 1566d4b054.exe 2004 skotes.exe 5320 5088b81a0c.exe 5136 skotes.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine fe9b4d0c4d.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 012f267157.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 1566d4b054.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 5088b81a0c.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine file.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 1566d4b054.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 1566d4b054.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fe9b4d0c4d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013490001\\fe9b4d0c4d.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\012f267157.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013491001\\012f267157.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\9ac4020970.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013492001\\9ac4020970.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\1566d4b054.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013493001\\1566d4b054.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\EdgeService = "\"C:\\Users\\Admin\\AppData\\Roaming\\EdgeService\\Nr9Eazj.exe\"" Nr9Eazj.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000a000000023cb8-86.dat autoit_exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1740 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 1552 file.exe 3508 skotes.exe 2288 fe9b4d0c4d.exe 3960 012f267157.exe 4280 1566d4b054.exe 2004 skotes.exe 5320 5088b81a0c.exe 5136 skotes.exe -
resource yara_rule behavioral2/files/0x0007000000023c9d-31.dat upx behavioral2/memory/3956-42-0x0000000000250000-0x00000000018F6000-memory.dmp upx behavioral2/memory/3956-61-0x0000000000250000-0x00000000018F6000-memory.dmp upx behavioral2/memory/3956-3175-0x0000000000250000-0x00000000018F6000-memory.dmp upx behavioral2/memory/3956-3195-0x0000000000250000-0x00000000018F6000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 4680 2288 WerFault.exe 93 4624 2288 WerFault.exe 93 4592 5320 WerFault.exe 125 -
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fe9b4d0c4d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 9ac4020970.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 9ac4020970.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 012f267157.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1566d4b054.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5088b81a0c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9ac4020970.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 28 Go-http-client/1.1 -
Kills process with taskkill 5 IoCs
pid Process 5084 taskkill.exe 5096 taskkill.exe 2240 taskkill.exe 2100 taskkill.exe 752 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 1552 file.exe 1552 file.exe 3508 skotes.exe 3508 skotes.exe 2288 fe9b4d0c4d.exe 2288 fe9b4d0c4d.exe 3960 012f267157.exe 3960 012f267157.exe 4304 9ac4020970.exe 4304 9ac4020970.exe 4280 1566d4b054.exe 4280 1566d4b054.exe 4304 9ac4020970.exe 4304 9ac4020970.exe 2004 skotes.exe 2004 skotes.exe 4280 1566d4b054.exe 4280 1566d4b054.exe 4280 1566d4b054.exe 5320 5088b81a0c.exe 5320 5088b81a0c.exe 5136 skotes.exe 5136 skotes.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 1740 tasklist.exe Token: SeDebugPrivilege 5084 taskkill.exe Token: SeDebugPrivilege 5096 taskkill.exe Token: SeDebugPrivilege 2240 taskkill.exe Token: SeDebugPrivilege 2100 taskkill.exe Token: SeDebugPrivilege 752 taskkill.exe Token: SeDebugPrivilege 1976 firefox.exe Token: SeDebugPrivilege 1976 firefox.exe Token: SeDebugPrivilege 4280 1566d4b054.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 1552 file.exe 4304 9ac4020970.exe 4304 9ac4020970.exe 4304 9ac4020970.exe 4304 9ac4020970.exe 4304 9ac4020970.exe 4304 9ac4020970.exe 4304 9ac4020970.exe 1976 firefox.exe 1976 firefox.exe 1976 firefox.exe 1976 firefox.exe 1976 firefox.exe 1976 firefox.exe 1976 firefox.exe 1976 firefox.exe 1976 firefox.exe 1976 firefox.exe 1976 firefox.exe 1976 firefox.exe 1976 firefox.exe 1976 firefox.exe 1976 firefox.exe 1976 firefox.exe 1976 firefox.exe 1976 firefox.exe 1976 firefox.exe 1976 firefox.exe 1976 firefox.exe 4304 9ac4020970.exe 4304 9ac4020970.exe 4304 9ac4020970.exe 4304 9ac4020970.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 4304 9ac4020970.exe 4304 9ac4020970.exe 4304 9ac4020970.exe 4304 9ac4020970.exe 4304 9ac4020970.exe 4304 9ac4020970.exe 4304 9ac4020970.exe 1976 firefox.exe 1976 firefox.exe 1976 firefox.exe 1976 firefox.exe 1976 firefox.exe 1976 firefox.exe 1976 firefox.exe 1976 firefox.exe 1976 firefox.exe 1976 firefox.exe 1976 firefox.exe 1976 firefox.exe 1976 firefox.exe 1976 firefox.exe 1976 firefox.exe 1976 firefox.exe 1976 firefox.exe 1976 firefox.exe 1976 firefox.exe 1976 firefox.exe 4304 9ac4020970.exe 4304 9ac4020970.exe 4304 9ac4020970.exe 4304 9ac4020970.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1976 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1552 wrote to memory of 3508 1552 file.exe 82 PID 1552 wrote to memory of 3508 1552 file.exe 82 PID 1552 wrote to memory of 3508 1552 file.exe 82 PID 3508 wrote to memory of 3956 3508 skotes.exe 90 PID 3508 wrote to memory of 3956 3508 skotes.exe 90 PID 3956 wrote to memory of 1740 3956 Nr9Eazj.exe 91 PID 3956 wrote to memory of 1740 3956 Nr9Eazj.exe 91 PID 3508 wrote to memory of 2288 3508 skotes.exe 93 PID 3508 wrote to memory of 2288 3508 skotes.exe 93 PID 3508 wrote to memory of 2288 3508 skotes.exe 93 PID 3508 wrote to memory of 3960 3508 skotes.exe 99 PID 3508 wrote to memory of 3960 3508 skotes.exe 99 PID 3508 wrote to memory of 3960 3508 skotes.exe 99 PID 3508 wrote to memory of 4304 3508 skotes.exe 100 PID 3508 wrote to memory of 4304 3508 skotes.exe 100 PID 3508 wrote to memory of 4304 3508 skotes.exe 100 PID 4304 wrote to memory of 5084 4304 9ac4020970.exe 102 PID 4304 wrote to memory of 5084 4304 9ac4020970.exe 102 PID 4304 wrote to memory of 5084 4304 9ac4020970.exe 102 PID 4304 wrote to memory of 5096 4304 9ac4020970.exe 104 PID 4304 wrote to memory of 5096 4304 9ac4020970.exe 104 PID 4304 wrote to memory of 5096 4304 9ac4020970.exe 104 PID 4304 wrote to memory of 2240 4304 9ac4020970.exe 106 PID 4304 wrote to memory of 2240 4304 9ac4020970.exe 106 PID 4304 wrote to memory of 2240 4304 9ac4020970.exe 106 PID 4304 wrote to memory of 2100 4304 9ac4020970.exe 108 PID 4304 wrote to memory of 2100 4304 9ac4020970.exe 108 PID 4304 wrote to memory of 2100 4304 9ac4020970.exe 108 PID 4304 wrote to memory of 752 4304 9ac4020970.exe 110 PID 4304 wrote to memory of 752 4304 9ac4020970.exe 110 PID 4304 wrote to memory of 752 4304 9ac4020970.exe 110 PID 4304 wrote to memory of 1940 4304 9ac4020970.exe 112 PID 4304 wrote to memory of 1940 4304 9ac4020970.exe 112 PID 1940 wrote to memory of 1976 1940 firefox.exe 113 PID 1940 wrote to memory of 1976 1940 firefox.exe 113 PID 1940 wrote to memory of 1976 1940 firefox.exe 113 PID 1940 wrote to memory of 1976 1940 firefox.exe 113 PID 1940 wrote to memory of 1976 1940 firefox.exe 113 PID 1940 wrote to memory of 1976 1940 firefox.exe 113 PID 1940 wrote to memory of 1976 1940 firefox.exe 113 PID 1940 wrote to memory of 1976 1940 firefox.exe 113 PID 1940 wrote to memory of 1976 1940 firefox.exe 113 PID 1940 wrote to memory of 1976 1940 firefox.exe 113 PID 1940 wrote to memory of 1976 1940 firefox.exe 113 PID 1976 wrote to memory of 4192 1976 firefox.exe 114 PID 1976 wrote to memory of 4192 1976 firefox.exe 114 PID 1976 wrote to memory of 4192 1976 firefox.exe 114 PID 1976 wrote to memory of 4192 1976 firefox.exe 114 PID 1976 wrote to memory of 4192 1976 firefox.exe 114 PID 1976 wrote to memory of 4192 1976 firefox.exe 114 PID 1976 wrote to memory of 4192 1976 firefox.exe 114 PID 1976 wrote to memory of 4192 1976 firefox.exe 114 PID 1976 wrote to memory of 4192 1976 firefox.exe 114 PID 1976 wrote to memory of 4192 1976 firefox.exe 114 PID 1976 wrote to memory of 4192 1976 firefox.exe 114 PID 1976 wrote to memory of 4192 1976 firefox.exe 114 PID 1976 wrote to memory of 4192 1976 firefox.exe 114 PID 1976 wrote to memory of 4192 1976 firefox.exe 114 PID 1976 wrote to memory of 4192 1976 firefox.exe 114 PID 1976 wrote to memory of 4192 1976 firefox.exe 114 PID 1976 wrote to memory of 4192 1976 firefox.exe 114 PID 1976 wrote to memory of 4192 1976 firefox.exe 114 PID 1976 wrote to memory of 4192 1976 firefox.exe 114 PID 1976 wrote to memory of 4192 1976 firefox.exe 114 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Users\Admin\AppData\Local\Temp\1013489001\Nr9Eazj.exe"C:\Users\Admin\AppData\Local\Temp\1013489001\Nr9Eazj.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Windows\system32\tasklist.exetasklist.exe /fo csv /nh4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1740
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013490001\fe9b4d0c4d.exe"C:\Users\Admin\AppData\Local\Temp\1013490001\fe9b4d0c4d.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2288 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2288 -s 14764⤵
- Program crash
PID:4680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2288 -s 14964⤵
- Program crash
PID:4624
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013491001\012f267157.exe"C:\Users\Admin\AppData\Local\Temp\1013491001\012f267157.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3960
-
-
C:\Users\Admin\AppData\Local\Temp\1013492001\9ac4020970.exe"C:\Users\Admin\AppData\Local\Temp\1013492001\9ac4020970.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5084
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5096
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2240
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2100
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:752
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1972 -parentBuildID 20240401114208 -prefsHandle 1892 -prefMapHandle 1884 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {3657a4a6-73fa-4062-8d6b-fab32311851f} 1976 "\\.\pipe\gecko-crash-server-pipe.1976" gpu6⤵PID:4192
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2464 -parentBuildID 20240401114208 -prefsHandle 2456 -prefMapHandle 2452 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {dd8ea198-1ab5-4e14-abce-7a5d44c0bd30} 1976 "\\.\pipe\gecko-crash-server-pipe.1976" socket6⤵PID:4876
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3068 -childID 1 -isForBrowser -prefsHandle 2844 -prefMapHandle 3104 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e7b252ef-5adf-4262-98d4-571ef50a5462} 1976 "\\.\pipe\gecko-crash-server-pipe.1976" tab6⤵PID:3988
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3924 -childID 2 -isForBrowser -prefsHandle 3900 -prefMapHandle 2776 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a46732de-c9af-4a9e-a701-2f05ce09016c} 1976 "\\.\pipe\gecko-crash-server-pipe.1976" tab6⤵PID:4612
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4800 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4784 -prefMapHandle 4700 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f4b04736-f3e4-4851-a114-a3ceeb983a30} 1976 "\\.\pipe\gecko-crash-server-pipe.1976" utility6⤵
- Checks processor information in registry
PID:2712
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5440 -childID 3 -isForBrowser -prefsHandle 5452 -prefMapHandle 5448 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ee25fecc-3626-4774-b9b4-0f78ec5ba76a} 1976 "\\.\pipe\gecko-crash-server-pipe.1976" tab6⤵PID:4060
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5600 -childID 4 -isForBrowser -prefsHandle 5676 -prefMapHandle 5672 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e1b6d31e-ac61-4b3f-9d9a-b8597f408539} 1976 "\\.\pipe\gecko-crash-server-pipe.1976" tab6⤵PID:4064
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5828 -childID 5 -isForBrowser -prefsHandle 5580 -prefMapHandle 5584 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a694df80-8d5f-4b22-a128-43c73c87674a} 1976 "\\.\pipe\gecko-crash-server-pipe.1976" tab6⤵PID:1700
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013493001\1566d4b054.exe"C:\Users\Admin\AppData\Local\Temp\1013493001\1566d4b054.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4280
-
-
C:\Users\Admin\AppData\Local\Temp\1013494001\5088b81a0c.exe"C:\Users\Admin\AppData\Local\Temp\1013494001\5088b81a0c.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5320 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5320 -s 6364⤵
- Program crash
PID:4592
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2288 -ip 22881⤵PID:4876
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2288 -ip 22881⤵PID:4872
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 5320 -ip 53201⤵PID:5128
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5136
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\activity-stream.discovery_stream.json
Filesize19KB
MD5e465e85fe0f92680dc30bda76b62cc72
SHA158b19ec9a586df236d0a1adfb8e2ac7e04e52d46
SHA2565cd06c1c125e92b25faeca69dbcf23608b964c80340ecee33660fed0093f6062
SHA5126e493a1a9900f903291eeba76d857040b0d7f0fd23d0a621ee095cc4bd0574b974cb61f9c1b49194461693360b15d1a302f2d0801259c0fe062c46e4c0af5c58
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD59957ef3619d375d9f912221041766a3b
SHA15d49a5925e242fc4684d0a1ddd41edec198641aa
SHA256d51a87aa5ce2f20aaf90b116bda6b6c319145d01d7c79319e197caa53758e8da
SHA5121d2ded0f5268f7c9821a9b06a3895dc263969ac81f1f1fb3ea3771a09dcbfb6007d67b04ee30ac39af345b0d96e62814bf3a90b82136bae44982016a8d1ffac8
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
8.2MB
MD5205eba033c31a42d83971958eee8d0eb
SHA1e3d5f4892f18e97e4be26c7e0e92d2d8411f2fe0
SHA256ff9bc3cfec4322f8bdb6ca3c81a9e0d602e4a660a9d85aa76c76b18330515d4d
SHA512ae5198ff4e4324880340a6ee116db2fbb0cfb7d8cf1fd6dd60bc89df33ab53a320b46aaf547dd28f219207865c5973bbd25a8ac7dfc71b576c5373cceb90ada0
-
Filesize
1.8MB
MD5703a84810033aeab199c1b46fffde31b
SHA1b5363255d341d8921c5770a566f6f3d20a95518a
SHA256f245110e248e12775f50030e542927b3715a036a7654105db5d90c635479df58
SHA5128cce3dae6925f98ed2d8b927d078ffadc9f2c6d73a713f25664b07b4f6c1d9a93c82f46ae327cf347e8592331d00b34fe47f8232c9c322673cb54248430edc28
-
Filesize
1.7MB
MD5d0584805ca5a4fcda45df503b9c227c0
SHA190658321961fb010c1c92614eabd676f92580f6d
SHA25650eb3f27437e30fa3ff726ae912b9d1b356c44ca1835622ff8a186bc9655d6e5
SHA5123b49802cfa31f399dc4cd57334172b304f39b2e5e632a42c312f9dd5558a88d4c3da0222d0d0193e568f71c899aa673bce00e03b4349664b5dfcbd7df61b8a1e
-
Filesize
946KB
MD53fa4148c329bd334b7628bb195593c0f
SHA1d143c82cae19785883c6f536118ff79e1fb3d0b3
SHA256f9d0e8627c8c5c82dd765140dcd6351036fb2a1c666bfb41c1d1b0e531524da5
SHA512a6adb3fb0396a459c2ac5c0fd25f3e7f8e7806e10a70f0075dae8b4c029714824652225b784735849bed831141cf285b9a6d0c6362beb31b1eee0e8e9ea749f0
-
Filesize
2.7MB
MD5350311a635a242daebd33ba8596f9bbc
SHA121eab7f8190e6ed28be5d3279596f0fc7d247c1a
SHA2568b19d3bd5ac3603f9972e2581626760e0c765a419f0172d6371489886470edd5
SHA51207f07a2ef4bcd212018c042bfc2aaa04d95e67442a02504f1862c6d276c6663f6827cfc1647c0e79974d687189f283dac48f89f159c60e9901882627060b657a
-
Filesize
1.9MB
MD5f7a47830f40cc4b6a06d777fab2f42f9
SHA15302227fbac3aea59d3aa18dc1e429ebe448c732
SHA2568a331ca76c2b919f30406ff66a92db0e27ae6af9725749a80959b42656871536
SHA51267251194db27bbb06cc3638c7fd453cc66f54b6e9aa1421cbd05ba5aa410f333b83f5587186bbd0b2026f05da1119eed68c8cfa64511b9c4d81d9a13d9634f1b
-
Filesize
3.1MB
MD515b76a99689a0848492b8f18b1bd5da2
SHA1dbca0e40351e381e74197727b828b994e213c026
SHA25610d2510d6fc86f243c205de49633e0962a8b6ad0c2a5da4a8b90ee7e75c961c2
SHA512bd12091df875e3218af40597c7ecf982cb390faa3c6dc29f32494efc2ddc8b0753864b538c257e2fd999eade55d9a88f923e21dfcf6e6ee5a2e22f2e16a89a42
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin
Filesize12KB
MD509949e07d7f78901f266e200f464a274
SHA18a7b1ffe81e958578e70ae79aa18b34f2c7b5490
SHA256326408fff0745648732b7992035c186ef81d4ed3b6ed6f6d364fc7c43ab6c7d9
SHA51245e9f7f25dda3d11eb0eaa5c457234167f7e6892bb8062f4d88794d3da8463b6a91d4450f259320d65afa9f4a9e5f36aa8e5bb68961a6d581caa92ff3f768817
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5fd226b7a9082cba9322ff9b260393ad1
SHA1d10cf4b82f980c83ba1d466260b760e4b170aab2
SHA256d13e91a7b670c8a7fabd3fdd4586bfe207a5a2e3400fe5d3f80a64cd3bd3f959
SHA512094d1d2d28886fcc26541e072a2aa77d0e049c42fecf326e5e3f8f6456c61dae2a2ed4793fb4e75f536f8bf2af51f147f2c1bbadd1aacb37b45737c0868e8343
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD55b14f42286ef634fa902cab0241f5786
SHA1c17f5fa9a5a5a09abdbcb3587be155adaeb85e87
SHA256c80f544e4633d9ae1855ef6b3e2e721bbf0b39cff6cd2143def368d8c7dd60bb
SHA512ca5b4189e181eca8d760a39310a8e8838c3c68a0124b39c312510fe12e592eacdf7ce48618752772c2c034cd44e4016e9125c4863a3f65dc16e6ea639eba797d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD53a8b4df6e591bbd552b55e35aa6c4fe5
SHA10b1a3623eb1ab4fab9575a8cce772b1c00f7ca44
SHA2567bc899d9890c7b05c35e8d7e24019bb3f32a21bfe3fb9f7c91b4a96ddc5a1561
SHA5127154231e159dd2327ed9d99ca5cd5b6e656075a4b9082ac8b9ef3f08901b411d04bf81a648e44913a300f529b7de7b9b0f43204d99323158ce28aa8223e049d6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD59ce2451dad88585c4068d0b079f78671
SHA15576685233e66ed9876c4d9106f90b8230c00414
SHA256e92d3ba51a232cb163ed6cef044fa37c9e2862b4e062745da8d69050df7559fb
SHA512fd4afe4f9fe00a20cce9bc33ac3a75320792ae34ceb258c13ba0929ab0e853a34bb7a851bcabe111294403f577a3038dbaa6355a52bc776258677ad91683eb09
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\1aa0879e-10e4-4cbd-adc9-bc670418480b
Filesize982B
MD5e69d5df59149dbcba95a9dc8a3cb9ac0
SHA10fbf2b07ebbe8b17fd3e8b0cc2d8d6ee6962181e
SHA256ebcc043d1873a8c91f00905ce1a64ae02f946c6b99c3ac0fe0b6b9dbeaec33b3
SHA5123e15cb70254f77d65f68e2bd53ad31d95daea9258d66b96ab4d3219ed9653de33d0ce0d5a70c8378d1dbab9029c644c3d2d03df16917b7c2879badd7710f723b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\4c40e85e-68c4-4d1f-bf2f-61225f86aa7d
Filesize671B
MD5845c3d95430f22c9dfbdcca748d75428
SHA15147667774d4bec925fba93da4b3ad06288ae702
SHA256d69139e8d48e6f0c1325f4566165a00aa5b35b4ae8373d2ecf8992b6f2188e23
SHA512e5733aa393198d599e7d304b1b2abb4fc49b3b8a3fd691eaec7d4db3bf3a7932552d46cefc3e6e8cb08dcb51a599c6bf0ebf207bc3cb44cb02247550c94fee82
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\a55b3118-ad2a-420e-83e0-605237290897
Filesize25KB
MD5291ab18af045c6ca658eefa9abcd8321
SHA1ee0039b89b03fb65d2d86e6e8fad1aae025ad202
SHA2565c058cacfca443f1e5a262803d8c9e3829a41ec6c0617470c365ec59cdd5b8b3
SHA512d601338a34c34470798e0a2b465734296258c42611c0a55e0aa2fed70eb7ff2f160c7c59fbf0640aba629e0813016f2415ee9464c872ec92279c067afcdd3e4e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD5bf018f4fb0d3c071aeb98a906ea6f77a
SHA194ee5bf43be59aeb74791626151839b26eb3156d
SHA256c9419321857bdc112ef7648bbaddd7b4f90b2843c151536fce2427450894284f
SHA512e0e90317343b5f4ff78e09b65092f169963c7369687aac16275d2077e8867bb4522bf143bb707a7581080cb8f5c0bbf09f41ef47ca7d4073fac54588fc1ebff0
-
Filesize
11KB
MD58bccc96e164495436a25e4df3ab31fb5
SHA1361e41820343130dddc66611dc62671b0b61ab37
SHA2563b27f880253979b824e195d314d97563d8d1549dc44eba5905640d4fad058ab1
SHA512c3dbee82edf45508e9816839e5bd2a8bda7dcb5e9ecce43fbcbe5bacf5c52109c9f98846f298f5bdf5959739d8c29724618b9dde2680d0d15e3d895a25004c56
-
Filesize
11KB
MD529f18f3146dbc2cb1ebf07e3cc2328cd
SHA132578b0d7875b8eecb1a2db183ba1dbd9f0d1ee9
SHA2564c1bcb02f4d64b09a9c5d26d6ecfc7f7fa0ae26acb901f819be7adab9477b9bc
SHA51201b53f2fc3a9bc9fc784547be83602482fe2d28d72bfbae586930f0388d0c836ca06fb4c830f3008a017c6fe957d5f5fa8c52d6e3a5f0b4ba1c2790f6eca1337