Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 18:11
Static task
static1
General
-
Target
22855d02fcd9dd28c0c47defcd45baf6.exe
-
Size
5.5MB
-
MD5
22855d02fcd9dd28c0c47defcd45baf6
-
SHA1
ee0ecf0cc237907e9f8cb835e423b710ccf98b7d
-
SHA256
db5e1f211e4989246fb82f9eaf04a521be5a6322ae6e8b4d0430fc78139b79cb
-
SHA512
d44ec968b76db290b5e1ef574f53c2e45d68fb2122513322b874d1e8dada673994a5d6147cc55ab55e369087be2e2058c743befb307da951b5c72ccfc368aa59
-
SSDEEP
98304:oPtGpge0yv1hkGAcHEGmr2J3FCMNDPBnTVqHdqR83g2Fj0T2TfoINgjEKtr:YJe0Xl9GmdMNDPfidqy3/4C/kt
Malware Config
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://founpiuer.store/api
https://navygenerayk.store/api
https://uppermixturyz.site/api
https://bringlanejk.site/api
https://honerstyzu.site/api
https://plaintifuf.site/api
https://moeventmynz.site/api
https://unityshootsz.site/api
https://monopuncdz.site/api
https://reinfomarbke.site/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" e5add46950.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" e5add46950.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" e5add46950.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection e5add46950.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" e5add46950.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" e5add46950.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e5266f694d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2l7025.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4e702J.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e5add46950.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3C12L.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 98530fb23d.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3C12L.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2l7025.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 98530fb23d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 98530fb23d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e5266f694d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e5add46950.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2l7025.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e5266f694d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e5add46950.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4e702J.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4e702J.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3C12L.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 4e702J.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 13 IoCs
pid Process 4512 L2n14.exe 3388 2l7025.exe 2500 3C12L.exe 3172 4e702J.exe 1204 skotes.exe 4744 1123.exe 1116 98530fb23d.exe 2400 1123.exe 1156 e5266f694d.exe 5088 8930c3238d.exe 3692 e5add46950.exe 6288 skotes.exe 6460 skotes.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 2l7025.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 4e702J.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 98530fb23d.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine e5266f694d.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 3C12L.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine e5add46950.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features e5add46950.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" e5add46950.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 22855d02fcd9dd28c0c47defcd45baf6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" L2n14.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\98530fb23d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1003914001\\98530fb23d.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e5266f694d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1003915001\\e5266f694d.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\8930c3238d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1003916001\\8930c3238d.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e5add46950.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1003917001\\e5add46950.exe" skotes.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000b000000023b89-104.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 3388 2l7025.exe 2500 3C12L.exe 3172 4e702J.exe 1204 skotes.exe 1116 98530fb23d.exe 1156 e5266f694d.exe 3692 e5add46950.exe 6288 skotes.exe 6460 skotes.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4744 set thread context of 2400 4744 1123.exe 102 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 4e702J.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3312 4744 WerFault.exe 97 -
System Location Discovery: System Language Discovery 1 TTPs 17 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4e702J.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 98530fb23d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8930c3238d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 22855d02fcd9dd28c0c47defcd45baf6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e5add46950.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e5266f694d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language L2n14.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2l7025.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3C12L.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 2680 taskkill.exe 928 taskkill.exe 1072 taskkill.exe 2244 taskkill.exe 1988 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 3388 2l7025.exe 3388 2l7025.exe 2500 3C12L.exe 2500 3C12L.exe 3172 4e702J.exe 3172 4e702J.exe 1204 skotes.exe 1204 skotes.exe 1116 98530fb23d.exe 1116 98530fb23d.exe 1156 e5266f694d.exe 1156 e5266f694d.exe 5088 8930c3238d.exe 5088 8930c3238d.exe 3692 e5add46950.exe 3692 e5add46950.exe 5088 8930c3238d.exe 5088 8930c3238d.exe 3692 e5add46950.exe 3692 e5add46950.exe 3692 e5add46950.exe 6288 skotes.exe 6288 skotes.exe 6460 skotes.exe 6460 skotes.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 2680 taskkill.exe Token: SeDebugPrivilege 928 taskkill.exe Token: SeDebugPrivilege 1072 taskkill.exe Token: SeDebugPrivilege 2244 taskkill.exe Token: SeDebugPrivilege 1988 taskkill.exe Token: SeDebugPrivilege 1472 firefox.exe Token: SeDebugPrivilege 1472 firefox.exe Token: SeDebugPrivilege 3692 e5add46950.exe Token: SeDebugPrivilege 1472 firefox.exe Token: SeDebugPrivilege 1472 firefox.exe Token: SeDebugPrivilege 1472 firefox.exe -
Suspicious use of FindShellTrayWindow 32 IoCs
pid Process 3172 4e702J.exe 5088 8930c3238d.exe 5088 8930c3238d.exe 5088 8930c3238d.exe 5088 8930c3238d.exe 5088 8930c3238d.exe 5088 8930c3238d.exe 5088 8930c3238d.exe 1472 firefox.exe 1472 firefox.exe 1472 firefox.exe 1472 firefox.exe 1472 firefox.exe 1472 firefox.exe 1472 firefox.exe 1472 firefox.exe 1472 firefox.exe 1472 firefox.exe 1472 firefox.exe 1472 firefox.exe 1472 firefox.exe 1472 firefox.exe 1472 firefox.exe 1472 firefox.exe 1472 firefox.exe 1472 firefox.exe 1472 firefox.exe 1472 firefox.exe 1472 firefox.exe 5088 8930c3238d.exe 5088 8930c3238d.exe 5088 8930c3238d.exe -
Suspicious use of SendNotifyMessage 30 IoCs
pid Process 5088 8930c3238d.exe 5088 8930c3238d.exe 5088 8930c3238d.exe 5088 8930c3238d.exe 5088 8930c3238d.exe 5088 8930c3238d.exe 5088 8930c3238d.exe 1472 firefox.exe 1472 firefox.exe 1472 firefox.exe 1472 firefox.exe 1472 firefox.exe 1472 firefox.exe 1472 firefox.exe 1472 firefox.exe 1472 firefox.exe 1472 firefox.exe 1472 firefox.exe 1472 firefox.exe 1472 firefox.exe 1472 firefox.exe 1472 firefox.exe 1472 firefox.exe 1472 firefox.exe 1472 firefox.exe 1472 firefox.exe 1472 firefox.exe 5088 8930c3238d.exe 5088 8930c3238d.exe 5088 8930c3238d.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1472 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1812 wrote to memory of 4512 1812 22855d02fcd9dd28c0c47defcd45baf6.exe 84 PID 1812 wrote to memory of 4512 1812 22855d02fcd9dd28c0c47defcd45baf6.exe 84 PID 1812 wrote to memory of 4512 1812 22855d02fcd9dd28c0c47defcd45baf6.exe 84 PID 4512 wrote to memory of 3388 4512 L2n14.exe 87 PID 4512 wrote to memory of 3388 4512 L2n14.exe 87 PID 4512 wrote to memory of 3388 4512 L2n14.exe 87 PID 4512 wrote to memory of 2500 4512 L2n14.exe 89 PID 4512 wrote to memory of 2500 4512 L2n14.exe 89 PID 4512 wrote to memory of 2500 4512 L2n14.exe 89 PID 1812 wrote to memory of 3172 1812 22855d02fcd9dd28c0c47defcd45baf6.exe 90 PID 1812 wrote to memory of 3172 1812 22855d02fcd9dd28c0c47defcd45baf6.exe 90 PID 1812 wrote to memory of 3172 1812 22855d02fcd9dd28c0c47defcd45baf6.exe 90 PID 3172 wrote to memory of 1204 3172 4e702J.exe 93 PID 3172 wrote to memory of 1204 3172 4e702J.exe 93 PID 3172 wrote to memory of 1204 3172 4e702J.exe 93 PID 1204 wrote to memory of 4744 1204 skotes.exe 97 PID 1204 wrote to memory of 4744 1204 skotes.exe 97 PID 1204 wrote to memory of 4744 1204 skotes.exe 97 PID 1204 wrote to memory of 1116 1204 skotes.exe 101 PID 1204 wrote to memory of 1116 1204 skotes.exe 101 PID 1204 wrote to memory of 1116 1204 skotes.exe 101 PID 4744 wrote to memory of 2400 4744 1123.exe 102 PID 4744 wrote to memory of 2400 4744 1123.exe 102 PID 4744 wrote to memory of 2400 4744 1123.exe 102 PID 4744 wrote to memory of 2400 4744 1123.exe 102 PID 4744 wrote to memory of 2400 4744 1123.exe 102 PID 4744 wrote to memory of 2400 4744 1123.exe 102 PID 4744 wrote to memory of 2400 4744 1123.exe 102 PID 4744 wrote to memory of 2400 4744 1123.exe 102 PID 4744 wrote to memory of 2400 4744 1123.exe 102 PID 1204 wrote to memory of 1156 1204 skotes.exe 106 PID 1204 wrote to memory of 1156 1204 skotes.exe 106 PID 1204 wrote to memory of 1156 1204 skotes.exe 106 PID 1204 wrote to memory of 5088 1204 skotes.exe 107 PID 1204 wrote to memory of 5088 1204 skotes.exe 107 PID 1204 wrote to memory of 5088 1204 skotes.exe 107 PID 5088 wrote to memory of 2680 5088 8930c3238d.exe 108 PID 5088 wrote to memory of 2680 5088 8930c3238d.exe 108 PID 5088 wrote to memory of 2680 5088 8930c3238d.exe 108 PID 5088 wrote to memory of 928 5088 8930c3238d.exe 110 PID 5088 wrote to memory of 928 5088 8930c3238d.exe 110 PID 5088 wrote to memory of 928 5088 8930c3238d.exe 110 PID 5088 wrote to memory of 1072 5088 8930c3238d.exe 112 PID 5088 wrote to memory of 1072 5088 8930c3238d.exe 112 PID 5088 wrote to memory of 1072 5088 8930c3238d.exe 112 PID 5088 wrote to memory of 2244 5088 8930c3238d.exe 114 PID 5088 wrote to memory of 2244 5088 8930c3238d.exe 114 PID 5088 wrote to memory of 2244 5088 8930c3238d.exe 114 PID 5088 wrote to memory of 1988 5088 8930c3238d.exe 116 PID 5088 wrote to memory of 1988 5088 8930c3238d.exe 116 PID 5088 wrote to memory of 1988 5088 8930c3238d.exe 116 PID 5088 wrote to memory of 3852 5088 8930c3238d.exe 118 PID 5088 wrote to memory of 3852 5088 8930c3238d.exe 118 PID 3852 wrote to memory of 1472 3852 firefox.exe 119 PID 3852 wrote to memory of 1472 3852 firefox.exe 119 PID 3852 wrote to memory of 1472 3852 firefox.exe 119 PID 3852 wrote to memory of 1472 3852 firefox.exe 119 PID 3852 wrote to memory of 1472 3852 firefox.exe 119 PID 3852 wrote to memory of 1472 3852 firefox.exe 119 PID 3852 wrote to memory of 1472 3852 firefox.exe 119 PID 3852 wrote to memory of 1472 3852 firefox.exe 119 PID 3852 wrote to memory of 1472 3852 firefox.exe 119 PID 3852 wrote to memory of 1472 3852 firefox.exe 119 PID 3852 wrote to memory of 1472 3852 firefox.exe 119 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\22855d02fcd9dd28c0c47defcd45baf6.exe"C:\Users\Admin\AppData\Local\Temp\22855d02fcd9dd28c0c47defcd45baf6.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\L2n14.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\L2n14.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2l7025.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2l7025.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3388
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3C12L.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3C12L.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2500
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4e702J.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4e702J.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\1003895001\1123.exe"C:\Users\Admin\AppData\Local\Temp\1003895001\1123.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Users\Admin\AppData\Local\Temp\1003895001\1123.exe"C:\Users\Admin\AppData\Local\Temp\1003895001\1123.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4744 -s 5845⤵
- Program crash
PID:3312
-
-
-
C:\Users\Admin\AppData\Local\Temp\1003914001\98530fb23d.exe"C:\Users\Admin\AppData\Local\Temp\1003914001\98530fb23d.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1116
-
-
C:\Users\Admin\AppData\Local\Temp\1003915001\e5266f694d.exe"C:\Users\Admin\AppData\Local\Temp\1003915001\e5266f694d.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1156
-
-
C:\Users\Admin\AppData\Local\Temp\1003916001\8930c3238d.exe"C:\Users\Admin\AppData\Local\Temp\1003916001\8930c3238d.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2680
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:928
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1072
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2244
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1988
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking5⤵
- Suspicious use of WriteProcessMemory
PID:3852 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking6⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1472 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2040 -parentBuildID 20240401114208 -prefsHandle 1956 -prefMapHandle 1920 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d590b29b-a836-40c4-9271-4a5eaa2dd009} 1472 "\\.\pipe\gecko-crash-server-pipe.1472" gpu7⤵PID:4332
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2476 -parentBuildID 20240401114208 -prefsHandle 2468 -prefMapHandle 2464 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a08a8ac2-8868-405e-bc29-442069fe294d} 1472 "\\.\pipe\gecko-crash-server-pipe.1472" socket7⤵PID:2920
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3076 -childID 1 -isForBrowser -prefsHandle 3084 -prefMapHandle 3080 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 948 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9262379b-1a57-4dc9-9efd-14fe7e9d2dee} 1472 "\\.\pipe\gecko-crash-server-pipe.1472" tab7⤵PID:2940
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3716 -childID 2 -isForBrowser -prefsHandle 4016 -prefMapHandle 4012 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 948 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b321ff90-2825-4f63-a6cd-ed7cddd8c69a} 1472 "\\.\pipe\gecko-crash-server-pipe.1472" tab7⤵PID:1812
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1692 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4760 -prefMapHandle 4756 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {660b1aae-5c8c-4bf3-8088-a2c8c94401e9} 1472 "\\.\pipe\gecko-crash-server-pipe.1472" utility7⤵
- Checks processor information in registry
PID:2432
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4500 -childID 3 -isForBrowser -prefsHandle 5448 -prefMapHandle 5440 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 948 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {71a15c9c-b8aa-4142-93cf-50f136ea97ef} 1472 "\\.\pipe\gecko-crash-server-pipe.1472" tab7⤵PID:5460
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5444 -childID 4 -isForBrowser -prefsHandle 5428 -prefMapHandle 5356 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 948 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a095926e-ac11-4e11-9b7a-7bd560f2d7fa} 1472 "\\.\pipe\gecko-crash-server-pipe.1472" tab7⤵PID:5484
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5888 -childID 5 -isForBrowser -prefsHandle 5808 -prefMapHandle 5816 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 948 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {85ded1fd-d73e-4063-9c1f-25f6fa48644f} 1472 "\\.\pipe\gecko-crash-server-pipe.1472" tab7⤵PID:5492
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1003917001\e5add46950.exe"C:\Users\Admin\AppData\Local\Temp\1003917001\e5add46950.exe"4⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3692
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4744 -ip 47441⤵PID:3388
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6288
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6460
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\activity-stream.discovery_stream.json
Filesize18KB
MD5a5075b9d9786927bbb70c167c975d04c
SHA1e53da9bfa54f8afdeedab4574dc250aed5b07cde
SHA2560076265e244041be64950094c0b2fd293ddd1b0464050a42ff1426939e5c15b5
SHA512a53b09c36697edd9c082540a790df78d095446956230453a42e4d44b3a3db4f79d43911c4318f774da77a0817db2777c83e4aefb493a0ac63a720b68fa3cd2cd
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\cache2\entries\D500AD994A7515157BB2A6ADD5B18B754E4D2F99
Filesize13KB
MD530bf51d486f09154e658ba80d075f5f2
SHA1b7c332b379c3e261c348b9f108eb36f7925af529
SHA256ae0290ce0d00cf9cac849547d95c97ff5815a04516f3bf2dcccdfae5539dc945
SHA5121e294983d8392732ded30fac06695a7e2787343859a21be375042e0a0d7c4c77c51c8f975fa768c829cc5e2ba851789152fce126c8bcae56e642192106d496eb
-
Filesize
1.1MB
MD5d1629f3c794978e4a261000d117014dc
SHA1b688470e41b98c49a4710c2b20b458d3bb50ef83
SHA25697b18507cb1ab250f8d1669ce402d79fdbaefb530cce505aa995c861d8ebd946
SHA5121abbb3141e2c3fcbbe2828c9e90dcbce460ce622b972ec57a0fcc236cbf709e454031d5e0bdc15aab96e83de3bcc0c2d625b1a610f72eafe9c7d3c25d168e006
-
Filesize
898KB
MD512518b43b577eb06efd2228acd9242ed
SHA1a3f3a15b4322935d70129433e85ee82fe55bf3fd
SHA2569aa23f52e1217cdb6992c4ca1c7ffb1d79bab7d9112880de31c2c97fe424655a
SHA512ab32e80eacc5b3402d304f55e8f620e5c13ed9adc7397414c1f53973219d3b88eb6850d98ff0de08e453353c1a1481e9562883f400d29fdf852d1372ea741f0d
-
Filesize
2.7MB
MD53e4b74b9abf11b36e842cf2562437021
SHA1b10240f81d9b2250802f793bb44a41736130f5a0
SHA256ab45978faf4521e697cadb7f266f73167d449819ebdab39a8e57fcee8a62174e
SHA51299cc29d9da1126b4d9e432fc2729206772a1216f9f1b2def24f9e52bc888496eaec4f421acfb69eb3a14a729184b5cc20105f2f1f70eb2d078d125f9b9220fe6
-
Filesize
3.1MB
MD59d1aa74dafd0feee66682c1d23c0c038
SHA10f7bfc226517597f945e0bacd9eed21d9e50346f
SHA256646a778b6a1be550a37a9a2ac948e5db5cd4a9ff4a2e4956040513efefe2d349
SHA512957fcbe95763c8f54822b6a86de489e0ed05c26175b29b12ca0bd83331687b3a6916bc2d0317897cb35fe866ea54de73285f506c306c438751daefee7399596a
-
Filesize
3.8MB
MD59c6484ee43b103f6d28c96cc9dbbe612
SHA187bd37f8b7d394be51fc24e2c1371c88a3152d53
SHA256c676483c04388a44c33648542699cda4a54048af8e0fd186e00d76de5c5e84d3
SHA5124d543e782221a255f0f8be41b840e8dfaf16a862920941a50578b24f86b9da75108268f52d6c62677b21225f6bcd91bc0b16bdd3f6c1b1301ea02a0a56709a53
-
Filesize
2.9MB
MD594f7fd12c529bc5d28be7319b857e96b
SHA180406621106c9f98a1991449ca11c1318edcf1df
SHA2562367242ede5c10e68fdb4a893d23a8257bbe5e78347e6e24676cbe36139e25ee
SHA5120e79e876bca1dc042cb35d6d5233b7b683e7c9bee1a933740e41c75a89bd91e0f4ff2093cef82d6771a332ec03bc64833cb6169abac23ef047dc753ec0c1582f
-
Filesize
2.1MB
MD55c4e5d818a24cb9d69fc18ce0dbbd9be
SHA1618a41b2cd9fcd1307a120f3cd78b86862b25d4c
SHA256c2295f41e3e74394823ebc9f99265d4021de67f36e3c257600d610781e2f4ffb
SHA51293dcc942a9adc63d7457106277e65d0c665c9215d47e266e3fa061ad3247e763747ae5fbe15e255995b674322a65635479eb0b6afd81e5db9f6fc997e96619a8
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin
Filesize10KB
MD5d7556e3fabdeb72f8bfa192f00872095
SHA1f03ef9bc8988bd814aeb39197771221ed2d7cf9c
SHA2568ed112ecc2821e31f818f7da4d3934b1fece3f66c223f9daaf02955dd036c317
SHA5121ab0c7fbaa15b3697bd83f69aa0f8ba182f6003362243daf33a5ec55775700c9febcfc91f12d622d69c245a376ea3f41578156f57fa11f20d288bd31e3d7e916
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.bin
Filesize23KB
MD576ea40f9469a71ffc16ee17d4d78e0ce
SHA11d8ab43279d9a57b3188671e43b83c9af1402000
SHA256e72beaf0cb64bdccfbe33bc05464d4241dcd9e53f4af63a4f8d01da93561d75c
SHA51253c7c1f143210bc04a17d7ef1756709eef0d969f1d98ef2129eb8576c0638235477ea53d1bbeeaab4bac8796828d0f18c7226879dfad8580dce797626439b7d0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.bin
Filesize15KB
MD54882db8217541c30aa9481f3e26a6f67
SHA124fe5805c9fe38e148e1e55c633e35783a275a7e
SHA256a538fa29c3c7cfeae59ffecf3ac6de626e5abbb8f30c82447910b45223f9fd7e
SHA51244c8d63313aea58c253e281058a14e92841c1bc946e8072fd5a2966b90d551ca9c171c5eb4bf4d69d0903cdaddf29190f91f5792022ee1fe87a7cda6988afd2e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.bin
Filesize6KB
MD5ffaad46c083c895851d368597435c30b
SHA18298041dab232814d83dc26607872c0d7ec37393
SHA2569e36c751743b8c6a7af75f15eb3334ed40970861e66bd392180f99c4d034a5cb
SHA51253c516bc4de3e3a9d54a3b33cff987f9d4fe6848ff6be477b58837f5d352a94a58717211d2eece9216b83a9ef1a88dc69eb4e1e6a39164dd5e16d267fb3e3e7b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5eb45de4d7dfdff7b51decb91c74ada0b
SHA1bc40df9a1ba7a1d57d65ce3449710299894e0020
SHA2561c40ea457f4ee7d6a979243f452452bd150df7888060d5fbd2bd2138106613f2
SHA5129f609c96967235dd03226e29d54cad7c2b3d510d879715b7e6e7d90941ef61d35dbc318b488e2d8336af5f05097880f1bcdcfa60378270a2dbb73fba2070380d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD51ee1927132f04b5eb270b63c85bb125a
SHA1bc0f7317cf857d955927261caf5d36c6be459c3f
SHA256f86bf67e48a820beb5514b784966ff4764f788394b07be9b820837d989385819
SHA512f2da276dc0edb66e758b281b512b26da7c735ad86ae92d2929b9895a12b62786ab4439268b171ccbee4ba9bd300d21417e4e62e7285aa284f1632ad7fb10e05b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5ba23e4d42e969d0c3b078ec252256345
SHA1c47b3fdefa218367840cdf8f160f3b4206f83e91
SHA256ca78ee456d37c6442a3a94a3c7dd2d44154ecb1fa0370047830961fcfa49c919
SHA51221b60ab827ab3ec242af8abb93fff465109b1fe4fec88d234c9dfae3f98a13be85382071b15ce4b9bbe87599d1f0176260c2e7cccffc1304b3d83e4a24f2d11b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD51dfdd8a4dc51a45b14416bd524c916f0
SHA1af168a6f5e4a3d6fa431ff41fb3dd69ee65439ee
SHA256154a4e714735f741d8736476ac6e30a4d33eb46b24707e268d6282782219141f
SHA512ba6de7c576ccb9ac8896fedad7bee6394db8d2be6dbf25b3765f840ac97491ab8a5df7764d4984196f4ec3972ca946401ea713af116a06e7d421d6d400536778
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD59a0fb5fca9536551b89490b113f7cd48
SHA15f984b7ac84504f5280c9b597c8546b298644b66
SHA256f699a26b6d60c735c06f131d90b2981944116ddf51e42715e77b71abfed8c238
SHA512e0244295dd29640b00c8ae016ff24c1513ff867f0ec2857cf0f4681f261822fb5653672050f6f07d1058c231333e026edf4aec1830b50c8c1a9d345702702d66
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD50491b959d75b980992a8126055a31342
SHA170aa63751665a237724fc288666e6422c74c25c5
SHA2561eba8057f0f4ea70ae5139a989b96c6be47a07531c1859da35ac4234cba58537
SHA512e2eb77051f37a9954a0ff4f07a7f5ca14142c23d70ae90fea8c049623ec414570aa3751dacf906b84c2914d168ca43e54fb3d76d7f269ef7262f4adcc6945efb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\1b2312df-d703-4666-9cc3-b871fa04cfac
Filesize671B
MD58ee85a645db0787e949aa31e0aed0d53
SHA14462b264cf3e8966e1fbd8b4b43820854c9e375c
SHA2561d16cd338d37c4a936d8cec7f412175798a7fa1e030e0f7b91984abdebdea265
SHA512eb853a71c73d431f96b7ef3020c6c090a36352e995917ed9c6c414035256b8779a2862cab2789fea9157eb94ea384a5569cdf2cf9d2b2b181b0bcb07b20dce4d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\718446ae-5341-4e9a-8fbd-1cd9f74ff24c
Filesize26KB
MD52aed5533a32ea678e215ba61bbb25cd6
SHA12a731f9452dd16444e551827a41c38d44fe683a9
SHA256d6b92418369f3ca1a2069782d0a89fd5f4e382d19d96312f8f50c0ab09543410
SHA5122d8ffe1c03f6e7ff37f989236a61401778af5510129b0a632405018f6c011d1ff3db8d18497eedf5e936f8bb2ea66125a8d58f2f2e5a84dfa879dfa63efcff7d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\b7b41960-af30-47c4-be9b-f738f573be80
Filesize982B
MD54e2a303978b018cc4a29c63de6ff2a50
SHA1088fd2eb090ae3fb71392bcc404e3ee0cc6e2dea
SHA25679431c5dabcfd10f400e9803847c28c85d7506cd831ad02abe5587d9441e564d
SHA512199dc096e6421f2b83b5b8087f06b56276b4173e37a9e0dc4cd63ac2a8b24eda1af62c6b51f86abaaa8e33c3cffa20996e3273b40b7f28c7f983decbbc0d8d9d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD50445bdb51a2a4e4d6646ea3aeeab9b00
SHA165787e2dbbbc5e0a02e4cf4262f9d8d49892de9a
SHA2566ea7b94d50589e5466286ea2a948db1a6528bff98fcd0f0d7ce90297dfc645a6
SHA51288ec07c59b36a2652508b0081c0c9fa14be635f7bfd104c767e05dcdf31692395582459c4d2f3ff704658e088a659f5eab9d92cef758be44c2a813f878313954
-
Filesize
15KB
MD5e77aabbbac0570c2dfe0173695ee6f26
SHA16a5e02fff7bbde0243416615fe74e5c29c69b92a
SHA256f21e6e64d3077a7f4bb9eff6200f646ca301e23723d118017d0ddf2f6fc53cd1
SHA5120cf1516d4fdb5eea0fb3efd56433ca7a1aee31a8262d4071b007ee74e27f74a83ce413c73200bab1367f4147733ffa229731905351988b70e107d2de9b03f6ff
-
Filesize
10KB
MD5d7fd3d6f5ea2886fbcb0dd092c3d737d
SHA18b639c0ef0c5b5270e37fc963cea777c57bd7246
SHA25610983cd29a94c98e5990094baf8e352b0ddba0bbb87a82e5bd2771cf0676d108
SHA512c8c2931f8a8231156f63e5c0920a16aa627711d13932a85ac0638515c294e6881338699efed485d30dd42bf377a66508752865de9f8d7031aa0d3c1175a3f42e
-
Filesize
10KB
MD51acdc6c439a23ed50caa03765e4d184a
SHA18e84292f752d500a397f4ec64e997b55cf865b2a
SHA256da9e7c990a61d711f1cf6178b24f253c067923c535a9d5724dc17919732d2aac
SHA512915c2bc919af35ca99c066d8708a622412a6596109fca381b878caa54f1122beccaa98f19d391a98f16818e210d841417cbefedc960462df68f4eaeffc1e04fc