Analysis
-
max time kernel
144s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-11-2024 08:46
Static task
static1
General
-
Target
c863eb8546899a359928cd392840b340aa4b7789c3ee5823490e39cc12379107.exe
-
Size
7.1MB
-
MD5
a1dc552e3a17433628aad00910f3982a
-
SHA1
764225d46df1203f174cf99e8d957b04149d7a7a
-
SHA256
c863eb8546899a359928cd392840b340aa4b7789c3ee5823490e39cc12379107
-
SHA512
194430870c1961af938a5effe9bfca7a8b17e9cd95ed126c179ea754f9a8bc550d7c6e8767faecd18bac9a1bd555b35f5d296f20b2e5bf2282a81512d4049e20
-
SSDEEP
196608:u6NwiCM18fEEL8KprZLUZODc8sU1uAkL5pTapPw:xw3+QH5Xo83uAEm4
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://processhol.sbs/api
https://p10tgrace.sbs/api
https://peepburry828.sbs/api
https://3xp3cts1aim.sbs/api
https://p3ar11fter.sbs/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4T324V.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4T324V.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" cc1a3ee714.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" cc1a3ee714.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" cc1a3ee714.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" cc1a3ee714.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4T324V.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4T324V.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4T324V.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4T324V.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" cc1a3ee714.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1z99y4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 61e4f729f4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 19ac636a10.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ cc1a3ee714.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2Y7734.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3k44m.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4T324V.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 20 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3k44m.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 19ac636a10.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 19ac636a10.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3k44m.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4T324V.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cc1a3ee714.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 61e4f729f4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 61e4f729f4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2Y7734.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4T324V.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cc1a3ee714.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1z99y4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1z99y4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2Y7734.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 1z99y4.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 13 IoCs
pid Process 1172 S6M19.exe 5008 Y4Y93.exe 2976 1z99y4.exe 4652 skotes.exe 4020 2Y7734.exe 4672 61e4f729f4.exe 3664 19ac636a10.exe 4468 skotes.exe 1240 3k44m.exe 3696 4T324V.exe 1928 da661e59e2.exe 4140 cc1a3ee714.exe 7124 skotes.exe -
Identifies Wine through registry keys 2 TTPs 10 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 19ac636a10.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 4T324V.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine cc1a3ee714.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 1z99y4.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 2Y7734.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 3k44m.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 61e4f729f4.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4T324V.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4T324V.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" cc1a3ee714.exe -
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Y4Y93.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\61e4f729f4.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007113001\\61e4f729f4.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\19ac636a10.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007114001\\19ac636a10.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\da661e59e2.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007115001\\da661e59e2.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cc1a3ee714.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007116001\\cc1a3ee714.exe" skotes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c863eb8546899a359928cd392840b340aa4b7789c3ee5823490e39cc12379107.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" S6M19.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000a000000023b89-112.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
pid Process 2976 1z99y4.exe 4652 skotes.exe 4020 2Y7734.exe 4672 61e4f729f4.exe 3664 19ac636a10.exe 4468 skotes.exe 1240 3k44m.exe 3696 4T324V.exe 4140 cc1a3ee714.exe 7124 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1z99y4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 17 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Y4Y93.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2Y7734.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 19ac636a10.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4T324V.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cc1a3ee714.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1z99y4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language S6M19.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c863eb8546899a359928cd392840b340aa4b7789c3ee5823490e39cc12379107.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 61e4f729f4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3k44m.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da661e59e2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 1556 taskkill.exe 840 taskkill.exe 3124 taskkill.exe 4052 taskkill.exe 2424 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 2976 1z99y4.exe 2976 1z99y4.exe 4652 skotes.exe 4652 skotes.exe 4020 2Y7734.exe 4020 2Y7734.exe 4672 61e4f729f4.exe 4672 61e4f729f4.exe 3664 19ac636a10.exe 3664 19ac636a10.exe 4468 skotes.exe 4468 skotes.exe 1240 3k44m.exe 1240 3k44m.exe 3696 4T324V.exe 3696 4T324V.exe 3696 4T324V.exe 3696 4T324V.exe 1928 da661e59e2.exe 1928 da661e59e2.exe 4140 cc1a3ee714.exe 4140 cc1a3ee714.exe 1928 da661e59e2.exe 1928 da661e59e2.exe 4140 cc1a3ee714.exe 4140 cc1a3ee714.exe 4140 cc1a3ee714.exe 7124 skotes.exe 7124 skotes.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 3696 4T324V.exe Token: SeDebugPrivilege 3124 taskkill.exe Token: SeDebugPrivilege 4052 taskkill.exe Token: SeDebugPrivilege 2424 taskkill.exe Token: SeDebugPrivilege 1556 taskkill.exe Token: SeDebugPrivilege 840 taskkill.exe Token: SeDebugPrivilege 4860 firefox.exe Token: SeDebugPrivilege 4860 firefox.exe Token: SeDebugPrivilege 4140 cc1a3ee714.exe -
Suspicious use of FindShellTrayWindow 32 IoCs
pid Process 2976 1z99y4.exe 1928 da661e59e2.exe 1928 da661e59e2.exe 1928 da661e59e2.exe 1928 da661e59e2.exe 1928 da661e59e2.exe 1928 da661e59e2.exe 1928 da661e59e2.exe 1928 da661e59e2.exe 4860 firefox.exe 4860 firefox.exe 4860 firefox.exe 4860 firefox.exe 4860 firefox.exe 4860 firefox.exe 4860 firefox.exe 4860 firefox.exe 4860 firefox.exe 4860 firefox.exe 4860 firefox.exe 4860 firefox.exe 4860 firefox.exe 4860 firefox.exe 4860 firefox.exe 4860 firefox.exe 4860 firefox.exe 4860 firefox.exe 4860 firefox.exe 4860 firefox.exe 4860 firefox.exe 1928 da661e59e2.exe 1928 da661e59e2.exe -
Suspicious use of SendNotifyMessage 30 IoCs
pid Process 1928 da661e59e2.exe 1928 da661e59e2.exe 1928 da661e59e2.exe 1928 da661e59e2.exe 1928 da661e59e2.exe 1928 da661e59e2.exe 1928 da661e59e2.exe 1928 da661e59e2.exe 4860 firefox.exe 4860 firefox.exe 4860 firefox.exe 4860 firefox.exe 4860 firefox.exe 4860 firefox.exe 4860 firefox.exe 4860 firefox.exe 4860 firefox.exe 4860 firefox.exe 4860 firefox.exe 4860 firefox.exe 4860 firefox.exe 4860 firefox.exe 4860 firefox.exe 4860 firefox.exe 4860 firefox.exe 4860 firefox.exe 4860 firefox.exe 4860 firefox.exe 1928 da661e59e2.exe 1928 da661e59e2.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4860 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1792 wrote to memory of 1172 1792 c863eb8546899a359928cd392840b340aa4b7789c3ee5823490e39cc12379107.exe 84 PID 1792 wrote to memory of 1172 1792 c863eb8546899a359928cd392840b340aa4b7789c3ee5823490e39cc12379107.exe 84 PID 1792 wrote to memory of 1172 1792 c863eb8546899a359928cd392840b340aa4b7789c3ee5823490e39cc12379107.exe 84 PID 1172 wrote to memory of 5008 1172 S6M19.exe 86 PID 1172 wrote to memory of 5008 1172 S6M19.exe 86 PID 1172 wrote to memory of 5008 1172 S6M19.exe 86 PID 5008 wrote to memory of 2976 5008 Y4Y93.exe 88 PID 5008 wrote to memory of 2976 5008 Y4Y93.exe 88 PID 5008 wrote to memory of 2976 5008 Y4Y93.exe 88 PID 2976 wrote to memory of 4652 2976 1z99y4.exe 89 PID 2976 wrote to memory of 4652 2976 1z99y4.exe 89 PID 2976 wrote to memory of 4652 2976 1z99y4.exe 89 PID 5008 wrote to memory of 4020 5008 Y4Y93.exe 90 PID 5008 wrote to memory of 4020 5008 Y4Y93.exe 90 PID 5008 wrote to memory of 4020 5008 Y4Y93.exe 90 PID 4652 wrote to memory of 4672 4652 skotes.exe 91 PID 4652 wrote to memory of 4672 4652 skotes.exe 91 PID 4652 wrote to memory of 4672 4652 skotes.exe 91 PID 4652 wrote to memory of 3664 4652 skotes.exe 92 PID 4652 wrote to memory of 3664 4652 skotes.exe 92 PID 4652 wrote to memory of 3664 4652 skotes.exe 92 PID 1172 wrote to memory of 1240 1172 S6M19.exe 102 PID 1172 wrote to memory of 1240 1172 S6M19.exe 102 PID 1172 wrote to memory of 1240 1172 S6M19.exe 102 PID 1792 wrote to memory of 3696 1792 c863eb8546899a359928cd392840b340aa4b7789c3ee5823490e39cc12379107.exe 103 PID 1792 wrote to memory of 3696 1792 c863eb8546899a359928cd392840b340aa4b7789c3ee5823490e39cc12379107.exe 103 PID 1792 wrote to memory of 3696 1792 c863eb8546899a359928cd392840b340aa4b7789c3ee5823490e39cc12379107.exe 103 PID 4652 wrote to memory of 1928 4652 skotes.exe 105 PID 4652 wrote to memory of 1928 4652 skotes.exe 105 PID 4652 wrote to memory of 1928 4652 skotes.exe 105 PID 1928 wrote to memory of 3124 1928 da661e59e2.exe 106 PID 1928 wrote to memory of 3124 1928 da661e59e2.exe 106 PID 1928 wrote to memory of 3124 1928 da661e59e2.exe 106 PID 1928 wrote to memory of 4052 1928 da661e59e2.exe 108 PID 1928 wrote to memory of 4052 1928 da661e59e2.exe 108 PID 1928 wrote to memory of 4052 1928 da661e59e2.exe 108 PID 1928 wrote to memory of 2424 1928 da661e59e2.exe 110 PID 1928 wrote to memory of 2424 1928 da661e59e2.exe 110 PID 1928 wrote to memory of 2424 1928 da661e59e2.exe 110 PID 1928 wrote to memory of 1556 1928 da661e59e2.exe 112 PID 1928 wrote to memory of 1556 1928 da661e59e2.exe 112 PID 1928 wrote to memory of 1556 1928 da661e59e2.exe 112 PID 1928 wrote to memory of 840 1928 da661e59e2.exe 114 PID 1928 wrote to memory of 840 1928 da661e59e2.exe 114 PID 1928 wrote to memory of 840 1928 da661e59e2.exe 114 PID 1928 wrote to memory of 2024 1928 da661e59e2.exe 116 PID 1928 wrote to memory of 2024 1928 da661e59e2.exe 116 PID 2024 wrote to memory of 4860 2024 firefox.exe 117 PID 2024 wrote to memory of 4860 2024 firefox.exe 117 PID 2024 wrote to memory of 4860 2024 firefox.exe 117 PID 2024 wrote to memory of 4860 2024 firefox.exe 117 PID 2024 wrote to memory of 4860 2024 firefox.exe 117 PID 2024 wrote to memory of 4860 2024 firefox.exe 117 PID 2024 wrote to memory of 4860 2024 firefox.exe 117 PID 2024 wrote to memory of 4860 2024 firefox.exe 117 PID 2024 wrote to memory of 4860 2024 firefox.exe 117 PID 2024 wrote to memory of 4860 2024 firefox.exe 117 PID 2024 wrote to memory of 4860 2024 firefox.exe 117 PID 4860 wrote to memory of 4564 4860 firefox.exe 118 PID 4860 wrote to memory of 4564 4860 firefox.exe 118 PID 4860 wrote to memory of 4564 4860 firefox.exe 118 PID 4860 wrote to memory of 4564 4860 firefox.exe 118 PID 4860 wrote to memory of 4564 4860 firefox.exe 118 PID 4860 wrote to memory of 4564 4860 firefox.exe 118 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\c863eb8546899a359928cd392840b340aa4b7789c3ee5823490e39cc12379107.exe"C:\Users\Admin\AppData\Local\Temp\c863eb8546899a359928cd392840b340aa4b7789c3ee5823490e39cc12379107.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\S6M19.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\S6M19.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Y4Y93.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Y4Y93.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1z99y4.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1z99y4.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Users\Admin\AppData\Local\Temp\1007113001\61e4f729f4.exe"C:\Users\Admin\AppData\Local\Temp\1007113001\61e4f729f4.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4672
-
-
C:\Users\Admin\AppData\Local\Temp\1007114001\19ac636a10.exe"C:\Users\Admin\AppData\Local\Temp\1007114001\19ac636a10.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3664
-
-
C:\Users\Admin\AppData\Local\Temp\1007115001\da661e59e2.exe"C:\Users\Admin\AppData\Local\Temp\1007115001\da661e59e2.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3124
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4052
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2424
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1556
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:840
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2076 -parentBuildID 20240401114208 -prefsHandle 2012 -prefMapHandle 1716 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {f6bc90d4-7dfa-4414-868e-4f5ca5a80161} 4860 "\\.\pipe\gecko-crash-server-pipe.4860" gpu9⤵PID:4564
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2512 -parentBuildID 20240401114208 -prefsHandle 2504 -prefMapHandle 2500 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {67329d14-ab0d-4e7a-a11e-9fffbae1fc94} 4860 "\\.\pipe\gecko-crash-server-pipe.4860" socket9⤵PID:1752
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3376 -childID 1 -isForBrowser -prefsHandle 3156 -prefMapHandle 3396 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cc37177b-92f1-415a-8e7c-3090e28ef44b} 4860 "\\.\pipe\gecko-crash-server-pipe.4860" tab9⤵PID:1936
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3920 -childID 2 -isForBrowser -prefsHandle 3912 -prefMapHandle 3400 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {af84712b-faca-4211-a393-672407e4e16d} 4860 "\\.\pipe\gecko-crash-server-pipe.4860" tab9⤵PID:2308
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4888 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4880 -prefMapHandle 4876 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d13f2c7b-13f5-4b4f-98bf-bc6ca7a4a4ea} 4860 "\\.\pipe\gecko-crash-server-pipe.4860" utility9⤵
- Checks processor information in registry
PID:6656
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5328 -childID 3 -isForBrowser -prefsHandle 5448 -prefMapHandle 5444 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {19a64cbb-18bd-424c-82ea-1d5630137591} 4860 "\\.\pipe\gecko-crash-server-pipe.4860" tab9⤵PID:5012
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5664 -childID 4 -isForBrowser -prefsHandle 5584 -prefMapHandle 5588 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {72949539-0713-4e9c-bc03-32456f55b632} 4860 "\\.\pipe\gecko-crash-server-pipe.4860" tab9⤵PID:3336
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5856 -childID 5 -isForBrowser -prefsHandle 5780 -prefMapHandle 5784 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {46af5a8f-c23a-464c-ba48-99375da286d6} 4860 "\\.\pipe\gecko-crash-server-pipe.4860" tab9⤵PID:3452
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007116001\cc1a3ee714.exe"C:\Users\Admin\AppData\Local\Temp\1007116001\cc1a3ee714.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4140
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2Y7734.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2Y7734.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4020
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3k44m.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3k44m.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1240
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4T324V.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4T324V.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3696
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4468
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:7124
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\activity-stream.discovery_stream.json
Filesize19KB
MD5493b30149f7ee97d8e9b31fe4c032471
SHA1c16f8c9547eb6410255c870fc802c06292608797
SHA25671332a9338f4e7bde28b1a3ce70309be70c2f154e90d73ad2f96ae55cca12d8f
SHA51265725c7501e92618ff223713b495b8de7bbf9b9669a0c2f62048f5cb53b81d546bf885765a5dc5ba8751aea89e54a0b230c66ff1895c6325be872dd5daff2e28
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD56a9e09668f6779198a636946252859a6
SHA19c647077b1d9a5c10a788c50811fd6f21cc28b77
SHA25655187432d060e20b8d4308b41924cfc254f6a7a3cd3e78c52640cb677e555809
SHA512fa49e983fd38f33e88892a1714593059f13d346c10ddc100238b0df0c6fa59243106076de5fbe315bebdb29d6addb5038142fb79e4e641bbf7b4b6078420eaf0
-
Filesize
1.7MB
MD52fe2ab5b511de6ef48e3eba0378f3e12
SHA1c350d71c99c8c079714e71c219c706c6716a22aa
SHA256ab2e92bf1d70567a32aef956b7d64cbe4d49dadf779fc6d455674fab35509b14
SHA5124beb110952f7f3d6f351149448344f0e5918694bfa3fa958e08690999e16f270abd32100e2d844c5a13564e4c8fd664d17882979e6ca567111983ef62ee4768e
-
Filesize
1.7MB
MD513a85c121414fb45d5693a9ab8910086
SHA1040b4aa8746c65929784f80116bb13c7f125ddb2
SHA256de0db7603189d02c7051013fe43244a3e86fbd2a884a733a64fed84836912e0c
SHA5129c9d7a5e6cf4d76a79870b62a37984783c0ec174b7f2e4557154cd0632d6e2ee7943d9ecc6149eb09277ee1dff4d8eb2692ce60934d69eae97f80451344dc5d6
-
Filesize
900KB
MD55ce51bebf5df5616c0afad430b705cda
SHA197b05e3b842ea60a341e600c12110092a27240cc
SHA25665177fb5a41a621039697bb1c2559cfb544bead0f3a91722008f425fbe89e261
SHA512c141267589f896649c97dae327c98e2abfc5de85c06917a00062acc7bb4e42da94085ea1f6b70f6c8dba4ef1725ae9bf0b64747792f80c824d99eef1f23e7ee8
-
Filesize
2.6MB
MD5bea1589178b4eda7c5b15d47b076f6bd
SHA181a654fe6ca77c26d0c87d9f8fe1786c4ee4582d
SHA256336b2204ee1f34c545ac54145a9db9f548ee478708fe1bc22c679fb037063068
SHA512d8ed0c2b19b94aeb4aed0d2e7525cb3eb8289b9da0d4df8c1b24340060976233af90861fca9ecf259c7cbe40775d1f8fa6ff814bdc542abd9381497ee60d9d98
-
Filesize
2.7MB
MD59051af3633c66487d63cb8530601e571
SHA13dc1589d11228fe095a1fe609019f0f6260f3727
SHA256ffe17c4f7d5290ce0aa4336bb5d01e0ec61e26dadf1ea63cab06ed1d45d3a40d
SHA51244f9e436cc0a7f6ca71f7d3aba6e4c656f97869aa5aaa17827c9401fc3b4dd7e6b7ab710eb3b4dc8c4f0685673840314d5b1b2c35daaab1f922dcb27a80bd096
-
Filesize
5.5MB
MD5cfc4bbca45c2bb5ccd797dc01f2330d6
SHA178e256cd150e3a48cfa1397f300451b776561216
SHA2566c208f987efbfb3d729c5bc272adae27ea3415ec2da20dce6009b6d0f96f3ada
SHA5121e551f4a2e88d0afc5763860b28c95767541cecbc748a4ba612c21a6081825b04aee752983ed69fe7d40c0b7f261960cc024172c385fa31c8d1530506895302b
-
Filesize
1.7MB
MD5933db1979eee125501d5041ff0a81100
SHA18c4e616530fc14b0b93070987dfffc519ec46fc2
SHA256cb2359039ddc3d53fdc47eaef40afeb7e4bc7895b90d15586a4ce5a9aa00452c
SHA512f5f4c5bb33265ba8f0faa5940f8f48443d9f08fbc5cfc365131428ac6f625ec190f8bcaf6c6ffb941ea90bcb117a0424685919b9b6d04326e2028a572fc374a3
-
Filesize
3.7MB
MD5c53c74a232e89b943fa38cf482473ca6
SHA118ebb4dcf8c9fcf6c0a58a413a47a105ba12f82c
SHA256ce1682428fe3d33ac0e6abd335f878cb62aa98c32fa4bba9ded1e94671606785
SHA51276703bba7639b014f320f2ddb984822756631a4a7ab1b36886dfd89ea89dc43b6be4b779cc3a750b4fbe6d2eac34b81f5ff3a356c2113e42dc14c87631f1a1be
-
Filesize
1.9MB
MD59992a20add6571ce7c2b357b425e5445
SHA1a454d9baa02de82903caeb14be6f1b74f47feb3d
SHA2564fd36ad0a4b7187d3996709416a9e59558f8855248a54abe6316d7c004c17aeb
SHA512d7448c82fa25850aecca0299638c03618443e14d91a2cd113936a54d85b30cbd95e47ae17ab65ac18055d65e95ca12e08c246de28a7362bbf1e39783d7fcc38a
-
Filesize
1.8MB
MD50a8eeec9b77d4d4ea4e987ef55ff8295
SHA1d570b90b86f0d64efdd577a7140c9a54407fbd6b
SHA256e3bddf483a9abcd5df07b13cb6007c030a0467c85876d58aa9ab52dd2e2583c3
SHA5123c078b58865d17a9090771c05cb186537eb8ee694de386c6b39079bf13482ead794944759ef42ba428dc60f4625eb7497509966ff10a9768a67829d9ee045aab
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin
Filesize6KB
MD5521a2b823a2456715733face923fb41f
SHA11c5acce0370a2fa5fbb91b39a49a148e43d79603
SHA256ad6e37bfd6b469afa00734768ff4bf118256f235fc0c1a3f03befd2ed50fb8ea
SHA5122643638631acaeac625534b2b7cf9c5a0494ef2e8860ffad3f20b59615d7196dd75009ab7b42dc835248be49b0baec61c4413297314ecc56b80c4a95ec57602e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin
Filesize8KB
MD5e6000eac394022532a65a69cb57872bf
SHA16c309842beb386421998ba2c5e05649f146e557e
SHA2562633f69f1336d8854822bc6cf48ae80fe4153867819d70666c127d41b55418c5
SHA51270b77308c92018bb87f943e3c2e0308cdede4289c5934a5603c66136b5bebf631cc17b69685e14ec989fcad3c8ffa0a3c3644eb3dc399a0a5cd2617497a0c5c4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.bin
Filesize23KB
MD51ab6ed9368c9777411ff7113fc01162a
SHA19cc3b3a3477d2932a9465ea969d149766c3b0fcc
SHA25689bfaff2b38676c60438901ff6aed1c47f9c2b41e4682c4acc4e47e5ded8bf28
SHA512203f9e180bf2609e7b0d29093ef180356c538c37606044d2028aa908d67201181b8dcda9e1f30544aba3b79dd613a6a02a86cd3993e188200d651363c6b38950
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.bin
Filesize5KB
MD5e7f2a1aab4ed3fd63e14b1da2a5cf87e
SHA19085c24f5c92be7cfd3e4e7d0619e2c2bdcfc46a
SHA256f8cd9c57e45005ca437fd070657d37ad932f26442609b00c1b35ebe172425dee
SHA5125bc2dfb7efb6c6669ac190e620c8b39091136c1c7de7454da7b9dfc9abb77566cd71f8725db871dc237328847ea6a8f610eed812f47405bb9b6c0961dd118bae
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.bin
Filesize15KB
MD5295bdea0995ab93bd30baab018bf29d5
SHA18e1fd756fad90fb29b1418f8601edcab3b6a6fa1
SHA2562e669ebe9b03a8333c90b20ed9c42daac6f91ae798bc789f78c829e6feecd866
SHA512256b9697fa81b6f3a3b81e8e5c0f9e9825f1ac0eabab4c87db470ce2066f86891a5e834180cbbe04382c14df5067c5ad6e711df3c08e2fe923c4ab10e6446459
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.bin
Filesize15KB
MD5ebc21e10b740d78441fc96c6bc63834b
SHA11baa278d6035695c2368ce7cee4d945be45ba29f
SHA2568923c94bb9c7f98dd4ccee423daa3f74e73573a87b7a1ca1cbf99bbfa077d0b3
SHA512d1b27ad6a8758bb40ee6e6b29f7379d840da7b3bab20118a215cb84c34d5f12266a3d135e6a48402fa4f0e589987e2413614b80381c74834d9e04113b4e07f32
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5b5cba7b21e3d3d8df6f98e1fe823659d
SHA115d1b49fcf2565f1fb26ef9875f7c57c6af883b3
SHA25685394a7dd08a68fcfec86a9200543f67c0c02b1598ee8276d10c7a11965a7fa3
SHA5120dfb3c816a5ffcdcbbad68361056bb1d5a168a4db447ed88d95d2b73e0cd6be062978e4f6f51c89bdf07256a38bb9cedbb02746a10cb833c221502074475d077
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD528c504f22db13a9fbea209bb8a41e02a
SHA159009fe800618a5c26e055c61160508d411a05df
SHA25671e06e0efd0f75bba84e62dd065ba167190c740b0eaa970bca01821e95e21a54
SHA51287fc43509429fc88771e6b0c7fb011d1937f20a91552676ff78b228e8b8cdd80d7ee225837d195de9aa99172d9b054c061678d5dfe1ef3010f59057db3adebbc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5bd52384135f8dfb1bf0c64ea8c586445
SHA15c9d4493bf60ba5f1b494306157d113e2b2f596e
SHA256c15d4dc172a700471db09a03df095a0a1b7a7792494ddf93756b5e98dc339fa9
SHA512b986260ac3a95a6eb080a4d46ea13218042367e304681d0f23762ce79f1cd4b2fb748b141a0521f2d3266d8f26d50865783b7659d3d355f96fb8fef6eddd614e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5be0af2345d072d5657dbc194f8eede20
SHA122f1c7f523a6a21f2d46eaefe412f8be3e357be1
SHA256b050f0430c3553916a526bb829963ebefae49842b7985d45a2ff088f5a16bc1b
SHA5129b4f44cda5a7cad6405380054eec58e375192dc3c0abcdb909bb320a76a6c5693750b931dbef36953d62ff79d42d5b749d67a4162656592727e6a61870f0f1b7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\5689aff3-a08b-4ee2-a84e-6dc1e71c32f0
Filesize982B
MD5f85540d1663b85f1b3716508e7ab0a15
SHA114c033295b49c05ee1c4428c0c01383d9498194d
SHA2565ea0429320510eadd8984a5e6010d2e2f8fadc5759a44ae49640c91c03c05198
SHA5121cd35d63b1ef056aa7aaca4c56ccef128f4b3f8bac724568cbd417881ca24694f05de6a554b4cfc96210b2dbea4c43966a0f38eb93d6af0825f3a6e141c86a8a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\6530a683-6a7f-494b-aadd-c2bc2d9608a8
Filesize27KB
MD5c9464758c9ea823191c013ab36b291c1
SHA11da362e12ab7dd5dba98a1bfa11e95c01d628f6d
SHA2566174e5884fe8597d6a54910343692b11f5a28f2529c6084d159c286d3cbf2120
SHA512a32d688e6a1228254c0cd61105bd885a39e0e6de615b36443c0156116cbe650d07c752777a2fa36965daaca882f22bddd021be08f9e4b97b78eb05bc374c5af2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\d89e791f-dd28-424c-9178-6f1cd88d6701
Filesize671B
MD5ee71f351cce0e0fe5f6000a20d2894d5
SHA168618fca0c74105e86722ee5ce1dcdd553ba0272
SHA256c5dca9007851b4296fac91662828dca03e9010e5414fb1d634f292d7641ee64f
SHA512e01f0b47a7f78bbc0e98587e96c21b7eeefa3901b39469d1f1972861cfcb50204c61133934970ea3dffacd96b46a93acc0f3772283b6f5cab5d79e5440bc9a71
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD54c1fc0932c56394110f7fb8dddf241d2
SHA12e494283e1e91924bf4789ec454dc66a18c459a3
SHA256fe7a8dbc2c5db9cac706acda0e5c526b937b06cd4240ad4b93f5d3cbab72ffe8
SHA51241be95b5ffd360330752528a85d585b8253243e91dda0574cc99f6f8d18b9d4b035eb721b9a2817b5fa3201b1028867e645c61712119c5a1a1cd203ed713df67
-
Filesize
11KB
MD5d8b220493b737aa1581c8d8daea34da3
SHA16c6e1639cc6e77ab1db4efef5d0c1a92b8f498ef
SHA25683929421cf75e40e83cf2feeb4bab362c65984207a8fc2637b733e06450ef96b
SHA512d5578577d7219eea7962caa40f0bd6fbda3ba7b62afef185192a4653e87b8093d9e4858cd337ca72fe3a41d2dba581b051f615a4ed60c6eb9adcb0d803978041
-
Filesize
16KB
MD5332cfcd93cf6b22b92753c3e3753f3d5
SHA198ace9d4c0b4ae5a2fb8e4ff2c21bad82cd12717
SHA25626839d197d2416d25648fbe2b620626ee9ab82516b55af20070b9a499bd20111
SHA5120c00b69dc45fd8354abff08c11eab81ba444234408ba331b304f89c08e91443c95599c6b9b604f2546759258d218b563b412790281d9f7fd181adeebca404956
-
Filesize
10KB
MD57365da68cd6493caf9f5fc2f52f7d90f
SHA12e8fb693c61ef019e31133801930aa7464e1e7b7
SHA256245a575151822ac66230e3b3cd412a49f99b2820223b17787c42a0a568dd46e9
SHA5126c0d5a8a044ffd9c6063bcb3d280a407adf734443076d2790a61ff15f41fc8093bfc592e2ebb47d2049666564462a30947a9073d3920e3cf09d66820c9bd7789
-
Filesize
11KB
MD579fcebadd774d039c02f9a494f54886d
SHA1f1f23c308cb1d49ce8edee1730ba1279ad140f52
SHA256851ba9a11de3392ae362a338fbda7203722e8ce5cf04b66e165fe7a324a6f0f8
SHA51205c8d550e4278ec05796c9631961118c976f35662d98000d9d7f90553d5db0721239e171f73d9e904225ae3d244c46686eb91c2d46c6d676c711b93567954dce