Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 16:07
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20241007-en
General
-
Target
file.exe
-
Size
1.8MB
-
MD5
d349980d19605cccfb15081f93c9db31
-
SHA1
b9110f209abc6d452f13e955592df37a1e30db24
-
SHA256
ba7b2f6e55a0b6b2aa5c2528e623ce40090c78e3be8d30d4a07f9c8ca483ae94
-
SHA512
a3c8d876d1df6983d53b91e4fe3d0a2164a46cb24c7121f8f50c1e8565093a17b45ef482ffd6cb89eed435cf118e6482debc8c2e7bb610f227c226093184e8bc
-
SSDEEP
49152:JpqV4uD6HKqZp75N0/uDZKxKGphy38i9j/c4:JpqFEfZpNN0EZIp43xNc4
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
CLOUDYTNEWS
http://31.177.109.184
-
url_path
/8331a12a495c21b2.php
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Cryptbot family
-
Detects CryptBot payload 1 IoCs
CryptBot is a C++ stealer distributed widely in bundle with other software.
resource yara_rule behavioral2/memory/1012-76-0x0000000069CC0000-0x000000006A71B000-memory.dmp family_cryptbot_v3 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" dcc52e6dd9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" dcc52e6dd9.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection dcc52e6dd9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" dcc52e6dd9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" dcc52e6dd9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" dcc52e6dd9.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7ac7b9060b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 693545dcca.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e7e6df844b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dcc52e6dd9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 1608 chrome.exe 5696 chrome.exe 5688 chrome.exe 5216 chrome.exe -
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dcc52e6dd9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7ac7b9060b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 693545dcca.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 693545dcca.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7ac7b9060b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e7e6df844b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e7e6df844b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dcc52e6dd9.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation file.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 7ac7b9060b.exe -
Executes dropped EXE 11 IoCs
pid Process 1572 skotes.exe 1724 stealc_main1.exe 1012 7ac7b9060b.exe 4944 693545dcca.exe 1496 e7e6df844b.exe 4080 bdbdd22ddf.exe 2976 dcc52e6dd9.exe 1152 skotes.exe 4624 service123.exe 4248 skotes.exe 216 service123.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 7ac7b9060b.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 693545dcca.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine e7e6df844b.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine dcc52e6dd9.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine file.exe -
Loads dropped DLL 2 IoCs
pid Process 4624 service123.exe 216 service123.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features dcc52e6dd9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" dcc52e6dd9.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\693545dcca.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007700001\\693545dcca.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e7e6df844b.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007701001\\e7e6df844b.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bdbdd22ddf.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007702001\\bdbdd22ddf.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dcc52e6dd9.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007703001\\dcc52e6dd9.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000023ca3-109.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 4080 file.exe 1572 skotes.exe 1012 7ac7b9060b.exe 4944 693545dcca.exe 1496 e7e6df844b.exe 2976 dcc52e6dd9.exe 1152 skotes.exe 4248 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4772 1012 WerFault.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stealc_main1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7ac7b9060b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e7e6df844b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bdbdd22ddf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dcc52e6dd9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 693545dcca.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 7ac7b9060b.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 7ac7b9060b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 5 IoCs
pid Process 5016 taskkill.exe 4632 taskkill.exe 4544 taskkill.exe 4396 taskkill.exe 3428 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4340 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 4080 file.exe 4080 file.exe 1572 skotes.exe 1572 skotes.exe 1012 7ac7b9060b.exe 1012 7ac7b9060b.exe 4944 693545dcca.exe 4944 693545dcca.exe 1496 e7e6df844b.exe 1496 e7e6df844b.exe 4080 bdbdd22ddf.exe 4080 bdbdd22ddf.exe 2976 dcc52e6dd9.exe 2976 dcc52e6dd9.exe 4080 bdbdd22ddf.exe 4080 bdbdd22ddf.exe 1608 chrome.exe 1608 chrome.exe 2976 dcc52e6dd9.exe 2976 dcc52e6dd9.exe 2976 dcc52e6dd9.exe 1152 skotes.exe 1152 skotes.exe 4248 skotes.exe 4248 skotes.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeDebugPrivilege 4632 taskkill.exe Token: SeDebugPrivilege 4544 taskkill.exe Token: SeDebugPrivilege 4396 taskkill.exe Token: SeDebugPrivilege 3428 taskkill.exe Token: SeDebugPrivilege 5016 taskkill.exe Token: SeDebugPrivilege 1276 firefox.exe Token: SeDebugPrivilege 1276 firefox.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeDebugPrivilege 2976 dcc52e6dd9.exe Token: SeDebugPrivilege 1276 firefox.exe Token: SeDebugPrivilege 1276 firefox.exe Token: SeDebugPrivilege 1276 firefox.exe -
Suspicious use of FindShellTrayWindow 58 IoCs
pid Process 4080 file.exe 4080 bdbdd22ddf.exe 4080 bdbdd22ddf.exe 4080 bdbdd22ddf.exe 4080 bdbdd22ddf.exe 4080 bdbdd22ddf.exe 4080 bdbdd22ddf.exe 1276 firefox.exe 1276 firefox.exe 1276 firefox.exe 1276 firefox.exe 4080 bdbdd22ddf.exe 1276 firefox.exe 1276 firefox.exe 1276 firefox.exe 1276 firefox.exe 1276 firefox.exe 1276 firefox.exe 1276 firefox.exe 1276 firefox.exe 1276 firefox.exe 1276 firefox.exe 1276 firefox.exe 1276 firefox.exe 1276 firefox.exe 1276 firefox.exe 1276 firefox.exe 1276 firefox.exe 1276 firefox.exe 4080 bdbdd22ddf.exe 4080 bdbdd22ddf.exe 4080 bdbdd22ddf.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe -
Suspicious use of SendNotifyMessage 30 IoCs
pid Process 4080 bdbdd22ddf.exe 4080 bdbdd22ddf.exe 4080 bdbdd22ddf.exe 4080 bdbdd22ddf.exe 4080 bdbdd22ddf.exe 4080 bdbdd22ddf.exe 1276 firefox.exe 1276 firefox.exe 1276 firefox.exe 1276 firefox.exe 4080 bdbdd22ddf.exe 1276 firefox.exe 1276 firefox.exe 1276 firefox.exe 1276 firefox.exe 1276 firefox.exe 1276 firefox.exe 1276 firefox.exe 1276 firefox.exe 1276 firefox.exe 1276 firefox.exe 1276 firefox.exe 1276 firefox.exe 1276 firefox.exe 1276 firefox.exe 1276 firefox.exe 1276 firefox.exe 4080 bdbdd22ddf.exe 4080 bdbdd22ddf.exe 4080 bdbdd22ddf.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1276 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4080 wrote to memory of 1572 4080 file.exe 82 PID 4080 wrote to memory of 1572 4080 file.exe 82 PID 4080 wrote to memory of 1572 4080 file.exe 82 PID 1572 wrote to memory of 1724 1572 skotes.exe 87 PID 1572 wrote to memory of 1724 1572 skotes.exe 87 PID 1572 wrote to memory of 1724 1572 skotes.exe 87 PID 1572 wrote to memory of 1012 1572 skotes.exe 91 PID 1572 wrote to memory of 1012 1572 skotes.exe 91 PID 1572 wrote to memory of 1012 1572 skotes.exe 91 PID 1572 wrote to memory of 4944 1572 skotes.exe 92 PID 1572 wrote to memory of 4944 1572 skotes.exe 92 PID 1572 wrote to memory of 4944 1572 skotes.exe 92 PID 1572 wrote to memory of 1496 1572 skotes.exe 93 PID 1572 wrote to memory of 1496 1572 skotes.exe 93 PID 1572 wrote to memory of 1496 1572 skotes.exe 93 PID 1572 wrote to memory of 4080 1572 skotes.exe 94 PID 1572 wrote to memory of 4080 1572 skotes.exe 94 PID 1572 wrote to memory of 4080 1572 skotes.exe 94 PID 4080 wrote to memory of 4632 4080 bdbdd22ddf.exe 95 PID 4080 wrote to memory of 4632 4080 bdbdd22ddf.exe 95 PID 4080 wrote to memory of 4632 4080 bdbdd22ddf.exe 95 PID 4080 wrote to memory of 4544 4080 bdbdd22ddf.exe 97 PID 4080 wrote to memory of 4544 4080 bdbdd22ddf.exe 97 PID 4080 wrote to memory of 4544 4080 bdbdd22ddf.exe 97 PID 4080 wrote to memory of 4396 4080 bdbdd22ddf.exe 99 PID 4080 wrote to memory of 4396 4080 bdbdd22ddf.exe 99 PID 4080 wrote to memory of 4396 4080 bdbdd22ddf.exe 99 PID 4080 wrote to memory of 3428 4080 bdbdd22ddf.exe 101 PID 4080 wrote to memory of 3428 4080 bdbdd22ddf.exe 101 PID 4080 wrote to memory of 3428 4080 bdbdd22ddf.exe 101 PID 4080 wrote to memory of 5016 4080 bdbdd22ddf.exe 103 PID 4080 wrote to memory of 5016 4080 bdbdd22ddf.exe 103 PID 4080 wrote to memory of 5016 4080 bdbdd22ddf.exe 103 PID 4080 wrote to memory of 852 4080 bdbdd22ddf.exe 105 PID 4080 wrote to memory of 852 4080 bdbdd22ddf.exe 105 PID 852 wrote to memory of 1276 852 firefox.exe 106 PID 852 wrote to memory of 1276 852 firefox.exe 106 PID 852 wrote to memory of 1276 852 firefox.exe 106 PID 852 wrote to memory of 1276 852 firefox.exe 106 PID 852 wrote to memory of 1276 852 firefox.exe 106 PID 852 wrote to memory of 1276 852 firefox.exe 106 PID 852 wrote to memory of 1276 852 firefox.exe 106 PID 852 wrote to memory of 1276 852 firefox.exe 106 PID 852 wrote to memory of 1276 852 firefox.exe 106 PID 852 wrote to memory of 1276 852 firefox.exe 106 PID 852 wrote to memory of 1276 852 firefox.exe 106 PID 1276 wrote to memory of 1344 1276 firefox.exe 107 PID 1276 wrote to memory of 1344 1276 firefox.exe 107 PID 1276 wrote to memory of 1344 1276 firefox.exe 107 PID 1276 wrote to memory of 1344 1276 firefox.exe 107 PID 1276 wrote to memory of 1344 1276 firefox.exe 107 PID 1276 wrote to memory of 1344 1276 firefox.exe 107 PID 1276 wrote to memory of 1344 1276 firefox.exe 107 PID 1276 wrote to memory of 1344 1276 firefox.exe 107 PID 1276 wrote to memory of 1344 1276 firefox.exe 107 PID 1276 wrote to memory of 1344 1276 firefox.exe 107 PID 1276 wrote to memory of 1344 1276 firefox.exe 107 PID 1276 wrote to memory of 1344 1276 firefox.exe 107 PID 1276 wrote to memory of 1344 1276 firefox.exe 107 PID 1276 wrote to memory of 1344 1276 firefox.exe 107 PID 1276 wrote to memory of 1344 1276 firefox.exe 107 PID 1276 wrote to memory of 1344 1276 firefox.exe 107 PID 1276 wrote to memory of 1344 1276 firefox.exe 107 PID 1276 wrote to memory of 1344 1276 firefox.exe 107 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\1007698001\stealc_main1.exe"C:\Users\Admin\AppData\Local\Temp\1007698001\stealc_main1.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1724
-
-
C:\Users\Admin\AppData\Local\Temp\1007699001\7ac7b9060b.exe"C:\Users\Admin\AppData\Local\Temp\1007699001\7ac7b9060b.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1012 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1608 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffe546acc40,0x7ffe546acc4c,0x7ffe546acc585⤵PID:908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2380,i,10529924228392732558,1171549829700523460,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2356 /prefetch:25⤵PID:5324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1812,i,10529924228392732558,1171549829700523460,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2452 /prefetch:35⤵PID:5336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=1968,i,10529924228392732558,1171549829700523460,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2560 /prefetch:85⤵PID:5348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3172,i,10529924228392732558,1171549829700523460,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3196 /prefetch:15⤵
- Uses browser remote debugging
PID:5688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3184,i,10529924228392732558,1171549829700523460,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3244 /prefetch:15⤵
- Uses browser remote debugging
PID:5696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4544,i,10529924228392732558,1171549829700523460,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4576 /prefetch:15⤵
- Uses browser remote debugging
PID:5216
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4624
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4340
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1012 -s 17964⤵
- Program crash
PID:4772
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007700001\693545dcca.exe"C:\Users\Admin\AppData\Local\Temp\1007700001\693545dcca.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4944
-
-
C:\Users\Admin\AppData\Local\Temp\1007701001\e7e6df844b.exe"C:\Users\Admin\AppData\Local\Temp\1007701001\e7e6df844b.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1496
-
-
C:\Users\Admin\AppData\Local\Temp\1007702001\bdbdd22ddf.exe"C:\Users\Admin\AppData\Local\Temp\1007702001\bdbdd22ddf.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4632
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4544
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4396
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3428
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5016
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2028 -parentBuildID 20240401114208 -prefsHandle 1944 -prefMapHandle 1936 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {373cc14f-5109-4d7e-b946-3bdd0c19e0ac} 1276 "\\.\pipe\gecko-crash-server-pipe.1276" gpu6⤵PID:1344
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2464 -parentBuildID 20240401114208 -prefsHandle 2448 -prefMapHandle 2444 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b5b7b6c1-22b9-4f2e-933c-814716f354c3} 1276 "\\.\pipe\gecko-crash-server-pipe.1276" socket6⤵PID:8
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3008 -childID 1 -isForBrowser -prefsHandle 3020 -prefMapHandle 3036 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 984 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {96360ff3-e412-48f1-85f5-5c5bc9f4cdd0} 1276 "\\.\pipe\gecko-crash-server-pipe.1276" tab6⤵PID:3600
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3300 -childID 2 -isForBrowser -prefsHandle 1668 -prefMapHandle 3308 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 984 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {51993b1e-0fae-4dc3-83da-cbf54f7685a8} 1276 "\\.\pipe\gecko-crash-server-pipe.1276" tab6⤵PID:2732
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4544 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4536 -prefMapHandle 4512 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {67950976-3327-4dcd-86e4-3695ad3a36a4} 1276 "\\.\pipe\gecko-crash-server-pipe.1276" utility6⤵
- Checks processor information in registry
PID:5232
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5308 -childID 3 -isForBrowser -prefsHandle 5340 -prefMapHandle 5336 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 984 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9cf79ebc-ecca-4519-880f-c9b81be6f8dd} 1276 "\\.\pipe\gecko-crash-server-pipe.1276" tab6⤵PID:5860
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5452 -childID 4 -isForBrowser -prefsHandle 5460 -prefMapHandle 5464 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 984 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {970af0f9-922c-44cc-b6d4-785effa3e3db} 1276 "\\.\pipe\gecko-crash-server-pipe.1276" tab6⤵PID:5892
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5648 -childID 5 -isForBrowser -prefsHandle 5656 -prefMapHandle 5660 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 984 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2c7fccd2-0607-4dd8-9fa4-c1299b655904} 1276 "\\.\pipe\gecko-crash-server-pipe.1276" tab6⤵PID:5908
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007703001\dcc52e6dd9.exe"C:\Users\Admin\AppData\Local\Temp\1007703001\dcc52e6dd9.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2976
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1612
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1152
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1012 -ip 10121⤵PID:5816
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4248
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:216
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD5a2069536f40f794a56e4a698ebc41498
SHA1eb1708b59c5b065af4b5d6250fac23910813e6c6
SHA25683d0ae9c59ba6c2c19af511b08e56fab406efce37c2e73c1ab3e88325999190d
SHA51241f8cea37732349f0aa1e23e4702f02373374d58fdc25f55ab73b6cd4cec90f0c26fbdd35cb21b4f1bd11003cea5794a8f134db36ad8864b0d91bc6d2717de4e
-
Filesize
239KB
MD5da5c79183dabf3510e9c6d76f7c5c087
SHA1b06a732e61d91b4e2ddc0a288f7472f1c7952271
SHA256093f37a701ed0a89cb89e00cf665f26760de3a532ef97ecd5d75ce51223f932f
SHA512c3fef14434ddbbcf14a4e551257376ae0a57884662f22cad24a009569c8e218839423a52d9715307f57565614699f8d66bc524c0f2ce7930a9b4bff9f12ea0ec
-
Filesize
4.2MB
MD5d55a94d4acedebc4b42333312be08f6b
SHA1ec5da148a43839accda27c01e221b128777602fe
SHA256c1673b575277e0d0a5b6a58c7c71b8c7e973f51dbeb9e682562a5ec447724d04
SHA512d2612761dc8ed8bf29f06d7ef18b88015d6ea568c9faecb2196df030a71b09f5a30f69551ba7c06ee4dac2e052bf82f43581a56559ccc078769e1f81119359be
-
Filesize
1.8MB
MD54d52e49c83d62bd81aea70542660d7c1
SHA124d3700da0d738830a5e4960d289f6a7892cada3
SHA256fc7acf18fe77c5a171996445710d544381dbe9765d5c886ba423f890853fd9b2
SHA5126144c9aacbd6fe995fe25d447cf43c74087dcb32d8633807629c380837d7c5b6fabefdb311078939e2562ceda61b8091a1436a3cb37e641553bfa22e6f8447f9
-
Filesize
1.8MB
MD5484a61fde611c70fb8c839df92cf985e
SHA15d9560536a1b329eaa5b36381536f1082c0ff6da
SHA25629782f0ac19c69804afcfbb6186c7729cf956e9f13ea337537c777f532699598
SHA512ca912e4234abe6810e74285aea635a132d30462f6d3894fc64a81ea7e8c23b47d499b450d4cad7c723ffe742db669a4ec1916534d58a0ba6340cbff080e60eb9
-
Filesize
900KB
MD58ac15cf603cc81e0ab0204a91e52bda1
SHA10af6a75dfada4b67958e390ab7f59a8d651dd930
SHA256ae25fcecdb0bb5303793575c8a176bb57e77cede9e437015bf2c9b1334dc8a69
SHA512209253b1d55065eb122f9bda9a93557acb3dbb5ac81f49890c059f1d21258078d999eb303f0f850c7e48e61b0db185f6fd876110fa40ed6200b94144467c835c
-
Filesize
2.7MB
MD55dd4d4d1828c8bca8d339f1e113db959
SHA1e8d1dc9e7bbee871050ac0b90f78fdb179dc36b9
SHA256255f17e80dfcbf94f8d2a1098dee2dd741a6d4560b3ca646a3402017a2c8dba3
SHA512102ab646d1c2fdcd22a3978b72159a741ba0e62d24856dcc1c1369780841fe6af6073c9d364cce58824338dc28878b5d9bdc37d2b2a1355d548ee5f7a8432236
-
Filesize
1.8MB
MD5d349980d19605cccfb15081f93c9db31
SHA1b9110f209abc6d452f13e955592df37a1e30db24
SHA256ba7b2f6e55a0b6b2aa5c2528e623ce40090c78e3be8d30d4a07f9c8ca483ae94
SHA512a3c8d876d1df6983d53b91e4fe3d0a2164a46cb24c7121f8f50c1e8565093a17b45ef482ffd6cb89eed435cf118e6482debc8c2e7bb610f227c226093184e8bc
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin
Filesize6KB
MD5df214099fd637299426dd58912dafbf3
SHA114459b483ff2611bafddb5dd638d77bf1254bd4b
SHA256efe40448b07f8ff4e43a75b4b220121ca0effa89e65ed55661fe6f82a7438408
SHA512c0fc5849101d77ac21ffb594fc2662ebd7cb79c8dce7a7d0e12aaeb788b657ffe6f1e3cf6aac64ec564b4a317300308fab3afcb90b73e209d62746a895460b94
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin
Filesize18KB
MD50127cb04227cf32f8715e566eb7531d9
SHA1650ed6f632ac8d4a862098a76d2b1e5a2b360e13
SHA256a45d326e5e376ed740f2d80ddd2b85af033ee0ff4cf3a1213da8c0ea694e4de5
SHA512602522601781fdea62ec228d075f6c0b85971e2af3c54c92d34ace24c0d60a87570535bd6d59fad8530f9817c547e7fae86bdc5dc0eded564b54fc5b38826807
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin
Filesize10KB
MD5825614dbbd75923a70ddb369fa0ae5f3
SHA1647ce2e6c3a043dab0f11d318b05006262096bdf
SHA256830b71784be2ce20dbde8c6ffbabae2e5b1a7ca2869bbe048eeaf8b026cf43ab
SHA512f1037ee1869ab96b862a3ce7174d2b8fb25d9f4c76bbf92b38738e142d3351dcf2bc10ba84580b5526cc20a0d53bf8837e0593e2495d0336b888ffe279bfd51c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD547bb1fe0858144348185f2c4b155e6f7
SHA1d6a504a63b3d19f6ee5a4aacd89c2bb39538647d
SHA256ce27ba2134b586ae12ea6388ca05c7187a0fed5ef0fb44ab47266c9f8f518e47
SHA512b2d66e0047fb2a9c5aef7f9f1e2581b6b97cd45082c5e32239d3a500f95e90dc5e115dd0b9090790e0862f086c366b9ece15bc2efbf67c59c2a2db7083c73b5a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5492b85e7e702642719857c3eb95cfb0e
SHA1be774010f250be09b24585920f458c0feed3c68c
SHA25659c74e08f68148d0d68d12b850683f529d0137c058675a8fc9cfa77e8ba5022d
SHA512d7bc49d022493a6d9f8448a13e321e19ec16096b203879d078547fa8b9a4aad81fc7ab79ca3be0645205f25bf278ae63a8bd3a3d9ea46ad40cf2f0f67af3485d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5a6adf0c89a665c04135290f8c407027c
SHA10c79a38cccb4a7e2fad6d96cfc6045442556c821
SHA25656ce95da1ce2ca18560255e2def2578aa83a25b5d4fa687c0b646eab4abccd6d
SHA512729d8839aceb7bc453ef6ab6a9966a9dc8d6dddf51f45ce20bd611f3529c7e705ead111884c4c14db083e45412e4a943a5fe4a8216fd6e57d6f1baf9343452fc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5d478c1b3094d5d19b0c605569ac96ecd
SHA10b46a92d6c2c27b29fafeba52bafe10bb16e7c7d
SHA256b2edb98c6beab49baf8d3f2340b7a0ef0ff7b8fd244ff6ec1eaceeaf4dea00af
SHA512ed53b6f000fd76320c95dc28320648b2ec39228933d46df58ce4d761e7ad0b0017f0f565457f760e51759f61a8f4f3b2ea14a5fce97b2c02232cfd8f78170881
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\0198e262-d953-4c3a-9bf9-3ed1e1b95f1a
Filesize671B
MD50e03b5a37eef537df6aa21417a55c3c9
SHA1c8b3ecabe904ad66c7141d529966620eb5cc95a4
SHA25629b4e92bffbbe0a9f1667695cf938a0b39020ceca3026cea0a9bbfdbd3c2602a
SHA5126a9b31eec048e64f6fc6a9a16d0ae92a3564d3a98b21f73913706fb9000cd7d6bbce93089f44c581b1e15524bc33371eab7f03a54d68569133272a61262a7d8e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\75a6c2ff-7b12-40b1-ac31-44086463ef42
Filesize982B
MD5230a4c7a9e5e0c8ea1081e1c30c9b5d3
SHA18de1339cb2c1ba9dbcf12f34eb67e89ec7d8aeec
SHA256bf2224391e84b669d651cda885e74133c594f22ebc2277bc7f72ab5fbe369686
SHA512e84d925c4d8196dbd8be924d1c8f0d11f883d213a4e358bd5cd81d52827e94af9b98eec6fba7a026fe1cd058ee6672ccd43b2aff75a6c969a6c0335940d13237
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\acc137cd-af28-47cc-906e-918d040cd3d1
Filesize25KB
MD521aaa631dc02412668a36826b6e5885d
SHA1c77a3dc7ce47db044a4bdaa8e652e8755c01a5d3
SHA256c4fb1d676e3d87df16f9b6833a0c307ec7279e35025a98ff1f507dbbb66942e5
SHA5123d856967d408daf9b447aad0eebe4ea734cb3f422cb1e90dbfb3c91507be7fea5c8206e805050a229444a57ecad922d3c0846e64073e5a23194014fe0b1ff07f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD57b4d4ca38a67d82f7763c1a6ea322a31
SHA1447e65658fe25f5aa43c86b3eb8a113d9d0f7dd2
SHA2566963a5b3fa52607d69f3fd2894277f9bed4f1ec868464b888c262fb1219ba9a2
SHA512036c0c35bcaaf4bca5046680ec3f799fe2e17255d598b995525435db8931000047ae317c8921dd799d1c7378dff6387edbc141c172e4ed339ebd6bb155959da6
-
Filesize
12KB
MD5f194d5c00c7a4ff6d45eb08c19869aa9
SHA1cd49327ed8b62e254b406577c22350d0c55a586e
SHA2569f8a8c25121fbf04cf10b029f1f30594281b6ba30a27ce4d8446faa4d7cd2895
SHA512d6e630085f22e3c97a3d1f2f5491930b398368b762f605e8bc1e09bcc619f7366f01d0af56fc82ae2c8045e9afdf08b541f9f1148ed5f97c0f964154b8f1eb2f
-
Filesize
15KB
MD5d9880702066e206faae6bf60f1bb068f
SHA1224164bad735f883ceaa08c7182097d0a5166e11
SHA256cbc55dc425723f8c270ae183b7dfec0f5ebe6eed41bd26ccbc34ea4e2df47d69
SHA512389473df1748dc345afe7cc3713aebb6dea815b7c95b029e3b654c406bd7daa8936a0f2fbe2089f2249e98f9f821d5303ed43a16a0cd04f9f5dad773818776a4
-
Filesize
11KB
MD5ccaefbad2951e7aeb20a6aedb7774801
SHA1a976e4ee17e4938041055c44e4ecad2e3fc7a07a
SHA256b9694c1dac0ba7bed701c11642f36fbafe3e77447c522665975c172d8fdde99b
SHA512d26c1e6fae89556f8a9831d5a5533550ff6047e9581092cf7df136a548c6d50b8156c52cf5463954398fe2a67dc56671c2b06060c59fa270030c8ed7d2f68b32
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize2.5MB
MD5c5d334a060c945c67eabe68bcb0774ca
SHA1a5843e1db4e3fb98a6349329295672fd7a339701
SHA256cf291af96edd4f70d18cbf8c4aeedbb2313b0055f95015a1c9ff1f37e90b84ef
SHA512af326fb8ce339d38f79d4fd439084c56cc7d6ea21b860dd87e4f499902b0d66f53ce0d6a095503f002b3d531fa0f5b453e65b6f813ce85f4b343d0e54931a0a3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize2.9MB
MD5b9469fde0d0c3274ab709c4017abb903
SHA1a0ba731c26efba4a6881556ac3ff9a651001cfc7
SHA2566ca929455f09b9135aab0daad549d5b6fc70a088058011f4c48221bb52bf2eae
SHA51250448def1998b2654559ef8ffa8a469da026cd2ba45cd5e629cea7618a26cb26270adf2e1d43757999d9b2283edfe0051be01dfe7f77d4378ce364c36dd995fe
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize5.0MB
MD5a9d2f1c15ad8bdc2614d94d549bb5585
SHA1feb135657ab1221476eb138bccdbfa3b5d6d7ae4
SHA256e170aab69e9d34503e70ff66aad2514eafaa48b32091358a6cf7215740713240
SHA512b1782feb460e8ca52d2c41267e1531deedee741456e2217efc89e35efb9cd80e79e6495fb74a456fdd73c9f601fea40db0c574e28f51e93a7b36554d1620812d