Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2024 19:30
Static task
static1
General
-
Target
9144a69a32522508c9925661e17a5195abf2b3935fdb87f8b491a634b2a2197b.exe
-
Size
7.1MB
-
MD5
90f2beaf31b3b505a4b5a086efbf7f87
-
SHA1
1f6f616cebb407139cee1152de31259ede5c8990
-
SHA256
9144a69a32522508c9925661e17a5195abf2b3935fdb87f8b491a634b2a2197b
-
SHA512
b9939a0a3ebc4b40589ce47f670453e9afcb521d34c61f48c516e9570f3d1e9936aa830fcce457227d30d81d651173ea037e28faab7381e8e8141c8f89fc03c8
-
SSDEEP
196608:Lr8PF09IQ/usqoWwdROub9UpXrozQiwSVK:LrIF0r/usQwdP9UpXrozcSV
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://powerful-avoids.sbs
https://motion-treesz.sbs
https://disobey-curly.sbs
https://leg-sate-boat.sbs
https://story-tense-faz.sbs
https://blade-govern.sbs
https://occupy-blushi.sbs
https://frogs-severz.sbs
https://property-imper.sbs
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4k611Y.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4k611Y.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4k611Y.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c2fd18b16c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c2fd18b16c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4k611Y.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4k611Y.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4k611Y.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c2fd18b16c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c2fd18b16c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c2fd18b16c.exe -
Stealc family
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF fbf6a5dd92.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 12 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0c6e131c35.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0b231685ee.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dfdd1b8d64.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c2fd18b16c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1S39w3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2Q5174.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3f28H.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4k611Y.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ fbf6a5dd92.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 24 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4k611Y.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4k611Y.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0c6e131c35.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0b231685ee.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1S39w3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2Q5174.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion fbf6a5dd92.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0b231685ee.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c2fd18b16c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1S39w3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3f28H.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3f28H.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion fbf6a5dd92.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0c6e131c35.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dfdd1b8d64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dfdd1b8d64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c2fd18b16c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2Q5174.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 1S39w3.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 15 IoCs
pid Process 4532 f1F91.exe 2040 L0u87.exe 2480 1S39w3.exe 1180 skotes.exe 5052 2Q5174.exe 3068 3f28H.exe 4740 4k611Y.exe 1796 fbf6a5dd92.exe 4216 0c6e131c35.exe 2080 0b231685ee.exe 5100 dfdd1b8d64.exe 4392 452e2d412f.exe 5308 c2fd18b16c.exe 5428 skotes.exe 2096 skotes.exe -
Identifies Wine through registry keys 2 TTPs 12 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine fbf6a5dd92.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 0c6e131c35.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine c2fd18b16c.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 0b231685ee.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine dfdd1b8d64.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 1S39w3.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 2Q5174.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 3f28H.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 4k611Y.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4k611Y.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4k611Y.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c2fd18b16c.exe -
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\0b231685ee.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009686001\\0b231685ee.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dfdd1b8d64.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009687001\\dfdd1b8d64.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\452e2d412f.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009688001\\452e2d412f.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\c2fd18b16c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009689001\\c2fd18b16c.exe" skotes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9144a69a32522508c9925661e17a5195abf2b3935fdb87f8b491a634b2a2197b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" f1F91.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" L0u87.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0007000000023ca6-143.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
pid Process 2480 1S39w3.exe 1180 skotes.exe 5052 2Q5174.exe 3068 3f28H.exe 4740 4k611Y.exe 1796 fbf6a5dd92.exe 4216 0c6e131c35.exe 2080 0b231685ee.exe 5100 dfdd1b8d64.exe 5308 c2fd18b16c.exe 5428 skotes.exe 2096 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1S39w3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5680 4216 WerFault.exe 97 -
System Location Discovery: System Language Discovery 1 TTPs 19 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4k611Y.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 452e2d412f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0c6e131c35.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c2fd18b16c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language L0u87.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1S39w3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3f28H.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2Q5174.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fbf6a5dd92.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dfdd1b8d64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0b231685ee.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9144a69a32522508c9925661e17a5195abf2b3935fdb87f8b491a634b2a2197b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f1F91.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 3756 taskkill.exe 1664 taskkill.exe 1732 taskkill.exe 3732 taskkill.exe 996 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 41 IoCs
pid Process 2480 1S39w3.exe 2480 1S39w3.exe 1180 skotes.exe 1180 skotes.exe 5052 2Q5174.exe 5052 2Q5174.exe 3068 3f28H.exe 3068 3f28H.exe 4740 4k611Y.exe 4740 4k611Y.exe 4740 4k611Y.exe 4740 4k611Y.exe 1796 fbf6a5dd92.exe 1796 fbf6a5dd92.exe 1796 fbf6a5dd92.exe 1796 fbf6a5dd92.exe 1796 fbf6a5dd92.exe 1796 fbf6a5dd92.exe 1796 fbf6a5dd92.exe 1796 fbf6a5dd92.exe 1796 fbf6a5dd92.exe 1796 fbf6a5dd92.exe 4216 0c6e131c35.exe 4216 0c6e131c35.exe 2080 0b231685ee.exe 2080 0b231685ee.exe 5100 dfdd1b8d64.exe 5100 dfdd1b8d64.exe 4392 452e2d412f.exe 4392 452e2d412f.exe 5308 c2fd18b16c.exe 5308 c2fd18b16c.exe 4392 452e2d412f.exe 4392 452e2d412f.exe 5308 c2fd18b16c.exe 5308 c2fd18b16c.exe 5308 c2fd18b16c.exe 5428 skotes.exe 5428 skotes.exe 2096 skotes.exe 2096 skotes.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 4740 4k611Y.exe Token: SeDebugPrivilege 1732 taskkill.exe Token: SeDebugPrivilege 3732 taskkill.exe Token: SeDebugPrivilege 996 taskkill.exe Token: SeDebugPrivilege 3756 taskkill.exe Token: SeDebugPrivilege 1664 taskkill.exe Token: SeDebugPrivilege 3572 firefox.exe Token: SeDebugPrivilege 3572 firefox.exe Token: SeDebugPrivilege 5308 c2fd18b16c.exe -
Suspicious use of FindShellTrayWindow 32 IoCs
pid Process 2480 1S39w3.exe 4392 452e2d412f.exe 4392 452e2d412f.exe 4392 452e2d412f.exe 4392 452e2d412f.exe 4392 452e2d412f.exe 4392 452e2d412f.exe 3572 firefox.exe 3572 firefox.exe 3572 firefox.exe 3572 firefox.exe 4392 452e2d412f.exe 3572 firefox.exe 3572 firefox.exe 3572 firefox.exe 3572 firefox.exe 3572 firefox.exe 3572 firefox.exe 3572 firefox.exe 3572 firefox.exe 3572 firefox.exe 3572 firefox.exe 3572 firefox.exe 3572 firefox.exe 3572 firefox.exe 3572 firefox.exe 3572 firefox.exe 3572 firefox.exe 3572 firefox.exe 4392 452e2d412f.exe 4392 452e2d412f.exe 4392 452e2d412f.exe -
Suspicious use of SendNotifyMessage 30 IoCs
pid Process 4392 452e2d412f.exe 4392 452e2d412f.exe 4392 452e2d412f.exe 4392 452e2d412f.exe 4392 452e2d412f.exe 4392 452e2d412f.exe 3572 firefox.exe 3572 firefox.exe 3572 firefox.exe 3572 firefox.exe 4392 452e2d412f.exe 3572 firefox.exe 3572 firefox.exe 3572 firefox.exe 3572 firefox.exe 3572 firefox.exe 3572 firefox.exe 3572 firefox.exe 3572 firefox.exe 3572 firefox.exe 3572 firefox.exe 3572 firefox.exe 3572 firefox.exe 3572 firefox.exe 3572 firefox.exe 3572 firefox.exe 3572 firefox.exe 4392 452e2d412f.exe 4392 452e2d412f.exe 4392 452e2d412f.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3572 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5084 wrote to memory of 4532 5084 9144a69a32522508c9925661e17a5195abf2b3935fdb87f8b491a634b2a2197b.exe 82 PID 5084 wrote to memory of 4532 5084 9144a69a32522508c9925661e17a5195abf2b3935fdb87f8b491a634b2a2197b.exe 82 PID 5084 wrote to memory of 4532 5084 9144a69a32522508c9925661e17a5195abf2b3935fdb87f8b491a634b2a2197b.exe 82 PID 4532 wrote to memory of 2040 4532 f1F91.exe 83 PID 4532 wrote to memory of 2040 4532 f1F91.exe 83 PID 4532 wrote to memory of 2040 4532 f1F91.exe 83 PID 2040 wrote to memory of 2480 2040 L0u87.exe 84 PID 2040 wrote to memory of 2480 2040 L0u87.exe 84 PID 2040 wrote to memory of 2480 2040 L0u87.exe 84 PID 2480 wrote to memory of 1180 2480 1S39w3.exe 85 PID 2480 wrote to memory of 1180 2480 1S39w3.exe 85 PID 2480 wrote to memory of 1180 2480 1S39w3.exe 85 PID 2040 wrote to memory of 5052 2040 L0u87.exe 86 PID 2040 wrote to memory of 5052 2040 L0u87.exe 86 PID 2040 wrote to memory of 5052 2040 L0u87.exe 86 PID 4532 wrote to memory of 3068 4532 f1F91.exe 90 PID 4532 wrote to memory of 3068 4532 f1F91.exe 90 PID 4532 wrote to memory of 3068 4532 f1F91.exe 90 PID 5084 wrote to memory of 4740 5084 9144a69a32522508c9925661e17a5195abf2b3935fdb87f8b491a634b2a2197b.exe 92 PID 5084 wrote to memory of 4740 5084 9144a69a32522508c9925661e17a5195abf2b3935fdb87f8b491a634b2a2197b.exe 92 PID 5084 wrote to memory of 4740 5084 9144a69a32522508c9925661e17a5195abf2b3935fdb87f8b491a634b2a2197b.exe 92 PID 1180 wrote to memory of 1796 1180 skotes.exe 94 PID 1180 wrote to memory of 1796 1180 skotes.exe 94 PID 1180 wrote to memory of 1796 1180 skotes.exe 94 PID 1180 wrote to memory of 4216 1180 skotes.exe 97 PID 1180 wrote to memory of 4216 1180 skotes.exe 97 PID 1180 wrote to memory of 4216 1180 skotes.exe 97 PID 1180 wrote to memory of 2080 1180 skotes.exe 98 PID 1180 wrote to memory of 2080 1180 skotes.exe 98 PID 1180 wrote to memory of 2080 1180 skotes.exe 98 PID 1180 wrote to memory of 5100 1180 skotes.exe 99 PID 1180 wrote to memory of 5100 1180 skotes.exe 99 PID 1180 wrote to memory of 5100 1180 skotes.exe 99 PID 1180 wrote to memory of 4392 1180 skotes.exe 100 PID 1180 wrote to memory of 4392 1180 skotes.exe 100 PID 1180 wrote to memory of 4392 1180 skotes.exe 100 PID 4392 wrote to memory of 1732 4392 452e2d412f.exe 101 PID 4392 wrote to memory of 1732 4392 452e2d412f.exe 101 PID 4392 wrote to memory of 1732 4392 452e2d412f.exe 101 PID 4392 wrote to memory of 3732 4392 452e2d412f.exe 103 PID 4392 wrote to memory of 3732 4392 452e2d412f.exe 103 PID 4392 wrote to memory of 3732 4392 452e2d412f.exe 103 PID 4392 wrote to memory of 996 4392 452e2d412f.exe 105 PID 4392 wrote to memory of 996 4392 452e2d412f.exe 105 PID 4392 wrote to memory of 996 4392 452e2d412f.exe 105 PID 4392 wrote to memory of 3756 4392 452e2d412f.exe 107 PID 4392 wrote to memory of 3756 4392 452e2d412f.exe 107 PID 4392 wrote to memory of 3756 4392 452e2d412f.exe 107 PID 4392 wrote to memory of 1664 4392 452e2d412f.exe 109 PID 4392 wrote to memory of 1664 4392 452e2d412f.exe 109 PID 4392 wrote to memory of 1664 4392 452e2d412f.exe 109 PID 4392 wrote to memory of 532 4392 452e2d412f.exe 111 PID 4392 wrote to memory of 532 4392 452e2d412f.exe 111 PID 532 wrote to memory of 3572 532 firefox.exe 112 PID 532 wrote to memory of 3572 532 firefox.exe 112 PID 532 wrote to memory of 3572 532 firefox.exe 112 PID 532 wrote to memory of 3572 532 firefox.exe 112 PID 532 wrote to memory of 3572 532 firefox.exe 112 PID 532 wrote to memory of 3572 532 firefox.exe 112 PID 532 wrote to memory of 3572 532 firefox.exe 112 PID 532 wrote to memory of 3572 532 firefox.exe 112 PID 532 wrote to memory of 3572 532 firefox.exe 112 PID 532 wrote to memory of 3572 532 firefox.exe 112 PID 532 wrote to memory of 3572 532 firefox.exe 112 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\9144a69a32522508c9925661e17a5195abf2b3935fdb87f8b491a634b2a2197b.exe"C:\Users\Admin\AppData\Local\Temp\9144a69a32522508c9925661e17a5195abf2b3935fdb87f8b491a634b2a2197b.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\f1F91.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\f1F91.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\L0u87.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\L0u87.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1S39w3.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1S39w3.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Users\Admin\AppData\Local\Temp\1009679001\fbf6a5dd92.exe"C:\Users\Admin\AppData\Local\Temp\1009679001\fbf6a5dd92.exe"6⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1796
-
-
C:\Users\Admin\AppData\Local\Temp\1009680001\0c6e131c35.exe"C:\Users\Admin\AppData\Local\Temp\1009680001\0c6e131c35.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4216 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4216 -s 17927⤵
- Program crash
PID:5680
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009686001\0b231685ee.exe"C:\Users\Admin\AppData\Local\Temp\1009686001\0b231685ee.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2080
-
-
C:\Users\Admin\AppData\Local\Temp\1009687001\dfdd1b8d64.exe"C:\Users\Admin\AppData\Local\Temp\1009687001\dfdd1b8d64.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5100
-
-
C:\Users\Admin\AppData\Local\Temp\1009688001\452e2d412f.exe"C:\Users\Admin\AppData\Local\Temp\1009688001\452e2d412f.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1732
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3732
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:996
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3756
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1664
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3572 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2012 -parentBuildID 20240401114208 -prefsHandle 1928 -prefMapHandle 1920 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {cbfc5846-51b2-4c37-8603-34c22f767c63} 3572 "\\.\pipe\gecko-crash-server-pipe.3572" gpu9⤵PID:1796
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2440 -parentBuildID 20240401114208 -prefsHandle 2420 -prefMapHandle 2416 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {42708c0b-c310-4ccd-8240-da3049ed53a5} 3572 "\\.\pipe\gecko-crash-server-pipe.3572" socket9⤵PID:2696
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3132 -childID 1 -isForBrowser -prefsHandle 3000 -prefMapHandle 1496 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 948 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c9a9c49f-9141-4181-a3fe-d9881ff5a93b} 3572 "\\.\pipe\gecko-crash-server-pipe.3572" tab9⤵PID:1008
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3852 -childID 2 -isForBrowser -prefsHandle 3832 -prefMapHandle 3828 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 948 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {67880aa2-676e-49e3-8792-fcce86b825c3} 3572 "\\.\pipe\gecko-crash-server-pipe.3572" tab9⤵PID:4740
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4776 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4760 -prefMapHandle 4752 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {31f11164-892c-49e3-8c4b-4cf4662b1eec} 3572 "\\.\pipe\gecko-crash-server-pipe.3572" utility9⤵
- Checks processor information in registry
PID:5192
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5432 -childID 3 -isForBrowser -prefsHandle 4048 -prefMapHandle 5308 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 948 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {629f4521-f517-44a6-b40a-ee90f73a9fa1} 3572 "\\.\pipe\gecko-crash-server-pipe.3572" tab9⤵PID:2580
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5616 -childID 4 -isForBrowser -prefsHandle 5536 -prefMapHandle 5540 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 948 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {96db05dd-76a2-4c54-bb25-6f9dfdec17de} 3572 "\\.\pipe\gecko-crash-server-pipe.3572" tab9⤵PID:6468
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5512 -childID 5 -isForBrowser -prefsHandle 5760 -prefMapHandle 5768 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 948 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {916428ae-8fd3-492a-a246-98cd6b895622} 3572 "\\.\pipe\gecko-crash-server-pipe.3572" tab9⤵PID:6488
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009689001\c2fd18b16c.exe"C:\Users\Admin\AppData\Local\Temp\1009689001\c2fd18b16c.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5308
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2Q5174.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2Q5174.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5052
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3f28H.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3f28H.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3068
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4k611Y.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4k611Y.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4740
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4216 -ip 42161⤵PID:5660
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2096
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\activity-stream.discovery_stream.json
Filesize19KB
MD5490ec5aacce29dcbb71351667de41419
SHA114020da0cf0a99f888d3031e51a2cc315dd78c83
SHA256896251c560bcdd601457ddfd6adba365e3eb4843157e0580a23bf8ea16b6050c
SHA5121cd95defd11079d20b02b77b284f520252e318285fbb0a8bb80972883b44b0960a3ba03b1371e53e6138895cba35ee76007c83b536e8eb917a128fdb3a90f653
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD51bca4347aa4d01a6df094ec2dc4e05cd
SHA1b268a9b9d9b762456aa4bd4628de2c3d3cf850e8
SHA256a39c2c60c2ef5579081cc5985215ad79c2531f51a47360972b2eb0d5a62b8538
SHA51274b2ebe6e5382a0aad5fd1b71166cb4d08d097d30915ec8a6784ceae7328795991ccbe66cf20cf398e5a88640748d6d184f2ee4e43c0d1b9ace3880bd0043410
-
Filesize
4.3MB
MD570647ec5c04eaafb04b3319a7e0b1d67
SHA116a45cb01b76d4a81000fdaa9b1a75b7d2e6ec44
SHA25637125e305ba7aaf98800a69466f688c52b53ad4f3c5f5d9d539f4b6711a13a23
SHA512095025eecbfd5af29106384b3a6994830de3e43e54ec9486c75afc122557d15ee71c7ae9036d7945e3320d12573e98bc489dc5276ef7c5a59a788124612e1334
-
Filesize
1.9MB
MD5885e6fcd0b6139ddb438d6db924465e4
SHA141aef5b16d0bf65a18779a0171c093bf19ab2d76
SHA256005c6b318c758f7e6f3177d07ef6e4e4b30ff2109e44534cd7b17340549d6e94
SHA51282257aa2f61bebfb04e85754727301075007ede1b8bb642ac4a8df81a3217a1f62a0af426ae8e51dab1d61d0d04d382799e2c04add35c0137c97e4b598d2ceb0
-
Filesize
1.8MB
MD5fd1f2501fbb5f83648efd77157d22a11
SHA1745de9c6dcaa0fef52a724fa404f38d861c92ed8
SHA256f98fe19e292f629b6aec9d727a675d300a4c5dd120838cbd4947e1886c79bbc8
SHA512c6d14636931628721716a1c30cce21a208cff987dd13a191f371cc1232c6706a5f31e981db2667d459675abe626b8bf8eba5ff5a6a4d0d67439b4b9dba6c6459
-
Filesize
1.7MB
MD54191074820cd73a0f0edd8c9393b65d3
SHA1f75a73ec023fb70e5e983f7d0b76ad043899d420
SHA25642f69933b009301fd412e6b58e28b4bd1d171a8e2673bf1b1c6ac890965e7a50
SHA512bbca8ca391207ac56f4358dff103b709c8c150677aff503bf01209ef4ea19c4744a5e589561f836304f7c4be40a5943847e1f1860cc830107f1f01303f5b9896
-
Filesize
901KB
MD5fb6be4084a60a128c15160d66b41d3be
SHA1fc9cdd579da3e435c4ef92d4e9ad5b7ea6240cbf
SHA256b0ca1c759a005abdf711c6218b3b336445d80c628848c8cdc1b38cc10503adf9
SHA51269ea650929c6db4b0f7e9a03ce7f7516645b9df7c45142e1d65958d837201f42750a74382353b8dc2e08a81ca7d2cf0d4aa9520718c3bbbcd6d70fa35613e5e4
-
Filesize
2.6MB
MD5d4ca05c1ad8d1c5d274ed45292b75c35
SHA15d0ee2634ef41287f575fbe13308d90ec596a011
SHA2564b53cd4f550517ae4def78e143c607d08ac70806550ce843b9acb91828b1d4bf
SHA5123d858cfb232413838d46fc4ae0fe92490de8a9efcbe5535c64a336ceda1fd895cdd8050e5a9387bbdb84c037fd4432a55008dad048443bd62d845882a41c3858
-
Filesize
2.7MB
MD501285653ca8a2eb1c5019d7dd9ce2dd9
SHA19d7d050f384dd3c93c7339364bcc81f62f1f6cc3
SHA2567a0090a9bf99ebb2678dd1ce7cfa9c7a639de3efafc54caad46872d23f3bea91
SHA5126965f64c7b9766566211256bfd3d93d9bdad24ce686d9f4ae7e74920bb2d8c89e41af07a2dae88d7ec712aafcf6b88ab688498bdfa9065b3af410c6b363c77a0
-
Filesize
5.5MB
MD5291577f7284de4d5c32286b5708deed0
SHA1ea688c7fc1a3356a6c956acd575a11922a2a7889
SHA2565e7c8fd8a86bc0f6c5b9ae9628c6a0551c4ad714449c7d5f46e34a23f9f0ce15
SHA512ba36421c16af69f57dc037bfc931b1fac1cff3b9945590d821b383dc665ac0fbb52e430c8e400ac292ea2b933e3eb96c257692816d688f185c09d344c67648fd
-
Filesize
1.7MB
MD50dd47a23f602ac01f2056af12bcde686
SHA1e590de7c9343a2d6753b733d99a80364faa45a87
SHA256b9858ce3e37de66edb1481c9f986550d19ca50008f33c9a16c6b858bd9a65af5
SHA512aa1927d1d8c907c1d4b89fd1489d55b6132f6bb6617dd66993f9ec6973f86d8c57330351e854d0623f70e82cd3f05c693091f8322f2936d86c3366f15410c39a
-
Filesize
3.7MB
MD5227a9b49576030571a5071b67acc7e47
SHA1daa70f36122eb54159685f1bcdc858a51f1eb66d
SHA256788b9c071cbc156c82f31890e73e6e16be81c6287734d928637bc0f4bbe6bc3a
SHA51229a58705cbb9a5edd1856a8637b38d06cd3952998f2ebf0c23cf69af9478ed2c401e7695f99c1340f614a0be328544e90600673a2a598d4a69e42412cc11fbf8
-
Filesize
1.9MB
MD50afca9260a5cca722153d2af2e383849
SHA140b92c82d01c374478523af6f100b31df8485dc3
SHA25632b754ed2258a0a657ba352db08cb3c9d657836018fd7a3d3f6226ac602d8672
SHA512e103596e06a55301aba6f3440323ffe242be2b3e9fec2c3559aeeb21e9399a6dd69c63c943fb9e316ea4dab1ddcdda2d3814551c240da7c878a1be7cd3fcff40
-
Filesize
1.8MB
MD59b77922b04d6fd67f521d9ee14348a61
SHA1a653c93dc24b5967c6a7936d6af82ed3994e13e8
SHA2567a58ea79e18acffa09370717fbcffe0b3aeb344f4037bd38feb45f5c0671f32d
SHA512bfb066880b229fa13095b5df5a290698e967e8569a51c8fb5ed8ad16f862091c5d6b7fd28b3ce90692ce2024536b29e6ef80f09098a3f8df4500747bf08fc2ea
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin
Filesize6KB
MD5568f19e8f53cae0afdecb3998c09b379
SHA1853f9315605e7a457747f56bf2871d9b8532255b
SHA256ed334f8a398cc6cc849ea5f9a2cda620d081222047c6902cbe5259e405bd9bbe
SHA512e63e0aaf05d2a129d726797e620d5a57d98197fe6a3ae568bd9593ff92914474a5dad5ad1c3cf51d3f469e72cb362dd81ea34eb2f16dfbbd902c2e4cdbae2944
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin
Filesize8KB
MD55707d3dbd6fb2480b8cb13c12819a9fb
SHA184fe927e5ddbf58f22dd6718b654a2cf653ce94b
SHA256d8c0efb418ea661813c1eec07d3033b89bb8baa4b5866681eb0338836dea33d5
SHA5124a190c7b1a3811ce0ae095c022f7e33c659268a2d297c6f733e4df2004fbeae875a611fc6298bf416b97fa1fa48309fb123a9a44d9e61d32cc4561c0a756f319
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.bin
Filesize23KB
MD5315d645bfebd533974acce2c5235072f
SHA146bc9ea7142790e50b914d3041a4ddd78a65d177
SHA256d79ec616a4dc84ad2a21b4c3ffb4ea544562773f7c44ac6ad2cf79ae531ef138
SHA512c7f8a785de078620b51f4fdc8939a5e4813b921765f202111bf34039d7a3e3063d1ccab24b1c66b3deef4971b0dd6baf59808abfee2ebcec4ab286496726dc37
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.bin
Filesize6KB
MD53ff05bc853a3dbff78f4d6bb77c72f37
SHA15eb4154e9bfe47c165fc9aa896b9fdc7a3aa9bb2
SHA25623f04f9e1a9aa430e95e405888c4c225e4a709d74f1ee26bcc760f56d1305918
SHA51276e6be01282900eaf7ef8134adb96224771199bf84a61ae8cf398585515caa20a8c8eff668fff7ea8a533dfc93f88168c348ac26fc2cd9e6e5855d85ae6d8f5f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.bin
Filesize15KB
MD5e0162cfcc7e16ceb7d34792312a19bcf
SHA12fe9976890cbeac12c0bfc45c96c418c83e83e96
SHA256bf55df411922f54daeb6ce04f6a082b018f90776377aee46e9c1a13c68465005
SHA5129137fcda56a4b21f1b18530610e1e48338b7eec2d089468cd3599a0f4fc96625ee9e7c23e13483547d6570c63bd4751a265ba0d44f85b98060cf95d635a7b7a9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.bin
Filesize15KB
MD586a19d6d9d301bb795ee681417ce6128
SHA1cf4e09df8a649e5909a4246d9bd4858d43003a7c
SHA2566faabd50fbee5cddddedbda6564ee343344bfd72ea573a1e066a27a02700ac06
SHA512b3f35f7891d12001b398ad1f19e47555e20fa07ac18adf4f84daa343fa2d707fd15a17707a56ce61a6f975c5b8eea597b3ebf9556e485d94f80f8f26ea8952d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.bin
Filesize15KB
MD5204c62198f9dd0ee5c72f8c612d88095
SHA109df069d32505f1ce1174aa141e00136861ed669
SHA2568e7ca2a0090d03c0b7e187110d8f7b977b88ff07ada97ba1494ec5f4eca726b1
SHA512e195dcac78c6b121aa356275405a5530b49890d3e6aa3e66afb0cec20207b6732070ac472998a2f07da1717953a160cd72564a25f58c19a37fa035adfe571a10
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5884d996d328f21ffe6c5bacd6c7d56a3
SHA199930f7f9d35cc4b51432f01b32d34c3201d786d
SHA25638952cf32194c2201274a8cc713566cf854c0dea2db3b84e1892f0df41607541
SHA512be94eda0d5629057a294ae07ce2e035c9ac344bf4787ef0b6e19c4f7d1e13eff6dd877a4fc89326950286d4596b107d885aca2c90a963978888ffb9177b01db9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5a3840d1f19a104f0710f7d5538ad1106
SHA18e361b654461d66fb163e570cbbbc7d88d601c3e
SHA2564bd63a379c8b74806bf354c9e7af6a9100be319493823a8aefc98d4f78aba9d3
SHA5128dcf34bc19fd743044f267bc5c56cc13bc30d7225a3f64cb5f3a7a692a1c38c31a765d376e860ea3102e0b308a66b47de25b3a2d0ab45ebe77be858cb19525ab
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5173985cc55623615b2c8b03ba739dc4c
SHA1a8373f8cf9637714e5563a68777eedc01688ef4e
SHA2569dbdb2004f04a0a7c5f027b3e2c37469b452f9d03d12ae1c9a9150fcaa5959fb
SHA5126b87594230c4dc20051ba713e05e051c695fa33bf313b7bb9e98014a2055dcc309871d2cde32465e8b41ac5cb7b15aca57fb3c463b3509fb9fc97b1a015a3f6c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5bb980e72a56e654cc0e2c2738a7e98e3
SHA18ac3e82c0190648f4aba317b84c3ec03dd63c85e
SHA2564032b2f0717a06de8d7763c3f7c8e6208cf21f49a52b6ffb8daa89f3140011d8
SHA5125aeb9265298dee86d1fc3d1122d202b58096617cb46f9d1f4d6be415a50dc8d46f9b4e9ad80467deb046c1503cf48b8463405aab0758cbae3f6582e18a634ab8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5e5fea5bc6dd0f698052fc94d0adcff15
SHA129b38205f6900be5203878be023d2267964286a3
SHA256ff9641232e85dc68d6b0207e338fd08d984fa308df6ceb5a1dbf090ab7655a42
SHA512bb34dbe456176577aa90faf2081c709225f84679119dcc391286f27bf9edde89786276689e276176388b81dbbfadc64f7806e53e222acc239db88a15e48fd99b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5748a7ca5c3f79ed7af8597d9090617bf
SHA142ac4f8da336ef6ed9fba20647019f62aa9fcd7d
SHA25643506d348136e9f3360a357405e33e9134dcc0139d4b98fb9493b832c7d86ca6
SHA5125343daee2f520de2b59d58da99d8c3efaa2931e1ebcd14632952d9341dfb4e83e3145ae5d62e47ca0783a5c4f86720a373c3212d5eeb470921115363ea4687f0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\43446c47-98b9-4608-aac5-0a9537dad017
Filesize671B
MD52f4c9ccffac7e5bcb005e589ea166337
SHA16df4472b50b63a229d6bf104535b607661e10954
SHA25688cd980585aec29b9ce03c6a587f3e6419a255e922f91b3dbb9da400c4bb6d78
SHA512ff1e727fd42d84aef54d2c73f5bf93107bff75e359fb53e733e3eb6aeb8d1a73e363216e5a94814b8c3debf89cfe819d68dd33f50fcd35fb9eb28ae952aa7da7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\9ae322db-01ee-4384-863c-f1413d0eb711
Filesize27KB
MD524ccafe93c82698e106c5d72673a4b5e
SHA133616c8d5655c45d74782063f5a984e860a7b19a
SHA2562661af6c16f42c0fed7a748925193a5ae040ee33c2e534e3750e83a02e8f1275
SHA512aa1970708a1b01f71a751c1fe3a3e65391211d016bc30338d8cb5aec0f06c4abf71c3a5d9e723badf84b031ce9db196747d53b469263b8ec8be6b634fdd677d6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\b0d6ca7b-7be0-4136-a6a4-f1a2f7733cc7
Filesize982B
MD59163e314ded8b803aa471e6664404704
SHA10ec22f377c229e8f32b20c13d402aaf9e6f07ffa
SHA256c4b51e4c5ccb0251c8b7c89372872afbc9408109919bbcdea382314c6b61db85
SHA5122bd80bf92530395ff83281563365e981ffda6e7b69ed0feb29ffe326ab37859f737f096084d15112964b0a9d203aa39ca0ac99a3bc9387091bfb58d6f12fdcde
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD509c941eb878dda667ee107bd82a35d4e
SHA1b92e6fbcfa3870f381f4bed7a2ccc6f3cb1c15f0
SHA2568f6c0eb7299c91f5416a6e4b15ed75edec1fbebeb5f75261d15920c8671d1baa
SHA5121243078cf21ce4d7cf0a90534240ff85300ec381ce410767685ec4876fbfa68647b7374fb956855bb29dc157e59d49bf1a3350049b72d604317faf451d36b791
-
Filesize
11KB
MD5fb803d808c22e140067f4be5f029e59b
SHA123eece8d7914408aa9fe7d6d6424aee19ff6c86c
SHA256946c21f9fdc89edf055e34eb118e4cc7545eabc2598c357f4add6cafe21fad42
SHA51203eeededc9cbd9320bb4b4fe3ae02971a4a8fa9ca7aac3954c9b6e046e1226e3e359c87023092b657497427a16fb04d2f98016acae0f33da4f34ce8148632942
-
Filesize
13KB
MD51e3e0fa0717804b5c31b5f56b0f50c22
SHA15fef80dfcdd691c52fa776b15d60879cc4f6452a
SHA25603a126440da285c028f553157ed03db86d6ce560e0c9534a807bfd299683ef93
SHA512687ad4ad67bdee3e841b7a5d96b024f3d3a4ad73e34b4f414dbda489892c80df8b10666a7ef2f07e1a75845497d210c2a8522c14aa000726e032e8a8a9f8a454
-
Filesize
10KB
MD5f48c6e1b701ebf73b0549236e12a45ba
SHA1df2f773aee97879da7bbcdef7a7a88fcb7c8a093
SHA256589948f2f5e217ff6c495ed4e4e22e8d0f995d8d337d94e64c8ef3614f02c98e
SHA512e42ade87316a6486170dab31d0ca8f230566174b9c9ac2aa37d4c10b41c94bb6114059d62b40621f7d28f02b0b29919a7785c9154811ef0278e247316bef4fee
-
Filesize
10KB
MD5bfdae901567bf32eaea11915e3ad72d4
SHA125e124f5fea779e6c6b4095765a57cb80b20139b
SHA256a9be709eb4f9dd661f26786aa6aeef40733f13190edad936a35385bd06c0eedd
SHA5121200aa237054c173ecc8065e0dca77969dce2cb9e8a1ed5c41a4203d18eb4e54299223a4565e8c277bc94dd820e74ee45910aa031eec389fd9a44372f3a3fc6a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize2.5MB
MD54a470352f4607a284f608d8b8961607e
SHA1890208172b5d509a85c5436592bfad4832a24f75
SHA2567a197c3509278df1f7464a7e4c4d55e50ad16187c49a0ba9a04b64b1dc767bf7
SHA512bd8651f004877bced4dfe8825959489d20d5291d2de22483a1f27089d32d2366375ca2c8c3d631af667fa412a8f6b18b65763c7a0a339733cd5628c4736a6f9f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize2.5MB
MD50489fbc2a3cb9c99f58c10978c9d1c16
SHA1cf9f2e28d0425dc89e053ea57f9e03378df2ef6c
SHA256d79c921d8c3bd903682d6e497cc72712d43ad0c0c5f34fd6e4f4d425369cc52a
SHA512ea3a1172c19ec7ca380768f72ba35a09ecc39c0e2b8b7da7695d2f356942584d3a02067a00a78690e0c5cfbd45552b1e63fbcce5f0963e8e3aa3a6cb522460e4