Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-12-2024 02:05
Static task
static1
Behavioral task
behavioral1
Sample
1ceab2ffb1eeba5856886c108f56de4f25bb0e15b7ff84d75cae17197f3f2215.exe
Resource
win7-20240708-en
General
-
Target
1ceab2ffb1eeba5856886c108f56de4f25bb0e15b7ff84d75cae17197f3f2215.exe
-
Size
1.8MB
-
MD5
08d46090c22ff00bd53e843027e0dc26
-
SHA1
ec4d86baa8a294a18daf44fcb61eca03c3116c23
-
SHA256
1ceab2ffb1eeba5856886c108f56de4f25bb0e15b7ff84d75cae17197f3f2215
-
SHA512
c9d9214076bd90886b52713287c771264f2a46a76d93b42c6a208bc95e0f5d58a4d41dafe7feadf114f27c1cd430fd90c571e5a30f078c1b9459a8212224b0ed
-
SSDEEP
24576:z2BoyWmAgwI0L6ul/urTQzxYtarKUKkpOb0A93R8S9D5pbgFqAKzeleH4W+:z2OFe0L6ugiKhxs6pqqAKzCeH
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
drum
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 1167e4073c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 1167e4073c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 1167e4073c.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 1167e4073c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 1167e4073c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 1167e4073c.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ee6f53dc88.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1167e4073c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c11e2f82b0.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1ceab2ffb1eeba5856886c108f56de4f25bb0e15b7ff84d75cae17197f3f2215.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9f5610c26b.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c11e2f82b0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9f5610c26b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ee6f53dc88.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ee6f53dc88.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1ceab2ffb1eeba5856886c108f56de4f25bb0e15b7ff84d75cae17197f3f2215.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9f5610c26b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1167e4073c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c11e2f82b0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1ceab2ffb1eeba5856886c108f56de4f25bb0e15b7ff84d75cae17197f3f2215.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1167e4073c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 1ceab2ffb1eeba5856886c108f56de4f25bb0e15b7ff84d75cae17197f3f2215.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 11 IoCs
pid Process 3452 skotes.exe 2600 N67fLgN.exe 1608 skotes.exe 956 HRFuUub.exe 1816 9f5610c26b.exe 3104 ee6f53dc88.exe 3320 6e6b82773d.exe 4320 1167e4073c.exe 4704 c11e2f82b0.exe 5140 skotes.exe 4504 skotes.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine ee6f53dc88.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 9f5610c26b.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 1167e4073c.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine c11e2f82b0.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 1ceab2ffb1eeba5856886c108f56de4f25bb0e15b7ff84d75cae17197f3f2215.exe -
Loads dropped DLL 1 IoCs
pid Process 956 HRFuUub.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 1167e4073c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 1167e4073c.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\9f5610c26b.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1011126001\\9f5610c26b.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ee6f53dc88.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1011127001\\ee6f53dc88.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\6e6b82773d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1011128001\\6e6b82773d.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\1167e4073c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1011129001\\1167e4073c.exe" skotes.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0008000000023bf8-114.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 4928 1ceab2ffb1eeba5856886c108f56de4f25bb0e15b7ff84d75cae17197f3f2215.exe 3452 skotes.exe 1608 skotes.exe 1816 9f5610c26b.exe 3104 ee6f53dc88.exe 4320 1167e4073c.exe 4704 c11e2f82b0.exe 5140 skotes.exe 4504 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1ceab2ffb1eeba5856886c108f56de4f25bb0e15b7ff84d75cae17197f3f2215.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 952 956 WerFault.exe 90 2072 1816 WerFault.exe 98 -
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ee6f53dc88.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1ceab2ffb1eeba5856886c108f56de4f25bb0e15b7ff84d75cae17197f3f2215.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language N67fLgN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HRFuUub.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9f5610c26b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6e6b82773d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1167e4073c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c11e2f82b0.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 2928 taskkill.exe 1104 taskkill.exe 3584 taskkill.exe 4084 taskkill.exe 4020 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 4928 1ceab2ffb1eeba5856886c108f56de4f25bb0e15b7ff84d75cae17197f3f2215.exe 4928 1ceab2ffb1eeba5856886c108f56de4f25bb0e15b7ff84d75cae17197f3f2215.exe 3452 skotes.exe 3452 skotes.exe 1608 skotes.exe 1608 skotes.exe 1816 9f5610c26b.exe 1816 9f5610c26b.exe 3104 ee6f53dc88.exe 3104 ee6f53dc88.exe 3320 6e6b82773d.exe 3320 6e6b82773d.exe 4320 1167e4073c.exe 4320 1167e4073c.exe 3320 6e6b82773d.exe 3320 6e6b82773d.exe 4320 1167e4073c.exe 4320 1167e4073c.exe 4320 1167e4073c.exe 4704 c11e2f82b0.exe 4704 c11e2f82b0.exe 5140 skotes.exe 5140 skotes.exe 4504 skotes.exe 4504 skotes.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 1104 taskkill.exe Token: SeDebugPrivilege 3584 taskkill.exe Token: SeDebugPrivilege 4084 taskkill.exe Token: SeDebugPrivilege 4020 taskkill.exe Token: SeDebugPrivilege 2928 taskkill.exe Token: SeDebugPrivilege 468 firefox.exe Token: SeDebugPrivilege 468 firefox.exe Token: SeDebugPrivilege 4320 1167e4073c.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 4928 1ceab2ffb1eeba5856886c108f56de4f25bb0e15b7ff84d75cae17197f3f2215.exe 3320 6e6b82773d.exe 3320 6e6b82773d.exe 3320 6e6b82773d.exe 3320 6e6b82773d.exe 3320 6e6b82773d.exe 3320 6e6b82773d.exe 3320 6e6b82773d.exe 3320 6e6b82773d.exe 468 firefox.exe 468 firefox.exe 468 firefox.exe 468 firefox.exe 468 firefox.exe 468 firefox.exe 468 firefox.exe 468 firefox.exe 468 firefox.exe 468 firefox.exe 468 firefox.exe 468 firefox.exe 468 firefox.exe 468 firefox.exe 468 firefox.exe 468 firefox.exe 468 firefox.exe 468 firefox.exe 468 firefox.exe 468 firefox.exe 468 firefox.exe 3320 6e6b82773d.exe 3320 6e6b82773d.exe 3320 6e6b82773d.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 3320 6e6b82773d.exe 3320 6e6b82773d.exe 3320 6e6b82773d.exe 3320 6e6b82773d.exe 3320 6e6b82773d.exe 3320 6e6b82773d.exe 3320 6e6b82773d.exe 3320 6e6b82773d.exe 468 firefox.exe 468 firefox.exe 468 firefox.exe 468 firefox.exe 468 firefox.exe 468 firefox.exe 468 firefox.exe 468 firefox.exe 468 firefox.exe 468 firefox.exe 468 firefox.exe 468 firefox.exe 468 firefox.exe 468 firefox.exe 468 firefox.exe 468 firefox.exe 468 firefox.exe 468 firefox.exe 468 firefox.exe 468 firefox.exe 3320 6e6b82773d.exe 3320 6e6b82773d.exe 3320 6e6b82773d.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 468 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4928 wrote to memory of 3452 4928 1ceab2ffb1eeba5856886c108f56de4f25bb0e15b7ff84d75cae17197f3f2215.exe 82 PID 4928 wrote to memory of 3452 4928 1ceab2ffb1eeba5856886c108f56de4f25bb0e15b7ff84d75cae17197f3f2215.exe 82 PID 4928 wrote to memory of 3452 4928 1ceab2ffb1eeba5856886c108f56de4f25bb0e15b7ff84d75cae17197f3f2215.exe 82 PID 3452 wrote to memory of 2600 3452 skotes.exe 87 PID 3452 wrote to memory of 2600 3452 skotes.exe 87 PID 3452 wrote to memory of 2600 3452 skotes.exe 87 PID 3452 wrote to memory of 956 3452 skotes.exe 90 PID 3452 wrote to memory of 956 3452 skotes.exe 90 PID 3452 wrote to memory of 956 3452 skotes.exe 90 PID 956 wrote to memory of 4992 956 HRFuUub.exe 92 PID 956 wrote to memory of 4992 956 HRFuUub.exe 92 PID 956 wrote to memory of 4992 956 HRFuUub.exe 92 PID 956 wrote to memory of 4992 956 HRFuUub.exe 92 PID 956 wrote to memory of 4992 956 HRFuUub.exe 92 PID 956 wrote to memory of 4992 956 HRFuUub.exe 92 PID 956 wrote to memory of 4992 956 HRFuUub.exe 92 PID 956 wrote to memory of 4992 956 HRFuUub.exe 92 PID 956 wrote to memory of 4992 956 HRFuUub.exe 92 PID 956 wrote to memory of 4992 956 HRFuUub.exe 92 PID 956 wrote to memory of 4992 956 HRFuUub.exe 92 PID 956 wrote to memory of 4992 956 HRFuUub.exe 92 PID 956 wrote to memory of 4992 956 HRFuUub.exe 92 PID 956 wrote to memory of 4992 956 HRFuUub.exe 92 PID 956 wrote to memory of 4992 956 HRFuUub.exe 92 PID 956 wrote to memory of 4992 956 HRFuUub.exe 92 PID 956 wrote to memory of 4992 956 HRFuUub.exe 92 PID 956 wrote to memory of 4992 956 HRFuUub.exe 92 PID 956 wrote to memory of 4992 956 HRFuUub.exe 92 PID 956 wrote to memory of 4992 956 HRFuUub.exe 92 PID 956 wrote to memory of 4992 956 HRFuUub.exe 92 PID 3452 wrote to memory of 1816 3452 skotes.exe 98 PID 3452 wrote to memory of 1816 3452 skotes.exe 98 PID 3452 wrote to memory of 1816 3452 skotes.exe 98 PID 3452 wrote to memory of 3104 3452 skotes.exe 99 PID 3452 wrote to memory of 3104 3452 skotes.exe 99 PID 3452 wrote to memory of 3104 3452 skotes.exe 99 PID 3452 wrote to memory of 3320 3452 skotes.exe 102 PID 3452 wrote to memory of 3320 3452 skotes.exe 102 PID 3452 wrote to memory of 3320 3452 skotes.exe 102 PID 3320 wrote to memory of 1104 3320 6e6b82773d.exe 103 PID 3320 wrote to memory of 1104 3320 6e6b82773d.exe 103 PID 3320 wrote to memory of 1104 3320 6e6b82773d.exe 103 PID 3320 wrote to memory of 3584 3320 6e6b82773d.exe 105 PID 3320 wrote to memory of 3584 3320 6e6b82773d.exe 105 PID 3320 wrote to memory of 3584 3320 6e6b82773d.exe 105 PID 3320 wrote to memory of 4084 3320 6e6b82773d.exe 107 PID 3320 wrote to memory of 4084 3320 6e6b82773d.exe 107 PID 3320 wrote to memory of 4084 3320 6e6b82773d.exe 107 PID 3320 wrote to memory of 4020 3320 6e6b82773d.exe 109 PID 3320 wrote to memory of 4020 3320 6e6b82773d.exe 109 PID 3320 wrote to memory of 4020 3320 6e6b82773d.exe 109 PID 3320 wrote to memory of 2928 3320 6e6b82773d.exe 111 PID 3320 wrote to memory of 2928 3320 6e6b82773d.exe 111 PID 3320 wrote to memory of 2928 3320 6e6b82773d.exe 111 PID 3320 wrote to memory of 2244 3320 6e6b82773d.exe 113 PID 3320 wrote to memory of 2244 3320 6e6b82773d.exe 113 PID 2244 wrote to memory of 468 2244 firefox.exe 114 PID 2244 wrote to memory of 468 2244 firefox.exe 114 PID 2244 wrote to memory of 468 2244 firefox.exe 114 PID 2244 wrote to memory of 468 2244 firefox.exe 114 PID 2244 wrote to memory of 468 2244 firefox.exe 114 PID 2244 wrote to memory of 468 2244 firefox.exe 114 PID 2244 wrote to memory of 468 2244 firefox.exe 114 PID 2244 wrote to memory of 468 2244 firefox.exe 114 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ceab2ffb1eeba5856886c108f56de4f25bb0e15b7ff84d75cae17197f3f2215.exe"C:\Users\Admin\AppData\Local\Temp\1ceab2ffb1eeba5856886c108f56de4f25bb0e15b7ff84d75cae17197f3f2215.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Users\Admin\AppData\Local\Temp\1010920001\N67fLgN.exe"C:\Users\Admin\AppData\Local\Temp\1010920001\N67fLgN.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2600
-
-
C:\Users\Admin\AppData\Local\Temp\1011118001\HRFuUub.exe"C:\Users\Admin\AppData\Local\Temp\1011118001\HRFuUub.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"4⤵PID:4992
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 956 -s 10084⤵
- Program crash
PID:952
-
-
-
C:\Users\Admin\AppData\Local\Temp\1011126001\9f5610c26b.exe"C:\Users\Admin\AppData\Local\Temp\1011126001\9f5610c26b.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1816 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1816 -s 15524⤵
- Program crash
PID:2072
-
-
-
C:\Users\Admin\AppData\Local\Temp\1011127001\ee6f53dc88.exe"C:\Users\Admin\AppData\Local\Temp\1011127001\ee6f53dc88.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3104
-
-
C:\Users\Admin\AppData\Local\Temp\1011128001\6e6b82773d.exe"C:\Users\Admin\AppData\Local\Temp\1011128001\6e6b82773d.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1104
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3584
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4084
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4020
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2928
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:468 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2016 -parentBuildID 20240401114208 -prefsHandle 1932 -prefMapHandle 1924 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c2baceea-0448-478f-bb71-f7333b96093f} 468 "\\.\pipe\gecko-crash-server-pipe.468" gpu6⤵PID:1004
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2432 -parentBuildID 20240401114208 -prefsHandle 2376 -prefMapHandle 2380 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fcf748ae-5d64-4e3e-9423-4bb79c2b8e22} 468 "\\.\pipe\gecko-crash-server-pipe.468" socket6⤵PID:2348
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3172 -childID 1 -isForBrowser -prefsHandle 2996 -prefMapHandle 3200 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1104 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0e7c42b0-d1d6-45e9-aacf-7ada4a10d4f1} 468 "\\.\pipe\gecko-crash-server-pipe.468" tab6⤵PID:2060
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4232 -childID 2 -isForBrowser -prefsHandle 4228 -prefMapHandle 4224 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1104 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b97e758d-d39d-488c-b8ac-3ddc3bbbd171} 468 "\\.\pipe\gecko-crash-server-pipe.468" tab6⤵PID:4736
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4776 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4000 -prefMapHandle 4784 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {66ada137-7a67-4691-90d4-21569b0d8ad7} 468 "\\.\pipe\gecko-crash-server-pipe.468" utility6⤵
- Checks processor information in registry
PID:5408
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5128 -childID 3 -isForBrowser -prefsHandle 5092 -prefMapHandle 5116 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1104 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a0d6f0de-7d75-4578-9441-b2631dd36ea3} 468 "\\.\pipe\gecko-crash-server-pipe.468" tab6⤵PID:5728
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5380 -childID 4 -isForBrowser -prefsHandle 5372 -prefMapHandle 5368 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1104 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f447a10d-e873-45ba-bc7a-67b18e64c248} 468 "\\.\pipe\gecko-crash-server-pipe.468" tab6⤵PID:5740
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5504 -childID 5 -isForBrowser -prefsHandle 5580 -prefMapHandle 5576 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1104 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {28f94b89-885d-4028-b4a3-08b8dd589f1d} 468 "\\.\pipe\gecko-crash-server-pipe.468" tab6⤵PID:5772
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1011129001\1167e4073c.exe"C:\Users\Admin\AppData\Local\Temp\1011129001\1167e4073c.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4320
-
-
C:\Users\Admin\AppData\Local\Temp\1011130001\c11e2f82b0.exe"C:\Users\Admin\AppData\Local\Temp\1011130001\c11e2f82b0.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4704
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 208 -p 956 -ip 9561⤵PID:2676
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 1816 -ip 18161⤵PID:4940
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5140
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4504
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\activity-stream.discovery_stream.json
Filesize27KB
MD57bdd1d6b37b9651bb9ca77d116aae5ab
SHA151b6784ca4445517db3bf3096eab3eeb99278019
SHA2561b0af8c569551a9b94c1acfe4b6d03eeea9892c0516458dd812fd33525dcb70e
SHA5127c6cbb6d9a6337178046b020f666a3069553e46167b55c344f59e42cfabdf1b87c07dc1a7e8972e38e189b444bd02c674873cbf677e7784e9d47d50941bf1ef2
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD5339dade65849087cd807af6fc3c215fa
SHA134366b128456b3e7500976a6f27f73b6a714165c
SHA256b3c33fe64d32184deae253caed22a01d56a8fa3ed254333ef66ff8ea8865693e
SHA5123b566b7f540a32bbab596abdaa5b823edd69d5a5cb2a2978758ba56ee522766f8b10a6b65e5c6d4d64319e3539259f2a00827dafdaac1b5821b94c57844d21e1
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD5567aba591e6c61280df5cc52da3ece4c
SHA1ac9d8a69111a2225bb6b37bcf6c9bb408041bf87
SHA2569cfa52596e7be0e0b3f803352024741d21901cd2708c554242038e779883881b
SHA512f23dbb8b6ec40a8f33f4f4c8c6175f2f4ae6fdfa545aecb4f2ff2bab0450b07c6201475fe4caec76710cc838faba770a243c5607d4db1248889cf494090bbb0f
-
Filesize
5.2MB
MD5974049047492d0a73f8c23e25de924ef
SHA197a726b88efaf70855af7cebb15c7564c45bc43c
SHA2565ca90e9115be40ba7fd2d93b848fd2b0be7eb37115ed96f23d3b8051854981d8
SHA512bf7350536c404b84a25abf91c00f7fa6a78f3e857fe6a0915fff124f121cfa6138001d075858c077d36ef0698b92c040942e4eb539531d7c890be77fdc0b8ec2
-
Filesize
217KB
MD598da391545b4823ca67e6cc3a927dae9
SHA1d2f66837884d6d65dfe21372501cc7ba1d91ef29
SHA25612862b60140f019b0c251da7be59caf90d93eca6a30d016609cf2ff1da4652a7
SHA51259130547c169768310d57c075f2cec01a71704e9658955ef8eb1c6b2c30a24a801623f189eac14a84357aa597f5d5c96c5c9f8e96ee4ddf7bcf911dcf6bcb7b9
-
Filesize
1.8MB
MD5eeefaaa894aa82d64174a8c41f8ab9b0
SHA1c30ac06bee85663b7dbbc5eb4fe54832759f71d7
SHA256b55a48f57d7e79e090e4ad42ce5d29f769ea489edf526631b7fd8bfd3fafdc4c
SHA512528847d3842d7a7c43b4f23bf86539182c495e61be57762f69d2ab1d953a29fe605f3e1b3febf54c8a78bb8c4a0835209a31d92eb0c2c7f828abc7462062538a
-
Filesize
1.7MB
MD54cedcb7c416db7284b663e6e1f136e0f
SHA1fc9571cc5bb12358d4f7de84a545526cee192739
SHA2565cc1a4dde4501a910faf8c7e78d175bb4cd49391660a30881cd718bdd2b59a12
SHA5128c1d76de266cac03f24b70b59d66f0210cab464e93fcee54ba641843143ae5a86a490aff5d624224c5e346734a8150cd50e1ad58205c78afe6fa7434019e762a
-
Filesize
900KB
MD55f3ea7a51720a32aeace6b8421388abd
SHA1886fb8f762ab9913c93f6334105d2b9fe9f1b333
SHA256675820a9bc3354e1ab558f288eb1037a137bac7289686587ac8464b30c1c7521
SHA512d9f60fefc7d8a69351ea597ad191fcfd2a54bfe8fe3aa12d0c58eba31dac63a8892fc0123a220bd8249d767378c448306f52d5f11d42b9a3a94d7ed6c34904bb
-
Filesize
2.7MB
MD5c5aab82e08cc80d82267340709bbdd7e
SHA13c4cff8a0a41878cafec853ae9283e0bb9b4c1b0
SHA2560b057aee49fcf8faabc5b28f0e1ba10d6e02eb2847bc7aa871a3a9856ec736ce
SHA5122e331308e413fc76013c6237ccf16efd307c0c0bb65d51717429b4e2dcc666602ef61fbba5821177ecd7ff517a38ad95db6b8386b9f098b4ffdb251af1499b81
-
Filesize
1.9MB
MD5870c92cf89253baeaf80574aaad15adc
SHA1feefb55fa434ceb4aa10997bedfccd5597852078
SHA25665238eee07b00d608d030a601ebe0878656466084e1f55e9e41258bec1370b59
SHA512fe1cf7efa897c4c4fada01ba67ef38e7491d96870ab32354b0acbf2bb0cfa32faf914d05037d6e813fcc9b1241466acdaa178adeacc2451ea371f1189e7923c6
-
Filesize
1.8MB
MD508d46090c22ff00bd53e843027e0dc26
SHA1ec4d86baa8a294a18daf44fcb61eca03c3116c23
SHA2561ceab2ffb1eeba5856886c108f56de4f25bb0e15b7ff84d75cae17197f3f2215
SHA512c9d9214076bd90886b52713287c771264f2a46a76d93b42c6a208bc95e0f5d58a4d41dafe7feadf114f27c1cd430fd90c571e5a30f078c1b9459a8212224b0ed
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin
Filesize10KB
MD59bbbe189c05a5205390302f854f7095b
SHA1e9e47a242a9468648de1228c5056a2ca35b8e70b
SHA256ee8f461f0a150dc259335bf665eb631a55ba313dccb4139ecdc37d28c78fa543
SHA51256f690c332d65b86b1614d49146ac49a110e6d41fa35cae734be66f1da4b1d3fefbe50884b8dde712db924a5d40480b7ef51af247ce82e679f7535fd3200fc54
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD518fd616eeb52b9c2e2ed4472f9e51b7b
SHA1591992d80aec515d7e3ff833339720533d417fa6
SHA2564e1ab8c171e03c1628e503c58416dfbffe6d6bbec87b282c818c7f0c9bf8f0c2
SHA5122ff907f3d771789c84a000ac513a0b3e7ef17c6715681f77e55d9cbe5ce4c58a5a4c164e9a567a67f30a07f3635a265b5935c9e1674d8315408470085c70179f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD5c30e8446feb819e23415fea869afb9f3
SHA1de9b183e94d3d8749bc4cb6846be5761784a1c41
SHA256d078dc2e14d7b8657311a9744a0bede40c5b23f89da608ab43755fc8b8febec1
SHA5122fe324ccdb47c9d45c96ff55c54a1e9739e2c89d9c5fe7a56b9787e33ddad9cbe0ab5a31c42ad1d4b42a91d299124db030279dfde690ba791e96ff924bf32cf5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize24KB
MD52cf23fe34153b63d5f7e002ba07ccafd
SHA18e4cef731f7a2ec63315b24bf35c545e4ec0575d
SHA2560e06d12126322ced0d5a4ef473a03d0d4b897f131f2b190bfcc6281f09aec323
SHA51261c2c997237b2a20ec4e575a7bdf2daa09db503f3f95738bf862ad6fb2e9b0b404037f3a7572e7e531dd09f7e47c732cb8b3b22d2be6d4267dd1e55853100a85
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize21KB
MD5f6ee9cca9ad79370d824c9ad5d2afb37
SHA13fa52f341f33371a1d824f379f008d4337de5e73
SHA256091cd2f108415aa8d808e82ba678acfe7b344e99b9373b58eb0fa606e9d72a49
SHA512778dc5660002c69b334bd1559a5506579407384f7492f241853d79d243b0d9563e8e7f75074f7c8d1164caffc7c2f97d08053b4ad6125d4d489f6c7584570f73
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize24KB
MD51f3b15e4b104460909bbfe2c82133462
SHA1447f86143deaa81be5db842b518dc84ad933563e
SHA25645e051e4b4bd93272964b02d968805267600a7dabba03b280cd021de6027c76c
SHA512177a786bc62fedb853027b787922b5d393bf17a0fd4b0c127f149335a27e6dd5095bc776caa0233845dc0150654904bfeab158ea6fae6c4f178248482b076bd3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD5111b43e199927c73afef7a34af90fc01
SHA14ca707e3f059dfe7c94b77c78f06ddddb2d31873
SHA2568a0d3c6e2c33d3c63cddc82583bc12873b26d7e89f31b12de98d0124e0605e45
SHA5124942112adddcf0318d49c1b2a2f664e1c802f883d84f0ebd058e27f61553a6a0d03b039f4d97ba4bbd168c4e00ab07be1b5b631eecdbfc3150aacd371b6657fd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\d7094aa6-2280-4881-9a56-edc1e39db4ad
Filesize982B
MD5e5466f7c14533cae913391013c7f1eef
SHA14c17925f49202f1c0916e12726f4a887abb2b7f3
SHA256590fe1e94c9125987018e03611b2c7c4e1eac07100384391c571fc3e2fae9ebf
SHA5126e6a851bc14cbbbb864ab6eb5bb85528e8035b1f575206094492c3d1a4f678a88614521df19d4fe9199245478abb0f5666da8a60db1c8fd8eedfa8f3e76e4993
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\f4031910-aff5-4246-acad-b35d6d8daf6e
Filesize659B
MD5f5096686e0a15d344a30fca7711b0c44
SHA1471046b77314ac78aadc10d22a086b65e11bb9eb
SHA2560792410ef4f7b04e0f3b807c15370f1f92b21ce96b86c5b028a76e84b1d54c13
SHA512421e30d3633bd215d92aa2f7acb2c43a473c70d53225e16458693b13a8eac83836cede3841619c1e7bd3ad80b57df26c666dd4e7546739e4798d72e509710ef2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
15KB
MD5da3e0a0822a4c2779c146f69f9cb2849
SHA169d10a4a78f53f6ff4a40f037d40a794bbfb7520
SHA25682723dd024051109b011f23a3b05cedf37111a02abef3f80fffbf0c652665d96
SHA5129c62580986b75f62a94e1551fd07739ddb4038dae18396756ed490699a439083ed7c813176e2e3e8a6b5cc602756cd3cd82f46a596a7e377ffe5ed3904ba8294
-
Filesize
10KB
MD52647e25d4438bf09d5c8a5f7dd7be9ad
SHA1f00480efe0adac035047783eda9563725a3dd491
SHA256d479caea65fd34a9752b19f1a8012ced9b67ba33c3999eab69176b2ede928a2d
SHA51289eda7ec56e558aa769f4b30485030154beb3853f984d8b5aaf8cfe874cdc7424c2e563713d60f6ab4c51958756658e2fa670838f11825a1eb784e57d95c05c3
-
Filesize
10KB
MD53b5704848bdf0196ea02e31348727e40
SHA1416a6531259d65d99b2dc83b0446d52f49894d23
SHA256fe1a24413ead087e919ad1fa016b0dce161d7d2e8c15f3056e15d9ed3f5df2e5
SHA51266a73369dfdcfa2fa56473373b8e0596f7e25af21b358e8a00b316b2a1c078c78bbed9c31839b8273287821e46dee5e4652368729326d2981bdc8fa3f07b7639
-
Filesize
12KB
MD5e035ef0e15e12301adbb939b040ff6ec
SHA125bf3458916b63ed547bbe367f4a589ef30ab713
SHA2567fb336846a5ca0b8dfcc7c5377565ab4628d71755496a0d56217a9c76f04d16e
SHA512e18c44f8ce6be1241acd8412a95ffa0a0e772a5841d69c5c3f93694d32e6e28cd296fa02347c7160d500f8c232ab17bd630b6d9601bcf44252ec700a4f554223
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize2.1MB
MD592b3d5d849bc3cae75839cce060343a3
SHA191d78e39f80f90cb223251d18f575ef8a7aa26ba
SHA256b9f52e5abc966d2dad7a4a32d64187cf1da0df8358a6329bc03090bc56d4f5c9
SHA512bf63ec5843d07207737662bf80f846fa63038464215ca8fb63bc393d0d36339ef3dec8cae708424a2c87225cabb582dfc88c8c4ed3bdabdb71174ec4087d9574
-
Filesize
126KB
MD5b48e172f02c22894ad766c52303f087a
SHA161da0ff26dfc3759f7cd79696430b52f85073141
SHA256712e46f7a4f9da7fabd0b1acd5e848527bd70b6c4444dc92c8479ac108d71753
SHA5125b8a888a9d87a4ee34f57799d3d6baf69cd556a2d1336afb109adc488a5efa1c7cd094c3785cf9af726a0c41be3a56a0ffac933b7fa7fb5dec9643f3af08bdfd