Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-12-2024 09:49
Static task
static1
Behavioral task
behavioral1
Sample
f72dcfa8ca3dee1079c951692be0b687f51586cace5d485f29e1ae55fb0f7813.exe
Resource
win7-20240729-en
General
-
Target
f72dcfa8ca3dee1079c951692be0b687f51586cace5d485f29e1ae55fb0f7813.exe
-
Size
1.8MB
-
MD5
1f6294fca2fa8c5e80eafb976f65aa60
-
SHA1
d0d52c6af42cebe1dc967635d1d4f9d2a2a40ebd
-
SHA256
f72dcfa8ca3dee1079c951692be0b687f51586cace5d485f29e1ae55fb0f7813
-
SHA512
aef446a9e5656bb820e8086e053972e70d4f2a315918d0c298def9610c1376c9575b91a7c3f4c1677788f8edb88d0acdffa854f417e03c63f0be90995d1c3257
-
SSDEEP
24576:XwCB2oPYi1/hTqNgy5qGeetO6M5LhQa2dqGhUaWnNTUAuNvNBRWC2akAmGlHaiKl:X3B2G1/hA3tVM5gVUK1Bs7bGlHrvFF+
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
drum
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 3d2aca9d8e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 3d2aca9d8e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 3d2aca9d8e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 3d2aca9d8e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 3d2aca9d8e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 3d2aca9d8e.exe -
Stealc family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
description pid Process procid_target PID 8 created 3416 8 ACkcr88.exe 56 PID 1344 created 3416 1344 StilKrip02.exe 56 -
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF ac4f41a521.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ef6329c844.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e3bad1c1b6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ac4f41a521.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f72dcfa8ca3dee1079c951692be0b687f51586cace5d485f29e1ae55fb0f7813.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5e7b88361b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3d2aca9d8e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 20 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e3bad1c1b6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f72dcfa8ca3dee1079c951692be0b687f51586cace5d485f29e1ae55fb0f7813.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5e7b88361b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ef6329c844.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3d2aca9d8e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e3bad1c1b6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ac4f41a521.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ef6329c844.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f72dcfa8ca3dee1079c951692be0b687f51586cace5d485f29e1ae55fb0f7813.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3d2aca9d8e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5e7b88361b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ac4f41a521.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation f72dcfa8ca3dee1079c951692be0b687f51586cace5d485f29e1ae55fb0f7813.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation ACkcr88.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RedirectedGuid.vbs ACkcr88.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TypeId.vbs StilKrip02.exe -
Executes dropped EXE 13 IoCs
pid Process 3940 skotes.exe 5028 tpZOod0.exe 2168 ef6329c844.exe 3832 5e7b88361b.exe 3092 skotes.exe 2932 ff49060312.exe 5764 3d2aca9d8e.exe 5228 e3bad1c1b6.exe 5800 ac4f41a521.exe 8 ACkcr88.exe 1344 StilKrip02.exe 4444 skotes.exe 6768 skotes.exe -
Identifies Wine through registry keys 2 TTPs 10 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine ef6329c844.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine e3bad1c1b6.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine f72dcfa8ca3dee1079c951692be0b687f51586cace5d485f29e1ae55fb0f7813.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 5e7b88361b.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 3d2aca9d8e.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine ac4f41a521.exe -
Loads dropped DLL 1 IoCs
pid Process 5028 tpZOod0.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 3d2aca9d8e.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 3d2aca9d8e.exe -
Accesses Microsoft Outlook profiles 1 TTPs 42 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook InstallUtil.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook InstallUtil.exe Key queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook InstallUtil.exe Key queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook InstallUtil.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook InstallUtil.exe Key queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook InstallUtil.exe Key queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook InstallUtil.exe Key queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook InstallUtil.exe Key queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook InstallUtil.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook InstallUtil.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook InstallUtil.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ef6329c844.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1011256001\\ef6329c844.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5e7b88361b.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1011257001\\5e7b88361b.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ff49060312.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1011258001\\ff49060312.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\3d2aca9d8e.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1011259001\\3d2aca9d8e.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000023cc5-94.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
pid Process 2864 f72dcfa8ca3dee1079c951692be0b687f51586cace5d485f29e1ae55fb0f7813.exe 3940 skotes.exe 2168 ef6329c844.exe 3832 5e7b88361b.exe 3092 skotes.exe 5764 3d2aca9d8e.exe 5228 e3bad1c1b6.exe 5800 ac4f41a521.exe 4444 skotes.exe 6768 skotes.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 8 set thread context of 5540 8 ACkcr88.exe 133 PID 1344 set thread context of 5636 1344 StilKrip02.exe 134 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job f72dcfa8ca3dee1079c951692be0b687f51586cace5d485f29e1ae55fb0f7813.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
pid pid_target Process procid_target 3136 5028 WerFault.exe 83 2172 2168 WerFault.exe 93 400 2168 WerFault.exe 93 948 2168 WerFault.exe 93 -
System Location Discovery: System Language Discovery 1 TTPs 20 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tpZOod0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language ff49060312.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f72dcfa8ca3dee1079c951692be0b687f51586cace5d485f29e1ae55fb0f7813.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5e7b88361b.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage ff49060312.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3d2aca9d8e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ac4f41a521.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ef6329c844.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ACkcr88.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language StilKrip02.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ff49060312.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e3bad1c1b6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 3936 taskkill.exe 3156 taskkill.exe 2696 taskkill.exe 8 taskkill.exe 1720 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 5540 InstallUtil.exe -
Suspicious behavior: EnumeratesProcesses 39 IoCs
pid Process 2864 f72dcfa8ca3dee1079c951692be0b687f51586cace5d485f29e1ae55fb0f7813.exe 2864 f72dcfa8ca3dee1079c951692be0b687f51586cace5d485f29e1ae55fb0f7813.exe 3940 skotes.exe 3940 skotes.exe 2168 ef6329c844.exe 2168 ef6329c844.exe 3832 5e7b88361b.exe 3832 5e7b88361b.exe 3092 skotes.exe 3092 skotes.exe 2932 ff49060312.exe 2932 ff49060312.exe 5764 3d2aca9d8e.exe 5764 3d2aca9d8e.exe 2932 ff49060312.exe 2932 ff49060312.exe 5764 3d2aca9d8e.exe 5764 3d2aca9d8e.exe 5764 3d2aca9d8e.exe 5228 e3bad1c1b6.exe 5228 e3bad1c1b6.exe 5800 ac4f41a521.exe 5800 ac4f41a521.exe 5800 ac4f41a521.exe 5800 ac4f41a521.exe 5800 ac4f41a521.exe 5800 ac4f41a521.exe 5800 ac4f41a521.exe 5800 ac4f41a521.exe 5800 ac4f41a521.exe 5800 ac4f41a521.exe 8 ACkcr88.exe 8 ACkcr88.exe 1344 StilKrip02.exe 1344 StilKrip02.exe 4444 skotes.exe 4444 skotes.exe 6768 skotes.exe 6768 skotes.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeDebugPrivilege 3936 taskkill.exe Token: SeDebugPrivilege 3156 taskkill.exe Token: SeDebugPrivilege 2696 taskkill.exe Token: SeDebugPrivilege 8 taskkill.exe Token: SeDebugPrivilege 1720 taskkill.exe Token: SeDebugPrivilege 1840 firefox.exe Token: SeDebugPrivilege 1840 firefox.exe Token: SeDebugPrivilege 5764 3d2aca9d8e.exe Token: SeDebugPrivilege 8 ACkcr88.exe Token: SeDebugPrivilege 8 ACkcr88.exe Token: SeDebugPrivilege 1344 StilKrip02.exe Token: SeDebugPrivilege 5540 InstallUtil.exe Token: SeDebugPrivilege 1344 StilKrip02.exe Token: SeDebugPrivilege 5636 InstallUtil.exe Token: SeDebugPrivilege 1840 firefox.exe Token: SeDebugPrivilege 1840 firefox.exe Token: SeDebugPrivilege 1840 firefox.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 2864 f72dcfa8ca3dee1079c951692be0b687f51586cace5d485f29e1ae55fb0f7813.exe 2932 ff49060312.exe 2932 ff49060312.exe 2932 ff49060312.exe 2932 ff49060312.exe 2932 ff49060312.exe 2932 ff49060312.exe 2932 ff49060312.exe 1840 firefox.exe 1840 firefox.exe 1840 firefox.exe 1840 firefox.exe 1840 firefox.exe 1840 firefox.exe 1840 firefox.exe 1840 firefox.exe 1840 firefox.exe 1840 firefox.exe 1840 firefox.exe 1840 firefox.exe 1840 firefox.exe 1840 firefox.exe 1840 firefox.exe 1840 firefox.exe 1840 firefox.exe 1840 firefox.exe 1840 firefox.exe 1840 firefox.exe 1840 firefox.exe 2932 ff49060312.exe 2932 ff49060312.exe 2932 ff49060312.exe 2932 ff49060312.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 2932 ff49060312.exe 2932 ff49060312.exe 2932 ff49060312.exe 2932 ff49060312.exe 2932 ff49060312.exe 2932 ff49060312.exe 2932 ff49060312.exe 1840 firefox.exe 1840 firefox.exe 1840 firefox.exe 1840 firefox.exe 1840 firefox.exe 1840 firefox.exe 1840 firefox.exe 1840 firefox.exe 1840 firefox.exe 1840 firefox.exe 1840 firefox.exe 1840 firefox.exe 1840 firefox.exe 1840 firefox.exe 1840 firefox.exe 1840 firefox.exe 1840 firefox.exe 1840 firefox.exe 1840 firefox.exe 1840 firefox.exe 2932 ff49060312.exe 2932 ff49060312.exe 2932 ff49060312.exe 2932 ff49060312.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1840 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2864 wrote to memory of 3940 2864 f72dcfa8ca3dee1079c951692be0b687f51586cace5d485f29e1ae55fb0f7813.exe 82 PID 2864 wrote to memory of 3940 2864 f72dcfa8ca3dee1079c951692be0b687f51586cace5d485f29e1ae55fb0f7813.exe 82 PID 2864 wrote to memory of 3940 2864 f72dcfa8ca3dee1079c951692be0b687f51586cace5d485f29e1ae55fb0f7813.exe 82 PID 3940 wrote to memory of 5028 3940 skotes.exe 83 PID 3940 wrote to memory of 5028 3940 skotes.exe 83 PID 3940 wrote to memory of 5028 3940 skotes.exe 83 PID 5028 wrote to memory of 4324 5028 tpZOod0.exe 85 PID 5028 wrote to memory of 4324 5028 tpZOod0.exe 85 PID 5028 wrote to memory of 4324 5028 tpZOod0.exe 85 PID 5028 wrote to memory of 4324 5028 tpZOod0.exe 85 PID 5028 wrote to memory of 4324 5028 tpZOod0.exe 85 PID 5028 wrote to memory of 4324 5028 tpZOod0.exe 85 PID 5028 wrote to memory of 4324 5028 tpZOod0.exe 85 PID 5028 wrote to memory of 4324 5028 tpZOod0.exe 85 PID 5028 wrote to memory of 4324 5028 tpZOod0.exe 85 PID 5028 wrote to memory of 4324 5028 tpZOod0.exe 85 PID 5028 wrote to memory of 4324 5028 tpZOod0.exe 85 PID 5028 wrote to memory of 4324 5028 tpZOod0.exe 85 PID 5028 wrote to memory of 4324 5028 tpZOod0.exe 85 PID 5028 wrote to memory of 4324 5028 tpZOod0.exe 85 PID 5028 wrote to memory of 4324 5028 tpZOod0.exe 85 PID 5028 wrote to memory of 4324 5028 tpZOod0.exe 85 PID 5028 wrote to memory of 4324 5028 tpZOod0.exe 85 PID 5028 wrote to memory of 4324 5028 tpZOod0.exe 85 PID 5028 wrote to memory of 4324 5028 tpZOod0.exe 85 PID 5028 wrote to memory of 4324 5028 tpZOod0.exe 85 PID 5028 wrote to memory of 4324 5028 tpZOod0.exe 85 PID 3940 wrote to memory of 2168 3940 skotes.exe 93 PID 3940 wrote to memory of 2168 3940 skotes.exe 93 PID 3940 wrote to memory of 2168 3940 skotes.exe 93 PID 3940 wrote to memory of 3832 3940 skotes.exe 95 PID 3940 wrote to memory of 3832 3940 skotes.exe 95 PID 3940 wrote to memory of 3832 3940 skotes.exe 95 PID 3940 wrote to memory of 2932 3940 skotes.exe 103 PID 3940 wrote to memory of 2932 3940 skotes.exe 103 PID 3940 wrote to memory of 2932 3940 skotes.exe 103 PID 2932 wrote to memory of 3936 2932 ff49060312.exe 104 PID 2932 wrote to memory of 3936 2932 ff49060312.exe 104 PID 2932 wrote to memory of 3936 2932 ff49060312.exe 104 PID 2932 wrote to memory of 3156 2932 ff49060312.exe 106 PID 2932 wrote to memory of 3156 2932 ff49060312.exe 106 PID 2932 wrote to memory of 3156 2932 ff49060312.exe 106 PID 2932 wrote to memory of 2696 2932 ff49060312.exe 109 PID 2932 wrote to memory of 2696 2932 ff49060312.exe 109 PID 2932 wrote to memory of 2696 2932 ff49060312.exe 109 PID 2932 wrote to memory of 8 2932 ff49060312.exe 112 PID 2932 wrote to memory of 8 2932 ff49060312.exe 112 PID 2932 wrote to memory of 8 2932 ff49060312.exe 112 PID 2932 wrote to memory of 1720 2932 ff49060312.exe 114 PID 2932 wrote to memory of 1720 2932 ff49060312.exe 114 PID 2932 wrote to memory of 1720 2932 ff49060312.exe 114 PID 2932 wrote to memory of 4180 2932 ff49060312.exe 116 PID 2932 wrote to memory of 4180 2932 ff49060312.exe 116 PID 4180 wrote to memory of 1840 4180 firefox.exe 117 PID 4180 wrote to memory of 1840 4180 firefox.exe 117 PID 4180 wrote to memory of 1840 4180 firefox.exe 117 PID 4180 wrote to memory of 1840 4180 firefox.exe 117 PID 4180 wrote to memory of 1840 4180 firefox.exe 117 PID 4180 wrote to memory of 1840 4180 firefox.exe 117 PID 4180 wrote to memory of 1840 4180 firefox.exe 117 PID 4180 wrote to memory of 1840 4180 firefox.exe 117 PID 4180 wrote to memory of 1840 4180 firefox.exe 117 PID 4180 wrote to memory of 1840 4180 firefox.exe 117 PID 4180 wrote to memory of 1840 4180 firefox.exe 117 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
description ioc Process Key queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe -
outlook_win_path 1 IoCs
description ioc Process Key queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3416
-
C:\Users\Admin\AppData\Local\Temp\f72dcfa8ca3dee1079c951692be0b687f51586cace5d485f29e1ae55fb0f7813.exe"C:\Users\Admin\AppData\Local\Temp\f72dcfa8ca3dee1079c951692be0b687f51586cace5d485f29e1ae55fb0f7813.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3940 -
C:\Users\Admin\AppData\Local\Temp\1011233001\tpZOod0.exe"C:\Users\Admin\AppData\Local\Temp\1011233001\tpZOod0.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"5⤵PID:4324
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5028 -s 10085⤵
- Program crash
PID:3136
-
-
-
C:\Users\Admin\AppData\Local\Temp\1011256001\ef6329c844.exe"C:\Users\Admin\AppData\Local\Temp\1011256001\ef6329c844.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2168 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2168 -s 15245⤵
- Program crash
PID:2172
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2168 -s 15445⤵
- Program crash
PID:400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2168 -s 15925⤵
- Program crash
PID:948
-
-
-
C:\Users\Admin\AppData\Local\Temp\1011257001\5e7b88361b.exe"C:\Users\Admin\AppData\Local\Temp\1011257001\5e7b88361b.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3832
-
-
C:\Users\Admin\AppData\Local\Temp\1011258001\ff49060312.exe"C:\Users\Admin\AppData\Local\Temp\1011258001\ff49060312.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3936
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3156
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2696
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:8
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1720
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking5⤵
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking6⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1840 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1968 -parentBuildID 20240401114208 -prefsHandle 1896 -prefMapHandle 1888 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e44cf229-2c7c-4029-a528-20889b8f9388} 1840 "\\.\pipe\gecko-crash-server-pipe.1840" gpu7⤵PID:2972
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2408 -parentBuildID 20240401114208 -prefsHandle 2384 -prefMapHandle 2380 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {59126e50-c8aa-4f3a-97e4-8f97af34e14f} 1840 "\\.\pipe\gecko-crash-server-pipe.1840" socket7⤵PID:624
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2880 -childID 1 -isForBrowser -prefsHandle 3024 -prefMapHandle 3028 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1144 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c03ce8f8-fa89-41b4-aaea-cd88b64d2f97} 1840 "\\.\pipe\gecko-crash-server-pipe.1840" tab7⤵PID:3268
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3708 -childID 2 -isForBrowser -prefsHandle 3660 -prefMapHandle 3672 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1144 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {aba494ea-238c-4419-89d6-ff8863355a80} 1840 "\\.\pipe\gecko-crash-server-pipe.1840" tab7⤵PID:468
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4864 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4676 -prefMapHandle 4856 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {62821929-6103-408a-b5d0-0a3081cee752} 1840 "\\.\pipe\gecko-crash-server-pipe.1840" utility7⤵
- Checks processor information in registry
PID:5384
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5612 -childID 3 -isForBrowser -prefsHandle 5624 -prefMapHandle 5620 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1144 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d79acc9b-8348-443a-b973-2f204a962540} 1840 "\\.\pipe\gecko-crash-server-pipe.1840" tab7⤵PID:2248
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5532 -childID 4 -isForBrowser -prefsHandle 5760 -prefMapHandle 5764 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1144 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7bca1d12-1745-4313-99b2-4d722885a3c3} 1840 "\\.\pipe\gecko-crash-server-pipe.1840" tab7⤵PID:3136
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4668 -childID 5 -isForBrowser -prefsHandle 5588 -prefMapHandle 5420 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1144 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4c5ae067-0907-47c8-a5f3-c6ea80a8db85} 1840 "\\.\pipe\gecko-crash-server-pipe.1840" tab7⤵PID:4252
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1011259001\3d2aca9d8e.exe"C:\Users\Admin\AppData\Local\Temp\1011259001\3d2aca9d8e.exe"4⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5764
-
-
C:\Users\Admin\AppData\Local\Temp\1011260001\e3bad1c1b6.exe"C:\Users\Admin\AppData\Local\Temp\1011260001\e3bad1c1b6.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5228
-
-
C:\Users\Admin\AppData\Local\Temp\1011261001\ac4f41a521.exe"C:\Users\Admin\AppData\Local\Temp\1011261001\ac4f41a521.exe"4⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5800
-
-
C:\Users\Admin\AppData\Local\Temp\1011262001\ACkcr88.exe"C:\Users\Admin\AppData\Local\Temp\1011262001\ACkcr88.exe"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:8 -
C:\Users\Admin\AppData\Local\Temp\StilKrip02.exe"C:\Users\Admin\AppData\Local\Temp\StilKrip02.exe"5⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1344
-
-
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
PID:5540
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:5636
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5028 -ip 50281⤵PID:3944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 2168 -ip 21681⤵PID:4048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 2168 -ip 21681⤵PID:4564
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2168 -ip 21681⤵PID:2080
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4444
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6768
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
3Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\activity-stream.discovery_stream.json
Filesize19KB
MD5e3c450eb94af15f7d35ec5ab40eb8623
SHA1edb568fbe5cc6635e09be3ac2f7128e04a8e43fa
SHA256c1f0fb51c24a64d95270472dfa4207c9c65aadd4c2e6a19f0eaa3dc5913b37e0
SHA51217a307ee03e7b5bc81fac0599c76bbfcf6dcd9fb12c68132786ce2736b2b8a9d9e175ef12ff6ad3c1776672a56d2c6e33cb5df81fec5eb181a84ac3a13a78a08
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD58be13d125f33fb4772eb62a48f86835e
SHA1102daaebced9fa50af96c3792b88e7429bbd4cc9
SHA2566ba563be94263d85f5ea3a38c0dcc07b605c9243e3169036e86535468c4cc159
SHA5125f208bea0316441760dd7ae716522e7a725305cc1510b134e08bc33bfd5bab17759455c053dff31fa2c0e363c3cf396fc264238d58b1273eb15a5866d070cf7b
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD5b96d7878d2e4b16c066adf22d5b1750e
SHA19acbbf97055c14f92a8dc0edc13cd74cfaa61674
SHA25604ec7de0f5d7279588654f7d969199052bae339a90c9a54a5133aaf0d1355979
SHA5121ae91207ac87111bb70453a17e47865d0e1513fd940557b4edcd362f440b73ea682eb6d06334750c3d6fe6c276eb5499dc346afb2b84a9ef0beba473bbd08e16
-
Filesize
217KB
MD598da391545b4823ca67e6cc3a927dae9
SHA1d2f66837884d6d65dfe21372501cc7ba1d91ef29
SHA25612862b60140f019b0c251da7be59caf90d93eca6a30d016609cf2ff1da4652a7
SHA51259130547c169768310d57c075f2cec01a71704e9658955ef8eb1c6b2c30a24a801623f189eac14a84357aa597f5d5c96c5c9f8e96ee4ddf7bcf911dcf6bcb7b9
-
Filesize
1.8MB
MD56f5a7a7f9a46fd0da229545348913e5c
SHA1d330460aba0ecc2770d8fbfc01e16872d707d3d7
SHA256ba2afd3ee3032a75f33fc23e16baf8668d908b3aadf5409adf1a2229f650b6ca
SHA512b5614c8f49fc5e664c56c58423eb9542d9a26e8ec46a47e44669f309aa6c7c3167fd34ff0795c9d45b4e4b9c17e4a1422b0e2720667e482c617869e6e0b4111f
-
Filesize
1.7MB
MD5ba8f4e56bc87dd31c14f261fcb6fc787
SHA1e489f9de5c0a3200c1eb0750bb780ee0ccbb5787
SHA256b48cd4d2e3cf5422795b27120cb8e7e9d266455aa5e6b94e7f3b81dc07e50179
SHA51214a867f735244d79844a64566b5984b77a4e24dfba7f98264e480a56771e754bbf6e0a561d8e739a5c0438235e8e774b7cc52c7a8d99c850a227206e37f49800
-
Filesize
950KB
MD5142fda9b3135a1cbd7edf1da4fd678a3
SHA17b392d29d9ffdb7de8e22ed7baab4056100d6da0
SHA256effd3f265083a3af0f420c02048dd4b9240d416dfdb32a99ae700329429592b9
SHA512b29979ced7b55d692e5194a2cb27f810768e4dc798eac9b5bb0d63ab55a1e86913fcef7c0789968f7f3a6ff3fdbea50777f10186a55094808c21f69920c700fd
-
Filesize
2.7MB
MD564775ade379430e762af6d894815bd24
SHA1cb8db298ac03464f912a822f6335f9b4bdcdfa4f
SHA256b92243b5b82aa58419dec103e84c63ec7c46149c2fab6520f041ceaf92655c71
SHA512bff1f4e815e35a8bb512fd1dfd223d8caf79847b2d7cb319557c9dffc3090070b71656e819f5350a8c5f8d92034f0cc472e889e207279dfc12c0f0b57204f015
-
Filesize
1.9MB
MD5870c92cf89253baeaf80574aaad15adc
SHA1feefb55fa434ceb4aa10997bedfccd5597852078
SHA25665238eee07b00d608d030a601ebe0878656466084e1f55e9e41258bec1370b59
SHA512fe1cf7efa897c4c4fada01ba67ef38e7491d96870ab32354b0acbf2bb0cfa32faf914d05037d6e813fcc9b1241466acdaa178adeacc2451ea371f1189e7923c6
-
Filesize
4.2MB
MD5818532da27c6ed97768ab94607612f66
SHA199216af849b745434d0e728400a5da9ea0eac96f
SHA2560db9cd98808b856cc4e61818330ff6a1ec46621ab9b30e779078f2fb78feb36c
SHA512ae6d4008ad40a08ad23b7b460c53af287c923171973cd8c090e5abe0b3b67f14aa291f8ece578697405e6c263c3316c5f19c8a94c64a8cbe4b7496dc345b6224
-
Filesize
2.6MB
MD5930aa8b0501cdff28c8c3118c114381f
SHA1077601f341482965542cc1f640819db44ba4a6f4
SHA256aa43b00f0dd6b8af4c0873667834c27379aeae99cd97cae41b5535422730f67a
SHA51251e357c9b032885ac664156c4182847b7f77c176477d1110dc259ad666055ee583b053444e24812d6b44b9e65d78279a0ae1e19f54bffa0028e23aa04a656cb5
-
Filesize
1.4MB
MD5f461e01a63ac5aa5f20ed2c7d8ebba33
SHA11ebb48942f7479c0d66c4d6391c23fb09e11380b
SHA2567953c3b4f3ebd559a24da37959ddaf584e4795820ddcd596a81d307451e8070b
SHA5123ba32ea5fadc251a48fdbcccdf4543744963ad2729d7d0883752c502d46ee6ed3ce9248f5e3c2cdd9b93f21def8db6ab97928b9cf73db56bace4e429fbc061fc
-
Filesize
1.8MB
MD51f6294fca2fa8c5e80eafb976f65aa60
SHA1d0d52c6af42cebe1dc967635d1d4f9d2a2a40ebd
SHA256f72dcfa8ca3dee1079c951692be0b687f51586cace5d485f29e1ae55fb0f7813
SHA512aef446a9e5656bb820e8086e053972e70d4f2a315918d0c298def9610c1376c9575b91a7c3f4c1677788f8edb88d0acdffa854f417e03c63f0be90995d1c3257
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin
Filesize6KB
MD5d53474e6d3ea36628859a9a319ac714b
SHA16bdfa8a03fc4ea49d542dda2253d7134d6aba149
SHA2560b31cdb542764bbe0d6475f9e5817d36654bd6e14f5332ffedd4c32f59808c52
SHA5127df15a9a01d0111021a314486d82f0b90e7bbf2ffb4133837f82a47ea3e59f2bcc1098f08505debe924cb402413fbf95874b6ed299e883c8fcda73b575c70d30
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin
Filesize8KB
MD5152a5f8d56d048b8af988070f1cbbb17
SHA1a6010a5ce19d7ef0e41360e5f0032b7629889b1b
SHA256a4f93fea3ab7d46f1b17df28a2fcebfa08e5e5c73e772e62d73a101eb4c7d651
SHA5124ade7a20ebd4fc50fcaba4f17a97d84d924b029cdac300f4ad5ffe2f8c52a4fdc2c3b1abb40dcd8f17402baa62bc2f4f923659012cdd7c30fb38761e91db248d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5c35cf291d778f6fab5f98e36ab275250
SHA1e1914d7623d3b4db18e9a1857cbb07bba04ff7f6
SHA256c4614061337aa9ffe5aa2b54b5768380736bfe769d808457ed7e2454393cd975
SHA512c096f105ba2fd746193c01a6647a6fe8fce6eb18d985ddb659f583799c0655279cd4f5adf726f8d12d35064ff3a4f83196a7da2602ec4c8ddb41b038b1ff4edb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5cf6a6731623157b2b46a261186c4680a
SHA1ffde08476b46c9c179062983b8fe4e75b083b63a
SHA256e75242998e8d51afb77a0326f8812634e2065cd8d8e410a44924d6618e413b66
SHA512a9c1eff3fd9ef12d81e34b81bb7b23f07b11bb2a5726b4ff1d617adff5ecdddff3297883c6e1ff071fceca539f223967edc644ba10e881e5c32eb82f3a3b800e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5f03cf25e5f3faa3f8b3f52fc53c3d1fc
SHA16df30bbd0760836157d91a19e5535586be8f4be0
SHA25693a1844c32e698fc006719a8ed782b02ee01f30d794b27c657dab8ff63569f60
SHA51251d026d2c25507855574c8f3b9bf374034ea4f03d03a26ff30c01281a08836492c46619fc3c37c2774f14c0e82c298c89d62df41082975c577bb055ff08605d7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\5f9b622d-0d52-4b85-a570-045114aec6f9
Filesize671B
MD59ca976084116d9ce2459cb478038b534
SHA18f7bd24014e56eb747319db246e0f18910fc93e8
SHA256b4eadb3aebbe2566f620c0a87c49da605d210d14e22f7ccabb5a64e2ca4043e4
SHA5124c0a0652efe16fff7bf8986ee339154cd49814b24c34d57f1a3852b07ddf41271a1a48d2775b97735e9d3090be4613bd940f598f16c5b34ef043e6ad993029ef
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\817a641a-0549-459f-b7c1-a6a398923db4
Filesize28KB
MD5f25f04754e7a2ab5fc99a924d5778bf5
SHA173a60c01fb3f1fea096ebc81a4e126b02afe3ef1
SHA2565d8cbc7f1e48bf9ee46b4c94a7e80c58ce842bcc0208cb79fa36813287faf074
SHA51295a330823ca82cce8a0b867170e4f570f6aadf0e00354c7c7a448dd188a64c25a2d929271016558e1f54db514667a9d01ae0270b64272d4e5d88cc756a965f76
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\fe31bd8b-4f00-467b-b888-afd2c5728bc0
Filesize982B
MD5f398b64895ba109e5e6aeea256fa9822
SHA10d3cf5ba2ab84213126dbb51f715bb9361715873
SHA256cecd5312f8598977d4dd95cfb5ba2fd45e0a07fcfd9d3752119bcfc72aa7d87d
SHA51234ec8af4af59d2faec20edeae54606db39ed500c254137f3ec704319a4926de8c6cee7885ed30ca0dca1e844ea107dbb72b5c7ce43f0012d89e6b21f26fa8183
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
11KB
MD5ab95b96a6e3b3154de71275e07d063bb
SHA19d12ea574fb3aeef0f7e7d64fb8c590145c36828
SHA256ed03910467a2be0918e97763f89bd5b40d2e12757308e0581f8040bf14cebaf1
SHA51246c8d1959b11610e2dc90902b8302a2fbe81ea4188f2fb7ecd3aa50fe052ee4ad2c9233eb6f9c0eaaef43f207d23ad3ee58daa5c995942e9227c987c71f1a961
-
Filesize
14KB
MD55a5561ad72a442eaa14a170cf187b88b
SHA180dedc910881143a0e6c02b23bd7f728c366517c
SHA25659d19065890f619cdf0dc27e8a6e676ea56a4e5e322922c7a7cd9bd1ce1ac1d2
SHA512476a6d9842dc032a50ab2c308993a343612638fde732fb666a11f56a81c821993eb51f407513fec015911a99f26c50ab89680f310c8b2a497e115f31459eade1
-
Filesize
14KB
MD596ed70dea4dbf46e50c2e614e52cf9cd
SHA145d26646933db3de20f8e75fae47e9c7e9c74747
SHA25665c22439a17953a8edb81bfaf03f4e83e6e59f08d8921e7ef35aaa520f630c12
SHA512eabb2ec35609a2771d321f7da0c250ca15488846338db892d82b5d1813fc4996df908651dfd884baf3f51ae81d0b89e3a119e530a47e309231aba3264376099f
-
Filesize
10KB
MD5b6851e1746e452da0a2c3b0552211b15
SHA1f195ed898b002d50115d87bedd8ac513113e5b18
SHA25699ce6ee84648e33889d68841d0de0097bfa54c7ac4c29db23a8b0ea7c3cd192b
SHA512a81acfd474c7f3ad5493750bda3952c6e3bba662c27c0f6fe3319d808185dd9a5326471452989ceb85f40ee53755bad435b25ffbd465153ab0347124dca6509f
-
Filesize
10KB
MD58a4c9f4c43154049fc60be2f9f3b3621
SHA1f713305ab62bc9d4bc0620498aaafe71e763615b
SHA2562fdb0536a321ef90395bed5db9261488dc08b0e46a27710cf3383edf7e08d80d
SHA512b2037d1992ae65f7404b809ce5b8a0e66e994b0b16daa4ce5cb24e2fb04155bcd87ab1897ba066504f76a6875a2cc8fc6377faea855b35efe91438acef234263
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize912KB
MD550b5105c834f3b39a92948780632be2f
SHA1732e19296e7e934246990b2bc3f24c39c8de3eaf
SHA2560465bd82d327f02b0e8b22c424af770283016b57533ca5a117b66ddaf74b02eb
SHA512bcb7941f1154fa25a04b89c4fe0a80d5cf887ce2a82757072805a27127360d73800a094588b6cc4c739de83b9c616f684f503341c9439d4d617eac66a7f60c52
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize1.7MB
MD5537e2bfe3dc72d1f53857ad0ff35974f
SHA127636bbb552e6e355383cfd7f7aea42f85594cde
SHA256ab42daa5a09ae49c22661fec34890dff4c8eab25aadafcdb30a699655c93e8af
SHA512021541f2a6042299c4c10344bf2362dd9672e7b89ccd464d65b9aa3cc44be709fa1bc030f2114c515fa5202ae3747c6979ff2b305e42509f95ea6de866719551
-
Filesize
126KB
MD5b48e172f02c22894ad766c52303f087a
SHA161da0ff26dfc3759f7cd79696430b52f85073141
SHA256712e46f7a4f9da7fabd0b1acd5e848527bd70b6c4444dc92c8479ac108d71753
SHA5125b8a888a9d87a4ee34f57799d3d6baf69cd556a2d1336afb109adc488a5efa1c7cd094c3785cf9af726a0c41be3a56a0ffac933b7fa7fb5dec9643f3af08bdfd