Analysis
-
max time kernel
143s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2024 23:10
Static task
static1
General
-
Target
624dc975fb4b396b82fc08a6f1b9664d40c0576931839c8aa09f344938ced223.exe
-
Size
7.1MB
-
MD5
136acf9170ab9716fcd4845ce82c3cb4
-
SHA1
d6574bd99920c5d777f69e7595d18204a9972a80
-
SHA256
624dc975fb4b396b82fc08a6f1b9664d40c0576931839c8aa09f344938ced223
-
SHA512
206efc430c3117b9d71bc3c0c7910bb458d6474400ef3748662a195ecabaed37bb0eca234f792ae4fe589012895cd9c5482bd9844491ecb0213f966f62b2b13c
-
SSDEEP
196608:T61etDwoo14zL28osWzvnp629hdbj6ypDXM5a:W1cnoaX2zswnb9Hf68DX/
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://preside-comforter.sbs
https://savvy-steereo.sbs
https://copper-replace.sbs
https://record-envyp.sbs
https://slam-whipp.sbs
https://wrench-creter.sbs
https://looky-marked.sbs
https://plastic-mitten.sbs
https://hallowed-noisy.sbs
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
stealc
drum
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4o587L.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" f5b8c67d5a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" f5b8c67d5a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4o587L.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4o587L.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4o587L.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4o587L.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4o587L.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" f5b8c67d5a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" f5b8c67d5a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" f5b8c67d5a.exe -
Stealc family
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF ee33846f8c.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f5b8c67d5a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1k74W5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3Y27V.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4o587L.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c2dfa0c7ab.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2f4472.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2558e2335e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ee33846f8c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 22 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2f4472.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2558e2335e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3Y27V.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f5b8c67d5a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f5b8c67d5a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ee33846f8c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1k74W5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2558e2335e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c2dfa0c7ab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3Y27V.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4o587L.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ee33846f8c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1k74W5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2f4472.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4o587L.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c2dfa0c7ab.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 1k74W5.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 14 IoCs
pid Process 1792 e2q73.exe 2580 L0o66.exe 2624 1k74W5.exe 2744 skotes.exe 4212 2f4472.exe 4480 2558e2335e.exe 2160 3Y27V.exe 3500 4o587L.exe 4772 c2dfa0c7ab.exe 4664 skotes.exe 3888 848f855eee.exe 3540 f5b8c67d5a.exe 3388 ee33846f8c.exe 5688 skotes.exe -
Identifies Wine through registry keys 2 TTPs 11 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 3Y27V.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine c2dfa0c7ab.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine f5b8c67d5a.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine ee33846f8c.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 2f4472.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 4o587L.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 1k74W5.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 2558e2335e.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" f5b8c67d5a.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4o587L.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4o587L.exe -
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\c2dfa0c7ab.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1011790001\\c2dfa0c7ab.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\848f855eee.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1011791001\\848f855eee.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\f5b8c67d5a.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1011792001\\f5b8c67d5a.exe" skotes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 624dc975fb4b396b82fc08a6f1b9664d40c0576931839c8aa09f344938ced223.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" e2q73.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" L0o66.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2558e2335e.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1011789001\\2558e2335e.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000a000000023cdb-109.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
pid Process 2624 1k74W5.exe 2744 skotes.exe 4212 2f4472.exe 4480 2558e2335e.exe 2160 3Y27V.exe 3500 4o587L.exe 4772 c2dfa0c7ab.exe 4664 skotes.exe 3540 f5b8c67d5a.exe 3388 ee33846f8c.exe 5688 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1k74W5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
pid pid_target Process procid_target 1316 4212 WerFault.exe 86 4476 4212 WerFault.exe 86 2300 4480 WerFault.exe 96 2388 4480 WerFault.exe 96 -
System Location Discovery: System Language Discovery 1 TTPs 20 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1k74W5.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 848f855eee.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2q73.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2558e2335e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4o587L.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language L0o66.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2f4472.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c2dfa0c7ab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f5b8c67d5a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 624dc975fb4b396b82fc08a6f1b9664d40c0576931839c8aa09f344938ced223.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 848f855eee.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 848f855eee.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ee33846f8c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3Y27V.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 3200 taskkill.exe 4284 taskkill.exe 3116 taskkill.exe 3552 taskkill.exe 432 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 39 IoCs
pid Process 2624 1k74W5.exe 2624 1k74W5.exe 2744 skotes.exe 2744 skotes.exe 4212 2f4472.exe 4212 2f4472.exe 4480 2558e2335e.exe 4480 2558e2335e.exe 2160 3Y27V.exe 2160 3Y27V.exe 3500 4o587L.exe 3500 4o587L.exe 3500 4o587L.exe 3500 4o587L.exe 4772 c2dfa0c7ab.exe 4772 c2dfa0c7ab.exe 4664 skotes.exe 4664 skotes.exe 3888 848f855eee.exe 3888 848f855eee.exe 3888 848f855eee.exe 3888 848f855eee.exe 3540 f5b8c67d5a.exe 3540 f5b8c67d5a.exe 3540 f5b8c67d5a.exe 3540 f5b8c67d5a.exe 3540 f5b8c67d5a.exe 3388 ee33846f8c.exe 3388 ee33846f8c.exe 3388 ee33846f8c.exe 3388 ee33846f8c.exe 3388 ee33846f8c.exe 3388 ee33846f8c.exe 3388 ee33846f8c.exe 3388 ee33846f8c.exe 3388 ee33846f8c.exe 3388 ee33846f8c.exe 5688 skotes.exe 5688 skotes.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 3500 4o587L.exe Token: SeDebugPrivilege 3200 taskkill.exe Token: SeDebugPrivilege 4284 taskkill.exe Token: SeDebugPrivilege 3116 taskkill.exe Token: SeDebugPrivilege 3552 taskkill.exe Token: SeDebugPrivilege 432 taskkill.exe Token: SeDebugPrivilege 4624 firefox.exe Token: SeDebugPrivilege 4624 firefox.exe Token: SeDebugPrivilege 3540 f5b8c67d5a.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 2624 1k74W5.exe 3888 848f855eee.exe 3888 848f855eee.exe 3888 848f855eee.exe 3888 848f855eee.exe 3888 848f855eee.exe 3888 848f855eee.exe 3888 848f855eee.exe 4624 firefox.exe 4624 firefox.exe 4624 firefox.exe 4624 firefox.exe 3888 848f855eee.exe 4624 firefox.exe 4624 firefox.exe 4624 firefox.exe 4624 firefox.exe 4624 firefox.exe 4624 firefox.exe 4624 firefox.exe 4624 firefox.exe 4624 firefox.exe 4624 firefox.exe 4624 firefox.exe 4624 firefox.exe 4624 firefox.exe 4624 firefox.exe 4624 firefox.exe 4624 firefox.exe 4624 firefox.exe 3888 848f855eee.exe 3888 848f855eee.exe 3888 848f855eee.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 3888 848f855eee.exe 3888 848f855eee.exe 3888 848f855eee.exe 3888 848f855eee.exe 3888 848f855eee.exe 3888 848f855eee.exe 3888 848f855eee.exe 4624 firefox.exe 4624 firefox.exe 4624 firefox.exe 4624 firefox.exe 3888 848f855eee.exe 4624 firefox.exe 4624 firefox.exe 4624 firefox.exe 4624 firefox.exe 4624 firefox.exe 4624 firefox.exe 4624 firefox.exe 4624 firefox.exe 4624 firefox.exe 4624 firefox.exe 4624 firefox.exe 4624 firefox.exe 4624 firefox.exe 4624 firefox.exe 4624 firefox.exe 4624 firefox.exe 3888 848f855eee.exe 3888 848f855eee.exe 3888 848f855eee.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4624 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1212 wrote to memory of 1792 1212 624dc975fb4b396b82fc08a6f1b9664d40c0576931839c8aa09f344938ced223.exe 82 PID 1212 wrote to memory of 1792 1212 624dc975fb4b396b82fc08a6f1b9664d40c0576931839c8aa09f344938ced223.exe 82 PID 1212 wrote to memory of 1792 1212 624dc975fb4b396b82fc08a6f1b9664d40c0576931839c8aa09f344938ced223.exe 82 PID 1792 wrote to memory of 2580 1792 e2q73.exe 83 PID 1792 wrote to memory of 2580 1792 e2q73.exe 83 PID 1792 wrote to memory of 2580 1792 e2q73.exe 83 PID 2580 wrote to memory of 2624 2580 L0o66.exe 84 PID 2580 wrote to memory of 2624 2580 L0o66.exe 84 PID 2580 wrote to memory of 2624 2580 L0o66.exe 84 PID 2624 wrote to memory of 2744 2624 1k74W5.exe 85 PID 2624 wrote to memory of 2744 2624 1k74W5.exe 85 PID 2624 wrote to memory of 2744 2624 1k74W5.exe 85 PID 2580 wrote to memory of 4212 2580 L0o66.exe 86 PID 2580 wrote to memory of 4212 2580 L0o66.exe 86 PID 2580 wrote to memory of 4212 2580 L0o66.exe 86 PID 2744 wrote to memory of 4480 2744 skotes.exe 96 PID 2744 wrote to memory of 4480 2744 skotes.exe 96 PID 2744 wrote to memory of 4480 2744 skotes.exe 96 PID 1792 wrote to memory of 2160 1792 e2q73.exe 99 PID 1792 wrote to memory of 2160 1792 e2q73.exe 99 PID 1792 wrote to memory of 2160 1792 e2q73.exe 99 PID 1212 wrote to memory of 3500 1212 624dc975fb4b396b82fc08a6f1b9664d40c0576931839c8aa09f344938ced223.exe 100 PID 1212 wrote to memory of 3500 1212 624dc975fb4b396b82fc08a6f1b9664d40c0576931839c8aa09f344938ced223.exe 100 PID 1212 wrote to memory of 3500 1212 624dc975fb4b396b82fc08a6f1b9664d40c0576931839c8aa09f344938ced223.exe 100 PID 2744 wrote to memory of 4772 2744 skotes.exe 108 PID 2744 wrote to memory of 4772 2744 skotes.exe 108 PID 2744 wrote to memory of 4772 2744 skotes.exe 108 PID 2744 wrote to memory of 3888 2744 skotes.exe 111 PID 2744 wrote to memory of 3888 2744 skotes.exe 111 PID 2744 wrote to memory of 3888 2744 skotes.exe 111 PID 3888 wrote to memory of 3200 3888 848f855eee.exe 112 PID 3888 wrote to memory of 3200 3888 848f855eee.exe 112 PID 3888 wrote to memory of 3200 3888 848f855eee.exe 112 PID 3888 wrote to memory of 4284 3888 848f855eee.exe 114 PID 3888 wrote to memory of 4284 3888 848f855eee.exe 114 PID 3888 wrote to memory of 4284 3888 848f855eee.exe 114 PID 3888 wrote to memory of 3116 3888 848f855eee.exe 116 PID 3888 wrote to memory of 3116 3888 848f855eee.exe 116 PID 3888 wrote to memory of 3116 3888 848f855eee.exe 116 PID 3888 wrote to memory of 3552 3888 848f855eee.exe 118 PID 3888 wrote to memory of 3552 3888 848f855eee.exe 118 PID 3888 wrote to memory of 3552 3888 848f855eee.exe 118 PID 3888 wrote to memory of 432 3888 848f855eee.exe 120 PID 3888 wrote to memory of 432 3888 848f855eee.exe 120 PID 3888 wrote to memory of 432 3888 848f855eee.exe 120 PID 3888 wrote to memory of 864 3888 848f855eee.exe 122 PID 3888 wrote to memory of 864 3888 848f855eee.exe 122 PID 864 wrote to memory of 4624 864 firefox.exe 123 PID 864 wrote to memory of 4624 864 firefox.exe 123 PID 864 wrote to memory of 4624 864 firefox.exe 123 PID 864 wrote to memory of 4624 864 firefox.exe 123 PID 864 wrote to memory of 4624 864 firefox.exe 123 PID 864 wrote to memory of 4624 864 firefox.exe 123 PID 864 wrote to memory of 4624 864 firefox.exe 123 PID 864 wrote to memory of 4624 864 firefox.exe 123 PID 864 wrote to memory of 4624 864 firefox.exe 123 PID 864 wrote to memory of 4624 864 firefox.exe 123 PID 864 wrote to memory of 4624 864 firefox.exe 123 PID 4624 wrote to memory of 1512 4624 firefox.exe 124 PID 4624 wrote to memory of 1512 4624 firefox.exe 124 PID 4624 wrote to memory of 1512 4624 firefox.exe 124 PID 4624 wrote to memory of 1512 4624 firefox.exe 124 PID 4624 wrote to memory of 1512 4624 firefox.exe 124 PID 4624 wrote to memory of 1512 4624 firefox.exe 124 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\624dc975fb4b396b82fc08a6f1b9664d40c0576931839c8aa09f344938ced223.exe"C:\Users\Admin\AppData\Local\Temp\624dc975fb4b396b82fc08a6f1b9664d40c0576931839c8aa09f344938ced223.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e2q73.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e2q73.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\L0o66.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\L0o66.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1k74W5.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1k74W5.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\1011789001\2558e2335e.exe"C:\Users\Admin\AppData\Local\Temp\1011789001\2558e2335e.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4480 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4480 -s 16527⤵
- Program crash
PID:2300
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4480 -s 16327⤵
- Program crash
PID:2388
-
-
-
C:\Users\Admin\AppData\Local\Temp\1011790001\c2dfa0c7ab.exe"C:\Users\Admin\AppData\Local\Temp\1011790001\c2dfa0c7ab.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4772
-
-
C:\Users\Admin\AppData\Local\Temp\1011791001\848f855eee.exe"C:\Users\Admin\AppData\Local\Temp\1011791001\848f855eee.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3200
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4284
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3116
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3552
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:432
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2044 -parentBuildID 20240401114208 -prefsHandle 1972 -prefMapHandle 1964 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {bb4d263b-ebd3-416a-a556-6bc470a63698} 4624 "\\.\pipe\gecko-crash-server-pipe.4624" gpu9⤵PID:1512
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2476 -parentBuildID 20240401114208 -prefsHandle 2468 -prefMapHandle 2456 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e4256629-3cd7-4787-b97d-1bf274c354a9} 4624 "\\.\pipe\gecko-crash-server-pipe.4624" socket9⤵PID:220
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3272 -childID 1 -isForBrowser -prefsHandle 3276 -prefMapHandle 2740 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9e490533-2e27-425d-bca6-41a0af3458af} 4624 "\\.\pipe\gecko-crash-server-pipe.4624" tab9⤵PID:400
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3876 -childID 2 -isForBrowser -prefsHandle 3868 -prefMapHandle 3840 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {14237bdd-0f03-4f38-adcf-367aa2b904de} 4624 "\\.\pipe\gecko-crash-server-pipe.4624" tab9⤵PID:764
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4640 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4620 -prefMapHandle 4616 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {11b588d7-4cd8-41e8-9261-633b4e81d553} 4624 "\\.\pipe\gecko-crash-server-pipe.4624" utility9⤵
- Checks processor information in registry
PID:3772
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5316 -childID 3 -isForBrowser -prefsHandle 5308 -prefMapHandle 5236 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ec40a976-b895-48b5-8801-fec60c88fd88} 4624 "\\.\pipe\gecko-crash-server-pipe.4624" tab9⤵PID:6556
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5544 -childID 4 -isForBrowser -prefsHandle 5464 -prefMapHandle 5472 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c8f7e487-57bf-4757-81fa-92bd96135c38} 4624 "\\.\pipe\gecko-crash-server-pipe.4624" tab9⤵PID:6568
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5452 -childID 5 -isForBrowser -prefsHandle 5688 -prefMapHandle 5692 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {92fb5b79-8770-46b3-9c73-893c7aea8e54} 4624 "\\.\pipe\gecko-crash-server-pipe.4624" tab9⤵PID:6584
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1011792001\f5b8c67d5a.exe"C:\Users\Admin\AppData\Local\Temp\1011792001\f5b8c67d5a.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3540
-
-
C:\Users\Admin\AppData\Local\Temp\1011793001\ee33846f8c.exe"C:\Users\Admin\AppData\Local\Temp\1011793001\ee33846f8c.exe"6⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3388
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2f4472.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2f4472.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4212 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4212 -s 16965⤵
- Program crash
PID:1316
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4212 -s 16965⤵
- Program crash
PID:4476
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3Y27V.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3Y27V.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2160
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4o587L.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4o587L.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3500
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4212 -ip 42121⤵PID:3628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4212 -ip 42121⤵PID:4392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4212 -ip 42121⤵PID:1824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4480 -ip 44801⤵PID:4928
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4480 -ip 44801⤵PID:4872
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4664
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5688
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
3Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\activity-stream.discovery_stream.json.tmp
Filesize19KB
MD50ddcecb95c6d5635618b1fafd7a5b678
SHA1f971821cc81e9bd38260630aca754f5af214cdd3
SHA256ce698e9d206ca62e815709c0546f840b69f4fba93db9f803b22aba3fb3194198
SHA51296917be9c07b32d8fea579ebfa0ad9d95881952ed172c8ab7f0ae34f808caa1469b98747bdd62e4570324ddab4d129fbe904da0f90484f4f47da5ed81bd80740
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD51fac1340436502b068818c6497ef940d
SHA15eea5afb0220dc33523d2c5d8c41ef327a0d1bb6
SHA256649527e41fbe4f90eded7c3f8eb11f97461a5c66c058a733b22caa0d904aa3c5
SHA5124c6326fbc07adfb879ca090ef742a397ff0fa7bd031c6927543ba80df34cc844b5ff000fc7b2226832340120cf2e97a66a34c7e4c00ed15fc394732064c5fae3
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD57d8b4dda8327c654222a3514742fea19
SHA1596923065911ce961357fa4d647500c69c4372f4
SHA256ae36e4ab9f46bef80b7f4e8581b26140fb6d89b4a70f8e485a73d9c79bdf819c
SHA512d2467a58c8b324dbb23a56dd773a08b68fcbdb1d8556f906cdd876fc5f254d9e9ff6072e6730d0bb545072a08aee1d52c9260ebd5094481d8d95930976e97fc8
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
1.7MB
MD517cc76520a0027d6de469a4ac441c76c
SHA1162746e63bea82f47a1680638148eacef0723da3
SHA256fae41c9cd3c7b33f4a46f5a5bcc54f0cb464c7a41bd11e59a9f47a806da2ba64
SHA512afa887ba5f5e26be05720c074d7ab2265a789f6fb573c25524dc8059a5684c85c03546e1b3e0c8a4fb49c428721bfc0615db1e9b17a32a631431b6ba43fe22d4
-
Filesize
1.7MB
MD5e96c8d140894a05d22183e7ea294b897
SHA17e676955eeec09f67cacdba62c3db6f1582643e4
SHA256b9e7f1ef6bcc692934036d830bb8b74447c949086bb64cb29d26382ed48c9e64
SHA512e325b5b81c3edf668adadea6fb9ade1d3e8ae04d661f6fcbfc1aaed030c43671b1b638f9e61a2fee81745f025f32f4bb4ecf2f008bac3b09e44a2fe5a4b69ba9
-
Filesize
943KB
MD5c9da47a8d0dd64dbd6be701a8e386d0a
SHA1c9682e17297eb84aafe1d23eb2ea3b93c291e567
SHA256da82529895963aecf4527c8d725a0de9009028948642d3a57649fe2dd5c664e6
SHA5124a99ce51a979afee228f283f293e4ba1b5a335a15b817e3ad89c442db31c63f18f935028833c01798c4a2f4c650b58d75f52222eb073582e6fd4f19f3de2ea89
-
Filesize
2.7MB
MD59c11d4991423c6b87fe81f297cabecf4
SHA1990b9e30f604df81428b3f631e68cc6e716b654c
SHA2567201161135a510258fd94e0f4c94849f1c4e24892fee578dcf5a167f7e3bc656
SHA512d09a447380213a93f55ab27e5193430511f9c063692210d4c243064ba17896a8f01831a108d637ba930769c40b9b5934802b3970ba34310cae466d326ddef9f2
-
Filesize
4.3MB
MD5c501cb7602ddf66c6fa9d272882d8d81
SHA1d0ba1811dc9b21c7a401d88d7fe77f49e46d02de
SHA2568fc1e876d9a0bca4c1124bdd06cdfed283d8e5aef2c80498ca3a4d6c07dc8853
SHA512cc20b04958ed053ce4181d6cfe0424a28a91bf869b0da0c4a04fb8818ad8738d0784729d0073fc183f306f6b3a631d2525276aa951776fe51844a3e24091543e
-
Filesize
2.7MB
MD52490b83d42152804dd6911dae9d57b9d
SHA1f0511fa429173266a5fc4173bc2317f44db1bf76
SHA2566f8b8367498695d4e0dde1072b4b31e4aa5e11d73bab3dbda858a287186e9c3e
SHA512a712e56b9aa52901ba13ed6ac00d3565f890ed69e81fd661b5df651903c47b9389d4ee905041f34b3cb3381b29c1762907db1551ed7cf16b2b468a6caf765cea
-
Filesize
5.5MB
MD5efd1c6bfa8e79db02b5081e9e941a9c5
SHA18bcfe0d602b90daa5f98fc1e7f43355ca8fb8775
SHA2562f7e38f1eea5f968083a60254110e43f35bb578280f7b34147eee19e1e2d3e4c
SHA512e700b7e3987f33122dcb474ecbd8836b8f54f1cdda39105949a5d80f9c8428666e978db7eab80aae40f2c0524266ab12511b05876c15b7af31c18fa544ca3e32
-
Filesize
1.7MB
MD59c9d3e584df24ab3e393e1cf3a1d22bb
SHA1fc54421a0f10399c33daa802018fa55d1cb3fc1e
SHA2568c32a93b51b5a8f3dc864634df9e64033024814f88d4724d321f4af591b5fcff
SHA512548277217b14c89bced03e197f6bfe1039c22b36bc831263a3c28ef73d454317fc3d5ce6b96d6c02f80b24660ee0c1d563ba659365c3e51a432e89beb4f1957c
-
Filesize
3.7MB
MD52ad344cd9ba7765d4aef5ae48b9f9de1
SHA161233c777d2c1e920d48a62febbbfb87f8cb0385
SHA256a681dc8677a089ba5912b93791a1c8911adaa5ff58da99c25620f8a738e1ad97
SHA5127938b9ac2201164dba801473335dc9eeb16950a6beb36a5405f00de73052b45f1a7372d2cee0ad9cadf0cd3b5d8f7d52139b2f43f99a0c9bd23fc1f634acf280
-
Filesize
1.8MB
MD544880800383f2d1e6ba9415f3ab244f3
SHA1e0c65a51792be71d737c657164eb71dfc33e756a
SHA25682460b8569927f518661f783b5690e7feb08d8cb43afb5d0ecd01127c2672ef6
SHA5124505f7fd96770a6836e74208cccdc14e4692bef80ece4ac2bdd76d35e47c12254973e3cbcd254aff0a81eb370ac91edc3cf1b7f158227defed1b4235b5a517c4
-
Filesize
1.8MB
MD5ce43ce23bf4d7d8900e1d2c977a21485
SHA1abfb344c9e741d65422f860b6a264427edae49c4
SHA2566d880676ae7d6879ae8a558d891980c4ea1ff1f35fe389e611939a89b3ed5763
SHA512a1ace2a775c4c3928bb6db2f1355f700ef87394704ad4c94c130dc12642473063a56343a5417315276df3ca0ab013b5a4862a01cc5fe749d92365a75da639958
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin
Filesize8KB
MD5ccab03934d620667911e1209f0d80aa8
SHA1bbf74b3601c7dc9e8983daf9054fa999a85ad5d3
SHA256824de1e775d2544ac70720daf3dccafbdbf8053874178b3d1638edaec35aaec7
SHA512bffe85f354d45f8e6beb91461e5e4ef6bd26a1505cf0b9d0dad459bf16bef63c091086ed356e733cc478ad4bfeb31382b5c69b043136faf69a6b8fa62f527a87
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin
Filesize11KB
MD557d967a52144f98a619f09ad1fe99497
SHA19830bd057ce6785cf946e1c436827cb7b2840df7
SHA256841c525170b1bef8f1f1e07f64564f58901c185d21436b86757f1e06d6df595c
SHA51230ec08f81169ba031bacc009463b1283394a0944b16e311d5b490b2a17679007e60e7c37f6a2e693347ed9d205ae1b47be544d05678cee213a2a931b7835148c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.bin
Filesize23KB
MD5658c956e2452ff7aecd540870abc0674
SHA1c693774b34edc7c6215c7084b1f3be92d7ff6280
SHA2561e621fd1fe7fcaaf49334e3547aa26c46f0e48e0c8827b7d73e3eb895c8ad431
SHA5127468f37535a3ae3e62efff5e8d4a0211463f839bf80c9d6339be4e3fcad415d57261445cd84d35c1167798fed9d1671c7500bd151bb110dc76eb2f96c9670614
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.bin
Filesize15KB
MD5d1641091a4ff8eea6cecebdb0ef55774
SHA135d39e259cd3a5a26fc80c5bd64922ca135ecb76
SHA25611a73198bbd29983958e6e6e0cece74c34e315cd3cb9563f8f5ed28a548dd486
SHA512cb02b9289ce0f76bcf96169699917b75073ce29ad9c63e77a9db649a26d7a4588379f2da23b3d84f752b5f378c8ebefc9aef828e98ce1d04de0cc8ed31feedb8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5aee52393ebd1962944f22a3ddf16dcec
SHA17f2b1853969235d5782aa84c10a9afa8c355c444
SHA25663a4012b6590fceb67e33b64863d63cc0a2253e9329226ea81cb7e72a583dde8
SHA51281921437c6aef5826df19406599ba9abc45ba4e7fe886051267f9a823fe0cee01223177700f21480f059d463af6269d1ded3df95d7781fc8b46ec1de26f18f04
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD58aedcd5902e74b81b8c84867a94072a3
SHA1f6dedf8fba7fee93f5cbe82b200299dd748716b5
SHA2568a38afdb854919fe65111361182dc7ececd0d763f1ec0e578d48f36328b760e0
SHA51271199cfd9fb91701fd343a030b40af61a290177e200ff294df0955f4f0c40e1df1e4a38f03ece5719d8148d3d8163bcb010a65b23319469d1f3eee734e1f7f2a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\0085e76f-73b2-4c79-89a9-996d4622ddbc
Filesize671B
MD5163056505571b5c68e600a102a3f8a40
SHA1644822a4c317f2b96730033ae7fb2800dba75584
SHA25677483110a3dd5850145c04dd921aace67c93562c3c8af3ba8159e8b1a7a30665
SHA512724def6038d0506661149d344864c0db52b7e7507891e238b715f2c581aec7a1328259935496e7fcdbc007d880d91e4297681a03c055f52b9eb9105f36896f0d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\a94039a1-95e6-4665-81d4-bfb79fc9d0c4
Filesize982B
MD52ab334d2e581adf7f9f4e8ce5532e3d8
SHA10b749dd7a6512c2e2c69952989a4b2398eebe9e1
SHA25666f8713ee4e5c8f2c552547bb3092fef8b4b5aa5ee351b2597db0cf03434c6af
SHA51280b24c31b25c80a0f7015944ca70da5e1e7dbd5eb8ad0ebf225ab1a84dff9543a1bbf5dde627ad12b6876e16b1a1015c5308cc7059400e53d4de3517fc326280
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\e57bba23-cc3c-4d9f-8090-591a61cc5704
Filesize26KB
MD51d5128a6f60dd086f5c72b0cffd7f23b
SHA12c732cbcb06193281d47f273e8866da650ffd487
SHA256ec8a87759024e68f3df9bdf0e5ac7d531bfd8c73a98845d63a8e55769dbd7782
SHA512b8bd2040be9537653fa96c8044e7792af5aac88d5520f10ace1fc62be708eadd0a810392586c379d6f1e22c81bbfeb12d37c62a1dee1ec5705e26e7f85d5cfc9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD52586a1936e5c705c199673cda2694e5f
SHA1aa67df25ce9041546f307819d1b7ea9814dbb868
SHA256a441cb906ad08e556345339c70dae30bab191d4aa5c7a73f052fc030b3af44b2
SHA5122ea65c205beee5890a4589af0796209f38b5852158d8ba9c891d5cf2adc4aca6fecb8daf2b6f39c5d1b1739b4632511bea3ef62e1c39d2f437d1eb83877920cb
-
Filesize
15KB
MD597539c64b32afeebc9ec7dbe15674bc1
SHA1be956f34ceaf133eee65125e086cd0c5573f0b95
SHA2561b913dbf1398490f838e6c143bf61c1abf648f7e43c5649a88c41cfeda8fd6e3
SHA5123c92fddcfa6ef5b71ba0b7fc00819de0d583f343642939be6b1b75991d9ea0f97f51d0b4168ed531c686f8aacc7908cdeb448653c447e2cc0fd69a53a6998160