Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-12-2024 16:46
Static task
static1
General
-
Target
0abcd4381407833a5724ca388d337f195d935298479a75a56319964bfd2e8acc.exe
-
Size
5.4MB
-
MD5
b4d398c7e8d9a4de32149cf4c462529a
-
SHA1
3eff0ee04687b011a9c2bfe1ec885dc5c713c6bb
-
SHA256
0abcd4381407833a5724ca388d337f195d935298479a75a56319964bfd2e8acc
-
SHA512
e0528f544bda562c4733bcf6d5d67a5d8c9171b95a36c5247dd32c07c54b6faea50741a97522cb060f6fc7eeeef3d9ccada1000fe27b68870c81d11549548553
-
SSDEEP
98304:sv702jqrtYGVjdjYmmc9JlaoeCoRIzsp8PoHzVcc+F8P37KJAAqZQECU+7QGR:N2jqfVFmeLoRzpw0cc+W7k/qP9+QG
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
https://atten-supporse.biz/api
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://atten-supporse.biz/api
https://se-blurry.biz/api
https://zinc-sneark.biz/api
Signatures
-
Amadey family
-
Gcleaner family
-
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection e5d97e8c6c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" e5d97e8c6c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" e5d97e8c6c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" e5d97e8c6c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" e5d97e8c6c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" e5d97e8c6c.exe -
Stealc family
-
Xmrig family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1V48r3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9f4b6f193e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e5d97e8c6c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e0d56f3ea2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2R7377.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3k57S.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 249a49b82e.exe -
XMRig Miner payload 10 IoCs
resource yara_rule behavioral1/memory/3604-3935-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/3604-3926-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/3604-3925-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/3604-3924-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/3604-3923-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/3604-3908-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/3604-3907-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/3604-4076-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/3604-4251-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/3604-4253-0x0000000140000000-0x0000000140835000-memory.dmp xmrig -
Blocklisted process makes network request 1 IoCs
flow pid Process 140 5656 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 6576 powershell.exe 5656 powershell.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 20 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2R7377.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9f4b6f193e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9f4b6f193e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e5d97e8c6c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 249a49b82e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1V48r3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2R7377.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3k57S.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e5d97e8c6c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1V48r3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 249a49b82e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e0d56f3ea2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e0d56f3ea2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3k57S.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 1V48r3.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 14 IoCs
pid Process 3212 c7m76.exe 1684 1V48r3.exe 948 skotes.exe 1568 2R7377.exe 5072 3k57S.exe 1288 249a49b82e.exe 2032 9f4b6f193e.exe 2944 2d010b533e.exe 6644 e5d97e8c6c.exe 5436 e0d56f3ea2.exe 6204 skotes.exe 6420 downloaded_file.exe 2440 WindosCPUsystem.exe 5320 skotes.exe -
Identifies Wine through registry keys 2 TTPs 10 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 1V48r3.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 2R7377.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 3k57S.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 249a49b82e.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 9f4b6f193e.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine e5d97e8c6c.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine e0d56f3ea2.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" e5d97e8c6c.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features e5d97e8c6c.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0abcd4381407833a5724ca388d337f195d935298479a75a56319964bfd2e8acc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" c7m76.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\249a49b82e.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013469001\\249a49b82e.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\9f4b6f193e.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013470001\\9f4b6f193e.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2d010b533e.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013471001\\2d010b533e.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e5d97e8c6c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013472001\\e5d97e8c6c.exe" skotes.exe -
Power Settings 1 TTPs 4 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 5220 powercfg.exe 2780 powercfg.exe 5948 powercfg.exe 3888 powercfg.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000c000000023c53-84.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
pid Process 1684 1V48r3.exe 948 skotes.exe 1568 2R7377.exe 5072 3k57S.exe 1288 249a49b82e.exe 2032 9f4b6f193e.exe 6644 e5d97e8c6c.exe 5436 e0d56f3ea2.exe 6204 skotes.exe 5320 skotes.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2440 set thread context of 3604 2440 WindosCPUsystem.exe 149 -
resource yara_rule behavioral1/memory/3604-3899-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/3604-3905-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/3604-3904-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/3604-3935-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/3604-3926-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/3604-3925-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/3604-3924-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/3604-3923-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/3604-3908-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/3604-3907-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/3604-3903-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/3604-3902-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/3604-4076-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/3604-4251-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/3604-4253-0x0000000140000000-0x0000000140835000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1V48r3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
pid pid_target Process procid_target 4580 1568 WerFault.exe 85 2340 1568 WerFault.exe 85 3764 1288 WerFault.exe 96 4852 5436 WerFault.exe 125 -
System Location Discovery: System Language Discovery 1 TTPs 20 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0abcd4381407833a5724ca388d337f195d935298479a75a56319964bfd2e8acc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7m76.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 2d010b533e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2R7377.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3k57S.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9f4b6f193e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2d010b533e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e5d97e8c6c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e0d56f3ea2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1V48r3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 249a49b82e.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 2d010b533e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language downloaded_file.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 2768 taskkill.exe 1296 taskkill.exe 2596 taskkill.exe 944 taskkill.exe 416 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 38 IoCs
pid Process 1684 1V48r3.exe 1684 1V48r3.exe 948 skotes.exe 948 skotes.exe 1568 2R7377.exe 1568 2R7377.exe 5072 3k57S.exe 5072 3k57S.exe 1288 249a49b82e.exe 1288 249a49b82e.exe 2032 9f4b6f193e.exe 2032 9f4b6f193e.exe 2944 2d010b533e.exe 2944 2d010b533e.exe 6644 e5d97e8c6c.exe 6644 e5d97e8c6c.exe 2944 2d010b533e.exe 2944 2d010b533e.exe 6644 e5d97e8c6c.exe 6644 e5d97e8c6c.exe 6644 e5d97e8c6c.exe 5436 e0d56f3ea2.exe 5436 e0d56f3ea2.exe 5656 powershell.exe 5656 powershell.exe 5656 powershell.exe 6204 skotes.exe 6204 skotes.exe 6576 powershell.exe 6576 powershell.exe 6576 powershell.exe 2440 WindosCPUsystem.exe 2440 WindosCPUsystem.exe 2440 WindosCPUsystem.exe 2440 WindosCPUsystem.exe 2440 WindosCPUsystem.exe 5320 skotes.exe 5320 skotes.exe -
Suspicious behavior: MapViewOfSection 9 IoCs
pid Process 6420 downloaded_file.exe 6420 downloaded_file.exe 6420 downloaded_file.exe 6464 explorer.exe 6464 explorer.exe 6464 explorer.exe 6464 explorer.exe 6464 explorer.exe 6464 explorer.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 2768 taskkill.exe Token: SeDebugPrivilege 1296 taskkill.exe Token: SeDebugPrivilege 2596 taskkill.exe Token: SeDebugPrivilege 944 taskkill.exe Token: SeDebugPrivilege 416 taskkill.exe Token: SeDebugPrivilege 5108 firefox.exe Token: SeDebugPrivilege 5108 firefox.exe Token: SeDebugPrivilege 6644 e5d97e8c6c.exe Token: SeDebugPrivilege 5656 powershell.exe Token: SeDebugPrivilege 6576 powershell.exe Token: SeShutdownPrivilege 5220 powercfg.exe Token: SeCreatePagefilePrivilege 5220 powercfg.exe Token: SeLockMemoryPrivilege 3604 explorer.exe Token: SeLockMemoryPrivilege 3604 explorer.exe Token: SeShutdownPrivilege 3888 powercfg.exe Token: SeCreatePagefilePrivilege 3888 powercfg.exe Token: SeShutdownPrivilege 2780 powercfg.exe Token: SeCreatePagefilePrivilege 2780 powercfg.exe Token: SeShutdownPrivilege 5948 powercfg.exe Token: SeCreatePagefilePrivilege 5948 powercfg.exe Token: SeDebugPrivilege 5108 firefox.exe Token: SeDebugPrivilege 5108 firefox.exe Token: SeDebugPrivilege 5108 firefox.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1684 1V48r3.exe 2944 2d010b533e.exe 2944 2d010b533e.exe 2944 2d010b533e.exe 2944 2d010b533e.exe 2944 2d010b533e.exe 2944 2d010b533e.exe 2944 2d010b533e.exe 5108 firefox.exe 5108 firefox.exe 5108 firefox.exe 5108 firefox.exe 5108 firefox.exe 5108 firefox.exe 5108 firefox.exe 5108 firefox.exe 5108 firefox.exe 5108 firefox.exe 5108 firefox.exe 5108 firefox.exe 5108 firefox.exe 5108 firefox.exe 5108 firefox.exe 5108 firefox.exe 5108 firefox.exe 5108 firefox.exe 5108 firefox.exe 5108 firefox.exe 5108 firefox.exe 2944 2d010b533e.exe 2944 2d010b533e.exe 2944 2d010b533e.exe 2944 2d010b533e.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2944 2d010b533e.exe 2944 2d010b533e.exe 2944 2d010b533e.exe 2944 2d010b533e.exe 2944 2d010b533e.exe 2944 2d010b533e.exe 2944 2d010b533e.exe 5108 firefox.exe 5108 firefox.exe 5108 firefox.exe 5108 firefox.exe 5108 firefox.exe 5108 firefox.exe 5108 firefox.exe 5108 firefox.exe 5108 firefox.exe 5108 firefox.exe 5108 firefox.exe 5108 firefox.exe 5108 firefox.exe 5108 firefox.exe 5108 firefox.exe 5108 firefox.exe 5108 firefox.exe 5108 firefox.exe 5108 firefox.exe 5108 firefox.exe 2944 2d010b533e.exe 2944 2d010b533e.exe 2944 2d010b533e.exe 2944 2d010b533e.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5108 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2684 wrote to memory of 3212 2684 0abcd4381407833a5724ca388d337f195d935298479a75a56319964bfd2e8acc.exe 82 PID 2684 wrote to memory of 3212 2684 0abcd4381407833a5724ca388d337f195d935298479a75a56319964bfd2e8acc.exe 82 PID 2684 wrote to memory of 3212 2684 0abcd4381407833a5724ca388d337f195d935298479a75a56319964bfd2e8acc.exe 82 PID 3212 wrote to memory of 1684 3212 c7m76.exe 83 PID 3212 wrote to memory of 1684 3212 c7m76.exe 83 PID 3212 wrote to memory of 1684 3212 c7m76.exe 83 PID 1684 wrote to memory of 948 1684 1V48r3.exe 84 PID 1684 wrote to memory of 948 1684 1V48r3.exe 84 PID 1684 wrote to memory of 948 1684 1V48r3.exe 84 PID 3212 wrote to memory of 1568 3212 c7m76.exe 85 PID 3212 wrote to memory of 1568 3212 c7m76.exe 85 PID 3212 wrote to memory of 1568 3212 c7m76.exe 85 PID 2684 wrote to memory of 5072 2684 0abcd4381407833a5724ca388d337f195d935298479a75a56319964bfd2e8acc.exe 92 PID 2684 wrote to memory of 5072 2684 0abcd4381407833a5724ca388d337f195d935298479a75a56319964bfd2e8acc.exe 92 PID 2684 wrote to memory of 5072 2684 0abcd4381407833a5724ca388d337f195d935298479a75a56319964bfd2e8acc.exe 92 PID 948 wrote to memory of 1288 948 skotes.exe 96 PID 948 wrote to memory of 1288 948 skotes.exe 96 PID 948 wrote to memory of 1288 948 skotes.exe 96 PID 948 wrote to memory of 2032 948 skotes.exe 100 PID 948 wrote to memory of 2032 948 skotes.exe 100 PID 948 wrote to memory of 2032 948 skotes.exe 100 PID 948 wrote to memory of 2944 948 skotes.exe 103 PID 948 wrote to memory of 2944 948 skotes.exe 103 PID 948 wrote to memory of 2944 948 skotes.exe 103 PID 2944 wrote to memory of 2768 2944 2d010b533e.exe 104 PID 2944 wrote to memory of 2768 2944 2d010b533e.exe 104 PID 2944 wrote to memory of 2768 2944 2d010b533e.exe 104 PID 2944 wrote to memory of 1296 2944 2d010b533e.exe 106 PID 2944 wrote to memory of 1296 2944 2d010b533e.exe 106 PID 2944 wrote to memory of 1296 2944 2d010b533e.exe 106 PID 2944 wrote to memory of 2596 2944 2d010b533e.exe 108 PID 2944 wrote to memory of 2596 2944 2d010b533e.exe 108 PID 2944 wrote to memory of 2596 2944 2d010b533e.exe 108 PID 2944 wrote to memory of 944 2944 2d010b533e.exe 110 PID 2944 wrote to memory of 944 2944 2d010b533e.exe 110 PID 2944 wrote to memory of 944 2944 2d010b533e.exe 110 PID 2944 wrote to memory of 416 2944 2d010b533e.exe 112 PID 2944 wrote to memory of 416 2944 2d010b533e.exe 112 PID 2944 wrote to memory of 416 2944 2d010b533e.exe 112 PID 2944 wrote to memory of 4784 2944 2d010b533e.exe 114 PID 2944 wrote to memory of 4784 2944 2d010b533e.exe 114 PID 4784 wrote to memory of 5108 4784 firefox.exe 115 PID 4784 wrote to memory of 5108 4784 firefox.exe 115 PID 4784 wrote to memory of 5108 4784 firefox.exe 115 PID 4784 wrote to memory of 5108 4784 firefox.exe 115 PID 4784 wrote to memory of 5108 4784 firefox.exe 115 PID 4784 wrote to memory of 5108 4784 firefox.exe 115 PID 4784 wrote to memory of 5108 4784 firefox.exe 115 PID 4784 wrote to memory of 5108 4784 firefox.exe 115 PID 4784 wrote to memory of 5108 4784 firefox.exe 115 PID 4784 wrote to memory of 5108 4784 firefox.exe 115 PID 4784 wrote to memory of 5108 4784 firefox.exe 115 PID 5108 wrote to memory of 3708 5108 firefox.exe 116 PID 5108 wrote to memory of 3708 5108 firefox.exe 116 PID 5108 wrote to memory of 3708 5108 firefox.exe 116 PID 5108 wrote to memory of 3708 5108 firefox.exe 116 PID 5108 wrote to memory of 3708 5108 firefox.exe 116 PID 5108 wrote to memory of 3708 5108 firefox.exe 116 PID 5108 wrote to memory of 3708 5108 firefox.exe 116 PID 5108 wrote to memory of 3708 5108 firefox.exe 116 PID 5108 wrote to memory of 3708 5108 firefox.exe 116 PID 5108 wrote to memory of 3708 5108 firefox.exe 116 PID 5108 wrote to memory of 3708 5108 firefox.exe 116 PID 5108 wrote to memory of 3708 5108 firefox.exe 116 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\0abcd4381407833a5724ca388d337f195d935298479a75a56319964bfd2e8acc.exe"C:\Users\Admin\AppData\Local\Temp\0abcd4381407833a5724ca388d337f195d935298479a75a56319964bfd2e8acc.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\c7m76.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\c7m76.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1V48r3.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1V48r3.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Users\Admin\AppData\Local\Temp\1013469001\249a49b82e.exe"C:\Users\Admin\AppData\Local\Temp\1013469001\249a49b82e.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1288 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1288 -s 15686⤵
- Program crash
PID:3764
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013470001\9f4b6f193e.exe"C:\Users\Admin\AppData\Local\Temp\1013470001\9f4b6f193e.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2032
-
-
C:\Users\Admin\AppData\Local\Temp\1013471001\2d010b533e.exe"C:\Users\Admin\AppData\Local\Temp\1013471001\2d010b533e.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2768
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1296
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2596
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:944
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:416
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking6⤵
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking7⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2040 -parentBuildID 20240401114208 -prefsHandle 1968 -prefMapHandle 1960 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d19c70c6-ccb6-448a-b896-aa7331a4665d} 5108 "\\.\pipe\gecko-crash-server-pipe.5108" gpu8⤵PID:3708
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2464 -parentBuildID 20240401114208 -prefsHandle 2452 -prefMapHandle 2448 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {bae2cb5f-aeb5-420f-89c9-1310fd5effe7} 5108 "\\.\pipe\gecko-crash-server-pipe.5108" socket8⤵PID:3112
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3300 -childID 1 -isForBrowser -prefsHandle 3128 -prefMapHandle 3324 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e9a3912d-b329-4275-9a76-19035beb030b} 5108 "\\.\pipe\gecko-crash-server-pipe.5108" tab8⤵PID:4756
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4132 -childID 2 -isForBrowser -prefsHandle 4124 -prefMapHandle 4120 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b62fafd5-29ce-4af0-b4b0-b57544e13841} 5108 "\\.\pipe\gecko-crash-server-pipe.5108" tab8⤵PID:3192
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4784 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4788 -prefMapHandle 4868 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5067812b-d56c-44d0-87bf-4edd81ed01da} 5108 "\\.\pipe\gecko-crash-server-pipe.5108" utility8⤵
- Checks processor information in registry
PID:5844
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5188 -childID 3 -isForBrowser -prefsHandle 5180 -prefMapHandle 5176 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0261cfd7-6dc4-48e7-b007-f2a6d17a5e54} 5108 "\\.\pipe\gecko-crash-server-pipe.5108" tab8⤵PID:7000
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4016 -childID 4 -isForBrowser -prefsHandle 5168 -prefMapHandle 5092 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5d4648ab-e307-4ebc-836a-2bdf5adba742} 5108 "\\.\pipe\gecko-crash-server-pipe.5108" tab8⤵PID:7128
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5588 -childID 5 -isForBrowser -prefsHandle 5508 -prefMapHandle 5516 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b4c1574f-d8d6-4098-8732-1d225be591cf} 5108 "\\.\pipe\gecko-crash-server-pipe.5108" tab8⤵PID:7140
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013472001\e5d97e8c6c.exe"C:\Users\Admin\AppData\Local\Temp\1013472001\e5d97e8c6c.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6644
-
-
C:\Users\Admin\AppData\Local\Temp\1013473001\e0d56f3ea2.exe"C:\Users\Admin\AppData\Local\Temp\1013473001\e0d56f3ea2.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5436 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5436 -s 15926⤵
- Program crash
PID:4852
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1013474041\2EW05w7.ps1"5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5656 -
C:\Users\Admin\AppData\Local\Temp\downloaded_file.exe"C:\Users\Admin\AppData\Local\Temp\downloaded_file.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:6420 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:\ProgramData\WindowsSystem\WindowsSystem.exe','C:\ProgramData\WindowsSystem1\WindosCPUsystem.exe'7⤵PID:6456
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Add-MpPreference -ExclusionPath 'C:\ProgramData\WindowsSystem\WindowsSystem.exe','C:\ProgramData\WindowsSystem1\WindosCPUsystem.exe'8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6576
-
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"7⤵
- Suspicious behavior: MapViewOfSection
PID:6464 -
C:\Windows\EXPLORER.EXEC:\Windows\EXPLORER.EXE {DF4EE2DA-C20C-4BBF-97D5-4B94E23FE1C8}8⤵PID:6988
-
-
C:\ProgramData\WindowsSystem1\WindosCPUsystem.exe"C:\ProgramData\WindowsSystem1\WindosCPUsystem.exe" ""8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2440 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 09⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:5220
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 09⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:3888
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 09⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:5948
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 09⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:2780
-
-
C:\Windows\explorer.exeexplorer.exe9⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3604
-
-
-
C:\Windows\EXPLORER.EXEC:\Windows\EXPLORER.EXE {DF4EE2DA-C20C-4BBF-97D5-4B94E23FE1C8}8⤵PID:5392
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2R7377.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2R7377.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1568 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1568 -s 15924⤵
- Program crash
PID:4580
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1568 -s 15764⤵
- Program crash
PID:2340
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3k57S.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3k57S.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5072
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1568 -ip 15681⤵PID:2928
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 372 -p 1568 -ip 15681⤵PID:4992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 1288 -ip 12881⤵PID:3844
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6204
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 5436 -ip 54361⤵PID:6060
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5320
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Power Settings
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.8MB
MD556ec5472231866630749ccf6977c4fbd
SHA103c5fe2e0dd49a554b354e7ef26f794f4aa86e9d
SHA256e19905020c9685a68c3f4c9f62f57e4b21bc8dcfad567c89b0b37b42a120182b
SHA51246274dfec96406c4bd101c6207c813e03b965e9f9a6b1b57147bcfb7d24a9180002c3b8001ac85a91dfd0b75f0aabba119e455d52fa847a751c32f00e3ad4753
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
19KB
MD533372f708bd093493e0329561e8cc5ec
SHA177ceb9a226ba7e9037cf00fd67e82f382c158104
SHA25600671d7d596b5d9d1dea8ba2f76de55b00767606ba6b9f7f8ade584e0b42c3b5
SHA5122370d7125cae418a3e67148954cc5bb568f13418b196a327fe8f5e97cc49c304f90831a18b34253460db85ad2a51773e153f0683995e2c351e58f26567071f49
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\activity-stream.discovery_stream.json
Filesize19KB
MD58f4e19456072d257f9e5d15e67cf181b
SHA135da5b255034943b15d731e6725d625004f9d498
SHA256d3d49c19016e8e2684dacd10ae58e0aee442b9659614f8361f6229b681b9695c
SHA5120636a949c9fa5f730d54fac06e6915c7dc926e94e491e82cde4a6130bbe2c04077ebcfce0dccbb8bb0fa4ae34403d180e7ab10ad0a75f8268f9e7ae7acf707a5
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD538e7943a8ec4444bbf68a22b65340057
SHA10e4d573c949414258e68ea01f5647f7e8a0666d2
SHA25635961431905fc84554cb81d31252c06444aaf460c17eea334cbe874d4d8973ce
SHA512c00542b22b21f9bcb89d13df7ae9552ac5b3db8139fa4479ddd77eac4fe95b761f6c98300cd31a4617b3e9fae99d85e7ca1fd22c8c62d928d3d1b8f2043991f3
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
1.8MB
MD5fc730cc04cea274ba94c95faad570950
SHA19959c1e33b3fe4f3e4da5e033f97a39004518b7d
SHA256478b4646887cf4961943568f8aef881f2991e0fffaf5d2592939724c6a8c2d78
SHA5125eb3af384e548e3ae02a1a0b972394b6a4b40798df44e379d50dd251c1f61eccc0d90460f966de2c3868ed9b521daae7e59c1eef449b02e884ffb96b408a7281
-
Filesize
1.7MB
MD5be752df2a3bae5d9fbd14d433b351967
SHA164355c823c38b257e469ff717c5ba8a9e0b0bbf2
SHA25608570ded4cf2c4a1d44b1837436d241c0392f3c9f35ff96da78ffc80dcdcf0fc
SHA512600cb7a8e7832f70909f53ea387c850d8a8b7e255d80f7049ff4833b198ae18cb817460e2343ff92021935c17d4845caa88ecf4ecbad8b832083d6f0fd83b151
-
Filesize
948KB
MD520f205ebc3ddeec636e52a437b8c3c9b
SHA1a7d0319411c2b8d115b5fb02f1ef63a37c7ea55f
SHA256d1f20d134a92d23683fc218749a27d327a9ac6a35cdcde8bded0854bc05ab3e8
SHA5122a7880884aabb5a5cd1677455c38f50d6e97d7ffe11688673f683c76031725fe068acfc0f530bd3d1d574d721566ef9308431595b09cff17840a294b5b19afcb
-
Filesize
2.7MB
MD543c842910f45deae72a62e0819adceb0
SHA1fffcc762a5d4753855e62bd845ad39e43c962097
SHA256aedb1af233367d2b3facb397055713f112e2fd833e625f07fff1ae723ebc4fb8
SHA512c9fca70038e11e562e613d13061e2b68c378ee16bddf7341ca81e3502e07f31d01431f8acb39d35d43444115d96a0ace52d81d352ccbddbbe66773f64cc73fc0
-
Filesize
1.9MB
MD5e96cd9e1c8cbc927c9c445e155d5bd75
SHA16c8d7a80cb4635fda0f7b799ace942dcd10b3700
SHA2569f1169888c4c2acd65e79928bb27a686204fa3b622b921a7ee56c7a735924eb6
SHA512419cb0650a718f7356335745a64d441d8693c48181692bdfb22da508fa993e93772f5ee89ae5085e5ae3d04f28936b57e12e6704291be6acc45041744ba7f413
-
Filesize
8KB
MD5de8938735aac7e7328ab07101836c2e8
SHA11109c9d099e5caa3fdb90c4e45622aaa1d9fa7e3
SHA2562a772aefe91cd03f252ecfd3f1141a75506dd52f41c584fb754ba66f0a7accb9
SHA512b78b4217ff3e01b998c4c884f10d0bdeeac41b373826b428304587f4929ccff2379f8884aa00e9aa6b9149eaf062009266a6c5fd3792bcb25b4fcaba2597b71c
-
Filesize
48KB
MD5349e6eb110e34a08924d92f6b334801d
SHA1bdfb289daff51890cc71697b6322aa4b35ec9169
SHA256c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a
SHA5122a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574
-
Filesize
1.7MB
MD5426c4cc5cc662dbf06c9232c69e5d989
SHA166ef4347c88c6f9e42f6fadcd8bc241c3ebff11c
SHA25669877dd837ed30807eb6255dd96d4031f1473a677decb52b023e260c1d7aa851
SHA512e61545a5c91201fb1a374dfa4f0265e28b0a366ba300e427f5e60d8d745ac94013086d1fb6861f41f9396d4c09c7fff5623d7b8d30831a64b42379250bd5a1c7
-
Filesize
3.6MB
MD5f08d01e421655cedfe3e42920e73dba4
SHA1b3c949460783e15f12ccf08f1306a648cbda305c
SHA256b55c049f198870b34c787e0abb93e392ef6d03eda2d6f1900de4c7a204f5619f
SHA512c0b7ff499fa1d0537219c758331b8a5ee3a0422bb5abf58a98cdf07b47db589cbbc47d40907c4dd8c6d99a4f7d60fcbe2754db1c08118205ed343788fa987cf3
-
Filesize
3.1MB
MD50bc8514721ccb995fa1072d8f167d532
SHA18ab7107e7adbba9e6fe9362e3bb923706c852797
SHA256c87a5e136fafd0da8252d65d01cde92bb27e8da419b57ea32f9522855d0a948d
SHA512488f786a09667183a954126bae120c1131015d2aa94eee1d56563e209418d3330aabe5e373d17eb682298fbcc00a801549c039d52a4778ab1c844d28505c6ce5
-
Filesize
1.8MB
MD5aea9554a885748e0394687cc80792951
SHA16fe6285b185928ece358988782074e7ddf8ac5de
SHA2561efbb04fa466e6dbab12ce5eded56ad4a4feb1c6a355ed82ebd15b4f35d51080
SHA51256acc112cf707f90eafa2f76a7ae87bd9198fb7175cd2be562ba3d77da8f389e7b6441f7f4e39e58059f71842857b958e75a1c01587d71c3bad6e0d0ff929b8f
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
503KB
MD5d60c9e070239f8c240aaa6d8832e11ef
SHA1aaac23a338a91505c56c3057d22a14bf190a2795
SHA256493f1bd7227c4ee9430f8ad226e929908996b97a28f578a850e9b26c393ad2d2
SHA512d70cf79dec352bd965f8506ad989375642a8931300d5497724c82882ae4d57ccc314d4e6b24c398075af3deb4433207522106647e70e74c90e56791e20bca42c
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin
Filesize18KB
MD50ed1eee71bedd3e6aee730205cc61f9d
SHA1b7527d8afc23542cad7cc84515d14178dbd39b5d
SHA256722d2135a7431cf52fd013c6bf89635812363c7d12aefe40cb4e5995b32d8b3d
SHA51272ab0b402376094f5903f61fc4a7fde470c6131e8eda547f452e830d229d69c9b76b80d0ac664f583498a6b6908ab1defa394456fde93b35b0ee9c8a6eb80dd8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin
Filesize13KB
MD52f67595a8c72a7707e90910f9a64004e
SHA1760a7ab11deeb8d59918aad5b4ef03696ef9b0ed
SHA25681380de4df1ad91b839295e463ec58229f33b62c5ec16c2b34a336fa70a18f3b
SHA5121ff468086331eea6935d7c37d6188a294211adfdd4753b3fe7873b0faa9dfb5f96fd2286d25ec3e1b952a8a1a3ef244919d2b27b844c88c346698d48785bf4f0
-
Filesize
224KB
MD5afe120812e9c9788d5ca4e5a206364e5
SHA1329f22142ea600e281c53bcca2facc44a71c4540
SHA2564c9817b40ada77f7a26127baa636e5a710aecaf5e7f7b61a75760a91e2879519
SHA512dda753bf528c086cccfd7bbb5382dc672eebd4971501df4435fe4c697503aeb52647b6da79e2512772bb0198f70e9a7941a74b647f0f237e57cd1d75d842b82c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.bin
Filesize23KB
MD5c91f44d4b245644b22dd3a548ff918bf
SHA19d5dcd8faef5ca10ea024973a67bd990d6c1b3fa
SHA256c455eeba1eab820e0546a57f35ae92ef0b5298feab1885aa3ada04b5a61cc0bd
SHA51267861d912237d741245880d61c64a7bec210ce1af9ab9ed06b1be405f8eb53df093f1bd2947c799e0a2b467256c061d08d141d8c922af655a5bf236be2912ae2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.bin
Filesize5KB
MD5d9acde5cb58b65b76a313598839dac5a
SHA17975c9b0722f0039e1dbd3423d869aafb6e029fb
SHA256a57e151317a4f5896bf6feb67b9012a068703b1a18e19b56c4fdaa834f2275fa
SHA5120040180bb7c442734590610c8a4a4b653925d72e0502d548881c4c83fd5604bf74f3cf28fa9bfe0912b7f345c446157b62bf1080717a1735fa4c903eb8b2f5af
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.bin
Filesize15KB
MD5c084f8bb682f1b0da6d9effec93fe52c
SHA126b4c7114c16ef0a14f6af618c425f438f173656
SHA256e2218d8f872f95e249e3e984c5f3599912a7de6fefa175bc043b2b2dd0a7c2b0
SHA512aac0033b8369efeea3661523b1c7710d34a7359064064b14dabdb0c29353ee97388c9684d39c6368b293b52d0b76cd8b4f02ba2502d631feb173a5b2d43997d9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD566fd63a18daa491c721e65e04a30fb15
SHA149921791aaf4baca6e01a610c3055401bda29542
SHA2566ab73787702ac61068421011a5d73b1a40426e8a09f45829399e59857d22f7f3
SHA5126a18b4d921000204475c6a92f01be5948d4d808ac4bbeb45e837eadd02a8bc2c0a5f821fc38bdd25dc82e7c4057d18e5d8ef28e0821a8b8ad834350f30fb045a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5be5ccbd024933b37aabc32128ee274dc
SHA169c836e93ac26a0f609c26630551f25cb53f15b2
SHA25611680554762ab63a9a925d22bda0d03ff946934bf7c5ea68f78ba74eb677ba8c
SHA51225678b4b60bfd78f85cae04c0ddfc9d5011ab797d23c16b0f964bb8af18bb970b88ddce8005e9385dae6bb126fa601451f42dc1a1826a5c672a52554c98cbb12
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5adfda7bdb1751a75a32a97c04f060b96
SHA1393b1a742b36a24afbdca9e11f961d23fff3149c
SHA2563e987fd017b4f645b6e9e77bd9bbe9f088f3e62b912374147fd00d1cf6ced6ee
SHA512c362074446103ed23327231ebf510d4cb930710320b82125b41474e7e5e39dd799b3de81e7899efec04a73b4477c71373630ab3c2d5beb8e2d30a0bdc1f492fb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5b005298e30f52a9d4ae535ca8b772603
SHA12dfb8cec02b42f72adefbed3977591d6d8093a94
SHA256e3305011fb597bb09bc8144561700023e7b424b2f6fa142a38fae1ecd07e9d31
SHA512122ce4f5f6ef180b8f35ffd7ef62c77605c51f16075bc74023983eeae1bc332507dc8b8e7b0d33a33b8e305afc064f1cb554e58cc5383e351c4cb12103d3d631
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD537a9f6b2ad248102015ea51fccd4537c
SHA1af8581ed41bcbcb592f43b232c4ccd059f54e429
SHA256348c3a6b37e6420849947811590195ffef46f970ceaeac8638faf4e3857cb6cd
SHA512f8db3160552cffd6150eed3eeb9b3c6b23e05cba870677e3c5f78809998774d588debeaed6bb78f636243dc0df866f6fe482b104a7af83a15413cd42276e569a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\225c9c65-7aa0-46a0-b659-6b3b56158ba0
Filesize26KB
MD5a1f8b016f7f27842cab3311a15d77783
SHA1c531db531ba5b393a0b5cf858866a619b170497c
SHA256d964ead94d2c22a554390bd8cad7f13757362afda15e0c20635849465b23ee5f
SHA51292f08a6ff7c29a3d35d9ec317a58c3bb9ed01f0db9f1583f23936c6f71ef9b7179b8ce28a10844f3dd017d5e316ed5c83b3b8d11fd8ec339ff8e8f8c0dc50e17
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\c98b2100-4a14-479e-b33c-36317121ad98
Filesize982B
MD5cc6b922abee2d089ce7e71adf8258a27
SHA123d18162eb791aecccd03471ab6067b9907e8d5b
SHA256a43bce6452a8e66145480dcaa0052427807791ef78ada9f50757ed3409bf47db
SHA5122a9a6e1d0a8f3107e9b1e66bc968d47cb366114aea325d8222225ac30818318cdf1b473e765917288d2b9874959567a0518e9a54d1bdda3eb53f71be47d12de9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\dda55387-e96f-47a5-a3f7-b1bca7a0ab7b
Filesize671B
MD56f849c6172c71d61f9fb9b6bead52c4d
SHA1e607252adcbe7ceff68205966ddf04286a9bd13f
SHA2569e041ec8542752f1218816f6de51ecfe73ee75bbcd52e62e5b8ef404a84ac346
SHA512fd0aa93fbd6741ca6f3e5672a7f319043dc81dad1cc73f2ae16d85fa957dd7a57b6b3dabe9d66ca8f992afbbc8cdc9faf39b3eaa622c76c1196e0af094c32781
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD58186c0f765844c916700a668155168f7
SHA17c776dbcde78ae08d78ff14d1914d8b7965f3972
SHA25605a37019f9e5c103ead3779237004d586da32e9868ecd7aac1fc2c8c4b10bf72
SHA51232d27e966e91d537d216d11ea0121ceadfb82827cbf7a61cf31027e14df8916eab692f28e7d5b4078ecfc07b6d4e06c13b1403e2882a1abc931284291bde8e3b
-
Filesize
12KB
MD54e31fbdfbc02f370f8b3dca3821c9eeb
SHA18584e37c251271606e7f4332d5de70d8c62ae739
SHA256ae41e7ce950a2bb2d0f5ae2dc0ac49b7f8604445ee1fa18dafb4eaac18577f53
SHA5129f77066a3e09cfe3cd72a7f6177e1a83e6ba53166f81845b87f8288b5852e7c176665feb5b2eeb9374cf0ca628700c47a33298e91a5e3936e4feb08561bf220e
-
Filesize
15KB
MD5b0dfbd308a48afd03a4b1673f93c9285
SHA1b3aa045fa8fd73db3fd4d43a97a34c4b39f4313a
SHA25621fcd17eb36e858f57dea1825e4be23517d75c9e766af0e7cdfc2d700586635a
SHA5125e3c6985806194abeac35a3fe8136fca3772c1c642cf7bca0be8742400d3927f8a5bb797e71bcaeb915f741881e4308ab901cb1cc41f75f7c6cc1598611c3a0b
-
Filesize
11KB
MD5767f09c4c25f3b14d40b385853a596ad
SHA175cecc764a8e3ca82432105073c7526a4ca9dd1c
SHA2567553d36ee18ac2781eb02e379963efd1514b34c16a3b5f118af4e2ca6bb54931
SHA51230370051ce824de43cc39d5651f77f44d153861ffee1e81de2da07045bc348c67a3ac15a29ff18262112f117490463b0e5cabd3f891534b5715791c25714bbd0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\security_state\data.safe.bin
Filesize2.9MB
MD51ce77bd202efcc1f225bdefde0b98ffe
SHA11c0dfc0f8bf449dc6fde3713738e2f627895d44a
SHA256579d0e8fc0e2698ab5553e99019f3e29c3e2f8f13a69fbfe03575618b40a89d4
SHA512cf7f68429e05fd162fe2e178c5e152d3f36ee99e3de6e1299919aabc481f0bd49ba9b036fec3c1cfd96c629caa380be112079d821f0bbd5ffe9e5e47270b832d