Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-12-2024 11:09
Static task
static1
Behavioral task
behavioral1
Sample
d094215eeb77cdc9ba248eed4d4c1fdc45fde6c1877ab288389d8b1858428e19N.exe
Resource
win10v2004-20241007-en
General
-
Target
d094215eeb77cdc9ba248eed4d4c1fdc45fde6c1877ab288389d8b1858428e19N.exe
-
Size
3.6MB
-
MD5
5b84afab465cc69d595f6b674ca69590
-
SHA1
768664285a83762eb3da335daf2eb13a19d01829
-
SHA256
d094215eeb77cdc9ba248eed4d4c1fdc45fde6c1877ab288389d8b1858428e19
-
SHA512
87a5fe1f70018900f517fc786c94b47b1959f84cdf7a38229864a5e7859383c54c739d05b3c5b5fefa924518b9f41e4073a96ea5f00ed533211c9983da98816e
-
SSDEEP
98304:CMagf7NMy0lA64hbz4uXjt2YsuvtjRyEY9X:pxf7NJX64p8dYsuFjRP
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
https://drive-connect.cyou/api
https://atten-supporse.biz/api
https://sordid-snaked.cyou/api
https://awake-weaves.cyou/api
https://wrathful-jammy.cyou/api
https://debonairnukk.xyz/api
https://diffuculttan.xyz/api
https://effecterectz.xyz/api
https://deafeninggeh.biz/api
https://immureprech.biz/api
https://shineugler.biz/api
https://tacitglibbr.biz/api
Extracted
cryptbot
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://atten-supporse.biz/api
https://shineugler.biz/api
https://tacitglibbr.biz/api
Signatures
-
Amadey family
-
Cryptbot family
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" IGUAWSAQOH9QWUSOE7BSU1SJ8GEG.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 390905a8ab.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 390905a8ab.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 390905a8ab.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 390905a8ab.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" IGUAWSAQOH9QWUSOE7BSU1SJ8GEG.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" IGUAWSAQOH9QWUSOE7BSU1SJ8GEG.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" IGUAWSAQOH9QWUSOE7BSU1SJ8GEG.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection IGUAWSAQOH9QWUSOE7BSU1SJ8GEG.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" IGUAWSAQOH9QWUSOE7BSU1SJ8GEG.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 390905a8ab.exe -
Process spawned unexpected child process 6 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5100 3496 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1048 3496 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3096 3496 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5892 3496 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5348 3496 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1200 3496 schtasks.exe 85 -
Stealc family
-
Enumerates VirtualBox registry keys 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF c7a0adac20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF a2dc7f04c9.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 13 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1W45c9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a2dc7f04c9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c7a0adac20.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2w1248.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4af7e3c91d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d93969f713.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c13303f42c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ IGUAWSAQOH9QWUSOE7BSU1SJ8GEG.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ A4MI037C6W4482GPG.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 390905a8ab.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1820 powershell.exe 5380 powershell.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 26 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c7a0adac20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d93969f713.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c13303f42c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion A4MI037C6W4482GPG.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1W45c9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2w1248.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4af7e3c91d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c7a0adac20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d93969f713.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1W45c9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion IGUAWSAQOH9QWUSOE7BSU1SJ8GEG.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 390905a8ab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a2dc7f04c9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4af7e3c91d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c13303f42c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion IGUAWSAQOH9QWUSOE7BSU1SJ8GEG.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion A4MI037C6W4482GPG.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 390905a8ab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2w1248.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a2dc7f04c9.exe -
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation BrokerhostNet.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 1W45c9.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 56708d8d42.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation muNJF0r.exe -
Executes dropped EXE 21 IoCs
pid Process 4740 1W45c9.exe 2496 skotes.exe 4428 2w1248.exe 3760 QCVn8Vv.exe 4912 3de5940ea5.exe 1220 3de5940ea5.exe 2820 skotes.exe 5028 a2dc7f04c9.exe 5364 56708d8d42.exe 5868 4af7e3c91d.exe 3140 c7a0adac20.exe 4336 muNJF0r.exe 5820 d93969f713.exe 1220 c13303f42c.exe 5872 edac6f4e9f.exe 6004 IGUAWSAQOH9QWUSOE7BSU1SJ8GEG.exe 5500 A4MI037C6W4482GPG.exe 3516 390905a8ab.exe 1176 BrokerhostNet.exe 6448 BrokerhostNet.exe 1992 skotes.exe -
Identifies Wine through registry keys 2 TTPs 13 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine a2dc7f04c9.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 4af7e3c91d.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine c13303f42c.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine IGUAWSAQOH9QWUSOE7BSU1SJ8GEG.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 390905a8ab.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 1W45c9.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 2w1248.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine c7a0adac20.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine d93969f713.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine A4MI037C6W4482GPG.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features IGUAWSAQOH9QWUSOE7BSU1SJ8GEG.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" IGUAWSAQOH9QWUSOE7BSU1SJ8GEG.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 390905a8ab.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\c13303f42c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1016074001\\c13303f42c.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\edac6f4e9f.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1016075001\\edac6f4e9f.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\390905a8ab.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1016076001\\390905a8ab.exe" skotes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d094215eeb77cdc9ba248eed4d4c1fdc45fde6c1877ab288389d8b1858428e19N.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\d93969f713.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1016073001\\d93969f713.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0007000000023d46-426.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 14 IoCs
pid Process 4740 1W45c9.exe 2496 skotes.exe 4428 2w1248.exe 4428 2w1248.exe 2820 skotes.exe 5028 a2dc7f04c9.exe 5868 4af7e3c91d.exe 3140 c7a0adac20.exe 5820 d93969f713.exe 1220 c13303f42c.exe 6004 IGUAWSAQOH9QWUSOE7BSU1SJ8GEG.exe 5500 A4MI037C6W4482GPG.exe 3516 390905a8ab.exe 1992 skotes.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4912 set thread context of 1220 4912 3de5940ea5.exe 93 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1W45c9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5816 5364 WerFault.exe 116 -
System Location Discovery: System Language Discovery 1 TTPs 28 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2w1248.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d094215eeb77cdc9ba248eed4d4c1fdc45fde6c1877ab288389d8b1858428e19N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d93969f713.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a2dc7f04c9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 390905a8ab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage edac6f4e9f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1W45c9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language edac6f4e9f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A4MI037C6W4482GPG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3de5940ea5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7a0adac20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language muNJF0r.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IGUAWSAQOH9QWUSOE7BSU1SJ8GEG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language edac6f4e9f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c13303f42c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3de5940ea5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 56708d8d42.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4af7e3c91d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 56708d8d42.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 56708d8d42.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 5756 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Kills process with taskkill 5 IoCs
pid Process 3556 taskkill.exe 3632 taskkill.exe 3988 taskkill.exe 5768 taskkill.exe 3776 taskkill.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings muNJF0r.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings BrokerhostNet.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 6 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1200 schtasks.exe 5100 schtasks.exe 1048 schtasks.exe 3096 schtasks.exe 5892 schtasks.exe 5348 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4740 1W45c9.exe 4740 1W45c9.exe 2496 skotes.exe 2496 skotes.exe 4428 2w1248.exe 4428 2w1248.exe 4428 2w1248.exe 4428 2w1248.exe 4428 2w1248.exe 4428 2w1248.exe 4428 2w1248.exe 4428 2w1248.exe 4292 msedge.exe 4292 msedge.exe 4448 msedge.exe 4448 msedge.exe 2820 skotes.exe 2820 skotes.exe 5028 a2dc7f04c9.exe 5028 a2dc7f04c9.exe 5028 a2dc7f04c9.exe 5028 a2dc7f04c9.exe 5028 a2dc7f04c9.exe 5028 a2dc7f04c9.exe 5028 a2dc7f04c9.exe 5028 a2dc7f04c9.exe 5028 a2dc7f04c9.exe 5028 a2dc7f04c9.exe 2500 identity_helper.exe 2500 identity_helper.exe 5364 56708d8d42.exe 5364 56708d8d42.exe 5868 4af7e3c91d.exe 5868 4af7e3c91d.exe 5868 4af7e3c91d.exe 5868 4af7e3c91d.exe 5868 4af7e3c91d.exe 5868 4af7e3c91d.exe 3140 c7a0adac20.exe 3140 c7a0adac20.exe 3140 c7a0adac20.exe 3140 c7a0adac20.exe 3140 c7a0adac20.exe 3140 c7a0adac20.exe 3140 c7a0adac20.exe 3140 c7a0adac20.exe 3140 c7a0adac20.exe 3140 c7a0adac20.exe 5820 d93969f713.exe 5820 d93969f713.exe 1220 c13303f42c.exe 1220 c13303f42c.exe 5820 d93969f713.exe 5820 d93969f713.exe 5820 d93969f713.exe 5820 d93969f713.exe 6004 IGUAWSAQOH9QWUSOE7BSU1SJ8GEG.exe 6004 IGUAWSAQOH9QWUSOE7BSU1SJ8GEG.exe 5500 A4MI037C6W4482GPG.exe 5500 A4MI037C6W4482GPG.exe 6004 IGUAWSAQOH9QWUSOE7BSU1SJ8GEG.exe 6004 IGUAWSAQOH9QWUSOE7BSU1SJ8GEG.exe 6004 IGUAWSAQOH9QWUSOE7BSU1SJ8GEG.exe 5872 edac6f4e9f.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeDebugPrivilege 5768 taskkill.exe Token: SeDebugPrivilege 6004 IGUAWSAQOH9QWUSOE7BSU1SJ8GEG.exe Token: SeDebugPrivilege 3776 taskkill.exe Token: SeDebugPrivilege 3556 taskkill.exe Token: SeDebugPrivilege 3632 taskkill.exe Token: SeDebugPrivilege 3988 taskkill.exe Token: SeDebugPrivilege 5476 firefox.exe Token: SeDebugPrivilege 5476 firefox.exe Token: SeDebugPrivilege 3516 390905a8ab.exe Token: SeDebugPrivilege 1176 BrokerhostNet.exe Token: SeDebugPrivilege 1820 powershell.exe Token: SeDebugPrivilege 5380 powershell.exe Token: SeDebugPrivilege 6448 BrokerhostNet.exe -
Suspicious use of FindShellTrayWindow 59 IoCs
pid Process 4740 1W45c9.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 5872 edac6f4e9f.exe 5872 edac6f4e9f.exe 5872 edac6f4e9f.exe 5872 edac6f4e9f.exe 5872 edac6f4e9f.exe 5872 edac6f4e9f.exe 5872 edac6f4e9f.exe 5872 edac6f4e9f.exe 5476 firefox.exe 5476 firefox.exe 5476 firefox.exe 5476 firefox.exe 5872 edac6f4e9f.exe 5476 firefox.exe 5476 firefox.exe 5476 firefox.exe 5476 firefox.exe 5476 firefox.exe 5476 firefox.exe 5476 firefox.exe 5476 firefox.exe 5476 firefox.exe 5476 firefox.exe 5476 firefox.exe 5476 firefox.exe 5476 firefox.exe 5476 firefox.exe 5476 firefox.exe 5476 firefox.exe 5476 firefox.exe 5872 edac6f4e9f.exe 5872 edac6f4e9f.exe 5872 edac6f4e9f.exe -
Suspicious use of SendNotifyMessage 56 IoCs
pid Process 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 5872 edac6f4e9f.exe 5872 edac6f4e9f.exe 5872 edac6f4e9f.exe 5872 edac6f4e9f.exe 5872 edac6f4e9f.exe 5872 edac6f4e9f.exe 5872 edac6f4e9f.exe 5872 edac6f4e9f.exe 5476 firefox.exe 5476 firefox.exe 5476 firefox.exe 5476 firefox.exe 5872 edac6f4e9f.exe 5476 firefox.exe 5476 firefox.exe 5476 firefox.exe 5476 firefox.exe 5476 firefox.exe 5476 firefox.exe 5476 firefox.exe 5476 firefox.exe 5476 firefox.exe 5476 firefox.exe 5476 firefox.exe 5476 firefox.exe 5476 firefox.exe 5476 firefox.exe 5476 firefox.exe 5476 firefox.exe 5872 edac6f4e9f.exe 5872 edac6f4e9f.exe 5872 edac6f4e9f.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5476 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1612 wrote to memory of 4740 1612 d094215eeb77cdc9ba248eed4d4c1fdc45fde6c1877ab288389d8b1858428e19N.exe 82 PID 1612 wrote to memory of 4740 1612 d094215eeb77cdc9ba248eed4d4c1fdc45fde6c1877ab288389d8b1858428e19N.exe 82 PID 1612 wrote to memory of 4740 1612 d094215eeb77cdc9ba248eed4d4c1fdc45fde6c1877ab288389d8b1858428e19N.exe 82 PID 4740 wrote to memory of 2496 4740 1W45c9.exe 83 PID 4740 wrote to memory of 2496 4740 1W45c9.exe 83 PID 4740 wrote to memory of 2496 4740 1W45c9.exe 83 PID 1612 wrote to memory of 4428 1612 d094215eeb77cdc9ba248eed4d4c1fdc45fde6c1877ab288389d8b1858428e19N.exe 84 PID 1612 wrote to memory of 4428 1612 d094215eeb77cdc9ba248eed4d4c1fdc45fde6c1877ab288389d8b1858428e19N.exe 84 PID 1612 wrote to memory of 4428 1612 d094215eeb77cdc9ba248eed4d4c1fdc45fde6c1877ab288389d8b1858428e19N.exe 84 PID 2496 wrote to memory of 3760 2496 skotes.exe 89 PID 2496 wrote to memory of 3760 2496 skotes.exe 89 PID 2496 wrote to memory of 4912 2496 skotes.exe 91 PID 2496 wrote to memory of 4912 2496 skotes.exe 91 PID 2496 wrote to memory of 4912 2496 skotes.exe 91 PID 4912 wrote to memory of 1220 4912 3de5940ea5.exe 93 PID 4912 wrote to memory of 1220 4912 3de5940ea5.exe 93 PID 4912 wrote to memory of 1220 4912 3de5940ea5.exe 93 PID 4912 wrote to memory of 1220 4912 3de5940ea5.exe 93 PID 4912 wrote to memory of 1220 4912 3de5940ea5.exe 93 PID 4912 wrote to memory of 1220 4912 3de5940ea5.exe 93 PID 4912 wrote to memory of 1220 4912 3de5940ea5.exe 93 PID 4912 wrote to memory of 1220 4912 3de5940ea5.exe 93 PID 4912 wrote to memory of 1220 4912 3de5940ea5.exe 93 PID 4912 wrote to memory of 1220 4912 3de5940ea5.exe 93 PID 4428 wrote to memory of 4448 4428 2w1248.exe 96 PID 4428 wrote to memory of 4448 4428 2w1248.exe 96 PID 4448 wrote to memory of 1912 4448 msedge.exe 97 PID 4448 wrote to memory of 1912 4448 msedge.exe 97 PID 4448 wrote to memory of 432 4448 msedge.exe 98 PID 4448 wrote to memory of 432 4448 msedge.exe 98 PID 4448 wrote to memory of 432 4448 msedge.exe 98 PID 4448 wrote to memory of 432 4448 msedge.exe 98 PID 4448 wrote to memory of 432 4448 msedge.exe 98 PID 4448 wrote to memory of 432 4448 msedge.exe 98 PID 4448 wrote to memory of 432 4448 msedge.exe 98 PID 4448 wrote to memory of 432 4448 msedge.exe 98 PID 4448 wrote to memory of 432 4448 msedge.exe 98 PID 4448 wrote to memory of 432 4448 msedge.exe 98 PID 4448 wrote to memory of 432 4448 msedge.exe 98 PID 4448 wrote to memory of 432 4448 msedge.exe 98 PID 4448 wrote to memory of 432 4448 msedge.exe 98 PID 4448 wrote to memory of 432 4448 msedge.exe 98 PID 4448 wrote to memory of 432 4448 msedge.exe 98 PID 4448 wrote to memory of 432 4448 msedge.exe 98 PID 4448 wrote to memory of 432 4448 msedge.exe 98 PID 4448 wrote to memory of 432 4448 msedge.exe 98 PID 4448 wrote to memory of 432 4448 msedge.exe 98 PID 4448 wrote to memory of 432 4448 msedge.exe 98 PID 4448 wrote to memory of 432 4448 msedge.exe 98 PID 4448 wrote to memory of 432 4448 msedge.exe 98 PID 4448 wrote to memory of 432 4448 msedge.exe 98 PID 4448 wrote to memory of 432 4448 msedge.exe 98 PID 4448 wrote to memory of 432 4448 msedge.exe 98 PID 4448 wrote to memory of 432 4448 msedge.exe 98 PID 4448 wrote to memory of 432 4448 msedge.exe 98 PID 4448 wrote to memory of 432 4448 msedge.exe 98 PID 4448 wrote to memory of 432 4448 msedge.exe 98 PID 4448 wrote to memory of 432 4448 msedge.exe 98 PID 4448 wrote to memory of 432 4448 msedge.exe 98 PID 4448 wrote to memory of 432 4448 msedge.exe 98 PID 4448 wrote to memory of 432 4448 msedge.exe 98 PID 4448 wrote to memory of 432 4448 msedge.exe 98 PID 4448 wrote to memory of 432 4448 msedge.exe 98 PID 4448 wrote to memory of 432 4448 msedge.exe 98 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\d094215eeb77cdc9ba248eed4d4c1fdc45fde6c1877ab288389d8b1858428e19N.exe"C:\Users\Admin\AppData\Local\Temp\d094215eeb77cdc9ba248eed4d4c1fdc45fde6c1877ab288389d8b1858428e19N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1W45c9.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1W45c9.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\1016061001\QCVn8Vv.exe"C:\Users\Admin\AppData\Local\Temp\1016061001\QCVn8Vv.exe"4⤵
- Executes dropped EXE
PID:3760
-
-
C:\Users\Admin\AppData\Local\Temp\1016067001\3de5940ea5.exe"C:\Users\Admin\AppData\Local\Temp\1016067001\3de5940ea5.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\1016067001\3de5940ea5.exe"C:\Users\Admin\AppData\Local\Temp\1016067001\3de5940ea5.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1220
-
-
-
C:\Users\Admin\AppData\Local\Temp\1016068001\a2dc7f04c9.exe"C:\Users\Admin\AppData\Local\Temp\1016068001\a2dc7f04c9.exe"4⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5028
-
-
C:\Users\Admin\AppData\Local\Temp\1016069001\56708d8d42.exe"C:\Users\Admin\AppData\Local\Temp\1016069001\56708d8d42.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:5364 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\1016069001\56708d8d42.exe" & rd /s /q "C:\ProgramData\AS268YUKFUSR" & exit5⤵
- System Location Discovery: System Language Discovery
PID:5624 -
C:\Windows\SysWOW64\timeout.exetimeout /t 106⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:5756
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5364 -s 20765⤵
- Program crash
PID:5816
-
-
-
C:\Users\Admin\AppData\Local\Temp\1016070001\4af7e3c91d.exe"C:\Users\Admin\AppData\Local\Temp\1016070001\4af7e3c91d.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5868
-
-
C:\Users\Admin\AppData\Local\Temp\1016071001\c7a0adac20.exe"C:\Users\Admin\AppData\Local\Temp\1016071001\c7a0adac20.exe"4⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3140
-
-
C:\Users\Admin\AppData\Local\Temp\1016072001\muNJF0r.exe"C:\Users\Admin\AppData\Local\Temp\1016072001\muNJF0r.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4336 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Bridgecontainerserver\VBxKsR3W5qREBSxxvIt5VpzoFdFFANtbsRk6NDfKSHeOxN7UsJds5Ck.vbe"5⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:3848 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Bridgecontainerserver\SlMo.bat" "6⤵
- System Location Discovery: System Language Discovery
PID:4612 -
C:\Bridgecontainerserver\BrokerhostNet.exe"C:\Bridgecontainerserver/BrokerhostNet.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1176 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\dllhost.exe'8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:5380
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Bridgecontainerserver\BrokerhostNet.exe'8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1820
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\4OtRb8vRst.bat"8⤵PID:6212
-
C:\Windows\system32\chcp.comchcp 650019⤵PID:6300
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:29⤵PID:6336
-
-
C:\Bridgecontainerserver\BrokerhostNet.exe"C:\Bridgecontainerserver\BrokerhostNet.exe"9⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:6448
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1016073001\d93969f713.exe"C:\Users\Admin\AppData\Local\Temp\1016073001\d93969f713.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5820 -
C:\Users\Admin\AppData\Local\Temp\IGUAWSAQOH9QWUSOE7BSU1SJ8GEG.exe"C:\Users\Admin\AppData\Local\Temp\IGUAWSAQOH9QWUSOE7BSU1SJ8GEG.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6004
-
-
C:\Users\Admin\AppData\Local\Temp\A4MI037C6W4482GPG.exe"C:\Users\Admin\AppData\Local\Temp\A4MI037C6W4482GPG.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5500
-
-
-
C:\Users\Admin\AppData\Local\Temp\1016074001\c13303f42c.exe"C:\Users\Admin\AppData\Local\Temp\1016074001\c13303f42c.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1220
-
-
C:\Users\Admin\AppData\Local\Temp\1016075001\edac6f4e9f.exe"C:\Users\Admin\AppData\Local\Temp\1016075001\edac6f4e9f.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5872 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5768
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3776
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3556
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3632
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3988
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking5⤵PID:1612
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking6⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:5476 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2020 -parentBuildID 20240401114208 -prefsHandle 1956 -prefMapHandle 1948 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {55d9fdc4-5711-4cb2-9115-ba6dcd1862f0} 5476 "\\.\pipe\gecko-crash-server-pipe.5476" gpu7⤵PID:2996
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2460 -parentBuildID 20240401114208 -prefsHandle 2452 -prefMapHandle 2440 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8dd6a029-cec9-4be5-90a2-c6003f6a20cc} 5476 "\\.\pipe\gecko-crash-server-pipe.5476" socket7⤵PID:5384
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3340 -childID 1 -isForBrowser -prefsHandle 1616 -prefMapHandle 3128 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f3fe970b-dec2-44b9-969a-776133fe2371} 5476 "\\.\pipe\gecko-crash-server-pipe.5476" tab7⤵PID:2860
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4120 -childID 2 -isForBrowser -prefsHandle 4112 -prefMapHandle 4108 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {16b0afa3-1cc1-4b71-845b-bb2ab6eb28bf} 5476 "\\.\pipe\gecko-crash-server-pipe.5476" tab7⤵PID:5136
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4836 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4868 -prefMapHandle 4864 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3e3966e4-8ed4-44f5-a396-4dda780605dd} 5476 "\\.\pipe\gecko-crash-server-pipe.5476" utility7⤵
- Checks processor information in registry
PID:7164
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3912 -childID 3 -isForBrowser -prefsHandle 5260 -prefMapHandle 5256 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {368995d1-7abd-450c-8841-4d129b963887} 5476 "\\.\pipe\gecko-crash-server-pipe.5476" tab7⤵PID:7888
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5304 -childID 4 -isForBrowser -prefsHandle 5396 -prefMapHandle 5236 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cb6639a5-6264-43c7-a9e3-1638a6c6ecaf} 5476 "\\.\pipe\gecko-crash-server-pipe.5476" tab7⤵PID:7928
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5588 -childID 5 -isForBrowser -prefsHandle 5596 -prefMapHandle 5600 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {019a5b97-16e6-4986-a37d-5b8aa4a869cc} 5476 "\\.\pipe\gecko-crash-server-pipe.5476" tab7⤵PID:7940
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1016076001\390905a8ab.exe"C:\Users\Admin\AppData\Local\Temp\1016076001\390905a8ab.exe"4⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3516
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2w1248.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2w1248.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=2w1248.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.03⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7ffd7f7946f8,0x7ffd7f794708,0x7ffd7f7947184⤵PID:1912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,10672966444939735646,3087790615218673622,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:24⤵PID:432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,10672966444939735646,3087790615218673622,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,10672966444939735646,3087790615218673622,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2748 /prefetch:84⤵PID:1960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,10672966444939735646,3087790615218673622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:14⤵PID:1768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,10672966444939735646,3087790615218673622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:14⤵PID:384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,10672966444939735646,3087790615218673622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4976 /prefetch:14⤵PID:3524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,10672966444939735646,3087790615218673622,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5348 /prefetch:84⤵PID:860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,10672966444939735646,3087790615218673622,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5348 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:2500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,10672966444939735646,3087790615218673622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3724 /prefetch:14⤵PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,10672966444939735646,3087790615218673622,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3772 /prefetch:14⤵PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,10672966444939735646,3087790615218673622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5468 /prefetch:14⤵PID:5436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,10672966444939735646,3087790615218673622,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5556 /prefetch:14⤵PID:5444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,10672966444939735646,3087790615218673622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4820 /prefetch:14⤵PID:5988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,10672966444939735646,3087790615218673622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2416 /prefetch:14⤵PID:5132
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=2w1248.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.03⤵PID:5908
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x168,0x16c,0x170,0x144,0x174,0x7ffd7f7946f8,0x7ffd7f794708,0x7ffd7f7947184⤵PID:5932
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4536
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1824
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 5364 -ip 53641⤵PID:5724
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 5 /tr "'C:\Users\Admin\AppData\Local\Temp\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5100
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1048
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 5 /tr "'C:\Users\Admin\AppData\Local\Temp\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3096
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "BrokerhostNetB" /sc MINUTE /mo 6 /tr "'C:\Bridgecontainerserver\BrokerhostNet.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5892
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "BrokerhostNet" /sc ONLOGON /tr "'C:\Bridgecontainerserver\BrokerhostNet.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5348
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "BrokerhostNetB" /sc MINUTE /mo 11 /tr "'C:\Bridgecontainerserver\BrokerhostNet.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1200
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1992
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
5Credentials In Files
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD50f91548ca49c64d6a8cd3846854f484c
SHA1033c309b683020221ae189c4236a70c0d3ddd568
SHA256a7883947a5f3c0d74f3eac6c2a6da45555298d769f5e3137e10a3ece14e83dfd
SHA512e207b5545ceed034ec22f13e1a36f13656721b2c9cab97f6ec7ba8195f32ddc1673e1334902b2d4fc0ce393baf7f806bedf4a03a26a8ffe79ad17a87cf9a90a2
-
Filesize
89B
MD520c75fef4553c17d36635750cfb57049
SHA18489a5998acaa63326bc1a665c38eb71c5d1f426
SHA2560dcef4794868f563d515bbeee69e35dde750411ee9dcaafdef597806c89cabd0
SHA5122819f6585bd3ee7e9f1703c259b97b21dbacde276186a489acfea0c36f377f751845b50ed00a70e029e95f588193cf69f77aeaf2785e67888378b9f2e95ee92a
-
Filesize
204B
MD5e52eec5fe59f0e73555c7d43c0035f62
SHA1e6fcc87b7d260c2fcfff89e28e7d45357357520e
SHA256b5712ce1aa870e16ed1464f1ecd627aed7020bb48c61252471cf9ec0b2d38d7f
SHA512325c467e6519fb72238c62abbb7b89d32016a71416d41f148a38e41853928fc9cc84ed6b096784af9b1ad23c3363316d6b4f3464959127dfee1794cc926d40a7
-
Filesize
1KB
MD5af6acd95d59de87c04642509c30e81c1
SHA1f9549ae93fdb0a5861a79a08f60aa81c4b32377b
SHA2567521ee2d065a78efcab55a194fbd78492f84b70595f139263875f4ea92b194d6
SHA51293ab99bcf588fde553de3240e0d2b0cbd4e4bc5ef5e99d53f45a267d7ff30103a80b5a7aa1c52d6eff1e070af0ec82d2c0b8aafb7099742aa16810edc1815c3a
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
152B
MD536988ca14952e1848e81a959880ea217
SHA1a0482ef725657760502c2d1a5abe0bb37aebaadb
SHA256d7e96088b37cec1bde202ae8ec2d2f3c3aafc368b6ebd91b3e2985846facf2e6
SHA512d04b2f5afec92eb3d9f9cdc148a3eddd1b615e0dfb270566a7969576f50881d1f8572bccb8b9fd7993724bdfe36fc7633a33381d43e0b96c4e9bbd53fc010173
-
Filesize
152B
MD5fab8d8d865e33fe195732aa7dcb91c30
SHA12637e832f38acc70af3e511f5eba80fbd7461f2c
SHA2561b034ffe38e534e2b7a21be7c1f207ff84a1d5f3893207d0b4bb1a509b4185ea
SHA51239a3d43ef7e28fea2cb247a5d09576a4904a43680db8c32139f22a03d80f6ede98708a2452f3f82232b868501340f79c0b3f810f597bcaf5267c3ccfb1704b43
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD56dcbb4c56ae4a4f3c00c094092ab6332
SHA1acae4e8d702a014458b1f65b97101051d1ff8fb9
SHA2565b9194b09b25785b16f030b5406d988793eb8c06bb63d8f37048686ea9abf099
SHA512af94c60a117950f5c038ad719645e1fee11b8244b25874865aabd2fde7b82e6c788e5fc7a0f10cb79b68bdb5f2dbbda3c8adc17d39d195c1b5654bb527920840
-
Filesize
20KB
MD5df377946f18faf2bb5223ecf66a0808b
SHA16a78a2eee249a86a19e6b08c8e7893fc63da4ae6
SHA2567485479e21e4b11ff00efa309377884c229871b88d6fc61dfd4e3cb9121ed40a
SHA51276879da89ff09ac61123426658d27bd81cc1c20a8fec760b87d2b197926d143d7003d57398427b9d452c0c92d2b453b412da099d28411aa0b1097b0b2fd53e00
-
Filesize
124KB
MD5987cb715f4d76d658e4ee2a70f4debf4
SHA195400765e69dc9794d3028aadabdf2313a3cfb69
SHA25690f9b47f43b01b32ebe3d096ab29119beaee1d9acda05887b73e6039053ffdbc
SHA512fe5f949af3fbcadb89675d78feb9c28b1f6a3383cfaa2caa4a2baf6b1c308ddcfe5664e7b6a1d4af30a1847c8c7dc0cab4ddd5e00c83ecc967300bc17cd5fc26
-
Filesize
124KB
MD59544dc93fdba5b6496248592385d37b1
SHA1d2705a3fb0b07f1a79317904f9f674e10ac8aaaa
SHA2567feb23dedfbf5f200d2d8c559b091f49fcd9d5bee23a9806bae98e293ce7b82c
SHA512a38be623b3741d7f656a2abe26ca36d93ed95e371dedd89556f126060302c704c62f058b08aa51f9939695e13769082f679420ed619818e1257e8a5eaa9f4eef
-
Filesize
5KB
MD55dd245561c3a8622e4e80057fa22ae51
SHA192102f266c75fbd633614a53889d789bedf6f9bc
SHA256ae2248e287f040458dc1228dbebf0322127fd4023660def2e1a30fc5bd7b2a72
SHA5127fd7a46eebef9fc12f314b15b2fa4687d83921dc2fa9af0c468292c4d762a06cbbdd84c8da7da3cfdde74cc146f8eb17b76af833bfdb9c1de5407b623e1dd7f9
-
Filesize
6KB
MD5524318eba1ddead230257c2a8bf197cc
SHA198622613fa85b59b8fc9e02ae6e0a99597cb5217
SHA2565a4a26313a746bf4c4fb835fb4a70a49e4221f5b0a509c8fe4a9eac6a2c4b455
SHA5122492721ced48ab1b796d55dccab9e71a006f07e223771bfed7fba418deab7fee2cedfb718ed3d7825e207ff150e63e21edf89c52a28a8857536187dcfe58390d
-
Filesize
6KB
MD57656469ac7400a543736be69588adaf9
SHA1d0ff165ebafef5eeedfecfbe6d8bc32d69dedb04
SHA256a84ce12aefbe652f5c241841927827a3a3758a188f001ed7bd56a9a1aee81d1e
SHA51202c7f335de9f9cee8669a5d7567e04b1cce1ffc15e590c80ab32d94984ef7599fdfe7ba3211ce6cf4cb975da1ea27322e85c3a52ff3fc7909f35408be3fe8b6a
-
Filesize
371B
MD504d0ef1dbb16c3d56fa73273eaf046f3
SHA19b88f76d899d7cfdadbce075054ce0a22db28564
SHA2561625b8e2dbaebd78a57884b0b8ec7369db256cb54fc1bf697d4878d76b612f14
SHA51260c4f518edcd4951b4ad94e370634c5124040c49e825ddbfcda7f6b3ae5537336545b9a8e26fb5bc638cbeef5c6db6a332ebd579003498f16176477458c11f8d
-
Filesize
371B
MD5c114c6887e3a2101612023e73a3b9f0e
SHA1c6f5610a35d2d7f81973a5311f020e1766835765
SHA2568a2cb9b5b479e4f9fb75e6b81500ac938c507353b843c90f756f3c394ad1f01c
SHA512580a2db038927712d9aba36fd4c8dff6d95a9a3e546feac20e0343605ec034bd00bd8c7e450f869e0686060893b63e5f3222e610113ce41cbfbd7feb807e6860
-
Filesize
371B
MD57187638f1c98821030dac81350a76de4
SHA13f768fbb4d932626e9534ca475ee49748472a3d6
SHA2569d209db91fa17050f105990f6a88b27224743d1fff41c90d07835ba2d1efa368
SHA512edb415e0bf71507680308d05c5cae1d7e10e1c4e935f97964762e0912ae1eae229d9465328061ab7b470f0b5cafde99da7c2f9ca69f3cabc24292fe99e26a9d4
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11B
MD5838a7b32aefb618130392bc7d006aa2e
SHA15159e0f18c9e68f0e75e2239875aa994847b8290
SHA256ac3dd2221d90b09b795f1f72e72e4860342a4508fe336c4b822476eb25a55eaa
SHA5129e350f0565cc726f66146838f9cebaaa38dd01892ffab9a45fe4f72e5be5459c0442e99107293a7c6f2412c71f668242c5e5a502124bc57cbf3b6ad8940cb3e9
-
Filesize
10KB
MD5c2867c54621ed6f8b3cb5d6bae4d7e6c
SHA18bdc5144a6f38cf8e5d0b147884a3ed850f025c0
SHA2567b05611fea8a09f0d3490c34664ffcc41240a1969e8e3030c53568617928193b
SHA512807f8f20bff2ac017f417165c53a61fc0af0588f6ec73f6031bf4810dfb7e8e21fc58a5c0afce5b23e3054005769a6e2fcba69759a4fac493090789bb2bc7113
-
Filesize
10KB
MD5147b36c127682ad0d0f64260fa3a2b9f
SHA1a014ef230656ea61e9417e57ae55d7269ec75e53
SHA256d6dfdceb65c43d4219390ddfe3d6bfbcbc8cfb3cade939cf88ba7d78eb590a35
SHA512e105276047ddc6c65dd07c41eb4a958a3efca6c02749245bde1afab0b462cd452fa303719c90c59d70cc07680852c72d6d32042c8e80930bbbc7c7428349634b
-
Filesize
944B
MD577d622bb1a5b250869a3238b9bc1402b
SHA1d47f4003c2554b9dfc4c16f22460b331886b191b
SHA256f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb
SHA512d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\activity-stream.discovery_stream.json
Filesize19KB
MD5fc35cd0c9d2c4d466fbb731c006ad566
SHA18e6027bf2efc77857b26d12d71261b2e5ffba37c
SHA2560f1b49098abc10f856d51091398cceffe94de3a962ec0a967567067b9b255aa1
SHA512036f02df6b372dc376169ef16735747d1c2deca75823a64108b964978c3faf5dcce7397192343e37dfe5e482b1c871fd03ec6334af32d1db36b936f78c0ae116
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD57bb05cc297ce7cb2e8e9a54a2c293189
SHA141f2ea1ee0121f8100c0a522af713a40a75958b4
SHA2568a66bb3882f19785878682abaad7cb1bd8814294a9146757c10cc283e199ffe7
SHA512131d9baf7996962be44b47babf023f7a861ca2442dd5b5a1cbd79ffd8135750f9964288a46bfbfb556194692193518babb8d46bfe0c1cfafb6a1fc98729858de
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
635KB
MD5817a479a52e13815268e175e11d26d6e
SHA197ddbc8fb6e7da2ddeaed3bd59632d1138fa94a5
SHA2565dc887feb501a22bc1694c5d76846765b7f4ffb25141f7c148b21dd552e48399
SHA512117285c5920c199080d75a858ba072f018c8a7fa40a5b9212b6cbea55eac591a0d7768e8f115bad80a9931deabedc7b853178baa8e07eaba4d34813f838f3fbe
-
Filesize
710KB
MD528e568616a7b792cac1726deb77d9039
SHA139890a418fb391b823ed5084533e2e24dff021e1
SHA2569597798f7789adc29fbe97707b1bd8ca913c4d5861b0ad4fdd6b913af7c7a8e2
SHA51285048799e6d2756f1d6af77f34e6a1f454c48f2f43042927845931b7ecff2e5de45f864627a3d4aa061252401225bbb6c2caa8532320ccbe401e97c9c79ac8e5
-
Filesize
4.3MB
MD5052a4ed490c350bac29e342970146793
SHA1b1ca7951818cce6a457206a76f2ac5d4f398c91a
SHA256d0fb76445b064c723ad7eabb0e21c9f3a7265813b9c7f5ba14f6e9185359fb74
SHA5124725951d0bb2b483472c4880c63e54d10e5512bcf2b82152e6129332861c7ba3e597b92765ad3bf350338a660b329a95f3a7ab47fd1b9acfe924c25c182e209b
-
Filesize
384KB
MD5dfd5f78a711fa92337010ecc028470b4
SHA11a389091178f2be8ce486cd860de16263f8e902e
SHA256da96f2eb74e60de791961ef3800c36a5e12202fe97ae5d2fcfc1fe404bc13c0d
SHA512a3673074919039a2dc854b0f91d1e1a69724056594e33559741f53594e0f6e61e3d99ec664d541b17f09ffdebc2de1b042eec19ca8477fac86359c703f8c9656
-
Filesize
1.7MB
MD56c1d0dabe1ec5e928f27b3223f25c26b
SHA1e25ab704a6e9b3e4c30a6c1f7043598a13856ad9
SHA25692228a0012605351cf08df9a2ad4b93fa552d7a75991f81fb80f1ae854a0e57d
SHA5123a3f7af4f6018fcbd8c6f2871270504731cf269134453c9a146351c3e4a5c89165ecccafb3655d8b39c1ff1ec68f06e1851c0abd66d47602e1f0f8e36d4acfe9
-
Filesize
4.2MB
MD52453b4be7a014499138f1029edcbf013
SHA113087911bc9b06066f076d842b1ce8ac4688ac0c
SHA2569cec95210688605c2d91081c1d9fbd75ca55b8f028f658d402aa1d288293983d
SHA512838ef33c48f833759ce6f552728db4bdb567864612005535e0ebe81f2e71b85f74891b0c340ab5b1980bd0b63d1eac916784687cb3af5a4fffd88c3789094224
-
Filesize
2.2MB
MD5b5a1474fcb8f7b9809d52546bd304af3
SHA18604fe586fa0d03adaa6608169a62c65c837de7d
SHA256dc83dbd12c5a432a6c168982e55d6c7be89dd0bc4b915e3e93e3a97c8af0ab0d
SHA51239931300c863c521957dd5d842c0c6e0d66d2b43663136375e21feb26181bd1c9d4494025e0e7a00b80b51405d1e67bfe825787e60c1b99998463b4e3a49a7ee
-
Filesize
1.8MB
MD5bfc8fbb265274e407ebb9b2be9b6630f
SHA10aee8ad1ee7bc01cb6994f8de0b714a2ad3a64c2
SHA2563c6116a035069356a08c478ec90a8be22a0ba2e8c749dd4d33f7cad2a3ee86ac
SHA512e3862fc31f091ba641d8262e0ce0fca53482ed4870a206b1763ae81e9a7ebe507634d531e0a955c7dbfa67f17c546ad5215dadc91fbbc787673575938b8777a0
-
Filesize
1.7MB
MD53d88e7578049e0a45e03b807c1b7cd89
SHA100a75aceb785c80e4149a988a316e9bacc02d31b
SHA2569c0604c59829da7407cb58b945b26683ab8f26fa57be4c3f3db74282a4541ef8
SHA51250dcabce9b204647f51b739061937270264393d923edd2acd10e0e611e4d3e134d262d5214007ece4fb120ec326884039a0be611582edef44eee7fc6c1db43d4
-
Filesize
950KB
MD589829b1ac3d2ce9139e6ff999e814807
SHA142c20cecad60e1829379c3355bf73d8644bb0285
SHA256744c65b2f855bef08872938e1976dde336fa4d774019db83203a666926b08312
SHA512c3218752579db4e173f1a902f75982a6771a1bea913753c791b60eec6f5d5dbd3fe7a1c57256b46adb345de5da32a57cbd23f23048331f35af52400b9e457a5c
-
Filesize
218B
MD5c84df43afb3aebcff82ad248bf592770
SHA1b55bb414254d86fa071bc008187f6c9788868d1a
SHA25674e9334e01db60217f3a1ea3eb1358d974dc527f2e646c2ca6d6269fffc2deb2
SHA512c26574c1a2e99075b5287b4f41490f9690f139d3704cf3659d5834a085a897b7d9f7652801194815a683e91e0ee2b4b28330bb6d6a1fef7cb47eb48febcfef1b
-
Filesize
2.7MB
MD5c2e4ac4dff0530f2a8aa9b0449107e14
SHA17841304452ecbcab6076f6c778336126f3865ca1
SHA256a96995d5c34d2496fd6883d1fcae68679b6a2ddf16b5a1d83c75f6436c627949
SHA512c5fcd12e066e3f2f072bcc2985933387c3206e3eb79046dd00c140a56527c4ae3d70608588c0befc4ad63b7ba08e7df21ff238a5f9811f4a2b3fb63f543789bd
-
Filesize
3.1MB
MD5a658cd199a62111902039098abed3ad7
SHA18423fc94bfaa86ea1a404e69b63db584043596a5
SHA256f8586cd83f4299b7ae9eb589436ca5bb758f23dfdd051e29a3d2e87ea541eb33
SHA5120c660f3334cdf2cff4526d4860ed958eeffa085838e8eb40cb824dd0a3ab3218009e3efcbf3814619d17dc6cb38fb6d7ba524272755f0666ac174116ac64b915
-
Filesize
1.8MB
MD5daa021fc8673d7dbfe2ea88553d59600
SHA15829cfd993b5041671c693dcb16ace19be53673d
SHA25600cf21363b47dd9cffb24d701a254d973ec103a3d741c3c6d0fce1f87da3d43b
SHA512927782c1983489683deca52f03f7b93519b64d64e183afa650d24bd0098fcb5f6790001a7728797ef161e12caae5ecaf6404fcd71c4554c319ba1294e5027b67
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin
Filesize10KB
MD52813314af67698dc4d55d57536a09511
SHA1c5e84c5597f0722ffc7528decac6c6faf7d9ca8e
SHA2567059ab252baa552f6fc9ab310f3fc91105dcb7189e0a49a1db036807a58880ee
SHA5127c5f65df5614e846d3719526b3a66a7e8327981d61e72e35c5817ef0274fc4e7a0164f9363fd27880faeb05e18114a03049067ad906f4d9e45e5af1e95767478
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin
Filesize6KB
MD5931ab2781279815963962de0df60a307
SHA18857b8ab03a637afaa5150d951f678c8478775b1
SHA256f5f7af5662c5f48472b8949b1c92505757c0d3bf1d42ec6e117fb5780de58360
SHA512ae21e00905fd6770ba09b66994fb9a63186691559ad88a86c4a9479e1893f51a348d28864410b1dc191e3d121a7b014e487fabfe7b4a5e7f1d8e95b61295f640
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.bin
Filesize23KB
MD5ecd5362915c05636a75289555bdc4d0a
SHA15d213a6339b71fbbda75fcdaebe241b185bc0de2
SHA256a9f735829643ff027a596f3c1c80c4a1625c487ecdef1d744b7cc9e30a68144c
SHA512ced8a9280c481b39b6e67996ec1ada11ed7abef126ce24d15c6243c7ecb4b394fcc9b8c96adc220c994a7ae2835de0742d9214c7bf030dc653c116499af97ef5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.bin
Filesize15KB
MD596d5553cdc29fc4ae321e7a251c97a53
SHA19eae07b1ac3830626c1cf113d0884015a1d94283
SHA256590fde3c9f288c18aa6c0c8e82f448bf41cb36e189a72a94a7f5c81fe011b21d
SHA512250b9e0d1f2c0280c953db9a2e4f0d53e65d24d57124ca5cbb5d9204639a83f60f670e429ef745633efee2d0752568fcb3b53e97a7d8f4caec01eb207e7a809d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.bin
Filesize6KB
MD5f8d6a7addbe5ec42a93877b3680e94dc
SHA1b3bc7e8d2363c4b4e539ab13bf298ea3b30166c2
SHA25618f3e87e05f037b9d7de0fc4dbc0898ea33a21911368b6a2e7fb07925276da5c
SHA5124e15f7d9c1ebfb6b72e8bc5f9c193df61d9e4b8303f43d1cdcae5e2ff4d42d446e466ed57f1a4b3651ee4a807b98fb76eac7fd167cf1441efaeec34c7f7273c4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.bin
Filesize6KB
MD55188e84ad158fa3dce9c5b2992d22f9a
SHA1862c7cce02a57d799c2703c697bb4b483d41c0d2
SHA2560f170d14f945eff92ec4d7a09f84b2d671e528dc88f5b6ec44dd1f7f51b51aa4
SHA51203200a2875b3736e561fecf3cfe3225583377d8e5cd87f0196c56afd756256d40f74f1702d2aa91f65ca13e9f26f4e8b00a25231b143649b41e3c85ff9b841a2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD59db04f3b5a7bf875493fd23238c8e1de
SHA1ede40df5e455ff3ea855e29ef16d20a7bed7da03
SHA2569179e25f2818e872f9a472462a28d15bbdd104b0987a8353aa54c5e0d806993e
SHA512a826bb86afb4a1c0aa67d1dc244410efbf7563afa62a5af4baf3be96588649236910f03ba09e0728539509fe3d004b32f537333f2c71fcc1e4ed4c721958a75d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD52c52322884e16ffe139af512c1e40fa6
SHA1df79f4cdf234574fd793917d8bdc326aed9fcbec
SHA25667328a3670ed2aec74b75e7ad6d26b09e7148cca4bc07294c26659c5bf83533f
SHA512bdfe3c9b59051f151b6b1ec69c84fd987e60ca09fd734162a442856f0a4c790b5756f7cb045bcae782537853ea796b1bcfd87cfbb11f96f53ea96f71d97d68ef
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD570daa40ce2e312ae0b3ccb34901abc64
SHA13b318318398fae07effe3b34c52999fae7c49243
SHA256b371db4cb5adbb052d8b3ccc9a58a202521eb4960c20279ef0dc256b34f690f0
SHA5129abd969b2096130ee11d7268f37532245a9af4976d13bc13fede69d6ea91ab02e0b178e033aeb8e5a76b3121f35f687f6793888a3f31e664c62d4a1aa965d981
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD54ec54fe5325803be97d1fed6fee4cedc
SHA17e9d7e62db87195dd59f69fcf30edefa98d652ee
SHA2564df1eb6ba8da5bf79ef824642994590a2aedaec4fede6b45103034ac5a27b56d
SHA5129770f13c7606fa61017469bddfb632a1dbc8136c8885f51d1e73c43d4b9ad63a2e7bcc4ab8ee7019f385bc4443996d03055e9a9c0fa935ba594bbbae7c30d8ea
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5b0cefccbbb2a8572b5347e0cbca465eb
SHA11b409b9526105773e82633cf8902fc4b31b1b6d5
SHA256b23f0ab1f361f1ec01f1ed84e22a2fbe11297131fc2e0372465d9b563c0182ae
SHA512b517500d27fd20db4a10a50b76df4a1c208686270aba243cf8e7d262390c8fc3f56861ec62a785152f5cd11ec6174f6ad7d35386464af9fe656e93da54e272e5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD529e42a2028cce11f155b2c95c0e164b8
SHA13eb29bb7fee8f28437225808acfc13550b8032af
SHA2568b336027f5416799c7302e420bc6944cee08f4e72a717828d23125f6d5cae545
SHA5120c972ef5477f07d04815cabb12f0e5ba928ab104f431c4e5386e4f12677b482055e27851f94e560bfb5e725a21baec4a4ff3c53507b8ba39755168b2f421d31b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\116905f3-cfe2-4994-a64a-5e4f8af80e2f
Filesize671B
MD5e6a44b41ff2b9fee843b16ecfc0c0aca
SHA197449576a69b24ef240f432943560d2105460d50
SHA256e15b247fe96e6ff4839dfe55b6312caf3d5af31902c2e7751c1178a751e3fc38
SHA512844d813e9c0c72b7cbe0bbe7bebb82c6a2e3dad8380a7546b487186c7bc10d1475d5c502b8adbec7834b73a2f08ed5e5e7180376ad35dad60f034b2aa9c4714d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\73e64719-951b-4a9d-88c9-c44ecb02e7ba
Filesize982B
MD5e1616a46aa7d6bc1c5c33b0ec75bf87c
SHA1c0c743e9080bd984050ad7f4d3cffadafd0431d4
SHA25633debbd3e0b485dc6ac4d31005c3c44f8c7fd2389d8206b4c7e1c7a5cb806264
SHA512d6ebaec2c4394daed5726da11beef3002a9d428a0501c9dd9fc43569f143b6efe9fa8eca23a74475f5aee3cb48bfb8f7124055a85e8f56a69dadc85403533549
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\9e8cd7ad-e934-4a30-84a2-b14a9d469f05
Filesize26KB
MD5270c55dbaae149d5adca713653b499d3
SHA1b8aa5f14b89b80981c3b33acf67debbb9808982a
SHA256b64bc333982e95d08b97e3e15881821fcb860dc27224b7d130ea02474a8398f9
SHA5127e9cf2c39bf99780b7096c1d92225f2dcb12d086e7494942a59542287640b242a75fa3e09db367ca07d17b88bc369f71e6c0b7d427e35b2c9ed7c226cdac49eb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD533b05e1799d6a3ed65e7e000c23af43b
SHA159896294e79745562001c11d3ef499ba0b325d27
SHA2565f7b0f3e233cb75b9059f7d4b2817fb81e68ddcd4f0fb6ca30dd8035a6057f8f
SHA512364c1ee6ae6294b17aa240c3eee66787246028e59b9f609d0d4020362cf8c7cdddcd6bd12c87ca5167ba1cbb85b85794771b892808b863dc5846985767f9132f
-
Filesize
12KB
MD551ceb85c7482cdbf111f609ec3f8c81d
SHA10d537459d1567443f5a0d8a45656ecdde1527a0d
SHA256f6594551893cd519482cf2cbaab0144f8196621d5aa4cba09182fe98dc070d2e
SHA5128d44e136e45509fafcba4e14dac138d4eb49efc609fb9e12ad990a8633b566f792adc2c291d9b7b6846907937683564edd984b39c078b7b246004c7acd4f3f2b
-
Filesize
15KB
MD5f984021f6a2d3bbab40c9b0f5c7480ad
SHA165c11b4e0d2419dfb89d80839f4670c4ff3a07ad
SHA25677d58017fa80f84f712beecd49ca14980595844ef4acef421ea74b0953edfcf4
SHA5122c57f500e02793ec1d6a16fd96bcca0940e02f33222082b06f370a5a2981c56c394517b67d2534822ca775ef3e59423c130789f4a72d6a8b2284de5f8ab8f3f0
-
Filesize
10KB
MD5f20e324bb68576b6ae52ef447213d65a
SHA18e55882bd85f881b8a44696c3fd27205af9cac90
SHA256402b99399fe656772457eccfd20ae15682f29f38966d2559947dd5442d3abfd7
SHA5120ddcdae2fc3285739f1b3705736961244159cf4b42a0d204fd1bc71b5a77385e02eaf029f9b5519ecc4a2f42f0a03585510c0dfcaa7d5ad9cb1bbcbffe0765d3