Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
29-11-2024 15:48
Static task
static1
Behavioral task
behavioral1
Sample
373ffb138b7376264a307837ef5bd51bd02380376f9fdd27350cf1b65a28bcbb.exe
Resource
win7-20241010-en
General
-
Target
373ffb138b7376264a307837ef5bd51bd02380376f9fdd27350cf1b65a28bcbb.exe
-
Size
1.8MB
-
MD5
3ca635061fa9685d799784f665850565
-
SHA1
549bb2808560d826b7be8ea502b46e3cdc101ce3
-
SHA256
373ffb138b7376264a307837ef5bd51bd02380376f9fdd27350cf1b65a28bcbb
-
SHA512
7812edb799fc4ac60c856c61ecd793fb5499ffe433c9bf60e251d4e3e9d5bb4df8d8f2873bb643036ccbb5bc611cc339ad8e8789feec3b3c5834bb72ed887792
-
SSDEEP
24576:9w/gXXZLf9FpuSVA83ZIaoOD8BR98BpLOKKxsGaC3x5MY0s9r3k7in9tFvGH:9kKpVu8pIO+D8rLOKHRQ5MYR3mV
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
drum
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection c4e8fa86bb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c4e8fa86bb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c4e8fa86bb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c4e8fa86bb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c4e8fa86bb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c4e8fa86bb.exe -
Stealc family
-
Enumerates VirtualBox registry keys 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF 5565c3b628.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF de213ccf23.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ de213ccf23.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 373ffb138b7376264a307837ef5bd51bd02380376f9fdd27350cf1b65a28bcbb.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5565c3b628.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 19733ce2c6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b7032729d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ fb3f9a80e5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c4e8fa86bb.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 373ffb138b7376264a307837ef5bd51bd02380376f9fdd27350cf1b65a28bcbb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b7032729d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 373ffb138b7376264a307837ef5bd51bd02380376f9fdd27350cf1b65a28bcbb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion fb3f9a80e5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c4e8fa86bb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c4e8fa86bb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5565c3b628.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 19733ce2c6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion de213ccf23.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion de213ccf23.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5565c3b628.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 19733ce2c6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b7032729d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion fb3f9a80e5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Executes dropped EXE 13 IoCs
pid Process 2060 skotes.exe 1752 SKOblik.exe 2988 xZNk1YZ.exe 2692 Continuous.com 1932 OyTxvLy.exe 1708 XXM5y4g.exe 2652 5565c3b628.exe 1980 19733ce2c6.exe 1792 b7032729d3.exe 572 fb3f9a80e5.exe 2772 6de5769a48.exe 2568 c4e8fa86bb.exe 3788 de213ccf23.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine 373ffb138b7376264a307837ef5bd51bd02380376f9fdd27350cf1b65a28bcbb.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine 5565c3b628.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine 19733ce2c6.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine b7032729d3.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine fb3f9a80e5.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine c4e8fa86bb.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine de213ccf23.exe -
Loads dropped DLL 22 IoCs
pid Process 2180 373ffb138b7376264a307837ef5bd51bd02380376f9fdd27350cf1b65a28bcbb.exe 2180 373ffb138b7376264a307837ef5bd51bd02380376f9fdd27350cf1b65a28bcbb.exe 2060 skotes.exe 2060 skotes.exe 2988 xZNk1YZ.exe 2936 cmd.exe 2060 skotes.exe 2060 skotes.exe 2580 WerFault.exe 2580 WerFault.exe 2580 WerFault.exe 2580 WerFault.exe 2580 WerFault.exe 2060 skotes.exe 2060 skotes.exe 2060 skotes.exe 2060 skotes.exe 2060 skotes.exe 2060 skotes.exe 2060 skotes.exe 2060 skotes.exe 2060 skotes.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c4e8fa86bb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features c4e8fa86bb.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\c4e8fa86bb.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010312001\\c4e8fa86bb.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\b7032729d3.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010309001\\b7032729d3.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\fb3f9a80e5.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010310001\\fb3f9a80e5.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\6de5769a48.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010311001\\6de5769a48.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 9 IoCs
flow ioc 16 raw.githubusercontent.com 19 raw.githubusercontent.com 20 raw.githubusercontent.com 27 raw.githubusercontent.com 11 raw.githubusercontent.com 15 raw.githubusercontent.com 18 raw.githubusercontent.com 12 raw.githubusercontent.com 17 raw.githubusercontent.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 9 ip-api.com -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000500000001a4d6-882.dat autoit_exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 1576 tasklist.exe 1612 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 2180 373ffb138b7376264a307837ef5bd51bd02380376f9fdd27350cf1b65a28bcbb.exe 2060 skotes.exe 2652 5565c3b628.exe 1980 19733ce2c6.exe 1792 b7032729d3.exe 572 fb3f9a80e5.exe 2568 c4e8fa86bb.exe 3788 de213ccf23.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 373ffb138b7376264a307837ef5bd51bd02380376f9fdd27350cf1b65a28bcbb.exe File opened for modification C:\Windows\BeliefQuick xZNk1YZ.exe File opened for modification C:\Windows\WantedOffset xZNk1YZ.exe -
Embeds OpenSSL 1 IoCs
Embeds OpenSSL, may be used to circumvent TLS interception.
resource yara_rule behavioral1/files/0x0006000000019377-41.dat embeds_openssl -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 24 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b7032729d3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language de213ccf23.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 19733ce2c6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fb3f9a80e5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c4e8fa86bb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xZNk1YZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6de5769a48.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 373ffb138b7376264a307837ef5bd51bd02380376f9fdd27350cf1b65a28bcbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Continuous.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5565c3b628.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 1912 taskkill.exe 2432 taskkill.exe 1860 taskkill.exe 2372 taskkill.exe 1360 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_Classes\Local Settings firefox.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 XXM5y4g.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 0f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b0601050507030853000000010000002600000030243022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c00b00000001000000180000004300b7004f00b7004d00b7004f00b7004400b7004f000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e349200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e XXM5y4g.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 XXM5y4g.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2180 373ffb138b7376264a307837ef5bd51bd02380376f9fdd27350cf1b65a28bcbb.exe 2060 skotes.exe 2692 Continuous.com 2692 Continuous.com 2692 Continuous.com 2652 5565c3b628.exe 2652 5565c3b628.exe 2652 5565c3b628.exe 2652 5565c3b628.exe 2652 5565c3b628.exe 2652 5565c3b628.exe 1980 19733ce2c6.exe 1792 b7032729d3.exe 572 fb3f9a80e5.exe 2772 6de5769a48.exe 2568 c4e8fa86bb.exe 2568 c4e8fa86bb.exe 2772 6de5769a48.exe 2772 6de5769a48.exe 2568 c4e8fa86bb.exe 2568 c4e8fa86bb.exe 3788 de213ccf23.exe 3788 de213ccf23.exe 3788 de213ccf23.exe 3788 de213ccf23.exe 3788 de213ccf23.exe 3788 de213ccf23.exe 3788 de213ccf23.exe 3788 de213ccf23.exe 3788 de213ccf23.exe 3788 de213ccf23.exe 3788 de213ccf23.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 1576 tasklist.exe Token: SeDebugPrivilege 1612 tasklist.exe Token: SeDebugPrivilege 1708 XXM5y4g.exe Token: SeDebugPrivilege 2432 taskkill.exe Token: SeDebugPrivilege 1860 taskkill.exe Token: SeDebugPrivilege 2372 taskkill.exe Token: SeDebugPrivilege 1360 taskkill.exe Token: SeDebugPrivilege 1912 taskkill.exe Token: SeDebugPrivilege 2508 firefox.exe Token: SeDebugPrivilege 2508 firefox.exe Token: SeDebugPrivilege 2568 c4e8fa86bb.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
pid Process 2180 373ffb138b7376264a307837ef5bd51bd02380376f9fdd27350cf1b65a28bcbb.exe 2692 Continuous.com 2692 Continuous.com 2692 Continuous.com 2772 6de5769a48.exe 2772 6de5769a48.exe 2772 6de5769a48.exe 2772 6de5769a48.exe 2772 6de5769a48.exe 2772 6de5769a48.exe 2508 firefox.exe 2508 firefox.exe 2508 firefox.exe 2508 firefox.exe 2772 6de5769a48.exe 2772 6de5769a48.exe 2772 6de5769a48.exe 2772 6de5769a48.exe -
Suspicious use of SendNotifyMessage 16 IoCs
pid Process 2692 Continuous.com 2692 Continuous.com 2692 Continuous.com 2772 6de5769a48.exe 2772 6de5769a48.exe 2772 6de5769a48.exe 2772 6de5769a48.exe 2772 6de5769a48.exe 2772 6de5769a48.exe 2508 firefox.exe 2508 firefox.exe 2508 firefox.exe 2772 6de5769a48.exe 2772 6de5769a48.exe 2772 6de5769a48.exe 2772 6de5769a48.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2060 2180 373ffb138b7376264a307837ef5bd51bd02380376f9fdd27350cf1b65a28bcbb.exe 28 PID 2180 wrote to memory of 2060 2180 373ffb138b7376264a307837ef5bd51bd02380376f9fdd27350cf1b65a28bcbb.exe 28 PID 2180 wrote to memory of 2060 2180 373ffb138b7376264a307837ef5bd51bd02380376f9fdd27350cf1b65a28bcbb.exe 28 PID 2180 wrote to memory of 2060 2180 373ffb138b7376264a307837ef5bd51bd02380376f9fdd27350cf1b65a28bcbb.exe 28 PID 2060 wrote to memory of 1752 2060 skotes.exe 32 PID 2060 wrote to memory of 1752 2060 skotes.exe 32 PID 2060 wrote to memory of 1752 2060 skotes.exe 32 PID 2060 wrote to memory of 1752 2060 skotes.exe 32 PID 2060 wrote to memory of 2988 2060 skotes.exe 33 PID 2060 wrote to memory of 2988 2060 skotes.exe 33 PID 2060 wrote to memory of 2988 2060 skotes.exe 33 PID 2060 wrote to memory of 2988 2060 skotes.exe 33 PID 2988 wrote to memory of 2936 2988 xZNk1YZ.exe 34 PID 2988 wrote to memory of 2936 2988 xZNk1YZ.exe 34 PID 2988 wrote to memory of 2936 2988 xZNk1YZ.exe 34 PID 2988 wrote to memory of 2936 2988 xZNk1YZ.exe 34 PID 2936 wrote to memory of 1576 2936 cmd.exe 36 PID 2936 wrote to memory of 1576 2936 cmd.exe 36 PID 2936 wrote to memory of 1576 2936 cmd.exe 36 PID 2936 wrote to memory of 1576 2936 cmd.exe 36 PID 2936 wrote to memory of 1584 2936 cmd.exe 37 PID 2936 wrote to memory of 1584 2936 cmd.exe 37 PID 2936 wrote to memory of 1584 2936 cmd.exe 37 PID 2936 wrote to memory of 1584 2936 cmd.exe 37 PID 2936 wrote to memory of 1612 2936 cmd.exe 39 PID 2936 wrote to memory of 1612 2936 cmd.exe 39 PID 2936 wrote to memory of 1612 2936 cmd.exe 39 PID 2936 wrote to memory of 1612 2936 cmd.exe 39 PID 2936 wrote to memory of 3056 2936 cmd.exe 40 PID 2936 wrote to memory of 3056 2936 cmd.exe 40 PID 2936 wrote to memory of 3056 2936 cmd.exe 40 PID 2936 wrote to memory of 3056 2936 cmd.exe 40 PID 2936 wrote to memory of 2176 2936 cmd.exe 41 PID 2936 wrote to memory of 2176 2936 cmd.exe 41 PID 2936 wrote to memory of 2176 2936 cmd.exe 41 PID 2936 wrote to memory of 2176 2936 cmd.exe 41 PID 2936 wrote to memory of 2680 2936 cmd.exe 42 PID 2936 wrote to memory of 2680 2936 cmd.exe 42 PID 2936 wrote to memory of 2680 2936 cmd.exe 42 PID 2936 wrote to memory of 2680 2936 cmd.exe 42 PID 2936 wrote to memory of 2692 2936 cmd.exe 43 PID 2936 wrote to memory of 2692 2936 cmd.exe 43 PID 2936 wrote to memory of 2692 2936 cmd.exe 43 PID 2936 wrote to memory of 2692 2936 cmd.exe 43 PID 2936 wrote to memory of 1488 2936 cmd.exe 44 PID 2936 wrote to memory of 1488 2936 cmd.exe 44 PID 2936 wrote to memory of 1488 2936 cmd.exe 44 PID 2936 wrote to memory of 1488 2936 cmd.exe 44 PID 2060 wrote to memory of 1932 2060 skotes.exe 45 PID 2060 wrote to memory of 1932 2060 skotes.exe 45 PID 2060 wrote to memory of 1932 2060 skotes.exe 45 PID 2060 wrote to memory of 1932 2060 skotes.exe 45 PID 2060 wrote to memory of 1708 2060 skotes.exe 47 PID 2060 wrote to memory of 1708 2060 skotes.exe 47 PID 2060 wrote to memory of 1708 2060 skotes.exe 47 PID 2060 wrote to memory of 1708 2060 skotes.exe 47 PID 1708 wrote to memory of 2580 1708 XXM5y4g.exe 48 PID 1708 wrote to memory of 2580 1708 XXM5y4g.exe 48 PID 1708 wrote to memory of 2580 1708 XXM5y4g.exe 48 PID 2060 wrote to memory of 2652 2060 skotes.exe 49 PID 2060 wrote to memory of 2652 2060 skotes.exe 49 PID 2060 wrote to memory of 2652 2060 skotes.exe 49 PID 2060 wrote to memory of 2652 2060 skotes.exe 49 PID 2060 wrote to memory of 1980 2060 skotes.exe 50 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\373ffb138b7376264a307837ef5bd51bd02380376f9fdd27350cf1b65a28bcbb.exe"C:\Users\Admin\AppData\Local\Temp\373ffb138b7376264a307837ef5bd51bd02380376f9fdd27350cf1b65a28bcbb.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\1010230001\SKOblik.exe"C:\Users\Admin\AppData\Local\Temp\1010230001\SKOblik.exe"3⤵
- Executes dropped EXE
PID:1752
-
-
C:\Users\Admin\AppData\Local\Temp\1010264001\xZNk1YZ.exe"C:\Users\Admin\AppData\Local\Temp\1010264001\xZNk1YZ.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy Scout Scout.cmd && Scout.cmd4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1576
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa opssvc"5⤵
- System Location Discovery: System Language Discovery
PID:1584
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1612
-
-
C:\Windows\SysWOW64\findstr.exefindstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"5⤵
- System Location Discovery: System Language Discovery
PID:3056
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 5500465⤵
- System Location Discovery: System Language Discovery
PID:2176
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Diagnosis R5⤵
- System Location Discovery: System Language Discovery
PID:2680
-
-
C:\Users\Admin\AppData\Local\Temp\550046\Continuous.comContinuous.com R5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2692
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 55⤵
- System Location Discovery: System Language Discovery
PID:1488
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1010291001\OyTxvLy.exe"C:\Users\Admin\AppData\Local\Temp\1010291001\OyTxvLy.exe"3⤵
- Executes dropped EXE
PID:1932
-
-
C:\Users\Admin\AppData\Local\Temp\1010306001\XXM5y4g.exe"C:\Users\Admin\AppData\Local\Temp\1010306001\XXM5y4g.exe"3⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1708 -s 11804⤵
- Loads dropped DLL
PID:2580
-
-
-
C:\Users\Admin\AppData\Local\Temp\1010307001\5565c3b628.exe"C:\Users\Admin\AppData\Local\Temp\1010307001\5565c3b628.exe"3⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2652
-
-
C:\Users\Admin\AppData\Local\Temp\1010308001\19733ce2c6.exe"C:\Users\Admin\AppData\Local\Temp\1010308001\19733ce2c6.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1980
-
-
C:\Users\Admin\AppData\Local\Temp\1010309001\b7032729d3.exe"C:\Users\Admin\AppData\Local\Temp\1010309001\b7032729d3.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1792
-
-
C:\Users\Admin\AppData\Local\Temp\1010310001\fb3f9a80e5.exe"C:\Users\Admin\AppData\Local\Temp\1010310001\fb3f9a80e5.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:572
-
-
C:\Users\Admin\AppData\Local\Temp\1010311001\6de5769a48.exe"C:\Users\Admin\AppData\Local\Temp\1010311001\6de5769a48.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2772 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2432
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1860
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2372
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1360
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1912
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:1708
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2508 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2508.0.845427183\51415489" -parentBuildID 20221007134813 -prefsHandle 1240 -prefMapHandle 1236 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {2435107b-e90e-4e05-bcc5-e819094270f4} 2508 "\\.\pipe\gecko-crash-server-pipe.2508" 1304 43d6558 gpu6⤵PID:2780
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2508.1.817308234\1003041583" -parentBuildID 20221007134813 -prefsHandle 1520 -prefMapHandle 1516 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {612af7b3-b1db-40ff-908b-517e1cf35312} 2508 "\\.\pipe\gecko-crash-server-pipe.2508" 1532 42fbc58 socket6⤵PID:1676
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2508.2.249412171\852968668" -childID 1 -isForBrowser -prefsHandle 2128 -prefMapHandle 2124 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 700 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {3815d5c0-4704-43b2-9b5e-1807bf34f895} 2508 "\\.\pipe\gecko-crash-server-pipe.2508" 2140 194aa758 tab6⤵PID:536
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2508.3.1338914592\1591095036" -childID 2 -isForBrowser -prefsHandle 2528 -prefMapHandle 2520 -prefsLen 26151 -prefMapSize 233444 -jsInitHandle 700 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {3d021529-46c8-4432-baa4-d34227833d42} 2508 "\\.\pipe\gecko-crash-server-pipe.2508" 2540 e69b58 tab6⤵PID:1720
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2508.4.851913499\1843936701" -childID 3 -isForBrowser -prefsHandle 3716 -prefMapHandle 3824 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 700 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9c43b347-451e-42aa-bd30-fbb3dbc99a18} 2508 "\\.\pipe\gecko-crash-server-pipe.2508" 3820 1f4e2f58 tab6⤵PID:1320
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2508.5.1011209154\350748337" -childID 4 -isForBrowser -prefsHandle 3936 -prefMapHandle 3940 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 700 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {6da70e9b-c454-4d27-85a4-4ed70a6a9954} 2508 "\\.\pipe\gecko-crash-server-pipe.2508" 3928 1f4e3258 tab6⤵PID:2528
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2508.6.1211367551\1305159443" -childID 5 -isForBrowser -prefsHandle 4088 -prefMapHandle 4092 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 700 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e3a4d3c9-1a54-4002-88fb-a3dbdbf68163} 2508 "\\.\pipe\gecko-crash-server-pipe.2508" 4080 20a61458 tab6⤵PID:2572
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1010312001\c4e8fa86bb.exe"C:\Users\Admin\AppData\Local\Temp\1010312001\c4e8fa86bb.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2568
-
-
C:\Users\Admin\AppData\Local\Temp\1010313001\de213ccf23.exe"C:\Users\Admin\AppData\Local\Temp\1010313001\de213ccf23.exe"3⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3788
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
3Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1759ccb30ee834810791ff672a3e24c
SHA17a46da4016e3910564c26c12b343e6657fcf20b6
SHA256bde43dd9af06274e3241037e61bf8a235eb3674c5eba430c4b2e421ae9e550a8
SHA512262546f9c3f90f2281a1cdd2a375a9287dacdb9769b1d11dd48944e93080cce734d49320fd34927cd3f4da22d1595863ef642b7b0fd21069e711d20e856f8b96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5483b82a2eee8c77b7b101f9672ad3a4d
SHA12191c17746c6f87d653ae83d4d3cf329c2cf5e77
SHA2565ebb240613808745af86c8a138c633955967c8a841046095de977c2faf1a63e3
SHA512dd0be5377b1f52c9caf8eb4a2eba6021165f3ff705284e405636eef7bb94f35eb5757fc1d9f7fa8fa26e6a99d660e0fdde333cfe6fd6f789c40f99597d9e875c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c422538affd5f81684d16abd07895ea
SHA1e16c6d7da507310452d933484a8fa50c6050978e
SHA25683588ec876b154428c925d223373e45f4dd705152225b0313bfa5030165d35f0
SHA5124decc5d43048d5dd9fdf390f8d9c075e5ad3efe7c1def5f3655c973d2a5e1115e284f134d25485a94150118860840e70b6f870196f869499db3c62c99b69ed8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55184856d77aa76747f195b271b22d791
SHA146cb0dc52f6508bc61f84a717d30ba39574728b4
SHA25611c373afcd6975dc58bc02b37457354b6a805c5726b59015570ef10b9cc84a60
SHA51259c6c7c6fbf330e4e9bd3fa7a5052d85838d5eec090a6f38ac078c476e1ea6fdee0993ed0a036db644440cd5e8ca194da72827495b302e7b21e386497a4d80f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573e08903c966a8729979f32f03ba3ac6
SHA186539c797ef8c81e8b14b2fec6ab63e7199552e6
SHA2562e7c400190ce1c4001a112d7413f71e2270b48f5fa47ba76047571ef9fc5d379
SHA512eae89945bfa60996c9ef449b543b4e1711efded336e3f35a582ee361e1d9d3067f6f0e98927c2c469d06d683b9fb133901f042b20f8c85cab1c568db4788fe5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9d59c5cb0f1f38d6af243ce1f531642
SHA18232c17d70fb9117a2cf3bccac81f61f131a65d0
SHA256c02618358a286e88b3dfbd01c466960161153fa61cfa5103b8670afff7974c0b
SHA512f8dc489b68318b7130a329376b179ed0ff4f515ff7f94967910100b527e162485bb6dd07b14346980986c9b3eb50528ece9de204e8b49c7f9db6f389c78a2134
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5348bb6d37061d9e9f5f4a9984dc9c5ee
SHA1b1a4be67072fe7c49de3a371d7d4fb814fcf2543
SHA256c5d442d6ecfc675242afe64f5998938463939097b5166814695c62c95993d410
SHA512c2b018531149fde9712b56657df6db5c019d7cae6c9eb29a2b24b7b7b7b8db1e658d1843f861fa06abf0f9b320d856a13d562f1b30c78c721ce59012c055ab2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4e36483f13c1d12ef4dce101f1168cc
SHA19bb958f857748652c68fa09eaef32785b6b0f16c
SHA256a22f78b7684007c028cd380222a7751ec4d0c5d111d13e93ddb4151ac0a0fee1
SHA5128352f3998d0b3740cc586f98c4464b4c5fff9231d728c87e5d4416489fa66e3cab3b81fe7eb0c91e28190b443bcdba51654fe22e514d0df6f7c2821327c45b20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504df3d6c47c00d70aaac1e2c27fd46ed
SHA1e87c860a859ba06e150d260bd748a9a1b7dd30b6
SHA256684516c5da96b0d31beebc451e2a9af003700f091763ed0e765e6602f29b7aad
SHA5126cbdf4bec24b1c8a74436b8ab101b33b3717f46f16fb2f3908381baac37438e976935017a2d0f194cad74af07104c07f43e994916e35387058cd43768c7bde75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5987d89e7710758168928fda90c0619e0
SHA12503a678d261d88db33a54f713060d9aec60e11c
SHA256386f9a1b8be14c1bf7135e1c5697dfaf14c0fec41f6561051a02a2931cb2444b
SHA5123ccde50fc16478c04eff0c9a3a98cf7f4402ecc131a4d2fcaf5f0695898050dc0d1cc927a32493a4523a1deee8ca064f95303c653600a7cdbba68fa1a134164d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578668fb72dc4ad704559beac93ed58cc
SHA1a2bfd2ce4b620a17491b100975dff5cfcc279940
SHA25676c554bc583101bf6915b49ca7c800a7555d6d2f43fcd633bfb06ec98285dee8
SHA512e2cc6954e85b7add0ca8ce695323d8b9e0704ca9d441aa3cbe4916a6e64912f9aee1c75ab46469867c77ce1ba8ce472f12af2f042c3ae7b7c3a5daffee628d74
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5GWW47WY\download[1].htm
Filesize1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\xmhyv50e.default-release\activity-stream.discovery_stream.json.tmp
Filesize24KB
MD52b6b6b75b462371f73d2d8f8d5384a14
SHA1c72f383b558930a831d8428329e79ef12d0790e5
SHA256ff259563827dc3106ad83badcbdbbf9d14fa60609880842f97a5ec46fe702f73
SHA512caba75f0a2e620fc06bdbcdc786d2040841aae737bbd37c65eecdc7d5e32e0d2e7d817ef136bb04796a2809041711a00f83e17a2f146dfe2576f9f72de0f566c
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\xmhyv50e.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize13KB
MD5f99b4984bd93547ff4ab09d35b9ed6d5
SHA173bf4d313cb094bb6ead04460da9547106794007
SHA256402571262fd1f6dca336f822ceb0ec2a368a25dfe2f4bfa13b45c983e88b6069
SHA512cd0ed84a24d3faae94290aca1b5ef65eef4cfba8a983da9f88ee3268fc611484a72bd44ca0947c0ca8de174619debae4604e15e4b2c364e636424ba1d37e1759
-
Filesize
21.2MB
MD5c3968e6090d03e52679657e1715ea39a
SHA12332b4bfd13b271c250a6b71f3c2a502e24d0b76
SHA2564ad1cc11410e486d132dce9716eebe6a2db0af0fcbf53ee87bc9c0af6a5aa1d4
SHA512f4908cce3e77a19bcbdc54487e025868cbd2c470b796edbf4a28aebc56cb9212019496f32eb531787de2ca9e8af0aedab2fde3d7aecee9e6a3fe3f5e4ce7670a
-
Filesize
658KB
MD50139b5f2565b3c046f2785ef43b48cfe
SHA1b31aab8bbc6548abe2b17e1d8e9a787bc15e1ae8
SHA25674c70a9e45a5dba1040fa34981286f2927b1fbb6b8f5d9740dd51752516eff33
SHA512ce671c3b48c8c553696652648dffc118dad234ed628be3ac6cb27e2b2992e8a5694fa268c57534dc3f0825e4006a68546c05729030832023455e8145c142c7ca
-
Filesize
3.5MB
MD53904c3f525402f4bdb8551b4d66c6169
SHA1881124dda79c8deb8cc5d5a03b193bafed7dfd6f
SHA2567308894bcd2aca387ebe9e6fa69806af92985d2f465c0c9bfaf9b4f3cc5469e9
SHA51257923b91f7d05cf9df9ff3337fb7eedcfcd057782f0480605323ca5805c5d6a47a78681773462b5e8786b467ee67829a432783eb7b94850f3111d3d5b06da9e4
-
Filesize
3.6MB
MD57b8a48c37ff6d0911e1f4ae874405540
SHA1bbce9cc8aed4b3d804dbc992cd6935e74163317d
SHA2563624350ee0f49ab853223107d7dc088862271e239a99b9e19839766d33f148e7
SHA5125d8c67bb04edf8c2b83c3dc1cdf5fe868f2d08cdf58c4a41f7347d13e2128886269a3fe8058e03d80279fad4ee887835c8a383fb40fa237c5b9011e0ff7e1653
-
Filesize
4.2MB
MD5cf2b03d9d058611c11c10dbab952331e
SHA192e2fa1bc0296a6030023b83ba49bfe2c0e2e37f
SHA2564113c14899c6d4986d9536ec4b625cce4aa4c9dca589d0d4f18145cc2106e28c
SHA512410fbeaed6022d150611c37e02af8045764e6bc0c43280184d9e94e4766ea7033004b674f6672189ed3bea95091ea58fe8f289ac181679e48af88a280dbc7ee9
-
Filesize
1.9MB
MD59b37c373d075d185b0979498d9ac7c7c
SHA14d4c3862ba6f1e3a35195ca2d9b23c80a7632eda
SHA256d52ec59339c5ed5f8b09550f85368f07e6652471f564118d1b9995cdf834c76c
SHA512d30077e2e087b114f75b0b9083ff4b6ea252b4ec5f5aa2f5674d5799c1c94e7dbb2637e1de8b0b0af238d285e089973b2bb18cb5be9cba6eaee519fdc5bf1495
-
Filesize
1.8MB
MD5eec43d7407193d2e5cc641dd32cf5eb7
SHA1546d03bd7a176beccfa474cb2f0758765b4dfce7
SHA256dcf5be24c55ebaf35b01b8abc0758ee6ca44f26cb08c93aa259b278c0899345c
SHA512c157e40ea7eaf237090a2ae0ebefd840603825e3bfc4b4ab92be619aa08e59eefdb4d53acbcfb4d8b92d2d0756bb208acfba91a4b148a14b85cbde99bd3ca031
-
Filesize
1.7MB
MD51c1fef9811d5dab911b37eb66caef378
SHA1417655ce3709d01ee796ca4c5cdf5bec71677132
SHA2569185fb673aed0090ef135314924a4f574b909c8767da237c4969910867228db9
SHA512b968ccf7e92a20e1eb8297b8ca79af9d4e2d63e62d3624acd1e369bf9fa83f1f4d3d9147fa1a1a7b7d776959891238ab7e071dbe2aa33fce5e6fc9e9db8246f9
-
Filesize
901KB
MD5a631ed139c1ebcd680664e00f6f7dec6
SHA1d77724604c27d83d98ed1470bf57efaa8a76ada1
SHA2565c2d31720f7847b6580233c642994018ebfce77a8d5ac246b2ff3cfe7a589193
SHA512a5370c99081b2e30540334703f7d241934abf6ef6d66ce3cfd443dc198989891f996da9404db61e6b801df178d2f40444ef6d1a40e0267808dc4f83a5d113978
-
Filesize
2.7MB
MD5170089ee11d2992e666809690cb94607
SHA18e8c7e1fe5a151d61718265892da906d99c7acec
SHA256a3fbe9d79057af6d933560552dc87745d49e243de064fd151a617a40ffe72b75
SHA5124d36600b148b7b26d019571ee7a4667bfb070c7c03a6aa82eeb5a36a0d92cbb27319b47fb2bf9ccb64f299df8c585b0bc79eeba39dabdf4bda4835e17b9d75c1
-
Filesize
4.3MB
MD55b893b6b754f3f28e703ffedd654f6b7
SHA19ac4666663f290ff010c787f6c26b6c80254fd35
SHA256bc959fde662ca2876e219ef21cb9e5280054fd83c54b366dfba33a7a7ed88285
SHA512e2c99a579402a9c070bcdc90af3b4394278d3481be40fe278fa6629132cd35547cd95d37a9ca5bba9f6dae35b5e1a83de8945b499eb876fd47011f3627f6d807
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
128KB
MD51ed187567d2753bb83ca63ce55c3f4a0
SHA186ded8a1077f793ace059334a35978d3617f7868
SHA25656595ef1a7047b970d9aa072ee402c0ec66319acec589f31f6b4b89648106743
SHA5124df0b61d22e9ae6cc6a80e7a8ef46d8b5ec97b61e05f89b43f311e2af0664aed9e8baecc96012081033e94d99a81c325c43b75a42f797948d199b85b661ad810
-
Filesize
872KB
MD5508dd472a89794e64ad5eeb315f9939d
SHA1fcc1c958d5624bc06aa741d7ddbbcb519521d2e3
SHA256ef279e2eef2f3f56ebac738d3eac31ca1ee46a201998bfe941ccb940b947c221
SHA512884019d1fa05c22f8056ba0cfce3505102dca9a3e97982aa1219070b3a900cdaa8c20805c42679c904bac5bd2994471af8c863a1c76597406c66f50cb569b48d
-
Filesize
7KB
MD5b03d9921e1d7aacaaf23e52c78c1b79e
SHA151a43670848242b683469b5ffd589fb743355828
SHA256337a38b724f6601c3c7b864316642c044a415acbe840ed13b2d62d220ff3fe29
SHA512dfa05516422fe8c2d686a4c3c87c714fabd6596064fb6f3fa739ae747420f7fd1adf464f40e1754bcddf8db67ec0bcb7830a6ef9ef73ac93f28c65ab53617ee7
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
1.8MB
MD53ca635061fa9685d799784f665850565
SHA1549bb2808560d826b7be8ea502b46e3cdc101ce3
SHA256373ffb138b7376264a307837ef5bd51bd02380376f9fdd27350cf1b65a28bcbb
SHA5127812edb799fc4ac60c856c61ecd793fb5499ffe433c9bf60e251d4e3e9d5bb4df8d8f2873bb643036ccbb5bc611cc339ad8e8789feec3b3c5834bb72ed887792
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD5324b701536144933f3a9ad0256e57f82
SHA18deeac5cde397d4462b86a2833a00bd884f9912c
SHA256c43e8e74accfee4fe1f1921d65f58b9c3294474e6aeba7f5f68a4e704987a38c
SHA5129397172ca15270fa01b3b4a468bec8312c3ab0e964b3290e774a9eee6a8105484d77047e3ed7ed8a93f9c31700653595f97a494132b2207433d65f456336fbf2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\datareporting\glean\pending_pings\4b5e306d-102e-42b8-b3a9-da4f3e7fa2d0
Filesize745B
MD50d41841381c94d7a39d6b775dc9d342b
SHA18c2180bfc3cedf546b27a0a39c99411f63e27051
SHA25683b2ac09231aaf4c06146346b5361c880eccdd5d0a7c4bf3a611b7d58addb62f
SHA51280416a8f070dcfe5473bf174ffaeb21bd0b7077766537a70ef5345c507a3e54e68d547feaaf64dc6d40ccbe1dded123f663c2c2556b5ad3838299f367e9a590c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\datareporting\glean\pending_pings\dc38493d-682f-472d-aaa0-c0c599aa9dcc
Filesize10KB
MD5dd2636ea619d5d207457540aadf5433e
SHA1f48dbd7a009d233f69a44586e927e528d3ffbc45
SHA2569f192dd274851e4a5136827178e29ce54fb584b53d389b0410ead51421242b72
SHA5125ef51a5de438f8d9dfbf374ff6dc7d435ae6a37dc81492a20a3af0f0fe08672eb6b481e2f149baa89796ad97b9a443f4a0311d210895de8ad5d4a918bd304dfc
-
Filesize
6KB
MD5edb3b6e02be027b5d7c31a807f97c4f3
SHA19af0cc6ced651824121694499148b9696c026322
SHA25603a11b8f2ab4890336b50c6f69e37737c76fe8632f671e305e9d8308114a8d0f
SHA512f740d5d5fff58ade670660e52b9e9df9bf692b4679c0235c930aa8140ddf08bbd5c3e582de388ef25b114c683cb137fe398ebc2f565de806aeccac02de362412
-
Filesize
6KB
MD57522feac4d35ef663df9b8d667653788
SHA1dc560c02ac6aaa4288aab7ebd1fb90393ef3e50f
SHA256b112b3a23f3e28a6ea2eefdb2a15520a5418534fb81772e593c4de350a1cbd84
SHA51282f49cec02685bc479af6e4fffc093ca0bf1cad3616d50c2c109a011375a0ffb5d251107e142acc573238732127756e9bdfc17c07c83ee455a7228f619b88cb2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize184KB
MD52c77d0d2b5c1907582fe8b82d8301140
SHA183b6bebedd37904c65ebf0e6fd258f1569fb9646
SHA256780b21e4f9ef88e816b73fb42b0cfb531bc548df5c94bc18541676053e98bd39
SHA5126ced1171233571af655e1ec906f1960635353fbede634311099c2a85650d7ca73be842ef80d4c7981b376550bf35df3c243d0ed438cbdbc4b259c20d768a9272
-
Filesize
872KB
MD56ee7ddebff0a2b78c7ac30f6e00d1d11
SHA1f2f57024c7cc3f9ff5f999ee20c4f5c38bfc20a2
SHA256865347471135bb5459ad0e647e75a14ad91424b6f13a5c05d9ecd9183a8a1cf4
SHA51257d56de2bb882f491e633972003d7c6562ef2758c3731b913ff4d15379ada575062f4de2a48ca6d6d9241852a5b8a007f52792753fd8d8fee85b9a218714efd0