Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-12-2024 15:04
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240903-en
General
-
Target
file.exe
-
Size
3.1MB
-
MD5
68d337cefd0d798eae5bb67dabd97d11
-
SHA1
a2c97610906991a227e52ccb7fc55fe8c2fe8774
-
SHA256
8fc1bd816b1865518ff0620f8ac09a85aa3d8c5d660ba423b7d13b09f325baa9
-
SHA512
0ae6f81307950d38c7fc78237720bbd55bac9244afe74101e12be868ab6f0c3a7bfaa641aa636a947e3c4934510200ebee2a2057eb5c37f98a3b4887d5e43929
-
SSDEEP
49152:RTprX81PKH6J3vRPlf7CncYrHDsGaaaH9gUNbWIXrwg65t:T81PKaJ3vRN2ncYrH+dFB8g
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
https://atten-supporse.biz/api
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://atten-supporse.biz/api
https://se-blurry.biz/api
https://zinc-sneark.biz/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 3749722329.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 3749722329.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 3749722329.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 3749722329.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 3749722329.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 3749722329.exe -
Stealc family
-
Xmrig family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c73782a3e9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 159f69f755.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3749722329.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
XMRig Miner payload 11 IoCs
resource yara_rule behavioral2/memory/6008-551-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/6008-553-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/6008-556-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/6008-557-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/6008-555-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/6008-554-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/6008-550-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/6008-563-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/6008-727-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/6008-736-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/6008-735-0x0000000140000000-0x0000000140835000-memory.dmp xmrig -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3972 powershell.exe 5200 powershell.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 159f69f755.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3749722329.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 159f69f755.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c73782a3e9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c73782a3e9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3749722329.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation file.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 9 IoCs
pid Process 392 skotes.exe 4660 hIPhQZD.exe 916 WindosCPUsystem.exe 3636 c73782a3e9.exe 5040 159f69f755.exe 540 34e3814a34.exe 5580 3749722329.exe 5812 skotes.exe 5824 skotes.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine file.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine c73782a3e9.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 159f69f755.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 3749722329.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 3749722329.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 3749722329.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\c73782a3e9.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013205001\\c73782a3e9.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\159f69f755.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013206001\\159f69f755.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\34e3814a34.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013207001\\34e3814a34.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\3749722329.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013208001\\3749722329.exe" skotes.exe -
Power Settings 1 TTPs 4 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 5776 powercfg.exe 5808 powercfg.exe 5792 powercfg.exe 5784 powercfg.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000c000000023bcd-131.dat autoit_exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\MRT.exe WindosCPUsystem.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 2316 file.exe 392 skotes.exe 3636 c73782a3e9.exe 5040 159f69f755.exe 5580 3749722329.exe 5812 skotes.exe 5824 skotes.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 916 set thread context of 6008 916 WindosCPUsystem.exe 158 -
resource yara_rule behavioral2/memory/6008-547-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/6008-549-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/6008-551-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/6008-553-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/6008-556-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/6008-557-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/6008-555-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/6008-554-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/6008-550-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/6008-548-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/6008-546-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/6008-545-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/6008-563-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/6008-727-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/6008-736-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/6008-735-0x0000000140000000-0x0000000140835000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job file.exe -
Launches sc.exe 5 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1804 sc.exe 5632 sc.exe 5524 sc.exe 5452 sc.exe 5676 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2108 3636 WerFault.exe 97 -
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c73782a3e9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 34e3814a34.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 34e3814a34.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 159f69f755.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 34e3814a34.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3749722329.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hIPhQZD.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 2168 taskkill.exe 2612 taskkill.exe 744 taskkill.exe 1820 taskkill.exe 1020 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 38 IoCs
pid Process 2316 file.exe 2316 file.exe 392 skotes.exe 392 skotes.exe 3972 powershell.exe 3972 powershell.exe 3636 c73782a3e9.exe 3636 c73782a3e9.exe 5040 159f69f755.exe 5040 159f69f755.exe 540 34e3814a34.exe 540 34e3814a34.exe 5580 3749722329.exe 5580 3749722329.exe 540 34e3814a34.exe 540 34e3814a34.exe 916 WindosCPUsystem.exe 5200 powershell.exe 5200 powershell.exe 5200 powershell.exe 916 WindosCPUsystem.exe 916 WindosCPUsystem.exe 916 WindosCPUsystem.exe 916 WindosCPUsystem.exe 916 WindosCPUsystem.exe 916 WindosCPUsystem.exe 916 WindosCPUsystem.exe 916 WindosCPUsystem.exe 916 WindosCPUsystem.exe 916 WindosCPUsystem.exe 916 WindosCPUsystem.exe 5580 3749722329.exe 5580 3749722329.exe 5580 3749722329.exe 5812 skotes.exe 5812 skotes.exe 5824 skotes.exe 5824 skotes.exe -
Suspicious behavior: MapViewOfSection 9 IoCs
pid Process 4660 hIPhQZD.exe 4660 hIPhQZD.exe 4660 hIPhQZD.exe 3920 explorer.exe 3920 explorer.exe 3920 explorer.exe 3920 explorer.exe 3920 explorer.exe 3920 explorer.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 3972 powershell.exe Token: SeDebugPrivilege 2168 taskkill.exe Token: SeDebugPrivilege 2612 taskkill.exe Token: SeDebugPrivilege 744 taskkill.exe Token: SeDebugPrivilege 1820 taskkill.exe Token: SeDebugPrivilege 1020 taskkill.exe Token: SeDebugPrivilege 676 firefox.exe Token: SeDebugPrivilege 676 firefox.exe Token: SeDebugPrivilege 5200 powershell.exe Token: SeDebugPrivilege 916 WindosCPUsystem.exe Token: SeShutdownPrivilege 5776 powercfg.exe Token: SeCreatePagefilePrivilege 5776 powercfg.exe Token: SeShutdownPrivilege 5784 powercfg.exe Token: SeCreatePagefilePrivilege 5784 powercfg.exe Token: SeShutdownPrivilege 5808 powercfg.exe Token: SeCreatePagefilePrivilege 5808 powercfg.exe Token: SeShutdownPrivilege 5792 powercfg.exe Token: SeCreatePagefilePrivilege 5792 powercfg.exe Token: SeLockMemoryPrivilege 6008 explorer.exe Token: SeLockMemoryPrivilege 6008 explorer.exe Token: SeDebugPrivilege 5580 3749722329.exe Token: SeDebugPrivilege 676 firefox.exe Token: SeDebugPrivilege 676 firefox.exe Token: SeDebugPrivilege 676 firefox.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 540 34e3814a34.exe 540 34e3814a34.exe 540 34e3814a34.exe 540 34e3814a34.exe 540 34e3814a34.exe 540 34e3814a34.exe 540 34e3814a34.exe 676 firefox.exe 676 firefox.exe 676 firefox.exe 676 firefox.exe 676 firefox.exe 676 firefox.exe 676 firefox.exe 676 firefox.exe 676 firefox.exe 676 firefox.exe 676 firefox.exe 676 firefox.exe 676 firefox.exe 676 firefox.exe 676 firefox.exe 676 firefox.exe 676 firefox.exe 676 firefox.exe 676 firefox.exe 676 firefox.exe 676 firefox.exe 540 34e3814a34.exe 540 34e3814a34.exe 540 34e3814a34.exe 540 34e3814a34.exe 6008 explorer.exe 6008 explorer.exe 6008 explorer.exe 6008 explorer.exe 6008 explorer.exe 6008 explorer.exe 6008 explorer.exe 6008 explorer.exe 6008 explorer.exe 6008 explorer.exe 6008 explorer.exe 6008 explorer.exe 6008 explorer.exe 6008 explorer.exe 6008 explorer.exe 6008 explorer.exe 6008 explorer.exe 6008 explorer.exe 6008 explorer.exe 6008 explorer.exe 6008 explorer.exe 6008 explorer.exe 6008 explorer.exe 6008 explorer.exe 6008 explorer.exe 6008 explorer.exe 6008 explorer.exe 6008 explorer.exe 6008 explorer.exe 6008 explorer.exe 6008 explorer.exe 6008 explorer.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 540 34e3814a34.exe 540 34e3814a34.exe 540 34e3814a34.exe 540 34e3814a34.exe 540 34e3814a34.exe 540 34e3814a34.exe 540 34e3814a34.exe 676 firefox.exe 676 firefox.exe 676 firefox.exe 676 firefox.exe 676 firefox.exe 676 firefox.exe 676 firefox.exe 676 firefox.exe 676 firefox.exe 676 firefox.exe 676 firefox.exe 676 firefox.exe 676 firefox.exe 676 firefox.exe 676 firefox.exe 676 firefox.exe 676 firefox.exe 676 firefox.exe 676 firefox.exe 676 firefox.exe 540 34e3814a34.exe 540 34e3814a34.exe 540 34e3814a34.exe 540 34e3814a34.exe 6008 explorer.exe 6008 explorer.exe 6008 explorer.exe 6008 explorer.exe 6008 explorer.exe 6008 explorer.exe 6008 explorer.exe 6008 explorer.exe 6008 explorer.exe 6008 explorer.exe 6008 explorer.exe 6008 explorer.exe 6008 explorer.exe 6008 explorer.exe 6008 explorer.exe 6008 explorer.exe 6008 explorer.exe 6008 explorer.exe 6008 explorer.exe 6008 explorer.exe 6008 explorer.exe 6008 explorer.exe 6008 explorer.exe 6008 explorer.exe 6008 explorer.exe 6008 explorer.exe 6008 explorer.exe 6008 explorer.exe 6008 explorer.exe 6008 explorer.exe 6008 explorer.exe 6008 explorer.exe 6008 explorer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 676 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2316 wrote to memory of 392 2316 file.exe 83 PID 2316 wrote to memory of 392 2316 file.exe 83 PID 2316 wrote to memory of 392 2316 file.exe 83 PID 392 wrote to memory of 4660 392 skotes.exe 85 PID 392 wrote to memory of 4660 392 skotes.exe 85 PID 392 wrote to memory of 4660 392 skotes.exe 85 PID 4660 wrote to memory of 1472 4660 hIPhQZD.exe 86 PID 4660 wrote to memory of 1472 4660 hIPhQZD.exe 86 PID 4660 wrote to memory of 3920 4660 hIPhQZD.exe 87 PID 4660 wrote to memory of 3920 4660 hIPhQZD.exe 87 PID 1472 wrote to memory of 3972 1472 cmd.exe 89 PID 1472 wrote to memory of 3972 1472 cmd.exe 89 PID 3920 wrote to memory of 916 3920 explorer.exe 96 PID 3920 wrote to memory of 916 3920 explorer.exe 96 PID 392 wrote to memory of 3636 392 skotes.exe 97 PID 392 wrote to memory of 3636 392 skotes.exe 97 PID 392 wrote to memory of 3636 392 skotes.exe 97 PID 3920 wrote to memory of 2852 3920 explorer.exe 101 PID 3920 wrote to memory of 2852 3920 explorer.exe 101 PID 392 wrote to memory of 5040 392 skotes.exe 110 PID 392 wrote to memory of 5040 392 skotes.exe 110 PID 392 wrote to memory of 5040 392 skotes.exe 110 PID 392 wrote to memory of 540 392 skotes.exe 111 PID 392 wrote to memory of 540 392 skotes.exe 111 PID 392 wrote to memory of 540 392 skotes.exe 111 PID 540 wrote to memory of 2168 540 34e3814a34.exe 113 PID 540 wrote to memory of 2168 540 34e3814a34.exe 113 PID 540 wrote to memory of 2168 540 34e3814a34.exe 113 PID 540 wrote to memory of 2612 540 34e3814a34.exe 115 PID 540 wrote to memory of 2612 540 34e3814a34.exe 115 PID 540 wrote to memory of 2612 540 34e3814a34.exe 115 PID 540 wrote to memory of 744 540 34e3814a34.exe 117 PID 540 wrote to memory of 744 540 34e3814a34.exe 117 PID 540 wrote to memory of 744 540 34e3814a34.exe 117 PID 540 wrote to memory of 1820 540 34e3814a34.exe 119 PID 540 wrote to memory of 1820 540 34e3814a34.exe 119 PID 540 wrote to memory of 1820 540 34e3814a34.exe 119 PID 540 wrote to memory of 1020 540 34e3814a34.exe 121 PID 540 wrote to memory of 1020 540 34e3814a34.exe 121 PID 540 wrote to memory of 1020 540 34e3814a34.exe 121 PID 540 wrote to memory of 1732 540 34e3814a34.exe 123 PID 540 wrote to memory of 1732 540 34e3814a34.exe 123 PID 1732 wrote to memory of 676 1732 firefox.exe 124 PID 1732 wrote to memory of 676 1732 firefox.exe 124 PID 1732 wrote to memory of 676 1732 firefox.exe 124 PID 1732 wrote to memory of 676 1732 firefox.exe 124 PID 1732 wrote to memory of 676 1732 firefox.exe 124 PID 1732 wrote to memory of 676 1732 firefox.exe 124 PID 1732 wrote to memory of 676 1732 firefox.exe 124 PID 1732 wrote to memory of 676 1732 firefox.exe 124 PID 1732 wrote to memory of 676 1732 firefox.exe 124 PID 1732 wrote to memory of 676 1732 firefox.exe 124 PID 1732 wrote to memory of 676 1732 firefox.exe 124 PID 676 wrote to memory of 1920 676 firefox.exe 125 PID 676 wrote to memory of 1920 676 firefox.exe 125 PID 676 wrote to memory of 1920 676 firefox.exe 125 PID 676 wrote to memory of 1920 676 firefox.exe 125 PID 676 wrote to memory of 1920 676 firefox.exe 125 PID 676 wrote to memory of 1920 676 firefox.exe 125 PID 676 wrote to memory of 1920 676 firefox.exe 125 PID 676 wrote to memory of 1920 676 firefox.exe 125 PID 676 wrote to memory of 1920 676 firefox.exe 125 PID 676 wrote to memory of 1920 676 firefox.exe 125 PID 676 wrote to memory of 1920 676 firefox.exe 125 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Users\Admin\AppData\Local\Temp\1013196001\hIPhQZD.exe"C:\Users\Admin\AppData\Local\Temp\1013196001\hIPhQZD.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:\ProgramData\MicrosoftWorde\WindowsServer2024.exe','C:\ProgramData\WindowsSystem1\WindosCPUsystem.exe','C:\ProgramData'4⤵
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Add-MpPreference -ExclusionPath 'C:\ProgramData\MicrosoftWorde\WindowsServer2024.exe','C:\ProgramData\WindowsSystem1\WindosCPUsystem.exe','C:\ProgramData'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3972
-
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"4⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\ProgramData\WindowsSystem1\WindosCPUsystem.exe"C:\ProgramData\WindowsSystem1\WindosCPUsystem.exe" ""5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:916 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5200
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart6⤵PID:5444
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart7⤵PID:5564
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc6⤵
- Launches sc.exe
PID:5452
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc6⤵
- Launches sc.exe
PID:1804
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv6⤵
- Launches sc.exe
PID:5676
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits6⤵
- Launches sc.exe
PID:5632
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc6⤵
- Launches sc.exe
PID:5524
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 06⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:5776
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 06⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:5784
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 06⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:5792
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 06⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:5808
-
-
C:\Windows\explorer.exeexplorer.exe6⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:6008
-
-
-
C:\Windows\EXPLORER.EXEC:\Windows\EXPLORER.EXE {D4D7F2EA-38C9-468B-BF0E-B76E00A488F0}5⤵PID:2852
-
-
C:\Windows\EXPLORER.EXEC:\Windows\EXPLORER.EXE {D4D7F2EA-38C9-468B-BF0E-B76E00A488F0}5⤵PID:3948
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013205001\c73782a3e9.exe"C:\Users\Admin\AppData\Local\Temp\1013205001\c73782a3e9.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3636 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3636 -s 14804⤵
- Program crash
PID:2108
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013206001\159f69f755.exe"C:\Users\Admin\AppData\Local\Temp\1013206001\159f69f755.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5040
-
-
C:\Users\Admin\AppData\Local\Temp\1013207001\34e3814a34.exe"C:\Users\Admin\AppData\Local\Temp\1013207001\34e3814a34.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2168
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2612
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:744
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1820
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1020
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:676 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2032 -parentBuildID 20240401114208 -prefsHandle 1960 -prefMapHandle 1952 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {701e6dcc-05cd-4e0a-a389-800f86ee67fa} 676 "\\.\pipe\gecko-crash-server-pipe.676" gpu6⤵PID:1920
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2468 -parentBuildID 20240401114208 -prefsHandle 2444 -prefMapHandle 2432 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2af68bab-fbe0-419a-b218-4f34531ed56a} 676 "\\.\pipe\gecko-crash-server-pipe.676" socket6⤵PID:4416
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3212 -childID 1 -isForBrowser -prefsHandle 2636 -prefMapHandle 2792 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6fa68c45-217f-4e23-b322-a31f397301dc} 676 "\\.\pipe\gecko-crash-server-pipe.676" tab6⤵PID:5008
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4112 -childID 2 -isForBrowser -prefsHandle 4104 -prefMapHandle 3556 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0a167a77-b559-4d53-add0-1ed55c9a90fa} 676 "\\.\pipe\gecko-crash-server-pipe.676" tab6⤵PID:5112
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4924 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4884 -prefMapHandle 4900 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {42b6d41c-f365-4a8a-9cc1-88975216f7f9} 676 "\\.\pipe\gecko-crash-server-pipe.676" utility6⤵
- Checks processor information in registry
PID:5316
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5208 -childID 3 -isForBrowser -prefsHandle 5156 -prefMapHandle 4912 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7650320d-7a43-4249-97c6-4968d84f7cb1} 676 "\\.\pipe\gecko-crash-server-pipe.676" tab6⤵PID:5840
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5352 -childID 4 -isForBrowser -prefsHandle 5432 -prefMapHandle 5364 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c2cf5ba6-fc49-4905-abcc-d842d77394d5} 676 "\\.\pipe\gecko-crash-server-pipe.676" tab6⤵PID:5868
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5544 -childID 5 -isForBrowser -prefsHandle 5320 -prefMapHandle 5340 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {806ddcf1-3e4a-4c6c-bd80-0253534c2076} 676 "\\.\pipe\gecko-crash-server-pipe.676" tab6⤵PID:5884
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013208001\3749722329.exe"C:\Users\Admin\AppData\Local\Temp\1013208001\3749722329.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5580
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3636 -ip 36361⤵PID:2040
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5812
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5824
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1System Services
1Service Execution
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Power Settings
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Defense Evasion
Impair Defenses
3Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD5fd863bab145a20d25e45177da0e56efc
SHA1ed8b0421b30b2d3783dd1a4fcdce6e6860d7f6ad
SHA2569e96bfa5e3159b7b0beaa0c8a46a1783c900934aae56193e26eff8d4d85777a7
SHA5129a51e4cf363349df1e831153c107ed9caa75e0f6536e622585bc85531c1038a24be8fba0eee0d56dbbde3d3b116163467c8f8788d89af801f9c287ca294a6a64
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD5cadef9abd087803c630df65264a6c81c
SHA1babbf3636c347c8727c35f3eef2ee643dbcc4bd2
SHA256cce65b73cdfe9304bcd5207913e8b60fb69faa20cd3b684f2b0343b755b99438
SHA5127278aa87124abb382d9024a645e881e7b7cf1b84e8894943b36e018dbf0399e6858392f77980b599fa5488e2e21bf757a0702fe6419417edac93b68e0c2ec085
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\activity-stream.discovery_stream.json
Filesize18KB
MD5b71235643f4f54d071cb522e6f48bbb5
SHA1911acd281bef5eb6d154d44315a168d37182fe05
SHA256e00c2bdb60185c8ffbc9620575a3fe97a25383d96e32eea8e99a8315ad39a25c
SHA512a906daddd6b81f1084c94f4ed7872eb34617661b08a2cc10071cb1805df0ef52d2f67770b5079c20032f59d670b6e663b311caec72808dc3f232f131a993f38b
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD550925ab077e4ce75de9c40c856f7e918
SHA123eb7ba0efd520d7142f717bfa28ca510566ce02
SHA25643ff2f9830421f50c62642e1baa9882cf4b1626644922263a995704dd4f79ae1
SHA51200951de2d8496ff968949885f9cd62bc52a71da5010f144cfcb1c2cc31353912a13c7bcd943dcc05fbb7e2fab53dfb29e10b5233c083a0d76eff89623c3b4911
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
503KB
MD505bbeba85b66e05630ab53abe2f0864e
SHA15181b7d8e9ec8946ad3256b1b400e2f570dae8da
SHA256c2ee598db573b89211027b5607fb6561742991be3b9d5ed9e413a3c3d35da01b
SHA5123cfaacdc097d9d2bc866bf56bdce87647496b53e76415754e7269e611dfc4fe1b94a0674041dbbb24ab4366ae171fb3e1bdb1074b8eaf31f7f625a308c19da75
-
Filesize
1.8MB
MD5cd50f89bc78fc345fc42bed4f58b62a4
SHA1b3c8b6d64dd5f1340d0dc2e941537ceb2c2f8603
SHA256c2334c4ca0081adc9d3837249f757adc34e8e852fd5f09fc58b6905b4a50ea66
SHA512e31a6e2fa2c7e71bd7df699ec89d2dc4db0de2061bc7e1b685f352c93a99696502513e167fe5de7837502e2c32e275a3a94e6af93357df37dcd64997585d678d
-
Filesize
1.7MB
MD55282d7feebf600d675b428a5ae1f000c
SHA1d693c04b717704567d1e9165997e9c2fddd1b7f8
SHA2565af770df514a795074bf7c7baac9ce29f273da59c8a261664dc5eec3d35d1c28
SHA51239dcb5229d161cb9b951e241500374211e312558f50d6efb9a69a65e5acdae4363ee3ae14fd5f5a3817beed632f4918ace3614e519b0d2bbe8171b9c2131cb54
-
Filesize
947KB
MD50058d7be87c904c115a5dda9b7be5871
SHA1b960f0014cf0007b255021c957fe702f35f80f34
SHA2562115b25b75548379efe953476c966664483028eaa6d9aa620bb4577c533dca74
SHA5128cc073fcdca2acbaf094636c5e076c1be40fe17c7789d3692e0ff7d3d846d0bb617f5c5a8a6a1cfcc5539fd992a56a221e97bc97ea2d564ae2eb3771c7c775d2
-
Filesize
2.6MB
MD5c01830fa6ef79094622198f19113a8e5
SHA137fbf9a9a4e64aab140666af606c1f61326518a2
SHA2564e07c31165cb3f20aaf852290c5e867cdc4d0b141c7904155a1a0475c0f2f0ea
SHA512be940a0b8c09b52be8d36351c798828dca0ee8c1b9d207d8d9eb0cb6b1fcd5d8689d376fe0ff98ba52b086de01c344ad67a73a4683a41b62faff9d31e82c23da
-
Filesize
48KB
MD5349e6eb110e34a08924d92f6b334801d
SHA1bdfb289daff51890cc71697b6322aa4b35ec9169
SHA256c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a
SHA5122a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
3.1MB
MD568d337cefd0d798eae5bb67dabd97d11
SHA1a2c97610906991a227e52ccb7fc55fe8c2fe8774
SHA2568fc1bd816b1865518ff0620f8ac09a85aa3d8c5d660ba423b7d13b09f325baa9
SHA5120ae6f81307950d38c7fc78237720bbd55bac9244afe74101e12be868ab6f0c3a7bfaa641aa636a947e3c4934510200ebee2a2057eb5c37f98a3b4887d5e43929
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\AlternateServices.bin
Filesize6KB
MD5793b7132709efd0cddb0727b0088ae8d
SHA17ffac7ccc28722495bf35079b1e195726aa57dfe
SHA25676376bf9e1e4645c7aab1eeb8dc26c3944fab89aff8409353d2e9652c7e0fa81
SHA512d36d9d07a33fa01f34210ea901bee27a436981a912055652402599dee0820dbd08fcbd4826b57ba2363cc8791b916bd92b6bf1ff4fd15132caaa936752483183
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\AlternateServices.bin
Filesize10KB
MD54e92047701d191da585c3194d8f8dbf7
SHA1fa7751b3bd1f04b889be6b4436276af8024b8da2
SHA256ae41dc1b776611138bb807c40349a5ecbafd99f199565924faf47a9f9a3d8305
SHA512d503a449494f8c6b880786b3f9f243993ad1e64e65ffccf426051b2e9ebca36956811ebf02a206e8e38f287ac87c49ce11933830e1c6b117c056546b6447deb2
-
Filesize
224KB
MD56c4d9a49215a9a0d6f33ba0b9fd96495
SHA1ce5957dfddc9fe299c08da62d0787e4b12b1cadd
SHA2566781e5b33b2ed84857b0ecc76b0d5c44880deb286f3c104c91f0777b8b204e1e
SHA5120dca71cea092b7f33a2650ea1ee35e38b0dbb4201866489c4dd2604f6b68aff3ab39842bc3d3b33f695019013aa72fe6d872308353963d545c523778397c0637
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize3KB
MD59673a7710a61a58ec2f7eb55ab64fe78
SHA1da21954ba506ad111621880a7d551752ef63adba
SHA256c79be2e0cea6388baa21e7d6bf65f55868d4217a641c132fff294f9c073b79b8
SHA5125bea21dbe453788c3e2ddf36892ea303d7e38663f9698094a59562c6a2c81bec280c193ec97dc2dac1bffe88ad6a32c79a4fa8acc15c00beb6a4125238398c56
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD57475ffd5c7722b50f127794cb8584563
SHA18994f41d38ac777d138841ae2d7d7d3d804a4b36
SHA2569adf1412c9b6ac1cb2901c96477e9f1b86f0ab613db92e2e2b0fea5017999594
SHA512e948a3945604b5049a6da28811f97ec0fbded28dd6abb455b8b48d693a1de76ddbac33213eb1a71739897c908f05453c9f92e8b5f477a128d9e73a398b22b17f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD58034f65bfa1e94774e39199789a71d72
SHA1608711808a358e73bb542f544d440cce2cbe16f0
SHA256fdde974ab72c13304587424811e8f3cd0ed0e137ce7abb4616dfc1fde233f19f
SHA512c608172e4e253b78104f3f5410999bf341c5e46136007f4db29c7553fce2f5757c3b6702437689b264a108c3e638630277bd3420f38955017ca93ad166c896e3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD523ada41cc97943b2ac9f50e0c1eeb79d
SHA1cdeeb755f736ef077a089e14faf8f5fa5d1c81c1
SHA256357bafa02a40b4db759e11c181e8fc23d13faf8ea12a350f22c380bd23f25472
SHA51253ffeb7d5c628358a596f96078bb487d923b3c16ff8491ab9859bc2d1982128317e3e16c37998bf564249a51b7939ffc7ce0fb60e4d7e4e7796b58d29ef75ac8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\6af3c442-1bed-43c8-b3a1-69487e7b3a49
Filesize28KB
MD52b9d7f6f42f4f6680fdb6688d157e224
SHA1822e806850f8d65a5432622c45f244ce31efea00
SHA2569050ecf8679d4458004b278cb4cbc86f0cd00007f684ec9357f342615eb7a063
SHA512b0e7ba8ffbe44d0c92687862b1191153bc54b337d2eaa59e799feb0fb83503af3a179427f4fb0fdeb9218a1898dfbfbb78254d64d52099a3b1510c03aaf328e8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\b4e84b1c-f8d0-41f1-80b3-837a49f21910
Filesize671B
MD52a10053b2b27ad8e638c28d59f94acd1
SHA1a3e664c5fa10bf06ed7070122c54dcb135138acd
SHA2560eb31f8860876ecc9d9f97b5ddb3422f6d23ec3470e7636f325b27d3c5eaa739
SHA512023c68e37ac4115eddb259b0386211102b6db00db23598efcd3b9081329c9e291be370e187755784e32516cdad0bab3b0280806598938fb5ed1d9d1d068d61e0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\eff7c7da-701e-401b-8b94-998f0c59c56b
Filesize982B
MD55420a75c524b24aadc50c3b15ceb6d82
SHA12ce0f03f14d6d83009874f690b758219d24e2f30
SHA2560a7f25ae735a10227de83d2826c52378dea973c806f1cf2fb3c5e1c3ac297d34
SHA5128084cfa42b8398a27f8a3b1ae2046c4846aad13462f2a0ce776d9d49de3856653be3334f64d78f859f08948f6d3ffee88487de5d4344e92145d0716e1c2f6d33
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
11KB
MD5cdbcfb769919a0ead09a4d56220300bd
SHA18dce3030533acbc133dc2760bb7d2c9f42e18e83
SHA2566a3347482c2fb6dccc3b07c641a3bb532238df54f40bbc41e8e64626b6499883
SHA51252515cc451aa6ad95687e0c1b59ba0e92da677f9b673473dc589cd3bd725d96a31e2305f04a21e7cfde1cee95a5081313a4855ef2c481d212760bcc9abc1eeb3
-
Filesize
13KB
MD5fd7755ad70670797654d9fce78be22af
SHA18bb961bcd5c0451d55c15be3939898b7c18ff261
SHA256e07a8532b686b91eab18e264449be6ddda8d536b4b2f8fb478f44f16559f075a
SHA512c5663d174a59863270452c8b2ff859b47aadcf5831056c8907139dba344db8dd9dc69836a64bac0c107fe570ce676515473d413bb6fd6e94a4f09cc31d74c704
-
Filesize
10KB
MD58008dcf0b734182e30ea1510716ed20b
SHA186ee4a2937bd7e25dfe5cbc9bd3d6c73f6c0fe11
SHA25661fd45c0041d5918efd675dd53bcdb9ff3aac25414032382e6eeb45fc273c8b5
SHA512cf5175ef635773362700eb947f3dff87427086ea1325fcd33deb05c8c7b6475b2a907ce5a47fb87983185bdd8de2932462c99c2404947ddf26ca4b9e6981d76e
-
Filesize
10KB
MD5da63bc7698d41e36fb9abf3f5c3689b8
SHA1bcac5099b9f890d13f212bbdb3af3f341a9ddba2
SHA256baa4feb323426173b5dc96ed7a9c618c7ebc278cb315c865462e41dcc37b681c
SHA512f2077ca18692b10727bf0e2125fe8118e94a7d1161bc3f30a38ef8861ead70fdc683a6ca93542ebcad7d6cc1b1ba5edc8fc3fadd0bbea873abc76b6e3b46b930
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize904KB
MD552315f3465746977bc4868b03efe5957
SHA16e552161fe72ba559a47f4d7abbcaddf6d539421
SHA2566cfd57ca70c8346ee3b65f4cf782d31c1a72d074a8cc5354197fd8fd207913e3
SHA512f2b3b225781fa582ee46a9c4c3c40fa819eea1091ff22da0f6f18a00124f9713a1ea32674d5afc0a7c1963b5f758feff16b21f2aeb770c87bfe0597e4377541a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize1.5MB
MD5bcfd7f62b2d23f3efbb3f7aab77c8aa3
SHA1102091b018cb7d8b4b08f41ff77509c6fbc0ce2b
SHA25609708e3c790cb781a2b2d1452b8705f1896161e8fdf6ba72309d74fd1808cfa9
SHA512fbebbf4c4e128424338722948550d48fd8d5e0fb571ebc67b7c6f00f5fa00c427b91aaee9c59e1f6ef5a70022a7468abf86d3bd7e46dc1c628dc654f4d0d12f6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize2.1MB
MD5b62acbaaafb6c71ac1e4ff7d8dc4c68d
SHA1e1fcbc2ad7c771d156e828553bbe2d40bad45e7c
SHA2568c89d2648b95623473593a0ad3ffac73fd3096dada05aaaa08c87c25f1e97684
SHA51242e2d87718ff9238296f72edb4e598d30085a4b33e1eeaa059c56c48a1534dd37a83567669f8d635175b1ec35b183b50b7c9080629caa30b8575bbc26c19ca7a