Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-12-2024 16:07
Static task
static1
General
-
Target
file.exe
-
Size
3.1MB
-
MD5
21215739bb6d350c25a7e386f1efc041
-
SHA1
4365f766f0309f5182b4776e02605b80f48d9763
-
SHA256
6da9464cdfce2dc3d5bbcbcce04b4edb225106312be7bcd4d752c60ff05d0d05
-
SHA512
6d2115ed4b89ac86703ed92c63f17d6a8603a89d274e092df4dc058dbc8ea1731504e3828c9607dbbe97ea71132a340415843379cf535b4c78c6bb49d0acbf08
-
SSDEEP
49152:zjhnxXxn+K22mjWy2xAxCC1x17YnxocpJxM:zjhnxXx+KUWy2xtC1xmnx5
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
xworm
5.0
45.200.148.155:5050
i5ZVKLKJz2PVTovK
-
Install_directory
%AppData%
-
install_file
SecurityHealthSystray.exe
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
https://atten-supporse.biz/api
Extracted
lumma
https://atten-supporse.biz/api
https://se-blurry.biz/api
https://zinc-sneark.biz/api
Signatures
-
Amadey family
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/memory/1860-163-0x0000000000B30000-0x0000000000FBC000-memory.dmp family_xworm behavioral2/memory/1860-164-0x0000000000B30000-0x0000000000FBC000-memory.dmp family_xworm -
Gcleaner family
-
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c67b07f9a3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c67b07f9a3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c67b07f9a3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c67b07f9a3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c67b07f9a3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c67b07f9a3.exe -
Stealc family
-
Xworm family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9Qk4n8B.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2106ec87db.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 15a199d480.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c67b07f9a3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 01d8004ea9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3020 powershell.exe 2416 powershell.exe 3056 powershell.exe 1472 powershell.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c67b07f9a3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 01d8004ea9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 01d8004ea9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2106ec87db.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2106ec87db.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9Qk4n8B.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9Qk4n8B.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c67b07f9a3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 15a199d480.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 15a199d480.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation file.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 9Qk4n8B.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SecurityHealthSystray.lnk 9Qk4n8B.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SecurityHealthSystray.lnk 9Qk4n8B.exe -
Executes dropped EXE 11 IoCs
pid Process 1776 skotes.exe 928 ziNGMDa.exe 5072 ziNGMDa.exe 1860 9Qk4n8B.exe 3584 2106ec87db.exe 4840 01d8004ea9.exe 2976 15a199d480.exe 4848 8513fa6db5.exe 1652 c67b07f9a3.exe 5564 skotes.exe 3172 skotes.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine file.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine c67b07f9a3.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 9Qk4n8B.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 2106ec87db.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 01d8004ea9.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 15a199d480.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe -
Loads dropped DLL 9 IoCs
pid Process 5072 ziNGMDa.exe 5072 ziNGMDa.exe 5072 ziNGMDa.exe 5072 ziNGMDa.exe 5072 ziNGMDa.exe 5072 ziNGMDa.exe 5072 ziNGMDa.exe 5072 ziNGMDa.exe 5072 ziNGMDa.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c67b07f9a3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c67b07f9a3.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\01d8004ea9.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013464001\\01d8004ea9.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\15a199d480.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013465001\\15a199d480.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\8513fa6db5.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013466001\\8513fa6db5.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Users\\Admin\\AppData\\Roaming\\SecurityHealthSystray.exe" 9Qk4n8B.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\c67b07f9a3.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013467001\\c67b07f9a3.exe" skotes.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 23 ip-api.com -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0008000000023c96-315.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 3668 file.exe 1776 skotes.exe 1860 9Qk4n8B.exe 3584 2106ec87db.exe 4840 01d8004ea9.exe 2976 15a199d480.exe 1652 c67b07f9a3.exe 5564 skotes.exe 3172 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job file.exe -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral2/files/0x000a000000023b7c-30.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 3768 4840 WerFault.exe 105 5260 3584 WerFault.exe 101 -
System Location Discovery: System Language Discovery 1 TTPs 20 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8513fa6db5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c67b07f9a3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2106ec87db.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 15a199d480.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 8513fa6db5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9Qk4n8B.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 01d8004ea9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 8513fa6db5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 3396 taskkill.exe 3720 taskkill.exe 4504 taskkill.exe 4328 taskkill.exe 4648 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3728 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 39 IoCs
pid Process 3668 file.exe 3668 file.exe 1776 skotes.exe 1776 skotes.exe 1860 9Qk4n8B.exe 1860 9Qk4n8B.exe 3584 2106ec87db.exe 3584 2106ec87db.exe 3020 powershell.exe 3020 powershell.exe 3020 powershell.exe 4840 01d8004ea9.exe 4840 01d8004ea9.exe 2416 powershell.exe 2416 powershell.exe 2976 15a199d480.exe 2976 15a199d480.exe 2416 powershell.exe 3056 powershell.exe 3056 powershell.exe 3056 powershell.exe 1472 powershell.exe 1472 powershell.exe 1472 powershell.exe 4848 8513fa6db5.exe 4848 8513fa6db5.exe 1652 c67b07f9a3.exe 1652 c67b07f9a3.exe 1860 9Qk4n8B.exe 1860 9Qk4n8B.exe 4848 8513fa6db5.exe 4848 8513fa6db5.exe 1652 c67b07f9a3.exe 1652 c67b07f9a3.exe 1652 c67b07f9a3.exe 5564 skotes.exe 5564 skotes.exe 3172 skotes.exe 3172 skotes.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeDebugPrivilege 1860 9Qk4n8B.exe Token: SeDebugPrivilege 3020 powershell.exe Token: SeDebugPrivilege 2416 powershell.exe Token: SeDebugPrivilege 3056 powershell.exe Token: SeDebugPrivilege 4328 taskkill.exe Token: SeDebugPrivilege 1472 powershell.exe Token: SeDebugPrivilege 4648 taskkill.exe Token: SeDebugPrivilege 3396 taskkill.exe Token: SeDebugPrivilege 3720 taskkill.exe Token: SeDebugPrivilege 4504 taskkill.exe Token: SeDebugPrivilege 1860 9Qk4n8B.exe Token: SeDebugPrivilege 1188 firefox.exe Token: SeDebugPrivilege 1188 firefox.exe Token: SeDebugPrivilege 1652 c67b07f9a3.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 3668 file.exe 4848 8513fa6db5.exe 4848 8513fa6db5.exe 4848 8513fa6db5.exe 4848 8513fa6db5.exe 4848 8513fa6db5.exe 4848 8513fa6db5.exe 4848 8513fa6db5.exe 1188 firefox.exe 1188 firefox.exe 1188 firefox.exe 1188 firefox.exe 1188 firefox.exe 1188 firefox.exe 1188 firefox.exe 1188 firefox.exe 1188 firefox.exe 1188 firefox.exe 1188 firefox.exe 1188 firefox.exe 1188 firefox.exe 1188 firefox.exe 1188 firefox.exe 1188 firefox.exe 1188 firefox.exe 1188 firefox.exe 1188 firefox.exe 1188 firefox.exe 1188 firefox.exe 4848 8513fa6db5.exe 4848 8513fa6db5.exe 4848 8513fa6db5.exe 4848 8513fa6db5.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 4848 8513fa6db5.exe 4848 8513fa6db5.exe 4848 8513fa6db5.exe 4848 8513fa6db5.exe 4848 8513fa6db5.exe 4848 8513fa6db5.exe 4848 8513fa6db5.exe 1188 firefox.exe 1188 firefox.exe 1188 firefox.exe 1188 firefox.exe 1188 firefox.exe 1188 firefox.exe 1188 firefox.exe 1188 firefox.exe 1188 firefox.exe 1188 firefox.exe 1188 firefox.exe 1188 firefox.exe 1188 firefox.exe 1188 firefox.exe 1188 firefox.exe 1188 firefox.exe 1188 firefox.exe 1188 firefox.exe 1188 firefox.exe 1188 firefox.exe 4848 8513fa6db5.exe 4848 8513fa6db5.exe 4848 8513fa6db5.exe 4848 8513fa6db5.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1188 firefox.exe 1860 9Qk4n8B.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3668 wrote to memory of 1776 3668 file.exe 83 PID 3668 wrote to memory of 1776 3668 file.exe 83 PID 3668 wrote to memory of 1776 3668 file.exe 83 PID 1776 wrote to memory of 928 1776 skotes.exe 93 PID 1776 wrote to memory of 928 1776 skotes.exe 93 PID 928 wrote to memory of 5072 928 ziNGMDa.exe 98 PID 928 wrote to memory of 5072 928 ziNGMDa.exe 98 PID 1776 wrote to memory of 1860 1776 skotes.exe 100 PID 1776 wrote to memory of 1860 1776 skotes.exe 100 PID 1776 wrote to memory of 1860 1776 skotes.exe 100 PID 1776 wrote to memory of 3584 1776 skotes.exe 101 PID 1776 wrote to memory of 3584 1776 skotes.exe 101 PID 1776 wrote to memory of 3584 1776 skotes.exe 101 PID 1860 wrote to memory of 3020 1860 9Qk4n8B.exe 103 PID 1860 wrote to memory of 3020 1860 9Qk4n8B.exe 103 PID 1860 wrote to memory of 3020 1860 9Qk4n8B.exe 103 PID 1776 wrote to memory of 4840 1776 skotes.exe 105 PID 1776 wrote to memory of 4840 1776 skotes.exe 105 PID 1776 wrote to memory of 4840 1776 skotes.exe 105 PID 1776 wrote to memory of 2976 1776 skotes.exe 111 PID 1776 wrote to memory of 2976 1776 skotes.exe 111 PID 1776 wrote to memory of 2976 1776 skotes.exe 111 PID 1860 wrote to memory of 2416 1860 9Qk4n8B.exe 112 PID 1860 wrote to memory of 2416 1860 9Qk4n8B.exe 112 PID 1860 wrote to memory of 2416 1860 9Qk4n8B.exe 112 PID 1860 wrote to memory of 3056 1860 9Qk4n8B.exe 115 PID 1860 wrote to memory of 3056 1860 9Qk4n8B.exe 115 PID 1860 wrote to memory of 3056 1860 9Qk4n8B.exe 115 PID 1776 wrote to memory of 4848 1776 skotes.exe 118 PID 1776 wrote to memory of 4848 1776 skotes.exe 118 PID 1776 wrote to memory of 4848 1776 skotes.exe 118 PID 4848 wrote to memory of 4328 4848 8513fa6db5.exe 120 PID 4848 wrote to memory of 4328 4848 8513fa6db5.exe 120 PID 4848 wrote to memory of 4328 4848 8513fa6db5.exe 120 PID 1860 wrote to memory of 1472 1860 9Qk4n8B.exe 122 PID 1860 wrote to memory of 1472 1860 9Qk4n8B.exe 122 PID 1860 wrote to memory of 1472 1860 9Qk4n8B.exe 122 PID 4848 wrote to memory of 4648 4848 8513fa6db5.exe 124 PID 4848 wrote to memory of 4648 4848 8513fa6db5.exe 124 PID 4848 wrote to memory of 4648 4848 8513fa6db5.exe 124 PID 4848 wrote to memory of 3396 4848 8513fa6db5.exe 126 PID 4848 wrote to memory of 3396 4848 8513fa6db5.exe 126 PID 4848 wrote to memory of 3396 4848 8513fa6db5.exe 126 PID 4848 wrote to memory of 3720 4848 8513fa6db5.exe 128 PID 4848 wrote to memory of 3720 4848 8513fa6db5.exe 128 PID 4848 wrote to memory of 3720 4848 8513fa6db5.exe 128 PID 4848 wrote to memory of 4504 4848 8513fa6db5.exe 130 PID 4848 wrote to memory of 4504 4848 8513fa6db5.exe 130 PID 4848 wrote to memory of 4504 4848 8513fa6db5.exe 130 PID 4848 wrote to memory of 4644 4848 8513fa6db5.exe 132 PID 4848 wrote to memory of 4644 4848 8513fa6db5.exe 132 PID 4644 wrote to memory of 1188 4644 firefox.exe 133 PID 4644 wrote to memory of 1188 4644 firefox.exe 133 PID 4644 wrote to memory of 1188 4644 firefox.exe 133 PID 4644 wrote to memory of 1188 4644 firefox.exe 133 PID 4644 wrote to memory of 1188 4644 firefox.exe 133 PID 4644 wrote to memory of 1188 4644 firefox.exe 133 PID 4644 wrote to memory of 1188 4644 firefox.exe 133 PID 4644 wrote to memory of 1188 4644 firefox.exe 133 PID 4644 wrote to memory of 1188 4644 firefox.exe 133 PID 4644 wrote to memory of 1188 4644 firefox.exe 133 PID 4644 wrote to memory of 1188 4644 firefox.exe 133 PID 1188 wrote to memory of 540 1188 firefox.exe 134 PID 1188 wrote to memory of 540 1188 firefox.exe 134 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\1013433001\ziNGMDa.exe"C:\Users\Admin\AppData\Local\Temp\1013433001\ziNGMDa.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Users\Admin\AppData\Local\Temp\1013433001\ziNGMDa.exe"C:\Users\Admin\AppData\Local\Temp\1013433001\ziNGMDa.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5072
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013458001\9Qk4n8B.exe"C:\Users\Admin\AppData\Local\Temp\1013458001\9Qk4n8B.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\1013458001\9Qk4n8B.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3020
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '9Qk4n8B.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2416
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\SecurityHealthSystray.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3056
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'SecurityHealthSystray.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1472
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "SecurityHealthSystray" /tr "C:\Users\Admin\AppData\Roaming\SecurityHealthSystray.exe"4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3728
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013463001\2106ec87db.exe"C:\Users\Admin\AppData\Local\Temp\1013463001\2106ec87db.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3584 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3584 -s 6444⤵
- Program crash
PID:5260
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013464001\01d8004ea9.exe"C:\Users\Admin\AppData\Local\Temp\1013464001\01d8004ea9.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4840 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4840 -s 14884⤵
- Program crash
PID:3768
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013465001\15a199d480.exe"C:\Users\Admin\AppData\Local\Temp\1013465001\15a199d480.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2976
-
-
C:\Users\Admin\AppData\Local\Temp\1013466001\8513fa6db5.exe"C:\Users\Admin\AppData\Local\Temp\1013466001\8513fa6db5.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4328
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4648
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3396
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3720
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4504
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1984 -parentBuildID 20240401114208 -prefsHandle 1912 -prefMapHandle 1904 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {705307a7-01ec-411d-95b7-37873edf9b86} 1188 "\\.\pipe\gecko-crash-server-pipe.1188" gpu6⤵PID:540
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2436 -parentBuildID 20240401114208 -prefsHandle 2404 -prefMapHandle 2400 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1d24bd39-b8f4-4586-9a3c-648d269462ab} 1188 "\\.\pipe\gecko-crash-server-pipe.1188" socket6⤵PID:4396
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3252 -childID 1 -isForBrowser -prefsHandle 3244 -prefMapHandle 3240 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1260 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f3d75562-d5ed-4b64-a7e4-8325f6eec6b9} 1188 "\\.\pipe\gecko-crash-server-pipe.1188" tab6⤵PID:1504
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4172 -childID 2 -isForBrowser -prefsHandle 2588 -prefMapHandle 3956 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1260 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2484f23f-625c-41eb-bcdc-1329f3b21563} 1188 "\\.\pipe\gecko-crash-server-pipe.1188" tab6⤵PID:4376
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4940 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4912 -prefMapHandle 4920 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {eb666446-ee15-4b60-8cf5-430d4ffffc75} 1188 "\\.\pipe\gecko-crash-server-pipe.1188" utility6⤵
- Checks processor information in registry
PID:5840
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5216 -childID 3 -isForBrowser -prefsHandle 5208 -prefMapHandle 5204 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1260 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {193f9bf0-e507-4d59-b446-b98b797444a4} 1188 "\\.\pipe\gecko-crash-server-pipe.1188" tab6⤵PID:5784
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5428 -childID 4 -isForBrowser -prefsHandle 5508 -prefMapHandle 5504 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1260 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ffce80ae-4c06-4eb7-9c8a-40ec0d35f232} 1188 "\\.\pipe\gecko-crash-server-pipe.1188" tab6⤵PID:5108
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5700 -childID 5 -isForBrowser -prefsHandle 5620 -prefMapHandle 5628 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1260 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {61b77934-3ac1-4968-9d15-91f218c384ab} 1188 "\\.\pipe\gecko-crash-server-pipe.1188" tab6⤵PID:3012
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013467001\c67b07f9a3.exe"C:\Users\Admin\AppData\Local\Temp\1013467001\c67b07f9a3.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1652
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4840 -ip 48401⤵PID:3396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4840 -ip 48401⤵PID:1740
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3584 -ip 35841⤵PID:5272
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3172
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
18KB
MD5d8bf5e73fea1e4d990366c0bab0277d6
SHA1d559d61fbcebfcff72dcc9624c7514b5bdd8cb08
SHA256429c6aaa84e5e00d3d216dbd7b183b120efb1ba65874eac2617c4e814ade44ea
SHA5127c3a908abd793433229f22b86067563336eab935cca76f7b7569a74ee1c9f4987df0acfbbc7be63d5d693205d66e829ba6ebb23e388197a63f70481ce7db81c3
-
Filesize
18KB
MD56a49ddaaf39d92a82c835173fd159d18
SHA15f6b496c03a9391be77e89fd358ee12574597bcf
SHA256b07912ad86cfe7575358c9b99812dfdef38a04b7b1a72cbe9775908fed5ff60d
SHA51268902c4d2d135def13a8f844fdca8cf0e6ecf960f18c3d97b80ae9fcfa9e7ef1549969d8492a5a747478a23732fe8e2a11a03e8580e91d5807e56bfcab0935a1
-
Filesize
18KB
MD53d4de09493b56f782bbc13a808ce0726
SHA19d45592a506fefb2f8e9e7acb44255f56b988600
SHA256d1c568790d1015b1059768b3a36cae44dc7aaed2b642ddb9e94fcf90b6da4816
SHA5128ed04842f2ea95c76bbe7ff9076fadf972ee9f2ef7da7e229b0c9f273385942587bf43ec8cb837831980aece19bf61fc4203c60827fe0580fc56e9b5e4556a54
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\activity-stream.discovery_stream.json
Filesize19KB
MD5d3333a77cd6ba98a6aa7c12418b94342
SHA14f54b450c267b7a35304a2fd6b56b6955579dec6
SHA2563f10c184dfa269a7b7bc031a7651eecaf4d6c4114c939178a43dbb741cf7229b
SHA512c671169abdd13452540452d82353fd02df43bf1b2ac60b6dabccb4a8313e5ee22edbd44ba570258c97c12d203900a4aafa601c0e8dfb7e93fa25b6b822889cdd
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD58605b4704167b1fba0245b27c494c6f6
SHA1a21dcff72a936be9f909a339491795854474a0e0
SHA25699b4ff2d3cc82c685689bbffe1a8222ea9179eb90119a2064dab0c1e6b30b5c4
SHA5128b0859417b594bfdf9dcf74a43db1aa9464f975f9fb8aa4824db33b0d2042efa721de05316348dabb6ed2998e18879d798a06f63affbdd1529cdbb58a3b60124
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
9.9MB
MD553306653e88891da35bdfc1330a2dafd
SHA10870df54ca24e32bf88ccf00d7dd0ada3a0ea096
SHA256fc3471e819eafc1640b51c5c8d4bd36db60dc96d912769fa0dfd619f3ec6ff09
SHA512930ff27fc7377eaf0097cc6430f2c5486336c398a7ae08fadbcb0af62490b96c0b9ec3d36455c04e5a79d2405fc0c6f1f6a44b0298f3b6ff46f2a6c591aa51ba
-
Filesize
1.9MB
MD55d88053a8fa89daf50a22f3e7130b84f
SHA1376315c3b18c6d410a615dcc18dff4529f44ef9b
SHA25678d2025e6bfce4ee78142552e30d2eb07c9bb7901ec6407ab8ce5bba72c13074
SHA512f60af0d664d5a13555c21891a02fab76d7c63d45b6497e8c7da1cad3cc89223d1578c9b0a394fd23bb650777eb8f295cb372519db0c22a7061c0a4a0872261eb
-
Filesize
1.9MB
MD5e96cd9e1c8cbc927c9c445e155d5bd75
SHA16c8d7a80cb4635fda0f7b799ace942dcd10b3700
SHA2569f1169888c4c2acd65e79928bb27a686204fa3b622b921a7ee56c7a735924eb6
SHA512419cb0650a718f7356335745a64d441d8693c48181692bdfb22da508fa993e93772f5ee89ae5085e5ae3d04f28936b57e12e6704291be6acc45041744ba7f413
-
Filesize
1.8MB
MD5fc730cc04cea274ba94c95faad570950
SHA19959c1e33b3fe4f3e4da5e033f97a39004518b7d
SHA256478b4646887cf4961943568f8aef881f2991e0fffaf5d2592939724c6a8c2d78
SHA5125eb3af384e548e3ae02a1a0b972394b6a4b40798df44e379d50dd251c1f61eccc0d90460f966de2c3868ed9b521daae7e59c1eef449b02e884ffb96b408a7281
-
Filesize
1.7MB
MD5be752df2a3bae5d9fbd14d433b351967
SHA164355c823c38b257e469ff717c5ba8a9e0b0bbf2
SHA25608570ded4cf2c4a1d44b1837436d241c0392f3c9f35ff96da78ffc80dcdcf0fc
SHA512600cb7a8e7832f70909f53ea387c850d8a8b7e255d80f7049ff4833b198ae18cb817460e2343ff92021935c17d4845caa88ecf4ecbad8b832083d6f0fd83b151
-
Filesize
948KB
MD520f205ebc3ddeec636e52a437b8c3c9b
SHA1a7d0319411c2b8d115b5fb02f1ef63a37c7ea55f
SHA256d1f20d134a92d23683fc218749a27d327a9ac6a35cdcde8bded0854bc05ab3e8
SHA5122a7880884aabb5a5cd1677455c38f50d6e97d7ffe11688673f683c76031725fe068acfc0f530bd3d1d574d721566ef9308431595b09cff17840a294b5b19afcb
-
Filesize
2.7MB
MD543c842910f45deae72a62e0819adceb0
SHA1fffcc762a5d4753855e62bd845ad39e43c962097
SHA256aedb1af233367d2b3facb397055713f112e2fd833e625f07fff1ae723ebc4fb8
SHA512c9fca70038e11e562e613d13061e2b68c378ee16bddf7341ca81e3502e07f31d01431f8acb39d35d43444115d96a0ace52d81d352ccbddbbe66773f64cc73fc0
-
Filesize
94KB
MD5a87575e7cf8967e481241f13940ee4f7
SHA1879098b8a353a39e16c79e6479195d43ce98629e
SHA256ded5adaa94341e6c62aea03845762591666381dca30eb7c17261dd154121b83e
SHA512e112f267ae4c9a592d0dd2a19b50187eb13e25f23ded74c2e6ccde458bcdaee99f4e3e0a00baf0e3362167ae7b7fe4f96ecbcd265cc584c1c3a4d1ac316e92f0
-
Filesize
78KB
MD5bcf0d58a4c415072dae95db0c5cc7db3
SHA18ce298b7729c3771391a0decd82ab4ae8028c057
SHA256d7faf016ef85fdbb6636f74fc17afc245530b1676ec56fc2cc756fe41cd7bf5a
SHA512c54d76e50f49249c4e80fc6ce03a5fdec0a79d2ff0880c2fc57d43227a1388869e8f7c3f133ef8760441964da0bf3fc23ef8d3c3e72ce1659d40e8912cb3e9bc
-
Filesize
116KB
MD541a9708af86ae3ebc358e182f67b0fb2
SHA1accab901e2746f7da03fab8301f81a737b6cc180
SHA2560bd4ed11f2fb097f235b62eb26a00c0cb16815bbf90ab29f191af823a9fed8cf
SHA512835f9aa33fdfbb096c31f8ac9a50db9fac35918fc78bce03dae55ea917f738a41f01aee4234a5a91ffa5bdbbd8e529399205592eb0cae3224552c35c098b7843
-
Filesize
150KB
MD5ba3797d77b4b1f3b089a73c39277b343
SHA1364a052731cfe40994c6fef4c51519f7546cd0b1
SHA256f904b02720b6498634fc045e3cc2a21c04505c6be81626fe99bdb7c12cc26dc6
SHA5125688ae25405ae8c5491898c678402c7a62ec966a8ec77891d9fd397805a5cfcf02d7ae8e2aa27377d65e6ce05b34a7ffdedf3942a091741af0d5bce41628bf7d
-
Filesize
73KB
MD579c2ff05157ef4ba0a940d1c427c404e
SHA117da75d598deaa480cdd43e282398e860763297b
SHA256f3e0e2f3e70ab142e7ce1a4d551c5623a3317fb398d359e3bd8e26d21847f707
SHA512f91fc9c65818e74ddc08bbe1ccea49f5f60d6979bc27e1cdb2ef40c2c8a957bd3be7aea5036394abab52d51895290d245fd5c9f84cc3cc554597ae6f85c149e1
-
Filesize
812KB
MD5ab6d3149a35e6baddf630cdcefe0dab5
SHA144cdb197e8e549a503f6cfcb867a83bf2214d01c
SHA2561d91fa604893531393f83e03e68eb97d2c14c2d957ed33877d2b27b7c30ce059
SHA51228a882e86d92d42ff983b68445cc90431c2b65b7ec3abbffb5585a9750d67b8b52a1361e20d4d80ca4a30b927fe543a2e9c9a65c1846e42a112b511ddc59545a
-
Filesize
32KB
MD5eef7981412be8ea459064d3090f4b3aa
SHA1c60da4830ce27afc234b3c3014c583f7f0a5a925
SHA256f60dd9f2fcbd495674dfc1555effb710eb081fc7d4cae5fa58c438ab50405081
SHA512dc9ff4202f74a13ca9949a123dff4c0223da969f49e9348feaf93da4470f7be82cfa1d392566eaaa836d77dde7193fed15a8395509f72a0e9f97c66c0a096016
-
Filesize
187KB
MD5f3630fa0ca9cb85bfc865d00ef71f0aa
SHA1f176fdb823417abeb54daed210cf0ba3b6e02769
SHA256ac1dfb6cdeeadbc386dbd1afdda4d25ba5b9b43a47c97302830d95e2a7f2d056
SHA512b8472a69000108d462940f4d2b5a611e00d630df1f8d6041be4f7b05a9fd9f8e8aa5de5fe880323569ac1b6857a09b7b9d27b3268d2a83a81007d94a8b8da0ff
-
Filesize
4.2MB
MD5c6c37b848273e2509a7b25abe8bf2410
SHA1b27cfbd31336da1e9b1f90e8f649a27154411d03
SHA256b7a7f3707beab109b66de3e340e3022dd83c3a18f444feb9e982c29cf23c29b8
SHA512222ad791304963a4b8c1c6055e02c0c4c47fce2bb404bd4f89c022ff9706e29ca6fa36c72350fbf296c8a0e3e48e3756f969c003dd1eb056cd026efe0b7eba40
-
Filesize
25KB
MD5431464c4813ed60fbf15a8bf77b0e0ce
SHA19825f6a8898e38c7a7ddc6f0d4b017449fb54794
SHA2561f56df23a36132f1e5be4484582c73081516bee67c25ef79beee01180c04c7f0
SHA51253175384699a7bb3b93467065992753b73d8f3a09e95e301a1a0386c6a1224fa9ed8fa42c99c1ffbcfa6377b6129e3db96e23750e7f23b4130af77d14ac504a0
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
3.1MB
MD521215739bb6d350c25a7e386f1efc041
SHA14365f766f0309f5182b4776e02605b80f48d9763
SHA2566da9464cdfce2dc3d5bbcbcce04b4edb225106312be7bcd4d752c60ff05d0d05
SHA5126d2115ed4b89ac86703ed92c63f17d6a8603a89d274e092df4dc058dbc8ea1731504e3828c9607dbbe97ea71132a340415843379cf535b4c78c6bb49d0acbf08
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SecurityHealthSystray.lnk
Filesize876B
MD5ed36748ea523ca3eff2136ffa3378a7d
SHA15845f8a32d3a09254b309fe6633de69bb7a64df8
SHA256b6f8715028023e5528afa0bb90da8f304d6c0ca2aaa1ad2afca708956c57d3c8
SHA512558b11174272dd701ca9db45013beb5e58376a9fe35f7d1049155b2cb2e166bb3a8413a6f1871b58bfbc0b0f918712bdcc6814ff293b105082bd28b0b3670273
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin
Filesize6KB
MD5cdcf152e8e2c5f8fb92fab686a1cd034
SHA1dd0545f1ec5ef1c20baa61662eff8445934a037b
SHA256f0ba50f95c7604c1bd13a2260d71b06b16b3b1fd9b4315987c5a8b09b091efe1
SHA512005e7a9e730313edf9e666c921758c62db67f9de7a1ff469a63542292afb8e3928f78c33af94cccbe0c59c4a7bd0d53b8adaff1aa4660416166a320d03fdb5db
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin
Filesize8KB
MD5c0984333d10527e6c0d0f9b23fb65562
SHA1b7e3747e6a87a8e122be7bdedb1ffd989663bffd
SHA256669a6d601e4c4e092d4c2610c9b32f95c59510d878a3814ef00140143a870498
SHA512fb2fd9caf4133da2e41b0dc242ae072851f8d9f1ef89748e1c4391404ffa00ad87910b56013be3527bf094bdfd7aa55b5f303d15e6b48736dbeec52f4dc8bc8b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin
Filesize12KB
MD5915431021020f8b22b7a4cb87845e907
SHA1318734de4bdacd2ab23f50922943176ddc0f1a12
SHA25680e89dba499235003d36119e6d52ab615d8589e0f1c3f21adb1a8d25bfc22d2f
SHA5127b6bcd452ce6b124b08ad9d01907303168e4e0620ab4a13725c54c4f5f7ab78c98e8b67ee8a793671a0c47252f42767964e285a83497b48f21cf8a45249ed0d5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5d2b85480684c7a07a23d50958875d0cd
SHA185eda0685faf04ff8515cb1277ac0200ff15be05
SHA256a2e97ce5312f74e6a3ab7a2c60d367ea1e5b7d777d392487de1c7a581b3a9f51
SHA51273f791340e8bd22bb98d7af2c21cbc72a6cbf1ad0e514030acaed7974258812e3b6a588abcfa640a4311705b5ac6299aa11df8d435ccb09f6f53a754a83de8ff
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD50babc5ab1fe480aaabe0543b2d07a501
SHA1b7c41291414bd55e53b877869eab28ad8c3e01cb
SHA256165ea89ce4caa3cd61fb4bea3c8a81e410de6d78a7cafff339fabab1532b09a4
SHA5120fa1d8484a77881bbb2479ec91a961457bd09c4ee131ffe3c160f8899791fdc8b33a5223cb04fe00ac6343b84bef1f4d19100d01c14600bd227331963ab6969d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD53452e490442b02c04c96db8ee6b16872
SHA1bde4433d9bdd5bad6787590107e67a81c7511d25
SHA25621d1c0f5b3bbcfac5282d7ed3e5d48e297c46a1ecf3aeec6a07cc5ffbcc9382f
SHA512b5435b890a1d7ce23da0ba05b13b1deb76398540cc5cc9201009f2845f2baba99605ff5e24924b9df6c2a33e85fe5db7aadcc5dcb99eac29b56011b5220794c5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\10c13ab4-8a94-4d49-80f4-122a5946954e
Filesize671B
MD5e9540fc33e8ae0e80e525d2f216f6b73
SHA1b83aa2f33515c5347000e9b805d4b5bf0fff0eaa
SHA2560d5ad69678b3f29121ee64cab07f30f74cbbf0904b5c03458ffd56aa022021f4
SHA51298c6b482f031020b2169c2cf50c6e83f9d8ba696e1567be0031031ac6faabcb09ec2e92e25d2526d1fcd76dd3de7bc5db38d51732a45433465d1be23f156d1ae
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\a6e8de30-c10b-48e4-bb80-36688eb6e484
Filesize24KB
MD53b89c7f5c1dba4e24a0187f652cf5842
SHA152f2c2ad54a7fa632268496115d7d1dd7216b982
SHA256bbafb27be5da9bc58ea1378a4b2dc7a415ea275d8240c07e36cdae5948fd4893
SHA51251c1c1e80b9224ce887e4938a16d1c16458d2779eb535541b72db3845bd732f761b46f1ac6407a844a010e35ff8fb14cd9e1116919219e2573c2c47d5f6aac15
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\c28ce760-0cac-467f-88b6-080f5d42fe19
Filesize982B
MD5b359fc89547595a3aba1ccde60d1880a
SHA1f6aa78cb355fa85730d2853874af40fceb0c9b97
SHA256ed6eec33fc5e9cc59ed9d2416d2ed6796c578d1088949cb58d6c57ffb4072dad
SHA5123376f2179a1a43a126f94e18f1d025c6f4c83fdd57d01cb91b8ed1a6b8b3d16f43bf79783c627fe092ad836334b7bc9dea132986781f13c882ea26ebb61c4724
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
11KB
MD5e19183c2a0793971ea5fff8fd1aa5c48
SHA1ad54ee0b3ed5c99613e4e8c57ddc550628fc3b16
SHA256397fce39d99cbc21f5694d9c8e27cd070e97f10afbaeb9e058c665adaef80b01
SHA512638c9d7fa39bb13f8a15e77399596c03587bccdfca26abd0f077399dde6bbfb81dce292169b3dbda0bf56d346741bb967ed990468fb082f03db2b5c28792bde5
-
Filesize
15KB
MD5a78ba54eec7cf03c9c6d70db77246cf4
SHA1ce9038268b1d08f046e11b2b3297a69f1e158494
SHA256101b60cd4000a082d8e9144d967714c71424dc3384619f04927bb5a42218711a
SHA512fe756a9c5ef373b98875095b5015e50dc7a491066fce04f63e254b9d23db91a05e276a1ed58b88f68e1c71ddb9d387c529cbb255ffdf2c6e934a0f3356c572b9
-
Filesize
10KB
MD5870e40b2f56c7535f813a2b2befbb48c
SHA11649954cdeb7efef1bb45e32d1dd5887542b8f89
SHA256cca07f5fc447aaa018a463fe69d2e065ca0d905e6265366241daee7b1f5f0c45
SHA5120b609d8861a635d4e3fd0a59988da150b564cbf6732043c887df88acccface83e34b38138e037c1373195347e2fc222eb9679da50fac4c2eda24d981938b7fb3
-
Filesize
10KB
MD5b69b11765a26b49bbbd0e2975a6d140e
SHA12045491a4b7652cabfebc48fa2fbd6c85ea56637
SHA2566bf57676761448ced50c0d5773f1649c3ce4eae73a5a4d70cee72e709c54c2c2
SHA512545e51bf453db26a398f5929a5d32a7adb8b8cb01bce4228ea40a7642672272a237ff1bf485e529ba6ca8dced067f4fa6f413064dfdc24e20b9f386ffb428b72