Analysis
-
max time kernel
148s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-12-2024 02:35
Static task
static1
Behavioral task
behavioral1
Sample
536df3a39899dec8c749ef790bc7d55c8dc60052555c74fa2ed1f8518a2180eb.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
536df3a39899dec8c749ef790bc7d55c8dc60052555c74fa2ed1f8518a2180eb.exe
Resource
win10v2004-20241007-en
General
-
Target
536df3a39899dec8c749ef790bc7d55c8dc60052555c74fa2ed1f8518a2180eb.exe
-
Size
3.0MB
-
MD5
520ee940832d8a70cef812a75401009c
-
SHA1
83d76e5b100e044be166e1be2b30bf5f1eaf2332
-
SHA256
536df3a39899dec8c749ef790bc7d55c8dc60052555c74fa2ed1f8518a2180eb
-
SHA512
5b6e1e9495849c12e6e268c17347e4b3ce15c9b684e0697c524e5dbb7d8d0f9c5e14bdc2945e1c90949272893b911cef913becad4855fb58516784fd5b0d7217
-
SSDEEP
49152:2IX4k+/kZFoejWG7pFo4jjBuqNFrzrLujVUeTWDqHFC:2l1oFojG7pFo4jtuokSeqD
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
xworm
5.0
127.0.0.1:8080
101.99.92.189:8080
d5gQ6Zf7Tzih1Pi1
-
install_file
USB.exe
Extracted
lumma
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
https://atten-supporse.biz/api
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://atten-supporse.biz/api
https://covery-mover.biz/api
Signatures
-
Amadey family
-
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral2/memory/2368-1077-0x0000000009800000-0x000000000980E000-memory.dmp disable_win_def -
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/memory/2368-45-0x0000000000AE0000-0x0000000000F56000-memory.dmp family_xworm behavioral2/memory/2368-46-0x0000000000AE0000-0x0000000000F56000-memory.dmp family_xworm -
Gcleaner family
-
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a7da7bb347.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a7da7bb347.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a7da7bb347.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a7da7bb347.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a7da7bb347.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a7da7bb347.exe -
Stealc family
-
Xworm family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 536df3a39899dec8c749ef790bc7d55c8dc60052555c74fa2ed1f8518a2180eb.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d539ccf767.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9feskIx.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7f92435440.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a7da7bb347.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 69767e26ba.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1552 powershell.exe 4508 powershell.exe 5140 powershell.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts attrib.exe File opened for modification C:\Windows\System32\drivers\etc\hosts eursdi.exe File opened for modification C:\Windows\System32\drivers\etc\hosts attrib.exe -
Checks BIOS information in registry 2 TTPs 20 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 536df3a39899dec8c749ef790bc7d55c8dc60052555c74fa2ed1f8518a2180eb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 69767e26ba.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 69767e26ba.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 536df3a39899dec8c749ef790bc7d55c8dc60052555c74fa2ed1f8518a2180eb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d539ccf767.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d539ccf767.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a7da7bb347.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9feskIx.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9feskIx.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7f92435440.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7f92435440.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a7da7bb347.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 536df3a39899dec8c749ef790bc7d55c8dc60052555c74fa2ed1f8518a2180eb.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 9feskIx.exe -
Clipboard Data 1 TTPs 2 IoCs
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
pid Process 5568 powershell.exe 4608 cmd.exe -
Executes dropped EXE 14 IoCs
pid Process 956 skotes.exe 2368 9feskIx.exe 3452 c68e71d94c.exe 3732 skotes.exe 64 7f92435440.exe 404 d539ccf767.exe 3132 d7bdbbb224.exe 1076 a7da7bb347.exe 5960 69767e26ba.exe 3084 skotes.exe 3960 eursdi.exe 4240 eursdi.exe 5704 rar.exe 2348 skotes.exe -
Identifies Wine through registry keys 2 TTPs 10 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine d539ccf767.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 7f92435440.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine a7da7bb347.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 69767e26ba.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 536df3a39899dec8c749ef790bc7d55c8dc60052555c74fa2ed1f8518a2180eb.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 9feskIx.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe -
Loads dropped DLL 16 IoCs
pid Process 4240 eursdi.exe 4240 eursdi.exe 4240 eursdi.exe 4240 eursdi.exe 4240 eursdi.exe 4240 eursdi.exe 4240 eursdi.exe 4240 eursdi.exe 4240 eursdi.exe 4240 eursdi.exe 4240 eursdi.exe 4240 eursdi.exe 4240 eursdi.exe 4240 eursdi.exe 4240 eursdi.exe 4240 eursdi.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a7da7bb347.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a7da7bb347.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\7f92435440.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013887001\\7f92435440.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\d539ccf767.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013888001\\d539ccf767.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\d7bdbbb224.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013889001\\d7bdbbb224.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\a7da7bb347.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013890001\\a7da7bb347.exe" skotes.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 230 ip-api.com -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000023cfa-119.dat autoit_exe -
Enumerates processes with tasklist 1 TTPs 4 IoCs
pid Process 5596 tasklist.exe 6084 tasklist.exe 2164 tasklist.exe 1776 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
pid Process 3564 536df3a39899dec8c749ef790bc7d55c8dc60052555c74fa2ed1f8518a2180eb.exe 956 skotes.exe 2368 9feskIx.exe 3732 skotes.exe 64 7f92435440.exe 404 d539ccf767.exe 1076 a7da7bb347.exe 5960 69767e26ba.exe 3084 skotes.exe 2348 skotes.exe -
resource yara_rule behavioral2/files/0x0007000000024442-2928.dat upx behavioral2/memory/4240-2932-0x00007FFBF77D0000-0x00007FFBF7E92000-memory.dmp upx behavioral2/files/0x0007000000024435-2934.dat upx behavioral2/memory/4240-2939-0x00007FFC138B0000-0x00007FFC138BF000-memory.dmp upx behavioral2/files/0x000700000002443c-2955.dat upx behavioral2/files/0x000700000002443b-2954.dat upx behavioral2/files/0x000700000002443a-2953.dat upx behavioral2/files/0x0007000000024439-2952.dat upx behavioral2/files/0x0007000000024438-2951.dat upx behavioral2/files/0x0007000000024437-2950.dat upx behavioral2/files/0x0007000000024436-2949.dat upx behavioral2/files/0x0007000000024434-2948.dat upx behavioral2/files/0x0007000000024447-2947.dat upx behavioral2/memory/4240-2965-0x00007FFC0A8F0000-0x00007FFC0A914000-memory.dmp upx behavioral2/files/0x0007000000024446-2966.dat upx behavioral2/files/0x0007000000024445-2969.dat upx behavioral2/files/0x0007000000024441-2975.dat upx behavioral2/memory/4240-2977-0x00007FFBFAD30000-0x00007FFBFADFE000-memory.dmp upx behavioral2/memory/4240-2985-0x00007FFC0AB70000-0x00007FFC0AB95000-memory.dmp upx behavioral2/memory/4240-2984-0x00007FFC0E2F0000-0x00007FFC0E2FD000-memory.dmp upx behavioral2/memory/4240-2983-0x00007FFBFAC10000-0x00007FFBFAD2A000-memory.dmp upx behavioral2/memory/4240-2982-0x00007FFC061E0000-0x00007FFC061F4000-memory.dmp upx behavioral2/memory/4240-2981-0x00007FFBF77D0000-0x00007FFBF7E92000-memory.dmp upx behavioral2/memory/4240-2976-0x00007FFBF7290000-0x00007FFBF77C3000-memory.dmp upx behavioral2/memory/4240-2974-0x00007FFC06200000-0x00007FFC06233000-memory.dmp upx behavioral2/memory/4240-2973-0x00007FFC0E410000-0x00007FFC0E41D000-memory.dmp upx behavioral2/memory/4240-2972-0x00007FFC06240000-0x00007FFC06259000-memory.dmp upx behavioral2/files/0x000700000002443f-2971.dat upx behavioral2/memory/4240-2967-0x00007FFBFB400000-0x00007FFBFB57F000-memory.dmp upx behavioral2/memory/4240-2963-0x00007FFC0E4D0000-0x00007FFC0E4E9000-memory.dmp upx behavioral2/memory/4240-2962-0x00007FFC0AB40000-0x00007FFC0AB6C000-memory.dmp upx behavioral2/memory/4240-2938-0x00007FFC0AB70000-0x00007FFC0AB95000-memory.dmp upx behavioral2/files/0x0007000000024440-2937.dat upx behavioral2/memory/4240-3100-0x00007FFC0A8F0000-0x00007FFC0A914000-memory.dmp upx behavioral2/memory/4240-3101-0x00007FFBFB400000-0x00007FFBFB57F000-memory.dmp upx behavioral2/memory/4240-3105-0x00007FFC06200000-0x00007FFC06233000-memory.dmp upx behavioral2/memory/4240-3123-0x00007FFC0AB70000-0x00007FFC0AB95000-memory.dmp upx behavioral2/memory/4240-3122-0x00007FFBF77D0000-0x00007FFBF7E92000-memory.dmp upx behavioral2/memory/4240-3164-0x00007FFBFAC10000-0x00007FFBFAD2A000-memory.dmp upx behavioral2/memory/4240-3162-0x00007FFC061E0000-0x00007FFC061F4000-memory.dmp upx behavioral2/memory/4240-3150-0x00007FFBF77D0000-0x00007FFBF7E92000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 536df3a39899dec8c749ef790bc7d55c8dc60052555c74fa2ed1f8518a2180eb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5380 5960 WerFault.exe 127 -
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9feskIx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a7da7bb347.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 69767e26ba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 536df3a39899dec8c749ef790bc7d55c8dc60052555c74fa2ed1f8518a2180eb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7f92435440.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language d7bdbbb224.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c68e71d94c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d539ccf767.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d7bdbbb224.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage d7bdbbb224.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 2824 WMIC.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 5188 systeminfo.exe -
Kills process with taskkill 14 IoCs
pid Process 5788 taskkill.exe 5116 taskkill.exe 4508 taskkill.exe 4976 taskkill.exe 5852 taskkill.exe 2700 taskkill.exe 3900 taskkill.exe 3872 taskkill.exe 4572 taskkill.exe 1892 taskkill.exe 3904 taskkill.exe 3972 taskkill.exe 4412 taskkill.exe 5424 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2368 9feskIx.exe -
Suspicious behavior: EnumeratesProcesses 44 IoCs
pid Process 3564 536df3a39899dec8c749ef790bc7d55c8dc60052555c74fa2ed1f8518a2180eb.exe 3564 536df3a39899dec8c749ef790bc7d55c8dc60052555c74fa2ed1f8518a2180eb.exe 956 skotes.exe 956 skotes.exe 2368 9feskIx.exe 2368 9feskIx.exe 3732 skotes.exe 3732 skotes.exe 64 7f92435440.exe 64 7f92435440.exe 404 d539ccf767.exe 404 d539ccf767.exe 3132 d7bdbbb224.exe 3132 d7bdbbb224.exe 1076 a7da7bb347.exe 1076 a7da7bb347.exe 3132 d7bdbbb224.exe 3132 d7bdbbb224.exe 1076 a7da7bb347.exe 1076 a7da7bb347.exe 1076 a7da7bb347.exe 2368 9feskIx.exe 2368 9feskIx.exe 5960 69767e26ba.exe 5960 69767e26ba.exe 2368 9feskIx.exe 3084 skotes.exe 3084 skotes.exe 1552 powershell.exe 1552 powershell.exe 1552 powershell.exe 4508 powershell.exe 4508 powershell.exe 4508 powershell.exe 4508 powershell.exe 5568 powershell.exe 5568 powershell.exe 5568 powershell.exe 5140 powershell.exe 5140 powershell.exe 4632 powershell.exe 4632 powershell.exe 2348 skotes.exe 2348 skotes.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2700 taskkill.exe Token: SeDebugPrivilege 3900 taskkill.exe Token: SeDebugPrivilege 3872 taskkill.exe Token: SeDebugPrivilege 3972 taskkill.exe Token: SeDebugPrivilege 5116 taskkill.exe Token: SeDebugPrivilege 928 firefox.exe Token: SeDebugPrivilege 928 firefox.exe Token: SeDebugPrivilege 1076 a7da7bb347.exe Token: SeDebugPrivilege 2368 9feskIx.exe Token: SeDebugPrivilege 1552 powershell.exe Token: SeDebugPrivilege 4508 powershell.exe Token: SeDebugPrivilege 6084 tasklist.exe Token: SeDebugPrivilege 5596 tasklist.exe Token: SeIncreaseQuotaPrivilege 1544 WMIC.exe Token: SeSecurityPrivilege 1544 WMIC.exe Token: SeTakeOwnershipPrivilege 1544 WMIC.exe Token: SeLoadDriverPrivilege 1544 WMIC.exe Token: SeSystemProfilePrivilege 1544 WMIC.exe Token: SeSystemtimePrivilege 1544 WMIC.exe Token: SeProfSingleProcessPrivilege 1544 WMIC.exe Token: SeIncBasePriorityPrivilege 1544 WMIC.exe Token: SeCreatePagefilePrivilege 1544 WMIC.exe Token: SeBackupPrivilege 1544 WMIC.exe Token: SeRestorePrivilege 1544 WMIC.exe Token: SeShutdownPrivilege 1544 WMIC.exe Token: SeDebugPrivilege 1544 WMIC.exe Token: SeSystemEnvironmentPrivilege 1544 WMIC.exe Token: SeRemoteShutdownPrivilege 1544 WMIC.exe Token: SeUndockPrivilege 1544 WMIC.exe Token: SeManageVolumePrivilege 1544 WMIC.exe Token: 33 1544 WMIC.exe Token: 34 1544 WMIC.exe Token: 35 1544 WMIC.exe Token: 36 1544 WMIC.exe Token: SeDebugPrivilege 2164 tasklist.exe Token: SeDebugPrivilege 5568 powershell.exe Token: SeIncreaseQuotaPrivilege 1544 WMIC.exe Token: SeSecurityPrivilege 1544 WMIC.exe Token: SeTakeOwnershipPrivilege 1544 WMIC.exe Token: SeLoadDriverPrivilege 1544 WMIC.exe Token: SeSystemProfilePrivilege 1544 WMIC.exe Token: SeSystemtimePrivilege 1544 WMIC.exe Token: SeProfSingleProcessPrivilege 1544 WMIC.exe Token: SeIncBasePriorityPrivilege 1544 WMIC.exe Token: SeCreatePagefilePrivilege 1544 WMIC.exe Token: SeBackupPrivilege 1544 WMIC.exe Token: SeRestorePrivilege 1544 WMIC.exe Token: SeShutdownPrivilege 1544 WMIC.exe Token: SeDebugPrivilege 1544 WMIC.exe Token: SeSystemEnvironmentPrivilege 1544 WMIC.exe Token: SeRemoteShutdownPrivilege 1544 WMIC.exe Token: SeUndockPrivilege 1544 WMIC.exe Token: SeManageVolumePrivilege 1544 WMIC.exe Token: 33 1544 WMIC.exe Token: 34 1544 WMIC.exe Token: 35 1544 WMIC.exe Token: 36 1544 WMIC.exe Token: SeDebugPrivilege 1776 tasklist.exe Token: SeDebugPrivilege 4572 taskkill.exe Token: SeDebugPrivilege 4412 taskkill.exe Token: SeDebugPrivilege 5788 taskkill.exe Token: SeDebugPrivilege 1892 taskkill.exe Token: SeDebugPrivilege 4508 taskkill.exe Token: SeDebugPrivilege 5424 taskkill.exe -
Suspicious use of FindShellTrayWindow 31 IoCs
pid Process 3132 d7bdbbb224.exe 3132 d7bdbbb224.exe 3132 d7bdbbb224.exe 3132 d7bdbbb224.exe 3132 d7bdbbb224.exe 3132 d7bdbbb224.exe 928 firefox.exe 928 firefox.exe 928 firefox.exe 928 firefox.exe 928 firefox.exe 928 firefox.exe 928 firefox.exe 928 firefox.exe 928 firefox.exe 928 firefox.exe 928 firefox.exe 928 firefox.exe 928 firefox.exe 928 firefox.exe 928 firefox.exe 928 firefox.exe 928 firefox.exe 928 firefox.exe 928 firefox.exe 928 firefox.exe 928 firefox.exe 3132 d7bdbbb224.exe 3132 d7bdbbb224.exe 3132 d7bdbbb224.exe 3132 d7bdbbb224.exe -
Suspicious use of SendNotifyMessage 30 IoCs
pid Process 3132 d7bdbbb224.exe 3132 d7bdbbb224.exe 3132 d7bdbbb224.exe 3132 d7bdbbb224.exe 3132 d7bdbbb224.exe 3132 d7bdbbb224.exe 928 firefox.exe 928 firefox.exe 928 firefox.exe 928 firefox.exe 928 firefox.exe 928 firefox.exe 928 firefox.exe 928 firefox.exe 928 firefox.exe 928 firefox.exe 928 firefox.exe 928 firefox.exe 928 firefox.exe 928 firefox.exe 928 firefox.exe 928 firefox.exe 928 firefox.exe 928 firefox.exe 928 firefox.exe 928 firefox.exe 3132 d7bdbbb224.exe 3132 d7bdbbb224.exe 3132 d7bdbbb224.exe 3132 d7bdbbb224.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 928 firefox.exe 2368 9feskIx.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3564 wrote to memory of 956 3564 536df3a39899dec8c749ef790bc7d55c8dc60052555c74fa2ed1f8518a2180eb.exe 85 PID 3564 wrote to memory of 956 3564 536df3a39899dec8c749ef790bc7d55c8dc60052555c74fa2ed1f8518a2180eb.exe 85 PID 3564 wrote to memory of 956 3564 536df3a39899dec8c749ef790bc7d55c8dc60052555c74fa2ed1f8518a2180eb.exe 85 PID 956 wrote to memory of 2368 956 skotes.exe 87 PID 956 wrote to memory of 2368 956 skotes.exe 87 PID 956 wrote to memory of 2368 956 skotes.exe 87 PID 956 wrote to memory of 3452 956 skotes.exe 88 PID 956 wrote to memory of 3452 956 skotes.exe 88 PID 956 wrote to memory of 3452 956 skotes.exe 88 PID 956 wrote to memory of 64 956 skotes.exe 92 PID 956 wrote to memory of 64 956 skotes.exe 92 PID 956 wrote to memory of 64 956 skotes.exe 92 PID 956 wrote to memory of 404 956 skotes.exe 97 PID 956 wrote to memory of 404 956 skotes.exe 97 PID 956 wrote to memory of 404 956 skotes.exe 97 PID 956 wrote to memory of 3132 956 skotes.exe 100 PID 956 wrote to memory of 3132 956 skotes.exe 100 PID 956 wrote to memory of 3132 956 skotes.exe 100 PID 3132 wrote to memory of 2700 3132 d7bdbbb224.exe 102 PID 3132 wrote to memory of 2700 3132 d7bdbbb224.exe 102 PID 3132 wrote to memory of 2700 3132 d7bdbbb224.exe 102 PID 3132 wrote to memory of 3900 3132 d7bdbbb224.exe 107 PID 3132 wrote to memory of 3900 3132 d7bdbbb224.exe 107 PID 3132 wrote to memory of 3900 3132 d7bdbbb224.exe 107 PID 3132 wrote to memory of 3872 3132 d7bdbbb224.exe 109 PID 3132 wrote to memory of 3872 3132 d7bdbbb224.exe 109 PID 3132 wrote to memory of 3872 3132 d7bdbbb224.exe 109 PID 3132 wrote to memory of 3972 3132 d7bdbbb224.exe 111 PID 3132 wrote to memory of 3972 3132 d7bdbbb224.exe 111 PID 3132 wrote to memory of 3972 3132 d7bdbbb224.exe 111 PID 3132 wrote to memory of 5116 3132 d7bdbbb224.exe 113 PID 3132 wrote to memory of 5116 3132 d7bdbbb224.exe 113 PID 3132 wrote to memory of 5116 3132 d7bdbbb224.exe 113 PID 3132 wrote to memory of 1572 3132 d7bdbbb224.exe 115 PID 3132 wrote to memory of 1572 3132 d7bdbbb224.exe 115 PID 1572 wrote to memory of 928 1572 firefox.exe 116 PID 1572 wrote to memory of 928 1572 firefox.exe 116 PID 1572 wrote to memory of 928 1572 firefox.exe 116 PID 1572 wrote to memory of 928 1572 firefox.exe 116 PID 1572 wrote to memory of 928 1572 firefox.exe 116 PID 1572 wrote to memory of 928 1572 firefox.exe 116 PID 1572 wrote to memory of 928 1572 firefox.exe 116 PID 1572 wrote to memory of 928 1572 firefox.exe 116 PID 1572 wrote to memory of 928 1572 firefox.exe 116 PID 1572 wrote to memory of 928 1572 firefox.exe 116 PID 1572 wrote to memory of 928 1572 firefox.exe 116 PID 928 wrote to memory of 4008 928 firefox.exe 117 PID 928 wrote to memory of 4008 928 firefox.exe 117 PID 928 wrote to memory of 4008 928 firefox.exe 117 PID 928 wrote to memory of 4008 928 firefox.exe 117 PID 928 wrote to memory of 4008 928 firefox.exe 117 PID 928 wrote to memory of 4008 928 firefox.exe 117 PID 928 wrote to memory of 4008 928 firefox.exe 117 PID 928 wrote to memory of 4008 928 firefox.exe 117 PID 928 wrote to memory of 4008 928 firefox.exe 117 PID 928 wrote to memory of 4008 928 firefox.exe 117 PID 928 wrote to memory of 4008 928 firefox.exe 117 PID 928 wrote to memory of 4008 928 firefox.exe 117 PID 928 wrote to memory of 4008 928 firefox.exe 117 PID 928 wrote to memory of 4008 928 firefox.exe 117 PID 928 wrote to memory of 4008 928 firefox.exe 117 PID 928 wrote to memory of 4008 928 firefox.exe 117 PID 928 wrote to memory of 4008 928 firefox.exe 117 PID 928 wrote to memory of 4008 928 firefox.exe 117 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 5924 attrib.exe 5184 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\536df3a39899dec8c749ef790bc7d55c8dc60052555c74fa2ed1f8518a2180eb.exe"C:\Users\Admin\AppData\Local\Temp\536df3a39899dec8c749ef790bc7d55c8dc60052555c74fa2ed1f8518a2180eb.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Users\Admin\AppData\Local\Temp\1013829001\9feskIx.exe"C:\Users\Admin\AppData\Local\Temp\1013829001\9feskIx.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\eursdi.exe"C:\Users\Admin\AppData\Local\Temp\eursdi.exe"4⤵
- Executes dropped EXE
PID:3960 -
C:\Users\Admin\AppData\Local\Temp\eursdi.exe"C:\Users\Admin\AppData\Local\Temp\eursdi.exe"5⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
PID:4240 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\eursdi.exe'"6⤵PID:5468
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\eursdi.exe'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1552
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"6⤵PID:6004
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4508
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"6⤵PID:1532
-
C:\Windows\system32\tasklist.exetasklist /FO LIST7⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:6084
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"6⤵PID:4976
-
C:\Windows\system32\tasklist.exetasklist /FO LIST7⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:5596
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"6⤵PID:4592
-
C:\Windows\System32\Wbem\WMIC.exeWMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName7⤵
- Suspicious use of AdjustPrivilegeToken
PID:1544
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"6⤵
- Clipboard Data
PID:4608 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-Clipboard7⤵
- Clipboard Data
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5568
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"6⤵PID:5172
-
C:\Windows\system32\tasklist.exetasklist /FO LIST7⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2164
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"6⤵PID:2856
-
C:\Windows\system32\tree.comtree /A /F7⤵PID:876
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "systeminfo"6⤵PID:244
-
C:\Windows\system32\systeminfo.exesysteminfo7⤵
- Gathers system information
PID:5188
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /V DataBasePath"6⤵PID:2768
-
C:\Windows\system32\reg.exeREG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /V DataBasePath7⤵PID:220
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"6⤵PID:2388
-
C:\Windows\system32\tree.comtree /A /F7⤵PID:5744
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "attrib -r C:\Windows\System32\drivers\etc\hosts"6⤵PID:5212
-
C:\Windows\system32\attrib.exeattrib -r C:\Windows\System32\drivers\etc\hosts7⤵
- Drops file in Drivers directory
- Views/modifies file attributes
PID:5924
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"6⤵PID:968
-
C:\Windows\system32\tree.comtree /A /F7⤵PID:5616
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "attrib +r C:\Windows\System32\drivers\etc\hosts"6⤵PID:6020
-
C:\Windows\system32\attrib.exeattrib +r C:\Windows\System32\drivers\etc\hosts7⤵
- Drops file in Drivers directory
- Views/modifies file attributes
PID:5184
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"6⤵PID:2328
-
C:\Windows\system32\tree.comtree /A /F7⤵PID:4572
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"6⤵PID:3968
-
C:\Windows\system32\tasklist.exetasklist /FO LIST7⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1776
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"6⤵PID:4120
-
C:\Windows\system32\tree.comtree /A /F7⤵PID:5948
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"6⤵PID:2988
-
C:\Windows\system32\tree.comtree /A /F7⤵PID:6112
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 928"6⤵PID:2720
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 9287⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4572
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 4008"6⤵PID:448
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 40087⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4412
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 2968"6⤵PID:5272
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 29687⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5788
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 1796"6⤵PID:2832
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 17967⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1892
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 4504"6⤵PID:2056
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 45047⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4508
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 5352"6⤵PID:5968
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 53527⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5424
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 5808"6⤵PID:6052
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 58087⤵
- Kills process with taskkill
PID:4976
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 5820"6⤵PID:4484
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 58207⤵
- Kills process with taskkill
PID:5852
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 5836"6⤵PID:3944
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 58367⤵
- Kills process with taskkill
PID:3904
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "getmac"6⤵PID:4676
-
C:\Windows\system32\getmac.exegetmac7⤵PID:4168
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\_MEI39602\rar.exe a -r -hp"blank" "C:\Users\Admin\AppData\Local\Temp\UHIGl.zip" *"6⤵PID:5032
-
C:\Users\Admin\AppData\Local\Temp\_MEI39602\rar.exeC:\Users\Admin\AppData\Local\Temp\_MEI39602\rar.exe a -r -hp"blank" "C:\Users\Admin\AppData\Local\Temp\UHIGl.zip" *7⤵
- Executes dropped EXE
PID:5704
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic os get Caption"6⤵PID:5984
-
C:\Windows\System32\Wbem\WMIC.exewmic os get Caption7⤵PID:1740
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic computersystem get totalphysicalmemory"6⤵PID:736
-
C:\Windows\System32\Wbem\WMIC.exewmic computersystem get totalphysicalmemory7⤵PID:1132
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"6⤵PID:4684
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid7⤵PID:2672
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER"6⤵PID:848
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5140
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"6⤵PID:5864
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name7⤵
- Detects videocard installed
PID:2824
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault"6⤵PID:6076
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault7⤵
- Suspicious behavior: EnumeratesProcesses
PID:4632
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013886001\c68e71d94c.exe"C:\Users\Admin\AppData\Local\Temp\1013886001\c68e71d94c.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3452
-
-
C:\Users\Admin\AppData\Local\Temp\1013887001\7f92435440.exe"C:\Users\Admin\AppData\Local\Temp\1013887001\7f92435440.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:64
-
-
C:\Users\Admin\AppData\Local\Temp\1013888001\d539ccf767.exe"C:\Users\Admin\AppData\Local\Temp\1013888001\d539ccf767.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:404
-
-
C:\Users\Admin\AppData\Local\Temp\1013889001\d7bdbbb224.exe"C:\Users\Admin\AppData\Local\Temp\1013889001\d7bdbbb224.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2700
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3900
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3872
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3972
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5116
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1988 -parentBuildID 20240401114208 -prefsHandle 1904 -prefMapHandle 1896 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {41bf98ef-7058-43cb-93e6-8f45b5bd9d0e} 928 "\\.\pipe\gecko-crash-server-pipe.928" gpu6⤵PID:4008
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2448 -parentBuildID 20240401114208 -prefsHandle 2440 -prefMapHandle 2436 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {aa17db31-f8ba-40b4-bea4-2c118b1de4e1} 928 "\\.\pipe\gecko-crash-server-pipe.928" socket6⤵PID:2968
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3152 -childID 1 -isForBrowser -prefsHandle 3048 -prefMapHandle 3036 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 904 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {31dec566-2d16-4815-a296-c608ffe870ce} 928 "\\.\pipe\gecko-crash-server-pipe.928" tab6⤵PID:1796
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3812 -childID 2 -isForBrowser -prefsHandle 3292 -prefMapHandle 3296 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 904 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1746fca8-55d1-47ad-83fd-6682d8d3e3dc} 928 "\\.\pipe\gecko-crash-server-pipe.928" tab6⤵PID:4504
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4268 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4320 -prefMapHandle 4316 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ab56e747-39f0-43af-b9de-d8bc989ab9ab} 928 "\\.\pipe\gecko-crash-server-pipe.928" utility6⤵
- Checks processor information in registry
PID:5352
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5068 -childID 3 -isForBrowser -prefsHandle 5112 -prefMapHandle 5108 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 904 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {eed364d0-9697-4125-9296-55d09c978be7} 928 "\\.\pipe\gecko-crash-server-pipe.928" tab6⤵PID:5808
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5248 -childID 4 -isForBrowser -prefsHandle 5256 -prefMapHandle 5260 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 904 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {110aa993-cebd-4e13-9e85-2a79d0423570} 928 "\\.\pipe\gecko-crash-server-pipe.928" tab6⤵PID:5820
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5440 -childID 5 -isForBrowser -prefsHandle 5448 -prefMapHandle 5452 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 904 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e22a3293-5799-455f-98b9-5680e5ad08f6} 928 "\\.\pipe\gecko-crash-server-pipe.928" tab6⤵PID:5836
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013890001\a7da7bb347.exe"C:\Users\Admin\AppData\Local\Temp\1013890001\a7da7bb347.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1076
-
-
C:\Users\Admin\AppData\Local\Temp\1013891001\69767e26ba.exe"C:\Users\Admin\AppData\Local\Temp\1013891001\69767e26ba.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5960 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5960 -s 16924⤵
- Program crash
PID:5380
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3732
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 5960 -ip 59601⤵PID:2856
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3084
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2348
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD58740e7db6a0d290c198447b1f16d5281
SHA1ab54460bb918f4af8a651317c8b53a8f6bfb70cd
SHA256f45b0efc0833020dfeeaad0adc8ed10b0f85e0bc491baf9e1a4da089636bccf5
SHA512d91fe9666c4923c8e90e5a785db96e5613b8cb3bf28983296a2f381ccdcd73d15254268548e156c8150a9a531712602313ba65f74cec5784341c8d66b088750b
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
53KB
MD5124edf3ad57549a6e475f3bc4e6cfe51
SHA180f5187eeebb4a304e9caa0ce66fcd78c113d634
SHA256638c51e173ca6b3469494a7e2e0b656021a761f77b4a83f3e430e82e7b9af675
SHA512b6c1a9051feeffad54ba1092fd799d34a9578368d7e66b31780fe478c1def0eb4094dce2879003f7389f2f9d86b94a3ef3975e78092a604597841c9b8db120ee
-
Filesize
1KB
MD55db86fc670302485bd416612b16e8b7a
SHA187836833ef9019bc588a1fdb145afbdbcf297024
SHA256bf61bbdf0ba1779d57b34c4f5562f881c6ab4904b73ea971182c100a20eed9bc
SHA5127975a52ac981cc46d685cc30f76893af6a5fc765ad7e10a73120437b1a17ee934198f4ed3d7af8bddd70ca1849d4349941fd172681d890db371a516cf0eda840
-
Filesize
1KB
MD5eedf66a3aaed2f7160b1300c3d8e59a4
SHA10b61054757b5f47a4a43a4536ce191e72b528c76
SHA2561b403a90b632a76eca015dc7ea1d3a56576d91e3058f18202171b50c54e325c6
SHA512c9adce392b46c36b494f4fd3e4ba8d7dd3fa44bc37f29b2289c51b0d94849bb2ed54d74bd99ebb87aff757a1491b4b2d10c949b628b0ae6972a43836b8780f7d
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\activity-stream.discovery_stream.json
Filesize27KB
MD55cf81e76dd1c290c6e6450d9d03f5849
SHA176478de5d3b8bdd991be37e5ce0bc9002a635a4e
SHA25677dc75db36165050935f3a4ee7e1ef7126bd2770126d3a0c34ecbf014f00c932
SHA51258f8b5788922c1b36aa500e3064342f1786e1947ae940ef48e066d291564340dca5fc61b51ec1b74b13c038ce62735bf857709d123c9f4987f04cb7fa866e8a2
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD52692e2f86c1405680925c121d54308fa
SHA1f07aba530c3e3655eb46fc9881eae369f7c41086
SHA25690bb74182bd513a726048f35474e06539b658c8c7f30ca80e193433fbfc148fb
SHA5128818592a2604513890db300e7e652f941b7ed1c07470386e6e80246acd5cf07fa98f311d8d3927bfe6eaea8d5349fdd0c7a453c99c7882c3d0514e4355855f8a
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
1.8MB
MD558f824a8f6a71da8e9a1acc97fc26d52
SHA1b0e199e6f85626edebbecd13609a011cf953df69
SHA2565e5b808ed64c4f40e07a4894e1da294e364383f0a51adb7ec8c7568afba3eb17
SHA5127d6c752369ea83bad34873d8603c413e9372ff66adcaad11e7f23d3ce85827e057444b30eadf927329191825aef4dc37a1e68c30b71fae4ce6f53708102fb461
-
Filesize
2.5MB
MD52a78ce9f3872f5e591d643459cabe476
SHA19ac947dfc71a868bc9c2eb2bd78dfb433067682e
SHA25621a2ac44acd7a640735870eebfd04b8dc57bc66877cb5be3b929299e86a43dae
SHA51203e2cd8161a1394ee535a2ea7d197791ab715d69a02ffab98121ec5ac8150d2b17a9a32a59307042c4bbeffad7425b55efa047651de6ed39277dba80711454f9
-
Filesize
1.8MB
MD58acdb762884b5b158baa97ef82092801
SHA15f0e9409918f923e51e7c5443bd595fa3191aa37
SHA256cebd39057210ff489a2ce3bec47d182efdb42d1a44c6be80919bb7f15a653d8c
SHA51281a49ca000c783a3c1f86d23ad2d8572f0598a40cbf5feca9e467ca5d544c753a773f8ce481dcab0147711e5eeab743c86db1545a52d7ded51eff82f2690e736
-
Filesize
1.8MB
MD537b82918f398b44c105c640bfd4b4ae8
SHA17d3deaf1a4edda230934ef983cc9463bd71e5ac4
SHA2566383cde311a862695e4beb993b5a2942001d55cac0b5ee80ca604ebde00956b7
SHA5126fc57c3c156ca660fc5d5b7ac82f74c8ce10e5d73d60c83d7e41b98ddce9232c5c9e1f38dceafbdbdb34a4f11c311be43606fe2b4370272056eaa568081adb0a
-
Filesize
946KB
MD5fc26bdbe9ddeeed584ca0edf20262ab8
SHA1c8a690c697b674e7cd5b8bcebab365d743fd474b
SHA2567bc7da7d6376541a7b3579417c4d163d849387a7b6b5439b0c920a5cc2a26b79
SHA512ad7dfcd10809cf214d9c34ac8014425ff1b8d5075584d13ebe390c32df1635dc1b5505e1d056d6109d8eae7f9365bed4e1b27820239a2c0d58c859ce65c1a560
-
Filesize
2.6MB
MD5d8b1beccc9e24118b2900e055c0f140e
SHA13eb9bc1f9d257299978b859953deca573633eec5
SHA256bb4131b0ad63b9af95fef195a3dea480169d45d3237f4ecdb1cd47dd383bcdfa
SHA512e74d011a01e3e56cf7ddace6c25704930e5762a3352e81fddd54e440177540b812ce4a6e24a8bab4e78e6bafcf3324e6b0b1b4d631e027d27fee356bf3c90444
-
Filesize
1.9MB
MD56bdc7e5e568df98f51a6944d9f0249a9
SHA18178919986a2a8d9bd1f5870304d31e48abf10db
SHA256154cf5f9fd1654e63454e3a01100fb0f4b7bb846d17ea315c649700ab942fcd2
SHA5120c2f871b89b4c4792518db4d273714db193e6cd10463cdff8db3baf7f49256ae491eaaf5c39e5033b5f1767b227011a6f8a95f4685da892c35b1c2d23d28946d
-
Filesize
117KB
MD5862f820c3251e4ca6fc0ac00e4092239
SHA1ef96d84b253041b090c243594f90938e9a487a9a
SHA25636585912e5eaf83ba9fea0631534f690ccdc2d7ba91537166fe53e56c221e153
SHA5122f8a0f11bccc3a8cb99637deeda0158240df0885a230f38bb7f21257c659f05646c6b61e993f87e0877f6ba06b347ddd1fc45d5c44bc4e309ef75ed882b82e4e
-
Filesize
48KB
MD51d9398c54c80c0ef2f00a67fc7c9a401
SHA1858880173905e571c81a4a62a398923483f98e70
SHA25689006952bee2b38d1b5c54cc055d8868d06c43e94cd9d9e0d00a716c5f3856fa
SHA512806300d5820206e8f80639ccb1fba685aafa66a9528416102aeb28421e77784939285a88a67fad01b818f817a91382145322f993d855211f10e7ba3f5563a596
-
Filesize
59KB
MD52401460a376c597edce907f31ec67fbc
SHA17f723e755cb9bfeac79e3b49215dd41fdb5c2d90
SHA2564f3f99b69834c43dac5c3f309cb0bd56c07e8c2ac555de4923fa2ddc27801960
SHA5129e77d666c6b74cfb6287775333456cce43feb51ec39ad869c3350b1308e01ad9b9c476c8fa6251fe8ad4ab1175994902a4ad670493b95eb52adb3d4606c0b633
-
Filesize
107KB
MD5df361ea0c714b1a9d8cf9fcf6a907065
SHA1102115ec2e550a8a8cad5949530cca9993250c76
SHA256f78ee4524eb6e9885b9cbdb125b2f335864f51e9c36dc18fdccb5050926adffe
SHA512b1259df9167f89f8df82bda1a21a26ee7eb4824b97791e7bbaa3e57b50ae60676762fd598c8576d4e6330ffaf12972a31db2f17b244c5301dcf29fe4abfba43f
-
Filesize
35KB
MD5d4c05f1c17ac3eb482b3d86399c9baae
SHA181b9a3dd8a5078c7696c90fbd4cf7e3762f479a5
SHA25686bd72b13a47693e605a0de1112c9998d12e737644e7a101ac396d402e25cf2f
SHA512f81379d81361365c63d45d56534c042d32ee52cad2c25607794fe90057dcdeeb2b3c1ff1d2162f9c1bdf72871f4da56e7c942b1c1ad829c89bf532fb3b04242e
-
Filesize
86KB
MD5e0fa126b354b796f9735e07e306573e1
SHA118901ce5f9a1f6b158f27c4a3e31e183aa83251b
SHA256e0dc01233b16318cd21ca13570b8fdf4808657ec7d0cc3e7656b09ccf563dc3e
SHA512dd38100889c55bffc6c4b882658ecd68a79257bc1ffd10f0f46e13e79bff3fc0f908ae885cc4a5fed035bd399860b923c90ef75e203b076b14069bf87610f138
-
Filesize
26KB
MD584aa87c6dd11a474be70149614976b89
SHA1c31f98ec19fc36713d1d7d077ad4176db351f370
SHA2566066df940d183cf218a5053100e474d1f96be0a4e4ee7c09b31ea303ff56e21b
SHA51211b9f8e39c14c17788cc8f1fddd458d70b5f9ef50a3bdb0966548ddcb077ff1bf8ca338b02e45ec0b2e97a5edbe39481dd0e734119bc1708def559a0508adc42
-
Filesize
44KB
MD51d982f4d97ee5e5d4d89fe94b7841a43
SHA17f92fe214183a5c2a8979154ece86aad3c8120c6
SHA256368cf569adc4b8d2c981274f22181fea6e7ce4fa09b3a5d883b0ff0ba825049d
SHA5129ecdcf9b3e8dc7999d2fa8b3e3189f4b59ae3a088c4b92eaa79385ed412f3379ebe2f30245a95d158051dbd708a5c9941c150b9c3b480be7e1c2bba6dea5cb24
-
Filesize
57KB
MD53911ae916c6e4bf99fe3296c3e5828ca
SHA187165cbf8ea18b94216ac2d1ffe46f22eddb0434
SHA2563ec855c00585db0246b56f04d11615304931e03066cb9fc760ed598c34d85a1f
SHA5125c30ed540fdfa199cdf56e73c9a13e9ac098f47244b076c70056fd4bf46f5b059cb4b9cdb0e03568ca9c93721622c793d6c659704af400bd3e20767d1893827e
-
Filesize
66KB
MD568e9eb3026fa037ee702016b7eb29e1b
SHA160c39dec3f9fb84b5255887a1d7610a245e8562e
SHA2562ae5c1bdd1e691675bb028efd5185a4fa517ac46c9ef76af23c96344455ecc79
SHA51250a919a9e728350005e83d5dd51ebca537afe5eb4739fee1f6a44a9309b137bb1f48581bafa490b2139cf6f035d80379bf6ffcdff7f4f1a1de930ba3f508c1af
-
Filesize
1.3MB
MD5bed03063e08a571088685625544ce144
SHA156519a1b60314ec43f3af0c5268ecc4647239ba3
SHA2560d960743dbf746817b61ff7dd1c8c99b4f8c915de26946be56118cd6bedaebdc
SHA512c136e16db86f94b007db42a9bf485a7c255dcc2843b40337e8f22a67028117f5bd5d48f7c1034d7446bb45ea16e530f1216d22740ddb7fab5b39cc33d4c6d995
-
Filesize
108KB
MD5219d87feecd1ab8fac9cd8ede1f3fbd8
SHA1d1c3cab1817a3477d6d9326f1d8138bafe322f80
SHA2565ab78c548a9047e7936d7a94ef0d3454abe878ccc0efffa2b9562944a387e130
SHA5123cda1f230677753e0ce70deb583269645f04d9095596818f47c07314eed2e1f6b9498621022fdeff098799cac6446ab4c35888c44f9eac247444c6d3a532501b
-
Filesize
1.6MB
MD58377fe5949527dd7be7b827cb1ffd324
SHA1aa483a875cb06a86a371829372980d772fda2bf9
SHA25688e8aa1c816e9f03a3b589c7028319ef456f72adb86c9ddca346258b6b30402d
SHA512c59d0cbe8a1c64f2c18b5e2b1f49705d079a2259378a1f95f7a368415a2dc3116e0c3c731e9abfa626d12c02b9e0d72c98c1f91a359f5486133478144fa7f5f7
-
Filesize
29KB
MD508b000c3d990bc018fcb91a1e175e06e
SHA1bd0ce09bb3414d11c91316113c2becfff0862d0d
SHA256135c772b42ba6353757a4d076ce03dbf792456143b42d25a62066da46144fece
SHA5128820d297aeda5a5ebe1306e7664f7a95421751db60d71dc20da251bcdfdc73f3fd0b22546bd62e62d7aa44dfe702e4032fe78802fb16ee6c2583d65abc891cbf
-
Filesize
221KB
MD5b2e766f5cf6f9d4dcbe8537bc5bded2f
SHA1331269521ce1ab76799e69e9ae1c3b565a838574
SHA2563cc6828e7047c6a7eff517aa434403ea42128c8595bf44126765b38200b87ce4
SHA5125233c8230497aadb9393c3ee5049e4ab99766a68f82091fe32393ee980887ebd4503bf88847c462c40c3fc786f8d179dac5cb343b980944ade43bc6646f5ad5a
-
Filesize
1.7MB
MD52996cbf9598eb07a64d66d4c3aba4b10
SHA1ac176ab53cdef472770d27a38db5bd6eb71a5627
SHA256feba57a74856dedb9d9734d12c640ca7f808ead2db1e76a0f2bcf1e4561cd03f
SHA512667e117683d94ae13e15168c477800f1cd8d840e316890ec6f41a6e4cefd608536655f3f6d7065c51c6b1b8e60dd19aa44da3f9e8a70b94161fd7dc3abf5726c
-
Filesize
615KB
MD59c223575ae5b9544bc3d69ac6364f75e
SHA18a1cb5ee02c742e937febc57609ac312247ba386
SHA25690341ac8dcc9ec5f9efe89945a381eb701fe15c3196f594d9d9f0f67b4fc2213
SHA51257663e2c07b56024aaae07515ee3a56b2f5068ebb2f2dc42be95d1224376c2458da21c965aab6ae54de780cb874c2fc9de83d9089abf4536de0f50faca582d09
-
Filesize
467B
MD59795f79ddb61aa29027f4d68496b379c
SHA12b28db4d9ac8cffba73048444b1df25346f4ef32
SHA256e63f3d6710097498085564dfc85add6ed4cf44238c33d20820d2426abcee4e31
SHA512e44fbbc02da75d173c81bdfda9b14102997609af06fd50c51030430c3c80193dadb632592997361c79b0dfed50ccc0e1743c306a881401a1c78a6a7facb45d4d
-
Filesize
25KB
MD50433850f6f3ddd30a85efc839fbdb124
SHA107f092ae1b1efd378424ba1b9f639e37d1dc8cb9
SHA256290c0a19cd41e8b8570b8b19e09c0e5b1050f75f06450729726193cf645e406c
SHA5128e785085640db504496064a3c3d1b72feab6b3f0bc33676795601a67fcf410baa9a6cd79f6404829b47fd6afcd9a75494d0228d7109c73d291093cd6a42447ff
-
Filesize
643KB
MD519efdd227ee57e5181fa7ceb08a42aa1
SHA15737adf3a6b5d2b54cc1bace4fc65c4a5aafde50
SHA2568a77b2c76440365ee3e6e2f589a78ad53f2086b1451b5baa0c4bfe3b6ee1c49d
SHA51277db2fe6433e6a80042a091f86689186b877e28039a6aeaa8b2b7d67c8056372d04a1a8afdb9fe92cfaea30680e8afeb6b597d2ecf2d97e5d3b693605b392997
-
Filesize
295KB
MD5382cd9ff41cc49ddc867b5ff23ef4947
SHA17e8ef1e8eaae696aea56e53b2fb073d329ccd9d6
SHA2568915462bc034088db6fdb32a9b3e3fcfe5343d64649499f66ffb8ada4d0ad5f2
SHA5124e911b5fb8d460bfe5cb09eab74f67c0f4b5f23a693d1ff442379f49a97da8fed65067eb80a8dbeedb6feebc45f0e3b03958bd920d582ffb18c13c1f8c7b4fc4
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
3.0MB
MD5520ee940832d8a70cef812a75401009c
SHA183d76e5b100e044be166e1be2b30bf5f1eaf2332
SHA256536df3a39899dec8c749ef790bc7d55c8dc60052555c74fa2ed1f8518a2180eb
SHA5125b6e1e9495849c12e6e268c17347e4b3ce15c9b684e0697c524e5dbb7d8d0f9c5e14bdc2945e1c90949272893b911cef913becad4855fb58516784fd5b0d7217
-
Filesize
7.3MB
MD529713ebba8304896f257a90d12389de0
SHA18d5553b1931d7b1138163b681c191ee7f681ac83
SHA25694196eb7588daa100a08d5075e5e03b4ae5bc05eaacf3d9ce77c84eaa3d1e9cd
SHA512de2249cd067258e7a7bdb7f23f4d459ef4f1be0433fef7f6d3317b93c968a792f6ae8a8a6b6eab272b8e5047d6ff4099e6bee10c565d3fea7b6245edfaa3ac83
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin
Filesize6KB
MD525d88cd1c3226d0d9c12d0715b2c9301
SHA14ec940d5ba194682fd79348f53bf96678d2d4fdf
SHA256a47680b66314ea2a2569b7148fdd2a430a336a41795f30dde9c6c971cf8f7e5f
SHA512a74863bd8c09eba4c33dbd22b575068f92c65062390cfa2063aec27dcde309d525e7dce98a8b6e8e91153c61a738ab313ec519ac43e9f93b2ad34db7d9b077dc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin
Filesize8KB
MD539fb59aebd126991c80e652e6058ef61
SHA1c0aa5f92b1cd1f7113c9fc20e049165d51b58d58
SHA256d40d86a25f041d8d5b68427c4dd87ca512f42d7aefa89d3a79f8afd8aeb76d14
SHA5122a9c3cd5ef4e7a4412c57c1c89e211c3e1d418acd69bd3a675a47af903b734971c0e057e959eebbf1abdce021ebfd1a76a78d466b7b21935dc72f26340270726
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin
Filesize13KB
MD52ee778877da1714d2b92556600ffe983
SHA158daac9b4bcce79a1be6f9c41a638cfc1c1053ef
SHA2561aecccf27ab30e89463a44b31146b03fa85314693e8d48e23fb85be339a0039c
SHA51293e406a8bde41e5d7ba3429d750f62f75bd0f50eac23ad4b68f8c71634b902c0cee5682cb2e8aa0392ae1298609976b2ecd856c8394814c4f16d67b49a30707e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD5fc8a2cd8942f622ce7b68bb020e4ae2d
SHA18792bbbf07179785349e92d9ebabe12a324b8b01
SHA256cb1921ded0499d0d2cd65762ff415d7165a43572e496a6aebea0707a9d06d846
SHA5122bc34aaafefc367cfe680a483f91851715153110e894047cee67e42deef35872ead3128e389956c76c732f91de712949dc0a40814f8400c4bfda0cfe0fcf6a0b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize23KB
MD5349707e883f8f128fc930135c76af18f
SHA1bba1da64b5a7187608d185e682ad7b0a46cf3ab7
SHA256f315ab50b79ea8e0fbf1905c38499e99e08492e01a6fd20e27e3a4ae2197b85a
SHA51256a91a06e87ea0dc095adfb5d486d9a7de6ea0777bf264e206b45fa488d3be5488dc7658f71060fdb727d71e5e41441306df38be2a12c23ff3027fb4da0453e2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD54a0e4d2c69d4d0bad027325886b290a6
SHA114cb98c37ab21a0ad043596c8fb1163b6e050e91
SHA256e5512c36a00bbec2e02042ae3276b9722faf7c6d916fba4f4c52b91c5f706922
SHA5128df991635f6710cb4c89bbfd2b6843e7a9290a395c6476279a857b9c16b27dded5f11fcd8cc1e5d8ec4dfae12cc1b68f9fb894dea454cb56560db2ffcbdcb191
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD56228e77bcf29fae9907e4cb988c7ae21
SHA1474772e1606dac6714142d9c00306a0f1452e25d
SHA2564bc95b6ed0b0eda15e806346fc902b57cf6602d09ac49876e650beba3bf594c5
SHA5126de1e5d5062af5c1fe5b41ce6e14ccaf07490e65e975c3fa22f10e8ec3be80b7c7d641032e3e1af59092765ee079f61ea719aecac3820a01ea6e745f9b5c1d16
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\3552b2f0-ef9f-48bf-8cda-0c10a12fc4b3
Filesize982B
MD5619cf6a5a85cb98c50704857df01fc9d
SHA1aedffeca9fcc11e2c43f9f75a569f9a46e63f340
SHA2564ab0b48f4de29010e01f3bc40010e375b1c62067117b30309150154eb5a9a4b5
SHA51223ae0ebfdaab5979b7629cccf863feef8ef9bb51b1681f227305f528bdb6841a6cfbdcd2a817022e1faa5852f28ebb3ed34b1a7b9794983cc3d83894bb6c3198
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\ce7d4a6f-cf3c-456b-a812-cfa041eb6b62
Filesize659B
MD58130c2723d5fcd67b2bff680ee5e0ca4
SHA196a54d7293f7a867b237fa1141bea2b9a0bcd509
SHA256ff030498bbf8c14468167752b9b368d6dbf94fac7732f3c291b8606203092fec
SHA51202068e3eafd436633e5c007b5b4b7647f76b79ee791f97991a34c931882ccade26fa3e17a4ebdf19a742d8371f8200d6a8254e95b87d8ddb8c341e2bc7811578
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
13KB
MD53d9d67a9761dc3cd473cab93abdab07a
SHA1ea91d291aee28707f162f7a660c9c2a9cd517797
SHA25618a38a925fc5dceb8327a8cea730dcd36cbf05bb90d3f98d53d41ee49a0b87c7
SHA5127066fecd94a0935525fd38b47108ad5c0315429876148d5c2ca86596afee9d423dda40b71ced7f7aa815cbf02b2047e9b05dd8c2f332b365472645673e46fb08
-
Filesize
12KB
MD5f8b755b2e6d422d2eec62af5b5da84c5
SHA183af77c117d510a3196b82dd975fb049e016c07c
SHA256f470d61658a70843bbe29b16169cb323cf15c121a8bbfdbfa3ff7d92c2eb9020
SHA512dd1a629b56ab2a6d45b51af0aaf0cb0266746c909cea94e06241e01291b428f3ffe865504879fe5aa4925f75ed3e5fdddab8989f1758a8c6d418260656143ed0
-
Filesize
11KB
MD5b0fad62d5d254d081939de76aa24e148
SHA1cccc39165aae486d67335fa79bf935376e06fa56
SHA2564c611a39d92cc08d90075c923ea78e3a305a4d4753296fb6d8d004cba93441f6
SHA512849dddfccc473de45c8bc848bcc4ddaf355fae71079e4ad02e3aab2892bf33662c511bf1c1815c08c80f7fee43b2c86603bb2afacf7489470c189584199da940
-
Filesize
10KB
MD5c3b0ada99a0aaaa4f3b1f80f6e6f549b
SHA1be0d6792efd2ee0ad01f7f2d673b803577497cf9
SHA256f5044dfce12650cf2e4eb85ad65c0d9fe7eb8c5464fe775fcc85362713ffcdeb
SHA51299fc5d1023cd994f7dd6c77858f9eb1acd4c911e094ce849861727a8a186d83453bcbbd3a775b9476cb47c26f7f7e7fe9a4b0f78707afede44cc04a7c843de0a
-
Filesize
10KB
MD5ab1da2389f847cb0a1d61acc8a8da1cd
SHA1c1eb37596219aabded2f9c01b55940ebd80bb08e
SHA2560ffad5c6aefdbfa3d435691b2b7429d4b1404adbf32a3a8a5e4be21d6fedff69
SHA512cbfefde3795ad77de7d13ddee4e84a2a76bd70f09c70b3abd04917023f09d8ae0fc1277b2a7a4c5e7a8934be417d4ea46f73d9ff49e1ef9c1b2bcfe09d9c2498
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize2.7MB
MD5ef45b6b18e84c05c7874a68756c6eb71
SHA125301260956af1cf3ca342c987353fa631733e7e
SHA256dfa87280d6895ad3a6adf809190ebb612ac976461c13cb35c7ad69cfd1ddfff9
SHA512611dc327e69fc7e6eea6363c52d169887444a0372b6c81aad8652d306124979f6384caa3b86115ab2a8ca5243a65065c44254d03a9a0030993dc1553a449c760
-
Filesize
2KB
MD5f99e42cdd8b2f9f1a3c062fe9cf6e131
SHA1e32bdcab8da0e3cdafb6e3876763cee002ab7307
SHA256a040d43136f2f4c41a4875f895060fb910267f2ffad2e3b1991b15c92f53e0f0
SHA512c55a5e440326c59099615b21d0948cdc2a42bd9cf5990ec88f69187fa540d8c2e91aebe6a25ed8359a47be29d42357fec4bd987ca7fae0f1a6b6db18e1c320a6