Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12-12-2024 16:41
Static task
static1
General
-
Target
c8b6edfd82dcf1e45f50b9dad40c2308d453ab6fe0960699676644fa93ffb7ea.exe
-
Size
3.1MB
-
MD5
246d4d796a8c60130f37eb8360bb5886
-
SHA1
c70fb90648075e7ae02209c255a3a9d6633a942c
-
SHA256
c8b6edfd82dcf1e45f50b9dad40c2308d453ab6fe0960699676644fa93ffb7ea
-
SHA512
ccf941edd4ca07d9e3be0256922d0cd0436937fe60066850976ff0923e93149e6eb82e3b19f8314c18e483766904b89c494ed077ceabc43b6f2fca3e10183925
-
SSDEEP
49152:T7tKE9X6U2+JlULirs3m9RBJ3Z8eqg/mRRGMYw3TMAnsk5:fJ9KU2+JyLirCohpjmRRCquk
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
Signatures
-
Amadey family
-
Gcleaner family
-
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 2a9ff0e89a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 2a9ff0e89a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 2a9ff0e89a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 2a9ff0e89a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 2a9ff0e89a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 2a9ff0e89a.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2a9ff0e89a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 76b0363221.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c8b6edfd82dcf1e45f50b9dad40c2308d453ab6fe0960699676644fa93ffb7ea.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ cd312e741f.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 76b0363221.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 76b0363221.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2a9ff0e89a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c8b6edfd82dcf1e45f50b9dad40c2308d453ab6fe0960699676644fa93ffb7ea.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c8b6edfd82dcf1e45f50b9dad40c2308d453ab6fe0960699676644fa93ffb7ea.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cd312e741f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cd312e741f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2a9ff0e89a.exe -
Executes dropped EXE 14 IoCs
pid Process 2860 skotes.exe 2536 dwVrTdy.exe 2068 AzVRM7c.exe 2204 t5abhIx.exe 1744 graph.exe 3048 817c4e75dc.exe 884 graph.exe 2360 graph.exe 2344 1c8a700fa4.exe 2124 cd312e741f.exe 2300 2a9ff0e89a.exe 1640 76b0363221.exe 1492 765c3530e6.exe 3352 90a6b6a3ad.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine c8b6edfd82dcf1e45f50b9dad40c2308d453ab6fe0960699676644fa93ffb7ea.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine cd312e741f.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine 2a9ff0e89a.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine 76b0363221.exe -
Loads dropped DLL 19 IoCs
pid Process 2064 c8b6edfd82dcf1e45f50b9dad40c2308d453ab6fe0960699676644fa93ffb7ea.exe 2064 c8b6edfd82dcf1e45f50b9dad40c2308d453ab6fe0960699676644fa93ffb7ea.exe 2860 skotes.exe 2860 skotes.exe 2860 skotes.exe 2536 dwVrTdy.exe 2860 skotes.exe 2860 skotes.exe 2860 skotes.exe 2860 skotes.exe 2860 skotes.exe 2860 skotes.exe 2860 skotes.exe 2860 skotes.exe 2860 skotes.exe 2860 skotes.exe 2860 skotes.exe 2860 skotes.exe 1640 76b0363221.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 2a9ff0e89a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 2a9ff0e89a.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\Graph = "C:\\Program Files\\Windows Media Player\\graph\\graph.exe" t5abhIx.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\1c8a700fa4.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1014454001\\1c8a700fa4.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\cd312e741f.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1014455001\\cd312e741f.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\2a9ff0e89a.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1014456001\\2a9ff0e89a.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\Graph = "C:\\Program Files\\Windows Media Player\\graph\\graph.exe" dwVrTdy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\Graph = "C:\\Program Files\\Windows Media Player\\graph\\graph.exe" AzVRM7c.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 21 drive.google.com 7 drive.google.com 8 drive.google.com 18 drive.google.com -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 22 ipinfo.io 23 ipinfo.io 34 ipinfo.io 41 ipinfo.io -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0006000000019761-165.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 2064 c8b6edfd82dcf1e45f50b9dad40c2308d453ab6fe0960699676644fa93ffb7ea.exe 2860 skotes.exe 2124 cd312e741f.exe 2300 2a9ff0e89a.exe 1640 76b0363221.exe -
Drops file in Program Files directory 15 IoCs
description ioc Process File created C:\Program Files\Windows Media Player\1w4lv5IzuEVOMa3sjCc6orj2dWPvJoK5fzip AzVRM7c.exe File opened for modification C:\Program Files\Windows Media Player\1w4lv5IzuEVOMa3sjCc6orj2dWPvJoK5fzip AzVRM7c.exe File opened for modification C:\Program Files\Windows Media Player\1w4lv5IzuEVOMa3sjCc6orj2dWPvJoK5f AzVRM7c.exe File created C:\Program Files\Windows Media Player\graph\graph.exe dwVrTdy.exe File opened for modification C:\Program Files\Windows Media Player\1w4lv5IzuEVOMa3sjCc6orj2dWPvJoK5f dwVrTdy.exe File opened for modification C:\Program Files\Windows Media Player\1w4lv5IzuEVOMa3sjCc6orj2dWPvJoK5fzip t5abhIx.exe File opened for modification C:\Program Files\Windows Media Player\1w4lv5IzuEVOMa3sjCc6orj2dWPvJoK5f t5abhIx.exe File created C:\Program Files\Windows Media Player\1w4lv5IzuEVOMa3sjCc6orj2dWPvJoK5f dwVrTdy.exe File created C:\Program Files\Windows Media Player\graph\graph.exe AzVRM7c.exe File created C:\Program Files\Windows Media Player\1w4lv5IzuEVOMa3sjCc6orj2dWPvJoK5f AzVRM7c.exe File created C:\Program Files\Windows Media Player\graph\graph.exe t5abhIx.exe File created C:\Program Files\Windows Media Player\1w4lv5IzuEVOMa3sjCc6orj2dWPvJoK5fzip dwVrTdy.exe File opened for modification C:\Program Files\Windows Media Player\1w4lv5IzuEVOMa3sjCc6orj2dWPvJoK5fzip dwVrTdy.exe File created C:\Program Files\Windows Media Player\1w4lv5IzuEVOMa3sjCc6orj2dWPvJoK5f t5abhIx.exe File created C:\Program Files\Windows Media Player\1w4lv5IzuEVOMa3sjCc6orj2dWPvJoK5fzip t5abhIx.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job c8b6edfd82dcf1e45f50b9dad40c2308d453ab6fe0960699676644fa93ffb7ea.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 17 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cd312e741f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 90a6b6a3ad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c8b6edfd82dcf1e45f50b9dad40c2308d453ab6fe0960699676644fa93ffb7ea.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 1c8a700fa4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 76b0363221.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 1c8a700fa4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1c8a700fa4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a9ff0e89a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 817c4e75dc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 90a6b6a3ad.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 90a6b6a3ad.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1920 timeout.exe -
Kills process with taskkill 5 IoCs
pid Process 1572 taskkill.exe 2808 taskkill.exe 2152 taskkill.exe 1160 taskkill.exe 596 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_Classes\Local Settings firefox.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 dwVrTdy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 90a6b6a3ad.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 90a6b6a3ad.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 90a6b6a3ad.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 dwVrTdy.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2064 c8b6edfd82dcf1e45f50b9dad40c2308d453ab6fe0960699676644fa93ffb7ea.exe 2860 skotes.exe 2536 dwVrTdy.exe 2536 dwVrTdy.exe 2536 dwVrTdy.exe 2068 AzVRM7c.exe 2068 AzVRM7c.exe 2068 AzVRM7c.exe 2204 t5abhIx.exe 2204 t5abhIx.exe 2204 t5abhIx.exe 1744 graph.exe 1744 graph.exe 1744 graph.exe 884 graph.exe 1744 graph.exe 884 graph.exe 1744 graph.exe 2360 graph.exe 884 graph.exe 1744 graph.exe 2360 graph.exe 884 graph.exe 1744 graph.exe 2360 graph.exe 884 graph.exe 2360 graph.exe 1744 graph.exe 2344 1c8a700fa4.exe 884 graph.exe 2360 graph.exe 1744 graph.exe 884 graph.exe 2124 cd312e741f.exe 2360 graph.exe 1744 graph.exe 884 graph.exe 2360 graph.exe 1744 graph.exe 884 graph.exe 2360 graph.exe 1744 graph.exe 884 graph.exe 2360 graph.exe 1744 graph.exe 884 graph.exe 2360 graph.exe 2300 2a9ff0e89a.exe 1744 graph.exe 2344 1c8a700fa4.exe 884 graph.exe 2360 graph.exe 1744 graph.exe 884 graph.exe 2360 graph.exe 1744 graph.exe 884 graph.exe 2360 graph.exe 1744 graph.exe 884 graph.exe 2360 graph.exe 1640 76b0363221.exe 1744 graph.exe 2360 graph.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 596 taskkill.exe Token: SeDebugPrivilege 1572 taskkill.exe Token: SeDebugPrivilege 2808 taskkill.exe Token: SeDebugPrivilege 2152 taskkill.exe Token: SeDebugPrivilege 1160 taskkill.exe Token: SeDebugPrivilege 2044 firefox.exe Token: SeDebugPrivilege 2044 firefox.exe Token: SeDebugPrivilege 2300 2a9ff0e89a.exe -
Suspicious use of FindShellTrayWindow 20 IoCs
pid Process 2064 c8b6edfd82dcf1e45f50b9dad40c2308d453ab6fe0960699676644fa93ffb7ea.exe 2344 1c8a700fa4.exe 2344 1c8a700fa4.exe 2344 1c8a700fa4.exe 2344 1c8a700fa4.exe 2344 1c8a700fa4.exe 2344 1c8a700fa4.exe 2344 1c8a700fa4.exe 2344 1c8a700fa4.exe 2344 1c8a700fa4.exe 2344 1c8a700fa4.exe 2344 1c8a700fa4.exe 2344 1c8a700fa4.exe 2344 1c8a700fa4.exe 2344 1c8a700fa4.exe 2344 1c8a700fa4.exe 2044 firefox.exe 2044 firefox.exe 2044 firefox.exe 2044 firefox.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 2344 1c8a700fa4.exe 2344 1c8a700fa4.exe 2344 1c8a700fa4.exe 2344 1c8a700fa4.exe 2344 1c8a700fa4.exe 2344 1c8a700fa4.exe 2344 1c8a700fa4.exe 2344 1c8a700fa4.exe 2344 1c8a700fa4.exe 2344 1c8a700fa4.exe 2344 1c8a700fa4.exe 2344 1c8a700fa4.exe 2344 1c8a700fa4.exe 2344 1c8a700fa4.exe 2344 1c8a700fa4.exe 2044 firefox.exe 2044 firefox.exe 2044 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2064 wrote to memory of 2860 2064 c8b6edfd82dcf1e45f50b9dad40c2308d453ab6fe0960699676644fa93ffb7ea.exe 31 PID 2064 wrote to memory of 2860 2064 c8b6edfd82dcf1e45f50b9dad40c2308d453ab6fe0960699676644fa93ffb7ea.exe 31 PID 2064 wrote to memory of 2860 2064 c8b6edfd82dcf1e45f50b9dad40c2308d453ab6fe0960699676644fa93ffb7ea.exe 31 PID 2064 wrote to memory of 2860 2064 c8b6edfd82dcf1e45f50b9dad40c2308d453ab6fe0960699676644fa93ffb7ea.exe 31 PID 2860 wrote to memory of 2536 2860 skotes.exe 33 PID 2860 wrote to memory of 2536 2860 skotes.exe 33 PID 2860 wrote to memory of 2536 2860 skotes.exe 33 PID 2860 wrote to memory of 2536 2860 skotes.exe 33 PID 2860 wrote to memory of 2068 2860 skotes.exe 34 PID 2860 wrote to memory of 2068 2860 skotes.exe 34 PID 2860 wrote to memory of 2068 2860 skotes.exe 34 PID 2860 wrote to memory of 2068 2860 skotes.exe 34 PID 2860 wrote to memory of 2204 2860 skotes.exe 36 PID 2860 wrote to memory of 2204 2860 skotes.exe 36 PID 2860 wrote to memory of 2204 2860 skotes.exe 36 PID 2860 wrote to memory of 2204 2860 skotes.exe 36 PID 2536 wrote to memory of 1744 2536 dwVrTdy.exe 37 PID 2536 wrote to memory of 1744 2536 dwVrTdy.exe 37 PID 2536 wrote to memory of 1744 2536 dwVrTdy.exe 37 PID 2860 wrote to memory of 3048 2860 skotes.exe 38 PID 2860 wrote to memory of 3048 2860 skotes.exe 38 PID 2860 wrote to memory of 3048 2860 skotes.exe 38 PID 2860 wrote to memory of 3048 2860 skotes.exe 38 PID 2068 wrote to memory of 884 2068 AzVRM7c.exe 39 PID 2068 wrote to memory of 884 2068 AzVRM7c.exe 39 PID 2068 wrote to memory of 884 2068 AzVRM7c.exe 39 PID 2204 wrote to memory of 2360 2204 t5abhIx.exe 40 PID 2204 wrote to memory of 2360 2204 t5abhIx.exe 40 PID 2204 wrote to memory of 2360 2204 t5abhIx.exe 40 PID 2860 wrote to memory of 2344 2860 skotes.exe 41 PID 2860 wrote to memory of 2344 2860 skotes.exe 41 PID 2860 wrote to memory of 2344 2860 skotes.exe 41 PID 2860 wrote to memory of 2344 2860 skotes.exe 41 PID 2344 wrote to memory of 596 2344 1c8a700fa4.exe 42 PID 2344 wrote to memory of 596 2344 1c8a700fa4.exe 42 PID 2344 wrote to memory of 596 2344 1c8a700fa4.exe 42 PID 2344 wrote to memory of 596 2344 1c8a700fa4.exe 42 PID 2344 wrote to memory of 1572 2344 1c8a700fa4.exe 45 PID 2344 wrote to memory of 1572 2344 1c8a700fa4.exe 45 PID 2344 wrote to memory of 1572 2344 1c8a700fa4.exe 45 PID 2344 wrote to memory of 1572 2344 1c8a700fa4.exe 45 PID 2860 wrote to memory of 2124 2860 skotes.exe 47 PID 2860 wrote to memory of 2124 2860 skotes.exe 47 PID 2860 wrote to memory of 2124 2860 skotes.exe 47 PID 2860 wrote to memory of 2124 2860 skotes.exe 47 PID 2344 wrote to memory of 2808 2344 1c8a700fa4.exe 48 PID 2344 wrote to memory of 2808 2344 1c8a700fa4.exe 48 PID 2344 wrote to memory of 2808 2344 1c8a700fa4.exe 48 PID 2344 wrote to memory of 2808 2344 1c8a700fa4.exe 48 PID 2344 wrote to memory of 2152 2344 1c8a700fa4.exe 50 PID 2344 wrote to memory of 2152 2344 1c8a700fa4.exe 50 PID 2344 wrote to memory of 2152 2344 1c8a700fa4.exe 50 PID 2344 wrote to memory of 2152 2344 1c8a700fa4.exe 50 PID 2344 wrote to memory of 1160 2344 1c8a700fa4.exe 52 PID 2344 wrote to memory of 1160 2344 1c8a700fa4.exe 52 PID 2344 wrote to memory of 1160 2344 1c8a700fa4.exe 52 PID 2344 wrote to memory of 1160 2344 1c8a700fa4.exe 52 PID 2344 wrote to memory of 2832 2344 1c8a700fa4.exe 54 PID 2344 wrote to memory of 2832 2344 1c8a700fa4.exe 54 PID 2344 wrote to memory of 2832 2344 1c8a700fa4.exe 54 PID 2344 wrote to memory of 2832 2344 1c8a700fa4.exe 54 PID 2832 wrote to memory of 2044 2832 firefox.exe 55 PID 2832 wrote to memory of 2044 2832 firefox.exe 55 PID 2832 wrote to memory of 2044 2832 firefox.exe 55 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\c8b6edfd82dcf1e45f50b9dad40c2308d453ab6fe0960699676644fa93ffb7ea.exe"C:\Users\Admin\AppData\Local\Temp\c8b6edfd82dcf1e45f50b9dad40c2308d453ab6fe0960699676644fa93ffb7ea.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\1014430001\dwVrTdy.exe"C:\Users\Admin\AppData\Local\Temp\1014430001\dwVrTdy.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Program Files\Windows Media Player\graph\graph.exe"C:\Program Files\Windows Media Player\graph\graph.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1744
-
-
-
C:\Users\Admin\AppData\Local\Temp\1014431001\AzVRM7c.exe"C:\Users\Admin\AppData\Local\Temp\1014431001\AzVRM7c.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Program Files\Windows Media Player\graph\graph.exe"C:\Program Files\Windows Media Player\graph\graph.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:884
-
-
-
C:\Users\Admin\AppData\Local\Temp\1014432001\t5abhIx.exe"C:\Users\Admin\AppData\Local\Temp\1014432001\t5abhIx.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Program Files\Windows Media Player\graph\graph.exe"C:\Program Files\Windows Media Player\graph\graph.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2360
-
-
-
C:\Users\Admin\AppData\Local\Temp\1014453001\817c4e75dc.exe"C:\Users\Admin\AppData\Local\Temp\1014453001\817c4e75dc.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3048
-
-
C:\Users\Admin\AppData\Local\Temp\1014454001\1c8a700fa4.exe"C:\Users\Admin\AppData\Local\Temp\1014454001\1c8a700fa4.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:596
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1572
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2808
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2152
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1160
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2044 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2044.0.1131977905\1631002350" -parentBuildID 20221007134813 -prefsHandle 1208 -prefMapHandle 1100 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {4e3f687a-69df-4f0e-ba07-ba922bafc4c8} 2044 "\\.\pipe\gecko-crash-server-pipe.2044" 1316 13294a58 gpu6⤵PID:2452
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2044.1.515932265\1723413654" -parentBuildID 20221007134813 -prefsHandle 1504 -prefMapHandle 1500 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {982ac4c9-840c-435f-881b-1d8ba0a87499} 2044 "\\.\pipe\gecko-crash-server-pipe.2044" 1532 f4eb258 socket6⤵PID:1724
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2044.2.133800729\929212027" -childID 1 -isForBrowser -prefsHandle 2144 -prefMapHandle 2140 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 564 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8ff8b3ee-91ab-4518-a65f-f3e69807ff16} 2044 "\\.\pipe\gecko-crash-server-pipe.2044" 2156 19882c58 tab6⤵PID:1680
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2044.3.1955938142\851019631" -childID 2 -isForBrowser -prefsHandle 2796 -prefMapHandle 2792 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 564 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {001a68fb-ee4c-459e-ac12-030a3af12609} 2044 "\\.\pipe\gecko-crash-server-pipe.2044" 2808 e62f58 tab6⤵PID:696
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2044.4.1568939946\1462617947" -childID 3 -isForBrowser -prefsHandle 3600 -prefMapHandle 3972 -prefsLen 26531 -prefMapSize 233444 -jsInitHandle 564 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {64f55227-2243-442c-a322-7f84f6068334} 2044 "\\.\pipe\gecko-crash-server-pipe.2044" 1120 13296558 tab6⤵PID:2328
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2044.5.1130026759\1264948188" -childID 4 -isForBrowser -prefsHandle 1128 -prefMapHandle 1124 -prefsLen 26531 -prefMapSize 233444 -jsInitHandle 564 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {beac7240-e0f4-4892-b3a7-0576a5fb1522} 2044 "\\.\pipe\gecko-crash-server-pipe.2044" 3176 1f9ccb58 tab6⤵PID:2960
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2044.6.711777829\1255592531" -childID 5 -isForBrowser -prefsHandle 4068 -prefMapHandle 4060 -prefsLen 26531 -prefMapSize 233444 -jsInitHandle 564 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {2820c41c-cbac-4910-88ce-0a89551bae30} 2044 "\\.\pipe\gecko-crash-server-pipe.2044" 4136 1f9cc558 tab6⤵PID:1900
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1014455001\cd312e741f.exe"C:\Users\Admin\AppData\Local\Temp\1014455001\cd312e741f.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2124
-
-
C:\Users\Admin\AppData\Local\Temp\1014456001\2a9ff0e89a.exe"C:\Users\Admin\AppData\Local\Temp\1014456001\2a9ff0e89a.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2300
-
-
C:\Users\Admin\AppData\Local\Temp\1014457001\76b0363221.exe"C:\Users\Admin\AppData\Local\Temp\1014457001\76b0363221.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1640
-
-
C:\Users\Admin\AppData\Local\Temp\1014458001\765c3530e6.exe"C:\Users\Admin\AppData\Local\Temp\1014458001\765c3530e6.exe"3⤵
- Executes dropped EXE
PID:1492
-
-
C:\Users\Admin\AppData\Local\Temp\1014459001\90a6b6a3ad.exe"C:\Users\Admin\AppData\Local\Temp\1014459001\90a6b6a3ad.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies system certificate store
PID:3352 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\1014459001\90a6b6a3ad.exe" & rd /s /q "C:\ProgramData\V3E3OP8QIMOZ" & exit4⤵
- System Location Discovery: System Language Discovery
PID:2816 -
C:\Windows\SysWOW64\timeout.exetimeout /t 105⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1920
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153KB
MD5f89267b24ecf471c16add613cec34473
SHA1c3aad9d69a3848cedb8912e237b06d21e1e9974f
SHA25621f12abb6de14e72d085bc0bd90d630956c399433e85275c4c144cd9818cbf92
SHA512c29176c7e1d58dd4e1deafcbd72956b8c27e923fb79d511ee244c91777d3b3e41d0c3977a8a9fbe094bac371253481dde5b58abf4f2df989f303e5d262e1ce4d
-
Filesize
120KB
MD553e54ac43786c11e0dde9db8f4eb27ab
SHA19c5768d5ee037e90da77f174ef9401970060520e
SHA2562f606d24809902af1bb9cb59c16a2c82960d95bff923ea26f6a42076772f1db8
SHA512cd1f6d5f4d8cd19226151b6674124ab1e10950af5a049e8c082531867d71bfae9d7bc65641171fd55d203e4fba9756c80d11906d85a30b35ee4e8991adb21950
-
Filesize
854B
MD5e935bc5762068caf3e24a2683b1b8a88
SHA182b70eb774c0756837fe8d7acbfeec05ecbf5463
SHA256a8accfcfeb51bd73df23b91f4d89ff1a9eb7438ef5b12e8afda1a6ff1769e89d
SHA512bed4f6f5357b37662623f1f8afed1a3ebf3810630b2206a0292052a2e754af9dcfe34ee15c289e3d797a8f33330e47c14cbefbc702f74028557ace29bf855f9e
-
Filesize
717B
MD5822467b728b7a66b081c91795373789a
SHA1d8f2f02e1eef62485a9feffd59ce837511749865
SHA256af2343382b88335eea72251ad84949e244ff54b6995063e24459a7216e9576b9
SHA512bacea07d92c32078ca6a0161549b4e18edab745dd44947e5f181d28cc24468e07769d6835816cdfb944fd3d0099bde5e21b48f4966824c5c16c1801712303eb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD584525ac2c52cedf67aa38131b3f41efb
SHA1080afd23b33aabd0285594d580d21acde7229173
SHA256ae524d9d757bed48d552b059f951ffd25a7d963ae44a554cb1f3a9641e524080
SHA512d898b0913b4005bbbf22a5457ad1e86345860868bc2e53187ad8267c07824d592160a27d850978ebfe78392db784fffb80b73e27418d3a71708383d738ea1d57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6DA548C7E5915679F87E910D6581DEF1_19CA6F55DA8A3B0AB12F649B745C90D5
Filesize471B
MD5db2f924bc324ae41a21ff7c8e0072a5f
SHA164c572b53140e74fe1de076d5bcd92f66a3e716f
SHA256d50ea2b01b6944aeb7395ffe0849623c7d93db1422d0ce9e13e48783e5daf8fd
SHA51205f1ea9de09ea39461bf03f058df746dca8ac73b434e24fc316e1b35929bd24503ac80248d94b5f5dd564c72bdfab3bc6f6635d35e825aa97dcae3ada68b4d15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C02877841121CC45139CB51404116B25_6F7C58D8F5DC37AD0C4A3BEB81BE1660
Filesize472B
MD5c63ea05972017bcdd1beb71283b91587
SHA19fa26197d0eff7832e4cb81991713cac35ae5e35
SHA256ce02e101910f3b706cd4a36936408bd1cf065a7beae18716d9ce31991b647e10
SHA5128d89edc92a6a8d02e6491275e3e5a846f98bef077ca0aea352d4de45a79138d1e8fc26c310a37b50cfb4d746f7864747e3b0c98a89aa195fb58449bd72b7a985
-
Filesize
504B
MD57534282617c6278db5ebc9da5b2c673b
SHA14d804a0a0e7c4f0ab1791e9c68c58833d7fc7811
SHA2562904a768575e22df734148cd01c687a5dd23a6d2b378ad3a972f6e7f38fa77cc
SHA512c45746c38c1e8f0d694a05ef0785070b4f7e3df34a264a3693983d555232bc7b61e78e24187fce8e093448d1724f1226afc3baf262860ad75f076bf57f5929a0
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199
Filesize170B
MD5e005442fe4d4209a8a8212d9669cac39
SHA164ede0ce91161d2d76422ff62a656f90e706d504
SHA256f4b8b1cb2b7acb502a7040c89eada0d4add17f273544cc1a3e10018046a9b12e
SHA51239bbaca4084ba2920e219016ea48f60ddd92ff031bb3f8f6dcbfe0b0e1bd36ad2a6ef27ba0186b75d2cde5e1b1a0c81766fa5d1eb295916d835cf8a60753448d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751
Filesize192B
MD5a37bb1ae608fe11479255e565e609399
SHA1851c275e81e7cdfc0b78caff9ca6029e4c1f5459
SHA256f51e93e5d14584a4768c1b0ae854e15ce4d2843ce4bec5d3879bcd9426e03f8c
SHA5125c7898d5cfae31fca65ba1b48e6bcf7e909a15532bee0e9dca1601365f4309428d765f94172d49b6f49be6043c0f8850686ac238a8076d579e48eec7bb1406ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5af1472f7a015c93517aa3441c981676b
SHA1acd28b0de2a6c1f7777db7ed8c4f0c1294d5847e
SHA2560f97d721728f980e7ab4de1d0205149d8e821eb112c7a7b49572f26937a49425
SHA5128c1f95a2ba230f8302b6e574df86bd56e15b77c6bed90252f45eeaebf411211f5a601d7e963d0234dd36909db478abf6567cb1c7cd10123c2550a2c90e6fabcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6DA548C7E5915679F87E910D6581DEF1_19CA6F55DA8A3B0AB12F649B745C90D5
Filesize402B
MD5b49b1d72ecbafb44d09d3390cc913a2f
SHA17a2c4232dd059a42d8e0fc7479649c638d002340
SHA256b21b1fbeb379d9e1b424c508d035769cdd278444901344163f1321626d8c3d20
SHA512376127e629f79ad19e1d1d40d1bdd12c3713032bb429516a520bba8ec462d56b21f21ac2c0e62e0a784f14984d58123ccad0ae2f597b5a341d35b44e6aaec169
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d0e24d289d4d69fd85730c2dfe105f4
SHA18e69ebc60a591eb553c071007974d09e3f3cc394
SHA25696b18bbe3d30c3c3461ed0da6b0c12f59c22548176be4be2323a4a20e7bbd159
SHA5121396379e211858bd82be255a7e8f0502ebb951cea0cbfe69e18613115c343d41ba29da667988c82b11d70a8470bebf13553b7fa788c240d83e479f6cf5ea1e85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C02877841121CC45139CB51404116B25_6F7C58D8F5DC37AD0C4A3BEB81BE1660
Filesize398B
MD5f7102c186acf6486eec246279f077a0d
SHA194fc0557017c2eedfb2f65da4a978ebc99144c21
SHA256948d7281741316c1c9bc259d807ab12a21812704195b9ca80856c0051cf559fa
SHA5122ac142a7cb977da7a6d841b256e6590b011c33a0f7a657e03871951a287e4a5f2704e7759f01c2a0f4a490b12e333834d3ed5f83314860faf082e3af6463ab1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\D73CE810F817D372CC78C5824C36E338
Filesize550B
MD5467ebec168316ec9e403d46ab88b1868
SHA13bf4cc7b53bd7eee18e5a086c6fbd922ae3cda98
SHA256549b296333c7e241530a118a18ffcc37b8bf55c703b34a9ccfd42c75605a30ca
SHA51284143baf189ab56499f6313b6d1ad86682c5354fc903e28dd1523de9bb7e29b67d74b13893349fde8034fa6a6993e4f1b907ed007a26e9dfa3b1e63c6e2907b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD57f30184187cba0891c6c4d2cc863c0ef
SHA1f166c636a2c813eec0edbda471eede4e4b781d6b
SHA256cdc8c839cbfc5ebcadb2fcd504dd08fece165541ff87c89da69db9b5f91291bc
SHA5123b23e406454177cded530a147b842f1cb0d9f6d77c1865afb3fe5f458e00f124b0dc222da35ccc3ee31383b76f6ffefbbd4f5733a952934f05645c1db482664e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8P9TO0C6\download[1].htm
Filesize1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bhzluvd5.default-release\activity-stream.discovery_stream.json.tmp
Filesize23KB
MD58e4e3999cf7f4fca344fd125b116f5fe
SHA1769431ad92d4290be5072d3b28422c87310eeb92
SHA2564f995ec8d7854de8e26aad751733f144a0130711db851176cab86556d4c6b67b
SHA512b6cdb753bcacf60f80367eab4eac1e89df6076f5e762a454f8feb2a1ae60926f1a9a74c1a1f6a300bdff7209313a1f02ffd17f155366e97a9301416df029b547
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bhzluvd5.default-release\cache2\entries\37373F56CBD822F5FCF64BA01E1320A0924D8460
Filesize24KB
MD5aab36b60b250014e34f6b0047ccee924
SHA15ae2af8b5212ffb7a0d986c876d749e268420b48
SHA2563b63f43103e4cf0af2a2d71b05d42d641a5c26fc8f4d22eb4297c301a0b7a7c6
SHA512aef28e2bca060d4b0862b87b054dc32449bd3c6080b928791c50700bba9a924efeed5b1a3763504b50a68857e6846251cbbd07e68f05d759e83977a171596f8e
-
Filesize
591KB
MD53567cb15156760b2f111512ffdbc1451
SHA12fdb1f235fc5a9a32477dab4220ece5fda1539d4
SHA2560285d3a6c1ca2e3a993491c44e9cf2d33dbec0fb85fdbf48989a4e3b14b37630
SHA512e7a31b016417218387a4702e525d33dd4fe496557539b2ab173cec0cb92052c750cfc4b3e7f02f3c66ac23f19a0c8a4eb6c9d2b590a5e9faeb525e517bc877ba
-
Filesize
2.5MB
MD52a78ce9f3872f5e591d643459cabe476
SHA19ac947dfc71a868bc9c2eb2bd78dfb433067682e
SHA25621a2ac44acd7a640735870eebfd04b8dc57bc66877cb5be3b929299e86a43dae
SHA51203e2cd8161a1394ee535a2ea7d197791ab715d69a02ffab98121ec5ac8150d2b17a9a32a59307042c4bbeffad7425b55efa047651de6ed39277dba80711454f9
-
Filesize
947KB
MD5124221b530ca975f2847f8f37293111b
SHA15e51ff04704116f685e51409df3f90fbc9b2a550
SHA25696112838ce17a15021afa6dad493c52fa89486c2a145d658966c6618093635e3
SHA512ef1be3caef75db15ae5d6d611c72f3d0bbaa859ff64bb0d1cce84e8fa82bbc8ad3a8b15aed97a7faf8628f2a65d9bf78fddd255352fdb459e4c4405b46f98aaf
-
Filesize
1.7MB
MD51d022feb615d7bc2b68fe3d3eeb04921
SHA1bad8cefaf250def08f368ebb558285fa5b588a4a
SHA256db0ca2c1391a29c5a722759fc674ec107d74896e5482c6a162c2df217be81eac
SHA5120897ff04f983bec1cb724ff02cc62f31caa235580dff5a6be2629b890823c86d22ecf987e5f90e2e0cf7ab415898062e2ffa5d39405a2303c9c972587d2b4262
-
Filesize
2.6MB
MD5b83f4d636b204a22d535b3b01400a11f
SHA1c7de68bbb979518f390bc772108bdebd44190418
SHA256aa00b8a349233296d94d75878cda333ed85c77739deed7ca59bbeb8d7084dde2
SHA512c1cb2b31e01793c5e93a57f037963feefb5877978417ac5cceeef6e61391c2aa0b91e67fbd7ba8206092dc18e5f3d4371e11989d7b3163357425d863774a7194
-
Filesize
1.9MB
MD55a3f6aa1107d91bdc0430e2a0c1f4f26
SHA1316139dd3edcd5af3a8afbd89e44ac10bb8e87e7
SHA256f43ded143a77002b6aa1b860aecca5b94e00a601d1db104d04423e3b5e0261ca
SHA512712f40770c3d645e54aac46ecb6cf51065ae30253e39e5fda861191d23aa2be2bb1d1e69043610f9ad22f2c86c532c759c2a4e06277b85c056e1c9f097c9143a
-
Filesize
710KB
MD528e568616a7b792cac1726deb77d9039
SHA139890a418fb391b823ed5084533e2e24dff021e1
SHA2569597798f7789adc29fbe97707b1bd8ca913c4d5861b0ad4fdd6b913af7c7a8e2
SHA51285048799e6d2756f1d6af77f34e6a1f454c48f2f43042927845931b7ecff2e5de45f864627a3d4aa061252401225bbb6c2caa8532320ccbe401e97c9c79ac8e5
-
Filesize
384KB
MD5dfd5f78a711fa92337010ecc028470b4
SHA11a389091178f2be8ce486cd860de16263f8e902e
SHA256da96f2eb74e60de791961ef3800c36a5e12202fe97ae5d2fcfc1fe404bc13c0d
SHA512a3673074919039a2dc854b0f91d1e1a69724056594e33559741f53594e0f6e61e3d99ec664d541b17f09ffdebc2de1b042eec19ca8477fac86359c703f8c9656
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
3.1MB
MD5246d4d796a8c60130f37eb8360bb5886
SHA1c70fb90648075e7ae02209c255a3a9d6633a942c
SHA256c8b6edfd82dcf1e45f50b9dad40c2308d453ab6fe0960699676644fa93ffb7ea
SHA512ccf941edd4ca07d9e3be0256922d0cd0436937fe60066850976ff0923e93149e6eb82e3b19f8314c18e483766904b89c494ed077ceabc43b6f2fca3e10183925
-
Filesize
442KB
MD585430baed3398695717b0263807cf97c
SHA1fffbee923cea216f50fce5d54219a188a5100f41
SHA256a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA51206511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1
-
Filesize
8.0MB
MD5a01c5ecd6108350ae23d2cddf0e77c17
SHA1c6ac28a2cd979f1f9a75d56271821d5ff665e2b6
SHA256345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42
SHA512b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD5464538ef217275dcba1a69ea3a99de60
SHA1abcdebe95c683634e72b073b57741de51e255870
SHA25668fb1fdb3db681c501f330249a28e8ccf3c7b3a6e5acad856068e04914ddad37
SHA51281433ba18125e9f6d3d85ade6a7256deaf7f99e3c5a5fc18b312bd5ef41f71cf94a32a649c8e218d85fdcc42974869d46eeb6ffdb8322d3956c96d031a39872c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\datareporting\glean\pending_pings\c9606f32-5b2a-42bc-89d6-070b17dea6ba
Filesize745B
MD5bef6d447f203e4a11821066694965c19
SHA1c91c46925f5f4f2ff271fae1bb6d6569d5b643c1
SHA25665d670249c8ef88f81a1193635e440096e27cb292710d0a09df84c8cb2a5c724
SHA5121aee4fd10c95c154677ccfa6c34fa27f4d1c7b3f18aad3ef67168ce87d989d05d351ea04783799df3cebfd441f61306be3228f9773740dd6457dbd4339de8d95
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\datareporting\glean\pending_pings\e613b8ba-a4a7-43d5-b86a-d8cb2925d04d
Filesize12KB
MD5e7d45ed701c90e468f73983ff28a9be4
SHA16d569df99e21af34db1a94f300d403334d6d8a9b
SHA25615f6a490b4001ed624e6b561da1d3c6a7ddce6b3afc5ecfe4362fb40eb1630bc
SHA51282779af35b8f66090449b9e0d02a380d826cbba0b05531a109a9c2e2380af33468bb8cf888139fff3f698915a3ff076b873bed1ab1d515c4ee54054d79fdf890
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll
Filesize997KB
MD5fe3355639648c417e8307c6d051e3e37
SHA1f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA2561ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA5128f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info
Filesize116B
MD53d33cdc0b3d281e67dd52e14435dd04f
SHA14db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json
Filesize372B
MD58be33af717bb1b67fbd61c3f4b807e9e
SHA17cf17656d174d951957ff36810e874a134dd49e0
SHA256e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd
SHA5126125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll
Filesize11.8MB
MD533bf7b0439480effb9fb212efce87b13
SHA1cee50f2745edc6dc291887b6075ca64d716f495a
SHA2568ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e
SHA512d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig
Filesize1KB
MD5937326fead5fd401f6cca9118bd9ade9
SHA14526a57d4ae14ed29b37632c72aef3c408189d91
SHA25668a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81
SHA512b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2
-
Filesize
6KB
MD531119f5e83408cf822bb6b043dcbdf87
SHA16babfe0ec7f3599b85609da59aa9d867298adb52
SHA2564e6820221a9e7551db4bd33cdd91fc5e9ec5f09067e631079b64a8b41773b6ab
SHA512f7e715ee034a0cb56e3c54685ddafa63fe9fd290f5c527dd40dbce13e60d75af610b2ee0a252e14a1ae9ee681ed8a766c03dcc3be04b2baf4c652a672662eccd
-
Filesize
7KB
MD568aab3fa5b8e5184c356e8bdd57c7c1f
SHA14cd21555c9441900335b4bf1af14c9c7416acf0a
SHA25690afb4ad4481f44a765d862edffa85433cf138cd55f68977fadcfbef66c5d314
SHA51272283a3ec9754038f3cc2fad058a804bf1952fb8ca462b6bfdcb3599996fcf4c6b6283ff5f443a8809d026ce3dae68bbbc91d27ba67d683da84d2599d8514391
-
Filesize
7KB
MD5289f97f2250e2854e5d46930bd377b05
SHA1f768e9de9601f608a570337026159a484c9d7995
SHA2569824f613989f84007c7c937bc99624061f7553c8257e7eff059a45b6125bba95
SHA512f411252df0811dd382647ffc9cdb4ad6646bebfc8920c8839cfd27adc7f1f6757b14f552da15de32c27786d825e9ba1d6d4de101dba6040d8b9c24d9a1ca07fe
-
Filesize
6KB
MD50f4f888bd9911b69413d743930d9a0c0
SHA141a95b38bf80af9ec54caa8737941cc012df2961
SHA256e83c2434f096d88b7423dc10b42f35a090a8d4a82110c0aef779a5de1a290801
SHA512cb6f2715a40f2b8df7fced49f010b6bc452defb8148fc7f7185017a66a693fa44d603760ac960e45c6bdfbed1602e9cc66d9522b44b3afbdae6d917242b8c4c9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD52e715b8906cf0de49ce823942fe8d75f
SHA15a8213c3e32a7265c31cba0c30769af470e6c438
SHA2566e41d4048ae4a3d58d867934db7f4dd62480fa62b23026bb26e0c2c519458fee
SHA512385a13e486d2b954d774ff993090660a0bb622000053a1b30dcc8543bed28a719ee5ebea421eff54ef97083f884721d8e9a625dbf0c75df40fe65ca0758e11f8
-
Filesize
245KB
MD57d254439af7b1caaa765420bea7fbd3f
SHA17bd1d979de4a86cb0d8c2ad9e1945bd351339ad0
SHA256d6e7ceb5b05634efbd06c3e28233e92f1bd362a36473688fbaf952504b76d394
SHA512c3164b2f09dc914066201562be6483f61d3c368675ac5d3466c2d5b754813b8b23fd09af86b1f15ab8cc91be8a52b3488323e7a65198e5b104f9c635ec5ed5cc
-
Filesize
1.4MB
MD5a8cf5621811f7fac55cfe8cb3fa6b9f6
SHA1121356839e8138a03141f5f5856936a85bd2a474
SHA256614a0362ab87cee48d0935b5bb957d539be1d94c6fdeb3fe42fac4fbe182c10c
SHA5124479d951435f222ca7306774002f030972c9f1715d6aaf512fca9420dd79cb6d08240f80129f213851773290254be34f0ff63c7b1f4d554a7db5f84b69e84bdd