Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-12-2024 17:50
Static task
static1
General
-
Target
2c822ca7c7bd7975474d0d8049a0116f9adbca9edc9af681971aa236a2e0976c.exe
-
Size
3.0MB
-
MD5
f00748070014e907402d3b74efe95914
-
SHA1
f76796b85089b5265a8ef437317220d407f2e5a4
-
SHA256
2c822ca7c7bd7975474d0d8049a0116f9adbca9edc9af681971aa236a2e0976c
-
SHA512
cf4854b3d016767b658baa8eafcf9f0d0737fa65c7595d652c0f684994797a562f79923b5da6b1d8492a68601bf2d4f56a877a53f3f25d9637ce3acadbeeec7f
-
SSDEEP
24576:et1VZU2MT3LAObhxPYJfmcJiJZYY+o5wHE7TPoK9kJsH3QLx0m3+WfPss9Ax4UkO:2lWkODPeBHGV9lCAeEiIxF
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
https://drive-connect.cyou/api
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://drive-connect.cyou/api
https://covery-mover.biz/api
Signatures
-
Amadey family
-
Gcleaner family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" bdb4a0c65f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" bdb4a0c65f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" bdb4a0c65f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" bdb4a0c65f.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection bdb4a0c65f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" bdb4a0c65f.exe -
Stealc family
-
Xmrig family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ bdb4a0c65f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2c822ca7c7bd7975474d0d8049a0116f9adbca9edc9af681971aa236a2e0976c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e7913a27b1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e98cf22489.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
XMRig Miner payload 13 IoCs
resource yara_rule behavioral2/memory/5332-717-0x0000000140000000-0x0000000140770000-memory.dmp xmrig behavioral2/memory/5332-718-0x0000000140000000-0x0000000140770000-memory.dmp xmrig behavioral2/memory/5332-719-0x0000000140000000-0x0000000140770000-memory.dmp xmrig behavioral2/memory/5332-720-0x0000000140000000-0x0000000140770000-memory.dmp xmrig behavioral2/memory/5332-721-0x0000000140000000-0x0000000140770000-memory.dmp xmrig behavioral2/memory/5332-722-0x0000000140000000-0x0000000140770000-memory.dmp xmrig behavioral2/memory/5332-723-0x0000000140000000-0x0000000140770000-memory.dmp xmrig behavioral2/memory/5332-725-0x0000000140000000-0x0000000140770000-memory.dmp xmrig behavioral2/memory/5332-727-0x0000000140000000-0x0000000140770000-memory.dmp xmrig behavioral2/memory/5332-729-0x0000000140000000-0x0000000140770000-memory.dmp xmrig behavioral2/memory/6040-3400-0x0000000140000000-0x0000000140770000-memory.dmp xmrig behavioral2/memory/6040-3402-0x0000000140000000-0x0000000140770000-memory.dmp xmrig behavioral2/memory/6040-3404-0x0000000140000000-0x0000000140770000-memory.dmp xmrig -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2c822ca7c7bd7975474d0d8049a0116f9adbca9edc9af681971aa236a2e0976c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e7913a27b1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e7913a27b1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e98cf22489.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2c822ca7c7bd7975474d0d8049a0116f9adbca9edc9af681971aa236a2e0976c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion bdb4a0c65f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e98cf22489.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion bdb4a0c65f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 7f609a19ac.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation d7a3449735.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 2c822ca7c7bd7975474d0d8049a0116f9adbca9edc9af681971aa236a2e0976c.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 27 IoCs
pid Process 3600 skotes.exe 3400 dwVrTdy.exe 1744 AzVRM7c.exe 3604 t5abhIx.exe 4812 graph.exe 3360 e7913a27b1.exe 4480 graph.exe 628 7f609a19ac.exe 3524 7z.exe 3512 7z.exe 2744 1602af2572.exe 760 7z.exe 2208 7z.exe 3084 7z.exe 2852 7z.exe 2864 7z.exe 2316 7z.exe 2768 in.exe 4496 1602af2572.exe 776 5af378e97d.exe 4252 e98cf22489.exe 2116 skotes.exe 5316 Intel_PTT_EK_Recertification.exe 5836 bdb4a0c65f.exe 5108 d7a3449735.exe 5512 skotes.exe 5632 Intel_PTT_EK_Recertification.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 2c822ca7c7bd7975474d0d8049a0116f9adbca9edc9af681971aa236a2e0976c.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine e7913a27b1.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine e98cf22489.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine bdb4a0c65f.exe -
Loads dropped DLL 8 IoCs
pid Process 3524 7z.exe 3512 7z.exe 760 7z.exe 2208 7z.exe 3084 7z.exe 2852 7z.exe 2864 7z.exe 2316 7z.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features bdb4a0c65f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" bdb4a0c65f.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5af378e97d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1014475001\\5af378e97d.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e98cf22489.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1014476001\\e98cf22489.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bdb4a0c65f.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1014477001\\bdb4a0c65f.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Graph = "C:\\Program Files\\Windows Media Player\\graph\\graph.exe" dwVrTdy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Graph = "C:\\Program Files\\Windows Media Player\\graph\\graph.exe" AzVRM7c.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 18 drive.google.com 33 drive.google.com 17 drive.google.com -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 39 ipinfo.io 40 ipinfo.io 49 ipinfo.io 56 ipinfo.io -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0008000000023c6c-295.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 1056 2c822ca7c7bd7975474d0d8049a0116f9adbca9edc9af681971aa236a2e0976c.exe 3600 skotes.exe 3360 e7913a27b1.exe 4252 e98cf22489.exe 2116 skotes.exe 5836 bdb4a0c65f.exe 5512 skotes.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2744 set thread context of 4496 2744 1602af2572.exe 119 PID 5316 set thread context of 5332 5316 Intel_PTT_EK_Recertification.exe 148 PID 5632 set thread context of 6040 5632 Intel_PTT_EK_Recertification.exe 165 -
resource yara_rule behavioral2/memory/2768-286-0x00007FF7003F0000-0x00007FF700880000-memory.dmp upx behavioral2/files/0x0007000000023c72-284.dat upx behavioral2/memory/2768-288-0x00007FF7003F0000-0x00007FF700880000-memory.dmp upx behavioral2/memory/5316-715-0x00007FF7B9C30000-0x00007FF7BA0C0000-memory.dmp upx behavioral2/memory/5316-728-0x00007FF7B9C30000-0x00007FF7BA0C0000-memory.dmp upx behavioral2/memory/5632-3388-0x00007FF7B9C30000-0x00007FF7BA0C0000-memory.dmp upx behavioral2/memory/5632-3403-0x00007FF7B9C30000-0x00007FF7BA0C0000-memory.dmp upx -
Drops file in Program Files directory 12 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Media Player\1w4lv5IzuEVOMa3sjCc6orj2dWPvJoK5fzip dwVrTdy.exe File opened for modification C:\Program Files\Windows Media Player\1w4lv5IzuEVOMa3sjCc6orj2dWPvJoK5f dwVrTdy.exe File opened for modification C:\Program Files\Windows Media Player\1w4lv5IzuEVOMa3sjCc6orj2dWPvJoK5fzip AzVRM7c.exe File created C:\Program Files\Windows Media Player\1w4lv5IzuEVOMa3sjCc6orj2dWPvJoK5f dwVrTdy.exe File created C:\Program Files\Windows Media Player\1w4lv5IzuEVOMa3sjCc6orj2dWPvJoK5fzip dwVrTdy.exe File opened for modification C:\Program Files\Windows Media Player\graph\graph.exe t5abhIx.exe File created C:\Program Files\Windows Media Player\1w4lv5IzuEVOMa3sjCc6orj2dWPvJoK5f AzVRM7c.exe File created C:\Program Files\Windows Media Player\1w4lv5IzuEVOMa3sjCc6orj2dWPvJoK5fzip AzVRM7c.exe File created C:\Program Files\Windows Media Player\graph\graph.exe AzVRM7c.exe File opened for modification C:\Program Files\Windows Media Player\1w4lv5IzuEVOMa3sjCc6orj2dWPvJoK5f AzVRM7c.exe File created C:\Program Files\Windows Media Player\graph\graph.exe dwVrTdy.exe File opened for modification C:\Program Files\Windows Media Player\graph t5abhIx.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 2c822ca7c7bd7975474d0d8049a0116f9adbca9edc9af681971aa236a2e0976c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 5236 5108 WerFault.exe 153 5208 3360 WerFault.exe 94 -
System Location Discovery: System Language Discovery 1 TTPs 19 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 5af378e97d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7f609a19ac.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2c822ca7c7bd7975474d0d8049a0116f9adbca9edc9af681971aa236a2e0976c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5af378e97d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d7a3449735.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1602af2572.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1602af2572.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 5af378e97d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e98cf22489.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bdb4a0c65f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e7913a27b1.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 6 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3052 powershell.exe 292 PING.EXE 4076 powershell.exe 5648 PING.EXE 5860 powershell.exe 2164 PING.EXE -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 d7a3449735.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString d7a3449735.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2256 timeout.exe -
Kills process with taskkill 5 IoCs
pid Process 392 taskkill.exe 5000 taskkill.exe 4932 taskkill.exe 1272 taskkill.exe 4412 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings firefox.exe -
Runs ping.exe 1 TTPs 3 IoCs
pid Process 292 PING.EXE 5648 PING.EXE 2164 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1264 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1056 2c822ca7c7bd7975474d0d8049a0116f9adbca9edc9af681971aa236a2e0976c.exe 1056 2c822ca7c7bd7975474d0d8049a0116f9adbca9edc9af681971aa236a2e0976c.exe 3600 skotes.exe 3600 skotes.exe 3400 dwVrTdy.exe 3400 dwVrTdy.exe 3400 dwVrTdy.exe 3400 dwVrTdy.exe 1744 AzVRM7c.exe 1744 AzVRM7c.exe 1744 AzVRM7c.exe 1744 AzVRM7c.exe 3604 t5abhIx.exe 3604 t5abhIx.exe 3604 t5abhIx.exe 3604 t5abhIx.exe 4812 graph.exe 4812 graph.exe 4812 graph.exe 4812 graph.exe 4812 graph.exe 4812 graph.exe 4480 graph.exe 4480 graph.exe 4812 graph.exe 4812 graph.exe 3360 e7913a27b1.exe 3360 e7913a27b1.exe 4480 graph.exe 4480 graph.exe 4812 graph.exe 4812 graph.exe 4480 graph.exe 4480 graph.exe 4812 graph.exe 4812 graph.exe 4480 graph.exe 4480 graph.exe 4812 graph.exe 4812 graph.exe 4480 graph.exe 4480 graph.exe 4812 graph.exe 4812 graph.exe 4480 graph.exe 4480 graph.exe 4812 graph.exe 4812 graph.exe 4480 graph.exe 4480 graph.exe 4812 graph.exe 4812 graph.exe 4480 graph.exe 4480 graph.exe 4812 graph.exe 4812 graph.exe 4480 graph.exe 4480 graph.exe 4812 graph.exe 4812 graph.exe 4480 graph.exe 4480 graph.exe 4812 graph.exe 4812 graph.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
description pid Process Token: SeRestorePrivilege 3524 7z.exe Token: 35 3524 7z.exe Token: SeSecurityPrivilege 3524 7z.exe Token: SeSecurityPrivilege 3524 7z.exe Token: SeRestorePrivilege 3512 7z.exe Token: 35 3512 7z.exe Token: SeSecurityPrivilege 3512 7z.exe Token: SeSecurityPrivilege 3512 7z.exe Token: SeRestorePrivilege 760 7z.exe Token: 35 760 7z.exe Token: SeSecurityPrivilege 760 7z.exe Token: SeSecurityPrivilege 760 7z.exe Token: SeRestorePrivilege 2208 7z.exe Token: 35 2208 7z.exe Token: SeSecurityPrivilege 2208 7z.exe Token: SeSecurityPrivilege 2208 7z.exe Token: SeRestorePrivilege 3084 7z.exe Token: 35 3084 7z.exe Token: SeSecurityPrivilege 3084 7z.exe Token: SeSecurityPrivilege 3084 7z.exe Token: SeRestorePrivilege 2852 7z.exe Token: 35 2852 7z.exe Token: SeSecurityPrivilege 2852 7z.exe Token: SeSecurityPrivilege 2852 7z.exe Token: SeRestorePrivilege 2864 7z.exe Token: 35 2864 7z.exe Token: SeSecurityPrivilege 2864 7z.exe Token: SeSecurityPrivilege 2864 7z.exe Token: SeRestorePrivilege 2316 7z.exe Token: 35 2316 7z.exe Token: SeSecurityPrivilege 2316 7z.exe Token: SeSecurityPrivilege 2316 7z.exe Token: SeDebugPrivilege 3052 powershell.exe Token: SeDebugPrivilege 392 taskkill.exe Token: SeDebugPrivilege 5000 taskkill.exe Token: SeDebugPrivilege 4932 taskkill.exe Token: SeDebugPrivilege 1272 taskkill.exe Token: SeDebugPrivilege 4412 taskkill.exe Token: SeDebugPrivilege 4724 firefox.exe Token: SeDebugPrivilege 4724 firefox.exe Token: SeLockMemoryPrivilege 5332 explorer.exe Token: SeDebugPrivilege 4076 powershell.exe Token: SeDebugPrivilege 5836 bdb4a0c65f.exe Token: SeLockMemoryPrivilege 6040 explorer.exe Token: SeDebugPrivilege 5860 powershell.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 1056 2c822ca7c7bd7975474d0d8049a0116f9adbca9edc9af681971aa236a2e0976c.exe 776 5af378e97d.exe 776 5af378e97d.exe 776 5af378e97d.exe 776 5af378e97d.exe 776 5af378e97d.exe 776 5af378e97d.exe 776 5af378e97d.exe 776 5af378e97d.exe 4724 firefox.exe 4724 firefox.exe 4724 firefox.exe 4724 firefox.exe 776 5af378e97d.exe 4724 firefox.exe 4724 firefox.exe 4724 firefox.exe 4724 firefox.exe 4724 firefox.exe 4724 firefox.exe 4724 firefox.exe 4724 firefox.exe 4724 firefox.exe 4724 firefox.exe 4724 firefox.exe 4724 firefox.exe 4724 firefox.exe 4724 firefox.exe 4724 firefox.exe 4724 firefox.exe 4724 firefox.exe 776 5af378e97d.exe 776 5af378e97d.exe 776 5af378e97d.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 776 5af378e97d.exe 776 5af378e97d.exe 776 5af378e97d.exe 776 5af378e97d.exe 776 5af378e97d.exe 776 5af378e97d.exe 776 5af378e97d.exe 776 5af378e97d.exe 4724 firefox.exe 4724 firefox.exe 4724 firefox.exe 4724 firefox.exe 776 5af378e97d.exe 4724 firefox.exe 4724 firefox.exe 4724 firefox.exe 4724 firefox.exe 4724 firefox.exe 4724 firefox.exe 4724 firefox.exe 4724 firefox.exe 4724 firefox.exe 4724 firefox.exe 4724 firefox.exe 4724 firefox.exe 4724 firefox.exe 4724 firefox.exe 4724 firefox.exe 4724 firefox.exe 776 5af378e97d.exe 776 5af378e97d.exe 776 5af378e97d.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4724 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1056 wrote to memory of 3600 1056 2c822ca7c7bd7975474d0d8049a0116f9adbca9edc9af681971aa236a2e0976c.exe 82 PID 1056 wrote to memory of 3600 1056 2c822ca7c7bd7975474d0d8049a0116f9adbca9edc9af681971aa236a2e0976c.exe 82 PID 1056 wrote to memory of 3600 1056 2c822ca7c7bd7975474d0d8049a0116f9adbca9edc9af681971aa236a2e0976c.exe 82 PID 3600 wrote to memory of 3400 3600 skotes.exe 87 PID 3600 wrote to memory of 3400 3600 skotes.exe 87 PID 3600 wrote to memory of 1744 3600 skotes.exe 89 PID 3600 wrote to memory of 1744 3600 skotes.exe 89 PID 3600 wrote to memory of 3604 3600 skotes.exe 92 PID 3600 wrote to memory of 3604 3600 skotes.exe 92 PID 3400 wrote to memory of 4812 3400 dwVrTdy.exe 93 PID 3400 wrote to memory of 4812 3400 dwVrTdy.exe 93 PID 3600 wrote to memory of 3360 3600 skotes.exe 94 PID 3600 wrote to memory of 3360 3600 skotes.exe 94 PID 3600 wrote to memory of 3360 3600 skotes.exe 94 PID 1744 wrote to memory of 4480 1744 AzVRM7c.exe 95 PID 1744 wrote to memory of 4480 1744 AzVRM7c.exe 95 PID 3600 wrote to memory of 628 3600 skotes.exe 96 PID 3600 wrote to memory of 628 3600 skotes.exe 96 PID 3600 wrote to memory of 628 3600 skotes.exe 96 PID 628 wrote to memory of 3888 628 7f609a19ac.exe 97 PID 628 wrote to memory of 3888 628 7f609a19ac.exe 97 PID 3888 wrote to memory of 1376 3888 cmd.exe 99 PID 3888 wrote to memory of 1376 3888 cmd.exe 99 PID 3888 wrote to memory of 3524 3888 cmd.exe 100 PID 3888 wrote to memory of 3524 3888 cmd.exe 100 PID 3888 wrote to memory of 3512 3888 cmd.exe 101 PID 3888 wrote to memory of 3512 3888 cmd.exe 101 PID 3600 wrote to memory of 2744 3600 skotes.exe 102 PID 3600 wrote to memory of 2744 3600 skotes.exe 102 PID 3600 wrote to memory of 2744 3600 skotes.exe 102 PID 3888 wrote to memory of 760 3888 cmd.exe 104 PID 3888 wrote to memory of 760 3888 cmd.exe 104 PID 3888 wrote to memory of 2208 3888 cmd.exe 105 PID 3888 wrote to memory of 2208 3888 cmd.exe 105 PID 3888 wrote to memory of 3084 3888 cmd.exe 106 PID 3888 wrote to memory of 3084 3888 cmd.exe 106 PID 3888 wrote to memory of 2852 3888 cmd.exe 107 PID 3888 wrote to memory of 2852 3888 cmd.exe 107 PID 3888 wrote to memory of 2864 3888 cmd.exe 108 PID 3888 wrote to memory of 2864 3888 cmd.exe 108 PID 3888 wrote to memory of 2316 3888 cmd.exe 109 PID 3888 wrote to memory of 2316 3888 cmd.exe 109 PID 3888 wrote to memory of 4572 3888 cmd.exe 110 PID 3888 wrote to memory of 4572 3888 cmd.exe 110 PID 3888 wrote to memory of 2768 3888 cmd.exe 111 PID 3888 wrote to memory of 2768 3888 cmd.exe 111 PID 2768 wrote to memory of 5108 2768 in.exe 112 PID 2768 wrote to memory of 5108 2768 in.exe 112 PID 2768 wrote to memory of 4472 2768 in.exe 113 PID 2768 wrote to memory of 4472 2768 in.exe 113 PID 2768 wrote to memory of 1264 2768 in.exe 115 PID 2768 wrote to memory of 1264 2768 in.exe 115 PID 2768 wrote to memory of 3052 2768 in.exe 117 PID 2768 wrote to memory of 3052 2768 in.exe 117 PID 2744 wrote to memory of 4496 2744 1602af2572.exe 119 PID 2744 wrote to memory of 4496 2744 1602af2572.exe 119 PID 2744 wrote to memory of 4496 2744 1602af2572.exe 119 PID 2744 wrote to memory of 4496 2744 1602af2572.exe 119 PID 2744 wrote to memory of 4496 2744 1602af2572.exe 119 PID 2744 wrote to memory of 4496 2744 1602af2572.exe 119 PID 2744 wrote to memory of 4496 2744 1602af2572.exe 119 PID 2744 wrote to memory of 4496 2744 1602af2572.exe 119 PID 2744 wrote to memory of 4496 2744 1602af2572.exe 119 PID 2744 wrote to memory of 4496 2744 1602af2572.exe 119 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 3 IoCs
pid Process 5108 attrib.exe 4472 attrib.exe 4572 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c822ca7c7bd7975474d0d8049a0116f9adbca9edc9af681971aa236a2e0976c.exe"C:\Users\Admin\AppData\Local\Temp\2c822ca7c7bd7975474d0d8049a0116f9adbca9edc9af681971aa236a2e0976c.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Users\Admin\AppData\Local\Temp\1014430001\dwVrTdy.exe"C:\Users\Admin\AppData\Local\Temp\1014430001\dwVrTdy.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Program Files\Windows Media Player\graph\graph.exe"C:\Program Files\Windows Media Player\graph\graph.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4812
-
-
-
C:\Users\Admin\AppData\Local\Temp\1014431001\AzVRM7c.exe"C:\Users\Admin\AppData\Local\Temp\1014431001\AzVRM7c.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Program Files\Windows Media Player\graph\graph.exe"C:\Program Files\Windows Media Player\graph\graph.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4480
-
-
-
C:\Users\Admin\AppData\Local\Temp\1014432001\t5abhIx.exe"C:\Users\Admin\AppData\Local\Temp\1014432001\t5abhIx.exe"3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:3604
-
-
C:\Users\Admin\AppData\Local\Temp\1014472001\e7913a27b1.exe"C:\Users\Admin\AppData\Local\Temp\1014472001\e7913a27b1.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3360 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3360 -s 6444⤵
- Program crash
PID:5208
-
-
-
C:\Users\Admin\AppData\Local\Temp\1014473001\7f609a19ac.exe"C:\Users\Admin\AppData\Local\Temp\1014473001\7f609a19ac.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"4⤵
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Windows\system32\mode.commode 65,105⤵PID:1376
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e file.zip -p24291711423417250691697322505 -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:3524
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_7.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:3512
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_6.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:760
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_5.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2208
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_4.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:3084
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_3.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2852
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_2.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2864
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_1.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2316
-
-
C:\Windows\system32\attrib.exeattrib +H "in.exe"5⤵
- Views/modifies file attributes
PID:4572
-
-
C:\Users\Admin\AppData\Local\Temp\main\in.exe"in.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SYSTEM32\attrib.exeattrib +H +S C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe6⤵
- Views/modifies file attributes
PID:5108
-
-
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe6⤵
- Views/modifies file attributes
PID:4472
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /f /CREATE /TN "Intel_PTT_EK_Recertification" /TR "C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe" /SC MINUTE6⤵
- Scheduled Task/Job: Scheduled Task
PID:1264
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell ping 127.0.0.1; del in.exe6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3052 -
C:\Windows\system32\PING.EXE"C:\Windows\system32\PING.EXE" 127.0.0.17⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:292
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1014474001\1602af2572.exe"C:\Users\Admin\AppData\Local\Temp\1014474001\1602af2572.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\1014474001\1602af2572.exe"C:\Users\Admin\AppData\Local\Temp\1014474001\1602af2572.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4496
-
-
-
C:\Users\Admin\AppData\Local\Temp\1014475001\5af378e97d.exe"C:\Users\Admin\AppData\Local\Temp\1014475001\5af378e97d.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:776 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:392
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5000
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4932
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1272
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4412
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:2676
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4724 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2028 -parentBuildID 20240401114208 -prefsHandle 1940 -prefMapHandle 1932 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5e08247f-fea0-45dd-96c2-48c0d02841c2} 4724 "\\.\pipe\gecko-crash-server-pipe.4724" gpu6⤵PID:3984
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2452 -parentBuildID 20240401114208 -prefsHandle 2444 -prefMapHandle 2440 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {33af2cc9-f242-42bb-87d6-676743af55ea} 4724 "\\.\pipe\gecko-crash-server-pipe.4724" socket6⤵PID:1912
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3008 -childID 1 -isForBrowser -prefsHandle 2804 -prefMapHandle 2728 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1252 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {029da3a1-8c05-4584-a17f-487ea7eb9b0f} 4724 "\\.\pipe\gecko-crash-server-pipe.4724" tab6⤵PID:456
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4048 -childID 2 -isForBrowser -prefsHandle 3140 -prefMapHandle 3936 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1252 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f913efa5-512d-401f-b902-900dc97d33a5} 4724 "\\.\pipe\gecko-crash-server-pipe.4724" tab6⤵PID:4784
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4900 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4896 -prefMapHandle 4892 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {658e746d-4629-4196-9a0d-51f8a371d9a6} 4724 "\\.\pipe\gecko-crash-server-pipe.4724" utility6⤵
- Checks processor information in registry
PID:5532
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5328 -childID 3 -isForBrowser -prefsHandle 5372 -prefMapHandle 5364 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1252 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8cf6f997-7779-4a8c-a06c-8ea21f407247} 4724 "\\.\pipe\gecko-crash-server-pipe.4724" tab6⤵PID:2624
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5432 -childID 4 -isForBrowser -prefsHandle 5640 -prefMapHandle 5388 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1252 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {716db009-c9de-440b-b5d7-a974896c9679} 4724 "\\.\pipe\gecko-crash-server-pipe.4724" tab6⤵PID:392
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5544 -childID 5 -isForBrowser -prefsHandle 5776 -prefMapHandle 5780 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1252 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f767ad46-fe48-4316-9297-8c19c2be423e} 4724 "\\.\pipe\gecko-crash-server-pipe.4724" tab6⤵PID:1788
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1014476001\e98cf22489.exe"C:\Users\Admin\AppData\Local\Temp\1014476001\e98cf22489.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:4252
-
-
C:\Users\Admin\AppData\Local\Temp\1014477001\bdb4a0c65f.exe"C:\Users\Admin\AppData\Local\Temp\1014477001\bdb4a0c65f.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5836
-
-
C:\Users\Admin\AppData\Local\Temp\1014478001\d7a3449735.exe"C:\Users\Admin\AppData\Local\Temp\1014478001\d7a3449735.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:5108 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\1014478001\d7a3449735.exe" & rd /s /q "C:\ProgramData\B1VKX4WLNYCB" & exit4⤵
- System Location Discovery: System Language Discovery
PID:4100 -
C:\Windows\SysWOW64\timeout.exetimeout /t 105⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2256
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5108 -s 20924⤵
- Program crash
PID:5236
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2116
-
C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exeC:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5316 -
C:\Windows\explorer.exeexplorer.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:5332
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell ping 127.1.10.1; del Intel_PTT_EK_Recertification.exe2⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4076 -
C:\Windows\system32\PING.EXE"C:\Windows\system32\PING.EXE" 127.1.10.13⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5648
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 5108 -ip 51081⤵PID:3024
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3360 -ip 33601⤵PID:5192
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5512
-
C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exeC:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5632 -
C:\Windows\explorer.exeexplorer.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:6040
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell ping 127.1.10.1; del Intel_PTT_EK_Recertification.exe2⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5860 -
C:\Windows\system32\PING.EXE"C:\Windows\system32\PING.EXE" 127.1.10.13⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2164
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153KB
MD5f89267b24ecf471c16add613cec34473
SHA1c3aad9d69a3848cedb8912e237b06d21e1e9974f
SHA25621f12abb6de14e72d085bc0bd90d630956c399433e85275c4c144cd9818cbf92
SHA512c29176c7e1d58dd4e1deafcbd72956b8c27e923fb79d511ee244c91777d3b3e41d0c3977a8a9fbe094bac371253481dde5b58abf4f2df989f303e5d262e1ce4d
-
Filesize
120KB
MD553e54ac43786c11e0dde9db8f4eb27ab
SHA19c5768d5ee037e90da77f174ef9401970060520e
SHA2562f606d24809902af1bb9cb59c16a2c82960d95bff923ea26f6a42076772f1db8
SHA512cd1f6d5f4d8cd19226151b6674124ab1e10950af5a049e8c082531867d71bfae9d7bc65641171fd55d203e4fba9756c80d11906d85a30b35ee4e8991adb21950
-
Filesize
245KB
MD57d254439af7b1caaa765420bea7fbd3f
SHA17bd1d979de4a86cb0d8c2ad9e1945bd351339ad0
SHA256d6e7ceb5b05634efbd06c3e28233e92f1bd362a36473688fbaf952504b76d394
SHA512c3164b2f09dc914066201562be6483f61d3c368675ac5d3466c2d5b754813b8b23fd09af86b1f15ab8cc91be8a52b3488323e7a65198e5b104f9c635ec5ed5cc
-
Filesize
854B
MD5e935bc5762068caf3e24a2683b1b8a88
SHA182b70eb774c0756837fe8d7acbfeec05ecbf5463
SHA256a8accfcfeb51bd73df23b91f4d89ff1a9eb7438ef5b12e8afda1a6ff1769e89d
SHA512bed4f6f5357b37662623f1f8afed1a3ebf3810630b2206a0292052a2e754af9dcfe34ee15c289e3d797a8f33330e47c14cbefbc702f74028557ace29bf855f9e
-
Filesize
717B
MD5822467b728b7a66b081c91795373789a
SHA1d8f2f02e1eef62485a9feffd59ce837511749865
SHA256af2343382b88335eea72251ad84949e244ff54b6995063e24459a7216e9576b9
SHA512bacea07d92c32078ca6a0161549b4e18edab745dd44947e5f181d28cc24468e07769d6835816cdfb944fd3d0099bde5e21b48f4966824c5c16c1801712303eb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771
Filesize2KB
MD52898acd1978994db9a85aaa95fb0f0f2
SHA1f5615b7436e357bea3e5c2f67acea81f65b62ffd
SHA256557859d9c034e43608dc8a7c295ab02faf4ae295ed46e2129875b1548de7afd1
SHA512e7cacf4830d3ed0d2a74d2f7c55adf9b6551bd4932d2bed5747747e2a98764db121fbbf7e226fe84a70123668cc944492ca2e99ca5e0daddd2f204e0ee45962d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD584525ac2c52cedf67aa38131b3f41efb
SHA1080afd23b33aabd0285594d580d21acde7229173
SHA256ae524d9d757bed48d552b059f951ffd25a7d963ae44a554cb1f3a9641e524080
SHA512d898b0913b4005bbbf22a5457ad1e86345860868bc2e53187ad8267c07824d592160a27d850978ebfe78392db784fffb80b73e27418d3a71708383d738ea1d57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6DA548C7E5915679F87E910D6581DEF1_19CA6F55DA8A3B0AB12F649B745C90D5
Filesize471B
MD5f82d5aca5ed5100b9c82259f5c97bd5f
SHA1c5fe6c4d597a84244e0330d53887d7865bc8d430
SHA2568484447947db2ae840af4235ae99c704d8048091b0a71f098d18d755759d7178
SHA5125a9f1b0cba4a1c6974a1d3929c4cf4d6c2b11041bc61cdeac68f8f5915bc19bf56e589b1a8739c8ff3cd4a6e7912405b35bd7f6dbd5ce66dfd465163d638ef47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\830ED50B5D4DDC13B182D34609C771F0_75BA9E25504A3532329AC3680ECDD7FB
Filesize2KB
MD5d1ecf994eaf6a862a90f5cf0463286ef
SHA1a2e7a05b2fd445c96658bfaa2a63d14ebc0c9909
SHA256da3c461b3bceaa846eb1a41c5a22638e71401ae47e5f3163f254f858a8782697
SHA51250a05adc15cfd930a9b1acec49b0ebd5d7b06243f39742b91227ae5e22287b16e949664ff47c7edb3894b1ea3b9ecb3149b5cf7b286ea38d34aa314196044b3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C02877841121CC45139CB51404116B25_6F7C58D8F5DC37AD0C4A3BEB81BE1660
Filesize472B
MD5c63ea05972017bcdd1beb71283b91587
SHA19fa26197d0eff7832e4cb81991713cac35ae5e35
SHA256ce02e101910f3b706cd4a36936408bd1cf065a7beae18716d9ce31991b647e10
SHA5128d89edc92a6a8d02e6491275e3e5a846f98bef077ca0aea352d4de45a79138d1e8fc26c310a37b50cfb4d746f7864747e3b0c98a89aa195fb58449bd72b7a985
-
Filesize
504B
MD57534282617c6278db5ebc9da5b2c673b
SHA14d804a0a0e7c4f0ab1791e9c68c58833d7fc7811
SHA2562904a768575e22df734148cd01c687a5dd23a6d2b378ad3a972f6e7f38fa77cc
SHA512c45746c38c1e8f0d694a05ef0785070b4f7e3df34a264a3693983d555232bc7b61e78e24187fce8e093448d1724f1226afc3baf262860ad75f076bf57f5929a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D
Filesize1KB
MD584db952034efdd2af0e2869638c749d2
SHA19ed0d93316637cd9f61e991229cba9bfdabec6e7
SHA256599734f57fe4ac8c782f546264aa691d954696dc40961b411debebe036634df7
SHA5125cae7c4b72f889aa099a55c0c107cb80c6773be030a8f914504633d0f27934eb524191704719cd17718f4172dd4bd059c9f74652c3a395fa250aa4802dffed65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199
Filesize170B
MD5673a93af93e8dadf088c712b2365fe07
SHA1fbfb9e482d362daf2b4be52b5e9f1dfa5da4d2af
SHA256705037af2b75696c53b70d9598ef7264d81182a32d532615498ab7181c62828f
SHA5128bc529e3675ca789a002e3b436ab017e4bffabd8cd34d9aa78686e70718bf7e9c659720d4f60284dbf77ee9d08e7dbd76fb35d1d9db28d97d473bfd9654591a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751
Filesize192B
MD56d17198e2bd09fc9c4a4f3339f6ff8df
SHA14df205db6adfc39b7ccbbb85af9bddbf7878b297
SHA2560ca2b4a99194cf059558c77efc1a9c11790589b8ee63ccbcd982f872a5b68067
SHA512d7855cb5b602fca7fff44cb1aa1c5f111ce2ce46804d58389e69a80464ebc4d7f36f7e9db262544271c66a519b57415c08cd3212cdf33eac469ac9f5515588eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771
Filesize450B
MD5b1e52829ce02ceab5716170f6766af02
SHA1429a3461f3405b73369ead946a21cace8069dd92
SHA25691570f35f47164637973e3e57574b45efa415df05b3b9fd0f6b795590dec46d1
SHA512b1a7522b186c4d79edc214b65ad5bf5ddbc177c87d642accf863a9d26aaa9cb9fff83411dd49964f11f5dd883169bfe6e9a6a02567ce919c8235c8f849b1b7b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5d1d9d27048d3c32fbcfc9537f02b74ca
SHA112acef8279cfc09348d269cb0f32d22e0b1bf990
SHA25633688453abe857903c4815059de4a88df9203f95c661c4243609517f04d36dc9
SHA512a4af8e36429173858aa8857396c062f5119ed42bf49774f0d6c7afe7b4c5afbe3fb044797cd718c4582aa65f67a8ff0a73a8198e919d6281bd954954656875a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6DA548C7E5915679F87E910D6581DEF1_19CA6F55DA8A3B0AB12F649B745C90D5
Filesize402B
MD5fdc1d0f2b8cd9c6f235836c48a59d496
SHA1092759bffd064cec4c08f7eaa13e885624c4e538
SHA256a607e5ded0132fc64090dc3f0dee2d8dfbc738fc42a8ca118db28edc7f810051
SHA51280a7902942843182f57ed182ab4e921c56510a183c507351b41a60228ce2a10264e89502f7a1eb33e385ef3cb4bd18a5444c78ff8e6a5c28effca8f2d0e75b7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\830ED50B5D4DDC13B182D34609C771F0_75BA9E25504A3532329AC3680ECDD7FB
Filesize474B
MD5914587fba3dcde0fd13ae79474b0e013
SHA1e27f77e6ba69d402139d2cddbb1dbc958700c481
SHA256bf0e12b048df6a572b4f4373ac48b23a590ed0fb418120cd41445ac0c2b40522
SHA5121d1147a647730595d80353cae9d1b00cb8f78ea54e9689e7a48290f381ae2738f8e19e64db8dc99e9bb723c3b232f6a9c3f54407c926de9b69d263c715ca8a4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C02877841121CC45139CB51404116B25_6F7C58D8F5DC37AD0C4A3BEB81BE1660
Filesize398B
MD5befa509b0a9a945719288d69afd490a8
SHA14d715cd3390fdd8ee863f5a8e22e4b0ffd5dcc00
SHA2565044e0c72f7d5389567d28d9ec917c0c5e4bcb00cc79c5b84a5a194cc52a0992
SHA5120ee6270e7c09a1df532eca8a3894a3368ac72ddf8e6c5f45927dea0e9d8ca6a5d8ce344a34eeb03006722d141fb6e32b28559685fdd7506567e6f4c86ee617c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\D73CE810F817D372CC78C5824C36E338
Filesize550B
MD5c2950d67d375e7068163ef823accea72
SHA1887d4bc107391e45cb36876e84b11b5707602ec7
SHA2566fd430d9d6f365be609d4cc1b0e82e03bea5bad7b465e5a7fcc573278c3fcdaf
SHA512d6266b46dd48b784621b98c8201b0f17a090851b6c371bcb1e0a07cbe5b06c184c2e08bb3f700bfe0b6bb19f32da8c26f1ab262b16256b6b0c0abd015685d790
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D
Filesize458B
MD550e6f95dd222b426129ee3a5f6e8dc6a
SHA12d67d7bbd878c700e94af468c768d5f902616028
SHA2568fbc8db532e00ac7510d79bf446e6db2be78a919622f3f5400e9563486072c91
SHA5120dfbc418aff98c67a7ae2f4023b4495b1f252a22197950f6dbd8737bf083f31a17a022fdd22b1f9400515d27140468baac4d7295e76b488f4ef36598b89cd9de
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\85mw8mk9.default-release\activity-stream.discovery_stream.json.tmp
Filesize19KB
MD5ddfed1630614cbebbc1eaa2eab8a5c51
SHA128069f6acabb37e2120f7591544ce8312e0b7167
SHA256d90927a52b16c566a6a68c6184be16663c805d3fd5e5bf7bc825e2623df5f73a
SHA5128dc4695ee1effcf8929470b3fca761ccfcd529abf250828513c950921a5623f853de505047686606e6da577b653c32790ec858b3429730d705727ec64aa78a8c
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\85mw8mk9.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD5a56261740c795795a419594f53a43eaa
SHA1d045a93c1646f2d63ae7bcd02ce328a7a6ac1350
SHA256dd50efed6dab911043dab9750001e855ec89eee5272b4d9c396d88803f0cf3e2
SHA51258b4680e5eb3d0a4c0f6c9102355ece76747462b7f2071efd4ca14d3fb57a46a90d3dded88f766e69bc6ffef83ec7287fa458e6d33788ef2052d6766a9d7d5f8
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\85mw8mk9.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
591KB
MD53567cb15156760b2f111512ffdbc1451
SHA12fdb1f235fc5a9a32477dab4220ece5fda1539d4
SHA2560285d3a6c1ca2e3a993491c44e9cf2d33dbec0fb85fdbf48989a4e3b14b37630
SHA512e7a31b016417218387a4702e525d33dd4fe496557539b2ab173cec0cb92052c750cfc4b3e7f02f3c66ac23f19a0c8a4eb6c9d2b590a5e9faeb525e517bc877ba
-
Filesize
1.8MB
MD5659b475361502e4bb93cb3978d0d69c6
SHA19b4db8cab515e22350a6de83e9b892e9376fd391
SHA2569cd587e74a90f572286c6606c8d0dd40c5053aab867b5347c2499e5338a46b2d
SHA5126b31ca314b6c4268703197bdcc093fde7cfa50d2ea8461a9fe83ee7da1d2ea0bfedf13dab4c4cfecddd1bb172990cd19f1d0714324c58ec0d3a61f8ad8f1491f
-
Filesize
4.2MB
MD53a425626cbd40345f5b8dddd6b2b9efa
SHA17b50e108e293e54c15dce816552356f424eea97a
SHA256ba9212d2d5cd6df5eb7933fb37c1b72a648974c1730bf5c32439987558f8e8b1
SHA512a7538c6b7e17c35f053721308b8d6dc53a90e79930ff4ed5cffecaa97f4d0fbc5f9e8b59f1383d8f0699c8d4f1331f226af71d40325022d10b885606a72fe668
-
Filesize
710KB
MD528e568616a7b792cac1726deb77d9039
SHA139890a418fb391b823ed5084533e2e24dff021e1
SHA2569597798f7789adc29fbe97707b1bd8ca913c4d5861b0ad4fdd6b913af7c7a8e2
SHA51285048799e6d2756f1d6af77f34e6a1f454c48f2f43042927845931b7ecff2e5de45f864627a3d4aa061252401225bbb6c2caa8532320ccbe401e97c9c79ac8e5
-
Filesize
948KB
MD5774aaeba533c7fbed25569813c934b60
SHA1b5b428262354db7555e6b1eb8de765394fa30a4e
SHA2563d3cdb426deec40320c790b8ec5d379b530534a81a4c412c356d1578bda747f7
SHA5126f64461b7e46fab134476e0eebf0b4f94820eaa7aec911d7452d8fa20b5f4f38e2ea3deb5fc2f7f7a151c3e93dc54a27628c929b72490765eb5e07b92a64ab5e
-
Filesize
1.7MB
MD54e1aeb2af7f03489910191a52ca62e9d
SHA119aa302c12320006830d98435904f87dbb6fda37
SHA2568542a31a1ac10834026660ffab1ceb88d1cf399a802f63bdca797750b7819004
SHA512a7b04afc4dd5943ba821c4daf9ec234a00889a5300bc7726f44df79c163b13b3db579943d1e8629cfd952c89f1e0debd0060e80daab0c1fb5bd0acd15ab34dc1
-
Filesize
2.7MB
MD5dfa1d74fad6aef6a4c1fd736ccd95585
SHA1f4766bee65c0fcaa31b76b8aed2e90f2580eeb5e
SHA2562991aa056bee31bcc643575cf2e574785d6a1c326f290a8dd6fd325a3aa9d17b
SHA5127a571fdbc53be01191087db37486e93d1d31f300ef17cc8708f2c94d77f26391f7772ade662aac57e64b2bd5df01fdf007c396db4549c79247fe00b9ed650966
-
Filesize
384KB
MD5dfd5f78a711fa92337010ecc028470b4
SHA11a389091178f2be8ce486cd860de16263f8e902e
SHA256da96f2eb74e60de791961ef3800c36a5e12202fe97ae5d2fcfc1fe404bc13c0d
SHA512a3673074919039a2dc854b0f91d1e1a69724056594e33559741f53594e0f6e61e3d99ec664d541b17f09ffdebc2de1b042eec19ca8477fac86359c703f8c9656
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
3.0MB
MD5f00748070014e907402d3b74efe95914
SHA1f76796b85089b5265a8ef437317220d407f2e5a4
SHA2562c822ca7c7bd7975474d0d8049a0116f9adbca9edc9af681971aa236a2e0976c
SHA512cf4854b3d016767b658baa8eafcf9f0d0737fa65c7595d652c0f684994797a562f79923b5da6b1d8492a68601bf2d4f56a877a53f3f25d9637ce3acadbeeec7f
-
Filesize
1.6MB
MD572491c7b87a7c2dd350b727444f13bb4
SHA11e9338d56db7ded386878eab7bb44b8934ab1bc7
SHA25634ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891
SHA512583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511
-
Filesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628
-
Filesize
2.2MB
MD5579a63bebccbacab8f14132f9fc31b89
SHA1fca8a51077d352741a9c1ff8a493064ef5052f27
SHA2560ac3504d5fa0460cae3c0fd9c4b628e1a65547a60563e6d1f006d17d5a6354b0
SHA5124a58ca0f392187a483b9ef652b6e8b2e60d01daa5d331549df9f359d2c0a181e975cf9df79552e3474b9d77f8e37a1cf23725f32d4cdbe4885e257a7625f7b1f
-
Filesize
1.7MB
MD55659eba6a774f9d5322f249ad989114a
SHA14bfb12aa98a1dc2206baa0ac611877b815810e4c
SHA256e04346fee15c3f98387a3641e0bba2e555a5a9b0200e4b9256b1b77094069ae4
SHA512f93abf2787b1e06ce999a0cbc67dc787b791a58f9ce20af5587b2060d663f26be9f648d116d9ca279af39299ea5d38e3c86271297e47c1438102ca28fce8edc4
-
Filesize
1.7MB
MD55404286ec7853897b3ba00adf824d6c1
SHA139e543e08b34311b82f6e909e1e67e2f4afec551
SHA256ec94a6666a3103ba6be60b92e843075a2d7fe7d30fa41099c3f3b1e2a5eba266
SHA512c4b78298c42148d393feea6c3941c48def7c92ef0e6baac99144b083937d0a80d3c15bd9a0bf40daa60919968b120d62999fa61af320e507f7e99fbfe9b9ef30
-
Filesize
1.7MB
MD55eb39ba3698c99891a6b6eb036cfb653
SHA1d2f1cdd59669f006a2f1aa9214aeed48bc88c06e
SHA256e77f5e03ae140dda27d73e1ffe43f7911e006a108cf51cbd0e05d73aa92da7c2
SHA5126c4ca20e88d49256ed9cabec0d1f2b00dfcf3d1603b5c95d158d4438c9f1e58495f8dfa200dbe7f49b5b0dd57886517eb3b98c4190484548720dad4b3db6069e
-
Filesize
1.7MB
MD57187cc2643affab4ca29d92251c96dee
SHA1ab0a4de90a14551834e12bb2c8c6b9ee517acaf4
SHA256c7e92a1af295307fb92ad534e05fba879a7cf6716f93aefca0ebfcb8cee7a830
SHA51227985d317a5c844871ffb2527d04aa50ef7442b2f00d69d5ab6bbb85cd7be1d7057ffd3151d0896f05603677c2f7361ed021eac921e012d74da049ef6949e3a3
-
Filesize
1.7MB
MD5b7d1e04629bec112923446fda5391731
SHA1814055286f963ddaa5bf3019821cb8a565b56cb8
SHA2564da77d4ee30ad0cd56cd620f4e9dc4016244ace015c5b4b43f8f37dd8e3a8789
SHA51279fc3606b0fe6a1e31a2ecacc96623caf236bf2be692dadab6ea8ffa4af4231d782094a63b76631068364ac9b6a872b02f1e080636eba40ed019c2949a8e28db
-
Filesize
1.7MB
MD50dc4014facf82aa027904c1be1d403c1
SHA15e6d6c020bfc2e6f24f3d237946b0103fe9b1831
SHA256a29ddd29958c64e0af1a848409e97401307277bb6f11777b1cfb0404a6226de7
SHA512cbeead189918657cc81e844ed9673ee8f743aed29ad9948e90afdfbecacc9c764fbdbfb92e8c8ceb5ae47cee52e833e386a304db0572c7130d1a54fd9c2cc028
-
Filesize
3.3MB
MD5cea368fc334a9aec1ecff4b15612e5b0
SHA1493d23f72731bb570d904014ffdacbba2334ce26
SHA25607e38cad68b0cdbea62f55f9bc6ee80545c2e1a39983baa222e8af788f028541
SHA512bed35a1cc56f32e0109ea5a02578489682a990b5cefa58d7cf778815254af9849e731031e824adba07c86c8425df58a1967ac84ce004c62e316a2e51a75c8748
-
Filesize
3.3MB
MD5045b0a3d5be6f10ddf19ae6d92dfdd70
SHA10387715b6681d7097d372cd0005b664f76c933c7
SHA25694b392e94fa47d1b9b7ae6a29527727268cc2e3484e818c23608f8835bc1104d
SHA51258255a755531791b888ffd9b663cc678c63d5caa932260e9546b1b10a8d54208334725c14529116b067bcf5a5e02da85e015a3bed80092b7698a43dab0168c7b
-
Filesize
1.7MB
MD583d75087c9bf6e4f07c36e550731ccde
SHA1d5ff596961cce5f03f842cfd8f27dde6f124e3ae
SHA25646db3164bebffc61c201fe1e086bffe129ddfed575e6d839ddb4f9622963fb3f
SHA512044e1f5507e92715ce9df8bb802e83157237a2f96f39bac3b6a444175f1160c4d82f41a0bcecf5feaf1c919272ed7929baef929a8c3f07deecebc44b0435164a
-
Filesize
440B
MD53626532127e3066df98e34c3d56a1869
SHA15fa7102f02615afde4efd4ed091744e842c63f78
SHA2562a0e18ef585db0802269b8c1ddccb95ce4c0bac747e207ee6131dee989788bca
SHA512dcce66d6e24d5a4a352874144871cd73c327e04c1b50764399457d8d70a9515f5bc0a650232763bf34d4830bab70ee4539646e7625cfe5336a870e311043b2bd
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\AlternateServices.bin
Filesize18KB
MD581cc613d2c21c82cdfcd7165ace5c510
SHA1807b57ed025433eb8902fabb68d2a04b3f204ccb
SHA256d456578e43955d6f5c31a49f151482b2b4ef2056c9536fbc53a8b7e182cffeb7
SHA512afe7f525839807d7bc4ab8c1f12d31ec8df3d40f2743ba1555babd181d873c2ca3acfe4b874020ff715c2ff8428fe37c1f76f4c123c553f92a0fae3986ae5a49
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\AlternateServices.bin
Filesize8KB
MD523bfe872ef446a8a4240e45b389d0f78
SHA19510c8fb00a2301983bdb21d6dc7ce7de598fb50
SHA256064d8aa418e2df18283e22d937bb762e41e593cc07194888c44d8d44c7ac1016
SHA512aa42f32a129e2239772cdcc271477356e1e303b582230348f2045118f87afaae5088c6692ca923de4c36dab12b8db2e619da4548b12d63c1481e308055bae551
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\AlternateServices.bin
Filesize10KB
MD54084f83b7889c34b2b1baf6e2596a01b
SHA1a9091cfd2caab67b3141d53bb6da3a9af1e51cec
SHA2566dc42a280c097fd43bc850995785081cfe0242376b3460a45e966e9493cbe196
SHA512661ba48771bf027e02238d866cc695f9e71d5fe2d5653687ff420e72fde557b3a9bd101ca06061f13e2c224cb007380c390a59b9c866f027de7715373a2d1c24
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5055d1c7af7b8aac662d96171f894297c
SHA129c35e84e2ac4734be8abb050e43f248376efeae
SHA25635ec80df817699407dec5f6f3f47bf2645b1e1db9610c63c525aa74af63af318
SHA5122c6ea11d4b991df0629d8b8b792e15a01deb6e46a614464711a6c12c29f8997028e7ffdcfca9c4dec2e1f26a4a6c9a711fbfc86edcf7a65bfb0ed2792303403e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5c9e134c9e1275256fb9e4629768287b9
SHA12486bd04c193c4ea9234e97d698a335eae42a02d
SHA256b8ef318f27414aa234cb85b9209d071e25c133013129e525ffe9d5452b296780
SHA51264c3b5b30792bb7ecaf9392081df8078f71bb38f69cdd5abebfcccdec6ffa89c7a19e5e3c64ee6af4510dc72aaa9aa8ccef4af1ebd1ac70d9db90d01cfe0c5d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5e7ab7eda5d59f22209b3256e2595c11e
SHA1d521ed00516d271d3a23109409b5b8704b8ff0c2
SHA2564772e192645c4f1443a997f1c1bb16a142162ea3f2a757596675d4316903ad8b
SHA5121ff57a3b84eda2d3a18dcc8179c85fb58cc1d84730afde91d934952575392a4522b806724279b7f58d52d5f0fdaf24f120153ad860da9efb7cc0fdb4a9452925
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD534e7738306f8ae0af8b66256a71da124
SHA187cfc7a163da477dbf50d18e340f0c92567948c0
SHA256bffcc92caf6d0e363efe01c96aa5c4cf76bf0d4211c218291b47d66d65998ed4
SHA512d10367da3051b4a415555fbe736027c214522177ef7dd146874a13dc9086c891f7822d77554e4e24df32528033598bbb07dd34949f682befc19c6bc77246548f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\pending_pings\0ae47108-0334-4dd3-8c2a-bdd44c2340e8
Filesize26KB
MD53037a1bb65ff1bbca69e9606d89f4f78
SHA1b9116d5af9179d324d9e26501be53ffaa371621f
SHA25690ec1d04fcb3bddfa1745d35098377a307f9a77c70154d4426b43e3b8e6d1c29
SHA51200809d71f9a095ba254b34dac4ac46faba595e47b49659242f11aa0a0a6b4d379b8ac78c303f83c32eee394ffc6a0d86c00d46fdef5b87c10aa16c934c5d4cb0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\pending_pings\460c2ebe-440b-4866-a894-ae05d3b84e45
Filesize671B
MD54694662fc3d357fd45253182c31c50e1
SHA11427d0c1adc0e0e922f95c50175a94a97cb96add
SHA256ef1168c57c71aa6d8d8d6d0f15609fbed92099ae255219264638a684f0a0576f
SHA512526131f92c1938c25ccec44edb6dec4e43021e4b486a591d4286273a38c56de95a062429d95d9a5c5b773a81009e1ba618faedd0141b557b75fa8d094d2d4f41
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\pending_pings\83f0d422-8b00-4931-b9a8-ace10684470c
Filesize982B
MD539ed82e2cd73f15d855dd926dfba12a4
SHA1407c29ceba16c10007c168b5db612e6edc1037d0
SHA2562193acf2cb1fa1ce5f40c5e6a86214036d63f9e8f6763780392183a579eb9bf9
SHA51251b1afc3fe93daad95971c0e272a1105a9499eb81b39360df3263142ae5e7f4e5ff34807bd4afa75380fa4e576da537243bfd1cfebf668cd297a55f98f88414c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD544f8623c483bc3939ead6a6bd8edf0fa
SHA16bc47ef2dbb1d696e3018e2e241ecd1742057e1f
SHA256b70a5b1058fcf9a7a6557e3d1a83f3dd4f60e394cc03a892344fd0b8b052d775
SHA5124fed927558d6880b19d3ef7ae0e14e6872c8509a4f179007efb7dfd47a965fd14585b758950bd4f4af81a88cce12919c6e0c5c57dbb5c477724b0fc050c37085
-
Filesize
15KB
MD5b88ca283dc84bdda4181118b7313a4fd
SHA1aa862ac6fa83fe0c1fa521b3a009e26e7b71a73f
SHA2560e03e0846489b00f85979d708915b976ab0ec3748efad9cf7cfea96c5f7e8d8a
SHA512eb8805cdf55c9a5faf42eb97df3cd4a2d2b76b6ef5effb3e735aadb04de2b9833c8f28bca02e41b23cfc37e471730c75ef511e862729fca0239761666454e3ff
-
Filesize
10KB
MD5c24cfa12c04c2a51386b08b08d3d25e8
SHA18ae7b50b15df68892e321b7b599e2bf11a7d65c4
SHA2562c44f524ebe8e2b8b3586f57bd9f23f4264528d6758f38b7488199079a66e692
SHA512fc06923ffd09b0120563ab4369f7e5794d77b329a761c7434e62a147d85308ec88e2b818240251e82e9f8d9eab17243121ffee1ad25e1f676ba5c0f515fb2176
-
Filesize
12KB
MD59b19ab059a21e4559f57b37629e447af
SHA144b2e7c66d0ba6797f8e78b5ba80304811864387
SHA256212fb9cf6d7f442fe3b5d57ca0ebbe334b175c270b8420f2b83e808a3b03ca3d
SHA5122f25a179f509249cf9f29fb56aec877b5123bad0e8d28ec98137688663eb9302d2eeafc8e770ea4344e32d647930ebd37affc7dfd0eae3123009ebda6fec06e2