Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-12-2024 02:07
Static task
static1
Behavioral task
behavioral1
Sample
055c34101c332838618fdedb730655f61b97553c5e56df94efd373667a3db895.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
055c34101c332838618fdedb730655f61b97553c5e56df94efd373667a3db895.exe
Resource
win10v2004-20241007-en
General
-
Target
055c34101c332838618fdedb730655f61b97553c5e56df94efd373667a3db895.exe
-
Size
2.8MB
-
MD5
8cbe0ced0c0f7bfbdf19128ba80adb99
-
SHA1
15e615a0fe64fe5200dd916232d9bc26b1c3d815
-
SHA256
055c34101c332838618fdedb730655f61b97553c5e56df94efd373667a3db895
-
SHA512
4b258260770b08fdd8f14b7bf0e703b8ca5010e4698e457bc0cfc76c246fb9e7c60ee4d2068b717f8205c2c1954d3b6b8742ed2547b67082f5b89c63d850e938
-
SSDEEP
49152:kNv6yZz1fXBB9nu/SkIK3OdW+56W0xSDmoJb3:s6yZz1fRB9nu/SkIK3ibpDmA
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://sordid-snaked.cyou/api
https://awake-weaves.cyou/api
https://wrathful-jammy.cyou/api
https://debonairnukk.xyz/api
https://diffuculttan.xyz/api
https://effecterectz.xyz/api
https://deafeninggeh.biz/api
https://immureprech.biz/api
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Gcleaner family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 9e5ddb0b67.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 9e5ddb0b67.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 9e5ddb0b67.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 9e5ddb0b67.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 9e5ddb0b67.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 9e5ddb0b67.exe -
Stealc family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 912 created 1192 912 fa887dd056.exe 21 -
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF fe44e31f5d.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 12 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5427121a94.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 055c34101c332838618fdedb730655f61b97553c5e56df94efd373667a3db895.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0fce128665.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9e5ddb0b67.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c0601430fa.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ fa887dd056.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a974a76264.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 87cd20bdb5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e99158d429.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 44a8e4a3bb.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ fe44e31f5d.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2720 powershell.exe 3808 powershell.exe 5088 powershell.exe 892 powershell.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 24 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 055c34101c332838618fdedb730655f61b97553c5e56df94efd373667a3db895.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a974a76264.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9e5ddb0b67.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9e5ddb0b67.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e99158d429.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c0601430fa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 055c34101c332838618fdedb730655f61b97553c5e56df94efd373667a3db895.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a974a76264.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0fce128665.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 44a8e4a3bb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 44a8e4a3bb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5427121a94.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 87cd20bdb5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c0601430fa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion fa887dd056.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5427121a94.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion fa887dd056.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion fe44e31f5d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion fe44e31f5d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 87cd20bdb5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0fce128665.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e99158d429.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ApproximateSize.vbs UZAj8wc.exe -
Executes dropped EXE 36 IoCs
pid Process 2260 skotes.exe 816 INOKWGC.exe 1768 8ZVMneG.exe 2928 8ZVMneG.exe 2656 UZAj8wc.exe 5796 a974a76264.exe 6028 2891211e0d.exe 6132 ec404594f2.exe 3492 87cd20bdb5.exe 4232 0fce128665.exe 4812 a464a87709.exe 4420 9e5ddb0b67.exe 5076 e99158d429.exe 5424 91bb17cccd.exe 5632 2891211e0d.exe 5816 c0601430fa.exe 2872 a14ff0616a.exe 5908 44a8e4a3bb.exe 912 fa887dd056.exe 3616 0abba223fa.exe 2296 c99aeac7c1.exe 3256 7z.exe 3308 7z.exe 3364 7z.exe 2496 7z.exe 3388 7z.exe 3488 7z.exe 3636 7z.exe 3676 7z.exe 4252 in.exe 4436 a14ff0616a.exe 10896 fe44e31f5d.exe 11176 5427121a94.exe 2432 1598c88859.exe 1332 1598c88859.exe 5872 Intel_PTT_EK_Recertification.exe -
Identifies Wine through registry keys 2 TTPs 12 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine 5427121a94.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine 055c34101c332838618fdedb730655f61b97553c5e56df94efd373667a3db895.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine a974a76264.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine e99158d429.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine 44a8e4a3bb.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine fa887dd056.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine 87cd20bdb5.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine 0fce128665.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine 9e5ddb0b67.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine c0601430fa.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine fe44e31f5d.exe -
Loads dropped DLL 64 IoCs
pid Process 1924 055c34101c332838618fdedb730655f61b97553c5e56df94efd373667a3db895.exe 2260 skotes.exe 2260 skotes.exe 2260 skotes.exe 1768 8ZVMneG.exe 2260 skotes.exe 2260 skotes.exe 2260 skotes.exe 2260 skotes.exe 2260 skotes.exe 2260 skotes.exe 2260 skotes.exe 3944 WerFault.exe 3944 WerFault.exe 3944 WerFault.exe 3944 WerFault.exe 3944 WerFault.exe 2260 skotes.exe 2260 skotes.exe 2260 skotes.exe 2260 skotes.exe 2260 skotes.exe 2260 skotes.exe 2260 skotes.exe 2260 skotes.exe 6028 2891211e0d.exe 2260 skotes.exe 2260 skotes.exe 2260 skotes.exe 2260 skotes.exe 2260 skotes.exe 2260 skotes.exe 2260 skotes.exe 2260 skotes.exe 2260 skotes.exe 2260 skotes.exe 3212 cmd.exe 3256 7z.exe 3212 cmd.exe 3308 7z.exe 3212 cmd.exe 3364 7z.exe 3212 cmd.exe 2496 7z.exe 3212 cmd.exe 3388 7z.exe 3212 cmd.exe 3488 7z.exe 3212 cmd.exe 3636 7z.exe 3212 cmd.exe 3676 7z.exe 3212 cmd.exe 3212 cmd.exe 2872 a14ff0616a.exe 5076 e99158d429.exe 2260 skotes.exe 2260 skotes.exe 2260 skotes.exe 2260 skotes.exe 2260 skotes.exe 2432 1598c88859.exe 5848 taskeng.exe 5848 taskeng.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 9e5ddb0b67.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 9e5ddb0b67.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\a974a76264.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1018024001\\a974a76264.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\87cd20bdb5.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1018099001\\87cd20bdb5.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\0fce128665.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1018100001\\0fce128665.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\a464a87709.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1018101001\\a464a87709.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\9e5ddb0b67.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1018102001\\9e5ddb0b67.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000500000001878c-1427.dat autoit_exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
pid Process 1924 055c34101c332838618fdedb730655f61b97553c5e56df94efd373667a3db895.exe 2260 skotes.exe 5796 a974a76264.exe 3492 87cd20bdb5.exe 4232 0fce128665.exe 4420 9e5ddb0b67.exe 5076 e99158d429.exe 5816 c0601430fa.exe 5908 44a8e4a3bb.exe 912 fa887dd056.exe 10896 fe44e31f5d.exe 11176 5427121a94.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 1768 set thread context of 2928 1768 8ZVMneG.exe 36 PID 6028 set thread context of 5632 6028 2891211e0d.exe 77 PID 2872 set thread context of 4436 2872 a14ff0616a.exe 112 PID 2432 set thread context of 1332 2432 1598c88859.exe 117 PID 5872 set thread context of 5884 5872 Intel_PTT_EK_Recertification.exe 120 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 055c34101c332838618fdedb730655f61b97553c5e56df94efd373667a3db895.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3944 2656 WerFault.exe 37 -
System Location Discovery: System Language Discovery 1 TTPs 37 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9e5ddb0b67.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a14ff0616a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1598c88859.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8ZVMneG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language a464a87709.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2891211e0d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fe44e31f5d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ec404594f2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage a464a87709.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fa887dd056.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UZAj8wc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 87cd20bdb5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e99158d429.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8ZVMneG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 44a8e4a3bb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dialer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0abba223fa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c99aeac7c1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a464a87709.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a974a76264.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0fce128665.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a14ff0616a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1598c88859.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 055c34101c332838618fdedb730655f61b97553c5e56df94efd373667a3db895.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2891211e0d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c0601430fa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4352 powershell.exe 4872 PING.EXE 5632 powershell.exe 3484 PING.EXE -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 5040 taskkill.exe 5144 taskkill.exe 5268 taskkill.exe 5380 taskkill.exe 4868 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_Classes\Local Settings firefox.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 8ZVMneG.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 8ZVMneG.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 8ZVMneG.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 a974a76264.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 040000000100000010000000d474de575c39b2d39c8583c5c065498a0f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a8090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703085300000001000000230000003021301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc30b00000001000000120000004400690067006900430065007200740000001d00000001000000100000008f76b981d528ad4770088245e2031b630300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc25190000000100000010000000ba4f3972e7aed9dccdc210db59da13c92000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a a974a76264.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 4872 PING.EXE 3484 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4300 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1924 055c34101c332838618fdedb730655f61b97553c5e56df94efd373667a3db895.exe 2260 skotes.exe 2656 UZAj8wc.exe 2656 UZAj8wc.exe 2656 UZAj8wc.exe 5796 a974a76264.exe 6132 ec404594f2.exe 2836 powershell.exe 892 powershell.exe 2720 powershell.exe 3492 87cd20bdb5.exe 2656 UZAj8wc.exe 4232 0fce128665.exe 4812 a464a87709.exe 4420 9e5ddb0b67.exe 4420 9e5ddb0b67.exe 4812 a464a87709.exe 4812 a464a87709.exe 4420 9e5ddb0b67.exe 4420 9e5ddb0b67.exe 5076 e99158d429.exe 5076 e99158d429.exe 5816 c0601430fa.exe 5816 c0601430fa.exe 5908 44a8e4a3bb.exe 5908 44a8e4a3bb.exe 912 fa887dd056.exe 912 fa887dd056.exe 912 fa887dd056.exe 912 fa887dd056.exe 912 fa887dd056.exe 912 fa887dd056.exe 4724 dialer.exe 4724 dialer.exe 4724 dialer.exe 4724 dialer.exe 3616 0abba223fa.exe 3808 powershell.exe 5088 powershell.exe 4352 powershell.exe 10896 fe44e31f5d.exe 10896 fe44e31f5d.exe 10896 fe44e31f5d.exe 10896 fe44e31f5d.exe 10896 fe44e31f5d.exe 10896 fe44e31f5d.exe 10896 fe44e31f5d.exe 10896 fe44e31f5d.exe 4436 a14ff0616a.exe 4436 a14ff0616a.exe 4436 a14ff0616a.exe 10896 fe44e31f5d.exe 10896 fe44e31f5d.exe 10896 fe44e31f5d.exe 10896 fe44e31f5d.exe 10896 fe44e31f5d.exe 10896 fe44e31f5d.exe 10896 fe44e31f5d.exe 10896 fe44e31f5d.exe 10896 fe44e31f5d.exe 11176 5427121a94.exe 11176 5427121a94.exe 5872 Intel_PTT_EK_Recertification.exe 5632 powershell.exe -
Suspicious use of AdjustPrivilegeToken 54 IoCs
description pid Process Token: SeDebugPrivilege 2656 UZAj8wc.exe Token: SeDebugPrivilege 6028 2891211e0d.exe Token: SeDebugPrivilege 6132 ec404594f2.exe Token: SeDebugPrivilege 2836 powershell.exe Token: SeDebugPrivilege 892 powershell.exe Token: SeDebugPrivilege 2720 powershell.exe Token: SeDebugPrivilege 2656 UZAj8wc.exe Token: SeDebugPrivilege 4868 taskkill.exe Token: SeDebugPrivilege 5040 taskkill.exe Token: SeDebugPrivilege 5144 taskkill.exe Token: SeDebugPrivilege 5268 taskkill.exe Token: SeDebugPrivilege 5380 taskkill.exe Token: SeDebugPrivilege 2944 firefox.exe Token: SeDebugPrivilege 2944 firefox.exe Token: SeDebugPrivilege 4420 9e5ddb0b67.exe Token: SeDebugPrivilege 3616 0abba223fa.exe Token: SeDebugPrivilege 3808 powershell.exe Token: SeDebugPrivilege 5088 powershell.exe Token: SeRestorePrivilege 3256 7z.exe Token: 35 3256 7z.exe Token: SeSecurityPrivilege 3256 7z.exe Token: SeSecurityPrivilege 3256 7z.exe Token: SeRestorePrivilege 3308 7z.exe Token: 35 3308 7z.exe Token: SeSecurityPrivilege 3308 7z.exe Token: SeSecurityPrivilege 3308 7z.exe Token: SeRestorePrivilege 3364 7z.exe Token: 35 3364 7z.exe Token: SeSecurityPrivilege 3364 7z.exe Token: SeSecurityPrivilege 3364 7z.exe Token: SeRestorePrivilege 2496 7z.exe Token: 35 2496 7z.exe Token: SeSecurityPrivilege 2496 7z.exe Token: SeSecurityPrivilege 2496 7z.exe Token: SeRestorePrivilege 3388 7z.exe Token: 35 3388 7z.exe Token: SeSecurityPrivilege 3388 7z.exe Token: SeSecurityPrivilege 3388 7z.exe Token: SeRestorePrivilege 3488 7z.exe Token: 35 3488 7z.exe Token: SeSecurityPrivilege 3488 7z.exe Token: SeSecurityPrivilege 3488 7z.exe Token: SeRestorePrivilege 3636 7z.exe Token: 35 3636 7z.exe Token: SeSecurityPrivilege 3636 7z.exe Token: SeSecurityPrivilege 3636 7z.exe Token: SeRestorePrivilege 3676 7z.exe Token: 35 3676 7z.exe Token: SeSecurityPrivilege 3676 7z.exe Token: SeSecurityPrivilege 3676 7z.exe Token: SeDebugPrivilege 4352 powershell.exe Token: SeDebugPrivilege 4436 a14ff0616a.exe Token: SeDebugPrivilege 5632 powershell.exe Token: SeLockMemoryPrivilege 5884 explorer.exe -
Suspicious use of FindShellTrayWindow 15 IoCs
pid Process 1924 055c34101c332838618fdedb730655f61b97553c5e56df94efd373667a3db895.exe 4812 a464a87709.exe 4812 a464a87709.exe 4812 a464a87709.exe 4812 a464a87709.exe 4812 a464a87709.exe 4812 a464a87709.exe 2944 firefox.exe 2944 firefox.exe 2944 firefox.exe 2944 firefox.exe 4812 a464a87709.exe 4812 a464a87709.exe 4812 a464a87709.exe 4812 a464a87709.exe -
Suspicious use of SendNotifyMessage 13 IoCs
pid Process 4812 a464a87709.exe 4812 a464a87709.exe 4812 a464a87709.exe 4812 a464a87709.exe 4812 a464a87709.exe 4812 a464a87709.exe 2944 firefox.exe 2944 firefox.exe 2944 firefox.exe 4812 a464a87709.exe 4812 a464a87709.exe 4812 a464a87709.exe 4812 a464a87709.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1924 wrote to memory of 2260 1924 055c34101c332838618fdedb730655f61b97553c5e56df94efd373667a3db895.exe 30 PID 1924 wrote to memory of 2260 1924 055c34101c332838618fdedb730655f61b97553c5e56df94efd373667a3db895.exe 30 PID 1924 wrote to memory of 2260 1924 055c34101c332838618fdedb730655f61b97553c5e56df94efd373667a3db895.exe 30 PID 1924 wrote to memory of 2260 1924 055c34101c332838618fdedb730655f61b97553c5e56df94efd373667a3db895.exe 30 PID 2260 wrote to memory of 816 2260 skotes.exe 33 PID 2260 wrote to memory of 816 2260 skotes.exe 33 PID 2260 wrote to memory of 816 2260 skotes.exe 33 PID 2260 wrote to memory of 816 2260 skotes.exe 33 PID 2260 wrote to memory of 816 2260 skotes.exe 33 PID 2260 wrote to memory of 816 2260 skotes.exe 33 PID 2260 wrote to memory of 816 2260 skotes.exe 33 PID 2260 wrote to memory of 1768 2260 skotes.exe 34 PID 2260 wrote to memory of 1768 2260 skotes.exe 34 PID 2260 wrote to memory of 1768 2260 skotes.exe 34 PID 2260 wrote to memory of 1768 2260 skotes.exe 34 PID 1768 wrote to memory of 2928 1768 8ZVMneG.exe 36 PID 1768 wrote to memory of 2928 1768 8ZVMneG.exe 36 PID 1768 wrote to memory of 2928 1768 8ZVMneG.exe 36 PID 1768 wrote to memory of 2928 1768 8ZVMneG.exe 36 PID 1768 wrote to memory of 2928 1768 8ZVMneG.exe 36 PID 1768 wrote to memory of 2928 1768 8ZVMneG.exe 36 PID 1768 wrote to memory of 2928 1768 8ZVMneG.exe 36 PID 1768 wrote to memory of 2928 1768 8ZVMneG.exe 36 PID 1768 wrote to memory of 2928 1768 8ZVMneG.exe 36 PID 1768 wrote to memory of 2928 1768 8ZVMneG.exe 36 PID 2260 wrote to memory of 2656 2260 skotes.exe 37 PID 2260 wrote to memory of 2656 2260 skotes.exe 37 PID 2260 wrote to memory of 2656 2260 skotes.exe 37 PID 2260 wrote to memory of 2656 2260 skotes.exe 37 PID 2260 wrote to memory of 5796 2260 skotes.exe 39 PID 2260 wrote to memory of 5796 2260 skotes.exe 39 PID 2260 wrote to memory of 5796 2260 skotes.exe 39 PID 2260 wrote to memory of 5796 2260 skotes.exe 39 PID 2260 wrote to memory of 6028 2260 skotes.exe 40 PID 2260 wrote to memory of 6028 2260 skotes.exe 40 PID 2260 wrote to memory of 6028 2260 skotes.exe 40 PID 2260 wrote to memory of 6028 2260 skotes.exe 40 PID 2260 wrote to memory of 6028 2260 skotes.exe 40 PID 2260 wrote to memory of 6028 2260 skotes.exe 40 PID 2260 wrote to memory of 6028 2260 skotes.exe 40 PID 2260 wrote to memory of 6132 2260 skotes.exe 41 PID 2260 wrote to memory of 6132 2260 skotes.exe 41 PID 2260 wrote to memory of 6132 2260 skotes.exe 41 PID 2260 wrote to memory of 6132 2260 skotes.exe 41 PID 2656 wrote to memory of 2836 2656 UZAj8wc.exe 43 PID 2656 wrote to memory of 2836 2656 UZAj8wc.exe 43 PID 2656 wrote to memory of 2836 2656 UZAj8wc.exe 43 PID 2656 wrote to memory of 2836 2656 UZAj8wc.exe 43 PID 6132 wrote to memory of 892 6132 ec404594f2.exe 45 PID 6132 wrote to memory of 892 6132 ec404594f2.exe 45 PID 6132 wrote to memory of 892 6132 ec404594f2.exe 45 PID 6132 wrote to memory of 892 6132 ec404594f2.exe 45 PID 6132 wrote to memory of 2720 6132 ec404594f2.exe 47 PID 6132 wrote to memory of 2720 6132 ec404594f2.exe 47 PID 6132 wrote to memory of 2720 6132 ec404594f2.exe 47 PID 6132 wrote to memory of 2720 6132 ec404594f2.exe 47 PID 2260 wrote to memory of 3492 2260 skotes.exe 49 PID 2260 wrote to memory of 3492 2260 skotes.exe 49 PID 2260 wrote to memory of 3492 2260 skotes.exe 49 PID 2260 wrote to memory of 3492 2260 skotes.exe 49 PID 2656 wrote to memory of 3944 2656 UZAj8wc.exe 50 PID 2656 wrote to memory of 3944 2656 UZAj8wc.exe 50 PID 2656 wrote to memory of 3944 2656 UZAj8wc.exe 50 PID 2656 wrote to memory of 3944 2656 UZAj8wc.exe 50 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 3 IoCs
pid Process 4012 attrib.exe 4280 attrib.exe 4276 attrib.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\055c34101c332838618fdedb730655f61b97553c5e56df94efd373667a3db895.exe"C:\Users\Admin\AppData\Local\Temp\055c34101c332838618fdedb730655f61b97553c5e56df94efd373667a3db895.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\1017763001\INOKWGC.exe"C:\Users\Admin\AppData\Local\Temp\1017763001\INOKWGC.exe"4⤵
- Executes dropped EXE
PID:816
-
-
C:\Users\Admin\AppData\Local\Temp\1017855001\8ZVMneG.exe"C:\Users\Admin\AppData\Local\Temp\1017855001\8ZVMneG.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\1017855001\8ZVMneG.exe"C:\Users\Admin\AppData\Local\Temp\1017855001\8ZVMneG.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies system certificate store
PID:2928
-
-
-
C:\Users\Admin\AppData\Local\Temp\1017916001\UZAj8wc.exe"C:\Users\Admin\AppData\Local\Temp\1017916001\UZAj8wc.exe"4⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc 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⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2836
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2656 -s 7445⤵
- Loads dropped DLL
- Program crash
PID:3944
-
-
-
C:\Users\Admin\AppData\Local\Temp\1018024001\a974a76264.exe"C:\Users\Admin\AppData\Local\Temp\1018024001\a974a76264.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:5796
-
-
C:\Users\Admin\AppData\Local\Temp\1018094001\2891211e0d.exe"C:\Users\Admin\AppData\Local\Temp\1018094001\2891211e0d.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:6028 -
C:\Users\Admin\AppData\Local\Temp\1018094001\2891211e0d.exe"C:\Users\Admin\AppData\Local\Temp\1018094001\2891211e0d.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5632
-
-
-
C:\Users\Admin\AppData\Local\Temp\1018098001\ec404594f2.exe"C:\Users\Admin\AppData\Local\Temp\1018098001\ec404594f2.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:6132 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath "C:\frdue"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:892
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2720
-
-
-
C:\Users\Admin\AppData\Local\Temp\1018099001\87cd20bdb5.exe"C:\Users\Admin\AppData\Local\Temp\1018099001\87cd20bdb5.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3492
-
-
C:\Users\Admin\AppData\Local\Temp\1018100001\0fce128665.exe"C:\Users\Admin\AppData\Local\Temp\1018100001\0fce128665.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4232
-
-
C:\Users\Admin\AppData\Local\Temp\1018101001\a464a87709.exe"C:\Users\Admin\AppData\Local\Temp\1018101001\a464a87709.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4812 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4868
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5040
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5144
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5268
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5380
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking5⤵PID:5480
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking6⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2944 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2944.0.274885263\1025907023" -parentBuildID 20221007134813 -prefsHandle 1220 -prefMapHandle 1212 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7c6f1e52-ed4e-4ec0-83c8-76a7ac45ae43} 2944 "\\.\pipe\gecko-crash-server-pipe.2944" 1300 102d9a58 gpu7⤵PID:3368
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2944.1.137088260\1236500762" -parentBuildID 20221007134813 -prefsHandle 1488 -prefMapHandle 1484 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {37248e2c-fafb-4ef8-9e2c-fcb6cfdccb3c} 2944 "\\.\pipe\gecko-crash-server-pipe.2944" 1500 e72d58 socket7⤵PID:3776
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2944.2.913476524\67201995" -childID 1 -isForBrowser -prefsHandle 2072 -prefMapHandle 2068 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 892 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9d2aad69-d4cc-4ee1-9d58-c8d7dba1dcd8} 2944 "\\.\pipe\gecko-crash-server-pipe.2944" 2084 1a588d58 tab7⤵PID:2576
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2944.3.1874964072\1737713488" -childID 2 -isForBrowser -prefsHandle 2904 -prefMapHandle 2900 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 892 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {4de4d4a6-ced9-4487-8af5-69aea12000af} 2944 "\\.\pipe\gecko-crash-server-pipe.2944" 2928 1b9e2858 tab7⤵PID:1656
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2944.4.1526962614\1824265499" -childID 3 -isForBrowser -prefsHandle 3672 -prefMapHandle 3668 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 892 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {86c7cdc6-503c-43a3-bcb8-5b0ad3394ca2} 2944 "\\.\pipe\gecko-crash-server-pipe.2944" 3684 1b4ecb58 tab7⤵PID:3496
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2944.5.1914329656\734811894" -childID 4 -isForBrowser -prefsHandle 3792 -prefMapHandle 3796 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 892 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {38dec5d2-de28-4b63-b9fc-a40d1f5182e3} 2944 "\\.\pipe\gecko-crash-server-pipe.2944" 3780 1f9b0858 tab7⤵PID:3504
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2944.6.1324950450\130363469" -childID 5 -isForBrowser -prefsHandle 3952 -prefMapHandle 3956 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 892 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d502592b-27ca-454b-b9fa-35487bf6f848} 2944 "\\.\pipe\gecko-crash-server-pipe.2944" 3940 1fd30658 tab7⤵PID:3528
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1018102001\9e5ddb0b67.exe"C:\Users\Admin\AppData\Local\Temp\1018102001\9e5ddb0b67.exe"4⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4420
-
-
C:\Users\Admin\AppData\Local\Temp\1018103001\e99158d429.exe"C:\Users\Admin\AppData\Local\Temp\1018103001\e99158d429.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5076
-
-
C:\Users\Admin\AppData\Local\Temp\1018104001\91bb17cccd.exe"C:\Users\Admin\AppData\Local\Temp\1018104001\91bb17cccd.exe"4⤵
- Executes dropped EXE
PID:5424
-
-
C:\Users\Admin\AppData\Local\Temp\1018105001\c0601430fa.exe"C:\Users\Admin\AppData\Local\Temp\1018105001\c0601430fa.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5816
-
-
C:\Users\Admin\AppData\Local\Temp\1018106001\a14ff0616a.exe"C:\Users\Admin\AppData\Local\Temp\1018106001\a14ff0616a.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\1018106001\a14ff0616a.exe"C:\Users\Admin\AppData\Local\Temp\1018106001\a14ff0616a.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4436
-
-
-
C:\Users\Admin\AppData\Local\Temp\1018107001\44a8e4a3bb.exe"C:\Users\Admin\AppData\Local\Temp\1018107001\44a8e4a3bb.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5908
-
-
C:\Users\Admin\AppData\Local\Temp\1018108001\fa887dd056.exe"C:\Users\Admin\AppData\Local\Temp\1018108001\fa887dd056.exe"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:912
-
-
C:\Users\Admin\AppData\Local\Temp\1018109001\0abba223fa.exe"C:\Users\Admin\AppData\Local\Temp\1018109001\0abba223fa.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3616 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath "C:\gabxlp"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3808
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5088
-
-
-
C:\Users\Admin\AppData\Local\Temp\1018110001\c99aeac7c1.exe"C:\Users\Admin\AppData\Local\Temp\1018110001\c99aeac7c1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2296 -
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"5⤵
- Loads dropped DLL
PID:3212 -
C:\Windows\system32\mode.commode 65,106⤵PID:1376
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e file.zip -p24291711423417250691697322505 -oextracted6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:3256
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_7.zip -oextracted6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:3308
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_6.zip -oextracted6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:3364
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_5.zip -oextracted6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2496
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_4.zip -oextracted6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:3388
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_3.zip -oextracted6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:3488
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_2.zip -oextracted6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:3636
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_1.zip -oextracted6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:3676
-
-
C:\Windows\system32\attrib.exeattrib +H "in.exe"6⤵
- Views/modifies file attributes
PID:4012
-
-
C:\Users\Admin\AppData\Local\Temp\main\in.exe"in.exe"6⤵
- Executes dropped EXE
PID:4252 -
C:\Windows\system32\attrib.exeattrib +H +S C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe7⤵
- Views/modifies file attributes
PID:4280
-
-
C:\Windows\system32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe7⤵
- Views/modifies file attributes
PID:4276
-
-
C:\Windows\system32\schtasks.exeschtasks /f /CREATE /TN "Intel_PTT_EK_Recertification" /TR "C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe" /SC MINUTE7⤵
- Scheduled Task/Job: Scheduled Task
PID:4300
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell ping 127.0.0.1; del in.exe7⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4352 -
C:\Windows\system32\PING.EXE"C:\Windows\system32\PING.EXE" 127.0.0.18⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4872
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1018111001\fe44e31f5d.exe"C:\Users\Admin\AppData\Local\Temp\1018111001\fe44e31f5d.exe"4⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:10896
-
-
C:\Users\Admin\AppData\Local\Temp\1018112001\5427121a94.exe"C:\Users\Admin\AppData\Local\Temp\1018112001\5427121a94.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:11176
-
-
C:\Users\Admin\AppData\Local\Temp\1018113001\1598c88859.exe"C:\Users\Admin\AppData\Local\Temp\1018113001\1598c88859.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\1018113001\1598c88859.exe"C:\Users\Admin\AppData\Local\Temp\1018113001\1598c88859.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1332
-
-
-
-
-
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4724
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {07829F7B-7810-4FA4-A274-F63BBB90DDBF} S-1-5-21-4177215427-74451935-3209572229-1000:JSMURNPT\Admin:Interactive:[1]1⤵
- Loads dropped DLL
PID:5848 -
C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exeC:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:5872 -
C:\Windows\explorer.exeexplorer.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:5884
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell ping 127.1.10.1; del Intel_PTT_EK_Recertification.exe3⤵
- Drops file in System32 directory
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5632 -
C:\Windows\system32\PING.EXE"C:\Windows\system32\PING.EXE" 127.1.10.14⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3484
-
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
2Disable or Modify Tools
2Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
3Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\D6V88JEY\download[1].htm
Filesize1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\activity-stream.discovery_stream.json.tmp
Filesize31KB
MD58d7a352aae9b345741f49220b1a63e51
SHA13512072857c4b8762e060584ab60fb871a2d6a4c
SHA256e278dd22e6d944d687e0bfadbb55fbb449f3b35824f35824adff0c10424a02c0
SHA5126d051fb90e1bc8a73378afea4a1a2b82a5f51a2548ae288bd731468d8e8b9ac0606b652e13b343d25ce453d8636547a82a5bb8e2683a00d385c9e45edd3d71be
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\cache2\entries\37373F56CBD822F5FCF64BA01E1320A0924D8460
Filesize24KB
MD5b30f12bac7e1a361b0cf9c3bbca9c7a3
SHA10cd81996c535f58a3622dac2e2d919802c4d3b01
SHA256a838a8a15bbf79e56aed5dab51ee099084d5a671ce4acba99ba780ce0c630e6e
SHA51286c67517a8803c8995b592f422e87726576e0b7e6fd26568beb268424b9f47d3ffff374d9c5c3a91db2ba0cf7df682f8f8e120449b922104c3b082128a2ef91c
-
Filesize
1.3MB
MD5669ed3665495a4a52029ff680ec8eba9
SHA17785e285365a141e307931ca4c4ef00b7ecc8986
SHA2562d2d405409b128eea72a496ccff0ed56f9ed87ee2564ae4815b4b116d4fb74d6
SHA512bedc8f7c1894fc64cdd00ebc58b434b7d931e52c198a0fa55f16f4e3d44a7dc4643eaa78ec55a43cc360571345cd71d91a64037a135663e72eed334fe77a21e6
-
Filesize
791KB
MD5e8af4d0d0b47ac68d762b7f288ae8e6e
SHA11d65f31526cc20ab41d6b1625d6674d7f13e326c
SHA256b83449768e7af68867c8bc42b19ff012722d88ea66aef69df48661e63e0eb15e
SHA51280fad90314ff639f538a72c5e4ca2bf9ae52b9309caa7cd6f87d61791505bb3612b7f3190ab9b67348c5d71f4d29bb9d101e3f66d525eb9b5e2060a10b2d187a
-
Filesize
935KB
MD55b99682cb740202d783dde58ca97f045
SHA1cecae054552ce295feaa0717d2a33e870addcadd
SHA256724e283e1bb29a150c9bebc21bdf0e250e2d87257bf86c889bbe7544329c6882
SHA512c37a2cb06407729344adb85d814223a24ec4fa65f711c7f02c0e77395ec969b7e1bd64a6f5806d4e2d88c8461587d68b6aae3378d2cf5c92f1ade2aacc13f2b2
-
Filesize
2.7MB
MD5af13a753c8a31d591e122e15c1d717bd
SHA1396f37a0874f2bea3d397b7fe7a770f2ef6be173
SHA25605724ef44c4401e17e540e65e3ab7d0d0ffcdb933040cfd38920f9eba67a5845
SHA512b3bbb544e6af579fc3c2f6c52bbac936597b012dc9d094abc7f503122fc3619d6a3a4d4f1b53ef0b3cddd44f6e3f141003f1747b599318c0891131564afef6b2
-
Filesize
3.1MB
MD5c00a67d527ef38dc6f49d0ad7f13b393
SHA17b8f2de130ab5e4e59c3c2f4a071bda831ac219d
SHA25612226ccae8c807641241ba5178d853aad38984eefb0c0c4d65abc4da3f9787c3
SHA5129286d267b167cba01e55e68c8c5582f903bed0dd8bc4135eb528ef6814e60e7d4dda2b3611e13efb56aa993635fbab218b0885daf5daea6043061d8384af40ca
-
Filesize
21KB
MD504f57c6fb2b2cd8dcc4b38e4a93d4366
SHA161770495aa18d480f70b654d1f57998e5bd8c885
SHA25651e4d0cbc184b8abfa6d84e219317cf81bd542286a7cc602c87eb703a39627c2
SHA51253f95e98a5eca472ed6b1dfd6fecd1e28ea66967a1b3aa109fe911dbb935f1abf327438d4b2fe72cf7a0201281e9f56f4548f965b96e3916b9142257627e6ccd
-
Filesize
1.8MB
MD5905a055e55bf1bead1d2df06d2fc9888
SHA10b69e66478bdaa14ea3da0f88cdf8a6b84ba3731
SHA2567f0d53beb82e6590383049463e0375c9905a277b0af46ee79f614ecbe343fd95
SHA512f0295c0e8cc6a3c1146a20c7107b1e7c17cd66d632f8b91b461062451e9ef940e116273cc13b51d780826c9ceee903f3cab7261b43ec9a76ccd01e96de3812d9
-
Filesize
2.8MB
MD552b49bc4dc2268ae5d827a065d5723f7
SHA10fd5a4079dac939869e243966987ece4e146a7fa
SHA256a29343dda6e66875bb76baed5a655a8ea66e0c9759ac76bc3673d3453746282b
SHA51273ce864ecb62eb1d6e022bce9fbf55d2a5765b534e42da616a0560e8c4e8ae034a340f515f234153ae786513a7da76a8ef3b317ef95050afd58fc4eb8dc23adf
-
Filesize
947KB
MD52b09cc7c70204429da7ec05b29fd0487
SHA1688a15b873282d198c33bf387134c4f893878a06
SHA256199114dbdd79a936831dbf3cd57f1ec188bd7ac86ab3971b5dda91040df20408
SHA512382b93aff7c7118a120aa3414efdc428887f5c6353345b12fb62c994d16fa4a26638b988ca46afcf5c86a18da34eafa7770954a6c22a1ab57fe19b2651b87cd1
-
Filesize
2.7MB
MD54e8d2ba58e7eaf8e12bbfbae1766da3b
SHA1c3ad2a4dde5cbd84f903876484f7079b130af930
SHA2564b1089921522eb16c95c7bd868ae9e0688d035714f94b0a3564503b65126614a
SHA512b21e3215e8a8f3ccd30cea8d7bfd3be36c60cffa115106409aae78654081984f2c4536c6180dd255c5e52da07a374f727b6b48c0f7b8686129f5f70e882beea9
-
Filesize
1.8MB
MD56d81636af92fae98c45898823e103e4f
SHA100de607eb0d08dd7936211f25ea4019443e52dd1
SHA25618d3935ee40dffa59b390df8f2544c8a08ab9d5f997b57940b843356127ead92
SHA51221d17f4707521de24258fdb3dbd35b8a2ad17833c286a0d153e9a19a6f57ba52443bbf665af2ffdc067b2872dd71239dd79b5c0b5967d3ef1bad9f7825ec6bbe
-
Filesize
758KB
MD5afd936e441bf5cbdb858e96833cc6ed3
SHA13491edd8c7caf9ae169e21fb58bccd29d95aefef
SHA256c6491d7a6d70c7c51baca7436464667b4894e4989fa7c5e05068dde4699e1cbf
SHA512928c15a1eda602b2a66a53734f3f563ab9626882104e30ee2bf5106cfd6e08ec54f96e3063f1ab89bf13be2c8822a8419f5d8ee0a3583a4c479785226051a325
-
Filesize
1.8MB
MD525fb9c54265bbacc7a055174479f0b70
SHA14af069a2ec874703a7e29023d23a1ada491b584e
SHA256552f8be2c6b2208a89c728f68488930c661b3a06c35a20d133ef7d3c63a86b9c
SHA5127dfd9e0f3fa2d68a6ce8c952e3b755559db73bb7a06c95ad6ed8ac16dedb49be8b8337afc07c9c682f0c4be9db291a551286353e2e2b624223487dc1c8b54668
-
Filesize
1.1MB
MD5ef08a45833a7d881c90ded1952f96cb4
SHA1f04aeeb63a1409bd916558d2c40fab8a5ed8168b
SHA25633c236dc81af2a47d595731d6fa47269b2874b281152530fdffdda9cbeb3b501
SHA51274e84f710c90121527f06d453e9286910f2e8b6ac09d2aeb4ab1f0ead23ea9b410c5d1074d8bc759bc3e766b5bc77d156756c7df093ba94093107393290ced97
-
Filesize
1.8MB
MD5ff279f4e5b1c6fbda804d2437c2dbdc8
SHA12feb3762c877a5ae3ca60eeebc37003ad0844245
SHA256e115298ab160da9c7a998e4ae0b72333f64b207da165134ca45eb997a000d378
SHA512c7a8bbcb122b2c7b57c8b678c5eed075ee5e7c355afbf86238282d2d3458019da1a8523520e1a1c631cd01b555f7df340545fd1e44ad678dc97c40b23428f967
-
Filesize
1.9MB
MD5ed9fb7650e33c7fa5cf0c7dd57483eed
SHA1847fd45efadd1a7c37548771b07a5f007ab4aa40
SHA25637c00d35c082a812602fe1609e5bc87b20864123358828bbc47de9d7498694e1
SHA512440ea66a6056b283312b32c1195f88cd6e8a518af0a8a88c0c51c4b93bad3ef1ce6c5712d84088061192ed4530105f15de04d44e4d3d1ca25cf0b5bd849ccb80
-
Filesize
21KB
MD514becdf1e2402e9aa6c2be0e6167041e
SHA172cbbae6878f5e06060a0038b25ede93b445f0df
SHA2567a769963165063758f15f6e0cece25c9d13072f67fa0d3c25a03a5104fe0783a
SHA51216b837615505f352e134afd9d8655c9cabfa5bfcfbee2c0c34f2d7d9588aa71f875e4e5feb8cdf0f7bacc00f7c1ca8dabd3b3d92afc99abf705c05c78e298b4a
-
Filesize
4.2MB
MD53a425626cbd40345f5b8dddd6b2b9efa
SHA17b50e108e293e54c15dce816552356f424eea97a
SHA256ba9212d2d5cd6df5eb7933fb37c1b72a648974c1730bf5c32439987558f8e8b1
SHA512a7538c6b7e17c35f053721308b8d6dc53a90e79930ff4ed5cffecaa97f4d0fbc5f9e8b59f1383d8f0699c8d4f1331f226af71d40325022d10b885606a72fe668
-
Filesize
4.2MB
MD58664a5a6e958f985735b8a17171550bc
SHA13deb8bfcdc32ddf9a678f44c59aa70e3a7f5bb5f
SHA256ffcc7288342a28c0580bea142951bf4ac33a3f391d8f9323f9e74293d2817e82
SHA512adc1c9bc3af3a39b066a9231ef6bd9119d48dff41a4e5bfac695c40a5d2b9e5e9f4eb6e4779408cd7f22fe0e7e5697d7fa314778864fd13bb321db3f8d0514b0
-
Filesize
4.3MB
MD535e2c99a2fed28f4148ef7f4c1431df4
SHA18b05aa4709fd09892238baa7a14f42d58dd58d14
SHA256d01a1b39c935e182b6e4d6c2c15dfe35a59b086fe55bbea0338bc35626a1d3df
SHA512e03cfe592504f165fdd3a04dc3293d2ac786c51b9b59f6ebc0560013aadde66bdfdcb3c93cd225b51cdff831050e1bfc94977ed761006f10a852fe132a6cebb8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628
-
Filesize
440B
MD53626532127e3066df98e34c3d56a1869
SHA15fa7102f02615afde4efd4ed091744e842c63f78
SHA2562a0e18ef585db0802269b8c1ddccb95ce4c0bac747e207ee6131dee989788bca
SHA512dcce66d6e24d5a4a352874144871cd73c327e04c1b50764399457d8d70a9515f5bc0a650232763bf34d4830bab70ee4539646e7625cfe5336a870e311043b2bd
-
Filesize
442KB
MD585430baed3398695717b0263807cf97c
SHA1fffbee923cea216f50fce5d54219a188a5100f41
SHA256a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA51206511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1
-
Filesize
8.0MB
MD5a01c5ecd6108350ae23d2cddf0e77c17
SHA1c6ac28a2cd979f1f9a75d56271821d5ff665e2b6
SHA256345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42
SHA512b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD56a8c4080b25af4555503f2b45df7867b
SHA188a5be57c2ed156b92a03d85c2b87938fd5eae88
SHA25623cc5c7a77985e8235c73496c4d31cb2ad4066d0a6da42bf6fd1700f095d3227
SHA512aa74e889f14ff9bd414f807e479cffc0aebeecbdf547c3a658191a93bd24a154664f4a5e3453a68d8e4c8876664dee2d34d02324259a52c77f30cf1d165a40fa
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\datareporting\glean\db\data.safe.bin
Filesize9KB
MD5fc5ccbccdad874346c79907dc13bbad4
SHA179fb91e16f1c8db56efdda38a53565296d7e6c0a
SHA2568aa14f715d87527e9a65e294b4e80496c91396af942667128b7fa60ea225403a
SHA51229ba2fe75256049582d262111a441ce947bc046f16db9e3d4cb6c2bf83cf97420a36440ffb75a0ad906303d1ee89e0b39af438111cfd2890c3cddc41b633f745
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\datareporting\glean\pending_pings\01de2ff4-bffe-4e73-8d5c-f08b19671967
Filesize733B
MD58ecdbb0a380fad7f78e5adbab8809988
SHA148492414c6bbbf181c3f4a6c3a7592fe157ac9b9
SHA25687747852e3db48df19b353f8f459a3103324147023f4a9a82377b351ac6ab7b9
SHA5127c760c7afdf9cb752e00abd32d04d2dc3fb7ac0ed0f2eb8f89abd744cdef5279530501908e24c770602dae1962e9b2f48266eb02efe4d985b4a16bc990187091
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll
Filesize997KB
MD5fe3355639648c417e8307c6d051e3e37
SHA1f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA2561ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA5128f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info
Filesize116B
MD53d33cdc0b3d281e67dd52e14435dd04f
SHA14db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json
Filesize372B
MD58be33af717bb1b67fbd61c3f4b807e9e
SHA17cf17656d174d951957ff36810e874a134dd49e0
SHA256e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd
SHA5126125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll
Filesize11.8MB
MD533bf7b0439480effb9fb212efce87b13
SHA1cee50f2745edc6dc291887b6075ca64d716f495a
SHA2568ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e
SHA512d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig
Filesize1KB
MD5937326fead5fd401f6cca9118bd9ade9
SHA14526a57d4ae14ed29b37632c72aef3c408189d91
SHA25668a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81
SHA512b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2
-
Filesize
6KB
MD5307a21baad48d9d529ef392899d2a27c
SHA1b2ddcf037b1031388e9a22f335fb7260c24ca50b
SHA2562acd2a45851ef93283b48492c755612764768cd610a1f44525aa6380b0463529
SHA5125527dcca6a665de5d920c88ee69413785691701f2a7c99f7e61bce38aa479fb91fadd67768770afd63aca03e5396f20ab9fa5488b7b7cf7e4793d2e50ef9423c
-
Filesize
7KB
MD5d240dcb7ea354c6982dcf9c5be8074a1
SHA1a6b4c0ab1f1ed689045adc4ebf867798a44976b4
SHA25649e94db8dbfe795a1787c26648f25d378f2caadcc5ae405d58f29db3283bf683
SHA51275cdde4b803d394100b901e66d084f9a635bb37755a44eaffd833b6b63fcfb3ef5f18ffe96fe0e2c08c117b07b1081f4a1f5c93dad867899b3efe9fd15438039
-
Filesize
7KB
MD5eddaa43b16466ca60a23c6eddf89c1c1
SHA16270139ac71c02e624f6203c9bbee423a57251e3
SHA256ef6eea5ffdc2e6bfeb122e9ef3f0372236f35e71b65f402790d998c57b0af1bb
SHA5123e37ba04b508794d7d980d2e99ef6600477f0fab3408e31295c1133b0e4b647bf4f100e32927ad23dd4b14ca0d00b69488dde10fb2dcec1c323300c40b5839ba
-
Filesize
6KB
MD5d34b521cb01a70cdce09f86b3a253607
SHA10407b5693f8a85039f441f968de2eb365b9c40d7
SHA2569cbba05261bc0a611041b72cdee31877750d525ae3cb7de1ec7b7526f7b5e590
SHA512f366e39cc0c5ca8d5e26642aaef2158808bac908580bc32cb55243984302def4b93e8b1d2eaf52d180c681d9bff9c82f64c31e50b532c0ae4e77e8f866a94420
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD5de33c03ba9564c82330226ea63eb101d
SHA1d884ab73f301867683c37d93fdcf42b73b3a1826
SHA256227e3d6cc82a9f1be8818252a2e393c49e1ab1d1d5790badac89d6f9118efa5a
SHA5120c05514aee1088e0d61f2c220e0e03043626037e943535b4b4871cc6c320c5e3bc0edef94d1eafca489815efbfd94020f59dd9b04e5f6e194ce7831dfaa0b8f8
-
Filesize
2.8MB
MD58cbe0ced0c0f7bfbdf19128ba80adb99
SHA115e615a0fe64fe5200dd916232d9bc26b1c3d815
SHA256055c34101c332838618fdedb730655f61b97553c5e56df94efd373667a3db895
SHA5124b258260770b08fdd8f14b7bf0e703b8ca5010e4698e457bc0cfc76c246fb9e7c60ee4d2068b717f8205c2c1954d3b6b8742ed2547b67082f5b89c63d850e938