Analysis
-
max time kernel
95s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-12-2024 03:45
Static task
static1
Behavioral task
behavioral1
Sample
dd05bc85db757b1910aaadf016e25a8d3798345891943038c2ffc9000b1aabc7N.exe
Resource
win10v2004-20241007-en
General
-
Target
dd05bc85db757b1910aaadf016e25a8d3798345891943038c2ffc9000b1aabc7N.exe
-
Size
6.8MB
-
MD5
d4528c12605f9e5f76bea1fdc0fe8710
-
SHA1
89fe41e33901d9377a725d70c97bdf875be9a77a
-
SHA256
dd05bc85db757b1910aaadf016e25a8d3798345891943038c2ffc9000b1aabc7
-
SHA512
ff99ae86ee5f6401b76d91d50e4aa1f22780042630ec86d08daec48c069e88bde629acb4206323e18264f0128c2fb7cfe8ec29ea187bc600af59bdf61f0071d1
-
SSDEEP
196608:qvTF+jPo9Fozq3ODR5s/ceanQf8fpAAQE/lXQan:O4U9FozzdkkQfIqAQeXQan
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://sordid-snaked.cyou/api
https://awake-weaves.cyou/api
https://wrathful-jammy.cyou/api
https://debonairnukk.xyz/api
https://diffuculttan.xyz/api
https://effecterectz.xyz/api
https://deafeninggeh.biz/api
https://immureprech.biz/api
Extracted
xworm
86.38.225.54:5353
-
Install_directory
%AppData%
-
install_file
VIRUS101RatPayload.exe
Extracted
cryptbot
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Cryptbot family
-
Detect Vidar Stealer 3 IoCs
resource yara_rule behavioral1/files/0x0007000000023cdb-1643.dat family_vidar_v7 behavioral1/memory/3912-1647-0x0000000000400000-0x0000000000639000-memory.dmp family_vidar_v7 behavioral1/memory/3912-1783-0x0000000000400000-0x0000000000639000-memory.dmp family_vidar_v7 -
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/2120-1377-0x0000000000730000-0x0000000000746000-memory.dmp family_xworm -
Gcleaner family
-
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4Y519s.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4Y519s.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4Y519s.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4Y519s.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4Y519s.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4Y519s.exe -
Stealc family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 904 created 3380 904 UZAj8wc.exe 56 -
Vidar family
-
Xworm family
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF 675b0fb8a2.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 12 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ede738b522.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2252646a86.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e41c7f4454.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4Y519s.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1J18t0.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2D2448.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3b866094cd.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 675b0fb8a2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3M20U.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 39089ff9a8.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4428 powershell.exe 3896 powershell.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 24 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2D2448.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3b866094cd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4Y519s.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2252646a86.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 39089ff9a8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2D2448.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ede738b522.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ede738b522.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3M20U.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2252646a86.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e41c7f4454.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1J18t0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3b866094cd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 675b0fb8a2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 675b0fb8a2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4Y519s.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e41c7f4454.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1J18t0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3M20U.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 39089ff9a8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation UZAj8wc.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 11c5cb5aa7.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 9b87104b28cd41efa6372fe425f57b8f.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation c59b48fa42374723ab9d23a54018a144.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 1J18t0.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation skotes.exe -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ApproximateSize.vbs UZAj8wc.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\VIRUS101RatPayload.lnk InstallUtil.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\VIRUS101RatPayload.lnk InstallUtil.exe -
Executes dropped EXE 33 IoCs
pid Process 4572 c8G34.exe 3588 P4F47.exe 3664 1J18t0.exe 4604 skotes.exe 1780 skotes.exe 4060 2D2448.exe 656 INOKWGC.exe 3576 8ZVMneG.exe 4748 8ZVMneG.exe 904 UZAj8wc.exe 3304 3b866094cd.exe 1164 1bdce04729.exe 1040 675b0fb8a2.exe 4820 7bb9add5dc.exe 3476 7bb9add5dc.exe 4340 1bdce04729.exe 4108 1bdce04729.exe 1516 1bdce04729.exe 4828 1bdce04729.exe 5012 ede738b522.exe 4220 84375ee86d.exe 644 84375ee86d.exe 3128 84375ee86d.exe 4500 3M20U.exe 4440 4Y519s.exe 1220 469c242948.exe 3616 2252646a86.exe 3700 11c5cb5aa7.exe 2872 e41c7f4454.exe 3912 c59b48fa42374723ab9d23a54018a144.exe 4408 9b87104b28cd41efa6372fe425f57b8f.exe 3756 39089ff9a8.exe 3320 0d9d41e691.exe -
Identifies Wine through registry keys 2 TTPs 12 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 3M20U.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 39089ff9a8.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 1J18t0.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 2D2448.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 3b866094cd.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 675b0fb8a2.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine ede738b522.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 4Y519s.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 2252646a86.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine e41c7f4454.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4Y519s.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4Y519s.exe -
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" dd05bc85db757b1910aaadf016e25a8d3798345891943038c2ffc9000b1aabc7N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" c8G34.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" P4F47.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\3b866094cd.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1018024001\\3b866094cd.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e41c7f4454.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1018186001\\e41c7f4454.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\39089ff9a8.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1018187001\\39089ff9a8.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\0d9d41e691.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1018188001\\0d9d41e691.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 159 raw.githubusercontent.com 160 raw.githubusercontent.com 161 raw.githubusercontent.com -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0007000000023ce2-1701.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
pid Process 3664 1J18t0.exe 4604 skotes.exe 1780 skotes.exe 4060 2D2448.exe 3304 3b866094cd.exe 1040 675b0fb8a2.exe 5012 ede738b522.exe 4500 3M20U.exe 4440 4Y519s.exe 3616 2252646a86.exe 2872 e41c7f4454.exe 3756 39089ff9a8.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 3576 set thread context of 4748 3576 8ZVMneG.exe 93 PID 904 set thread context of 2120 904 UZAj8wc.exe 115 PID 4820 set thread context of 3476 4820 7bb9add5dc.exe 120 PID 1164 set thread context of 4828 1164 1bdce04729.exe 125 PID 4220 set thread context of 3128 4220 84375ee86d.exe 131 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1J18t0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 5124 2348 WerFault.exe 195 5140 2348 WerFault.exe 195 212 5284 WerFault.exe 203 -
System Location Discovery: System Language Discovery 1 TTPs 42 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c8G34.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language INOKWGC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UZAj8wc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 11c5cb5aa7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ede738b522.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2252646a86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c59b48fa42374723ab9d23a54018a144.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2D2448.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3b866094cd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 84375ee86d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3M20U.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0d9d41e691.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dd05bc85db757b1910aaadf016e25a8d3798345891943038c2ffc9000b1aabc7N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 675b0fb8a2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 469c242948.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e41c7f4454.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 39089ff9a8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8ZVMneG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4Y519s.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language P4F47.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1J18t0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8ZVMneG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1bdce04729.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1bdce04729.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 84375ee86d.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 0d9d41e691.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7bb9add5dc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7bb9add5dc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 0d9d41e691.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 c59b48fa42374723ab9d23a54018a144.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString c59b48fa42374723ab9d23a54018a144.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1680 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Kills process with taskkill 5 IoCs
pid Process 1996 taskkill.exe 5040 taskkill.exe 5116 taskkill.exe 4084 taskkill.exe 2776 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3664 1J18t0.exe 3664 1J18t0.exe 4604 skotes.exe 4604 skotes.exe 1780 skotes.exe 1780 skotes.exe 4060 2D2448.exe 4060 2D2448.exe 656 INOKWGC.exe 656 INOKWGC.exe 656 INOKWGC.exe 904 UZAj8wc.exe 904 UZAj8wc.exe 904 UZAj8wc.exe 3304 3b866094cd.exe 3304 3b866094cd.exe 4500 powershell.exe 4500 powershell.exe 4500 powershell.exe 904 UZAj8wc.exe 904 UZAj8wc.exe 1040 675b0fb8a2.exe 1040 675b0fb8a2.exe 1040 675b0fb8a2.exe 1040 675b0fb8a2.exe 1040 675b0fb8a2.exe 1040 675b0fb8a2.exe 1040 675b0fb8a2.exe 1040 675b0fb8a2.exe 1040 675b0fb8a2.exe 1040 675b0fb8a2.exe 2120 InstallUtil.exe 2120 InstallUtil.exe 1164 1bdce04729.exe 1164 1bdce04729.exe 1164 1bdce04729.exe 1164 1bdce04729.exe 1164 1bdce04729.exe 1164 1bdce04729.exe 5012 ede738b522.exe 5012 ede738b522.exe 4500 3M20U.exe 4500 3M20U.exe 4440 4Y519s.exe 4440 4Y519s.exe 1220 469c242948.exe 1220 469c242948.exe 4440 4Y519s.exe 4440 4Y519s.exe 3616 2252646a86.exe 3616 2252646a86.exe 1220 469c242948.exe 3700 11c5cb5aa7.exe 4428 powershell.exe 4428 powershell.exe 2872 e41c7f4454.exe 2872 e41c7f4454.exe 3896 powershell.exe 3896 powershell.exe 3756 39089ff9a8.exe 3756 39089ff9a8.exe 2864 msedge.exe 2864 msedge.exe 4968 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4968 msedge.exe 4968 msedge.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeDebugPrivilege 904 UZAj8wc.exe Token: SeDebugPrivilege 1164 1bdce04729.exe Token: SeDebugPrivilege 4500 powershell.exe Token: SeDebugPrivilege 904 UZAj8wc.exe Token: SeDebugPrivilege 2120 InstallUtil.exe Token: SeDebugPrivilege 2120 InstallUtil.exe Token: SeDebugPrivilege 4440 4Y519s.exe Token: SeDebugPrivilege 3700 11c5cb5aa7.exe Token: SeDebugPrivilege 4428 powershell.exe Token: SeDebugPrivilege 3896 powershell.exe Token: SeDebugPrivilege 4408 9b87104b28cd41efa6372fe425f57b8f.exe Token: SeDebugPrivilege 1996 taskkill.exe Token: SeDebugPrivilege 5040 taskkill.exe Token: SeDebugPrivilege 5116 taskkill.exe Token: SeDebugPrivilege 4084 taskkill.exe Token: SeDebugPrivilege 2776 taskkill.exe -
Suspicious use of FindShellTrayWindow 32 IoCs
pid Process 3664 1J18t0.exe 3320 0d9d41e691.exe 3320 0d9d41e691.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 3320 0d9d41e691.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 3320 0d9d41e691.exe 3320 0d9d41e691.exe 3320 0d9d41e691.exe -
Suspicious use of SendNotifyMessage 30 IoCs
pid Process 3320 0d9d41e691.exe 3320 0d9d41e691.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 3320 0d9d41e691.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 3320 0d9d41e691.exe 3320 0d9d41e691.exe 3320 0d9d41e691.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2120 InstallUtil.exe 2284 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4280 wrote to memory of 4572 4280 dd05bc85db757b1910aaadf016e25a8d3798345891943038c2ffc9000b1aabc7N.exe 83 PID 4280 wrote to memory of 4572 4280 dd05bc85db757b1910aaadf016e25a8d3798345891943038c2ffc9000b1aabc7N.exe 83 PID 4280 wrote to memory of 4572 4280 dd05bc85db757b1910aaadf016e25a8d3798345891943038c2ffc9000b1aabc7N.exe 83 PID 4572 wrote to memory of 3588 4572 c8G34.exe 84 PID 4572 wrote to memory of 3588 4572 c8G34.exe 84 PID 4572 wrote to memory of 3588 4572 c8G34.exe 84 PID 3588 wrote to memory of 3664 3588 P4F47.exe 85 PID 3588 wrote to memory of 3664 3588 P4F47.exe 85 PID 3588 wrote to memory of 3664 3588 P4F47.exe 85 PID 3664 wrote to memory of 1780 3664 1J18t0.exe 87 PID 3664 wrote to memory of 1780 3664 1J18t0.exe 87 PID 3664 wrote to memory of 1780 3664 1J18t0.exe 87 PID 3588 wrote to memory of 4060 3588 P4F47.exe 88 PID 3588 wrote to memory of 4060 3588 P4F47.exe 88 PID 3588 wrote to memory of 4060 3588 P4F47.exe 88 PID 4604 wrote to memory of 656 4604 skotes.exe 90 PID 4604 wrote to memory of 656 4604 skotes.exe 90 PID 4604 wrote to memory of 656 4604 skotes.exe 90 PID 4604 wrote to memory of 3576 4604 skotes.exe 91 PID 4604 wrote to memory of 3576 4604 skotes.exe 91 PID 4604 wrote to memory of 3576 4604 skotes.exe 91 PID 3576 wrote to memory of 4748 3576 8ZVMneG.exe 93 PID 3576 wrote to memory of 4748 3576 8ZVMneG.exe 93 PID 3576 wrote to memory of 4748 3576 8ZVMneG.exe 93 PID 3576 wrote to memory of 4748 3576 8ZVMneG.exe 93 PID 3576 wrote to memory of 4748 3576 8ZVMneG.exe 93 PID 3576 wrote to memory of 4748 3576 8ZVMneG.exe 93 PID 3576 wrote to memory of 4748 3576 8ZVMneG.exe 93 PID 3576 wrote to memory of 4748 3576 8ZVMneG.exe 93 PID 3576 wrote to memory of 4748 3576 8ZVMneG.exe 93 PID 4604 wrote to memory of 904 4604 skotes.exe 95 PID 4604 wrote to memory of 904 4604 skotes.exe 95 PID 4604 wrote to memory of 904 4604 skotes.exe 95 PID 4604 wrote to memory of 3304 4604 skotes.exe 102 PID 4604 wrote to memory of 3304 4604 skotes.exe 102 PID 4604 wrote to memory of 3304 4604 skotes.exe 102 PID 4604 wrote to memory of 1164 4604 skotes.exe 110 PID 4604 wrote to memory of 1164 4604 skotes.exe 110 PID 4604 wrote to memory of 1164 4604 skotes.exe 110 PID 904 wrote to memory of 4500 904 UZAj8wc.exe 112 PID 904 wrote to memory of 4500 904 UZAj8wc.exe 112 PID 904 wrote to memory of 4500 904 UZAj8wc.exe 112 PID 904 wrote to memory of 2120 904 UZAj8wc.exe 115 PID 904 wrote to memory of 2120 904 UZAj8wc.exe 115 PID 904 wrote to memory of 2120 904 UZAj8wc.exe 115 PID 904 wrote to memory of 2120 904 UZAj8wc.exe 115 PID 904 wrote to memory of 2120 904 UZAj8wc.exe 115 PID 904 wrote to memory of 2120 904 UZAj8wc.exe 115 PID 904 wrote to memory of 2120 904 UZAj8wc.exe 115 PID 904 wrote to memory of 2120 904 UZAj8wc.exe 115 PID 4604 wrote to memory of 1040 4604 skotes.exe 116 PID 4604 wrote to memory of 1040 4604 skotes.exe 116 PID 4604 wrote to memory of 1040 4604 skotes.exe 116 PID 4604 wrote to memory of 4820 4604 skotes.exe 118 PID 4604 wrote to memory of 4820 4604 skotes.exe 118 PID 4604 wrote to memory of 4820 4604 skotes.exe 118 PID 4820 wrote to memory of 3476 4820 7bb9add5dc.exe 120 PID 4820 wrote to memory of 3476 4820 7bb9add5dc.exe 120 PID 4820 wrote to memory of 3476 4820 7bb9add5dc.exe 120 PID 4820 wrote to memory of 3476 4820 7bb9add5dc.exe 120 PID 4820 wrote to memory of 3476 4820 7bb9add5dc.exe 120 PID 4820 wrote to memory of 3476 4820 7bb9add5dc.exe 120 PID 4820 wrote to memory of 3476 4820 7bb9add5dc.exe 120 PID 4820 wrote to memory of 3476 4820 7bb9add5dc.exe 120
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3380
-
C:\Users\Admin\AppData\Local\Temp\dd05bc85db757b1910aaadf016e25a8d3798345891943038c2ffc9000b1aabc7N.exe"C:\Users\Admin\AppData\Local\Temp\dd05bc85db757b1910aaadf016e25a8d3798345891943038c2ffc9000b1aabc7N.exe"2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\c8G34.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\c8G34.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\P4F47.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\P4F47.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1J18t0.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1J18t0.exe5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1780
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2D2448.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2D2448.exe5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4060
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3M20U.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3M20U.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4500
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4Y519s.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4Y519s.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4440
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- Drops startup file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2120
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Users\Admin\AppData\Local\Temp\1017763001\INOKWGC.exe"C:\Users\Admin\AppData\Local\Temp\1017763001\INOKWGC.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:656
-
-
C:\Users\Admin\AppData\Local\Temp\1017855001\8ZVMneG.exe"C:\Users\Admin\AppData\Local\Temp\1017855001\8ZVMneG.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\Users\Admin\AppData\Local\Temp\1017855001\8ZVMneG.exe"C:\Users\Admin\AppData\Local\Temp\1017855001\8ZVMneG.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4748
-
-
-
C:\Users\Admin\AppData\Local\Temp\1017916001\UZAj8wc.exe"C:\Users\Admin\AppData\Local\Temp\1017916001\UZAj8wc.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc 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⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4500
-
-
-
C:\Users\Admin\AppData\Local\Temp\1018024001\3b866094cd.exe"C:\Users\Admin\AppData\Local\Temp\1018024001\3b866094cd.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3304
-
-
C:\Users\Admin\AppData\Local\Temp\1018178001\1bdce04729.exe"C:\Users\Admin\AppData\Local\Temp\1018178001\1bdce04729.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1164 -
C:\Users\Admin\AppData\Local\Temp\1018178001\1bdce04729.exe"C:\Users\Admin\AppData\Local\Temp\1018178001\1bdce04729.exe"3⤵
- Executes dropped EXE
PID:4340
-
-
C:\Users\Admin\AppData\Local\Temp\1018178001\1bdce04729.exe"C:\Users\Admin\AppData\Local\Temp\1018178001\1bdce04729.exe"3⤵
- Executes dropped EXE
PID:4108
-
-
C:\Users\Admin\AppData\Local\Temp\1018178001\1bdce04729.exe"C:\Users\Admin\AppData\Local\Temp\1018178001\1bdce04729.exe"3⤵
- Executes dropped EXE
PID:1516
-
-
C:\Users\Admin\AppData\Local\Temp\1018178001\1bdce04729.exe"C:\Users\Admin\AppData\Local\Temp\1018178001\1bdce04729.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4828
-
-
-
C:\Users\Admin\AppData\Local\Temp\1018179001\675b0fb8a2.exe"C:\Users\Admin\AppData\Local\Temp\1018179001\675b0fb8a2.exe"2⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1040
-
-
C:\Users\Admin\AppData\Local\Temp\1018180001\7bb9add5dc.exe"C:\Users\Admin\AppData\Local\Temp\1018180001\7bb9add5dc.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Users\Admin\AppData\Local\Temp\1018180001\7bb9add5dc.exe"C:\Users\Admin\AppData\Local\Temp\1018180001\7bb9add5dc.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3476
-
-
-
C:\Users\Admin\AppData\Local\Temp\1018181001\ede738b522.exe"C:\Users\Admin\AppData\Local\Temp\1018181001\ede738b522.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5012
-
-
C:\Users\Admin\AppData\Local\Temp\1018182001\84375ee86d.exe"C:\Users\Admin\AppData\Local\Temp\1018182001\84375ee86d.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4220 -
C:\Users\Admin\AppData\Local\Temp\1018182001\84375ee86d.exe"C:\Users\Admin\AppData\Local\Temp\1018182001\84375ee86d.exe"3⤵
- Executes dropped EXE
PID:644
-
-
C:\Users\Admin\AppData\Local\Temp\1018182001\84375ee86d.exe"C:\Users\Admin\AppData\Local\Temp\1018182001\84375ee86d.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3128
-
-
-
C:\Users\Admin\AppData\Local\Temp\1018183001\469c242948.exe"C:\Users\Admin\AppData\Local\Temp\1018183001\469c242948.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1220
-
-
C:\Users\Admin\AppData\Local\Temp\1018184001\2252646a86.exe"C:\Users\Admin\AppData\Local\Temp\1018184001\2252646a86.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3616
-
-
C:\Users\Admin\AppData\Local\Temp\1018185001\11c5cb5aa7.exe"C:\Users\Admin\AppData\Local\Temp\1018185001\11c5cb5aa7.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3700 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath "C:\ykaxy"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4428
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3896
-
-
C:\ykaxy\c59b48fa42374723ab9d23a54018a144.exe"C:\ykaxy\c59b48fa42374723ab9d23a54018a144.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:3912 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\ykaxy\c59b48fa42374723ab9d23a54018a144.exe" & rd /s /q "C:\ProgramData\X47Y5PZMGLNY" & exit4⤵
- System Location Discovery: System Language Discovery
PID:1512 -
C:\Windows\SysWOW64\timeout.exetimeout /t 105⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1680
-
-
-
-
C:\ykaxy\9b87104b28cd41efa6372fe425f57b8f.exe"C:\ykaxy\9b87104b28cd41efa6372fe425f57b8f.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4408 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://apps.microsoft.com/store/detail/9MSZ40SLW145?ocid=&referrer=psi4⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4968 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe65af46f8,0x7ffe65af4708,0x7ffe65af47185⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,6190984513281401391,689816218034259509,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:25⤵PID:4212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1996,6190984513281401391,689816218034259509,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:2864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1996,6190984513281401391,689816218034259509,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2944 /prefetch:85⤵PID:3760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,6190984513281401391,689816218034259509,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:15⤵PID:4872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,6190984513281401391,689816218034259509,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:15⤵PID:64
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1018186001\e41c7f4454.exe"C:\Users\Admin\AppData\Local\Temp\1018186001\e41c7f4454.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2872
-
-
C:\Users\Admin\AppData\Local\Temp\1018187001\39089ff9a8.exe"C:\Users\Admin\AppData\Local\Temp\1018187001\39089ff9a8.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3756
-
-
C:\Users\Admin\AppData\Local\Temp\1018188001\0d9d41e691.exe"C:\Users\Admin\AppData\Local\Temp\1018188001\0d9d41e691.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3320 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1996
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5040
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5116
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4084
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2776
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking3⤵PID:2844
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking4⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2284 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2000 -parentBuildID 20240401114208 -prefsHandle 1928 -prefMapHandle 1920 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a20ec11b-f614-4b1a-b8bb-3a5a850985a5} 2284 "\\.\pipe\gecko-crash-server-pipe.2284" gpu5⤵PID:1476
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2436 -parentBuildID 20240401114208 -prefsHandle 2428 -prefMapHandle 2424 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d843639f-d55e-4f67-b539-a1c9341ab10c} 2284 "\\.\pipe\gecko-crash-server-pipe.2284" socket5⤵PID:684
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1600 -childID 1 -isForBrowser -prefsHandle 2828 -prefMapHandle 3036 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1264 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7abff13f-1459-4924-8850-f14412ada7d7} 2284 "\\.\pipe\gecko-crash-server-pipe.2284" tab5⤵PID:1664
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4196 -childID 2 -isForBrowser -prefsHandle 4188 -prefMapHandle 4184 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1264 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9611995a-96af-43a6-b630-da0deea52435} 2284 "\\.\pipe\gecko-crash-server-pipe.2284" tab5⤵PID:3972
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5028 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 5056 -prefMapHandle 5064 -prefsLen 29197 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a6e71038-8bdc-4858-9341-8c4bc97f93c2} 2284 "\\.\pipe\gecko-crash-server-pipe.2284" utility5⤵PID:5704
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5228 -childID 3 -isForBrowser -prefsHandle 5220 -prefMapHandle 5216 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1264 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4774d551-03d6-4ba9-889e-d95b6b3bb3e8} 2284 "\\.\pipe\gecko-crash-server-pipe.2284" tab5⤵PID:5940
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5388 -childID 4 -isForBrowser -prefsHandle 5468 -prefMapHandle 5184 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1264 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2e47103e-8ee7-4028-98e1-94cd6eaeed66} 2284 "\\.\pipe\gecko-crash-server-pipe.2284" tab5⤵PID:5988
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5592 -childID 5 -isForBrowser -prefsHandle 5668 -prefMapHandle 5664 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1264 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6d48bfe3-a6b1-4119-b006-ff74be4b4824} 2284 "\\.\pipe\gecko-crash-server-pipe.2284" tab5⤵PID:6012
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1018189001\6e2e5c78cd.exe"C:\Users\Admin\AppData\Local\Temp\1018189001\6e2e5c78cd.exe"2⤵PID:6028
-
-
C:\Users\Admin\AppData\Local\Temp\1018190001\09996c631f.exe"C:\Users\Admin\AppData\Local\Temp\1018190001\09996c631f.exe"2⤵PID:5336
-
-
C:\Users\Admin\AppData\Local\Temp\1018191001\6d5257fabe.exe"C:\Users\Admin\AppData\Local\Temp\1018191001\6d5257fabe.exe"2⤵PID:5688
-
-
C:\Users\Admin\AppData\Local\Temp\1018192001\1fa2c61c41.exe"C:\Users\Admin\AppData\Local\Temp\1018192001\1fa2c61c41.exe"2⤵PID:2348
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2348 -s 14603⤵
- Program crash
PID:5124
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2348 -s 14403⤵
- Program crash
PID:5140
-
-
-
C:\Users\Admin\AppData\Local\Temp\1018193001\fc0172f86e.exe"C:\Users\Admin\AppData\Local\Temp\1018193001\fc0172f86e.exe"2⤵PID:5284
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5284 -s 5323⤵
- Program crash
PID:212
-
-
-
C:\Users\Admin\AppData\Local\Temp\1018194001\94dee974a0.exe"C:\Users\Admin\AppData\Local\Temp\1018194001\94dee974a0.exe"2⤵PID:3948
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3852
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2348 -ip 23481⤵PID:4012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2348 -ip 23481⤵PID:5048
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\System32\svchost.exe"1⤵PID:5892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 5284 -ip 52841⤵PID:368
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
5KB
MD5414ce182a524d08c8ecf9141843957eb
SHA11987aeeb8fa5f6036e913e91d1ff2d13446bf280
SHA256f63949bef8575abd5cb70ad25bd48b2c30e8c2e06c21dfd9b1dc7beb523112b0
SHA5120288f5f14a9caf2ea2a9e43f91f42280f6ad615c6035709b0e39e4dfcd39209814cc9b4a21d855cef16b44d3ada413021be31029c3cd896ac775f9edb237030a
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
18KB
MD586e78c298256bbec08c7d6c808969936
SHA1ce89bb7c6324695609ab63b8394f68b5768a9bca
SHA256e4e311b731d766c448e9cd2b5c255a04ef7b32498625a0014756260309297e01
SHA51275f0e22e833e6a2a5864bbd76f5d741353ff67a042f25ab1840037a0c5b8fddefee69a61b2b2ad78edf9140f331f2ffbbd2f1e96a9be3808ea3fce34e3f30755
-
Filesize
18KB
MD5dfd03c6bc93874f12d992ae5e071a042
SHA17e1ed98ee127583af4e40017aaee2b79bc26a6d0
SHA256e275f115eadaac133a6509c61cc90f12389ba266479ce471e87d7959cc894ec2
SHA512f7d3215fd23bb31f4b3ea86d74755c84c20133e75c45a1e0df685cec37b58feaf5bcd017e43af6d0911aea6a0ede532b29e93cb63de3b4d20dfee1d6e6bf8421
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\g9per00b.default-release\activity-stream.discovery_stream.json
Filesize27KB
MD56c4aa27c78a995fd628d55460de5950b
SHA1015e551d8b339f305acb76f491e7d3d90db56859
SHA256e0bf127b23acfa41569e77ec3dee5583706843d66da708191e2f7d554e97640b
SHA5121c3b6fca482f5c06ff59fbe64a3c5b8b32fd7e44bd01dcc1673065f83d4577efc345d31e3f968478be0de80d64373ce0112b9cff083a5da060c17de8e522f142
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\g9per00b.default-release\cache2\entries\6653BC7BE242C21AA1988A4A42D1DEDA18231C31
Filesize13KB
MD5c9743745c97bd7c31c7275b41360c3f9
SHA1d895ffa00abd0b2dec9062e85baef47971e48a24
SHA256475d747da26a7720aac71d46dd75afd44493b4e4f94653c7e85301d1be83d9a9
SHA5122a659ff328b6a3e61244634f1a95c26d90955b1c5e34a9ada537d9e3bebf1ab297cefe53f0288893be6938c5d685185eae1d8459910afac5de41560c4fcf89a2
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\g9per00b.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
1.3MB
MD5669ed3665495a4a52029ff680ec8eba9
SHA17785e285365a141e307931ca4c4ef00b7ecc8986
SHA2562d2d405409b128eea72a496ccff0ed56f9ed87ee2564ae4815b4b116d4fb74d6
SHA512bedc8f7c1894fc64cdd00ebc58b434b7d931e52c198a0fa55f16f4e3d44a7dc4643eaa78ec55a43cc360571345cd71d91a64037a135663e72eed334fe77a21e6
-
Filesize
791KB
MD5e8af4d0d0b47ac68d762b7f288ae8e6e
SHA11d65f31526cc20ab41d6b1625d6674d7f13e326c
SHA256b83449768e7af68867c8bc42b19ff012722d88ea66aef69df48661e63e0eb15e
SHA51280fad90314ff639f538a72c5e4ca2bf9ae52b9309caa7cd6f87d61791505bb3612b7f3190ab9b67348c5d71f4d29bb9d101e3f66d525eb9b5e2060a10b2d187a
-
Filesize
935KB
MD55b99682cb740202d783dde58ca97f045
SHA1cecae054552ce295feaa0717d2a33e870addcadd
SHA256724e283e1bb29a150c9bebc21bdf0e250e2d87257bf86c889bbe7544329c6882
SHA512c37a2cb06407729344adb85d814223a24ec4fa65f711c7f02c0e77395ec969b7e1bd64a6f5806d4e2d88c8461587d68b6aae3378d2cf5c92f1ade2aacc13f2b2
-
Filesize
2.8MB
MD556d04740faa033d859846945bae62361
SHA1540684dc1dd00a2e19e0850d9107aea2edde6292
SHA2561b5a23e66d7c1a8ea5abffff3ce0734101aaa526760c6e3d391298be9d5a35d0
SHA512d39c846317471ef15edcfb2556b5bb05e769a92fa70c2509cd97696ceba408453635f5832d0923c8e127331378259a376f3032a30b656d4304a0dc1c8bb1f524
-
Filesize
3.1MB
MD5c00a67d527ef38dc6f49d0ad7f13b393
SHA17b8f2de130ab5e4e59c3c2f4a071bda831ac219d
SHA25612226ccae8c807641241ba5178d853aad38984eefb0c0c4d65abc4da3f9787c3
SHA5129286d267b167cba01e55e68c8c5582f903bed0dd8bc4135eb528ef6814e60e7d4dda2b3611e13efb56aa993635fbab218b0885daf5daea6043061d8384af40ca
-
Filesize
4.2MB
MD53fbe557c7ec8409f30604b0f5e365f70
SHA100d9f4548c93be387f68c1b7aeedcf4c75873b60
SHA256f4e7b423983d4606cb9a72876f57c870884b40556ab6ea3da498d69e02acacab
SHA512802d3925592429a116f24c5a35723f030ea6fc4924dc201eb69a09bfeda57aac3e0c2246d0e213d131b888515936c31d13c03fd6c32c2d091a3ddc2437c1642d
-
Filesize
758KB
MD5afd936e441bf5cbdb858e96833cc6ed3
SHA13491edd8c7caf9ae169e21fb58bccd29d95aefef
SHA256c6491d7a6d70c7c51baca7436464667b4894e4989fa7c5e05068dde4699e1cbf
SHA512928c15a1eda602b2a66a53734f3f563ab9626882104e30ee2bf5106cfd6e08ec54f96e3063f1ab89bf13be2c8822a8419f5d8ee0a3583a4c479785226051a325
-
Filesize
4.3MB
MD5d460614a38afe39ba7ca3fe331c0de53
SHA1d150e613032919a2a4da84c26f17bdbe5112f847
SHA2568bff2b1dd2b8b6b4e09d448eecca556b368db5ea69581d64f7a8201e974d90ef
SHA512cc02f6d6c4c4a5f66a9cb7fcf8c2378651d882c408492a3e3e51b9e011ac5f39148ec665d422ef7ce7ee4f9741e30fb875c77f0a8e2f4b43088cd5d43a6c3b52
-
Filesize
1.8MB
MD525fb9c54265bbacc7a055174479f0b70
SHA14af069a2ec874703a7e29023d23a1ada491b584e
SHA256552f8be2c6b2208a89c728f68488930c661b3a06c35a20d133ef7d3c63a86b9c
SHA5127dfd9e0f3fa2d68a6ce8c952e3b755559db73bb7a06c95ad6ed8ac16dedb49be8b8337afc07c9c682f0c4be9db291a551286353e2e2b624223487dc1c8b54668
-
Filesize
21KB
MD504f57c6fb2b2cd8dcc4b38e4a93d4366
SHA161770495aa18d480f70b654d1f57998e5bd8c885
SHA25651e4d0cbc184b8abfa6d84e219317cf81bd542286a7cc602c87eb703a39627c2
SHA51253f95e98a5eca472ed6b1dfd6fecd1e28ea66967a1b3aa109fe911dbb935f1abf327438d4b2fe72cf7a0201281e9f56f4548f965b96e3916b9142257627e6ccd
-
Filesize
1.8MB
MD5f158cdb34eb5c4de5eb858cce72f94cb
SHA1e93703e534ee3572c5134be5b316e1ae5feeb9c0
SHA256801900fc452dc3d0f333fe3be08e78406099be541daff50b7de46f4209d54c0c
SHA512a913c9e2f3bcd7b6016aa43838679ee3664d042c7457d97c75ed140659748f79a26c606c31c878a84207a6751111dc647292c2e7848c1a9d8c292622de16ce8c
-
Filesize
2.8MB
MD5248411545685b7ff7b35c9be0067004c
SHA10610ead2ac9241ffd2ff1dfc334e2d0f2d1a31ca
SHA256117b62e85dbbddf6a8dcf7c29df0195a45b46a38c4f5a6428fd6f470e2b41ea9
SHA5126a29bf1c43c75248372fbee8119c3ce6c9dc2f607db917752e4bf696bf2be76854bcdacffccc625582b0fdedb49b0428b7b7e333e84e907f08b2f16ae343c03d
-
Filesize
946KB
MD5bd79ee3850ed9f92a322f6ea487ab0cb
SHA19eb884d2feda4c3959f2f6878e7813264ee5716f
SHA256373256d6ed3677d589bf34e4718e9c83708d1285eb5d88022d673c294d5c7bb2
SHA512dbbdb73fe1668de519aa50ac95d759ecb067ed38d812960519060a9962f2a3243f9fa8ae7b89fe2a880d6436b3474b06fb562e55f450ae8bfc95c8209244feda
-
Filesize
2.7MB
MD5890d824cd79fe9a86ded6b64ed799ad7
SHA1ad60b467cee30245b352715f4694cabe41b83470
SHA256c34746b5895ab129dc4875e1ecb872799ac76ecda670146ccee25ef7dbf5ca44
SHA5122dc81a856d3b0846c4b778d6c05cc183a029a88219ff42973ef1b5b3afacb629149c80abef88b9e5dc7ab5adaaf580b73e5d2eb67687bd8563587055e6e4f15b
-
Filesize
1.8MB
MD53c2e26d10fa55af2e913120df3b7eddb
SHA1a6ba8c6378d44616d7196331c6ea54e286136ce6
SHA2564463effeb9799edfe6c07776f1e044718792fabb6ea103b9ee016e5efd21a985
SHA512be0d54efddd550dd9acc996df86ff2dc86a8fb50aa84e7d018736d16e06a97c746c2a3b92f70b56773fa791fe3b6ba365d676ed7683cd8f82738b2743d2a82c6
-
Filesize
1.1MB
MD5ef08a45833a7d881c90ded1952f96cb4
SHA1f04aeeb63a1409bd916558d2c40fab8a5ed8168b
SHA25633c236dc81af2a47d595731d6fa47269b2874b281152530fdffdda9cbeb3b501
SHA51274e84f710c90121527f06d453e9286910f2e8b6ac09d2aeb4ab1f0ead23ea9b410c5d1074d8bc759bc3e766b5bc77d156756c7df093ba94093107393290ced97
-
Filesize
1.8MB
MD5ff279f4e5b1c6fbda804d2437c2dbdc8
SHA12feb3762c877a5ae3ca60eeebc37003ad0844245
SHA256e115298ab160da9c7a998e4ae0b72333f64b207da165134ca45eb997a000d378
SHA512c7a8bbcb122b2c7b57c8b678c5eed075ee5e7c355afbf86238282d2d3458019da1a8523520e1a1c631cd01b555f7df340545fd1e44ad678dc97c40b23428f967
-
Filesize
1.9MB
MD501baaf7c78e6861c97e7d5a5480e1214
SHA12dcd0def38f79d808e5759e84acfde351cc35b46
SHA256d9cceb4e02a370fb262a1b1116563591df51f926e63d5e256fe8ac40cc408cea
SHA5129c01325d724dc97620f67f4ff738f282abf50877b4ba1ba8d1f119182130b5683ee7f1150a9335eb678c16169881bb9f890b1c706883b966106adbb61feb431f
-
Filesize
21KB
MD514becdf1e2402e9aa6c2be0e6167041e
SHA172cbbae6878f5e06060a0038b25ede93b445f0df
SHA2567a769963165063758f15f6e0cece25c9d13072f67fa0d3c25a03a5104fe0783a
SHA51216b837615505f352e134afd9d8655c9cabfa5bfcfbee2c0c34f2d7d9588aa71f875e4e5feb8cdf0f7bacc00f7c1ca8dabd3b3d92afc99abf705c05c78e298b4a
-
Filesize
1.6MB
MD574849d118ffd813c52225c4d524c468b
SHA1c2b10515733b1a3c04bee79d674728d93f3de7de
SHA2569a816f74cb82afe01dc4d8ae1cf48397b234dd2283d689655219593f0677359c
SHA5127febeb78ecaca6661d0ae358bb574f5c3e5883e6d6371d0dd29e0696281cce3d472fd108b171a9318c1d9b3924321ad968761a9fc4efa6dd539f87cd2c91814e
-
Filesize
5.1MB
MD58767dd1a2acff921e648c96c12e345ed
SHA17b57b35af5976fc9201f5240b1d2d1c97dee280a
SHA2565752f69f5ee0958d36f545f765d18628bd2642b46769262dc80015fe0bc0d2e5
SHA512a6381f8d5fecc4d5c0c4e5df7140a55df46a93d3c65d10d69287f9e63ed392ec10f7e3196246de90fcd5f40c9fdef48735ad5d9ec505cf06586503e8c7616305
-
Filesize
2.7MB
MD53e237d53f58f057fae14351134c7e352
SHA1f4bfadd82a8f7e0a3904d69e9799b713fe28a35c
SHA256ebcc50891e93b0399a262415d38c3d69ca67b9621f5c4b4662b6fdfe82fbff42
SHA512de890a3d10cffb5ca60be01e61e95d450affcf8023ec993c0633c3cf233b66e81dfdc98ed5525f85210a6b282186a96b68bcd91f50d0bca677b76d2bc8467889
-
Filesize
3.5MB
MD5d6820cd1568d674372003f750bb35995
SHA1ee37e503777b35abe0d686827b3fedd3ad305c85
SHA256a1dbe36937275d008bfbe9dddfbd48b21554e2ac7235ea1e5451a6d73c35ad7a
SHA5123e96ab55d1f33f77f65162a100c946f8870c9e53bbb09f459d529c23f9abb5f425fb87bbc2474277954ac37d21a433227816be7332bf49a8af95ea66ff190e6f
-
Filesize
2.8MB
MD54819e50a7a5045e97399d95b04302d63
SHA160232f8faf3d87afe9f0ddbbb42d587ad470a8ca
SHA25637fa3bf43327a5e08e1f1b598d9cc4388cefdf4411358727086bba59ac1a11d9
SHA512f44ca976e2f51c94442437430fd58958b2875614df43da0a140b916e385bef077c4504ec0bd185f2f865fb5d004d1d45175adc71d002a2ccefb6628269af1925
-
Filesize
1.8MB
MD5555c59819535a5322fc67b624fe0275e
SHA180d2f0129fcd7d73fe4f566c1c195492f6559224
SHA2561dc3faa7119e1234ca87936a830fec050763dc6bf4d17ffaa9b6005c1cf488c2
SHA512b403713d607d963d2730c2886879d9a9a96ab3074db40f1294c6691a12fbe1a9823e51568344c0308b65396589fd53c48f42e3c4252257c40c822223a7d65160
-
Filesize
1KB
MD5a10f31fa140f2608ff150125f3687920
SHA1ec411cc7005aaa8e3775cf105fcd4e1239f8ed4b
SHA25628c871238311d40287c51dc09aee6510cac5306329981777071600b1112286c6
SHA512cf915fb34cd5ecfbd6b25171d6e0d3d09af2597edf29f9f24fa474685d4c5ec9bc742ade9f29abac457dd645ee955b1914a635c90af77c519d2ada895e7ecf12
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
1.7MB
MD5ef3bbe4520498bd7f90addaf15ba85ad
SHA1b7cc7cc2acc2a458b2b4513abc47ed2784fb3da2
SHA256dfa5d8fd92a5b115a416f3c58df8ce9d9c0261885fa0d7bd125fb29253562a73
SHA512b1d3e83f717c7de1e29a6ecbec712ad0e0c9a404a9bd38dab262702d1cd0808df2d2c77c8edab1e307907e5e065872175445c9045f501b3285a033b69ce0fe36
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\AlternateServices.bin
Filesize10KB
MD5bef5153c3e74ec2232f2a383057e9797
SHA14f5f4d4ce4768f081dbfaeda1715b6828ae50639
SHA256bf57487d80c5827810ff4f7236e32ac412953c08a4ae8adbc2b7a018736cfd28
SHA5128b30ae75cbb10085e6bc3e17d27088bf45d6fe3fea089b0ff0fb9d0466b73c38eb1d6d1a785de031cbb70089ee23d6174d39c5e78e252c24ed9093b1ba966aa9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD52f67022969ac210f86b0854aefb3dc8f
SHA17f3c90a7329102a9063ea0a36d1899256263adb8
SHA2560f06156e1c7cfd6fe8556bf04073504545ca0780c8c2c36fbc087144e88cdd86
SHA512b59ed10f32c53e14d04cee14541d3a528780320978b36335e93db5033c5c2c937a9830fb098f2cf7bee28991d3dc0cc0901f3090891a1ca10b54e5c3ed461add
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5e4583659f39a50e454dbd3b28037c0a4
SHA1664a1469c5833002dd0bab26db4606c9eb150efa
SHA25653e52c5b5bb81090c58cc6fc37b57878bac69ff50278daf201536595441b4ac2
SHA512b477a58480093f7227e6f9b33a0081aaa28d5a0df73589043e0d628d031618aec3141956c2544d9d9175f6f79d657af16ca05dc006de3b702ec2ac9a3cb5238c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\pending_pings\c694f3c3-01b5-4f27-a5af-c57e8eebeb71
Filesize26KB
MD54e91a24b76fe18d4b9861f6c54250fe8
SHA107318a2da9dcf4fac90e2389546e03d199d1a260
SHA2569565038f4229ca7ad9d38cb9785ca43ddaf15763c853fc31149f94e4d456c449
SHA512158c55b421dde47a10f71c0da73dd8968f3664381c2da47752b4ebf91d9608d9e429b3dca3306899d3195f0c8ae268a2b6e785190e98a900d64ef2d28846d911
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\pending_pings\e70ed1ee-1f46-4b71-a3b0-7581cbd76d8b
Filesize982B
MD5e83e5412ce945ffeace84d3e546396ef
SHA1197f4212eabfa8cd375cbf9f78d3630ebaa0d4a4
SHA2564e35b613819e3130dea963911dbb8f3b6eadc1c9ea8abf22179e2ac137c25f05
SHA5127240ceca00b066760676d64886607e25321b125380a0bd37937bcd37e8e49a91c84067bc11cb6bab714ab2f079063f361a77fa843e3adde0d0a27000a08c3547
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\pending_pings\ec349eb7-aba5-455d-8111-299d108230d0
Filesize671B
MD54b794fd6878e1bac41bd6f281e00ab92
SHA1df7098265fccefb62bf26529841bb6233a6ca576
SHA256f0140dec418091248cef1544afb9fda93f35d17a033d96a0039a18989f6b5e91
SHA5124daf5caf77c4d041e7606cf792e8d7c4a26c9d22e8c2ddc9bde7fbf27801ee9dfd097ec6d6e6c582af837276ccdb49b6a9b3ea593a6e07c3cf56eea1780a1e33
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize640KB
MD5c017b9b620f69444240eeeb6f9b5e1cc
SHA1a1207381eeb038d2a735e1993d3ed91059a17ab3
SHA256d54099c12191bae4c86c7e20cd7edf54b8e3629dfaf1b431a59023f329806e91
SHA512d095eadd57d6baa17f2cb43cee96cc4cb3b7193947420e0eb1450eaecc9ab4198a414380399a883d3deb987eaa64dfce0124ec0dc9a459e68f4068378f96327c
-
Filesize
11KB
MD579fbe03a71451242daabd6e97196acb5
SHA19c95a37886076b717edcee22c95037f829b8533a
SHA256029b3f2fae17f97b277cf6365098dbf42cb42bd045bfa4993e4eabca4c5d649e
SHA512a0c10b6fea362f2236c0f8ab1e584486348ea3f598c2143f6cc8c0ca26ed74a4e7a5f13a489ee4506c8e6ee4b98097205cd981b6b710447afa404419c5b90c09
-
Filesize
10KB
MD5c8d02c8eed1c402895e9883153666dfe
SHA19a1cae86bad7e0064d344594695e218c929bf8b7
SHA25601b23a5dc4554ea1b2bcf8b3a01b6ac171f43c4342d1f90cdaeb40e0b06a563d
SHA51265da3905a9698797f6117169d1a7e6e78c0e58b4b8697e61ed3b79bbcdc3afd47278259040a82bd9822cf51425dccf49c45d4b53fa9cfbdfde5f1610696ef865
-
Filesize
1.0MB
MD5971b0519b1c0461db6700610e5e9ca8e
SHA19a262218310f976aaf837e54b4842e53e73be088
SHA25647cf75570c1eca775b2dd1823233d7c40924d3a8d93e0e78c943219cf391d023
SHA512d234a9c5a1da8415cd4d2626797197039f2537e98f8f43d155f815a7867876cbc1bf466be58677c79a9199ea47d146a174998d21ef0aebc29a4b0443f8857cb9
-
Filesize
144KB
MD5cc36e2a5a3c64941a79c31ca320e9797
SHA150c8f5db809cfec84735c9f4dcd6b55d53dfd9f5
SHA2566fec179c363190199c1dcdf822be4d6b1f5c4895ebc7148a8fc9fa9512eeade8
SHA512fcea6d62dc047e40182dc4ff1e0522ca935f9aeefdb1517957977bc5d9ac654285a973261401f3b98abf1f6ed62638b9e31306fd7aaeb67214ca42dfc2888af0