Analysis
-
max time kernel
119s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2024 08:53
Static task
static1
General
-
Target
dd25cd47e84741d9a471f7146b6bdd901d84515db471fba3fa5aca42f3d517d1N.exe
-
Size
5.1MB
-
MD5
828c4f866900b79fd797206b6f0052e0
-
SHA1
a16dab9157661759b10539aa4042b778e6615246
-
SHA256
dd25cd47e84741d9a471f7146b6bdd901d84515db471fba3fa5aca42f3d517d1
-
SHA512
3165cbe8b32183786ae88039b9ef8d098eb7438220fcc77cb3cadf8d8b7f4e487eeb6b944ed80ebae9739c059137d78d3326d7e0f30cee2dc686723025ac9ad4
-
SSDEEP
98304:N0xHQoSoGDE3oy1Rrs6ctefu52ZMt7agoOKc+PVsQR7J/Th+zXEqNzetbx:NpXoGDCrGQl67agoo+PVsQRF/mXel
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
cryptbot
Signatures
-
Amadey family
-
Cryptbot family
-
Gcleaner family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 96016b1ac8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 96016b1ac8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 96016b1ac8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 96016b1ac8.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 96016b1ac8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 96016b1ac8.exe -
Stealc family
-
Xmrig family
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF dce9a39112.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 13 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dce9a39112.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c0e5e12f3e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 620155c2c2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3q95F.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dd9ee23ec3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 77caa08f53.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ee573e9246.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1Y46i9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2w8102.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 96016b1ac8.exe -
XMRig Miner payload 10 IoCs
resource yara_rule behavioral1/memory/216-3619-0x0000000140000000-0x0000000140770000-memory.dmp xmrig behavioral1/memory/216-3628-0x0000000140000000-0x0000000140770000-memory.dmp xmrig behavioral1/memory/216-3665-0x0000000140000000-0x0000000140770000-memory.dmp xmrig behavioral1/memory/216-3660-0x0000000140000000-0x0000000140770000-memory.dmp xmrig behavioral1/memory/216-3670-0x0000000140000000-0x0000000140770000-memory.dmp xmrig behavioral1/memory/216-3672-0x0000000140000000-0x0000000140770000-memory.dmp xmrig behavioral1/memory/216-3680-0x0000000140000000-0x0000000140770000-memory.dmp xmrig behavioral1/memory/216-3784-0x0000000140000000-0x0000000140770000-memory.dmp xmrig behavioral1/memory/216-3774-0x0000000140000000-0x0000000140770000-memory.dmp xmrig behavioral1/memory/216-3814-0x0000000140000000-0x0000000140770000-memory.dmp xmrig -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 26 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1Y46i9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1Y46i9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2w8102.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3q95F.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c0e5e12f3e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2w8102.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 77caa08f53.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ee573e9246.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 620155c2c2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 96016b1ac8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 620155c2c2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 96016b1ac8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dd9ee23ec3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dd9ee23ec3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dce9a39112.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dce9a39112.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 77caa08f53.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3q95F.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c0e5e12f3e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ee573e9246.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation f5c89c7f3a.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 1a57df4f59.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 1Y46i9.exe -
Executes dropped EXE 35 IoCs
pid Process 4312 w5d11.exe 3780 1Y46i9.exe 2164 skotes.exe 2944 2w8102.exe 5028 3q95F.exe 1372 4dfe323e60.exe 1152 7ddbe27cca.exe 540 7ddbe27cca.exe 1984 dd9ee23ec3.exe 4360 f5c89c7f3a.exe 4856 Gxtuum.exe 2792 92bb3225dc.exe 3484 graph.exe 2776 dce9a39112.exe 4732 skotes.exe 548 Gxtuum.exe 3240 1a57df4f59.exe 2900 7z.exe 1052 7z.exe 4436 7z.exe 3056 7z.exe 4632 7z.exe 1844 7z.exe 3752 7z.exe 2692 7z.exe 2392 in.exe 4328 77caa08f53.exe 2920 c0e5e12f3e.exe 1588 ee573e9246.exe 3300 620155c2c2.exe 2228 8035af0462.exe 2012 96016b1ac8.exe 3236 skotes.exe 5640 Gxtuum.exe 6912 Intel_PTT_EK_Recertification.exe -
Identifies Wine through registry keys 2 TTPs 13 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine dce9a39112.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 77caa08f53.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine c0e5e12f3e.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine dd9ee23ec3.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine ee573e9246.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 620155c2c2.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 96016b1ac8.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 1Y46i9.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 2w8102.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 3q95F.exe -
Loads dropped DLL 8 IoCs
pid Process 2900 7z.exe 1052 7z.exe 4436 7z.exe 3056 7z.exe 4632 7z.exe 1844 7z.exe 3752 7z.exe 2692 7z.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 96016b1ac8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 96016b1ac8.exe -
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" w5d11.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Graph = "C:\\Program Files\\Windows Media Player\\graph\\graph.exe" 92bb3225dc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ee573e9246.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1020034001\\ee573e9246.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\620155c2c2.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1020035001\\620155c2c2.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\8035af0462.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1020036001\\8035af0462.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\96016b1ac8.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1020037001\\96016b1ac8.exe" skotes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" dd25cd47e84741d9a471f7146b6bdd901d84515db471fba3fa5aca42f3d517d1N.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 56 drive.google.com 57 drive.google.com -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 69 ipinfo.io 70 ipinfo.io -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0007000000023cbe-390.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 13 IoCs
pid Process 3780 1Y46i9.exe 2164 skotes.exe 2944 2w8102.exe 5028 3q95F.exe 1984 dd9ee23ec3.exe 2776 dce9a39112.exe 4732 skotes.exe 4328 77caa08f53.exe 2920 c0e5e12f3e.exe 1588 ee573e9246.exe 3300 620155c2c2.exe 2012 96016b1ac8.exe 3236 skotes.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1152 set thread context of 540 1152 7ddbe27cca.exe 92 PID 6912 set thread context of 216 6912 Intel_PTT_EK_Recertification.exe 166 -
resource yara_rule behavioral1/files/0x0007000000023cb5-287.dat upx behavioral1/memory/2392-291-0x00007FF6ED860000-0x00007FF6EDCF0000-memory.dmp upx behavioral1/memory/2392-294-0x00007FF6ED860000-0x00007FF6EDCF0000-memory.dmp upx behavioral1/memory/6912-3583-0x00007FF6C6DD0000-0x00007FF6C7260000-memory.dmp upx behavioral1/memory/6912-3825-0x00007FF6C6DD0000-0x00007FF6C7260000-memory.dmp upx -
Drops file in Program Files directory 5 IoCs
description ioc Process File created C:\Program Files\Windows Media Player\graph\graph.exe 92bb3225dc.exe File opened for modification C:\Program Files\Windows Media Player\1w4lv5IzuEVOMa3sjCc6orj2dWPvJoK5fzip 92bb3225dc.exe File opened for modification C:\Program Files\Windows Media Player\1w4lv5IzuEVOMa3sjCc6orj2dWPvJoK5f 92bb3225dc.exe File created C:\Program Files\Windows Media Player\1w4lv5IzuEVOMa3sjCc6orj2dWPvJoK5f 92bb3225dc.exe File created C:\Program Files\Windows Media Player\1w4lv5IzuEVOMa3sjCc6orj2dWPvJoK5fzip 92bb3225dc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1Y46i9.exe File created C:\Windows\Tasks\Gxtuum.job f5c89c7f3a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 4260 1984 WerFault.exe 96 6236 2920 WerFault.exe 135 -
System Location Discovery: System Language Discovery 1 TTPs 27 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7ddbe27cca.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dd25cd47e84741d9a471f7146b6bdd901d84515db471fba3fa5aca42f3d517d1N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4dfe323e60.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1a57df4f59.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2w8102.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f5c89c7f3a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 620155c2c2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language w5d11.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1Y46i9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96016b1ac8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dd9ee23ec3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c0e5e12f3e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8035af0462.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 8035af0462.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dce9a39112.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7ddbe27cca.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ee573e9246.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 8035af0462.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3q95F.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 77caa08f53.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 6708 PING.EXE 1664 powershell.exe 2512 PING.EXE 3932 powershell.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 1592 taskkill.exe 4400 taskkill.exe 4812 taskkill.exe 1348 taskkill.exe 400 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings firefox.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 2512 PING.EXE 6708 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1932 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3780 1Y46i9.exe 3780 1Y46i9.exe 2164 skotes.exe 2164 skotes.exe 2944 2w8102.exe 2944 2w8102.exe 5028 3q95F.exe 5028 3q95F.exe 1984 dd9ee23ec3.exe 1984 dd9ee23ec3.exe 2792 92bb3225dc.exe 2792 92bb3225dc.exe 2792 92bb3225dc.exe 2792 92bb3225dc.exe 3484 graph.exe 3484 graph.exe 3484 graph.exe 3484 graph.exe 2776 dce9a39112.exe 2776 dce9a39112.exe 3484 graph.exe 3484 graph.exe 4732 skotes.exe 4732 skotes.exe 2776 dce9a39112.exe 2776 dce9a39112.exe 2776 dce9a39112.exe 2776 dce9a39112.exe 2776 dce9a39112.exe 2776 dce9a39112.exe 2776 dce9a39112.exe 2776 dce9a39112.exe 3484 graph.exe 3484 graph.exe 3484 graph.exe 3484 graph.exe 3484 graph.exe 3484 graph.exe 3484 graph.exe 3484 graph.exe 3484 graph.exe 3484 graph.exe 3484 graph.exe 3484 graph.exe 3484 graph.exe 3484 graph.exe 3484 graph.exe 3484 graph.exe 3484 graph.exe 3484 graph.exe 3484 graph.exe 3484 graph.exe 1664 powershell.exe 1664 powershell.exe 1664 powershell.exe 3484 graph.exe 3484 graph.exe 4328 77caa08f53.exe 4328 77caa08f53.exe 3484 graph.exe 3484 graph.exe 3484 graph.exe 3484 graph.exe 3484 graph.exe -
Suspicious use of AdjustPrivilegeToken 43 IoCs
description pid Process Token: SeRestorePrivilege 2900 7z.exe Token: 35 2900 7z.exe Token: SeSecurityPrivilege 2900 7z.exe Token: SeSecurityPrivilege 2900 7z.exe Token: SeRestorePrivilege 1052 7z.exe Token: 35 1052 7z.exe Token: SeSecurityPrivilege 1052 7z.exe Token: SeSecurityPrivilege 1052 7z.exe Token: SeRestorePrivilege 4436 7z.exe Token: 35 4436 7z.exe Token: SeSecurityPrivilege 4436 7z.exe Token: SeSecurityPrivilege 4436 7z.exe Token: SeRestorePrivilege 3056 7z.exe Token: 35 3056 7z.exe Token: SeSecurityPrivilege 3056 7z.exe Token: SeSecurityPrivilege 3056 7z.exe Token: SeRestorePrivilege 4632 7z.exe Token: 35 4632 7z.exe Token: SeSecurityPrivilege 4632 7z.exe Token: SeSecurityPrivilege 4632 7z.exe Token: SeRestorePrivilege 1844 7z.exe Token: 35 1844 7z.exe Token: SeSecurityPrivilege 1844 7z.exe Token: SeSecurityPrivilege 1844 7z.exe Token: SeRestorePrivilege 3752 7z.exe Token: 35 3752 7z.exe Token: SeSecurityPrivilege 3752 7z.exe Token: SeSecurityPrivilege 3752 7z.exe Token: SeRestorePrivilege 2692 7z.exe Token: 35 2692 7z.exe Token: SeSecurityPrivilege 2692 7z.exe Token: SeSecurityPrivilege 2692 7z.exe Token: SeDebugPrivilege 1664 powershell.exe Token: SeDebugPrivilege 1592 taskkill.exe Token: SeDebugPrivilege 4400 taskkill.exe Token: SeDebugPrivilege 4812 taskkill.exe Token: SeDebugPrivilege 1348 taskkill.exe Token: SeDebugPrivilege 400 taskkill.exe Token: SeDebugPrivilege 1836 firefox.exe Token: SeDebugPrivilege 1836 firefox.exe Token: SeDebugPrivilege 2012 96016b1ac8.exe Token: SeLockMemoryPrivilege 216 explorer.exe Token: SeDebugPrivilege 3932 powershell.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 3780 1Y46i9.exe 2228 8035af0462.exe 2228 8035af0462.exe 2228 8035af0462.exe 2228 8035af0462.exe 2228 8035af0462.exe 2228 8035af0462.exe 2228 8035af0462.exe 2228 8035af0462.exe 2228 8035af0462.exe 1836 firefox.exe 1836 firefox.exe 1836 firefox.exe 1836 firefox.exe 1836 firefox.exe 1836 firefox.exe 1836 firefox.exe 1836 firefox.exe 1836 firefox.exe 1836 firefox.exe 1836 firefox.exe 1836 firefox.exe 1836 firefox.exe 1836 firefox.exe 1836 firefox.exe 1836 firefox.exe 1836 firefox.exe 1836 firefox.exe 1836 firefox.exe 1836 firefox.exe 1836 firefox.exe 2228 8035af0462.exe 2228 8035af0462.exe 2228 8035af0462.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2228 8035af0462.exe 2228 8035af0462.exe 2228 8035af0462.exe 2228 8035af0462.exe 2228 8035af0462.exe 2228 8035af0462.exe 2228 8035af0462.exe 2228 8035af0462.exe 2228 8035af0462.exe 1836 firefox.exe 1836 firefox.exe 1836 firefox.exe 1836 firefox.exe 1836 firefox.exe 1836 firefox.exe 1836 firefox.exe 1836 firefox.exe 1836 firefox.exe 1836 firefox.exe 1836 firefox.exe 1836 firefox.exe 1836 firefox.exe 1836 firefox.exe 1836 firefox.exe 1836 firefox.exe 1836 firefox.exe 1836 firefox.exe 1836 firefox.exe 1836 firefox.exe 2228 8035af0462.exe 2228 8035af0462.exe 2228 8035af0462.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1836 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4804 wrote to memory of 4312 4804 dd25cd47e84741d9a471f7146b6bdd901d84515db471fba3fa5aca42f3d517d1N.exe 82 PID 4804 wrote to memory of 4312 4804 dd25cd47e84741d9a471f7146b6bdd901d84515db471fba3fa5aca42f3d517d1N.exe 82 PID 4804 wrote to memory of 4312 4804 dd25cd47e84741d9a471f7146b6bdd901d84515db471fba3fa5aca42f3d517d1N.exe 82 PID 4312 wrote to memory of 3780 4312 w5d11.exe 83 PID 4312 wrote to memory of 3780 4312 w5d11.exe 83 PID 4312 wrote to memory of 3780 4312 w5d11.exe 83 PID 3780 wrote to memory of 2164 3780 1Y46i9.exe 84 PID 3780 wrote to memory of 2164 3780 1Y46i9.exe 84 PID 3780 wrote to memory of 2164 3780 1Y46i9.exe 84 PID 4312 wrote to memory of 2944 4312 w5d11.exe 85 PID 4312 wrote to memory of 2944 4312 w5d11.exe 85 PID 4312 wrote to memory of 2944 4312 w5d11.exe 85 PID 4804 wrote to memory of 5028 4804 dd25cd47e84741d9a471f7146b6bdd901d84515db471fba3fa5aca42f3d517d1N.exe 86 PID 4804 wrote to memory of 5028 4804 dd25cd47e84741d9a471f7146b6bdd901d84515db471fba3fa5aca42f3d517d1N.exe 86 PID 4804 wrote to memory of 5028 4804 dd25cd47e84741d9a471f7146b6bdd901d84515db471fba3fa5aca42f3d517d1N.exe 86 PID 2164 wrote to memory of 1372 2164 skotes.exe 87 PID 2164 wrote to memory of 1372 2164 skotes.exe 87 PID 2164 wrote to memory of 1372 2164 skotes.exe 87 PID 2164 wrote to memory of 1152 2164 skotes.exe 90 PID 2164 wrote to memory of 1152 2164 skotes.exe 90 PID 2164 wrote to memory of 1152 2164 skotes.exe 90 PID 1152 wrote to memory of 540 1152 7ddbe27cca.exe 92 PID 1152 wrote to memory of 540 1152 7ddbe27cca.exe 92 PID 1152 wrote to memory of 540 1152 7ddbe27cca.exe 92 PID 1152 wrote to memory of 540 1152 7ddbe27cca.exe 92 PID 1152 wrote to memory of 540 1152 7ddbe27cca.exe 92 PID 1152 wrote to memory of 540 1152 7ddbe27cca.exe 92 PID 1152 wrote to memory of 540 1152 7ddbe27cca.exe 92 PID 1152 wrote to memory of 540 1152 7ddbe27cca.exe 92 PID 1152 wrote to memory of 540 1152 7ddbe27cca.exe 92 PID 2164 wrote to memory of 1984 2164 skotes.exe 96 PID 2164 wrote to memory of 1984 2164 skotes.exe 96 PID 2164 wrote to memory of 1984 2164 skotes.exe 96 PID 2164 wrote to memory of 4360 2164 skotes.exe 101 PID 2164 wrote to memory of 4360 2164 skotes.exe 101 PID 2164 wrote to memory of 4360 2164 skotes.exe 101 PID 4360 wrote to memory of 4856 4360 f5c89c7f3a.exe 103 PID 4360 wrote to memory of 4856 4360 f5c89c7f3a.exe 103 PID 4360 wrote to memory of 4856 4360 f5c89c7f3a.exe 103 PID 2164 wrote to memory of 2792 2164 skotes.exe 104 PID 2164 wrote to memory of 2792 2164 skotes.exe 104 PID 2792 wrote to memory of 3484 2792 92bb3225dc.exe 105 PID 2792 wrote to memory of 3484 2792 92bb3225dc.exe 105 PID 2164 wrote to memory of 2776 2164 skotes.exe 107 PID 2164 wrote to memory of 2776 2164 skotes.exe 107 PID 2164 wrote to memory of 2776 2164 skotes.exe 107 PID 2164 wrote to memory of 3240 2164 skotes.exe 111 PID 2164 wrote to memory of 3240 2164 skotes.exe 111 PID 2164 wrote to memory of 3240 2164 skotes.exe 111 PID 3240 wrote to memory of 4668 3240 1a57df4f59.exe 112 PID 3240 wrote to memory of 4668 3240 1a57df4f59.exe 112 PID 4668 wrote to memory of 4892 4668 cmd.exe 114 PID 4668 wrote to memory of 4892 4668 cmd.exe 114 PID 4668 wrote to memory of 2900 4668 cmd.exe 115 PID 4668 wrote to memory of 2900 4668 cmd.exe 115 PID 4668 wrote to memory of 1052 4668 cmd.exe 116 PID 4668 wrote to memory of 1052 4668 cmd.exe 116 PID 4668 wrote to memory of 4436 4668 cmd.exe 117 PID 4668 wrote to memory of 4436 4668 cmd.exe 117 PID 4668 wrote to memory of 3056 4668 cmd.exe 118 PID 4668 wrote to memory of 3056 4668 cmd.exe 118 PID 4668 wrote to memory of 4632 4668 cmd.exe 119 PID 4668 wrote to memory of 4632 4668 cmd.exe 119 PID 4668 wrote to memory of 1844 4668 cmd.exe 120 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 3 IoCs
pid Process 640 attrib.exe 4476 attrib.exe 1364 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dd25cd47e84741d9a471f7146b6bdd901d84515db471fba3fa5aca42f3d517d1N.exe"C:\Users\Admin\AppData\Local\Temp\dd25cd47e84741d9a471f7146b6bdd901d84515db471fba3fa5aca42f3d517d1N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w5d11.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w5d11.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1Y46i9.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1Y46i9.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3780 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Users\Admin\AppData\Local\Temp\1020021001\4dfe323e60.exe"C:\Users\Admin\AppData\Local\Temp\1020021001\4dfe323e60.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1372
-
-
C:\Users\Admin\AppData\Local\Temp\1020022001\7ddbe27cca.exe"C:\Users\Admin\AppData\Local\Temp\1020022001\7ddbe27cca.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Users\Admin\AppData\Local\Temp\1020022001\7ddbe27cca.exe"C:\Users\Admin\AppData\Local\Temp\1020022001\7ddbe27cca.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:540
-
-
-
C:\Users\Admin\AppData\Local\Temp\1020027001\dd9ee23ec3.exe"C:\Users\Admin\AppData\Local\Temp\1020027001\dd9ee23ec3.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1984 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1984 -s 15166⤵
- Program crash
PID:4260
-
-
-
C:\Users\Admin\AppData\Local\Temp\1020028001\f5c89c7f3a.exe"C:\Users\Admin\AppData\Local\Temp\1020028001\f5c89c7f3a.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Users\Admin\AppData\Local\Temp\e458d263c0\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\e458d263c0\Gxtuum.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4856
-
-
-
C:\Users\Admin\AppData\Local\Temp\1020029001\92bb3225dc.exe"C:\Users\Admin\AppData\Local\Temp\1020029001\92bb3225dc.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Program Files\Windows Media Player\graph\graph.exe"C:\Program Files\Windows Media Player\graph\graph.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3484
-
-
-
C:\Users\Admin\AppData\Local\Temp\1020030001\dce9a39112.exe"C:\Users\Admin\AppData\Local\Temp\1020030001\dce9a39112.exe"5⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2776
-
-
C:\Users\Admin\AppData\Local\Temp\1020031001\1a57df4f59.exe"C:\Users\Admin\AppData\Local\Temp\1020031001\1a57df4f59.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"6⤵
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Windows\system32\mode.commode 65,107⤵PID:4892
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e file.zip -p24291711423417250691697322505 -oextracted7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2900
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_7.zip -oextracted7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1052
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_6.zip -oextracted7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:4436
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_5.zip -oextracted7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:3056
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_4.zip -oextracted7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:4632
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_3.zip -oextracted7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1844
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_2.zip -oextracted7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:3752
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_1.zip -oextracted7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2692
-
-
C:\Windows\system32\attrib.exeattrib +H "in.exe"7⤵
- Views/modifies file attributes
PID:640
-
-
C:\Users\Admin\AppData\Local\Temp\main\in.exe"in.exe"7⤵
- Executes dropped EXE
PID:2392 -
C:\Windows\SYSTEM32\attrib.exeattrib +H +S C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe8⤵
- Views/modifies file attributes
PID:1364
-
-
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe8⤵
- Views/modifies file attributes
PID:4476
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /f /CREATE /TN "Intel_PTT_EK_Recertification" /TR "C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe" /SC MINUTE8⤵
- Scheduled Task/Job: Scheduled Task
PID:1932
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell ping 127.0.0.1; del in.exe8⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1664 -
C:\Windows\system32\PING.EXE"C:\Windows\system32\PING.EXE" 127.0.0.19⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2512
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1020032001\77caa08f53.exe"C:\Users\Admin\AppData\Local\Temp\1020032001\77caa08f53.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4328
-
-
C:\Users\Admin\AppData\Local\Temp\1020033001\c0e5e12f3e.exe"C:\Users\Admin\AppData\Local\Temp\1020033001\c0e5e12f3e.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2920 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2920 -s 7726⤵
- Program crash
PID:6236
-
-
-
C:\Users\Admin\AppData\Local\Temp\1020034001\ee573e9246.exe"C:\Users\Admin\AppData\Local\Temp\1020034001\ee573e9246.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1588
-
-
C:\Users\Admin\AppData\Local\Temp\1020035001\620155c2c2.exe"C:\Users\Admin\AppData\Local\Temp\1020035001\620155c2c2.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3300
-
-
C:\Users\Admin\AppData\Local\Temp\1020036001\8035af0462.exe"C:\Users\Admin\AppData\Local\Temp\1020036001\8035af0462.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2228 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1592
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4400
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4812
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1348
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:400
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking6⤵PID:4568
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking7⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1836 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2020 -parentBuildID 20240401114208 -prefsHandle 1936 -prefMapHandle 1928 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {4b36a1b8-00e5-4127-a8ab-2b5f3facadfc} 1836 "\\.\pipe\gecko-crash-server-pipe.1836" gpu8⤵PID:3676
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2484 -parentBuildID 20240401114208 -prefsHandle 2428 -prefMapHandle 2408 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d13b0d90-24e9-4198-9ba7-fb7982b49cc0} 1836 "\\.\pipe\gecko-crash-server-pipe.1836" socket8⤵PID:1932
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3220 -childID 1 -isForBrowser -prefsHandle 3192 -prefMapHandle 3212 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8b80568c-e206-43f3-848c-b172e282d31d} 1836 "\\.\pipe\gecko-crash-server-pipe.1836" tab8⤵PID:556
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4084 -childID 2 -isForBrowser -prefsHandle 4076 -prefMapHandle 1252 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {64304dde-f924-4e5c-b9c6-eb0ebb55667a} 1836 "\\.\pipe\gecko-crash-server-pipe.1836" tab8⤵PID:1208
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4768 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4616 -prefMapHandle 4736 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9c08da1f-da9c-4c83-8af8-570500b548a9} 1836 "\\.\pipe\gecko-crash-server-pipe.1836" utility8⤵
- Checks processor information in registry
PID:5448
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5148 -childID 3 -isForBrowser -prefsHandle 5144 -prefMapHandle 5140 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c0ea5a3b-336f-42c1-b80e-9aa5c54afc30} 1836 "\\.\pipe\gecko-crash-server-pipe.1836" tab8⤵PID:2320
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5384 -childID 4 -isForBrowser -prefsHandle 5396 -prefMapHandle 5392 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fb437b82-d009-4063-b159-da0e9913c615} 1836 "\\.\pipe\gecko-crash-server-pipe.1836" tab8⤵PID:3272
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5532 -childID 5 -isForBrowser -prefsHandle 5612 -prefMapHandle 5608 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0182abc7-aa65-43e9-a358-e78dadfb93b5} 1836 "\\.\pipe\gecko-crash-server-pipe.1836" tab8⤵PID:220
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1020037001\96016b1ac8.exe"C:\Users\Admin\AppData\Local\Temp\1020037001\96016b1ac8.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2012
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2w8102.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2w8102.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2944
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3q95F.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3q95F.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5028
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 200 -p 1984 -ip 19841⤵PID:4084
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4732
-
C:\Users\Admin\AppData\Local\Temp\e458d263c0\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\e458d263c0\Gxtuum.exe1⤵
- Executes dropped EXE
PID:548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2920 -ip 29201⤵PID:6216
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3236
-
C:\Users\Admin\AppData\Local\Temp\e458d263c0\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\e458d263c0\Gxtuum.exe1⤵
- Executes dropped EXE
PID:5640
-
C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exeC:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:6912 -
C:\Windows\explorer.exeexplorer.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:216
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell ping 127.1.10.1; del Intel_PTT_EK_Recertification.exe2⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3932 -
C:\Windows\system32\PING.EXE"C:\Windows\system32\PING.EXE" 127.1.10.13⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:6708
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
245KB
MD57d254439af7b1caaa765420bea7fbd3f
SHA17bd1d979de4a86cb0d8c2ad9e1945bd351339ad0
SHA256d6e7ceb5b05634efbd06c3e28233e92f1bd362a36473688fbaf952504b76d394
SHA512c3164b2f09dc914066201562be6483f61d3c368675ac5d3466c2d5b754813b8b23fd09af86b1f15ab8cc91be8a52b3488323e7a65198e5b104f9c635ec5ed5cc
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\activity-stream.discovery_stream.json
Filesize21KB
MD5e85b13bfd4ecceeecd5f510136c5f484
SHA149a344df21a61561ef79071282a71386e27dc928
SHA2565027eea3f0c57bcb351fd645c76e9d3323cc1563d88ef1753c35100adad3d59b
SHA512d1c2bed3e333eeda5e4a329f9f519edee97ae13abc213b57605c4d29179cfb334b59e40c130cf74ecda3f7a0d2e1e90684fd8e241393d6fc2e0e087acef59424
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\cache2\entries\6653BC7BE242C21AA1988A4A42D1DEDA18231C31
Filesize13KB
MD558ed2261ea68002a044558b45f244d11
SHA1b9a3dc2eaf3efd73a9f2968c78eca66c0209e63e
SHA256150bc8bfad21c206e79454ec0af792245a41e0f4f76b78c9bcf2070682c1d8e5
SHA5128b696d841c395f569f0a5ee08deb73c96440e57bfbb975e7689caf960b07c0f3d4bcf5d01cc5fcbbbe6212f03b8ed5ec2877360c808c79e00015f31a93014223
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD5e76daf79e7f2900128c01e1ccdaf68d9
SHA1e62b990045d8597a641bd2e418407148b59cb6a8
SHA25666abbc1c4962e46ce511f08dc707241529920d7baab89f998b62191a3d848832
SHA512325b0cf2ab1b49dd963600d4e81d6d8dc8d615c3779909e748fc2c9666c98757a1a8c1d5e7c77a9cfb6c2869d2f997d7655560ad377685f750c05e224c23f68b
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
2.5MB
MD587330f1877c33a5a6203c49075223b16
SHA155b64ee8b2d1302581ab1978e9588191e4e62f81
SHA25698f2344ed45ff0464769e5b006bf0e831dc3834f0534a23339bb703e50db17e0
SHA5127c747d3edb04e4e71dce7efa33f5944a191896574fee5227316739a83d423936a523df12f925ee9b460cce23b49271f549c1ee5d77b50a7d7c6e3f31ba120c8f
-
Filesize
758KB
MD5afd936e441bf5cbdb858e96833cc6ed3
SHA13491edd8c7caf9ae169e21fb58bccd29d95aefef
SHA256c6491d7a6d70c7c51baca7436464667b4894e4989fa7c5e05068dde4699e1cbf
SHA512928c15a1eda602b2a66a53734f3f563ab9626882104e30ee2bf5106cfd6e08ec54f96e3063f1ab89bf13be2c8822a8419f5d8ee0a3583a4c479785226051a325
-
Filesize
1.8MB
MD515709eba2afaf7cc0a86ce0abf8e53f1
SHA1238ebf0d386ecf0e56d0ddb60faca0ea61939bb6
SHA25610bff40a9d960d0be3cc81b074a748764d7871208f324de26d365b1f8ea3935a
SHA51265edefa20f0bb35bee837951ccd427b94a18528c6e84de222b1aa0af380135491bb29a049009f77e66fcd2abe5376a831d98e39055e1042ccee889321b96e8e9
-
Filesize
429KB
MD551ff79b406cb223dd49dd4c947ec97b0
SHA1b9b0253480a1b6cbdd673383320fecae5efb3dce
SHA2562e3a5dfa44d59681a60d78b8b08a1af3878d8e270c02d7e31a0876a85eb42a7e
SHA512c2b8d15b0dc1b0846f39ce007be2deb41d5b6ae76af90d618f29da8691ed987c42f3c270f0ea7f4d10cbd2d3877118f4133803c9c965b6ff236ff8cfafd9367c
-
Filesize
591KB
MD53567cb15156760b2f111512ffdbc1451
SHA12fdb1f235fc5a9a32477dab4220ece5fda1539d4
SHA2560285d3a6c1ca2e3a993491c44e9cf2d33dbec0fb85fdbf48989a4e3b14b37630
SHA512e7a31b016417218387a4702e525d33dd4fe496557539b2ab173cec0cb92052c750cfc4b3e7f02f3c66ac23f19a0c8a4eb6c9d2b590a5e9faeb525e517bc877ba
-
Filesize
4.3MB
MD5faf718856c97bf090fa14d751014aa12
SHA1d536f3b51af70c809baa2759873791caeb8d6f38
SHA256d56ba5e51f2ea3ce492e545bac05b0b5ca2c25ec6608ee2c2738d4f815b3eab2
SHA5126c9b9d56df87eebd9824d499f8215d47ed8ddbded3d0fe9be7c3d87b2fcc9ca2f3f39f43ec7adfeff09540c51894fe2b3f1e7d7032d77bb5be50ae233855d161
-
Filesize
4.2MB
MD53a425626cbd40345f5b8dddd6b2b9efa
SHA17b50e108e293e54c15dce816552356f424eea97a
SHA256ba9212d2d5cd6df5eb7933fb37c1b72a648974c1730bf5c32439987558f8e8b1
SHA512a7538c6b7e17c35f053721308b8d6dc53a90e79930ff4ed5cffecaa97f4d0fbc5f9e8b59f1383d8f0699c8d4f1331f226af71d40325022d10b885606a72fe668
-
Filesize
4.3MB
MD54b0cb8cea5700882ecce813c6bb87837
SHA1d5a6dc5c04a2269897b0dea5041352b7198324ed
SHA256fc85d7c03c2859a7a9f7c6450931aa0c856f0e3b24918ba3794694cc29ce1966
SHA512dd50a5b28aa4091213ef065a78211c7d586909d141d468341af12eeae0d547963cfe1f72056edcb6ca2006be5b87a2fef236242d6057cf02b009541060da1380
-
Filesize
1.9MB
MD53ee3b92f92a6ab549bcb9615e197253c
SHA166f1e8647e51f77ed5f66c3db23ec01909aad4ce
SHA2562ca68fefe5cbf9d595e1dde3b0ebc1447441be518af3bceca9312d93c91dca37
SHA512d987837fef5a0a00b1401b9c171ba794df78412ee3444a9c17c617f2344c5a71fa3f4286c1f68438db43170ded1079502c0b406ea7c051a868edc78ddb6ca088
-
Filesize
1.7MB
MD5e9dcb1f16b0f4d16dda27e91e9f394e0
SHA147f99cb7c1ccb5a57a95debe478e4bfc7ff07d37
SHA2565d7de4e442a2e7772b4c899d7bfa4eb61e1185d130fbdbb109e0de4f5bf1ef2f
SHA51254d9754a741a63637aa565598d4b7db42c27ea86bd37df11b4b91cb543f469e56e02c675ed8d32b0e0b5a303e2079ae55fb3c552c1c7132791cbf1810a51e0fe
-
Filesize
2.8MB
MD542b028b291d1a3fa0d29bfac364120bd
SHA169c6f40ecd067ec1b40f76ae2027e6ff3e8a1489
SHA2562b2f509e03cd5373d2d1fb4cb8de1f3b7ce6efdcfdd552149fcd3df4c8081176
SHA5120bbe158a1a5a427b93d73ffd63dc87ea4484ca7dcd7208323784e7e52d9b06d93e4e4a81b6a1937a19ce75a4ac66c78c0e41d45d44550a487b86582539ffac08
-
Filesize
944KB
MD51adf298068d165e31ff2f871f95290dc
SHA188e3dffc8ced07ef419697d97a98118fb84cdbdd
SHA256920c41ee017e0a89c36ff263821911e0561517bc0342d6d85ab231d9154fe7b8
SHA51215762ca474d93004d568ea677cae9830d6c435dbbcb4e31d6fed27e267e04e252fa93152523fa1c736c69c5a8e8da7837a03a5e9988a282ceb9976c2869a4006
-
Filesize
2.7MB
MD5680b734904d2c06188120f711a04fb0b
SHA1119a1036fc4e0dfaa20161e5cbb95fa0eccfd2eb
SHA25616d15285e09f9fcb44f649dd3cdb60bfa3a80f46ccb3c1c72865d873b01be05a
SHA512eafe65932f8b75e8af74bbc72f68abd50edc70880af6090f98341d88045f696c98b9cad25d37a41794378646da96845c55fab440cc52d1af9d878ee8779c3b3c
-
Filesize
2.8MB
MD5da93826871d0494e34217aa103204590
SHA12ad0fc0b3ccd0e94d9f6fed37eda17b78b974e7a
SHA25655a6c04ca7724acad83455b0a8d511c8d441db88f0400b9561d28ce99328651f
SHA51278eb291bbefee07a5a8b4ccaf0a0a2f7ba808f7ac9a0eabbcec67e1d94076f4ff8fbb2508947b708bcc0a8691c7f94c02770a93346d582c390a80ae48845dee2
-
Filesize
3.5MB
MD52c068eb34c4e8f3f96e10c2eea8608e7
SHA19fd9765b4dce2b36c7c11671830f10830bc9c423
SHA256be979919beca2bb6da722fad86a58d8f289ca7ba0d15edd895eb1e513fcf4e85
SHA5124f85bf796248b81e39116e0ccdfabf4eabb48e100745172bf6462c1e52349a9bda4a51d58588778e3ddbb1a04d1caf63a6d9d504a96dfbb5102478ce4d84a011
-
Filesize
2.8MB
MD565f41a5703887beeba49a84ca30bae19
SHA11ae160165e2ba85f3b90d34b451fe965ce51701e
SHA256e99443934269e932c08bf7928da5ff5c5fae2cc72794380d5f7f7a2d0f7bc46e
SHA51262d2c181b59a8d74978f7a9a335472c119e599c3106c979fb3f02663d22becb7c584d84f6dd6c4b4499997d72ec67cf4274643a4ae09485a90ae8f543ce9f6bb
-
Filesize
1.8MB
MD577a96f47e6e362cf69f6f6fe33cae288
SHA10a0a2a288d431877b6ee57331554416b12e75c53
SHA256a412e543a626bc6aa12cf18b2d37fb6770889a67a4abbbd41e2e21cccb31d4f1
SHA512c5018be0e5aaae667a560254c27b0efde81caf89d035dc730ad73e5635cbec01acd3e6098a8195841b328677db8a4b5c34076dfda382e01674be511d69c38b74
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1.6MB
MD572491c7b87a7c2dd350b727444f13bb4
SHA11e9338d56db7ded386878eab7bb44b8934ab1bc7
SHA25634ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891
SHA512583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511
-
Filesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628
-
Filesize
2.2MB
MD5579a63bebccbacab8f14132f9fc31b89
SHA1fca8a51077d352741a9c1ff8a493064ef5052f27
SHA2560ac3504d5fa0460cae3c0fd9c4b628e1a65547a60563e6d1f006d17d5a6354b0
SHA5124a58ca0f392187a483b9ef652b6e8b2e60d01daa5d331549df9f359d2c0a181e975cf9df79552e3474b9d77f8e37a1cf23725f32d4cdbe4885e257a7625f7b1f
-
Filesize
1.7MB
MD55659eba6a774f9d5322f249ad989114a
SHA14bfb12aa98a1dc2206baa0ac611877b815810e4c
SHA256e04346fee15c3f98387a3641e0bba2e555a5a9b0200e4b9256b1b77094069ae4
SHA512f93abf2787b1e06ce999a0cbc67dc787b791a58f9ce20af5587b2060d663f26be9f648d116d9ca279af39299ea5d38e3c86271297e47c1438102ca28fce8edc4
-
Filesize
1.7MB
MD55404286ec7853897b3ba00adf824d6c1
SHA139e543e08b34311b82f6e909e1e67e2f4afec551
SHA256ec94a6666a3103ba6be60b92e843075a2d7fe7d30fa41099c3f3b1e2a5eba266
SHA512c4b78298c42148d393feea6c3941c48def7c92ef0e6baac99144b083937d0a80d3c15bd9a0bf40daa60919968b120d62999fa61af320e507f7e99fbfe9b9ef30
-
Filesize
1.7MB
MD55eb39ba3698c99891a6b6eb036cfb653
SHA1d2f1cdd59669f006a2f1aa9214aeed48bc88c06e
SHA256e77f5e03ae140dda27d73e1ffe43f7911e006a108cf51cbd0e05d73aa92da7c2
SHA5126c4ca20e88d49256ed9cabec0d1f2b00dfcf3d1603b5c95d158d4438c9f1e58495f8dfa200dbe7f49b5b0dd57886517eb3b98c4190484548720dad4b3db6069e
-
Filesize
1.7MB
MD57187cc2643affab4ca29d92251c96dee
SHA1ab0a4de90a14551834e12bb2c8c6b9ee517acaf4
SHA256c7e92a1af295307fb92ad534e05fba879a7cf6716f93aefca0ebfcb8cee7a830
SHA51227985d317a5c844871ffb2527d04aa50ef7442b2f00d69d5ab6bbb85cd7be1d7057ffd3151d0896f05603677c2f7361ed021eac921e012d74da049ef6949e3a3
-
Filesize
1.7MB
MD5b7d1e04629bec112923446fda5391731
SHA1814055286f963ddaa5bf3019821cb8a565b56cb8
SHA2564da77d4ee30ad0cd56cd620f4e9dc4016244ace015c5b4b43f8f37dd8e3a8789
SHA51279fc3606b0fe6a1e31a2ecacc96623caf236bf2be692dadab6ea8ffa4af4231d782094a63b76631068364ac9b6a872b02f1e080636eba40ed019c2949a8e28db
-
Filesize
1.7MB
MD50dc4014facf82aa027904c1be1d403c1
SHA15e6d6c020bfc2e6f24f3d237946b0103fe9b1831
SHA256a29ddd29958c64e0af1a848409e97401307277bb6f11777b1cfb0404a6226de7
SHA512cbeead189918657cc81e844ed9673ee8f743aed29ad9948e90afdfbecacc9c764fbdbfb92e8c8ceb5ae47cee52e833e386a304db0572c7130d1a54fd9c2cc028
-
Filesize
3.3MB
MD5cea368fc334a9aec1ecff4b15612e5b0
SHA1493d23f72731bb570d904014ffdacbba2334ce26
SHA25607e38cad68b0cdbea62f55f9bc6ee80545c2e1a39983baa222e8af788f028541
SHA512bed35a1cc56f32e0109ea5a02578489682a990b5cefa58d7cf778815254af9849e731031e824adba07c86c8425df58a1967ac84ce004c62e316a2e51a75c8748
-
Filesize
1.7MB
MD583d75087c9bf6e4f07c36e550731ccde
SHA1d5ff596961cce5f03f842cfd8f27dde6f124e3ae
SHA25646db3164bebffc61c201fe1e086bffe129ddfed575e6d839ddb4f9622963fb3f
SHA512044e1f5507e92715ce9df8bb802e83157237a2f96f39bac3b6a444175f1160c4d82f41a0bcecf5feaf1c919272ed7929baef929a8c3f07deecebc44b0435164a
-
Filesize
3.3MB
MD5045b0a3d5be6f10ddf19ae6d92dfdd70
SHA10387715b6681d7097d372cd0005b664f76c933c7
SHA25694b392e94fa47d1b9b7ae6a29527727268cc2e3484e818c23608f8835bc1104d
SHA51258255a755531791b888ffd9b663cc678c63d5caa932260e9546b1b10a8d54208334725c14529116b067bcf5a5e02da85e015a3bed80092b7698a43dab0168c7b
-
Filesize
440B
MD53626532127e3066df98e34c3d56a1869
SHA15fa7102f02615afde4efd4ed091744e842c63f78
SHA2562a0e18ef585db0802269b8c1ddccb95ce4c0bac747e207ee6131dee989788bca
SHA512dcce66d6e24d5a4a352874144871cd73c327e04c1b50764399457d8d70a9515f5bc0a650232763bf34d4830bab70ee4539646e7625cfe5336a870e311043b2bd
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin
Filesize10KB
MD50a93e300e4295547543b43867c115b56
SHA11390a51c25eaa32b4aba776adc0f3eb3eaf0ff63
SHA256ef24ae2cb509eb561dfa648dde0206433136277df868437d48d2af7591cbbcd7
SHA5120daf38dec06c2794cd7b00b016f46f1d28f524d8e90016d095b08a11ec294c110a9a2f8e3e91e6ccbbd778b4048103860d0ba93073a7809739b009ee07ef98ad
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin
Filesize7KB
MD5f541b31469cb628dd953d5a3c922f908
SHA1f26956cf45335378d183b821f548a276c7fdeb7a
SHA256a36bc8d0b3201c67a29d0c377673b826c2cb57c759c6c6de2a9dd1c3937c7dd0
SHA51284c68e78def888300fec9d9b855723ed7d959be0373787e60c04092be99e0404a9d63c3551dd737a14f4b6c2125a7aa45786526c1553f5f5eb1ac8a07fe65b7c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.bin
Filesize23KB
MD5cf535f89f3e18042f11950499ec8873f
SHA139877cf7a5450a130e6e960e6ee56615a9da10df
SHA256012bf4543bb24f5e94c52ad31cd220eaaa514f3eae7447ca65cd980a030c2f8e
SHA512a7431b503a2bfdc1f6afdd5486c3b2cb5be955b02a8da10096f2eff9f46484c04edc7629dcd6ff9301b3ce80d08399d8efd382a47cc96f6a4aad9f22616c1407
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.bin
Filesize6KB
MD54533ca64a35553d078d0b5096a1582c4
SHA11ea2e6c0d261a020e9714bd4980214e9a9232606
SHA256dbfe69257723b2cd2d363d9a265072108fa5ee60b9d56fd24f84ba84c22c37b8
SHA512d77ebca17f6bc42006223686d44bd8f5fcbc0b6059bd34bf92ea0a4eeb5bb6f0ff823993376b5bc9b502990d7ac6eeb686881e417a20fc962ff0e454db3d2808
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.bin
Filesize15KB
MD5c84a944821b758e90adc9d487065caf0
SHA1a770bf068785b641dad733ac5c21cf121befb11c
SHA2564e29cadb2e30a1878855f8fcdc59f755d800b937fe1a8079672f6c417898d711
SHA5123957faca799d2713e1e5f496775b27687710591403e08812b50cef9647b3da3e1eba3ee46095e58cce404ca0bd9d02215e6a2bb2bc2b61b6c2830f3282096a00
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.bin
Filesize15KB
MD5c8bd7088c7c863261f72de24d0a6eff9
SHA1cf07c3744c5ab9f3ea7a9a827c76d9dbc0d13dc2
SHA256b6ec9006355a42dc2731d7baa759e3cdac53ab5dc3522cbbf161e92151b63425
SHA5124de9875f6e9cfef4ccdad84f5ed67b084b37097892a4f45d140c897f76adf8057b9defe2ef795a2f0979f24476311727bce8a0152608fca8b101163f3f1bb0cc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5c55bf3f04cf82cf8e6e9e49dbc5aed69
SHA17bc27ff8817d0f19045128824164315a46813798
SHA2568f48353e8abd8396a76b7ddf58b7f27e165a3013d96a22abf87dde87adfacb7d
SHA512aa47b27e123b64fe2d2dc32dc178cef3350d7846957ff75f40d6793ac2a086f9e1f6e3ba4ee8002e33320818eb762d4a6d29348280eaa1d1a6679eefcbaceed3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5dcb32eed6b4583ad7594123b87669a07
SHA11a777133caaf07a452e26a880f377cee4dac07b9
SHA25693081b8cf1aa2074ffae4b699a5cba0b6a8e2518980f8345c238a1d6a2d7fd6a
SHA512a137e27159b19be764343d784e8f9d8e339b7c5c994229039c9b524402887ef937ddff46ec64612dbde300136e20be804e6b644706ee11a1c612d29e3ac666a5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD56dd5de5c725021b5eac46f3fda6ac455
SHA1e01c91a9c8c6edf48e9c381433c07fc10068ffac
SHA256c6da8b73d2f38bb05d8bd3fcdf9a091a19e83e3b63dc1d478dc5e256c583266b
SHA512513125326746a08c8249eb17992113bdaf6a4acae6f5de3a7feb4facc9226d39b4de397c8d2f83f7810b0a90e962ce58ff0c038494bcdeffa4ade06ccefb2d3c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD56120d7dfa827dc0b4f2bba76a595e706
SHA1658bef32ef96ecb35bdefb0c3cbf1ce35b5d54cb
SHA256db125941bb3f7acc1c065b3fc9594f95401a59cacf3b26e10a11136905491a71
SHA512a05ef3a84ac1a0c1d503738cf0c921db902c0a40f2f29d2f370307d5e760422609da9bf106789011a698baf7a55b05979b1cd4f815d4e94855f72230afd17228
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5ff4ddd0e720a33ab95f91b2ffdb99329
SHA184757b19bcc149029bd19ac4f913eb3c7bd24f18
SHA256b3f622f461218f9573999953438a33beaf65b1ce5b3edccd71013efc4a1a43a1
SHA512bfd21b8c644e30e6a0a4988ee0f29430a908231a4e23cfd8ec41f7f59d18af9b7c3208662ada416576d9338b77c3ace4252e1a16c3a89274258b695f5fe85f87
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\5371f85f-8fd2-4113-bc45-3108efb6582f
Filesize671B
MD5e889b13d571a52b756d78f38a5182c32
SHA1bcb524a64df17e20abe4555948a49d8a0ebd90a5
SHA2560da3c2de08c03a8f8f2b7102781025831c85d183d04726d89ad10d9bc4715dfb
SHA512517a8270296e3578c074ad96069958554133865ea51568972566dd8a279f0313826ceffb530a11bddaca4cc86407e537fc4cd75bb122ee11f887d0eee06719d4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\abd601b9-2b46-4ac5-84b8-30262b694e1f
Filesize29KB
MD5abc14ab7b6b55fee29c41caba0171ac4
SHA1ec0cb5a3aaa5c621b96945730493e28fd715f80a
SHA256ec0b5eb48649089a462da5969663aa2361a404df598a2a0bd2920b98ca9601dd
SHA51207647da80aef46775a6a65add81a3f0070e8d440849c9eb452cd8c54dc7020a514c680aa2caa40feaa18e4aeda3e167b573d6b8a78df281061c0890d135371c6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\cf2e6768-23de-424e-b7ac-84701d4353c5
Filesize982B
MD544b6bd89736e12cf0c3f957bbba2179f
SHA1376ac47896a1c1fdcfa2e768e220478b1dbcf0c8
SHA256bc6d4391205e092ddc0f6fa0048131108e4c437ea919dccf3db8285c53f6cb0c
SHA512baf21b91e61b5cf67269f19ebdebf64efdc351112d7d7d6d7ef93319ebb54a802f4e7416ba9559991962aa32960e9a404b291a1c18639caca3fc18eaaf51fbf5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
15KB
MD57b619b5106e6332eca4cd1ecd46c1e2c
SHA12907bee4eb62dff5c25a350eac9b60d79cd97e7a
SHA2563f78435822f7b062e7f303cd3df102538b708dec87f4e1c4b9135bb0752cdaac
SHA512c2e82863bf6009c258fcbe1f9cea23764f33fd7b6ea840df9fb72af313393e8166ab73c7696c9e724c0cfa34b885078081c51e4d44fac25e709f2df327ad0e75
-
Filesize
10KB
MD515bd3936318ebda14247366b6111d011
SHA1507d7aa2824a418a2a556d36755fc973eebc46fb
SHA256cdae2b3e959a177eaa06e44db50eb76ad945977419e6dd6558b553e1edbbc6e1
SHA512f7e39cf5eba0023857bb42d7cbba173f9435bd96a22f5df7b915bf96fb76ebebae9342a0df0834eae957729172865be8c6c661bc90e3dd750c90fc03e51c041c
-
Filesize
12KB
MD5002606c3d16169ffca7e807ba801ea41
SHA110095d258c6bef59c9d736e21cf11536316506b7
SHA256f9ca9f6aaeb8155968815e774ba16b2c47a8ef4ada2255efdb819c6d0880ae3f
SHA5128f9e37f4d3766b4bf75b575d528a7c75b8e75a27b48de9c6ffffab0ca06f2ba884a7c1deda7fa946a687097581f1d63cffe8ac0b7dd0f7bba9314290073ffe3f
-
Filesize
10KB
MD59232c9ee677f707f6a40dcdbb4965d47
SHA11fc81734c983f4f61b2bea1b7b1e7636dc9635b8
SHA256b320d9feadbd7541b0deb74c1ad3e9c52eb1becb567259ff3b4ec7b32fbbc916
SHA512e9e915e09765ffaeef44471dbb1ecb7c3c2d3e10777a1bbbf69ee85684fbf2efb9624058f58aa80ef929251145918a8bffbf563ead82627ae3d6b65df09d5780
-
Filesize
10KB
MD5ac1ba9c0509a53b7eb4026b1402ee330
SHA16eaeb3d080ddd514fceedc41c6505b3f9c7a8a0e
SHA256d8c6fdaaa72376764334504ebb93551d7c108b6d7e5d0db51fc9947c98df055d
SHA5124adde5fa8d2ffeb1edd5746d9dfd8d7f18fdce997beb9520c36fa407f98492fc2f39b6c5a526beea82f298025ede72363c6719de45c047fb8f5192ee765e28c9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\security_state\data.safe.bin
Filesize2.9MB
MD509b136ce16a665b7c4fa18a5bd2d9286
SHA144b6f04c46520d36ea424659e42b22251c95c759
SHA256d6f5712db0f7ad09ed832db20a3bf1da072581fe65c309e5bcf733424687ff51
SHA5122cf08bf7ac36747bab9ac4a665b71a5d01b9653f92ea93275e4f8216b4909b384e5d5987052ea84e0b2a8e9c378db2140509e8c7c4234c66c43e0cf9ec2e432b