Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10-12-2024 23:30
Static task
static1
Behavioral task
behavioral1
Sample
69f12161bd960117baf9728942be8ae7d34aeac22ffeff912dc8ab227a44229b.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
69f12161bd960117baf9728942be8ae7d34aeac22ffeff912dc8ab227a44229b.exe
Resource
win10v2004-20241007-en
General
-
Target
69f12161bd960117baf9728942be8ae7d34aeac22ffeff912dc8ab227a44229b.exe
-
Size
3.1MB
-
MD5
4f2646500156298bd82c572e6c8e4062
-
SHA1
44c4da3bd22fc6ac172a3847c3fbe9b88659c1ff
-
SHA256
69f12161bd960117baf9728942be8ae7d34aeac22ffeff912dc8ab227a44229b
-
SHA512
50235199c1e446fcc1a1bd93bbadf4c048ac363a472297e522cd32290f0c81318f8434120b5ee77c82bbd85f01af7eb962e71e4de54ccd59f5ff214208b9de39
-
SSDEEP
49152:icm/mmZYj4ofA2jiwMLgUg6UfV0yRVgH1oiZnus6:GHi4ofA2jieDVdRVK1Dnus
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
205.209.109.10:4449
205.209.109.10:7723
clgbfqzkkypxjps
-
delay
1
-
install
false
-
install_folder
%AppData%
Extracted
xworm
5.0
127.0.0.1:8080
101.99.92.189:8080
d5gQ6Zf7Tzih1Pi1
-
install_file
USB.exe
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
https://atten-supporse.biz/api
Extracted
lumma
https://atten-supporse.biz/api
https://covery-mover.biz/api
Signatures
-
Amadey family
-
Asyncrat family
-
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral1/memory/2660-500-0x0000000000EE0000-0x0000000000EEE000-memory.dmp disable_win_def -
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/memory/2660-250-0x0000000000F30000-0x00000000013A6000-memory.dmp family_xworm behavioral1/memory/2660-249-0x0000000000F30000-0x00000000013A6000-memory.dmp family_xworm -
Gcleaner family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" d81b0fea17.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" d81b0fea17.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" d81b0fea17.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection d81b0fea17.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" d81b0fea17.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" d81b0fea17.exe -
Stealc family
-
resource yara_rule behavioral1/memory/2312-70-0x0000000000E30000-0x0000000001292000-memory.dmp VenomRAT behavioral1/memory/2312-71-0x0000000000E30000-0x0000000001292000-memory.dmp VenomRAT -
Venomrat family
-
Xworm family
-
Async RAT payload 2 IoCs
resource yara_rule behavioral1/memory/2312-70-0x0000000000E30000-0x0000000001292000-memory.dmp family_asyncrat behavioral1/memory/2312-71-0x0000000000E30000-0x0000000001292000-memory.dmp family_asyncrat -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 69f12161bd960117baf9728942be8ae7d34aeac22ffeff912dc8ab227a44229b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9feskIx.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d81b0fea17.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ H3tyh96.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3EUEYgl.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 00491662e0.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c2336030c8.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 896cf4efc0.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 69f12161bd960117baf9728942be8ae7d34aeac22ffeff912dc8ab227a44229b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion H3tyh96.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 00491662e0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c2336030c8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 896cf4efc0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d81b0fea17.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d81b0fea17.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9feskIx.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 00491662e0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 896cf4efc0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 69f12161bd960117baf9728942be8ae7d34aeac22ffeff912dc8ab227a44229b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion H3tyh96.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3EUEYgl.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3EUEYgl.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9feskIx.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c2336030c8.exe -
Executes dropped EXE 12 IoCs
pid Process 2172 skotes.exe 2008 Z9Pp9pM.exe 2312 H3tyh96.exe 2152 yiklfON.exe 980 3EUEYgl.exe 2660 9feskIx.exe 1552 00491662e0.exe 2820 c45b8d00bb.exe 2696 c2336030c8.exe 1008 896cf4efc0.exe 2544 39622b2e42.exe 2948 d81b0fea17.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Wine 896cf4efc0.exe Key opened \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Wine d81b0fea17.exe Key opened \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Wine 69f12161bd960117baf9728942be8ae7d34aeac22ffeff912dc8ab227a44229b.exe Key opened \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Wine 00491662e0.exe Key opened \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Wine c2336030c8.exe Key opened \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Wine H3tyh96.exe Key opened \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Wine 3EUEYgl.exe Key opened \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Wine 9feskIx.exe -
Loads dropped DLL 23 IoCs
pid Process 2368 69f12161bd960117baf9728942be8ae7d34aeac22ffeff912dc8ab227a44229b.exe 2368 69f12161bd960117baf9728942be8ae7d34aeac22ffeff912dc8ab227a44229b.exe 2172 skotes.exe 2172 skotes.exe 2172 skotes.exe 2580 WerFault.exe 2580 WerFault.exe 2580 WerFault.exe 2580 WerFault.exe 2580 WerFault.exe 2172 skotes.exe 2172 skotes.exe 2172 skotes.exe 2172 skotes.exe 2172 skotes.exe 2172 skotes.exe 2172 skotes.exe 2172 skotes.exe 2172 skotes.exe 2172 skotes.exe 2172 skotes.exe 2172 skotes.exe 2172 skotes.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features d81b0fea17.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" d81b0fea17.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\c2336030c8.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013847001\\c2336030c8.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\896cf4efc0.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013848001\\896cf4efc0.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\39622b2e42.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013849001\\39622b2e42.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\d81b0fea17.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013850001\\d81b0fea17.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0005000000019329-447.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 2368 69f12161bd960117baf9728942be8ae7d34aeac22ffeff912dc8ab227a44229b.exe 2172 skotes.exe 2312 H3tyh96.exe 980 3EUEYgl.exe 2660 9feskIx.exe 1552 00491662e0.exe 2696 c2336030c8.exe 1008 896cf4efc0.exe 2948 d81b0fea17.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 69f12161bd960117baf9728942be8ae7d34aeac22ffeff912dc8ab227a44229b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2580 2008 WerFault.exe 33 -
System Location Discovery: System Language Discovery 1 TTPs 22 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 00491662e0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 896cf4efc0.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 39622b2e42.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Z9Pp9pM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3EUEYgl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yiklfON.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language H3tyh96.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9feskIx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c45b8d00bb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d81b0fea17.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 69f12161bd960117baf9728942be8ae7d34aeac22ffeff912dc8ab227a44229b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c2336030c8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 39622b2e42.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 39622b2e42.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3EUEYgl.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3EUEYgl.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2532 timeout.exe -
Kills process with taskkill 5 IoCs
pid Process 2532 taskkill.exe 1352 taskkill.exe 268 taskkill.exe 2456 taskkill.exe 2480 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_Classes\Local Settings firefox.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 3EUEYgl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 c2336030c8.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 c2336030c8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 3EUEYgl.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 0f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a8090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703085300000001000000230000003021301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc30b00000001000000120000004400690067006900430065007200740000001d00000001000000100000008f76b981d528ad4770088245e2031b630300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc252000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a 3EUEYgl.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2660 9feskIx.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 2368 69f12161bd960117baf9728942be8ae7d34aeac22ffeff912dc8ab227a44229b.exe 2172 skotes.exe 2312 H3tyh96.exe 2312 H3tyh96.exe 2312 H3tyh96.exe 980 3EUEYgl.exe 2660 9feskIx.exe 980 3EUEYgl.exe 2312 H3tyh96.exe 1552 00491662e0.exe 2660 9feskIx.exe 2696 c2336030c8.exe 2312 H3tyh96.exe 1008 896cf4efc0.exe 2948 d81b0fea17.exe 2948 d81b0fea17.exe 2948 d81b0fea17.exe 2544 39622b2e42.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 2312 H3tyh96.exe Token: SeDebugPrivilege 2660 9feskIx.exe Token: SeDebugPrivilege 2532 taskkill.exe Token: SeDebugPrivilege 2948 d81b0fea17.exe Token: SeDebugPrivilege 1352 taskkill.exe Token: SeDebugPrivilege 268 taskkill.exe Token: SeDebugPrivilege 2456 taskkill.exe Token: SeDebugPrivilege 2480 taskkill.exe Token: SeDebugPrivilege 1636 firefox.exe Token: SeDebugPrivilege 1636 firefox.exe -
Suspicious use of FindShellTrayWindow 21 IoCs
pid Process 2368 69f12161bd960117baf9728942be8ae7d34aeac22ffeff912dc8ab227a44229b.exe 2544 39622b2e42.exe 2544 39622b2e42.exe 2544 39622b2e42.exe 2544 39622b2e42.exe 2544 39622b2e42.exe 2544 39622b2e42.exe 2544 39622b2e42.exe 2544 39622b2e42.exe 2544 39622b2e42.exe 2544 39622b2e42.exe 2544 39622b2e42.exe 2544 39622b2e42.exe 2544 39622b2e42.exe 2544 39622b2e42.exe 1636 firefox.exe 1636 firefox.exe 1636 firefox.exe 1636 firefox.exe 2544 39622b2e42.exe 2544 39622b2e42.exe -
Suspicious use of SendNotifyMessage 19 IoCs
pid Process 2544 39622b2e42.exe 2544 39622b2e42.exe 2544 39622b2e42.exe 2544 39622b2e42.exe 2544 39622b2e42.exe 2544 39622b2e42.exe 2544 39622b2e42.exe 2544 39622b2e42.exe 2544 39622b2e42.exe 2544 39622b2e42.exe 2544 39622b2e42.exe 2544 39622b2e42.exe 2544 39622b2e42.exe 2544 39622b2e42.exe 1636 firefox.exe 1636 firefox.exe 1636 firefox.exe 2544 39622b2e42.exe 2544 39622b2e42.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2312 H3tyh96.exe 2660 9feskIx.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2172 2368 69f12161bd960117baf9728942be8ae7d34aeac22ffeff912dc8ab227a44229b.exe 30 PID 2368 wrote to memory of 2172 2368 69f12161bd960117baf9728942be8ae7d34aeac22ffeff912dc8ab227a44229b.exe 30 PID 2368 wrote to memory of 2172 2368 69f12161bd960117baf9728942be8ae7d34aeac22ffeff912dc8ab227a44229b.exe 30 PID 2368 wrote to memory of 2172 2368 69f12161bd960117baf9728942be8ae7d34aeac22ffeff912dc8ab227a44229b.exe 30 PID 2172 wrote to memory of 2008 2172 skotes.exe 33 PID 2172 wrote to memory of 2008 2172 skotes.exe 33 PID 2172 wrote to memory of 2008 2172 skotes.exe 33 PID 2172 wrote to memory of 2008 2172 skotes.exe 33 PID 2172 wrote to memory of 2312 2172 skotes.exe 34 PID 2172 wrote to memory of 2312 2172 skotes.exe 34 PID 2172 wrote to memory of 2312 2172 skotes.exe 34 PID 2172 wrote to memory of 2312 2172 skotes.exe 34 PID 2008 wrote to memory of 2580 2008 Z9Pp9pM.exe 35 PID 2008 wrote to memory of 2580 2008 Z9Pp9pM.exe 35 PID 2008 wrote to memory of 2580 2008 Z9Pp9pM.exe 35 PID 2008 wrote to memory of 2580 2008 Z9Pp9pM.exe 35 PID 2172 wrote to memory of 2152 2172 skotes.exe 36 PID 2172 wrote to memory of 2152 2172 skotes.exe 36 PID 2172 wrote to memory of 2152 2172 skotes.exe 36 PID 2172 wrote to memory of 2152 2172 skotes.exe 36 PID 2172 wrote to memory of 980 2172 skotes.exe 38 PID 2172 wrote to memory of 980 2172 skotes.exe 38 PID 2172 wrote to memory of 980 2172 skotes.exe 38 PID 2172 wrote to memory of 980 2172 skotes.exe 38 PID 2172 wrote to memory of 2660 2172 skotes.exe 40 PID 2172 wrote to memory of 2660 2172 skotes.exe 40 PID 2172 wrote to memory of 2660 2172 skotes.exe 40 PID 2172 wrote to memory of 2660 2172 skotes.exe 40 PID 980 wrote to memory of 2548 980 3EUEYgl.exe 41 PID 980 wrote to memory of 2548 980 3EUEYgl.exe 41 PID 980 wrote to memory of 2548 980 3EUEYgl.exe 41 PID 980 wrote to memory of 2548 980 3EUEYgl.exe 41 PID 2548 wrote to memory of 2532 2548 cmd.exe 43 PID 2548 wrote to memory of 2532 2548 cmd.exe 43 PID 2548 wrote to memory of 2532 2548 cmd.exe 43 PID 2548 wrote to memory of 2532 2548 cmd.exe 43 PID 2172 wrote to memory of 1552 2172 skotes.exe 44 PID 2172 wrote to memory of 1552 2172 skotes.exe 44 PID 2172 wrote to memory of 1552 2172 skotes.exe 44 PID 2172 wrote to memory of 1552 2172 skotes.exe 44 PID 2172 wrote to memory of 2820 2172 skotes.exe 45 PID 2172 wrote to memory of 2820 2172 skotes.exe 45 PID 2172 wrote to memory of 2820 2172 skotes.exe 45 PID 2172 wrote to memory of 2820 2172 skotes.exe 45 PID 2172 wrote to memory of 2696 2172 skotes.exe 46 PID 2172 wrote to memory of 2696 2172 skotes.exe 46 PID 2172 wrote to memory of 2696 2172 skotes.exe 46 PID 2172 wrote to memory of 2696 2172 skotes.exe 46 PID 2172 wrote to memory of 1008 2172 skotes.exe 48 PID 2172 wrote to memory of 1008 2172 skotes.exe 48 PID 2172 wrote to memory of 1008 2172 skotes.exe 48 PID 2172 wrote to memory of 1008 2172 skotes.exe 48 PID 2172 wrote to memory of 2544 2172 skotes.exe 50 PID 2172 wrote to memory of 2544 2172 skotes.exe 50 PID 2172 wrote to memory of 2544 2172 skotes.exe 50 PID 2172 wrote to memory of 2544 2172 skotes.exe 50 PID 2544 wrote to memory of 2532 2544 39622b2e42.exe 51 PID 2544 wrote to memory of 2532 2544 39622b2e42.exe 51 PID 2544 wrote to memory of 2532 2544 39622b2e42.exe 51 PID 2544 wrote to memory of 2532 2544 39622b2e42.exe 51 PID 2172 wrote to memory of 2948 2172 skotes.exe 53 PID 2172 wrote to memory of 2948 2172 skotes.exe 53 PID 2172 wrote to memory of 2948 2172 skotes.exe 53 PID 2172 wrote to memory of 2948 2172 skotes.exe 53 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\69f12161bd960117baf9728942be8ae7d34aeac22ffeff912dc8ab227a44229b.exe"C:\Users\Admin\AppData\Local\Temp\69f12161bd960117baf9728942be8ae7d34aeac22ffeff912dc8ab227a44229b.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\1013644001\Z9Pp9pM.exe"C:\Users\Admin\AppData\Local\Temp\1013644001\Z9Pp9pM.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2008 -s 444⤵
- Loads dropped DLL
- Program crash
PID:2580
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013675001\H3tyh96.exe"C:\Users\Admin\AppData\Local\Temp\1013675001\H3tyh96.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2312
-
-
C:\Users\Admin\AppData\Local\Temp\1013765001\yiklfON.exe"C:\Users\Admin\AppData\Local\Temp\1013765001\yiklfON.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2152
-
-
C:\Users\Admin\AppData\Local\Temp\1013771001\3EUEYgl.exe"C:\Users\Admin\AppData\Local\Temp\1013771001\3EUEYgl.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\1013771001\3EUEYgl.exe" & rd /s /q "C:\ProgramData\GVKXLXBSR1NY" & exit4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\timeout.exetimeout /t 105⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2532
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013829001\9feskIx.exe"C:\Users\Admin\AppData\Local\Temp\1013829001\9feskIx.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2660
-
-
C:\Users\Admin\AppData\Local\Temp\1013845001\00491662e0.exe"C:\Users\Admin\AppData\Local\Temp\1013845001\00491662e0.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1552
-
-
C:\Users\Admin\AppData\Local\Temp\1013846001\c45b8d00bb.exe"C:\Users\Admin\AppData\Local\Temp\1013846001\c45b8d00bb.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2820
-
-
C:\Users\Admin\AppData\Local\Temp\1013847001\c2336030c8.exe"C:\Users\Admin\AppData\Local\Temp\1013847001\c2336030c8.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:2696
-
-
C:\Users\Admin\AppData\Local\Temp\1013848001\896cf4efc0.exe"C:\Users\Admin\AppData\Local\Temp\1013848001\896cf4efc0.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1008
-
-
C:\Users\Admin\AppData\Local\Temp\1013849001\39622b2e42.exe"C:\Users\Admin\AppData\Local\Temp\1013849001\39622b2e42.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2532
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1352
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:268
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2456
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2480
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:980
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1636 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1636.0.1179381710\2027885266" -parentBuildID 20221007134813 -prefsHandle 1244 -prefMapHandle 1100 -prefsLen 20769 -prefMapSize 233414 -appDir "C:\Program Files\Mozilla Firefox\browser" - {034bfe92-bcb7-4783-aa16-b22594f97835} 1636 "\\.\pipe\gecko-crash-server-pipe.1636" 1356 112ddb58 gpu6⤵PID:1704
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1636.1.657705559\1996315540" -parentBuildID 20221007134813 -prefsHandle 1524 -prefMapHandle 1520 -prefsLen 21630 -prefMapSize 233414 -appDir "C:\Program Files\Mozilla Firefox\browser" - {009f269a-ff36-40dd-b9f1-2baedf8a0773} 1636 "\\.\pipe\gecko-crash-server-pipe.1636" 1536 100edf58 socket6⤵PID:2992
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1636.2.1310553049\110594402" -childID 1 -isForBrowser -prefsHandle 2012 -prefMapHandle 2000 -prefsLen 21668 -prefMapSize 233414 -jsInitHandle 632 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {6b213b45-7bde-40fc-b257-6fc336ca0e5c} 1636 "\\.\pipe\gecko-crash-server-pipe.1636" 2024 19863458 tab6⤵PID:1532
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1636.3.1624517592\2073395221" -childID 2 -isForBrowser -prefsHandle 2884 -prefMapHandle 2880 -prefsLen 26138 -prefMapSize 233414 -jsInitHandle 632 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {bc9695ab-dc8d-4d84-9b27-b6e94c9c19c8} 1636 "\\.\pipe\gecko-crash-server-pipe.1636" 2896 1cb14f58 tab6⤵PID:1496
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1636.4.524007441\1233207117" -childID 3 -isForBrowser -prefsHandle 3768 -prefMapHandle 3724 -prefsLen 26273 -prefMapSize 233414 -jsInitHandle 632 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {082b761f-da24-4caf-8ebc-7bfaab1d4e48} 1636 "\\.\pipe\gecko-crash-server-pipe.1636" 3788 1e8e9e58 tab6⤵PID:3484
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1636.5.671211754\423520096" -childID 4 -isForBrowser -prefsHandle 3904 -prefMapHandle 3908 -prefsLen 26273 -prefMapSize 233414 -jsInitHandle 632 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c50d07b1-6389-45d7-9ec8-3d96e98b97f8} 1636 "\\.\pipe\gecko-crash-server-pipe.1636" 3892 1e8ea458 tab6⤵PID:3492
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1636.6.1466197963\35485336" -childID 5 -isForBrowser -prefsHandle 4064 -prefMapHandle 4068 -prefsLen 26273 -prefMapSize 233414 -jsInitHandle 632 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {71b78837-8bf8-4333-a46c-dcd4023930ae} 1636 "\\.\pipe\gecko-crash-server-pipe.1636" 4056 1e8ecb58 tab6⤵PID:3500
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013850001\d81b0fea17.exe"C:\Users\Admin\AppData\Local\Temp\1013850001\d81b0fea17.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2948
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UQFHO95Z\download[1].htm
Filesize1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\activity-stream.discovery_stream.json.tmp
Filesize23KB
MD50d544fba3d499e68091c28f855f2f415
SHA1085788d0008e0decbf6464e683e2f9ff45a47663
SHA2569ba16bc009b04d9273523989d65ab034b4768732a8991c3f9a3788bac43b2392
SHA51268c48cc1d2ca58f64b20c7cb985fe6135ef78f0dd76d24214279c00f5d6dce53274b74b1fc17ebd9825bc135d0addb287ef3c82d561d4560ef5f4c21121f8ad8
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
2.5MB
MD52a78ce9f3872f5e591d643459cabe476
SHA19ac947dfc71a868bc9c2eb2bd78dfb433067682e
SHA25621a2ac44acd7a640735870eebfd04b8dc57bc66877cb5be3b929299e86a43dae
SHA51203e2cd8161a1394ee535a2ea7d197791ab715d69a02ffab98121ec5ac8150d2b17a9a32a59307042c4bbeffad7425b55efa047651de6ed39277dba80711454f9
-
Filesize
1.7MB
MD540f8c17c136d4dc83b130c9467cf6dcc
SHA1e9b6049aa7da0af9718f2f4ae91653d9bac403bb
SHA256cafb60920939bd2079d96f2e6e73f87632bc15bd72998f864e8968f7aab9623b
SHA5126760a0752957535ec45ce3307e31569ac263eb73157d6a424d6e30647651a4e93db7c0378028d9e0ce07e65a357d2bb81047064ccda2f6a13fa7402ee7794c2d
-
Filesize
7.4MB
MD5d71d031f039f8fb153488c26fb7d410f
SHA15b15fd6f94bdbb35ecd02bf9aa51912d698ebf45
SHA25636541a0e062085fed175a4a5eae45aa9e3563fff4a816a1bffa1b2c6f8280e5b
SHA512d97c801c73f14ae20b11529d0b0f58afc3981d92bd00f88dda59881f24d89d3b325a8c61b88adc77753cebb1c320afc64af7522c61c34b2a4916b13bddc278cf
-
Filesize
1.8MB
MD53b8b3018e3283830627249d26305419d
SHA140fa5ef5594f9e32810c023aba5b6b8cea82f680
SHA256258e444e78225f74d47ba4698d49a33e6d1f6ed1f3f710186be426078e2bf1cb
SHA5122e9a42e53406446b503f150abfa16b994ee34211830d14ccbfbf52d86019dc5cca95c40222e5c6aed910c90988f999560ff972c575f9c207d7834abba6f04aa0
-
Filesize
1.8MB
MD558f824a8f6a71da8e9a1acc97fc26d52
SHA1b0e199e6f85626edebbecd13609a011cf953df69
SHA2565e5b808ed64c4f40e07a4894e1da294e364383f0a51adb7ec8c7568afba3eb17
SHA5127d6c752369ea83bad34873d8603c413e9372ff66adcaad11e7f23d3ce85827e057444b30eadf927329191825aef4dc37a1e68c30b71fae4ce6f53708102fb461
-
Filesize
1.9MB
MD52920e7cc2d1445dac674e5a361acdf93
SHA1ae68904f35149434cb772fa55be52a94bb91c39a
SHA2563dadaab5000b3129bc9844fff329754a7e3c20fa364dfd4dcd9ccbf531fce2a9
SHA512e5ba86de23497ebf4d0204bf5db9e04c9f4999e0bc3741c730c2f237ad12dc49bf9a1a8f8186c42be3338e0fbbcb20d363c87c2f8954ae712aed9bfbe90582ef
-
Filesize
1.8MB
MD50cefe9dfd3024abb0a90de7d3903deea
SHA111b1d1b803f45df9685826d6a2616219fd49c852
SHA256fd864cb4c1cb656bf68153177fc4997132d00ae5bd2df2e181756295186804da
SHA512fc8818b82f0ef2dce4755a872ab556ba3608ccb5d383747cf65a015e5a6bbe1f7804bc4c5d8d3fa68e05bb02481458f593d437a28929ef01ae933b50b1c8ee49
-
Filesize
1.7MB
MD505ccde04770ed7266dc36ebb4523974d
SHA16de6f18a48fd56d6c65ea510b91fe6d868e0b7e3
SHA25669c4775e400b5ee547f81fc67a0b9b5f6319b2adb4c482a9a79e716a56dc8e3b
SHA5121c9dd7e3d4babd0d1ce0e812e57f982bb9bfe0c7e1e5d9fffe5757634921f65981c29abb3a856b7ad4bb0954b29dcd163096a5e2fe6aa227f51eb002ee945721
-
Filesize
949KB
MD501f739d5437a9f2a00f374bc77074319
SHA17c6be727db3896a5e8080534d3a5a07eabc10019
SHA2565c899e7bd1466b7d8a8fca178bb73e99aedc6d50951c4d226d3dde24dee3a97e
SHA512bf7c8af17d7742062b59233cb628f792e97514c80e02c0533c9c8d5c925fea347892ac606507c18f7e66a466f2bf8a1e06763352bdb4fc7b92c40b993aa79947
-
Filesize
2.7MB
MD5fa2c83f3c3dc8a2a7054b1ec4f47c41c
SHA1502ddba5890ec40fcd927f7b2c6c5089943b9051
SHA2566d2e322f70170af5b520ccfc7ffb1abfaa611e0252e5d2ccde4c416ab32770cc
SHA51295028f7091bd2cd067c2636d6387052f33c1e6450f31733b9aeee54967725d61562edc6712abc59cdebff5db2124deabe73642593b412a5e5786345ef96796cc
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD592fe750c42efa8998c76ddfd88c557a1
SHA1a780ce6c9d29c60b2e36b1af374d8cd2fead161b
SHA256a7c9d6527af020983852c41347e8f7f58c00616f0e38927f2bbd16e66f305371
SHA512bf7f5a624bee13bc53d69a29ef1cdb70c519645ab0956ae2ada934d30a8457bb146aa191a94ae4ee95c21dce11133372090edc60f80f8128d025cc276a4b8e51
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\datareporting\glean\pending_pings\9d58c30e-ae3d-4d4b-a40c-73673cb6bbc4
Filesize13KB
MD583a52cd7afb34338a6ecce2d830a89ab
SHA11825ae5b949edcd0f7a16ddf3acbd05b615c5c65
SHA25630dc75772a41ad80982ed295746486561e8dec801f6e7b405f3a73969d294580
SHA5122586592986b85a449af347b7a8d4e1eb78bad292af7beb83bbc4e4858178d70341c2d1aa574c8920818d4a59e8bc957a33b7d1e99782e1bd9f6d80a8eaaf51f1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\datareporting\glean\pending_pings\a22d1261-3222-406c-a0e4-14add5a48b01
Filesize745B
MD5f3c8262f17416c99ec1430f130eca18a
SHA1e4f71b5596406946990e82db4d0de6b7d5793bcc
SHA256b07841fce44e8a76c8354af2fe3d72539dd2bdb2497465706cf1f92f563c3d08
SHA512d6605002dc6f3a915dd8c27d610f6d3ae0b3c441c460684d8576e367f6a2af78e1fa64c02c50d0d15825670ae21367099bf792f1eb10d16269aef37e693e29f3
-
Filesize
6KB
MD5437121aa42db8478e1e7a955c60a2cc9
SHA1ae6d7122d5b1bfda38c565b3c294056fda5fa810
SHA2567070f0ee1eadf617f7e0ef1b771b1ef45c76c2e077e570b4b1732bf2ad69b8fc
SHA5123d750c947d63e6c558bbaafefdda0da1a5c93306f7ce9c07d80b3d7fed60f249a6d27109ac34ac441846e01c61532fc607a5da29d640cf206d66ef967eff532f
-
Filesize
6KB
MD5cfabc83330dd69b981e4230a2a88f0be
SHA1f34eae76f69a90cfd6e0e1002a1241660cb36697
SHA256894f817d405b26852cba3a131c8a58277099b86786355e5bff76305a4808360f
SHA5124ef3d70589a12a9e9d4c0e4bbe7fbd2a116dff47d51412229f31c761f1122294c721cf6a6f61ba9b9c6294e3bf6778289800b9b48e40c97e4ba866f3f831ae1f
-
Filesize
6KB
MD5bbfa0dfa7756553f0ba6614f12cdede5
SHA15f6496c327ab802f167755908cca89f38c314890
SHA256a2264e8d6081002d8c1dc8ac777f74345173dc9349be07e2f75588ebc7a6b9dc
SHA512ed3355231b6ca416b1e631bf51f661436b9c1ec4e661b15fa92553b36f82c59d213b1b4858e8b6fb1185b4a055358788d2a29af8e9fceafe0744bfafa1a3b21b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize184KB
MD53dc733f51b6c47c0e57ae7035b9abacf
SHA1d4c28a6f9d4bae9e297440a46726a2cb3e2504ba
SHA256aafa700fb884f14becaf86a0eb9df79dfa15885b2ebe11cabe5f48a3a5d9e0e1
SHA512e02670f6fa626a21ad150e0e0e589ba9f1f7a1fb921dc28f4117dc0a30a337b9c9b165dd0a30da864fe4dbdf130372e846648792a0bcf5aad4e8d28118101067
-
Filesize
3.1MB
MD54f2646500156298bd82c572e6c8e4062
SHA144c4da3bd22fc6ac172a3847c3fbe9b88659c1ff
SHA25669f12161bd960117baf9728942be8ae7d34aeac22ffeff912dc8ab227a44229b
SHA51250235199c1e446fcc1a1bd93bbadf4c048ac363a472297e522cd32290f0c81318f8434120b5ee77c82bbd85f01af7eb962e71e4de54ccd59f5ff214208b9de39