Analysis
-
max time kernel
116s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-12-2024 20:18
Static task
static1
General
-
Target
4b06b24b08b2b0a529474760b14024946d20d1c33b2ce78ea954a0b869e6d9cbN.exe
-
Size
3.0MB
-
MD5
071fd9342e197ab323e93e0395fadbd0
-
SHA1
23bac802089af599de74f3f43c82319bad647a53
-
SHA256
4b06b24b08b2b0a529474760b14024946d20d1c33b2ce78ea954a0b869e6d9cb
-
SHA512
abcaabf8532249f2244e2c31727fea6060b8aadf8897a508102c10f0a432f0e221a7117336d852e34473eef66f343013de6498f8e5a7d84f2da0e9d8fe7a436a
-
SSDEEP
49152:O7SbZvl/c4t4L2agJhXhI759UomVfm8RZsF:O7SbZvl/c4tRazd9TmVuWZsF
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
205.209.109.10:4449
205.209.109.10:7723
clgbfqzkkypxjps
-
delay
1
-
install
false
-
install_folder
%AppData%
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
https://atten-supporse.biz/api
Extracted
lumma
https://atten-supporse.biz/api
https://covery-mover.biz/api
Signatures
-
Amadey family
-
Asyncrat family
-
Gcleaner family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 7996b19a62.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 7996b19a62.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 7996b19a62.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 7996b19a62.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 7996b19a62.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 7996b19a62.exe -
Stealc family
-
resource yara_rule behavioral1/memory/1728-68-0x0000000000BA0000-0x0000000001002000-memory.dmp VenomRAT behavioral1/memory/1728-69-0x0000000000BA0000-0x0000000001002000-memory.dmp VenomRAT -
Venomrat family
-
Async RAT payload 2 IoCs
resource yara_rule behavioral1/memory/1728-68-0x0000000000BA0000-0x0000000001002000-memory.dmp family_asyncrat behavioral1/memory/1728-69-0x0000000000BA0000-0x0000000001002000-memory.dmp family_asyncrat -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ H3tyh96.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3EUEYgl.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 746841cf1f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b4372741ec.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0190467228.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7996b19a62.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4b06b24b08b2b0a529474760b14024946d20d1c33b2ce78ea954a0b869e6d9cbN.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion H3tyh96.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7996b19a62.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7996b19a62.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 746841cf1f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4b06b24b08b2b0a529474760b14024946d20d1c33b2ce78ea954a0b869e6d9cbN.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3EUEYgl.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b4372741ec.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0190467228.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3EUEYgl.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 746841cf1f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b4372741ec.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0190467228.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4b06b24b08b2b0a529474760b14024946d20d1c33b2ce78ea954a0b869e6d9cbN.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion H3tyh96.exe -
Executes dropped EXE 10 IoCs
pid Process 2624 skotes.exe 552 Z9Pp9pM.exe 1728 H3tyh96.exe 2812 yiklfON.exe 964 3EUEYgl.exe 2420 746841cf1f.exe 1604 b4372741ec.exe 1636 0190467228.exe 860 251d1a4c66.exe 4020 7996b19a62.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Wine H3tyh96.exe Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Wine 3EUEYgl.exe Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Wine 746841cf1f.exe Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Wine b4372741ec.exe Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Wine 0190467228.exe Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Wine 7996b19a62.exe Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Wine 4b06b24b08b2b0a529474760b14024946d20d1c33b2ce78ea954a0b869e6d9cbN.exe -
Loads dropped DLL 21 IoCs
pid Process 1044 4b06b24b08b2b0a529474760b14024946d20d1c33b2ce78ea954a0b869e6d9cbN.exe 1044 4b06b24b08b2b0a529474760b14024946d20d1c33b2ce78ea954a0b869e6d9cbN.exe 2624 skotes.exe 2624 skotes.exe 2624 skotes.exe 444 WerFault.exe 444 WerFault.exe 444 WerFault.exe 444 WerFault.exe 444 WerFault.exe 2624 skotes.exe 2624 skotes.exe 2624 skotes.exe 2624 skotes.exe 2624 skotes.exe 2624 skotes.exe 2624 skotes.exe 2624 skotes.exe 2624 skotes.exe 2624 skotes.exe 2624 skotes.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 7996b19a62.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 7996b19a62.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\b4372741ec.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013801001\\b4372741ec.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\0190467228.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013802001\\0190467228.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\251d1a4c66.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013803001\\251d1a4c66.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\7996b19a62.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013804001\\7996b19a62.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000600000001903d-639.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 1044 4b06b24b08b2b0a529474760b14024946d20d1c33b2ce78ea954a0b869e6d9cbN.exe 2624 skotes.exe 1728 H3tyh96.exe 964 3EUEYgl.exe 2420 746841cf1f.exe 1604 b4372741ec.exe 1636 0190467228.exe 4020 7996b19a62.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 4b06b24b08b2b0a529474760b14024946d20d1c33b2ce78ea954a0b869e6d9cbN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 444 552 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 20 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 251d1a4c66.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 746841cf1f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0190467228.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language H3tyh96.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Z9Pp9pM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3EUEYgl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yiklfON.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 251d1a4c66.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4b06b24b08b2b0a529474760b14024946d20d1c33b2ce78ea954a0b869e6d9cbN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b4372741ec.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 251d1a4c66.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7996b19a62.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3EUEYgl.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3EUEYgl.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2372 timeout.exe -
Kills process with taskkill 5 IoCs
pid Process 888 taskkill.exe 1564 taskkill.exe 2928 taskkill.exe 2616 taskkill.exe 3048 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_Classes\Local Settings firefox.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 b4372741ec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 3EUEYgl.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 3EUEYgl.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 3EUEYgl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 b4372741ec.exe -
Suspicious behavior: EnumeratesProcesses 36 IoCs
pid Process 1044 4b06b24b08b2b0a529474760b14024946d20d1c33b2ce78ea954a0b869e6d9cbN.exe 2624 skotes.exe 1728 H3tyh96.exe 1728 H3tyh96.exe 1728 H3tyh96.exe 1728 H3tyh96.exe 1728 H3tyh96.exe 1728 H3tyh96.exe 1728 H3tyh96.exe 1728 H3tyh96.exe 1728 H3tyh96.exe 1728 H3tyh96.exe 1728 H3tyh96.exe 1728 H3tyh96.exe 964 3EUEYgl.exe 1728 H3tyh96.exe 964 3EUEYgl.exe 1728 H3tyh96.exe 2420 746841cf1f.exe 1728 H3tyh96.exe 1604 b4372741ec.exe 1636 0190467228.exe 1728 H3tyh96.exe 860 251d1a4c66.exe 1728 H3tyh96.exe 4020 7996b19a62.exe 4020 7996b19a62.exe 4020 7996b19a62.exe 860 251d1a4c66.exe 860 251d1a4c66.exe 860 251d1a4c66.exe 4020 7996b19a62.exe 4020 7996b19a62.exe 1728 H3tyh96.exe 1728 H3tyh96.exe 1728 H3tyh96.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 1728 H3tyh96.exe Token: SeDebugPrivilege 3048 taskkill.exe Token: SeDebugPrivilege 888 taskkill.exe Token: SeDebugPrivilege 1564 taskkill.exe Token: SeDebugPrivilege 2928 taskkill.exe Token: SeDebugPrivilege 2616 taskkill.exe Token: SeDebugPrivilege 896 firefox.exe Token: SeDebugPrivilege 896 firefox.exe Token: SeDebugPrivilege 4020 7996b19a62.exe -
Suspicious use of FindShellTrayWindow 15 IoCs
pid Process 1044 4b06b24b08b2b0a529474760b14024946d20d1c33b2ce78ea954a0b869e6d9cbN.exe 860 251d1a4c66.exe 860 251d1a4c66.exe 860 251d1a4c66.exe 860 251d1a4c66.exe 860 251d1a4c66.exe 860 251d1a4c66.exe 896 firefox.exe 896 firefox.exe 896 firefox.exe 896 firefox.exe 860 251d1a4c66.exe 860 251d1a4c66.exe 860 251d1a4c66.exe 860 251d1a4c66.exe -
Suspicious use of SendNotifyMessage 13 IoCs
pid Process 860 251d1a4c66.exe 860 251d1a4c66.exe 860 251d1a4c66.exe 860 251d1a4c66.exe 860 251d1a4c66.exe 860 251d1a4c66.exe 896 firefox.exe 896 firefox.exe 896 firefox.exe 860 251d1a4c66.exe 860 251d1a4c66.exe 860 251d1a4c66.exe 860 251d1a4c66.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1728 H3tyh96.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1044 wrote to memory of 2624 1044 4b06b24b08b2b0a529474760b14024946d20d1c33b2ce78ea954a0b869e6d9cbN.exe 28 PID 1044 wrote to memory of 2624 1044 4b06b24b08b2b0a529474760b14024946d20d1c33b2ce78ea954a0b869e6d9cbN.exe 28 PID 1044 wrote to memory of 2624 1044 4b06b24b08b2b0a529474760b14024946d20d1c33b2ce78ea954a0b869e6d9cbN.exe 28 PID 1044 wrote to memory of 2624 1044 4b06b24b08b2b0a529474760b14024946d20d1c33b2ce78ea954a0b869e6d9cbN.exe 28 PID 2624 wrote to memory of 552 2624 skotes.exe 30 PID 2624 wrote to memory of 552 2624 skotes.exe 30 PID 2624 wrote to memory of 552 2624 skotes.exe 30 PID 2624 wrote to memory of 552 2624 skotes.exe 30 PID 2624 wrote to memory of 1728 2624 skotes.exe 33 PID 2624 wrote to memory of 1728 2624 skotes.exe 33 PID 2624 wrote to memory of 1728 2624 skotes.exe 33 PID 2624 wrote to memory of 1728 2624 skotes.exe 33 PID 552 wrote to memory of 444 552 Z9Pp9pM.exe 35 PID 552 wrote to memory of 444 552 Z9Pp9pM.exe 35 PID 552 wrote to memory of 444 552 Z9Pp9pM.exe 35 PID 552 wrote to memory of 444 552 Z9Pp9pM.exe 35 PID 2624 wrote to memory of 2812 2624 skotes.exe 36 PID 2624 wrote to memory of 2812 2624 skotes.exe 36 PID 2624 wrote to memory of 2812 2624 skotes.exe 36 PID 2624 wrote to memory of 2812 2624 skotes.exe 36 PID 2624 wrote to memory of 964 2624 skotes.exe 38 PID 2624 wrote to memory of 964 2624 skotes.exe 38 PID 2624 wrote to memory of 964 2624 skotes.exe 38 PID 2624 wrote to memory of 964 2624 skotes.exe 38 PID 2624 wrote to memory of 2420 2624 skotes.exe 40 PID 2624 wrote to memory of 2420 2624 skotes.exe 40 PID 2624 wrote to memory of 2420 2624 skotes.exe 40 PID 2624 wrote to memory of 2420 2624 skotes.exe 40 PID 964 wrote to memory of 1612 964 3EUEYgl.exe 41 PID 964 wrote to memory of 1612 964 3EUEYgl.exe 41 PID 964 wrote to memory of 1612 964 3EUEYgl.exe 41 PID 964 wrote to memory of 1612 964 3EUEYgl.exe 41 PID 1612 wrote to memory of 2372 1612 cmd.exe 43 PID 1612 wrote to memory of 2372 1612 cmd.exe 43 PID 1612 wrote to memory of 2372 1612 cmd.exe 43 PID 1612 wrote to memory of 2372 1612 cmd.exe 43 PID 2624 wrote to memory of 1604 2624 skotes.exe 44 PID 2624 wrote to memory of 1604 2624 skotes.exe 44 PID 2624 wrote to memory of 1604 2624 skotes.exe 44 PID 2624 wrote to memory of 1604 2624 skotes.exe 44 PID 2624 wrote to memory of 1636 2624 skotes.exe 45 PID 2624 wrote to memory of 1636 2624 skotes.exe 45 PID 2624 wrote to memory of 1636 2624 skotes.exe 45 PID 2624 wrote to memory of 1636 2624 skotes.exe 45 PID 2624 wrote to memory of 860 2624 skotes.exe 47 PID 2624 wrote to memory of 860 2624 skotes.exe 47 PID 2624 wrote to memory of 860 2624 skotes.exe 47 PID 2624 wrote to memory of 860 2624 skotes.exe 47 PID 860 wrote to memory of 3048 860 251d1a4c66.exe 48 PID 860 wrote to memory of 3048 860 251d1a4c66.exe 48 PID 860 wrote to memory of 3048 860 251d1a4c66.exe 48 PID 860 wrote to memory of 3048 860 251d1a4c66.exe 48 PID 860 wrote to memory of 888 860 251d1a4c66.exe 50 PID 860 wrote to memory of 888 860 251d1a4c66.exe 50 PID 860 wrote to memory of 888 860 251d1a4c66.exe 50 PID 860 wrote to memory of 888 860 251d1a4c66.exe 50 PID 860 wrote to memory of 1564 860 251d1a4c66.exe 52 PID 860 wrote to memory of 1564 860 251d1a4c66.exe 52 PID 860 wrote to memory of 1564 860 251d1a4c66.exe 52 PID 860 wrote to memory of 1564 860 251d1a4c66.exe 52 PID 860 wrote to memory of 2928 860 251d1a4c66.exe 54 PID 860 wrote to memory of 2928 860 251d1a4c66.exe 54 PID 860 wrote to memory of 2928 860 251d1a4c66.exe 54 PID 860 wrote to memory of 2928 860 251d1a4c66.exe 54 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b06b24b08b2b0a529474760b14024946d20d1c33b2ce78ea954a0b869e6d9cbN.exe"C:\Users\Admin\AppData\Local\Temp\4b06b24b08b2b0a529474760b14024946d20d1c33b2ce78ea954a0b869e6d9cbN.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Users\Admin\AppData\Local\Temp\1013644001\Z9Pp9pM.exe"C:\Users\Admin\AppData\Local\Temp\1013644001\Z9Pp9pM.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 552 -s 444⤵
- Loads dropped DLL
- Program crash
PID:444
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013675001\H3tyh96.exe"C:\Users\Admin\AppData\Local\Temp\1013675001\H3tyh96.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1728
-
-
C:\Users\Admin\AppData\Local\Temp\1013765001\yiklfON.exe"C:\Users\Admin\AppData\Local\Temp\1013765001\yiklfON.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2812
-
-
C:\Users\Admin\AppData\Local\Temp\1013771001\3EUEYgl.exe"C:\Users\Admin\AppData\Local\Temp\1013771001\3EUEYgl.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\1013771001\3EUEYgl.exe" & rd /s /q "C:\ProgramData\A16PP890HDJM" & exit4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\SysWOW64\timeout.exetimeout /t 105⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2372
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013800001\746841cf1f.exe"C:\Users\Admin\AppData\Local\Temp\1013800001\746841cf1f.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2420
-
-
C:\Users\Admin\AppData\Local\Temp\1013801001\b4372741ec.exe"C:\Users\Admin\AppData\Local\Temp\1013801001\b4372741ec.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:1604
-
-
C:\Users\Admin\AppData\Local\Temp\1013802001\0190467228.exe"C:\Users\Admin\AppData\Local\Temp\1013802001\0190467228.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1636
-
-
C:\Users\Admin\AppData\Local\Temp\1013803001\251d1a4c66.exe"C:\Users\Admin\AppData\Local\Temp\1013803001\251d1a4c66.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3048
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:888
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1564
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2928
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2616
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:1696
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:896 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="896.0.1425798658\287479272" -parentBuildID 20221007134813 -prefsHandle 1244 -prefMapHandle 1224 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {10fd3bdd-9ef8-4df6-bcfc-75ecb208773d} 896 "\\.\pipe\gecko-crash-server-pipe.896" 1320 f30ae58 gpu6⤵PID:2608
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="896.1.1705001239\1884491659" -parentBuildID 20221007134813 -prefsHandle 1536 -prefMapHandle 1532 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {bc528f67-8713-4dc9-8e34-3bb302ca7955} 896 "\\.\pipe\gecko-crash-server-pipe.896" 1548 e849458 socket6⤵PID:2184
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="896.2.708439198\1643901575" -childID 1 -isForBrowser -prefsHandle 1976 -prefMapHandle 1972 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 572 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {43c49d4d-b74d-497f-ac00-3f66813434dc} 896 "\\.\pipe\gecko-crash-server-pipe.896" 1988 1998a258 tab6⤵PID:2884
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="896.3.998018538\696043504" -childID 2 -isForBrowser -prefsHandle 704 -prefMapHandle 1720 -prefsLen 26151 -prefMapSize 233444 -jsInitHandle 572 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {0fc4b2fd-83e3-49b9-a7c1-fb2724abb23b} 896 "\\.\pipe\gecko-crash-server-pipe.896" 2600 1d197e58 tab6⤵PID:568
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="896.4.139679277\1980258184" -childID 3 -isForBrowser -prefsHandle 3776 -prefMapHandle 3412 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 572 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d78b6028-edb6-4c2d-bdc6-5feee071891e} 896 "\\.\pipe\gecko-crash-server-pipe.896" 3788 203dd858 tab6⤵PID:3512
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="896.5.1083602676\1156233305" -childID 4 -isForBrowser -prefsHandle 3896 -prefMapHandle 3900 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 572 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {1ad5005a-7cc4-4cc4-8e6a-520130f1ceb7} 896 "\\.\pipe\gecko-crash-server-pipe.896" 3884 203de458 tab6⤵PID:3520
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="896.6.2094538916\36335726" -childID 5 -isForBrowser -prefsHandle 4072 -prefMapHandle 4076 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 572 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e78039a8-4b74-4773-a404-d9901a8fd19a} 896 "\\.\pipe\gecko-crash-server-pipe.896" 4064 203de758 tab6⤵PID:3528
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013804001\7996b19a62.exe"C:\Users\Admin\AppData\Local\Temp\1013804001\7996b19a62.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4020
-
-
C:\Users\Admin\AppData\Local\Temp\1013805001\5e8f60684f.exe"C:\Users\Admin\AppData\Local\Temp\1013805001\5e8f60684f.exe"3⤵PID:3132
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56047ef874af21f982fa92fa32b663fb6
SHA158216eaf73e00307620f3d74ea37806c7de2ba1e
SHA2569a40adcee9d32cc9cd6f28ba0936618f58d90076be923bfa2c44a6dd82fbcaf8
SHA51242520ca96d915431ef87b1bca7876e5184c2d3a61dc33ecc7b9d9096efb92b675a822641389bd24001bf0a0bd5d72612810ecf35c9ad06e2fbdf59df364672f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e706195500f9d6d7ee5626fd7006d94c
SHA14f0e7553648c3176a98b4482db57f5bd09743d4a
SHA2561dc2cb12366b5a12a79879b48a02c67a3ccd2376151aec52a3af73aa4e422aa5
SHA512d7f33827c924df4b3fdd6db65ad985f0c336cc60b36b094211df052a062ace9fc4bff66614c9104655815b682bcb51e1b0a57c5349e81fb25d60f5bd0f6d6a45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56afb97f693ec9e86d890e3d89e15bb4f
SHA1a21904339f94267182c0b614ca447faf5a249566
SHA25609c30a1b1f1da1ae21f9f11ab85216440ac4a26b59bf793a775842ed84b88dbb
SHA512c6ab3263499ccbfa5a3fcc30926fc6b140c8237e4105368922ae69b13176babe13c2a49cdcfd839b8a450a758459ae81c09eb56f741e741248c749c9b844b030
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53aae260dff9f9e4f187130fb4c4973f6
SHA1867058797de7e0a4b2f97ba838e92d324d403da2
SHA2561e157ad62b607e7c0a61ac1cef2a540c6f257a971f9bb6d83e232841c2240bf7
SHA5129d81e2830c6145895f753a2570c920410cf1f14604676ca120f637ea9c5d1e084791e320da1de21da64124d55beecdc7536b8414185d64bc4168d139ea30b4ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a13cc7d913feb8c3bf6469e20977e934
SHA1da5ce385fde44b929f0086f8c8e50fdb709d096c
SHA256d31d41c93a8aa9cd6547d70bb744b4b4ef6e57a59c034572507a4193497ac2b9
SHA512ac44673e113b26f05436c7dca52200f6863f9491eb0574d841f3ac792f44b0b5fcdd701f3a35f5169a4197de0bc0a5d4f3830d3edde110a0e4410ad8f7d2dd1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5d9eeea0780fd544020d542c5eeea2c
SHA1ba152bddc25095eee68eb069e05494b9f1a50c0b
SHA2568f63c5c102b20c9a0c415e7ce719c24f9ae30531d321742dfd2de08b3c2139d5
SHA5121a4c32417f246bedad2e9be42daf2f54110d308485d6348ac5f015bcd1bb40fd4d952977d0a7e6f8254397f3af38c1a81244db8a06c5639e76c86c35efc7d8e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2d9eacc2a8f9bcba5c992337da88cb2
SHA117b1130c5d866aea28ad458edb156a042882a79c
SHA2560d23e6594313769549cae79ba49560d690ef12be0f1f62cda392c4b659e9c66a
SHA5126b140447cbcc61cac116a51fe6b11400b3f20d8313beca77698d31596b9eae0cad7decd46822c3879063982c565a72b141d015e9cdf7ec8a4992ea81e2049cdd
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\F91VN88R\download[1].htm
Filesize1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\o97f221x.default-release\activity-stream.discovery_stream.json.tmp
Filesize23KB
MD508e8e0b75ac123042232519d41a9f913
SHA12e4a69d916422ec0d7eb1e8671206ecee0a0b4c5
SHA2562d67a8179ea8f425635f607f40b9eaf529bc9050fa4d5b0b2662b46e8b3028df
SHA512a19e61320a1bab88e03d1e09a1c03d7e0e82b78d64d9a6fc52458dbb3405c7136b360bef23553fcf49b4715ea9c8feb5dc9fe83df14f292ea58346c6bc6ce89a
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\o97f221x.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
2.5MB
MD52a78ce9f3872f5e591d643459cabe476
SHA19ac947dfc71a868bc9c2eb2bd78dfb433067682e
SHA25621a2ac44acd7a640735870eebfd04b8dc57bc66877cb5be3b929299e86a43dae
SHA51203e2cd8161a1394ee535a2ea7d197791ab715d69a02ffab98121ec5ac8150d2b17a9a32a59307042c4bbeffad7425b55efa047651de6ed39277dba80711454f9
-
Filesize
1.7MB
MD540f8c17c136d4dc83b130c9467cf6dcc
SHA1e9b6049aa7da0af9718f2f4ae91653d9bac403bb
SHA256cafb60920939bd2079d96f2e6e73f87632bc15bd72998f864e8968f7aab9623b
SHA5126760a0752957535ec45ce3307e31569ac263eb73157d6a424d6e30647651a4e93db7c0378028d9e0ce07e65a357d2bb81047064ccda2f6a13fa7402ee7794c2d
-
Filesize
7.4MB
MD5d71d031f039f8fb153488c26fb7d410f
SHA15b15fd6f94bdbb35ecd02bf9aa51912d698ebf45
SHA25636541a0e062085fed175a4a5eae45aa9e3563fff4a816a1bffa1b2c6f8280e5b
SHA512d97c801c73f14ae20b11529d0b0f58afc3981d92bd00f88dda59881f24d89d3b325a8c61b88adc77753cebb1c320afc64af7522c61c34b2a4916b13bddc278cf
-
Filesize
1.8MB
MD53b8b3018e3283830627249d26305419d
SHA140fa5ef5594f9e32810c023aba5b6b8cea82f680
SHA256258e444e78225f74d47ba4698d49a33e6d1f6ed1f3f710186be426078e2bf1cb
SHA5122e9a42e53406446b503f150abfa16b994ee34211830d14ccbfbf52d86019dc5cca95c40222e5c6aed910c90988f999560ff972c575f9c207d7834abba6f04aa0
-
Filesize
1.9MB
MD5fcf0bc8b1fa8d11d7b4deb6d36984b04
SHA168adab1a3267460eef1969d6e8b8a573c2f8213e
SHA256ab9d97632285feeeb86e9cb6cb54513704469d3b5eb6501b27a07f0215d2a00a
SHA51289116a34ade27747f1915643761bc071df8b00227cfd56633e54278c1d07991b25b9766c71ca359ed9ffb3439f5c2b7ec4d96b891c9c0b91c167afc167f2951c
-
Filesize
1.8MB
MD57377c86883a20d0707c694a772b483e5
SHA1a4c59054f5008f4a1da91497c119676b48eece08
SHA2564f39848cfca537ac444b141483ba417595e1d6a48a763a0cd08cabf0d77549ac
SHA512b560e9095449cc87f69a518ccdd223741536ab6fd6206fc6587edaf5aa78bde2197becf1793fe38f2e5b29800875405975e884c4083f47db4ece5e124f09d523
-
Filesize
1.7MB
MD591a1368159c5fa7be897bd805f0ded2b
SHA1b0b0a97f62510bb9a3f668a50164367d199d5f7c
SHA256743310496ca9c7ca2f4a589a0a053cb6a6c39eb72ac9065ec24a3260a7d4b98f
SHA512866acdd3e276246996562960b91203934a3f200565725578f7a0e511d33ec42425d185cd6f3621cf1747c5ce6aa21790f350a66b669a539b333cf0ec2e2ef080
-
Filesize
946KB
MD5305bc8039b38faece3abc63c978aef2e
SHA1c803a0109d52cfed216ec3c278c6b962ec567bae
SHA25650fa1b69868093a86237b69f5859a8678fabbf67a897564897d7b2eb2bd0e8de
SHA51251ced6ad2c4d2199691f274026620c00d8e00dc70ed1401da11051ba6980c7b56705df0d7cdefcae879f2ca855c7d6e77a594a149f97e0682b18277a212f01f6
-
Filesize
2.7MB
MD58540e95f2fa09f04dab94fe3c00fb14c
SHA13dd775c01fddead4ad85b092dd6e6804fadf0e0d
SHA256446c9d7201dd6f58f2d19503cbb784ea42ccd52c7b499eb6a53e9bfdbd9e1e69
SHA512a1848852aff19538d210da8512c5e1ae32fb3b8d7b25057c87b6249de12c46860ba163f06b4d7b34cc4de279fe2f169f0fe752c0efd1e4110349d337c7e3b33f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD523cfadb0f87c7aa83a981d7f933f580f
SHA17c6199c4ab85a5ceb937930ca80724b85822a92a
SHA256b329c771e78475e1a3ab3583dd76bebeac0241d1aea239ec6303b9f22c6009f6
SHA512224cf8b1e45c87507fdd1cc18e92a0b7d4c7a8a5a3c2834391462146be0384b45902c06e5f70a6a894ac10a42f98246c2ac3b3f9fa91f9b5428d01e0b7c1bfc9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\datareporting\glean\pending_pings\bf39dad3-3165-464c-bb01-4dfed8dddda7
Filesize745B
MD53c6d01caf82651dc8e599e1b358f08d0
SHA15faddeec33fa3587c6e8eb1462f35da00c9d8495
SHA25611a16d71981be24492639051b330fcc136acdd32fcdd037e27a0121fbc98f0dd
SHA512bed7fd83907f9bf8f2468613cb6aa6626ebdef97bd91f7907f4e77969c393be09ec3c52840f1d8b258eef9f37795d47306e2d12423efc94dddcb3a76b747d467
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\datareporting\glean\pending_pings\dab54e5f-0052-43e4-b7e7-fee9e9d3337c
Filesize11KB
MD5955abaa27c7c13677c0745d772662e6f
SHA15977495531ba3b9a85e5f83deb7e2427f3e870d0
SHA2560705d83213dd5398364b0bb8b40935ed80da4c3b513f39e181a56e37c0e79b4d
SHA512b0c798408cb659b6a541860a453ecd1696b470911899736546078b022eac02cf9207d592f5a7310b34be280d73e819cb4f195eea62d00b2de84bef63554585e8
-
Filesize
6KB
MD52c2d0605e49b55d6b88633131d347377
SHA117172702692074f608b8d863bc923c4b298c8541
SHA256eb976e22b4c727274367dc26efeb240366c84098c768b1bd550c3b0c1faf50f8
SHA5128467a80c2623854a8c59c0a9182a6cb6bd295b80f4d5069dd6a0e2b1e198c9dcab882ff990e1091636515bbc0cc3e5665dd5b7bc90c235c19d97bb3f06b82dca
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD5abeda7c3fba10969c647748e7fe880ba
SHA1a71a8cf45da3a5a7940d2d799f3c946374256679
SHA2560f1e36015355cf8cc92068fa39385187219ec5f5e179d1e812e84f3c5e497617
SHA51266e25c84b08d0146ec3fcd44bb1d4207d30f7c6dce37272f355585f582ba3cc4087d8188631adad88a2d46fd67c70d2935237c83414627a44102384e284aa021
-
Filesize
3.0MB
MD5071fd9342e197ab323e93e0395fadbd0
SHA123bac802089af599de74f3f43c82319bad647a53
SHA2564b06b24b08b2b0a529474760b14024946d20d1c33b2ce78ea954a0b869e6d9cb
SHA512abcaabf8532249f2244e2c31727fea6060b8aadf8897a508102c10f0a432f0e221a7117336d852e34473eef66f343013de6498f8e5a7d84f2da0e9d8fe7a436a