Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
12-12-2024 15:46
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20241007-en
General
-
Target
file.exe
-
Size
3.0MB
-
MD5
ad7f121646aa374af133772519375710
-
SHA1
4e85ad004aa170ed53b7818b78e0b12e042b18ea
-
SHA256
d9865442479ec9a282ff312cd91481710f9b6e21330be30a68fa16bf36c0799f
-
SHA512
fbe1dfd40bc2fa8c6617823d32023dba5625c5e7cb235f87b284f1166a30d64e75781e80b2586e4a6f7ada4cda9df3e17f1d61829705647c71232a2f902c81c3
-
SSDEEP
49152:6UAh2jV6Tj3t5FH+2Qy0GsO7wXRzFxa73lx5:6UAh2jVej3jFH+2QyQO7ghO35
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
https://drive-connect.cyou/api
Extracted
redline
fvcxcx
185.81.68.147:1912
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://drive-connect.cyou/api
https://covery-mover.biz/api
Signatures
-
Amadey family
-
Gcleaner family
-
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 70007687de.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 70007687de.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 70007687de.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 70007687de.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 70007687de.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 70007687de.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/1964-382-0x00000000003F0000-0x0000000000442000-memory.dmp family_redline -
Redline family
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ff81c7874c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 82212dec15.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 70007687de.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 852 powershell.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 70007687de.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 70007687de.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 82212dec15.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 82212dec15.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ff81c7874c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ff81c7874c.exe -
Executes dropped EXE 23 IoCs
pid Process 2188 skotes.exe 1304 0d98083ad4.exe 2316 0d98083ad4.exe 928 M5iFR20.exe 2216 W4KLQf7.exe 3040 dwVrTdy.exe 2624 AzVRM7c.exe 2956 graph.exe 2992 t5abhIx.exe 2052 graph.exe 1284 u1w30Wt.exe 2288 ff81c7874c.exe 2440 17b265321c.exe 1536 B635.tmp.ctx.exe 2960 B635.tmp.ctx.exe 1964 BB64.tmp.fcxcx.exe 2260 C4B8.tmp.vvv.exe 2740 82212dec15.exe 1988 70007687de.exe 3600 169c30bc55.exe 3736 169c30bc55.exe 3944 d1693191be.exe 1292 60eda548d9.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine file.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine ff81c7874c.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine 82212dec15.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine 70007687de.exe -
Loads dropped DLL 54 IoCs
pid Process 2336 file.exe 2336 file.exe 2188 skotes.exe 2188 skotes.exe 1304 0d98083ad4.exe 2188 skotes.exe 2188 skotes.exe 2188 skotes.exe 2188 skotes.exe 3040 dwVrTdy.exe 2188 skotes.exe 2624 AzVRM7c.exe 2188 skotes.exe 2188 skotes.exe 2188 skotes.exe 2188 skotes.exe 2188 skotes.exe 1196 Explorer.EXE 1536 B635.tmp.ctx.exe 2960 B635.tmp.ctx.exe 2960 B635.tmp.ctx.exe 2960 B635.tmp.ctx.exe 2960 B635.tmp.ctx.exe 2960 B635.tmp.ctx.exe 2960 B635.tmp.ctx.exe 2960 B635.tmp.ctx.exe 2960 B635.tmp.ctx.exe 2960 B635.tmp.ctx.exe 2960 B635.tmp.ctx.exe 2960 B635.tmp.ctx.exe 2960 B635.tmp.ctx.exe 2960 B635.tmp.ctx.exe 2960 B635.tmp.ctx.exe 2960 B635.tmp.ctx.exe 2960 B635.tmp.ctx.exe 2960 B635.tmp.ctx.exe 2960 B635.tmp.ctx.exe 2960 B635.tmp.ctx.exe 2960 B635.tmp.ctx.exe 2960 B635.tmp.ctx.exe 2960 B635.tmp.ctx.exe 1196 Explorer.EXE 1196 Explorer.EXE 2188 skotes.exe 2188 skotes.exe 2188 skotes.exe 2188 skotes.exe 2188 skotes.exe 2188 skotes.exe 3600 169c30bc55.exe 2188 skotes.exe 2188 skotes.exe 2188 skotes.exe 2288 ff81c7874c.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 70007687de.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 70007687de.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\Graph = "C:\\Program Files\\Windows Media Player\\graph\\graph.exe" dwVrTdy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\Graph = "C:\\Program Files\\Windows Media Player\\graph\\graph.exe" AzVRM7c.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Users\\Admin\\AppData\\Roaming\\45C879D122FD1106654546\\45C879D122FD1106654546.exe" u1w30Wt.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\17b265321c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1014441001\\17b265321c.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\82212dec15.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1014442001\\82212dec15.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\70007687de.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1014443001\\70007687de.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 34 drive.google.com 23 drive.google.com 24 drive.google.com -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 36 ipinfo.io 37 ipinfo.io 47 ipinfo.io 49 ipinfo.io -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000500000001a4af-72.dat autoit_exe behavioral1/files/0x000500000001c59b-303.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 2336 file.exe 2188 skotes.exe 2288 ff81c7874c.exe 2740 82212dec15.exe 1988 70007687de.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1304 set thread context of 2316 1304 0d98083ad4.exe 33 PID 3600 set thread context of 3736 3600 169c30bc55.exe 74 -
resource yara_rule behavioral1/files/0x000600000001c794-388.dat upx behavioral1/memory/2260-395-0x0000000000D00000-0x0000000001653000-memory.dmp upx behavioral1/memory/2260-391-0x0000000000D00000-0x0000000001653000-memory.dmp upx -
Drops file in Program Files directory 12 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Media Player\1w4lv5IzuEVOMa3sjCc6orj2dWPvJoK5f AzVRM7c.exe File created C:\Program Files\Windows Media Player\1w4lv5IzuEVOMa3sjCc6orj2dWPvJoK5f dwVrTdy.exe File created C:\Program Files\Windows Media Player\graph\graph.exe dwVrTdy.exe File opened for modification C:\Program Files\Windows Media Player\1w4lv5IzuEVOMa3sjCc6orj2dWPvJoK5fzip dwVrTdy.exe File opened for modification C:\Program Files\Windows Media Player\1w4lv5IzuEVOMa3sjCc6orj2dWPvJoK5f dwVrTdy.exe File opened for modification C:\Program Files\Windows Media Player\graph\graph.exe AzVRM7c.exe File opened for modification C:\Program Files\Windows Media Player\1w4lv5IzuEVOMa3sjCc6orj2dWPvJoK5fzip AzVRM7c.exe File created C:\Program Files\Windows Media Player\1w4lv5IzuEVOMa3sjCc6orj2dWPvJoK5fzip dwVrTdy.exe File created C:\Program Files\Windows Media Player\1w4lv5IzuEVOMa3sjCc6orj2dWPvJoK5f AzVRM7c.exe File created C:\Program Files\Windows Media Player\1w4lv5IzuEVOMa3sjCc6orj2dWPvJoK5fzip AzVRM7c.exe File opened for modification C:\Program Files\Windows Media Player\graph t5abhIx.exe File opened for modification C:\Program Files\Windows Media Player\graph\graph.exe t5abhIx.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job file.exe -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral1/files/0x000500000001c771-315.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 26 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 17b265321c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BB64.tmp.fcxcx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 60eda548d9.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 17b265321c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d1693191be.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0d98083ad4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ff81c7874c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 169c30bc55.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 70007687de.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 169c30bc55.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0d98083ad4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language M5iFR20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language W4KLQf7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 17b265321c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 82212dec15.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systeminfo.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 d1693191be.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString d1693191be.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2988 timeout.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 1124 systeminfo.exe -
Kills process with taskkill 5 IoCs
pid Process 2072 taskkill.exe 2028 taskkill.exe 2524 taskkill.exe 3064 taskkill.exe 1000 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_Classes\Local Settings firefox.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 dwVrTdy.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 dwVrTdy.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 dwVrTdy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 dwVrTdy.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 0400000001000000100000000cd2f9e0da1773e9ed864da5e370e74e14000000010000001400000079b459e67bb6e5e40173800888c81a58f6e99b6e030000000100000014000000cabd2a79a1076a31f21d253635cb039d4329a5e80f00000001000000200000003f0411ede9c4477057d57e57883b1f205b20cdc0f3263129b1ee0269a2678f631900000001000000100000002fe1f70bb05d7c92335bc5e05b984da620000000010000006f0500003082056b30820353a0030201020211008210cfb0d240e3594463e0bb63828b00300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3135303630343131303433385a170d3335303630343131303433385a304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f7420583130820222300d06092a864886f70d01010105000382020f003082020a0282020100ade82473f41437f39b9e2b57281c87bedcb7df38908c6e3ce657a078f775c2a2fef56a6ef6004f28dbde68866c4493b6b163fd14126bbf1fd2ea319b217ed1333cba48f5dd79dfb3b8ff12f1219a4bc18a8671694a66666c8f7e3c70bfad292206f3e4c0e680aee24b8fb7997e94039fd347977c99482353e838ae4f0a6f832ed149578c8074b6da2fd0388d7b0370211b75f2303cfa8faeddda63abeb164fc28e114b7ecf0be8ffb5772ef4b27b4ae04c12250c708d0329a0e15324ec13d9ee19bf10b34a8c3f89a36151deac870794f46371ec2ee26f5b9881e1895c34796c76ef3b906279e6dba49a2f26c5d010e10eded9108e16fbb7f7a8f7c7e50207988f360895e7e237960d36759efb0e72b11d9bbc03f94905d881dd05b42ad641e9ac0176950a0fd8dfd5bd121f352f28176cd298c1a80964776e4737baceac595e689d7f72d689c50641293e593edd26f524c911a75aa34c401f46a199b5a73a516e863b9e7d72a712057859ed3e5178150b038f8dd02f05b23e7b4a1c4b730512fcc6eae050137c439374b3ca74e78e1f0108d030d45b7136b407bac130305c48b7823b98a67d608aa2a32982ccbabd83041ba2830341a1d605f11bc2b6f0a87c863b46a8482a88dc769a76bf1f6aa53d198feb38f364dec82b0d0a28fff7dbe21542d422d0275de179fe18e77088ad4ee6d98b3ac6dd27516effbc64f533434f0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e0416041479b459e67bb6e5e40173800888c81a58f6e99b6e300d06092a864886f70d01010b05000382020100551f58a9bcb2a850d00cb1d81a6920272908ac61755c8a6ef882e5692fd5f6564bb9b8731059d321977ee74c71fbb2d260ad39a80bea17215685f1500e59ebcee059e9bac915ef869d8f8480f6e4e99190dc179b621b45f06695d27c6fc2ea3bef1fcfcbd6ae27f1a9b0c8aefd7d7e9afa2204ebffd97fea912b22b1170e8ff28a345b58d8fc01c954b9b826cc8a8833894c2d843c82dfee965705ba2cbbf7c4b7c74e3b82be31c822737392d1c280a43939103323824c3c9f86b255981dbe29868c229b9ee26b3b573a82704ddc09c789cb0a074d6ce85d8ec9efceabc7bbb52b4e45d64ad026cce572ca086aa595e315a1f7a4edc92c5fa5fbffac28022ebed77bbbe3717b9016d3075e46537c3707428cd3c4969cd599b52ae0951a8048ae4c3907cecc47a452952bbab8fbadd233537de51d4d6dd5a1b1c7426fe64027355ca328b7078de78d3390e7239ffb509c796c46d5b415b3966e7e9b0c963ab8522d3fd65be1fb08c284fe24a8a389daac6ae1182ab1a843615bd31fdc3b8d76f22de88d75df17336c3d53fb7bcb415fffdca2d06138e196b8ac5d8b37d775d533c09911ae9d41c1727584be0241425f67244894d19b27be073fb9b84f817451e17ab7ed9d23e2bee0d52804133c31039edd7a6c8fc60718c67fde478e3f289e0406cfa5543477bdec899be91743df5bdb5ffe8e1e57a2cd409d7e6222dade1827 dwVrTdy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 d1693191be.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 d1693191be.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2336 file.exe 2188 skotes.exe 3040 dwVrTdy.exe 3040 dwVrTdy.exe 3040 dwVrTdy.exe 2624 AzVRM7c.exe 2624 AzVRM7c.exe 2624 AzVRM7c.exe 2956 graph.exe 2992 t5abhIx.exe 2992 t5abhIx.exe 2992 t5abhIx.exe 2052 graph.exe 2052 graph.exe 1284 u1w30Wt.exe 1196 Explorer.EXE 2052 graph.exe 2052 graph.exe 2052 graph.exe 2052 graph.exe 2052 graph.exe 2052 graph.exe 2052 graph.exe 2288 ff81c7874c.exe 2052 graph.exe 2052 graph.exe 2052 graph.exe 2052 graph.exe 2052 graph.exe 2052 graph.exe 2052 graph.exe 2052 graph.exe 2740 82212dec15.exe 2052 graph.exe 2052 graph.exe 2440 17b265321c.exe 2052 graph.exe 2052 graph.exe 2052 graph.exe 1988 70007687de.exe 1988 70007687de.exe 2052 graph.exe 2052 graph.exe 2440 17b265321c.exe 2440 17b265321c.exe 2052 graph.exe 2052 graph.exe 1988 70007687de.exe 1988 70007687de.exe 2052 graph.exe 2052 graph.exe 2052 graph.exe 2052 graph.exe 2052 graph.exe 2052 graph.exe 2052 graph.exe 2052 graph.exe 2052 graph.exe 2052 graph.exe 1964 BB64.tmp.fcxcx.exe 1964 BB64.tmp.fcxcx.exe 1964 BB64.tmp.fcxcx.exe 1964 BB64.tmp.fcxcx.exe 1964 BB64.tmp.fcxcx.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1284 u1w30Wt.exe Token: SeSecurityPrivilege 1284 u1w30Wt.exe Token: SeTakeOwnershipPrivilege 1284 u1w30Wt.exe Token: SeLoadDriverPrivilege 1284 u1w30Wt.exe Token: SeSystemProfilePrivilege 1284 u1w30Wt.exe Token: SeSystemtimePrivilege 1284 u1w30Wt.exe Token: SeProfSingleProcessPrivilege 1284 u1w30Wt.exe Token: SeIncBasePriorityPrivilege 1284 u1w30Wt.exe Token: SeCreatePagefilePrivilege 1284 u1w30Wt.exe Token: SeBackupPrivilege 1284 u1w30Wt.exe Token: SeRestorePrivilege 1284 u1w30Wt.exe Token: SeShutdownPrivilege 1284 u1w30Wt.exe Token: SeDebugPrivilege 1284 u1w30Wt.exe Token: SeSystemEnvironmentPrivilege 1284 u1w30Wt.exe Token: SeRemoteShutdownPrivilege 1284 u1w30Wt.exe Token: SeUndockPrivilege 1284 u1w30Wt.exe Token: SeManageVolumePrivilege 1284 u1w30Wt.exe Token: 33 1284 u1w30Wt.exe Token: 34 1284 u1w30Wt.exe Token: 35 1284 u1w30Wt.exe Token: SeDebugPrivilege 1284 u1w30Wt.exe Token: SeDebugPrivilege 2072 taskkill.exe Token: SeDebugPrivilege 2028 taskkill.exe Token: SeDebugPrivilege 2524 taskkill.exe Token: SeDebugPrivilege 3064 taskkill.exe Token: SeDebugPrivilege 1000 taskkill.exe Token: SeShutdownPrivilege 1196 Explorer.EXE Token: SeShutdownPrivilege 1196 Explorer.EXE Token: SeShutdownPrivilege 1196 Explorer.EXE Token: SeShutdownPrivilege 1196 Explorer.EXE Token: SeDebugPrivilege 3068 firefox.exe Token: SeDebugPrivilege 3068 firefox.exe Token: SeDebugPrivilege 1988 70007687de.exe Token: SeDebugPrivilege 1964 BB64.tmp.fcxcx.exe Token: SeShutdownPrivilege 1196 Explorer.EXE Token: SeDebugPrivilege 852 powershell.exe -
Suspicious use of FindShellTrayWindow 23 IoCs
pid Process 2336 file.exe 928 M5iFR20.exe 928 M5iFR20.exe 928 M5iFR20.exe 2440 17b265321c.exe 1196 Explorer.EXE 1196 Explorer.EXE 2440 17b265321c.exe 2440 17b265321c.exe 2440 17b265321c.exe 2440 17b265321c.exe 2440 17b265321c.exe 2440 17b265321c.exe 2440 17b265321c.exe 3068 firefox.exe 3068 firefox.exe 3068 firefox.exe 3068 firefox.exe 2440 17b265321c.exe 2440 17b265321c.exe 2440 17b265321c.exe 1196 Explorer.EXE 1196 Explorer.EXE -
Suspicious use of SendNotifyMessage 20 IoCs
pid Process 928 M5iFR20.exe 928 M5iFR20.exe 928 M5iFR20.exe 2440 17b265321c.exe 2440 17b265321c.exe 2440 17b265321c.exe 2440 17b265321c.exe 2440 17b265321c.exe 2440 17b265321c.exe 2440 17b265321c.exe 2440 17b265321c.exe 3068 firefox.exe 3068 firefox.exe 3068 firefox.exe 2440 17b265321c.exe 2440 17b265321c.exe 2440 17b265321c.exe 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2336 wrote to memory of 2188 2336 file.exe 29 PID 2336 wrote to memory of 2188 2336 file.exe 29 PID 2336 wrote to memory of 2188 2336 file.exe 29 PID 2336 wrote to memory of 2188 2336 file.exe 29 PID 2188 wrote to memory of 1304 2188 skotes.exe 31 PID 2188 wrote to memory of 1304 2188 skotes.exe 31 PID 2188 wrote to memory of 1304 2188 skotes.exe 31 PID 2188 wrote to memory of 1304 2188 skotes.exe 31 PID 1304 wrote to memory of 2316 1304 0d98083ad4.exe 33 PID 1304 wrote to memory of 2316 1304 0d98083ad4.exe 33 PID 1304 wrote to memory of 2316 1304 0d98083ad4.exe 33 PID 1304 wrote to memory of 2316 1304 0d98083ad4.exe 33 PID 1304 wrote to memory of 2316 1304 0d98083ad4.exe 33 PID 1304 wrote to memory of 2316 1304 0d98083ad4.exe 33 PID 1304 wrote to memory of 2316 1304 0d98083ad4.exe 33 PID 1304 wrote to memory of 2316 1304 0d98083ad4.exe 33 PID 1304 wrote to memory of 2316 1304 0d98083ad4.exe 33 PID 1304 wrote to memory of 2316 1304 0d98083ad4.exe 33 PID 1304 wrote to memory of 2316 1304 0d98083ad4.exe 33 PID 2188 wrote to memory of 928 2188 skotes.exe 34 PID 2188 wrote to memory of 928 2188 skotes.exe 34 PID 2188 wrote to memory of 928 2188 skotes.exe 34 PID 2188 wrote to memory of 928 2188 skotes.exe 34 PID 2188 wrote to memory of 2216 2188 skotes.exe 35 PID 2188 wrote to memory of 2216 2188 skotes.exe 35 PID 2188 wrote to memory of 2216 2188 skotes.exe 35 PID 2188 wrote to memory of 2216 2188 skotes.exe 35 PID 2188 wrote to memory of 3040 2188 skotes.exe 36 PID 2188 wrote to memory of 3040 2188 skotes.exe 36 PID 2188 wrote to memory of 3040 2188 skotes.exe 36 PID 2188 wrote to memory of 3040 2188 skotes.exe 36 PID 2188 wrote to memory of 2624 2188 skotes.exe 37 PID 2188 wrote to memory of 2624 2188 skotes.exe 37 PID 2188 wrote to memory of 2624 2188 skotes.exe 37 PID 2188 wrote to memory of 2624 2188 skotes.exe 37 PID 3040 wrote to memory of 2956 3040 dwVrTdy.exe 39 PID 3040 wrote to memory of 2956 3040 dwVrTdy.exe 39 PID 3040 wrote to memory of 2956 3040 dwVrTdy.exe 39 PID 2188 wrote to memory of 2992 2188 skotes.exe 40 PID 2188 wrote to memory of 2992 2188 skotes.exe 40 PID 2188 wrote to memory of 2992 2188 skotes.exe 40 PID 2188 wrote to memory of 2992 2188 skotes.exe 40 PID 2624 wrote to memory of 2052 2624 AzVRM7c.exe 41 PID 2624 wrote to memory of 2052 2624 AzVRM7c.exe 41 PID 2624 wrote to memory of 2052 2624 AzVRM7c.exe 41 PID 2188 wrote to memory of 1284 2188 skotes.exe 42 PID 2188 wrote to memory of 1284 2188 skotes.exe 42 PID 2188 wrote to memory of 1284 2188 skotes.exe 42 PID 2188 wrote to memory of 1284 2188 skotes.exe 42 PID 1284 wrote to memory of 1196 1284 u1w30Wt.exe 20 PID 2188 wrote to memory of 2288 2188 skotes.exe 43 PID 2188 wrote to memory of 2288 2188 skotes.exe 43 PID 2188 wrote to memory of 2288 2188 skotes.exe 43 PID 2188 wrote to memory of 2288 2188 skotes.exe 43 PID 2188 wrote to memory of 2440 2188 skotes.exe 44 PID 2188 wrote to memory of 2440 2188 skotes.exe 44 PID 2188 wrote to memory of 2440 2188 skotes.exe 44 PID 2188 wrote to memory of 2440 2188 skotes.exe 44 PID 1196 wrote to memory of 1536 1196 Explorer.EXE 45 PID 1196 wrote to memory of 1536 1196 Explorer.EXE 45 PID 1196 wrote to memory of 1536 1196 Explorer.EXE 45 PID 1536 wrote to memory of 2960 1536 B635.tmp.ctx.exe 46 PID 1536 wrote to memory of 2960 1536 B635.tmp.ctx.exe 46 PID 1536 wrote to memory of 2960 1536 B635.tmp.ctx.exe 46 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\1014060001\0d98083ad4.exe"C:\Users\Admin\AppData\Local\Temp\1014060001\0d98083ad4.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Users\Admin\AppData\Local\Temp\1014060001\0d98083ad4.exe"C:\Users\Admin\AppData\Local\Temp\1014060001\0d98083ad4.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2316
-
-
-
C:\Users\Admin\AppData\Local\Temp\1014081001\M5iFR20.exe"C:\Users\Admin\AppData\Local\Temp\1014081001\M5iFR20.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:928
-
-
C:\Users\Admin\AppData\Local\Temp\1014365001\W4KLQf7.exe"C:\Users\Admin\AppData\Local\Temp\1014365001\W4KLQf7.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2216 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Microsoft\Windows\hyper-v.exe"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:852
-
-
C:\Windows\SysWOW64\systeminfo.exesysteminfo5⤵
- System Location Discovery: System Language Discovery
- Gathers system information
PID:1124
-
-
-
C:\Users\Admin\AppData\Local\Temp\1014430001\dwVrTdy.exe"C:\Users\Admin\AppData\Local\Temp\1014430001\dwVrTdy.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Program Files\Windows Media Player\graph\graph.exe"C:\Program Files\Windows Media Player\graph\graph.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2956
-
-
-
C:\Users\Admin\AppData\Local\Temp\1014431001\AzVRM7c.exe"C:\Users\Admin\AppData\Local\Temp\1014431001\AzVRM7c.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Program Files\Windows Media Player\graph\graph.exe"C:\Program Files\Windows Media Player\graph\graph.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2052
-
-
-
C:\Users\Admin\AppData\Local\Temp\1014432001\t5abhIx.exe"C:\Users\Admin\AppData\Local\Temp\1014432001\t5abhIx.exe"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:2992
-
-
C:\Users\Admin\AppData\Local\Temp\1014439001\u1w30Wt.exe"C:\Users\Admin\AppData\Local\Temp\1014439001\u1w30Wt.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1284
-
-
C:\Users\Admin\AppData\Local\Temp\1014440001\ff81c7874c.exe"C:\Users\Admin\AppData\Local\Temp\1014440001\ff81c7874c.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2288
-
-
C:\Users\Admin\AppData\Local\Temp\1014441001\17b265321c.exe"C:\Users\Admin\AppData\Local\Temp\1014441001\17b265321c.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2440 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2072
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2028
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2524
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3064
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1000
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking5⤵PID:1368
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking6⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3068 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3068.0.492566038\1759157022" -parentBuildID 20221007134813 -prefsHandle 1220 -prefMapHandle 1212 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {fc1a7848-baa8-49e9-805c-171deba496e9} 3068 "\\.\pipe\gecko-crash-server-pipe.3068" 1284 121da458 gpu7⤵PID:1652
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3068.1.772751363\473250164" -parentBuildID 20221007134813 -prefsHandle 1468 -prefMapHandle 1448 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {1af770f2-581d-44d9-8120-a904e29fb181} 3068 "\\.\pipe\gecko-crash-server-pipe.3068" 1496 d74e58 socket7⤵PID:1984
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3068.2.58439707\324563577" -childID 1 -isForBrowser -prefsHandle 2076 -prefMapHandle 1912 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 828 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {04c82ac7-0db0-47dd-b48d-ff0c3a0166f3} 3068 "\\.\pipe\gecko-crash-server-pipe.3068" 2208 1a4e6658 tab7⤵PID:2840
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3068.3.349776466\497315724" -childID 2 -isForBrowser -prefsHandle 2920 -prefMapHandle 2916 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 828 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {4a82fbdc-3bef-4ac1-817e-5a32c36f90bf} 3068 "\\.\pipe\gecko-crash-server-pipe.3068" 2932 d5ff58 tab7⤵PID:2456
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3068.4.1332477057\857207009" -childID 3 -isForBrowser -prefsHandle 3676 -prefMapHandle 3812 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 828 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {be5b0a7a-8952-44e9-98b8-a6ed14164de4} 3068 "\\.\pipe\gecko-crash-server-pipe.3068" 3828 2175f758 tab7⤵PID:2548
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3068.5.622772436\1165392422" -childID 4 -isForBrowser -prefsHandle 3952 -prefMapHandle 3956 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 828 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {39c33cae-cbc0-42ce-8bfc-1e0ccd4d4b80} 3068 "\\.\pipe\gecko-crash-server-pipe.3068" 3940 217ec858 tab7⤵PID:2204
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3068.6.502277341\302544048" -childID 5 -isForBrowser -prefsHandle 4120 -prefMapHandle 4124 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 828 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {24732c77-e6bc-4535-bdfd-013bcc7f9fd5} 3068 "\\.\pipe\gecko-crash-server-pipe.3068" 4108 217ee358 tab7⤵PID:2212
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1014442001\82212dec15.exe"C:\Users\Admin\AppData\Local\Temp\1014442001\82212dec15.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2740
-
-
C:\Users\Admin\AppData\Local\Temp\1014443001\70007687de.exe"C:\Users\Admin\AppData\Local\Temp\1014443001\70007687de.exe"4⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1988
-
-
C:\Users\Admin\AppData\Local\Temp\1014444001\169c30bc55.exe"C:\Users\Admin\AppData\Local\Temp\1014444001\169c30bc55.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3600 -
C:\Users\Admin\AppData\Local\Temp\1014444001\169c30bc55.exe"C:\Users\Admin\AppData\Local\Temp\1014444001\169c30bc55.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3736
-
-
-
C:\Users\Admin\AppData\Local\Temp\1014445001\d1693191be.exe"C:\Users\Admin\AppData\Local\Temp\1014445001\d1693191be.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies system certificate store
PID:3944 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\1014445001\d1693191be.exe" & rd /s /q "C:\ProgramData\OZ5XT2689RQQ" & exit5⤵
- System Location Discovery: System Language Discovery
PID:1784 -
C:\Windows\SysWOW64\timeout.exetimeout /t 106⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2988
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1014446001\60eda548d9.exe"C:\Users\Admin\AppData\Local\Temp\1014446001\60eda548d9.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1292
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\B635.tmp.ctx.exe"C:\Users\Admin\AppData\Local\Temp\B635.tmp.ctx.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Users\Admin\AppData\Local\Temp\B635.tmp.ctx.exe"C:\Users\Admin\AppData\Local\Temp\B635.tmp.ctx.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2960
-
-
-
C:\Users\Admin\AppData\Local\Temp\BB64.tmp.fcxcx.exe"C:\Users\Admin\AppData\Local\Temp\BB64.tmp.fcxcx.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1964
-
-
C:\Users\Admin\AppData\Local\Temp\C4B8.tmp.vvv.exe"C:\Users\Admin\AppData\Local\Temp\C4B8.tmp.vvv.exe"2⤵
- Executes dropped EXE
PID:2260
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153KB
MD5f89267b24ecf471c16add613cec34473
SHA1c3aad9d69a3848cedb8912e237b06d21e1e9974f
SHA25621f12abb6de14e72d085bc0bd90d630956c399433e85275c4c144cd9818cbf92
SHA512c29176c7e1d58dd4e1deafcbd72956b8c27e923fb79d511ee244c91777d3b3e41d0c3977a8a9fbe094bac371253481dde5b58abf4f2df989f303e5d262e1ce4d
-
Filesize
120KB
MD553e54ac43786c11e0dde9db8f4eb27ab
SHA19c5768d5ee037e90da77f174ef9401970060520e
SHA2562f606d24809902af1bb9cb59c16a2c82960d95bff923ea26f6a42076772f1db8
SHA512cd1f6d5f4d8cd19226151b6674124ab1e10950af5a049e8c082531867d71bfae9d7bc65641171fd55d203e4fba9756c80d11906d85a30b35ee4e8991adb21950
-
Filesize
245KB
MD57d254439af7b1caaa765420bea7fbd3f
SHA17bd1d979de4a86cb0d8c2ad9e1945bd351339ad0
SHA256d6e7ceb5b05634efbd06c3e28233e92f1bd362a36473688fbaf952504b76d394
SHA512c3164b2f09dc914066201562be6483f61d3c368675ac5d3466c2d5b754813b8b23fd09af86b1f15ab8cc91be8a52b3488323e7a65198e5b104f9c635ec5ed5cc
-
Filesize
854B
MD5e935bc5762068caf3e24a2683b1b8a88
SHA182b70eb774c0756837fe8d7acbfeec05ecbf5463
SHA256a8accfcfeb51bd73df23b91f4d89ff1a9eb7438ef5b12e8afda1a6ff1769e89d
SHA512bed4f6f5357b37662623f1f8afed1a3ebf3810630b2206a0292052a2e754af9dcfe34ee15c289e3d797a8f33330e47c14cbefbc702f74028557ace29bf855f9e
-
Filesize
717B
MD5822467b728b7a66b081c91795373789a
SHA1d8f2f02e1eef62485a9feffd59ce837511749865
SHA256af2343382b88335eea72251ad84949e244ff54b6995063e24459a7216e9576b9
SHA512bacea07d92c32078ca6a0161549b4e18edab745dd44947e5f181d28cc24468e07769d6835816cdfb944fd3d0099bde5e21b48f4966824c5c16c1801712303eb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD584525ac2c52cedf67aa38131b3f41efb
SHA1080afd23b33aabd0285594d580d21acde7229173
SHA256ae524d9d757bed48d552b059f951ffd25a7d963ae44a554cb1f3a9641e524080
SHA512d898b0913b4005bbbf22a5457ad1e86345860868bc2e53187ad8267c07824d592160a27d850978ebfe78392db784fffb80b73e27418d3a71708383d738ea1d57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6DA548C7E5915679F87E910D6581DEF1_19CA6F55DA8A3B0AB12F649B745C90D5
Filesize471B
MD5db2f924bc324ae41a21ff7c8e0072a5f
SHA164c572b53140e74fe1de076d5bcd92f66a3e716f
SHA256d50ea2b01b6944aeb7395ffe0849623c7d93db1422d0ce9e13e48783e5daf8fd
SHA51205f1ea9de09ea39461bf03f058df746dca8ac73b434e24fc316e1b35929bd24503ac80248d94b5f5dd564c72bdfab3bc6f6635d35e825aa97dcae3ada68b4d15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C02877841121CC45139CB51404116B25_6F7C58D8F5DC37AD0C4A3BEB81BE1660
Filesize472B
MD5c63ea05972017bcdd1beb71283b91587
SHA19fa26197d0eff7832e4cb81991713cac35ae5e35
SHA256ce02e101910f3b706cd4a36936408bd1cf065a7beae18716d9ce31991b647e10
SHA5128d89edc92a6a8d02e6491275e3e5a846f98bef077ca0aea352d4de45a79138d1e8fc26c310a37b50cfb4d746f7864747e3b0c98a89aa195fb58449bd72b7a985
-
Filesize
504B
MD57534282617c6278db5ebc9da5b2c673b
SHA14d804a0a0e7c4f0ab1791e9c68c58833d7fc7811
SHA2562904a768575e22df734148cd01c687a5dd23a6d2b378ad3a972f6e7f38fa77cc
SHA512c45746c38c1e8f0d694a05ef0785070b4f7e3df34a264a3693983d555232bc7b61e78e24187fce8e093448d1724f1226afc3baf262860ad75f076bf57f5929a0
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199
Filesize170B
MD5e274fc7034dcff5de895fb22d542fc23
SHA1c7d8d4a9bd50904cd0438e3e92c4fc95697ff099
SHA256475690ab5192ca12bd12afcc7347bb15fc8db5eea287b92a3c8dfacf16249393
SHA512dd594af1d8f20728395480e612eb33f4f1e49846dd0d6d62ed1fca6e0a9b66dc2c497dbb794842453258ea5a4bc7091ed43427039830fc4cea91b6e07c5ab5da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751
Filesize192B
MD51e81fe3756136dea9b986650056f1675
SHA177f98f327109c98f9191dfea3317e1cdcb30a40d
SHA25629476003cc6cf268236b27ce6f78bb119d12a074e47454333b9b32506df120af
SHA5123b7c1976bf5df73088db8aaa5c6937acdb6c31c1d6e56131663f86919f017246a935d3e04370e708c31221ba542c9fc27f79094262f0876e3162439c41610b2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD585ef935ff050713b8fddaeed74dc6701
SHA1d3a717e32ad789bb2129cf101157e85537b9123d
SHA25641b7cd6092066af83be0654c2c1e496823e06dd1d90d056dee92f5c69f8fffe0
SHA5121f21a08f0edfbd2eeba524a0238dbb2128f141a27aab34cdbfc346ab58b58c12498c03ac4bad092572880aab93e13e667682a2c00d822f6ca8efa056efbdb528
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6DA548C7E5915679F87E910D6581DEF1_19CA6F55DA8A3B0AB12F649B745C90D5
Filesize402B
MD5f30595872794c261d9b069b2973cdc7a
SHA130b8cf5edcdd43bfaec5f4ab11b353ce227c5ae8
SHA2569f6976b9bde529ed73a084a23ce7eee511ccef4d271d3e4fd4528b1d0fea9173
SHA5128b4033804656996d2d82ce732cea0ef26f7adeeeea4ba55b535feb41f4967420beaab64bc72dc4eaf4afa51f8d1263a461e37a90586d3724d9df00115710ebba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5824d2af526949cabc24c31eb50dee183
SHA17d68ffc58eec48aab7e0776ec8377b1aa35296de
SHA25639fcb607e1d4ed9885e13ecc88075e59721c12702bec08ac65d5a376366f8822
SHA512cd69dff752e9a764d3e5ee096f0d2a2df262a452347bd65e3af0f0e57dc6faeec4f44d5e34b8cadea16dc40fb5e66bbb866b15f69cd7312ee5e16ce773ec820f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C02877841121CC45139CB51404116B25_6F7C58D8F5DC37AD0C4A3BEB81BE1660
Filesize398B
MD572bab25549a9e56fa9653d2de8fd8143
SHA156e2f8be9de4a3f4640110a6fe45730d873e2f29
SHA256cf32bbd8fd3cd4eb57482dd782ecb8f2b02f334166962365114637455b61bf92
SHA51202267ac3fb301ca8882798c91cdd41a99f23b148a5bdfa5f15490eac9442436d5d2507e4dc7780ff6fad2204156353323c8a94343af4009e714fc49c1bbae64b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\D73CE810F817D372CC78C5824C36E338
Filesize550B
MD522ce9e7e02851ad36e21914e39b6c804
SHA103e6a7e23e373bd423084fae736209580851fa9e
SHA2565d46568b2019ec36cf5589acd2ac6691cd3773583532de068ce0bb95b75e15f6
SHA5120aaed4593d25045c56455a9abb365dd9a628a0279ddde3d9b577efa1304396790a134d9737061b34e61b17597c4ea648e936d7c4e511cdf58fa82a40a57053d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD563469d9fcceac52554c9599cf53dc3f2
SHA1af9c42ed99b9371d88f5e01efadcc2215dc8f970
SHA25661e0fc7421bc001ccd677491b601f6155eff37c134865d97b517fcc3bf8b4e4b
SHA51261709975e2a23bb3f2d7a232c6a3d3e55aadfdc849257d0d6368608fa0b26295d9b8d72421d2b41170d16273ed11d7ef001719834c7aa542ebce24cea9332318
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LW44N8OS\download[1].htm
Filesize1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\n3lsnn48.default-release\activity-stream.discovery_stream.json.tmp
Filesize23KB
MD527082fffe8dbcc21fad2c618e6bf4eff
SHA1ac281b617a7c9c0092d2e274971c4734add87118
SHA2560e933046867163747073dc64e5a29fdc349751f5148105444f2e5b1f870a7af4
SHA51221ffbf25b679b764ce5d853a46b6592005bfc7d2b952b7886287ec8560a51389f93ab0ec2e9e8bbdc7ff3a711bcc390122d00e1a647885551ddaf3f322211d44
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\n3lsnn48.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
710KB
MD528e568616a7b792cac1726deb77d9039
SHA139890a418fb391b823ed5084533e2e24dff021e1
SHA2569597798f7789adc29fbe97707b1bd8ca913c4d5861b0ad4fdd6b913af7c7a8e2
SHA51285048799e6d2756f1d6af77f34e6a1f454c48f2f43042927845931b7ecff2e5de45f864627a3d4aa061252401225bbb6c2caa8532320ccbe401e97c9c79ac8e5
-
Filesize
898KB
MD55950611ed70f90b758610609e2aee8e6
SHA1798588341c108850c79da309be33495faf2f3246
SHA2565270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4
SHA5127e51c458a9a2440c778361eb19f0c13ea4de75b2cf54a5828f6230419fbf52c4702be4f0784e7984367d67fabf038018e264e030e4a4c7dac7ba93e5c1395b80
-
Filesize
3.7MB
MD512c766cab30c7a0ef110f0199beda18b
SHA1efdc8eb63df5aae563c7153c3bd607812debeba4
SHA2567b2070ca45ec370acba43623fb52931ee52bee6f0ce74e6230179b058fa2c316
SHA51232cad9086d9c7a8d88c3bfcb0806f350f0df9624637439f1e34ab2efffa0c273faef0c226c388ed28f07381aef0655af9e3eb3e9557cbfd2d8c915b556b1cf10
-
Filesize
591KB
MD53567cb15156760b2f111512ffdbc1451
SHA12fdb1f235fc5a9a32477dab4220ece5fda1539d4
SHA2560285d3a6c1ca2e3a993491c44e9cf2d33dbec0fb85fdbf48989a4e3b14b37630
SHA512e7a31b016417218387a4702e525d33dd4fe496557539b2ab173cec0cb92052c750cfc4b3e7f02f3c66ac23f19a0c8a4eb6c9d2b590a5e9faeb525e517bc877ba
-
Filesize
301KB
MD5ff1e7643a5c9294bd8e8fd743b323c8f
SHA1b35c6e9090b44c2db2220c5c42c0f68210ba73a9
SHA25625f4451b243d5e5b05eaccf5dd58e3cfcee7969b145d9aad7aff6750ab9a6d0b
SHA51262b1f41dcab0f4330d761cdbfc4e99e15830b4cdcc44e7788fd15f57f5043eb53e626e009c397dcce13841e192165c4584cee0f57c0e5bd5b876f507d051b675
-
Filesize
1.9MB
MD55a3f6aa1107d91bdc0430e2a0c1f4f26
SHA1316139dd3edcd5af3a8afbd89e44ac10bb8e87e7
SHA256f43ded143a77002b6aa1b860aecca5b94e00a601d1db104d04423e3b5e0261ca
SHA512712f40770c3d645e54aac46ecb6cf51065ae30253e39e5fda861191d23aa2be2bb1d1e69043610f9ad22f2c86c532c759c2a4e06277b85c056e1c9f097c9143a
-
Filesize
948KB
MD5e477e0c89bdfe4f98170878f85624a0c
SHA1f0321409b7d9b8303ba46b53a5bbdbb26c6b446e
SHA25641d06b73f313d3f14d3ecd825911751b7c1ed171fb0ce546662a934a3cb6f3ed
SHA512c2c1890ec0078f552afef0bb6f0f088e08b81843526435e6ec32092e58fdcd8a2f6b5dd3c5372fe9545821ed5e382bfc55887daa2f0f67809008c819245bc017
-
Filesize
1.7MB
MD5cd917c036da4dc2b3e30e12b135a87e2
SHA1e1d0a610ebc4d4500d01ce193a803a94542893dd
SHA25673bf8e4a7d1baa981576bd9789ca7b13f9e53424dc283000474753ef51c11f4a
SHA5128f095fb21086ef7cf673f8eee5218592e7c0cf1397a2b4b11b7b5f29c0b6f194f1f1c8961b9218094146022d64d0093251d57d419a09b61d7a0571672b96c2fb
-
Filesize
2.7MB
MD538702763dfedb9ad700580558b2e2cde
SHA1a9d4f0323b1cf8da172fe3ebeab4984bb644c0d6
SHA25679581f3e833d3cf26fdcd59a4c87261208909dbe061127f34d57ecb34c3eaa13
SHA5124b00acb48cf0db1fa63572e84f94cf34e25e52b766e33460ed08ecd769b23c7c3f151ffca0becac759fbde83245e5256eea98bd9e056d4cca8d40bb2b644e180
-
Filesize
384KB
MD5dfd5f78a711fa92337010ecc028470b4
SHA11a389091178f2be8ce486cd860de16263f8e902e
SHA256da96f2eb74e60de791961ef3800c36a5e12202fe97ae5d2fcfc1fe404bc13c0d
SHA512a3673074919039a2dc854b0f91d1e1a69724056594e33559741f53594e0f6e61e3d99ec664d541b17f09ffdebc2de1b042eec19ca8477fac86359c703f8c9656
-
Filesize
2.5MB
MD52a78ce9f3872f5e591d643459cabe476
SHA19ac947dfc71a868bc9c2eb2bd78dfb433067682e
SHA25621a2ac44acd7a640735870eebfd04b8dc57bc66877cb5be3b929299e86a43dae
SHA51203e2cd8161a1394ee535a2ea7d197791ab715d69a02ffab98121ec5ac8150d2b17a9a32a59307042c4bbeffad7425b55efa047651de6ed39277dba80711454f9
-
Filesize
2.9MB
MD599f996079094ad472d9720b2abd57291
SHA11ff6e7cafeaf71a5debbc0bb4db9118a9d9de945
SHA256833fd615ec3e7576960a872fff5a4459b0c756338068f87341655849d1f7e1af
SHA5126a6d4034b37f9bb3b4a0b455de7485b990bf3bd3042316d7261bd2973dbe522490654045d579a6df58a4b834e04c377897eea41798e6b1f5fdbc45a2bb0d127f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
1021KB
MD54e326feeb3ebf1e3eb21eeb224345727
SHA1f156a272dbc6695cc170b6091ef8cd41db7ba040
SHA2563c60056371f82e4744185b6f2fa0c69042b1e78804685944132974dd13f3b6d9
SHA512be9420a85c82eeee685e18913a7ff152fcead72a90ddcc2bcc8ab53a4a1743ae98f49354023c0a32b3a1d919bda64b5d455f6c3a49d4842bbba4aa37c1d05d67
-
Filesize
3.0MB
MD5ad7f121646aa374af133772519375710
SHA14e85ad004aa170ed53b7818b78e0b12e042b18ea
SHA256d9865442479ec9a282ff312cd91481710f9b6e21330be30a68fa16bf36c0799f
SHA512fbe1dfd40bc2fa8c6617823d32023dba5625c5e7cb235f87b284f1166a30d64e75781e80b2586e4a6f7ada4cda9df3e17f1d61829705647c71232a2f902c81c3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD564ae0f0743418913b25d9edeec2fa7b1
SHA186f72694cf02214041d4653030d0c6d3fad50fba
SHA256aad04f2f1b68d4832049f01b4c14062b22643e8dbd2b50556d92569ef78c27a4
SHA51224755280f79b701be2071fd7ed75fda709d904b93bf21788ffd29916154132ce3e4f8d7473a7944d951ea0aa272d6089e4ee7200aa2a4dca98a3cba1aed531ef
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\datareporting\glean\pending_pings\b68e9a65-cbad-4e85-8a04-c9735868f9b8
Filesize12KB
MD567f41487dac4e7ec093be7c229f522af
SHA10c6af1543b2e549f10210cc7fcdfc308e286d153
SHA25673a86f19dbdb9c15daa914ffb70cde6bea5c782901165555373dcfcc6afadb55
SHA5120211876f7092204a217c0e1e75b5b67327ed15757fd2d84f6b7125fbbf85e92b9b6e666164b917ccc76ccc4383bc5d4803f06cc93bb20272317aa9e44919af6c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\datareporting\glean\pending_pings\c652ba80-adac-4e27-89a9-405f79976bb3
Filesize745B
MD5bcb3f7d45c65eff267f4bf66fb2a9853
SHA1916e2e6888f6a57849c68e53e5e3e4382270d0ae
SHA2561ab13831dddcde682bd59dbf56d1880f84a7f927a18bc0c0dd7dab931459b10b
SHA5120766065e89e4032f0296b691d6d7a8a04aff0720b32c02be97e6cec416dc60086e09e5e0e9b0883b1f4adf3a24581c455085c460fb0c83e09382772a9368af1a
-
Filesize
6KB
MD57635c2ff451e9c3f4eda6abd4bbb79e6
SHA15ee0c8cc6f9cd73da5574d1886a26f1f63d9b84d
SHA25607aba7f6ee3448a1175e53aa5b82ea707a3a50d990e1907c55f48ab90295805c
SHA5123a7639a5370a4d5db0eab4916634277310bd2241f15c90cbbb284397ac2c6086813c0c5759d0bddb4c87c5af827e5aa89519adc679c5fc49dfa87089f9c917d0
-
Filesize
6KB
MD5b0b38354af108ac38a9a442ba63bb85e
SHA1cadfee98a9f83a9820dedbb08c909c3208917c8a
SHA256a22dcb70839c6dcb893d29df3aea10f7b72f272d8233a0638f3426440dbb00fd
SHA512346a4408895877588c324901e00e82715e69aea093b0ebc2698d809add07aa8a67fcc2d1cf2a9c254987e50ef5b78c8341521a122a830245598efbf0abc750de
-
Filesize
5.6MB
MD5ae2a4249c8389603933df4f806546c96
SHA1a71ad1c875e0282b84451095e01d9c1709129643
SHA256cbe157a18df07d512f3e4939d048f6419163892bf0cc5d5694eaadc7809d2477
SHA5121c40ef124087b8ff3b66ddbcdbef1cd7ffcd112d137dbf0a5ff3b636642cae35b8d4f12eb38506da86ab81984edd6552dc395f072fed37d120daf064ba468cd2
-
Filesize
21KB
MD51d75e7b9f68c23a195d408cf02248119
SHA162179fc9a949d238bb221d7c2f71ba7c1680184c
SHA25667ebe168b7019627d68064043680674f9782fda7e30258748b29412c2b3d4c6b
SHA512c2ee84a9aeac34f7b51426d12f87bb35d8c3238bb26a6e14f412ea485e5bd3b8fb5b1231323d4b089cf69d8180a38ddd7fd593cc52cbdf250125ad02d66eea9d
-
Filesize
19KB
MD5d6ad0f2652460f428c0e8fc40b6f6115
SHA11a5152871abc5cf3d4868a218de665105563775e
SHA2564ef09fa6510eeebb4855b6f197b20a7a27b56368c63cc8a3d1014fa4231ab93a
SHA512ceafeee932919bc002b111d6d67b7c249c85d30da35dfbcebd1f37db51e506ac161e4ee047ff8f7bf0d08da6a7f8b97e802224920bd058f8e790e6fa0ee48b22