Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20-12-2024 08:20
Static task
static1
Behavioral task
behavioral1
Sample
e52f866a206e57b906e45d77dfad0e0a3ec7fe5cf4d127b59c37a68563c1ac10.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e52f866a206e57b906e45d77dfad0e0a3ec7fe5cf4d127b59c37a68563c1ac10.exe
Resource
win10v2004-20241007-en
General
-
Target
e52f866a206e57b906e45d77dfad0e0a3ec7fe5cf4d127b59c37a68563c1ac10.exe
-
Size
2.8MB
-
MD5
e4a2fce17d20f9501197dc633992b99c
-
SHA1
fb6c2a1c7122d61926d264aea8dc586a393a0948
-
SHA256
e52f866a206e57b906e45d77dfad0e0a3ec7fe5cf4d127b59c37a68563c1ac10
-
SHA512
3f1273c1d69b8af3a538195bda756dc2bb63df74140f4710731454fa0071e4758f129f54cbd46bcbc30afa237e7f3a261953e971da35d9e91e6a09f316a12f40
-
SSDEEP
49152:4D/Gf3HFtXn8J9i2ini7HOsuTMd/6FQcfT2JgD3:4D/Gf3nXi9i2RusuTIIQcaJgD
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://sordid-snaked.cyou/api
https://awake-weaves.cyou/api
https://wrathful-jammy.cyou/api
https://debonairnukk.xyz/api
https://diffuculttan.xyz/api
https://effecterectz.xyz/api
https://deafeninggeh.biz/api
https://immureprech.biz/api
Extracted
cryptbot
Signatures
-
Amadey family
-
Cryptbot family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 8d31a5cb1d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 8d31a5cb1d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 8d31a5cb1d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 8d31a5cb1d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 8d31a5cb1d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 8d31a5cb1d.exe -
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF dcce34c372.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e52f866a206e57b906e45d77dfad0e0a3ec7fe5cf4d127b59c37a68563c1ac10.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dcce34c372.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 513a7ba17d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ db95836a95.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8d31a5cb1d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 80b80d91a5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c400f53978.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3135d5a217.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 9608 powershell.exe 9948 powershell.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 80b80d91a5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dcce34c372.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dcce34c372.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c400f53978.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 513a7ba17d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3135d5a217.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8d31a5cb1d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e52f866a206e57b906e45d77dfad0e0a3ec7fe5cf4d127b59c37a68563c1ac10.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c400f53978.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion db95836a95.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion db95836a95.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3135d5a217.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8d31a5cb1d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 80b80d91a5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 513a7ba17d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e52f866a206e57b906e45d77dfad0e0a3ec7fe5cf4d127b59c37a68563c1ac10.exe -
Executes dropped EXE 18 IoCs
pid Process 1284 skotes.exe 1092 32cf1e3011.exe 1600 32cf1e3011.exe 1536 80b80d91a5.exe 108 6164c95d74.exe 1008 dcce34c372.exe 1324 c400f53978.exe 536 b5a13699cd.exe 1624 b5a13699cd.exe 2668 e2913520fa.exe 1608 afb806d294.exe 3012 6164c95d74.exe 9668 513a7ba17d.exe 10176 db95836a95.exe 3112 3135d5a217.exe 3740 aaaaf84c74.exe 8936 8d31a5cb1d.exe 1064 8fcf0ea571.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Wine 513a7ba17d.exe Key opened \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Wine 3135d5a217.exe Key opened \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Wine c400f53978.exe Key opened \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Wine db95836a95.exe Key opened \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Wine 8d31a5cb1d.exe Key opened \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Wine e52f866a206e57b906e45d77dfad0e0a3ec7fe5cf4d127b59c37a68563c1ac10.exe Key opened \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Wine 80b80d91a5.exe Key opened \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Wine dcce34c372.exe -
Loads dropped DLL 26 IoCs
pid Process 1380 e52f866a206e57b906e45d77dfad0e0a3ec7fe5cf4d127b59c37a68563c1ac10.exe 1284 skotes.exe 1284 skotes.exe 1092 32cf1e3011.exe 1284 skotes.exe 1284 skotes.exe 1284 skotes.exe 1284 skotes.exe 1284 skotes.exe 1284 skotes.exe 1284 skotes.exe 1284 skotes.exe 1284 skotes.exe 536 b5a13699cd.exe 1284 skotes.exe 1284 skotes.exe 108 6164c95d74.exe 1284 skotes.exe 1284 skotes.exe 1284 skotes.exe 1284 skotes.exe 1284 skotes.exe 1284 skotes.exe 1284 skotes.exe 1284 skotes.exe 1284 skotes.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 8d31a5cb1d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 8d31a5cb1d.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\db95836a95.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1018358001\\db95836a95.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\3135d5a217.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1018359001\\3135d5a217.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\aaaaf84c74.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1018360001\\aaaaf84c74.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\8d31a5cb1d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1018361001\\8d31a5cb1d.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000500000001a3ed-2400.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 1380 e52f866a206e57b906e45d77dfad0e0a3ec7fe5cf4d127b59c37a68563c1ac10.exe 1284 skotes.exe 1536 80b80d91a5.exe 1008 dcce34c372.exe 9668 513a7ba17d.exe 10176 db95836a95.exe 3112 3135d5a217.exe 8936 8d31a5cb1d.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1092 set thread context of 1600 1092 32cf1e3011.exe 35 PID 536 set thread context of 1624 536 b5a13699cd.exe 42 PID 108 set thread context of 3012 108 6164c95d74.exe 46 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job e52f866a206e57b906e45d77dfad0e0a3ec7fe5cf4d127b59c37a68563c1ac10.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 26 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 80b80d91a5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dcce34c372.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b5a13699cd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aaaaf84c74.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8fcf0ea571.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e52f866a206e57b906e45d77dfad0e0a3ec7fe5cf4d127b59c37a68563c1ac10.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6164c95d74.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b5a13699cd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6164c95d74.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3135d5a217.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage aaaaf84c74.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8d31a5cb1d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 513a7ba17d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 32cf1e3011.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language afb806d294.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language db95836a95.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language aaaaf84c74.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 32cf1e3011.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 4372 taskkill.exe 3836 taskkill.exe 3988 taskkill.exe 4092 taskkill.exe 4220 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_Classes\Local Settings firefox.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 80b80d91a5.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 80b80d91a5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 80b80d91a5.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 0f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a8090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703085300000001000000230000003021301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc30b00000001000000120000004400690067006900430065007200740000001d00000001000000100000008f76b981d528ad4770088245e2031b630300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc252000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a 80b80d91a5.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 1380 e52f866a206e57b906e45d77dfad0e0a3ec7fe5cf4d127b59c37a68563c1ac10.exe 1284 skotes.exe 1536 80b80d91a5.exe 1008 dcce34c372.exe 1008 dcce34c372.exe 1008 dcce34c372.exe 1008 dcce34c372.exe 1008 dcce34c372.exe 1008 dcce34c372.exe 1608 afb806d294.exe 9668 513a7ba17d.exe 9608 powershell.exe 3012 6164c95d74.exe 3012 6164c95d74.exe 9948 powershell.exe 10176 db95836a95.exe 3112 3135d5a217.exe 3740 aaaaf84c74.exe 3740 aaaaf84c74.exe 3740 aaaaf84c74.exe 8936 8d31a5cb1d.exe 8936 8d31a5cb1d.exe 8936 8d31a5cb1d.exe 8936 8d31a5cb1d.exe 8936 8d31a5cb1d.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 1608 afb806d294.exe Token: SeDebugPrivilege 3012 6164c95d74.exe Token: SeDebugPrivilege 9608 powershell.exe Token: SeDebugPrivilege 9948 powershell.exe Token: SeDebugPrivilege 3836 taskkill.exe Token: SeDebugPrivilege 3988 taskkill.exe Token: SeDebugPrivilege 4092 taskkill.exe Token: SeDebugPrivilege 4220 taskkill.exe Token: SeDebugPrivilege 4372 taskkill.exe Token: SeDebugPrivilege 4700 firefox.exe Token: SeDebugPrivilege 4700 firefox.exe Token: SeDebugPrivilege 8936 8d31a5cb1d.exe -
Suspicious use of FindShellTrayWindow 15 IoCs
pid Process 1380 e52f866a206e57b906e45d77dfad0e0a3ec7fe5cf4d127b59c37a68563c1ac10.exe 3740 aaaaf84c74.exe 3740 aaaaf84c74.exe 3740 aaaaf84c74.exe 3740 aaaaf84c74.exe 3740 aaaaf84c74.exe 3740 aaaaf84c74.exe 3740 aaaaf84c74.exe 4700 firefox.exe 4700 firefox.exe 4700 firefox.exe 4700 firefox.exe 3740 aaaaf84c74.exe 3740 aaaaf84c74.exe 3740 aaaaf84c74.exe -
Suspicious use of SendNotifyMessage 13 IoCs
pid Process 3740 aaaaf84c74.exe 3740 aaaaf84c74.exe 3740 aaaaf84c74.exe 3740 aaaaf84c74.exe 3740 aaaaf84c74.exe 3740 aaaaf84c74.exe 3740 aaaaf84c74.exe 4700 firefox.exe 4700 firefox.exe 4700 firefox.exe 3740 aaaaf84c74.exe 3740 aaaaf84c74.exe 3740 aaaaf84c74.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1380 wrote to memory of 1284 1380 e52f866a206e57b906e45d77dfad0e0a3ec7fe5cf4d127b59c37a68563c1ac10.exe 30 PID 1380 wrote to memory of 1284 1380 e52f866a206e57b906e45d77dfad0e0a3ec7fe5cf4d127b59c37a68563c1ac10.exe 30 PID 1380 wrote to memory of 1284 1380 e52f866a206e57b906e45d77dfad0e0a3ec7fe5cf4d127b59c37a68563c1ac10.exe 30 PID 1380 wrote to memory of 1284 1380 e52f866a206e57b906e45d77dfad0e0a3ec7fe5cf4d127b59c37a68563c1ac10.exe 30 PID 1284 wrote to memory of 1092 1284 skotes.exe 33 PID 1284 wrote to memory of 1092 1284 skotes.exe 33 PID 1284 wrote to memory of 1092 1284 skotes.exe 33 PID 1284 wrote to memory of 1092 1284 skotes.exe 33 PID 1092 wrote to memory of 1600 1092 32cf1e3011.exe 35 PID 1092 wrote to memory of 1600 1092 32cf1e3011.exe 35 PID 1092 wrote to memory of 1600 1092 32cf1e3011.exe 35 PID 1092 wrote to memory of 1600 1092 32cf1e3011.exe 35 PID 1092 wrote to memory of 1600 1092 32cf1e3011.exe 35 PID 1092 wrote to memory of 1600 1092 32cf1e3011.exe 35 PID 1092 wrote to memory of 1600 1092 32cf1e3011.exe 35 PID 1092 wrote to memory of 1600 1092 32cf1e3011.exe 35 PID 1092 wrote to memory of 1600 1092 32cf1e3011.exe 35 PID 1092 wrote to memory of 1600 1092 32cf1e3011.exe 35 PID 1284 wrote to memory of 1536 1284 skotes.exe 36 PID 1284 wrote to memory of 1536 1284 skotes.exe 36 PID 1284 wrote to memory of 1536 1284 skotes.exe 36 PID 1284 wrote to memory of 1536 1284 skotes.exe 36 PID 1284 wrote to memory of 108 1284 skotes.exe 37 PID 1284 wrote to memory of 108 1284 skotes.exe 37 PID 1284 wrote to memory of 108 1284 skotes.exe 37 PID 1284 wrote to memory of 108 1284 skotes.exe 37 PID 1284 wrote to memory of 1008 1284 skotes.exe 38 PID 1284 wrote to memory of 1008 1284 skotes.exe 38 PID 1284 wrote to memory of 1008 1284 skotes.exe 38 PID 1284 wrote to memory of 1008 1284 skotes.exe 38 PID 1284 wrote to memory of 1324 1284 skotes.exe 39 PID 1284 wrote to memory of 1324 1284 skotes.exe 39 PID 1284 wrote to memory of 1324 1284 skotes.exe 39 PID 1284 wrote to memory of 1324 1284 skotes.exe 39 PID 1284 wrote to memory of 536 1284 skotes.exe 40 PID 1284 wrote to memory of 536 1284 skotes.exe 40 PID 1284 wrote to memory of 536 1284 skotes.exe 40 PID 1284 wrote to memory of 536 1284 skotes.exe 40 PID 536 wrote to memory of 1624 536 b5a13699cd.exe 42 PID 536 wrote to memory of 1624 536 b5a13699cd.exe 42 PID 536 wrote to memory of 1624 536 b5a13699cd.exe 42 PID 536 wrote to memory of 1624 536 b5a13699cd.exe 42 PID 536 wrote to memory of 1624 536 b5a13699cd.exe 42 PID 536 wrote to memory of 1624 536 b5a13699cd.exe 42 PID 536 wrote to memory of 1624 536 b5a13699cd.exe 42 PID 536 wrote to memory of 1624 536 b5a13699cd.exe 42 PID 536 wrote to memory of 1624 536 b5a13699cd.exe 42 PID 536 wrote to memory of 1624 536 b5a13699cd.exe 42 PID 1284 wrote to memory of 2668 1284 skotes.exe 43 PID 1284 wrote to memory of 2668 1284 skotes.exe 43 PID 1284 wrote to memory of 2668 1284 skotes.exe 43 PID 1284 wrote to memory of 2668 1284 skotes.exe 43 PID 1284 wrote to memory of 2668 1284 skotes.exe 43 PID 1284 wrote to memory of 2668 1284 skotes.exe 43 PID 1284 wrote to memory of 2668 1284 skotes.exe 43 PID 1284 wrote to memory of 1608 1284 skotes.exe 44 PID 1284 wrote to memory of 1608 1284 skotes.exe 44 PID 1284 wrote to memory of 1608 1284 skotes.exe 44 PID 1284 wrote to memory of 1608 1284 skotes.exe 44 PID 108 wrote to memory of 3012 108 6164c95d74.exe 46 PID 108 wrote to memory of 3012 108 6164c95d74.exe 46 PID 108 wrote to memory of 3012 108 6164c95d74.exe 46 PID 108 wrote to memory of 3012 108 6164c95d74.exe 46 PID 108 wrote to memory of 3012 108 6164c95d74.exe 46 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\e52f866a206e57b906e45d77dfad0e0a3ec7fe5cf4d127b59c37a68563c1ac10.exe"C:\Users\Admin\AppData\Local\Temp\e52f866a206e57b906e45d77dfad0e0a3ec7fe5cf4d127b59c37a68563c1ac10.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Users\Admin\AppData\Local\Temp\1018349001\32cf1e3011.exe"C:\Users\Admin\AppData\Local\Temp\1018349001\32cf1e3011.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Users\Admin\AppData\Local\Temp\1018349001\32cf1e3011.exe"C:\Users\Admin\AppData\Local\Temp\1018349001\32cf1e3011.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1600
-
-
-
C:\Users\Admin\AppData\Local\Temp\1018350001\80b80d91a5.exe"C:\Users\Admin\AppData\Local\Temp\1018350001\80b80d91a5.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:1536
-
-
C:\Users\Admin\AppData\Local\Temp\1018351001\6164c95d74.exe"C:\Users\Admin\AppData\Local\Temp\1018351001\6164c95d74.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:108 -
C:\Users\Admin\AppData\Local\Temp\1018351001\6164c95d74.exe"C:\Users\Admin\AppData\Local\Temp\1018351001\6164c95d74.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3012
-
-
-
C:\Users\Admin\AppData\Local\Temp\1018352001\dcce34c372.exe"C:\Users\Admin\AppData\Local\Temp\1018352001\dcce34c372.exe"3⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1008
-
-
C:\Users\Admin\AppData\Local\Temp\1018353001\c400f53978.exe"C:\Users\Admin\AppData\Local\Temp\1018353001\c400f53978.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
PID:1324
-
-
C:\Users\Admin\AppData\Local\Temp\1018354001\b5a13699cd.exe"C:\Users\Admin\AppData\Local\Temp\1018354001\b5a13699cd.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Users\Admin\AppData\Local\Temp\1018354001\b5a13699cd.exe"C:\Users\Admin\AppData\Local\Temp\1018354001\b5a13699cd.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1624
-
-
-
C:\Users\Admin\AppData\Local\Temp\1018355001\e2913520fa.exe"C:\Users\Admin\AppData\Local\Temp\1018355001\e2913520fa.exe"3⤵
- Executes dropped EXE
PID:2668
-
-
C:\Users\Admin\AppData\Local\Temp\1018356001\afb806d294.exe"C:\Users\Admin\AppData\Local\Temp\1018356001\afb806d294.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1608 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath "C:\ffeentd"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:9608
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:9948
-
-
-
C:\Users\Admin\AppData\Local\Temp\1018357001\513a7ba17d.exe"C:\Users\Admin\AppData\Local\Temp\1018357001\513a7ba17d.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:9668
-
-
C:\Users\Admin\AppData\Local\Temp\1018358001\db95836a95.exe"C:\Users\Admin\AppData\Local\Temp\1018358001\db95836a95.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:10176
-
-
C:\Users\Admin\AppData\Local\Temp\1018359001\3135d5a217.exe"C:\Users\Admin\AppData\Local\Temp\1018359001\3135d5a217.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3112
-
-
C:\Users\Admin\AppData\Local\Temp\1018360001\aaaaf84c74.exe"C:\Users\Admin\AppData\Local\Temp\1018360001\aaaaf84c74.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3740 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3836
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3988
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4092
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4220
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4372
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:4636
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4700 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4700.0.1781311922\160218563" -parentBuildID 20221007134813 -prefsHandle 1220 -prefMapHandle 1212 -prefsLen 20937 -prefMapSize 233414 -appDir "C:\Program Files\Mozilla Firefox\browser" - {2eced627-39f9-4039-9519-6114057fcc7f} 4700 "\\.\pipe\gecko-crash-server-pipe.4700" 1284 122b6858 gpu6⤵PID:5192
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4700.1.130928787\2032401108" -parentBuildID 20221007134813 -prefsHandle 1488 -prefMapHandle 1484 -prefsLen 21798 -prefMapSize 233414 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b74d5e31-3781-4ee5-9206-a62bf1e845c6} 4700 "\\.\pipe\gecko-crash-server-pipe.4700" 1500 f72a58 socket6⤵PID:5400
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4700.2.471400405\1739504747" -childID 1 -isForBrowser -prefsHandle 2112 -prefMapHandle 2108 -prefsLen 21836 -prefMapSize 233414 -jsInitHandle 868 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {1a60ae4b-284d-479e-a94e-b3d555b7ee92} 4700 "\\.\pipe\gecko-crash-server-pipe.4700" 2124 1acb4258 tab6⤵PID:6112
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4700.3.1647999398\2074115129" -childID 2 -isForBrowser -prefsHandle 2848 -prefMapHandle 2800 -prefsLen 26214 -prefMapSize 233414 -jsInitHandle 868 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {cd92c5e5-9749-4d32-a618-a5ef8ddd5d61} 4700 "\\.\pipe\gecko-crash-server-pipe.4700" 2860 1d96a958 tab6⤵PID:6772
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4700.4.1919312675\1042051480" -childID 3 -isForBrowser -prefsHandle 3680 -prefMapHandle 3684 -prefsLen 26273 -prefMapSize 233414 -jsInitHandle 868 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {6cf27bb4-94a9-49a3-9e7f-003aa6796c22} 4700 "\\.\pipe\gecko-crash-server-pipe.4700" 3712 1ac49258 tab6⤵PID:7680
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4700.5.1989331930\1458983610" -childID 4 -isForBrowser -prefsHandle 3832 -prefMapHandle 3836 -prefsLen 26273 -prefMapSize 233414 -jsInitHandle 868 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {1cf2dae3-0e2b-4aa5-a8cc-2cf0217c94b7} 4700 "\\.\pipe\gecko-crash-server-pipe.4700" 3820 1ac4a758 tab6⤵PID:7712
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4700.6.41285894\413962731" -childID 5 -isForBrowser -prefsHandle 3900 -prefMapHandle 3844 -prefsLen 26273 -prefMapSize 233414 -jsInitHandle 868 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9d791210-4062-4187-9c74-23fe6c84d2d1} 4700 "\\.\pipe\gecko-crash-server-pipe.4700" 3888 1ac4aa58 tab6⤵PID:7884
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1018361001\8d31a5cb1d.exe"C:\Users\Admin\AppData\Local\Temp\1018361001\8d31a5cb1d.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:8936
-
-
C:\Users\Admin\AppData\Local\Temp\1018362001\8fcf0ea571.exe"C:\Users\Admin\AppData\Local\Temp\1018362001\8fcf0ea571.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1064
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
3Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HHT5LGG0\download[1].htm
Filesize1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\activity-stream.discovery_stream.json.tmp
Filesize26KB
MD583fadfa31d1d73edaa7377f5dad6cfff
SHA1666753468fcee1944523585701ca09b00fc9499f
SHA2569e4224bb13a95f79456bb7848fd12e1e9dc799fb8b16fab40572dc60d48bc80f
SHA51245608be578defd0727ce608684bed3d0286efde366f18e8816a754c712c7c09b6dcd85196b59f212232fd625da42d0cf7d0ea1299a9b812d67982936afee9313
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
758KB
MD5afd936e441bf5cbdb858e96833cc6ed3
SHA13491edd8c7caf9ae169e21fb58bccd29d95aefef
SHA256c6491d7a6d70c7c51baca7436464667b4894e4989fa7c5e05068dde4699e1cbf
SHA512928c15a1eda602b2a66a53734f3f563ab9626882104e30ee2bf5106cfd6e08ec54f96e3063f1ab89bf13be2c8822a8419f5d8ee0a3583a4c479785226051a325
-
Filesize
1.8MB
MD525fb9c54265bbacc7a055174479f0b70
SHA14af069a2ec874703a7e29023d23a1ada491b584e
SHA256552f8be2c6b2208a89c728f68488930c661b3a06c35a20d133ef7d3c63a86b9c
SHA5127dfd9e0f3fa2d68a6ce8c952e3b755559db73bb7a06c95ad6ed8ac16dedb49be8b8337afc07c9c682f0c4be9db291a551286353e2e2b624223487dc1c8b54668
-
Filesize
1.1MB
MD5ef08a45833a7d881c90ded1952f96cb4
SHA1f04aeeb63a1409bd916558d2c40fab8a5ed8168b
SHA25633c236dc81af2a47d595731d6fa47269b2874b281152530fdffdda9cbeb3b501
SHA51274e84f710c90121527f06d453e9286910f2e8b6ac09d2aeb4ab1f0ead23ea9b410c5d1074d8bc759bc3e766b5bc77d156756c7df093ba94093107393290ced97
-
Filesize
4.3MB
MD567844ee11cdf53db1185db90d33cf907
SHA133dc77a1ae23d6a5bc0da0429ad3f0f855c8d4d9
SHA256f00b4916dfb8458f46a8e4d556884b185676d28d3253be0f561db7d1f9bf3c09
SHA512f317adaa600efbe4db4fc630a8d971328b40e44c6b94fdc5bc8aafcf1ad47626a94db815dbf62e655de4600ba4b89651ad76ff7df71ec39543ca301f94524a76
-
Filesize
4.3MB
MD52ba7ee5357b8762915d320630e9a59b7
SHA1f4995defaafe3b084242e2b9f382c7b379938420
SHA2569249b72e3a0443ec9df0569d0a3fbe76c52d21c1b5d69f9dfb41d40b819e3181
SHA5126bd830e6c4aa7fce70f7dd0ca2ea5f99ae5bda4374a318a9595285e57f81ffa92a19f0e9e6c4b025252b4a54afae10a18c3182a006827791e79af98485d1c4b8
-
Filesize
791KB
MD5e8af4d0d0b47ac68d762b7f288ae8e6e
SHA11d65f31526cc20ab41d6b1625d6674d7f13e326c
SHA256b83449768e7af68867c8bc42b19ff012722d88ea66aef69df48661e63e0eb15e
SHA51280fad90314ff639f538a72c5e4ca2bf9ae52b9309caa7cd6f87d61791505bb3612b7f3190ab9b67348c5d71f4d29bb9d101e3f66d525eb9b5e2060a10b2d187a
-
Filesize
1.3MB
MD5669ed3665495a4a52029ff680ec8eba9
SHA17785e285365a141e307931ca4c4ef00b7ecc8986
SHA2562d2d405409b128eea72a496ccff0ed56f9ed87ee2564ae4815b4b116d4fb74d6
SHA512bedc8f7c1894fc64cdd00ebc58b434b7d931e52c198a0fa55f16f4e3d44a7dc4643eaa78ec55a43cc360571345cd71d91a64037a135663e72eed334fe77a21e6
-
Filesize
21KB
MD504f57c6fb2b2cd8dcc4b38e4a93d4366
SHA161770495aa18d480f70b654d1f57998e5bd8c885
SHA25651e4d0cbc184b8abfa6d84e219317cf81bd542286a7cc602c87eb703a39627c2
SHA51253f95e98a5eca472ed6b1dfd6fecd1e28ea66967a1b3aa109fe911dbb935f1abf327438d4b2fe72cf7a0201281e9f56f4548f965b96e3916b9142257627e6ccd
-
Filesize
1.9MB
MD569a94137bf10488dd980bc600b3735c8
SHA1da3d908540863d0466fb2d7acab950afaf47d75e
SHA256b53ffd4fc8c3b8759852c9742c3e26b4e3b8ba115ca15229a235db74f59a82db
SHA5122c4737d12aaf57967b0ed3aa224b6e836fa4adc25438ebd795cdb1204e4357f24ab5872bb9d8d47ef34f8083e0dd48e34fb3d53498cf50c8fdd48e36c22a81bf
-
Filesize
1.8MB
MD5c2ee21e005182322d1792a22392aa6c9
SHA16ef13b85b674e6bd5069982c3088f6cc6f5bbfa3
SHA256e712d62ab5c62709920cff6b910d773221a97bd3bb8c9f2e5551bc8b7ffab74e
SHA5125a76b62abe137041871794a24096a9b90fda5d3d87f77d48fc7f68151f3850019e549c870043d6b271a4188de2e27157997630aef2de0a23aa394313e2a38bc6
-
Filesize
2.8MB
MD51fd791df8d70ca8540b4692ada3b53ca
SHA111c2de8866b3718e9517ad4d712b369cc4fc3211
SHA2564ba0bbd1ee2428d4122ad9a8449429240e0ae2d27931b05827b76fc6c5075cdb
SHA51213c9a6dbc97544bba153f43b37541d25d4ed12483e59ac469790e04fdbe87ad8351ec2a0a14c3dc1c4b3933408cc7ae9a6225eef8519442ac7ca0ccf89b2226b
-
Filesize
947KB
MD5c6b3389b5f923e3fde254209e8dd9c8a
SHA19b2cff213550c79f358b7c7e1b32390cea55d342
SHA256492722a0f847204c4253be5a4ec7aac28ab9b0138dfaa0af17c57adabff6f0be
SHA5125f0d31a4190b8b85662799a78b4218958907e926f1abd648de5deb987a4f7d53c0b1586ab364865339460e897233df318bc851a806196693b2843fa86b897b58
-
Filesize
2.7MB
MD5430b6fcde50800b262ac29d690d8f20a
SHA1c48f996d0bc7de9b94fdd606822be1706cb7798c
SHA2563febcbdf5a0930a2e485dd30f6dec2613e8c18d0f897c1b17dc27a2c4bef772f
SHA5120d5ae71196859a35367af04b6115abdf5371ca69d88afd6a8e4a00a94e14e2a2d3f8599066329773e921b438ee650558fdcf23564f432b640229a3a2baaad930
-
Filesize
3.3MB
MD53f824ac5c7cfa316e253b0d11841806e
SHA1838685a95b78a22c1cc9de92108f7781287d7fab
SHA256d4249261b7fdbb2db4aab5ac98b93e07478c791335aeba92bee0f806c88c122a
SHA5125b6f950574af44785a8edf860d3b74494a36f490886977386e0869e08ebf166fa9940ebbd7797309a34eb2af08beb20fd39cc397b8a489839dfa642e84eedefc
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
2.8MB
MD5e4a2fce17d20f9501197dc633992b99c
SHA1fb6c2a1c7122d61926d264aea8dc586a393a0948
SHA256e52f866a206e57b906e45d77dfad0e0a3ec7fe5cf4d127b59c37a68563c1ac10
SHA5123f1273c1d69b8af3a538195bda756dc2bb63df74140f4710731454fa0071e4758f129f54cbd46bcbc30afa237e7f3a261953e971da35d9e91e6a09f316a12f40
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD566305b8a4e35e992daaccbb7a0643a0d
SHA13e893c52beaa311f7737e9cd2927c3496a11081a
SHA256c3ac7de32f91721d588336c1b26cff016559b4319bdf3c63515ef372d37cc0c2
SHA512b3d258143520b0f3427e979e285699ab2ae65fc5ca852042d9439747388146e9205141a321d81efb6578c76d97ded184fc34e77fa446fb27731c7afbd368bdbf
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD5ba1a28c7f935ac8db9657207e2d185de
SHA163f7a85e2cf139cac6474a3d964bdbcf17e18f28
SHA256cc1950218af37f677e9c966a3d845a86349c799fbec5948ac7a854715184371f
SHA512e76fb8c0caf517c98aca2d3298fe2ce7490797631f2da936e69f7e2e80a3f8a7af8856ba87e3193c97422cb1a62b7a70c5da4a8ecebb6493bcf97f30022a6d71
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\datareporting\glean\pending_pings\645660ce-6b9e-4b99-8d8a-a2fc63ac1c82
Filesize745B
MD518607aee3b34f715732df5f8ad861778
SHA1f7299c813ea75346ef4684951d28d938937d452b
SHA2567d2f0e7125b30a04a24e8e01fbee8f96a589ad5a3fc92a940f481545920356e9
SHA51281518c8c795f0f581a87cac2efdffbe2b4a521bfc0e412788a6f49424be517488ae64a48d8ba9065b3683345558d74ee16ec50ac4e02056032d70e2e2d6473e1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\datareporting\glean\pending_pings\7935eaf7-f72d-49b2-b97a-3ab53d51df1b
Filesize11KB
MD5f2984ca5b1b4febb4b859a7e890cf867
SHA1d40478dbca5bb41c55679658c0d76736f0eacd45
SHA256b7c53429ff243fded21f6d358d19da0d1a33919b485262c2b03321e3484b8529
SHA5122c8cbb014b1e84e0de05435b04d4bcc3d90c1ac53a078b941c4bf14f77e53ce92a3f979cc430d43ccf0ffba9cbf150a55d0c11b3c9fba8f7b9e6d55229648365
-
Filesize
6KB
MD5fcdb5982aa6161b5ac58f4346ac0849e
SHA100b99951ec8ffa139d6e995083e3589258390887
SHA256114eea0b152d64d863ecf6909771bb59ba58733f8d00755cc87a9b9783b52f60
SHA5127a01e03618c9a271a0485daede78f4fb8bd368e0d4e4efc8f19f05a68904afa5eaf976a514ca2affb3429ab4c6f723d13419646d59b680f4b1fa519a4848fad9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD5fff4911a000731d52f731709d4779525
SHA1beb68ffef32c455446198657b8730c1d8e319ba6
SHA256850359cb26cfbfbc3e95a7f34bf5733710336d3c0fd6015a954edd83a20f3eb7
SHA5127bae7a7e83de77dab054f5573a24824439037822a18f0ca73c5403cb3ab039e8e6f975ef620bd232b224f53966a89bab86a992ee3c7547c960ef33653a7d14ab
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize184KB
MD53dc733f51b6c47c0e57ae7035b9abacf
SHA1d4c28a6f9d4bae9e297440a46726a2cb3e2504ba
SHA256aafa700fb884f14becaf86a0eb9df79dfa15885b2ebe11cabe5f48a3a5d9e0e1
SHA512e02670f6fa626a21ad150e0e0e589ba9f1f7a1fb921dc28f4117dc0a30a337b9c9b165dd0a30da864fe4dbdf130372e846648792a0bcf5aad4e8d28118101067