Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-12-2024 11:10
Static task
static1
Behavioral task
behavioral1
Sample
6b6ee9cae47a7d7d51218397669ea2644853643e8d7557b20a90dc49e203893e_Sigmanly.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6b6ee9cae47a7d7d51218397669ea2644853643e8d7557b20a90dc49e203893e_Sigmanly.exe
Resource
win10v2004-20241007-en
General
-
Target
6b6ee9cae47a7d7d51218397669ea2644853643e8d7557b20a90dc49e203893e_Sigmanly.exe
-
Size
2.9MB
-
MD5
dac73e7813dc3500e5f677b5f31191df
-
SHA1
bf5eaa68905a19d7cda4cc824267d5fbfc27785a
-
SHA256
6b6ee9cae47a7d7d51218397669ea2644853643e8d7557b20a90dc49e203893e
-
SHA512
7e26aa8fa617887d322ff823d6133dc677cd6c7e5ff2d1b14f6db689dff185e4f668802037bcd38e2134965892f71aabb4b274ae5568adb6e2ad065f93d593ba
-
SSDEEP
49152:CdKtEEZolFDH6eU4kCfdnZlAVVXmZUiUHHUw0aAVP:ntEEZuFDaeU4kCfhZloXmVy0
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://sordid-snaked.cyou/api
https://awake-weaves.cyou/api
https://wrathful-jammy.cyou/api
https://debonairnukk.xyz/api
https://diffuculttan.xyz/api
https://effecterectz.xyz/api
https://deafeninggeh.biz/api
https://immureprech.biz/api
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Detect Vidar Stealer 3 IoCs
resource yara_rule behavioral2/files/0x000600000001daa5-2497.dat family_vidar_v7 behavioral2/memory/4316-2501-0x0000000000400000-0x0000000000639000-memory.dmp family_vidar_v7 behavioral2/memory/4316-2581-0x0000000000400000-0x0000000000639000-memory.dmp family_vidar_v7 -
Gcleaner family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 52d6855ee3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 52d6855ee3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 52d6855ee3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 52d6855ee3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 52d6855ee3.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 52d6855ee3.exe -
Stealc family
-
Vidar family
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF 47d673e677.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 12 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5d6ab90cc5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ddcb090c9a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 731c7ee537.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6b6ee9cae47a7d7d51218397669ea2644853643e8d7557b20a90dc49e203893e_Sigmanly.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 278cfd2587.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b14ea5fb12.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 52d6855ee3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 47d673e677.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4952 powershell.exe 4828 powershell.exe 4732 powershell.exe 4436 powershell.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 24 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 278cfd2587.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 47d673e677.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ddcb090c9a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b14ea5fb12.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b14ea5fb12.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 52d6855ee3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 52d6855ee3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6b6ee9cae47a7d7d51218397669ea2644853643e8d7557b20a90dc49e203893e_Sigmanly.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 47d673e677.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 278cfd2587.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 731c7ee537.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ddcb090c9a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 731c7ee537.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6b6ee9cae47a7d7d51218397669ea2644853643e8d7557b20a90dc49e203893e_Sigmanly.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5d6ab90cc5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5d6ab90cc5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 534a7c06a37242ea980153c8a71794c4.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 111e246ae43f4db3b1169b01ddaeddd5.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 6b6ee9cae47a7d7d51218397669ea2644853643e8d7557b20a90dc49e203893e_Sigmanly.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 3638cfc73c.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation acfce8c3fe.exe -
Executes dropped EXE 26 IoCs
pid Process 3336 skotes.exe 5052 c4de8727c5.exe 2036 3638cfc73c.exe 1568 79b6f4cab4.exe 3308 skotes.exe 996 79b6f4cab4.exe 4848 5d6ab90cc5.exe 116 a69515003e0643aeb56a1cdbfc2c2295.exe 1668 c4de8727c5.exe 4900 skotes.exe 4580 cda9f7a078.exe 3956 47d673e677.exe 5068 1ca1dcbec5.exe 2448 1ca1dcbec5.exe 1344 60e4f72928.exe 4092 acfce8c3fe.exe 5008 278cfd2587.exe 3408 cda9f7a078.exe 5048 ddcb090c9a.exe 4316 111e246ae43f4db3b1169b01ddaeddd5.exe 4348 534a7c06a37242ea980153c8a71794c4.exe 5332 731c7ee537.exe 6356 b14ea5fb12.exe 4272 2771d3d7e8.exe 7128 52d6855ee3.exe 5508 skotes.exe -
Identifies Wine through registry keys 2 TTPs 12 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 731c7ee537.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 5d6ab90cc5.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine ddcb090c9a.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 47d673e677.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 278cfd2587.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine b14ea5fb12.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 52d6855ee3.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 6b6ee9cae47a7d7d51218397669ea2644853643e8d7557b20a90dc49e203893e_Sigmanly.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 52d6855ee3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 52d6855ee3.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\52d6855ee3.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1018485001\\52d6855ee3.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\731c7ee537.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1018482001\\731c7ee537.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b14ea5fb12.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1018483001\\b14ea5fb12.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2771d3d7e8.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1018484001\\2771d3d7e8.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 57 raw.githubusercontent.com 58 raw.githubusercontent.com 156 raw.githubusercontent.com 157 raw.githubusercontent.com -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000023c75-2720.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 20 IoCs
pid Process 4860 6b6ee9cae47a7d7d51218397669ea2644853643e8d7557b20a90dc49e203893e_Sigmanly.exe 3336 skotes.exe 3308 skotes.exe 4848 5d6ab90cc5.exe 116 a69515003e0643aeb56a1cdbfc2c2295.exe 116 a69515003e0643aeb56a1cdbfc2c2295.exe 116 a69515003e0643aeb56a1cdbfc2c2295.exe 116 a69515003e0643aeb56a1cdbfc2c2295.exe 116 a69515003e0643aeb56a1cdbfc2c2295.exe 116 a69515003e0643aeb56a1cdbfc2c2295.exe 4900 skotes.exe 116 a69515003e0643aeb56a1cdbfc2c2295.exe 116 a69515003e0643aeb56a1cdbfc2c2295.exe 3956 47d673e677.exe 5008 278cfd2587.exe 5048 ddcb090c9a.exe 5332 731c7ee537.exe 6356 b14ea5fb12.exe 7128 52d6855ee3.exe 5508 skotes.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1568 set thread context of 996 1568 79b6f4cab4.exe 101 PID 5052 set thread context of 1668 5052 c4de8727c5.exe 114 PID 5068 set thread context of 2448 5068 1ca1dcbec5.exe 121 PID 4580 set thread context of 3408 4580 cda9f7a078.exe 132 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 6b6ee9cae47a7d7d51218397669ea2644853643e8d7557b20a90dc49e203893e_Sigmanly.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 36 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6b6ee9cae47a7d7d51218397669ea2644853643e8d7557b20a90dc49e203893e_Sigmanly.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3638cfc73c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 79b6f4cab4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cda9f7a078.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cda9f7a078.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 111e246ae43f4db3b1169b01ddaeddd5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1ca1dcbec5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 731c7ee537.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c4de8727c5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5d6ab90cc5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language acfce8c3fe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 278cfd2587.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a69515003e0643aeb56a1cdbfc2c2295.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 60e4f72928.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddcb090c9a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c4de8727c5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1ca1dcbec5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 2771d3d7e8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 47d673e677.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2771d3d7e8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 79b6f4cab4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b14ea5fb12.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 2771d3d7e8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 52d6855ee3.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 111e246ae43f4db3b1169b01ddaeddd5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 111e246ae43f4db3b1169b01ddaeddd5.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 5180 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Kills process with taskkill 5 IoCs
pid Process 2568 taskkill.exe 3932 taskkill.exe 6152 taskkill.exe 5600 taskkill.exe 5928 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 4860 6b6ee9cae47a7d7d51218397669ea2644853643e8d7557b20a90dc49e203893e_Sigmanly.exe 4860 6b6ee9cae47a7d7d51218397669ea2644853643e8d7557b20a90dc49e203893e_Sigmanly.exe 3336 skotes.exe 3336 skotes.exe 2036 3638cfc73c.exe 4952 powershell.exe 4952 powershell.exe 3308 skotes.exe 3308 skotes.exe 4828 powershell.exe 4828 powershell.exe 4848 5d6ab90cc5.exe 4848 5d6ab90cc5.exe 4900 skotes.exe 4900 skotes.exe 3956 47d673e677.exe 3956 47d673e677.exe 3956 47d673e677.exe 3956 47d673e677.exe 3956 47d673e677.exe 3956 47d673e677.exe 3956 47d673e677.exe 3956 47d673e677.exe 3956 47d673e677.exe 3956 47d673e677.exe 1344 60e4f72928.exe 1344 60e4f72928.exe 4092 acfce8c3fe.exe 4732 powershell.exe 4732 powershell.exe 1344 60e4f72928.exe 4436 powershell.exe 4436 powershell.exe 5008 278cfd2587.exe 5008 278cfd2587.exe 5048 ddcb090c9a.exe 5048 ddcb090c9a.exe 3408 cda9f7a078.exe 3408 cda9f7a078.exe 5332 731c7ee537.exe 5332 731c7ee537.exe 4316 111e246ae43f4db3b1169b01ddaeddd5.exe 4316 111e246ae43f4db3b1169b01ddaeddd5.exe 6712 msedge.exe 6712 msedge.exe 2304 msedge.exe 2304 msedge.exe 6356 b14ea5fb12.exe 6356 b14ea5fb12.exe 5076 identity_helper.exe 5076 identity_helper.exe 4272 2771d3d7e8.exe 4272 2771d3d7e8.exe 7128 52d6855ee3.exe 7128 52d6855ee3.exe 4272 2771d3d7e8.exe 4272 2771d3d7e8.exe 7128 52d6855ee3.exe 7128 52d6855ee3.exe 7128 52d6855ee3.exe 5508 skotes.exe 5508 skotes.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeDebugPrivilege 5052 c4de8727c5.exe Token: SeDebugPrivilege 2036 3638cfc73c.exe Token: SeDebugPrivilege 4952 powershell.exe Token: SeDebugPrivilege 4828 powershell.exe Token: SeDebugPrivilege 4092 acfce8c3fe.exe Token: SeDebugPrivilege 4732 powershell.exe Token: SeDebugPrivilege 4436 powershell.exe Token: SeDebugPrivilege 3408 cda9f7a078.exe Token: SeDebugPrivilege 4348 534a7c06a37242ea980153c8a71794c4.exe Token: SeDebugPrivilege 2568 taskkill.exe Token: SeDebugPrivilege 3932 taskkill.exe Token: SeDebugPrivilege 6152 taskkill.exe Token: SeDebugPrivilege 5600 taskkill.exe Token: SeDebugPrivilege 5928 taskkill.exe Token: SeDebugPrivilege 5144 firefox.exe Token: SeDebugPrivilege 5144 firefox.exe Token: SeDebugPrivilege 7128 52d6855ee3.exe -
Suspicious use of FindShellTrayWindow 58 IoCs
pid Process 4860 6b6ee9cae47a7d7d51218397669ea2644853643e8d7557b20a90dc49e203893e_Sigmanly.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 4272 2771d3d7e8.exe 4272 2771d3d7e8.exe 4272 2771d3d7e8.exe 4272 2771d3d7e8.exe 4272 2771d3d7e8.exe 4272 2771d3d7e8.exe 4272 2771d3d7e8.exe 5144 firefox.exe 5144 firefox.exe 5144 firefox.exe 5144 firefox.exe 4272 2771d3d7e8.exe 5144 firefox.exe 5144 firefox.exe 5144 firefox.exe 5144 firefox.exe 5144 firefox.exe 5144 firefox.exe 5144 firefox.exe 5144 firefox.exe 5144 firefox.exe 5144 firefox.exe 5144 firefox.exe 5144 firefox.exe 5144 firefox.exe 5144 firefox.exe 5144 firefox.exe 5144 firefox.exe 5144 firefox.exe 4272 2771d3d7e8.exe 4272 2771d3d7e8.exe 4272 2771d3d7e8.exe -
Suspicious use of SendNotifyMessage 55 IoCs
pid Process 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 4272 2771d3d7e8.exe 4272 2771d3d7e8.exe 4272 2771d3d7e8.exe 4272 2771d3d7e8.exe 4272 2771d3d7e8.exe 4272 2771d3d7e8.exe 4272 2771d3d7e8.exe 5144 firefox.exe 5144 firefox.exe 5144 firefox.exe 5144 firefox.exe 4272 2771d3d7e8.exe 5144 firefox.exe 5144 firefox.exe 5144 firefox.exe 5144 firefox.exe 5144 firefox.exe 5144 firefox.exe 5144 firefox.exe 5144 firefox.exe 5144 firefox.exe 5144 firefox.exe 5144 firefox.exe 5144 firefox.exe 5144 firefox.exe 5144 firefox.exe 5144 firefox.exe 5144 firefox.exe 4272 2771d3d7e8.exe 4272 2771d3d7e8.exe 4272 2771d3d7e8.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 116 a69515003e0643aeb56a1cdbfc2c2295.exe 5144 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4860 wrote to memory of 3336 4860 6b6ee9cae47a7d7d51218397669ea2644853643e8d7557b20a90dc49e203893e_Sigmanly.exe 83 PID 4860 wrote to memory of 3336 4860 6b6ee9cae47a7d7d51218397669ea2644853643e8d7557b20a90dc49e203893e_Sigmanly.exe 83 PID 4860 wrote to memory of 3336 4860 6b6ee9cae47a7d7d51218397669ea2644853643e8d7557b20a90dc49e203893e_Sigmanly.exe 83 PID 3336 wrote to memory of 5052 3336 skotes.exe 84 PID 3336 wrote to memory of 5052 3336 skotes.exe 84 PID 3336 wrote to memory of 5052 3336 skotes.exe 84 PID 3336 wrote to memory of 2036 3336 skotes.exe 92 PID 3336 wrote to memory of 2036 3336 skotes.exe 92 PID 3336 wrote to memory of 2036 3336 skotes.exe 92 PID 2036 wrote to memory of 4952 2036 3638cfc73c.exe 94 PID 2036 wrote to memory of 4952 2036 3638cfc73c.exe 94 PID 2036 wrote to memory of 4952 2036 3638cfc73c.exe 94 PID 3336 wrote to memory of 1568 3336 skotes.exe 98 PID 3336 wrote to memory of 1568 3336 skotes.exe 98 PID 3336 wrote to memory of 1568 3336 skotes.exe 98 PID 1568 wrote to memory of 996 1568 79b6f4cab4.exe 101 PID 1568 wrote to memory of 996 1568 79b6f4cab4.exe 101 PID 1568 wrote to memory of 996 1568 79b6f4cab4.exe 101 PID 1568 wrote to memory of 996 1568 79b6f4cab4.exe 101 PID 1568 wrote to memory of 996 1568 79b6f4cab4.exe 101 PID 1568 wrote to memory of 996 1568 79b6f4cab4.exe 101 PID 1568 wrote to memory of 996 1568 79b6f4cab4.exe 101 PID 1568 wrote to memory of 996 1568 79b6f4cab4.exe 101 PID 1568 wrote to memory of 996 1568 79b6f4cab4.exe 101 PID 2036 wrote to memory of 4828 2036 3638cfc73c.exe 106 PID 2036 wrote to memory of 4828 2036 3638cfc73c.exe 106 PID 2036 wrote to memory of 4828 2036 3638cfc73c.exe 106 PID 3336 wrote to memory of 4848 3336 skotes.exe 108 PID 3336 wrote to memory of 4848 3336 skotes.exe 108 PID 3336 wrote to memory of 4848 3336 skotes.exe 108 PID 2036 wrote to memory of 116 2036 3638cfc73c.exe 112 PID 2036 wrote to memory of 116 2036 3638cfc73c.exe 112 PID 2036 wrote to memory of 116 2036 3638cfc73c.exe 112 PID 5052 wrote to memory of 1668 5052 c4de8727c5.exe 114 PID 5052 wrote to memory of 1668 5052 c4de8727c5.exe 114 PID 5052 wrote to memory of 1668 5052 c4de8727c5.exe 114 PID 5052 wrote to memory of 1668 5052 c4de8727c5.exe 114 PID 5052 wrote to memory of 1668 5052 c4de8727c5.exe 114 PID 5052 wrote to memory of 1668 5052 c4de8727c5.exe 114 PID 5052 wrote to memory of 1668 5052 c4de8727c5.exe 114 PID 5052 wrote to memory of 1668 5052 c4de8727c5.exe 114 PID 5052 wrote to memory of 1668 5052 c4de8727c5.exe 114 PID 3336 wrote to memory of 4580 3336 skotes.exe 117 PID 3336 wrote to memory of 4580 3336 skotes.exe 117 PID 3336 wrote to memory of 4580 3336 skotes.exe 117 PID 3336 wrote to memory of 3956 3336 skotes.exe 118 PID 3336 wrote to memory of 3956 3336 skotes.exe 118 PID 3336 wrote to memory of 3956 3336 skotes.exe 118 PID 3336 wrote to memory of 5068 3336 skotes.exe 119 PID 3336 wrote to memory of 5068 3336 skotes.exe 119 PID 3336 wrote to memory of 5068 3336 skotes.exe 119 PID 5068 wrote to memory of 2448 5068 1ca1dcbec5.exe 121 PID 5068 wrote to memory of 2448 5068 1ca1dcbec5.exe 121 PID 5068 wrote to memory of 2448 5068 1ca1dcbec5.exe 121 PID 5068 wrote to memory of 2448 5068 1ca1dcbec5.exe 121 PID 5068 wrote to memory of 2448 5068 1ca1dcbec5.exe 121 PID 5068 wrote to memory of 2448 5068 1ca1dcbec5.exe 121 PID 5068 wrote to memory of 2448 5068 1ca1dcbec5.exe 121 PID 5068 wrote to memory of 2448 5068 1ca1dcbec5.exe 121 PID 5068 wrote to memory of 2448 5068 1ca1dcbec5.exe 121 PID 3336 wrote to memory of 1344 3336 skotes.exe 123 PID 3336 wrote to memory of 1344 3336 skotes.exe 123 PID 3336 wrote to memory of 1344 3336 skotes.exe 123 PID 3336 wrote to memory of 4092 3336 skotes.exe 124 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\6b6ee9cae47a7d7d51218397669ea2644853643e8d7557b20a90dc49e203893e_Sigmanly.exe"C:\Users\Admin\AppData\Local\Temp\6b6ee9cae47a7d7d51218397669ea2644853643e8d7557b20a90dc49e203893e_Sigmanly.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3336 -
C:\Users\Admin\AppData\Local\Temp\1018469001\c4de8727c5.exe"C:\Users\Admin\AppData\Local\Temp\1018469001\c4de8727c5.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Users\Admin\AppData\Local\Temp\1018469001\c4de8727c5.exe"C:\Users\Admin\AppData\Local\Temp\1018469001\c4de8727c5.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1668
-
-
-
C:\Users\Admin\AppData\Local\Temp\1018471001\3638cfc73c.exe"C:\Users\Admin\AppData\Local\Temp\1018471001\3638cfc73c.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath "C:\onismephiz"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4952
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4828
-
-
C:\onismephiz\a69515003e0643aeb56a1cdbfc2c2295.exe"C:\onismephiz\a69515003e0643aeb56a1cdbfc2c2295.exe"4⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:116
-
-
-
C:\Users\Admin\AppData\Local\Temp\1018472001\79b6f4cab4.exe"C:\Users\Admin\AppData\Local\Temp\1018472001\79b6f4cab4.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Users\Admin\AppData\Local\Temp\1018472001\79b6f4cab4.exe"C:\Users\Admin\AppData\Local\Temp\1018472001\79b6f4cab4.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:996
-
-
-
C:\Users\Admin\AppData\Local\Temp\1018473001\5d6ab90cc5.exe"C:\Users\Admin\AppData\Local\Temp\1018473001\5d6ab90cc5.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4848
-
-
C:\Users\Admin\AppData\Local\Temp\1018475001\cda9f7a078.exe"C:\Users\Admin\AppData\Local\Temp\1018475001\cda9f7a078.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4580 -
C:\Users\Admin\AppData\Local\Temp\1018475001\cda9f7a078.exe"C:\Users\Admin\AppData\Local\Temp\1018475001\cda9f7a078.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3408
-
-
-
C:\Users\Admin\AppData\Local\Temp\1018476001\47d673e677.exe"C:\Users\Admin\AppData\Local\Temp\1018476001\47d673e677.exe"3⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3956
-
-
C:\Users\Admin\AppData\Local\Temp\1018477001\1ca1dcbec5.exe"C:\Users\Admin\AppData\Local\Temp\1018477001\1ca1dcbec5.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Users\Admin\AppData\Local\Temp\1018477001\1ca1dcbec5.exe"C:\Users\Admin\AppData\Local\Temp\1018477001\1ca1dcbec5.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2448
-
-
-
C:\Users\Admin\AppData\Local\Temp\1018478001\60e4f72928.exe"C:\Users\Admin\AppData\Local\Temp\1018478001\60e4f72928.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1344
-
-
C:\Users\Admin\AppData\Local\Temp\1018479001\acfce8c3fe.exe"C:\Users\Admin\AppData\Local\Temp\1018479001\acfce8c3fe.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4092 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath "C:\bsrvl"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4732
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4436
-
-
C:\bsrvl\111e246ae43f4db3b1169b01ddaeddd5.exe"C:\bsrvl\111e246ae43f4db3b1169b01ddaeddd5.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4316 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\bsrvl\111e246ae43f4db3b1169b01ddaeddd5.exe" & rd /s /q "C:\ProgramData\8YMO89ZUA1NY" & exit5⤵
- System Location Discovery: System Language Discovery
PID:6440 -
C:\Windows\SysWOW64\timeout.exetimeout /t 106⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:5180
-
-
-
-
C:\bsrvl\534a7c06a37242ea980153c8a71794c4.exe"C:\bsrvl\534a7c06a37242ea980153c8a71794c4.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4348 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://apps.microsoft.com/store/detail/9MSZ40SLW145?ocid=&referrer=psi5⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2304 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9c90446f8,0x7ff9c9044708,0x7ff9c90447186⤵PID:1100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,14385667945250372816,2341039799386586439,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:26⤵PID:6696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,14385667945250372816,2341039799386586439,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:36⤵
- Suspicious behavior: EnumeratesProcesses
PID:6712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,14385667945250372816,2341039799386586439,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:86⤵PID:6844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,14385667945250372816,2341039799386586439,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:16⤵PID:7104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,14385667945250372816,2341039799386586439,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:16⤵PID:1424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,14385667945250372816,2341039799386586439,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5276 /prefetch:86⤵PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,14385667945250372816,2341039799386586439,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5276 /prefetch:86⤵
- Suspicious behavior: EnumeratesProcesses
PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,14385667945250372816,2341039799386586439,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:16⤵PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,14385667945250372816,2341039799386586439,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:16⤵PID:1828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,14385667945250372816,2341039799386586439,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3976 /prefetch:16⤵PID:5256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,14385667945250372816,2341039799386586439,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5540 /prefetch:16⤵PID:5204
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1018480001\278cfd2587.exe"C:\Users\Admin\AppData\Local\Temp\1018480001\278cfd2587.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5008
-
-
C:\Users\Admin\AppData\Local\Temp\1018481001\ddcb090c9a.exe"C:\Users\Admin\AppData\Local\Temp\1018481001\ddcb090c9a.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5048
-
-
C:\Users\Admin\AppData\Local\Temp\1018482001\731c7ee537.exe"C:\Users\Admin\AppData\Local\Temp\1018482001\731c7ee537.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5332
-
-
C:\Users\Admin\AppData\Local\Temp\1018483001\b14ea5fb12.exe"C:\Users\Admin\AppData\Local\Temp\1018483001\b14ea5fb12.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:6356
-
-
C:\Users\Admin\AppData\Local\Temp\1018484001\2771d3d7e8.exe"C:\Users\Admin\AppData\Local\Temp\1018484001\2771d3d7e8.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4272 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2568
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3932
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6152
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5600
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5928
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:6016
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:5144 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1984 -parentBuildID 20240401114208 -prefsHandle 1912 -prefMapHandle 1904 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {dd374f6d-86c2-44c7-ab29-4ea402f8e168} 5144 "\\.\pipe\gecko-crash-server-pipe.5144" gpu6⤵PID:6824
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2420 -parentBuildID 20240401114208 -prefsHandle 2396 -prefMapHandle 2392 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {aeb6ce6e-db76-4e18-9f7c-3f2276d36cec} 5144 "\\.\pipe\gecko-crash-server-pipe.5144" socket6⤵PID:6548
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3296 -childID 1 -isForBrowser -prefsHandle 3168 -prefMapHandle 3164 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1200 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c7c1c658-fffb-4369-b6bb-b4469e6d2dd0} 5144 "\\.\pipe\gecko-crash-server-pipe.5144" tab6⤵PID:2940
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3904 -childID 2 -isForBrowser -prefsHandle 4048 -prefMapHandle 4044 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1200 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {32b6d2a9-bd9f-4f99-a14a-5bceea7220b0} 5144 "\\.\pipe\gecko-crash-server-pipe.5144" tab6⤵PID:804
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4480 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4876 -prefMapHandle 4872 -prefsLen 29197 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {52d113b8-2c48-4082-883c-0afa8164c7fb} 5144 "\\.\pipe\gecko-crash-server-pipe.5144" utility6⤵
- Checks processor information in registry
PID:6616
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5212 -childID 3 -isForBrowser -prefsHandle 5228 -prefMapHandle 5172 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1200 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7a32cbc5-aafa-49bd-81d1-312f1cafb62c} 5144 "\\.\pipe\gecko-crash-server-pipe.5144" tab6⤵PID:5476
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5368 -childID 4 -isForBrowser -prefsHandle 5376 -prefMapHandle 5380 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1200 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {abd048e6-60ea-4339-80ac-03921b6bff43} 5144 "\\.\pipe\gecko-crash-server-pipe.5144" tab6⤵PID:4996
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5552 -childID 5 -isForBrowser -prefsHandle 5560 -prefMapHandle 5564 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1200 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3d3c39e1-04e6-4ac0-a750-a5e3f63597ee} 5144 "\\.\pipe\gecko-crash-server-pipe.5144" tab6⤵PID:1964
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1018485001\52d6855ee3.exe"C:\Users\Admin\AppData\Local\Temp\1018485001\52d6855ee3.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:7128
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3308
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4900
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5784
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1740
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5508
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD58ec831f3e3a3f77e4a7b9cd32b48384c
SHA1d83f09fd87c5bd86e045873c231c14836e76a05c
SHA2567667e538030e3f8ce2886e47a01af24cb0ea70528b1e821c5d8832c5076cb982
SHA51226bffa2406b66368bd412bf25869a792631455645992cdcade2dbc13a2e56fb546414a6a9223b94c96c38d89187add6678d4779a88b38b0c9e36be8527b213c3
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
152B
MD57de1bbdc1f9cf1a58ae1de4951ce8cb9
SHA1010da169e15457c25bd80ef02d76a940c1210301
SHA2566e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e
SHA512e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c
-
Filesize
152B
MD585ba073d7015b6ce7da19235a275f6da
SHA1a23c8c2125e45a0788bac14423ae1f3eab92cf00
SHA2565ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617
SHA512eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3
-
Filesize
5KB
MD568cf5d88b9b4069e48c6e3b5082d9931
SHA11e4d72be916415e8bc4b3c371436dea02cc39c27
SHA25618cde95932bf89a317da77d6a792fc09ae471ab47fd5b20a40c818c764514123
SHA5126f5dba12faf6382727650405f2bb06a4f544907624da9610dbfd842b56b00e78dffd5be787b3fc1a74ad7767f8a9220f4fca3bc7617eab2047fba036e0be80ff
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\a0a74304db73132d4bc12ef9404aa74f9fdeda56\index.txt
Filesize109B
MD50b64756b16390c79b5f1421cf590c88b
SHA13168c78f9664efcaca779e5c65719b19680938a8
SHA2565f5e04f0e7aa920ec511fb26fc65eac096a16114d429a44ea063225a196ba47c
SHA51204790e3c789b2e5203924117e7f58a5840db5985f8e31354a83764211f2a429fce40b646b2f61b4dbdebc88b8a5d71db6de0a45411b6e9b3ad6ec08bc089de7e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\a0a74304db73132d4bc12ef9404aa74f9fdeda56\index.txt
Filesize204B
MD5a4879c3d3d952404f8d72cc5c06c9a9a
SHA1ac22f6a5f915593760a403d06ba09f8658d6b237
SHA25652fe29e84722d54cb4792c1d43b26f833bf430d012571abb10346b54b322066c
SHA5123a6f12a0bf06c6f1ff4e3896fc92bac5e66a65891fc8ffd95a4eb20f9ffed887d97f49ea9176abd8a722d60c1bc75c68d0ec766ca4d5da77d6ab02d08c42bef5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
18KB
MD5745d16431138183137b974626976d937
SHA13c117e723a5e9a118811dbdb1be23c2dbdd93205
SHA25645ee7138d85f7589b4933474311622435d676e0b28ce03ca41c19e2b9524aee5
SHA51263539269ba8bf31b947197f1ad47f4e3f8e5a177af4b522be797fd07cf3877c4e3a80b6b84f9068e437383d08a7bc68e039683705ee1c3ee86d9f6a92ba75810
-
Filesize
18KB
MD59bff9655c3fa38d674220322d8016a91
SHA110d3dd8e00ecd659601dc84bc6f1ca1468604925
SHA256910958720e1752f22bb22d6a05aa61945487a4a21e65933c154ebd6881dc32c5
SHA5120ea15765420337bcb355b6972babb5d05ec6a299a5bd74dcf71a17c030d339c6f9ff259307ec71c164e1940f497587284974af08346665ec5c6421ac890ba4f7
-
Filesize
18KB
MD554b4dbeb3282a05b3f2a310606b4db8a
SHA184615894a13585ecd51c9ea060f23e6a2c5c5d52
SHA25681d8040e56b8e332b6d17054dd4065d073f29cdcb7d0929754a93422008490b0
SHA5122c14f697ac2f3aa4b0c580e78b067382156eab6beb372c9ed49f5500aff4979d7e9b6745d29e667e8315581dac4fe39b560baf42104651dbfd9f1417bf4a10f6
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\activity-stream.discovery_stream.json
Filesize25KB
MD5cff067d16e7f6063015f7040d5ae9736
SHA17476f25e36920ac01fed6b49bbeb71b321e4b09a
SHA256ae6b8db6378ae2de7732b7f83089359d5875b8d45f8541691226e499f51a8180
SHA5122448d6c1662376c903dff9760f9a6be888edf7b587e16420c2c47819567cb669030d4df584c849cf563edf9fb6c3c22ed8a41add22e6fa7f7298bb31f202a653
-
Filesize
3.1MB
MD5c00a67d527ef38dc6f49d0ad7f13b393
SHA17b8f2de130ab5e4e59c3c2f4a071bda831ac219d
SHA25612226ccae8c807641241ba5178d853aad38984eefb0c0c4d65abc4da3f9787c3
SHA5129286d267b167cba01e55e68c8c5582f903bed0dd8bc4135eb528ef6814e60e7d4dda2b3611e13efb56aa993635fbab218b0885daf5daea6043061d8384af40ca
-
Filesize
21KB
MD514becdf1e2402e9aa6c2be0e6167041e
SHA172cbbae6878f5e06060a0038b25ede93b445f0df
SHA2567a769963165063758f15f6e0cece25c9d13072f67fa0d3c25a03a5104fe0783a
SHA51216b837615505f352e134afd9d8655c9cabfa5bfcfbee2c0c34f2d7d9588aa71f875e4e5feb8cdf0f7bacc00f7c1ca8dabd3b3d92afc99abf705c05c78e298b4a
-
Filesize
758KB
MD5afd936e441bf5cbdb858e96833cc6ed3
SHA13491edd8c7caf9ae169e21fb58bccd29d95aefef
SHA256c6491d7a6d70c7c51baca7436464667b4894e4989fa7c5e05068dde4699e1cbf
SHA512928c15a1eda602b2a66a53734f3f563ab9626882104e30ee2bf5106cfd6e08ec54f96e3063f1ab89bf13be2c8822a8419f5d8ee0a3583a4c479785226051a325
-
Filesize
1.8MB
MD525fb9c54265bbacc7a055174479f0b70
SHA14af069a2ec874703a7e29023d23a1ada491b584e
SHA256552f8be2c6b2208a89c728f68488930c661b3a06c35a20d133ef7d3c63a86b9c
SHA5127dfd9e0f3fa2d68a6ce8c952e3b755559db73bb7a06c95ad6ed8ac16dedb49be8b8337afc07c9c682f0c4be9db291a551286353e2e2b624223487dc1c8b54668
-
Filesize
624KB
MD54aea5a8f9b59c7597b447b2b416b7e12
SHA15548f8639093dd69fd53a08785bd8d7cfe25e711
SHA256e354123018be2e65447d53314007e8ce3cb7131f1c7c262cf4378de6e32064d8
SHA5124208a35aa7daec0c0b54b4f7a4f82b889768adefacfbc6a9004192b44e8ba7017b40aaa1e0936c6b37fc2277708d150e1aa9738994aeeb779200caef5ec437ee
-
Filesize
1.1MB
MD5ef08a45833a7d881c90ded1952f96cb4
SHA1f04aeeb63a1409bd916558d2c40fab8a5ed8168b
SHA25633c236dc81af2a47d595731d6fa47269b2874b281152530fdffdda9cbeb3b501
SHA51274e84f710c90121527f06d453e9286910f2e8b6ac09d2aeb4ab1f0ead23ea9b410c5d1074d8bc759bc3e766b5bc77d156756c7df093ba94093107393290ced97
-
Filesize
4.3MB
MD563014ddb15ca6ee8aed525a9e2df6d85
SHA15739c8445d8dd442d361cfbbf46944ef24e7bc32
SHA25620f1886866cbc38597da35d91a554c4078744d74a07c46ca2633c76a62216c50
SHA5125fc0d017cbaee34bab83480d819a9803605716d57ad787a48b033216974538f272a97c70be223dd518f518ba207201174585d0d597b767d190246eb83eaee641
-
Filesize
791KB
MD5e8af4d0d0b47ac68d762b7f288ae8e6e
SHA11d65f31526cc20ab41d6b1625d6674d7f13e326c
SHA256b83449768e7af68867c8bc42b19ff012722d88ea66aef69df48661e63e0eb15e
SHA51280fad90314ff639f538a72c5e4ca2bf9ae52b9309caa7cd6f87d61791505bb3612b7f3190ab9b67348c5d71f4d29bb9d101e3f66d525eb9b5e2060a10b2d187a
-
Filesize
1.3MB
MD5669ed3665495a4a52029ff680ec8eba9
SHA17785e285365a141e307931ca4c4ef00b7ecc8986
SHA2562d2d405409b128eea72a496ccff0ed56f9ed87ee2564ae4815b4b116d4fb74d6
SHA512bedc8f7c1894fc64cdd00ebc58b434b7d931e52c198a0fa55f16f4e3d44a7dc4643eaa78ec55a43cc360571345cd71d91a64037a135663e72eed334fe77a21e6
-
Filesize
21KB
MD504f57c6fb2b2cd8dcc4b38e4a93d4366
SHA161770495aa18d480f70b654d1f57998e5bd8c885
SHA25651e4d0cbc184b8abfa6d84e219317cf81bd542286a7cc602c87eb703a39627c2
SHA51253f95e98a5eca472ed6b1dfd6fecd1e28ea66967a1b3aa109fe911dbb935f1abf327438d4b2fe72cf7a0201281e9f56f4548f965b96e3916b9142257627e6ccd
-
Filesize
4.3MB
MD5c56fed47e77d1b3103c94496f1371878
SHA18b1ac848c5ef777e8de09157301043d6367f59ae
SHA2562c57a53d4a3c03769ed9302fc18cff7a4a5f26e4164023814cc28e92565d7381
SHA512a61f54e66cc8c4af23a79f5f4da2aa2a0fed8fb7452914bef6b9e9441ed075337ccb34300b0adb2be9bb93a54255578bcba2ebfac81d4fd7ca1fc396cff42184
-
Filesize
1.9MB
MD51f39fac8d8f8c1e3e0697ebf585af36c
SHA1f98243a6bdea8f7de4cfa02d157e94b1cf925f51
SHA256ec2349f4f55242a8328a7f11c5013a7525fa05aa18a680c1d82f2d6d93e6e1ad
SHA512ebf1551cc77e6f815f18ebd38ffc3b581fbc0b07642175db9178652e3cad6be0a38bf978ea09d46815ca64b1482a87261ac5e34303b14420ce89c7c684a7aaed
-
Filesize
1.8MB
MD58ed130f18d336710681892376077e84b
SHA1e17b7408774e6af987df8bbd305cf90a04907127
SHA256cff3b8f3932251726136a77b23eb614eb05aba1779fa8de5fa6ee2a062d9f61b
SHA512e09e49f9df4c8037a12ba224796abb12e422d1ec289f94a3d0a4cac7e454fbdda48c5c7fa3c08c9b90c8ffbf58c2ff931bef7db49ef5ed5f2bebc143c7d85456
-
Filesize
2.8MB
MD5afea54bb6f5e4adb448036812363ca2e
SHA19626b3093dc9c9aa2982462b14258b7ff9f8e256
SHA2569742f2ebcfdac7645f7872e538cfde538ad165eab94e1f934bb8ebd1ab18aed4
SHA51259231960ead5c1001e03164248fe3d771aadba467cfdbcf30138286962ab779961c6319b417bd6a751bcfe432fb56efc5d35a225a9965ee07d60809e60484527
-
Filesize
945KB
MD5b852844c66ac5353d1845da793aa6edb
SHA19621b93409d8d279d4bddb690bbeb68d88e812a9
SHA2560e7087f6bfb5a93066e8fa0132d7de6cc535213147aa1ccbe947ccd905ee54e9
SHA512d67c3fb0d5912c22f3487b0cb39710ab6567db99bb5011d85e53baea8d0b5a852845bc51f7f079bbd32063238f879b486c4c4fdb5d5b86ea3e8ff004e4f6569b
-
Filesize
2.6MB
MD53932047ba13c345b7bf0f916570b975c
SHA1e5d8f6be91e7a58bffb8eb8902cde50ba8d21156
SHA25626cfec473064d6fc67596636ac0af118716962555255f7336b71698bf4423a25
SHA512ce4487112ce042247c51dbd6948a8e8bb9301bf0e997596309bed267264a5dac29f410912fef964ccab7e0c73d8e678506809eebbacaa7e4ce1b15fb64a2b7a9
-
Filesize
1KB
MD5a10f31fa140f2608ff150125f3687920
SHA1ec411cc7005aaa8e3775cf105fcd4e1239f8ed4b
SHA25628c871238311d40287c51dc09aee6510cac5306329981777071600b1112286c6
SHA512cf915fb34cd5ecfbd6b25171d6e0d3d09af2597edf29f9f24fa474685d4c5ec9bc742ade9f29abac457dd645ee955b1914a635c90af77c519d2ada895e7ecf12
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2.9MB
MD5dac73e7813dc3500e5f677b5f31191df
SHA1bf5eaa68905a19d7cda4cc824267d5fbfc27785a
SHA2566b6ee9cae47a7d7d51218397669ea2644853643e8d7557b20a90dc49e203893e
SHA5127e26aa8fa617887d322ff823d6133dc677cd6c7e5ff2d1b14f6db689dff185e4f668802037bcd38e2134965892f71aabb4b274ae5568adb6e2ad065f93d593ba
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD568fc1ee1dc33befe72276c0bc26e4519
SHA1e94976b11bdbcc8728a76ab724355593771716d5
SHA2561e83bfc3d2d2a93366bb7fc21ee3f9b0607d4697779dd7c50568d119374fcaa1
SHA51265163d68743551311550090d326eb46bed11e81828d44606bfa4b2d9c6176a189ddd071caa50277e5806421aba48ded8f5ce8208c80452bd8add20d0eb1f4168
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5ce13b4e96a3a5237c0ed2e24e59934a2
SHA18c2e9f4909fd30ef59f9978aa33ca7aad70fa9ed
SHA256be8014d0c1c3844673ac6cd3074cc0367c1d2b676c851aebd2be3d11a7ebe8aa
SHA512dc95bdb7a78dc6d5721d811d0fa2f686744f5f5c721ef1947dcf7806ebd1b4fd6fb8f0f63adca42930ccd6d53fc702ac390479985a3506771db3cc3aa1299f63
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5ae9fd9a01e42d550c7354a8d5ac7fd67
SHA12b102aca8687a921fb8b70217e44324acc9cc466
SHA25695b6e8fb6552c77bc0e141732986d3a52f4b1469d3bfcdff946b85de85739f09
SHA51229f681011e6952d87f08b399d8802915ab22848e21fa18094dd5898136c24a4f42d0f1ae81ac028f6ef87a4730b71b8e3b055a16aada062a5a2a49967458f43d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD52371e7da2bafb7e2ed77a21e0cb86d1d
SHA170fb49ee721cdd5d2ca276b5e33fbfdf1c2a6d68
SHA256cb73c371fd11a5279ecc200fdab57190ce725a73905ec1e012a2e37a7322f470
SHA512dda2e07bbd795e877270164ebfe6b1886352adfa10d93a9c521e4371ffa5e05ed73a23163d8dd1360443433452d26b5f8fc40c9fa3e7a102c24cabaf54ffada3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\6f3323d1-3454-4bc5-9f12-732db388b117
Filesize25KB
MD50ef59510e45d3e601613d73a74de6e70
SHA17ac2f1db56d3bfa07f3c59cbbbd198c0c0429353
SHA256cd1a8a13ff31c16e9882236d785ebc053ec23b892a02c6a5375bd2e05037337a
SHA51234ef1391626ed5abdbb8debd6206954c9626e0bc8fef9e6dd4b0cc0d2b1e84b22b5555e6ee3a35663e5bd49129be7ab1ce7325cf4d508a943587ee8784ae9798
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\8eb6c8ba-92a4-4dc6-b5a2-804262256941
Filesize982B
MD57a98b2deb23686b6dcb4cd7d0c0bf2ed
SHA168510f7af7ec1a91a5e158167652a64b3fb5003b
SHA256e712a4dfa6308a524cd918bc377fefc834bfb1f323643b2f1296b3dc712bf61d
SHA512778881d80461a6438129e2bf0453106a201b46c61d4cbd3aeeb8a8fce082c52ef5dbf14eefedbbed9e556ea357e73497b1bef4fe14a01a5459891aebb603799d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\d271e3d9-c86f-4eaf-b9bb-03cacac7f6f4
Filesize671B
MD5281a40d73b9a8fe00e646796f095497b
SHA14910025c01eaa1185ea193064ab6bf863284cae9
SHA256c3b7bfd37541b854fb26b089c89da38e514e637f3dcf2e77b10de095d7488f7b
SHA5121e5b3437a7a7964647e2b2ef902330e27921c5f12c5f1f653e198065f4ba526c2a3de831b4c984e20de9abd22afb8852254ea379665d1a5a39aa55b416de890f
-
Filesize
144KB
MD5cc36e2a5a3c64941a79c31ca320e9797
SHA150c8f5db809cfec84735c9f4dcd6b55d53dfd9f5
SHA2566fec179c363190199c1dcdf822be4d6b1f5c4895ebc7148a8fc9fa9512eeade8
SHA512fcea6d62dc047e40182dc4ff1e0522ca935f9aeefdb1517957977bc5d9ac654285a973261401f3b98abf1f6ed62638b9e31306fd7aaeb67214ca42dfc2888af0
-
Filesize
1.0MB
MD5971b0519b1c0461db6700610e5e9ca8e
SHA19a262218310f976aaf837e54b4842e53e73be088
SHA25647cf75570c1eca775b2dd1823233d7c40924d3a8d93e0e78c943219cf391d023
SHA512d234a9c5a1da8415cd4d2626797197039f2537e98f8f43d155f815a7867876cbc1bf466be58677c79a9199ea47d146a174998d21ef0aebc29a4b0443f8857cb9
-
Filesize
1.2MB
MD5577cd52217da6d7163cea46bb01c107f
SHA182b31cc52c538238e63bdfc22d1ea306ea0b852a
SHA256139762e396fb930400fab8faab80cb679abbe642144261cba24973fb23bcd728
SHA5128abad4eaf2a302dfd9ead058e8c14d996437975730125c46d034a71028921ff36ff5d157ad3671e328ac667ec8095db19fa14a9e8eaaf1a7738aa3d0120b5474