Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-12-2024 21:39
Static task
static1
General
-
Target
4107f62478184974c7e684e816a93517258584c9203080a046d81dc45a5de3b1.exe
-
Size
6.7MB
-
MD5
2c2efd78ad966e9b8c5036fe66741d12
-
SHA1
747e4f8059c1a755aae3c0b49253fcdf3372849f
-
SHA256
4107f62478184974c7e684e816a93517258584c9203080a046d81dc45a5de3b1
-
SHA512
155ad2d8b2e4b281725f577a85c801d65b76cb55c225fd9f712ab4ea1138b3783f751f8cc8a247e4b4fbd8c41fb028b5793793dac99a1891fb8d1f03c53c28e5
-
SSDEEP
196608:b3Xe7vMTVy5sEni8LXX+zdKTB6OWRuOm56jico4mvg0tvbQm:b3nVyfbqzEF6Bun0oJvjvb
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Detect Vidar Stealer 3 IoCs
resource yara_rule behavioral1/files/0x000f000000023ccc-213.dat family_vidar_v7 behavioral1/memory/2992-217-0x0000000000400000-0x0000000000639000-memory.dmp family_vidar_v7 behavioral1/memory/2992-520-0x0000000000400000-0x0000000000639000-memory.dmp family_vidar_v7 -
Gcleaner family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4M575t.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4M575t.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4M575t.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4M575t.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4M575t.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4M575t.exe -
Stealc family
-
Vidar family
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF c8556a5cc0.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c8556a5cc0.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ aff6b2837f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9ed3e140c7.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1x97m3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2Q5928.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3b12z.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4M575t.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 85c7556220.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 964 powershell.exe 2400 powershell.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 22 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 85c7556220.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1x97m3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2Q5928.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c8556a5cc0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9ed3e140c7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2Q5928.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c8556a5cc0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion aff6b2837f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4M575t.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 85c7556220.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9ed3e140c7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion aff6b2837f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1x97m3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3b12z.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3b12z.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4M575t.exe -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 831c04635c.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 74ad719341b747dcad13446df9bf57e8.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 348ded35c79042098f08b8760054002f.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 1x97m3.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 24 IoCs
pid Process 2564 f6p23.exe 3232 I5N76.exe 2348 1x97m3.exe 3648 skotes.exe 3556 2Q5928.exe 2792 hYW0tgm.exe 4988 murrgHN.exe 1848 murrgHN.exe 3696 skotes.exe 4700 3b12z.exe 4372 4M575t.exe 868 831c04635c.exe 2992 348ded35c79042098f08b8760054002f.exe 5000 74ad719341b747dcad13446df9bf57e8.exe 3788 skotes.exe 1896 c8556a5cc0.exe 3940 14e1cb6e5b.exe 2364 ea4c7f0885.exe 2448 ea4c7f0885.exe 2396 ea4c7f0885.exe 1608 aff6b2837f.exe 1224 85c7556220.exe 3392 9ed3e140c7.exe 1896 d1cd124251.exe -
Identifies Wine through registry keys 2 TTPs 11 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 2Q5928.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 3b12z.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine c8556a5cc0.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 1x97m3.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine aff6b2837f.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 85c7556220.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 9ed3e140c7.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 4M575t.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4M575t.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4M575t.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\9ed3e140c7.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1019686001\\9ed3e140c7.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\d1cd124251.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1019687001\\d1cd124251.exe" skotes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4107f62478184974c7e684e816a93517258584c9203080a046d81dc45a5de3b1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" f6p23.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" I5N76.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\85c7556220.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1019685001\\85c7556220.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 96 raw.githubusercontent.com 97 raw.githubusercontent.com 98 raw.githubusercontent.com -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000600000001da5b-732.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
pid Process 2348 1x97m3.exe 3648 skotes.exe 3556 2Q5928.exe 3696 skotes.exe 4700 3b12z.exe 4372 4M575t.exe 3788 skotes.exe 1896 c8556a5cc0.exe 1608 aff6b2837f.exe 1224 85c7556220.exe 3392 9ed3e140c7.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4988 set thread context of 1848 4988 murrgHN.exe 90 PID 2364 set thread context of 2396 2364 ea4c7f0885.exe 142 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1x97m3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1532 4988 WerFault.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 32 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hYW0tgm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language murrgHN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 831c04635c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 14e1cb6e5b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea4c7f0885.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9ed3e140c7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1x97m3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f6p23.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 348ded35c79042098f08b8760054002f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 85c7556220.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language d1cd124251.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4M575t.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d1cd124251.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea4c7f0885.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage d1cd124251.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4107f62478184974c7e684e816a93517258584c9203080a046d81dc45a5de3b1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language murrgHN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c8556a5cc0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aff6b2837f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language I5N76.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2Q5928.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3b12z.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 348ded35c79042098f08b8760054002f.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 348ded35c79042098f08b8760054002f.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2976 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Kills process with taskkill 5 IoCs
pid Process 1364 taskkill.exe 2396 taskkill.exe 4296 taskkill.exe 4520 taskkill.exe 3932 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 47 IoCs
pid Process 2348 1x97m3.exe 2348 1x97m3.exe 3648 skotes.exe 3648 skotes.exe 3556 2Q5928.exe 3556 2Q5928.exe 3696 skotes.exe 3696 skotes.exe 4700 3b12z.exe 4700 3b12z.exe 4372 4M575t.exe 4372 4M575t.exe 4372 4M575t.exe 4372 4M575t.exe 868 831c04635c.exe 964 powershell.exe 964 powershell.exe 2400 powershell.exe 2400 powershell.exe 3664 msedge.exe 3664 msedge.exe 2836 msedge.exe 2836 msedge.exe 412 identity_helper.exe 412 identity_helper.exe 3788 skotes.exe 3788 skotes.exe 2992 348ded35c79042098f08b8760054002f.exe 2992 348ded35c79042098f08b8760054002f.exe 1896 c8556a5cc0.exe 1896 c8556a5cc0.exe 1896 c8556a5cc0.exe 1896 c8556a5cc0.exe 1896 c8556a5cc0.exe 1896 c8556a5cc0.exe 1896 c8556a5cc0.exe 1896 c8556a5cc0.exe 1896 c8556a5cc0.exe 1896 c8556a5cc0.exe 1608 aff6b2837f.exe 1608 aff6b2837f.exe 1224 85c7556220.exe 1224 85c7556220.exe 3392 9ed3e140c7.exe 3392 9ed3e140c7.exe 1896 d1cd124251.exe 1896 d1cd124251.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 4372 4M575t.exe Token: SeDebugPrivilege 868 831c04635c.exe Token: SeDebugPrivilege 964 powershell.exe Token: SeDebugPrivilege 2400 powershell.exe Token: SeDebugPrivilege 5000 74ad719341b747dcad13446df9bf57e8.exe Token: SeDebugPrivilege 4296 taskkill.exe Token: SeDebugPrivilege 4520 taskkill.exe Token: SeDebugPrivilege 3932 taskkill.exe Token: SeDebugPrivilege 1364 taskkill.exe Token: SeDebugPrivilege 2396 taskkill.exe -
Suspicious use of FindShellTrayWindow 55 IoCs
pid Process 2348 1x97m3.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 1896 d1cd124251.exe 1896 d1cd124251.exe 1896 d1cd124251.exe 1896 d1cd124251.exe 1896 d1cd124251.exe 1896 d1cd124251.exe 1896 d1cd124251.exe 2292 firefox.exe 2292 firefox.exe 2292 firefox.exe 2292 firefox.exe 1896 d1cd124251.exe 2292 firefox.exe 2292 firefox.exe 2292 firefox.exe 2292 firefox.exe 2292 firefox.exe 2292 firefox.exe 2292 firefox.exe 2292 firefox.exe 2292 firefox.exe 2292 firefox.exe 2292 firefox.exe 2292 firefox.exe 2292 firefox.exe 2292 firefox.exe 2292 firefox.exe 2292 firefox.exe 2292 firefox.exe -
Suspicious use of SendNotifyMessage 52 IoCs
pid Process 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 1896 d1cd124251.exe 1896 d1cd124251.exe 1896 d1cd124251.exe 1896 d1cd124251.exe 1896 d1cd124251.exe 1896 d1cd124251.exe 1896 d1cd124251.exe 2292 firefox.exe 2292 firefox.exe 2292 firefox.exe 2292 firefox.exe 1896 d1cd124251.exe 2292 firefox.exe 2292 firefox.exe 2292 firefox.exe 2292 firefox.exe 2292 firefox.exe 2292 firefox.exe 2292 firefox.exe 2292 firefox.exe 2292 firefox.exe 2292 firefox.exe 2292 firefox.exe 2292 firefox.exe 2292 firefox.exe 2292 firefox.exe 2292 firefox.exe 2292 firefox.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2292 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4552 wrote to memory of 2564 4552 4107f62478184974c7e684e816a93517258584c9203080a046d81dc45a5de3b1.exe 82 PID 4552 wrote to memory of 2564 4552 4107f62478184974c7e684e816a93517258584c9203080a046d81dc45a5de3b1.exe 82 PID 4552 wrote to memory of 2564 4552 4107f62478184974c7e684e816a93517258584c9203080a046d81dc45a5de3b1.exe 82 PID 2564 wrote to memory of 3232 2564 f6p23.exe 83 PID 2564 wrote to memory of 3232 2564 f6p23.exe 83 PID 2564 wrote to memory of 3232 2564 f6p23.exe 83 PID 3232 wrote to memory of 2348 3232 I5N76.exe 84 PID 3232 wrote to memory of 2348 3232 I5N76.exe 84 PID 3232 wrote to memory of 2348 3232 I5N76.exe 84 PID 2348 wrote to memory of 3648 2348 1x97m3.exe 85 PID 2348 wrote to memory of 3648 2348 1x97m3.exe 85 PID 2348 wrote to memory of 3648 2348 1x97m3.exe 85 PID 3232 wrote to memory of 3556 3232 I5N76.exe 86 PID 3232 wrote to memory of 3556 3232 I5N76.exe 86 PID 3232 wrote to memory of 3556 3232 I5N76.exe 86 PID 3648 wrote to memory of 2792 3648 skotes.exe 87 PID 3648 wrote to memory of 2792 3648 skotes.exe 87 PID 3648 wrote to memory of 2792 3648 skotes.exe 87 PID 3648 wrote to memory of 4988 3648 skotes.exe 88 PID 3648 wrote to memory of 4988 3648 skotes.exe 88 PID 3648 wrote to memory of 4988 3648 skotes.exe 88 PID 4988 wrote to memory of 1848 4988 murrgHN.exe 90 PID 4988 wrote to memory of 1848 4988 murrgHN.exe 90 PID 4988 wrote to memory of 1848 4988 murrgHN.exe 90 PID 4988 wrote to memory of 1848 4988 murrgHN.exe 90 PID 4988 wrote to memory of 1848 4988 murrgHN.exe 90 PID 4988 wrote to memory of 1848 4988 murrgHN.exe 90 PID 4988 wrote to memory of 1848 4988 murrgHN.exe 90 PID 4988 wrote to memory of 1848 4988 murrgHN.exe 90 PID 4988 wrote to memory of 1848 4988 murrgHN.exe 90 PID 4988 wrote to memory of 1848 4988 murrgHN.exe 90 PID 2564 wrote to memory of 4700 2564 f6p23.exe 103 PID 2564 wrote to memory of 4700 2564 f6p23.exe 103 PID 2564 wrote to memory of 4700 2564 f6p23.exe 103 PID 4552 wrote to memory of 4372 4552 4107f62478184974c7e684e816a93517258584c9203080a046d81dc45a5de3b1.exe 104 PID 4552 wrote to memory of 4372 4552 4107f62478184974c7e684e816a93517258584c9203080a046d81dc45a5de3b1.exe 104 PID 4552 wrote to memory of 4372 4552 4107f62478184974c7e684e816a93517258584c9203080a046d81dc45a5de3b1.exe 104 PID 3648 wrote to memory of 868 3648 skotes.exe 106 PID 3648 wrote to memory of 868 3648 skotes.exe 106 PID 3648 wrote to memory of 868 3648 skotes.exe 106 PID 868 wrote to memory of 964 868 831c04635c.exe 108 PID 868 wrote to memory of 964 868 831c04635c.exe 108 PID 868 wrote to memory of 964 868 831c04635c.exe 108 PID 868 wrote to memory of 2400 868 831c04635c.exe 110 PID 868 wrote to memory of 2400 868 831c04635c.exe 110 PID 868 wrote to memory of 2400 868 831c04635c.exe 110 PID 868 wrote to memory of 2992 868 831c04635c.exe 112 PID 868 wrote to memory of 2992 868 831c04635c.exe 112 PID 868 wrote to memory of 2992 868 831c04635c.exe 112 PID 868 wrote to memory of 5000 868 831c04635c.exe 113 PID 868 wrote to memory of 5000 868 831c04635c.exe 113 PID 5000 wrote to memory of 2836 5000 74ad719341b747dcad13446df9bf57e8.exe 114 PID 5000 wrote to memory of 2836 5000 74ad719341b747dcad13446df9bf57e8.exe 114 PID 2836 wrote to memory of 1164 2836 msedge.exe 115 PID 2836 wrote to memory of 1164 2836 msedge.exe 115 PID 2836 wrote to memory of 4964 2836 msedge.exe 116 PID 2836 wrote to memory of 4964 2836 msedge.exe 116 PID 2836 wrote to memory of 4964 2836 msedge.exe 116 PID 2836 wrote to memory of 4964 2836 msedge.exe 116 PID 2836 wrote to memory of 4964 2836 msedge.exe 116 PID 2836 wrote to memory of 4964 2836 msedge.exe 116 PID 2836 wrote to memory of 4964 2836 msedge.exe 116 PID 2836 wrote to memory of 4964 2836 msedge.exe 116 PID 2836 wrote to memory of 4964 2836 msedge.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\4107f62478184974c7e684e816a93517258584c9203080a046d81dc45a5de3b1.exe"C:\Users\Admin\AppData\Local\Temp\4107f62478184974c7e684e816a93517258584c9203080a046d81dc45a5de3b1.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\f6p23.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\f6p23.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\I5N76.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\I5N76.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1x97m3.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1x97m3.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Users\Admin\AppData\Local\Temp\1019563001\hYW0tgm.exe"C:\Users\Admin\AppData\Local\Temp\1019563001\hYW0tgm.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2792
-
-
C:\Users\Admin\AppData\Local\Temp\1019610001\murrgHN.exe"C:\Users\Admin\AppData\Local\Temp\1019610001\murrgHN.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Users\Admin\AppData\Local\Temp\1019610001\murrgHN.exe"C:\Users\Admin\AppData\Local\Temp\1019610001\murrgHN.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4988 -s 5967⤵
- Program crash
PID:1532
-
-
-
C:\Users\Admin\AppData\Local\Temp\1019680001\831c04635c.exe"C:\Users\Admin\AppData\Local\Temp\1019680001\831c04635c.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath "C:\negagdrc"7⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:964
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData"7⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2400
-
-
C:\negagdrc\348ded35c79042098f08b8760054002f.exe"C:\negagdrc\348ded35c79042098f08b8760054002f.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2992 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\negagdrc\348ded35c79042098f08b8760054002f.exe" & rd /s /q "C:\ProgramData\NYC2NO8Q1DJE" & exit8⤵
- System Location Discovery: System Language Discovery
PID:4120 -
C:\Windows\SysWOW64\timeout.exetimeout /t 109⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2976
-
-
-
-
C:\negagdrc\74ad719341b747dcad13446df9bf57e8.exe"C:\negagdrc\74ad719341b747dcad13446df9bf57e8.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://apps.microsoft.com/store/detail/9MSZ40SLW145?ocid=&referrer=psi8⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7ff85e1346f8,0x7ff85e134708,0x7ff85e1347189⤵PID:1164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,2548761848897452503,7139016617685959761,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:29⤵PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,2548761848897452503,7139016617685959761,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:39⤵
- Suspicious behavior: EnumeratesProcesses
PID:3664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,2548761848897452503,7139016617685959761,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:89⤵PID:2456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,2548761848897452503,7139016617685959761,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:19⤵PID:1340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,2548761848897452503,7139016617685959761,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:19⤵PID:680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,2548761848897452503,7139016617685959761,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5064 /prefetch:89⤵PID:4020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,2548761848897452503,7139016617685959761,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5064 /prefetch:89⤵
- Suspicious behavior: EnumeratesProcesses
PID:412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,2548761848897452503,7139016617685959761,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:19⤵PID:2116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,2548761848897452503,7139016617685959761,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5180 /prefetch:19⤵PID:3516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,2548761848897452503,7139016617685959761,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5784 /prefetch:19⤵PID:3284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,2548761848897452503,7139016617685959761,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5672 /prefetch:19⤵PID:2792
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1019681001\c8556a5cc0.exe"C:\Users\Admin\AppData\Local\Temp\1019681001\c8556a5cc0.exe"6⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1896
-
-
C:\Users\Admin\AppData\Local\Temp\1019682001\14e1cb6e5b.exe"C:\Users\Admin\AppData\Local\Temp\1019682001\14e1cb6e5b.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3940
-
-
C:\Users\Admin\AppData\Local\Temp\1019683001\ea4c7f0885.exe"C:\Users\Admin\AppData\Local\Temp\1019683001\ea4c7f0885.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\1019683001\ea4c7f0885.exe"C:\Users\Admin\AppData\Local\Temp\1019683001\ea4c7f0885.exe"7⤵
- Executes dropped EXE
PID:2448
-
-
C:\Users\Admin\AppData\Local\Temp\1019683001\ea4c7f0885.exe"C:\Users\Admin\AppData\Local\Temp\1019683001\ea4c7f0885.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2396
-
-
-
C:\Users\Admin\AppData\Local\Temp\1019684001\aff6b2837f.exe"C:\Users\Admin\AppData\Local\Temp\1019684001\aff6b2837f.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1608
-
-
C:\Users\Admin\AppData\Local\Temp\1019685001\85c7556220.exe"C:\Users\Admin\AppData\Local\Temp\1019685001\85c7556220.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1224
-
-
C:\Users\Admin\AppData\Local\Temp\1019686001\9ed3e140c7.exe"C:\Users\Admin\AppData\Local\Temp\1019686001\9ed3e140c7.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3392
-
-
C:\Users\Admin\AppData\Local\Temp\1019687001\d1cd124251.exe"C:\Users\Admin\AppData\Local\Temp\1019687001\d1cd124251.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1896 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4296
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4520
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3932
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1364
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2396
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵PID:760
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2292 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1948 -parentBuildID 20240401114208 -prefsHandle 1864 -prefMapHandle 1856 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {404fb3b9-1e67-4ee5-b210-6fc9ea00fcb8} 2292 "\\.\pipe\gecko-crash-server-pipe.2292" gpu9⤵PID:2880
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2416 -parentBuildID 20240401114208 -prefsHandle 2408 -prefMapHandle 2404 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cf2191f6-edaf-43ae-9dec-85a525878953} 2292 "\\.\pipe\gecko-crash-server-pipe.2292" socket9⤵PID:2300
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3356 -childID 1 -isForBrowser -prefsHandle 3352 -prefMapHandle 3348 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1108 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {55977ba9-61cd-40f6-9665-6d1ed54e1130} 2292 "\\.\pipe\gecko-crash-server-pipe.2292" tab9⤵PID:4012
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4168 -childID 2 -isForBrowser -prefsHandle 4160 -prefMapHandle 4156 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1108 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {33d2bdc4-f88e-4d2d-aaf4-ff2bf8264026} 2292 "\\.\pipe\gecko-crash-server-pipe.2292" tab9⤵PID:3536
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4780 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4572 -prefMapHandle 4612 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c05d1d7d-2b93-4a5c-8cba-610756040157} 2292 "\\.\pipe\gecko-crash-server-pipe.2292" utility9⤵PID:6356
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5100 -childID 3 -isForBrowser -prefsHandle 5092 -prefMapHandle 5084 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1108 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {34d8f4af-6944-4d75-b355-290df42cb04b} 2292 "\\.\pipe\gecko-crash-server-pipe.2292" tab9⤵PID:5480
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5224 -childID 4 -isForBrowser -prefsHandle 5232 -prefMapHandle 5236 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1108 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f1bcd79f-b761-47c0-89c0-43e23c8650be} 2292 "\\.\pipe\gecko-crash-server-pipe.2292" tab9⤵PID:7116
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5452 -childID 5 -isForBrowser -prefsHandle 5532 -prefMapHandle 5528 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1108 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {11f3851b-a1e9-4f76-9031-b5c8773f0ab8} 2292 "\\.\pipe\gecko-crash-server-pipe.2292" tab9⤵PID:6656
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2Q5928.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2Q5928.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3556
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3b12z.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3b12z.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4700
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4M575t.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4M575t.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4372
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4988 -ip 49881⤵PID:2864
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3696
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2492
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3696
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3788
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
152B
MD5ba6ef346187b40694d493da98d5da979
SHA1643c15bec043f8673943885199bb06cd1652ee37
SHA256d86eec91f295dfda8ed1c5fa99de426f2fe359282c7ebf67e3a40be739475d73
SHA5122e6cc97330be8868d4b9c53be7e12c558f6eb1ac2c4080a611ba6c43561d0c5bb4791b8a11a8c2371599f0ba73ed1d9a7a2ea6dee2ae6a080f1912e0cb1f656c
-
Filesize
152B
MD5b8880802fc2bb880a7a869faa01315b0
SHA151d1a3fa2c272f094515675d82150bfce08ee8d3
SHA256467b8cd4aacac66557712f9843023dcedefcc26efc746f3e44157bc8dac73812
SHA512e1c6dba2579357ba70de58968b167d2c529534d24bff70568144270c48ac18a48ee2af2d58d78ae741e5a36958fa78a57955bd2456f1df00b781fc1002e123d2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5e1188378dc4ca93963e4d7e205ee0579
SHA1e0b36b8168abd924d1fac70b5692ab83ec4513bf
SHA256847cbedb1363405cbe83e850732d53940d6948268959cad275350b986548fb7d
SHA512ed82a52e1405c502cb4616115bcbbbb22cfbf70cce59f129f107e2f182522d2a3f53ab0dac5ecef8724440e80be4ffb305c7dc81067b32c96d3f3d5187d735dd
-
Filesize
5KB
MD53a433d4145a78b733c10a0bf468d66b3
SHA19958a546a9a3e12b286c92ff369255c31c0eac59
SHA256fd2876da1f74045f752a33cabd9b966bf09482958f606d729b8dfc1d72b557a8
SHA51216e331559212d99bdd49204d57f0a6bb570d4f74850039a9a9d9b0d2d14dee18b3183bd71b938a20283f007cc5c50cbb6c019a06a020e4a14c6fa36927c778bf
-
Filesize
6KB
MD59ac39beceff5e3539933b2b4cb7a3300
SHA190d09c000d12286c32c1a9b6f91dba10596cef64
SHA2562d8c4aba569b69cfdfde6c40872265f2e8aca0123b721f44336ffa29cb9a3665
SHA512f31a434bc3e3f71bb7a2b448428b74760317eb4d688ce26a248854d8886b6c4f942510b956497dfaefc24669fc3a348ec186e7ac77fcb3ef4841678d54c25a7f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\a0a74304db73132d4bc12ef9404aa74f9fdeda56\3c00339e-82de-41f7-9005-811c38ce2344\index-dir\the-real-index
Filesize72B
MD572656320746a2d31495e4aa1d640938d
SHA144a31ec3dd81c98428f5f35a8d4a059ed4ad7768
SHA256d3d522094e8fe4ff98fb42f44371ed8021975634fa739dd725f7888ff2075b74
SHA51218d8b9ae954ee3c3531a3ca88d3ad0ef6681c4e20a18dcede54dfbcc8cd7c9b5f3ee8d940337c43b8098096a30ff7e9b63d06c9db96602b735eff15ad4348e6a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\a0a74304db73132d4bc12ef9404aa74f9fdeda56\3c00339e-82de-41f7-9005-811c38ce2344\index-dir\the-real-index~RFe596fe7.TMP
Filesize48B
MD5a72f7cc1a6122bae0d81afb3bff82517
SHA12d8e4dbf56a5a70f1e2457260675b0bf6a0512a9
SHA25603bb5f7a0e5141b78a64ac644e4f80b9acd68a86512026dbe288ed065e1f9685
SHA512bb2a7fa37b103c5f072368c88912a181c8c57fecf81d190340cdf3e1e60b4b1e76f2285b62139b8d0e81e4aee024e87feeaafccbc00aaf9c375bf30d4cfb8cca
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\a0a74304db73132d4bc12ef9404aa74f9fdeda56\3ef969ea-b273-4f1b-9b23-c25503918f12\index-dir\the-real-index
Filesize1KB
MD54cf80b192ab01275903034e0476bed6b
SHA17d8ea5643908872d5d8779bc95cebb7a5ec216cf
SHA256b39f4fede852fcb66a9f638fb55921ef2e6e83a45bc95d9e0a021ae105a3f7b3
SHA512b206bfece064f63ecaa5f064226d27429bebb2a33f311c1d0d9d93bfde2df30b4b7c419c6f3d6117a9be3ecad7aaae964dc23c581efefd277e10b9401afb7eff
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\a0a74304db73132d4bc12ef9404aa74f9fdeda56\3ef969ea-b273-4f1b-9b23-c25503918f12\index-dir\the-real-index~RFe597e00.TMP
Filesize48B
MD5a71fff0de06ad0ce1951a8263c66b47f
SHA19c3b9e87aec048415df5cdee21f3b3bf4de1b658
SHA256f18ac8cfd22b93dea5df379b1868fa69df3631accfa4e6149de11c9e1dcb33df
SHA5122be51417b3b028d46cf42df9aa809ce867a4524a1e278b3bcdedd37f490e31f66a504d5b37964719db928971e10afb738714a38d171644837696ee53badd37da
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\a0a74304db73132d4bc12ef9404aa74f9fdeda56\index.txt
Filesize201B
MD54709d974ff290e1a1091dc02b451d2ac
SHA16f1dcd7825566d86eee8454c71b4ca2cdc6339e1
SHA256e2fd5bb5201dd657097c85c8eb2fd34186bc57f55bb9a2aa66f7d998ad141c10
SHA512bf74aec33e11017919f3cc9cbcda19ff592fa82a66ab77251791176116a597b77900e404fd0aa978c984ce7ccfafad911900e7ae3e4f0a011b4a73e9b93ed22d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\a0a74304db73132d4bc12ef9404aa74f9fdeda56\index.txt
Filesize109B
MD5af541b2109bd2f8370c14131c3c96076
SHA18eb56c6014f4127cb6607adc9c7e4f6c358967b4
SHA2563be086b3799d086548859209265bfe57bd5a7b2e8b523e3a3e525a6f8b0e86fb
SHA512dcbe0627ac31b383d4d4fd55a41acafe19fd5b66bc7663b8588b0d0e21103cbf08d7938d56efcf77cfde35e193418ba3ed9bac353b2a5b0b7912e2ce2e1e7bdd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\a0a74304db73132d4bc12ef9404aa74f9fdeda56\index.txt
Filesize204B
MD5e512c9af5ed94822b1fc41c4a72cc419
SHA17a2a1d984a0191348f45690e54d374776d6ff1b3
SHA25699ebece388ac48d5c9f1dc635fcc160a9f0457e1a8345786b75d7e665579ead4
SHA5128c0cae56353a3f909314423b18d43701bfd3c87e41fca908cd3b97b59b5e6cb4633c22dadcbb69b7973c1c4fc8900268adbd2f8000f1415168666002752257e5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD57ed13a0ac4530fcfce0bfc19e5773a3c
SHA10381ef5949f48459f3d40783ef4205b6c80d767a
SHA256bad6fbe22b41d59b2bca6055013f2e7664ad9e5ca82e06a3e261422f7ddade5e
SHA512162d4dfb5f73ebb717137fd63f9de0639832ec169553fb27cf9a732c0d68f6b93f3b941ca92a423169bd1ac571e53003c1f6a18ebc5deb50a7143733e0760a79
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe596fa8.TMP
Filesize48B
MD54c2f7026e619fa0649931eea0bafd8f9
SHA1663e42fdd239a6d7803bbb2d869f24bc16baa7dd
SHA256c032a211d4e3aa716cdd3b48119474c075691b0a2eeb0ff06d1869791238e175
SHA51228e2d9b17dbe6888faaa4a216bb5e31e6d3a8b4f24a97a9d83433678dbff8dc91aa1866b488f9bccee21c47ca5b25078527f3721ee9904f2a7680f922105a1f5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD52f49c047f6ce59647f283b9cd4b632c0
SHA16aae1bf7c3291f8464055b46515127ca2446d578
SHA256e9a3f2e6b4e3bbe4243210ecbd4f3f95edfaeb856e63e998d3a038bd0bc1e14c
SHA51204e519af1276e75acead8fad6906919c2ac844aa5783fd9dd26b14b74c225b0ee2726bc7c8264c7f45b92c10433e2dc81dd94ddadcd8c22bc3e8663e8035bbb9
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
18KB
MD5bdc17a639e02e46e08f997666a7ef73c
SHA1f93dbb3c801a612ac306e94f43f67a31bf597f3d
SHA25667d6177c70c7af5c85943242e50e092a281819ee13d9189cfb1891f26339aaa5
SHA5123752ab63d4d4f583e69a469057d52b0e5f8d662cb31f6740bd7a46e9db0ca1f335e05d50f0a058c0f295f43c107b48029855aeec8b6fd0647bfc0e4e1ae323c8
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\activity-stream.discovery_stream.json
Filesize18KB
MD5756b652a1ed8dc95bc84e2a6363c1cbc
SHA14ec056f448827fa44db716fad85eb98c0be268f2
SHA25670f12ba19b08e133c68a0fd37df546d325ea905b135b1e1d887eeb0b941dd501
SHA5127dd96fa740a0cd828e87ca6989babc11555cb4d25eb84a24f09da889121149c0085effd59a05e8f3db125ee2a7d14f4607dbeceba07a324e95f5e9101b95d5a6
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
295KB
MD5b251cf9e14aa07b1a2e506ad4ee0028c
SHA13bafd765233c9bc50ba3945446b4153d6f10a41a
SHA256be4ae482b0ca161f7d52dcfecc38e55af4b0a0342b0c1b854329da4f42b6c1cb
SHA512660313d8286535b3acab03c8894d069d7fcb65eb4b5e75026529a096c2337cd68d8a291abf78f612d75b5aec2a413e0936eb16c8c1a94bfda0568dd41312c2c7
-
Filesize
543KB
MD54f36d38adf1aa27764e834263b790397
SHA1c38cd4f1bc7762951225d35e06578b8bd91606d5
SHA256d6a9fcd0a2fccd03908113ac2febc012c36cd007c30ff2e8903e3dd26e189bbd
SHA51276d100555bb8a3ef8529b4dcb9391696b440e5b349f38c36ee1fb1ad8a46aa9289b805511d91597ceaa8dccf8fe64c6130111dcfe09cab0651428c83bd0bce23
-
Filesize
32KB
MD55bf12c86aab1724fdabcb6a94843095e
SHA1cca23aa0cbcfccf5511e14fb0c8ecedef48c6353
SHA256476e155f9c0e525d09af60af121ff650c55861fc77fad89c963b5e8002349e03
SHA51263a3bcbd821a76ae79735f797bd343ab0f7254267869d2ae39db644327d006160cfe3f1b93b36d6cd5ca730c164f5248e7cb7ceba3bd1d9966542de468e1484d
-
Filesize
21KB
MD504f57c6fb2b2cd8dcc4b38e4a93d4366
SHA161770495aa18d480f70b654d1f57998e5bd8c885
SHA25651e4d0cbc184b8abfa6d84e219317cf81bd542286a7cc602c87eb703a39627c2
SHA51253f95e98a5eca472ed6b1dfd6fecd1e28ea66967a1b3aa109fe911dbb935f1abf327438d4b2fe72cf7a0201281e9f56f4548f965b96e3916b9142257627e6ccd
-
Filesize
4.2MB
MD50ff2001aeabb55d9ac0bfeb28c577633
SHA1e5f37210806ae7b9cacd40a52dc1e20ceea5b89b
SHA256dc1e0f683dabb770d3b77040889f5a189e6e5de7040a9625f688a8c240624d3a
SHA512936cdfc268ec50b7c4df7d53ccbc45a8626a6c52869a1c5a1e0f944f8ab051700e53e0466c328e123e6797c865a329186bfaaba1d075d69c250f72e2f7326d54
-
Filesize
2.5MB
MD587330f1877c33a5a6203c49075223b16
SHA155b64ee8b2d1302581ab1978e9588191e4e62f81
SHA25698f2344ed45ff0464769e5b006bf0e831dc3834f0534a23339bb703e50db17e0
SHA5127c747d3edb04e4e71dce7efa33f5944a191896574fee5227316739a83d423936a523df12f925ee9b460cce23b49271f549c1ee5d77b50a7d7c6e3f31ba120c8f
-
Filesize
758KB
MD5afd936e441bf5cbdb858e96833cc6ed3
SHA13491edd8c7caf9ae169e21fb58bccd29d95aefef
SHA256c6491d7a6d70c7c51baca7436464667b4894e4989fa7c5e05068dde4699e1cbf
SHA512928c15a1eda602b2a66a53734f3f563ab9626882104e30ee2bf5106cfd6e08ec54f96e3063f1ab89bf13be2c8822a8419f5d8ee0a3583a4c479785226051a325
-
Filesize
1.9MB
MD587448823dab50a9edd9f481b99aca4ee
SHA12711209da94d4e33d7a6636fe1a797fba552002c
SHA2564c813bff7644e8b3db0c1f15db3eae43ba2ca5badf089ec028607c888164e539
SHA51237085c98ca976ef91631cc7d6b81bfcbf64f72443205d1df2a35105a504878b0795d45057a3c82a1cbddf0895d11dba9ffc234fb13aff14eb2def33ea449bf43
-
Filesize
1.8MB
MD51c76387d2784b116b9f532b8b0a48c8b
SHA19b977e6b1404a5e4f1b3f3254a1c025fa996ab0d
SHA256ec07d0613f3d6cf3ba318445c88e2cc77c06065cdf8a1f61a402236c0687f1d9
SHA5120fcf85db4a716b7f2da97304c70b0f7bed88d6fe448be5bff6d657df8f87cd6b57b007484017128a8c4b28c61ad5352949dba774f67d6afe8b94e701019fcaa9
-
Filesize
2.7MB
MD55f8d93018394ecd9f599aa2c10147a5f
SHA12d8e3a0d25f83fd723861b5d6cca4e1ca98ac3eb
SHA256681176f836e4a1921854c9aa2ae0fc6929b850c589beb81ccb45be4b355f2044
SHA51266a5d018dec2b2353f0048113ced96e55870d78b9253b0704f625e9003293c60e03de56cf534613ece08f183701226b4f71a7ff3adafe3128e79fcadcc1359eb
-
Filesize
944KB
MD5c62f6307b430705a222d91251c64a3fd
SHA12e02770695aa07c45ccdc17160f7d57588d938e7
SHA256bf00151c4e9ccb994891b277adca7ffb6dbb5f1e8704c9f877fabdf81653912b
SHA512698a75e35b8466252357c46ac7089ce1d52289320a125c7f431a0befa80752cc5a75dc2d959935e0a9baa61848913801fb1d24e4cebe857c7754b7ae676bada6
-
Filesize
2.6MB
MD5db8279f509cf23115dbc23bc8056f9d4
SHA16901b119db6dacd98fbe87a26ee38362fc0a0c15
SHA2560d690caf770498064bcf0faf8637dff5aba40ae2c3a077e181ebdca530e9b731
SHA5126d105c2fbf1019e7c75f271e68eedbaa1ba3ad5f0f98cf58e147b477ef860c55939fe82ed9b8c848a054ffe9b5bf4e45afc8117967cea5b4c53bf75a1a5cc65b
-
Filesize
5.1MB
MD5c7c77f6691922d0cd1bcad085ee9a720
SHA1ebd93699a1dbffe37eeeaf400a83ce99c93bdb19
SHA25693b83fb112a6fae1b8caf81eaf40100c03fbc1bebd0ffaceeb455ba32321370a
SHA5120780237f8dc99d49af712fc08309071839adceb7194872cecda8b986e4be1cc302516e3cbb356212177694cd0c3d81524973c0a2f2c693e8aab83fd02f9f1d55
-
Filesize
2.7MB
MD52bb062ebb6577aa03e0b4e74ac575033
SHA13127a7a6d17e96a51abd71f46777311b89c6d4c4
SHA2567e883b18aa917862d0d4e3ffb50ffc39cda38d27011f0572bf6415a06d6860c6
SHA5125b2332c7b68ef25f7fe04183cd4b34e98ac4fbb73720349ef726e7b20ebadeed43bc985ddeb08745c215aac303e49d422496e7f6cd3274183dc8efe11e523fcb
-
Filesize
3.5MB
MD5206adafd14fae5aa6f21379845147f9a
SHA1066fea4b6ce4cf52c489ee46737e56510cafdf56
SHA25629ba7deae0846b03d9db547802db678591cf9bc1f6b09750b4731cf1068382e4
SHA512c1b69163123a90dfcf970557c1514c1c656bffbfdf4d62dadb89e59f8997d23b5c081ffc84d8e57a2bc226a48d31e0004f8ce01f0f2a1cca822a3c8824da3bde
-
Filesize
2.9MB
MD5bca5ec4ffd71fa455f22d475ba23abc0
SHA1b2959885fd4196bddd1d4fac61ef4753d1fd6a4e
SHA256561d2aaa8e31fe8fbbb460d098b1bb901df3d0837199edcdd34134652d3f9210
SHA512f1613fc12260c82eca27dd4e3486d5ac42551f6a739352282be01c67e4e81918bbf34c943825102d8c635506010da60c873075b14b238f6c227d9e74497124f7
-
Filesize
1.7MB
MD58f424389dc0145ef31a9c1fe29d094a4
SHA193c2ab3b283592b348fc0e191737ca1648c157ac
SHA2565c3ca64f802808abeb22934c6d2a1f201e38c897ff3cdf2bc53a10d4eabf191c
SHA51216846de47cc609a7e131557dfb4a13e0e564378f2a6384915c6a782ddf50f12c36aae437080fc72c8e4acc908868ca7445a9902d3b84b419fe8add8384eabb62
-
Filesize
1KB
MD5a10f31fa140f2608ff150125f3687920
SHA1ec411cc7005aaa8e3775cf105fcd4e1239f8ed4b
SHA25628c871238311d40287c51dc09aee6510cac5306329981777071600b1112286c6
SHA512cf915fb34cd5ecfbd6b25171d6e0d3d09af2597edf29f9f24fa474685d4c5ec9bc742ade9f29abac457dd645ee955b1914a635c90af77c519d2ada895e7ecf12
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin
Filesize10KB
MD519cb59a0e4631a3e618cdd4ae46976c0
SHA107f2c2a142e37f33b42ac6bf2d3780151afc47f1
SHA2568aae675ad8b2b8f05a11aab4a3040c587f3f53a5a82e3d2469293301c256d2cc
SHA512351f4ff2438706a12922a429417839e412ec61201c77ce0397f12d16ed6c89295c003749809df435873c66fbe210e65d05ea23ce96f77c2b54e12135a5b16ec9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin
Filesize6KB
MD518d8bc2379b0e9dee4ef19012d3edc0b
SHA1dcf66c353e22f17199f493c159a3626ffb5cd0c0
SHA256e9246302552bb59515b59913e0bedb48c49f212dd16c2973c5239eec388e00fa
SHA512a3a2b039ab502aeaee7af2827fb982ac8d1ecc277777953444aea582bd48b091710763288ee13b12dbe744aee8d6dcc5a4bd5500acf1bb660e9004f69607de8d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.bin
Filesize23KB
MD5749e1cba6d4c8948a47ebccabe8e8f5b
SHA1af8088ab0a1ac0955564e04946ad59ffe894b620
SHA256fc643f2bca2d69cce492bc50b2226fe592f90a2d0a0150b42ae551bd5f2976bd
SHA51265fe119a0980e3158fa7d63a26acddda03e83a1ee59fbd3aa9b0fe8fe661e7579bad90253887849cc1b8f3c9006a3fe1326f13338867725f35c762d4bd856eec
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.bin
Filesize5KB
MD561e257679d0c0be9d11c261a3bb810a2
SHA11a6f50a49a9d7387673c3b129969ebda75643c50
SHA25604e61de7b35928adc1675c0cf9220be7acdbe5d80bab689296144ee32ad6f024
SHA512284cd3b76b1431db8892ef6944d0992c8395bb25dc1a2d6eaeeb7f586025343143139362e1b0502f7fdf80579378b8dbd1c638c7d39822bf095dd65716600b60
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD55307124b6f791bd2121fa593fa7a79f8
SHA17c99a0347aa99be6d9f25d4110de0e416abdf818
SHA2569ab39d8c41c93f94bb0fdef279bb476c7e9037e4dc87b50feb810b95a1da0157
SHA5120e3a1448cee1acfdeab32a41254ee9571fe9631cc451a8b79b16f05a8f57ba8887c09ae676e5212700e1c1b1df749a9cb48314035ee3fde02729b1d80e0a4acf
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5ff3fefb04f9f231c584f90ada0834259
SHA13a081750e8a13d1b255a31b21dde5475b9f97c90
SHA2567c05172a257c6cf60d24da48b5e9032a684092c641cd0e7deda2527738cc6826
SHA512a9758af1d5019048e187b89f44def60cb99705509a4edab553b3039bcba6c5cfdd152ddc6d6608433cf6cfc8cdbad2f217628500fee494b206ac539f23c84631
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD58b0a31c96df61e74ebe5582575763de7
SHA16df4e29af760f9fee71c4544d92757068e2f3ccf
SHA2561d58b0013f508eb36a71d5e163353121481f949b202a88fb79f7d861c5470bc0
SHA512f4f0529815a25904bec0e77cb56824ba1cc2d22d9ca828ba1264e1eea9b8f48da8341df6c8c7bd3afe18b4e7ba3deba6dba70a96181bdf78de3102a862bf4448
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5ff7d3337bcff587fcb5626b047c1362f
SHA15b3c77b075788294898e9a1b65100ffaf086cdd7
SHA2569354b5a6757318558e1e69081ef46138fdb9a2f76c7be4e8adbb3915e975dec4
SHA512d6a49f0459abf231e05ea0033ceff6a120f486c571366e12b9c5be5703d1960ac51a57bbadb772e3ad4e1662cc98477211a9ab6ade08e40769cec38ee0b03ecb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5f92cd1a11439eb5625b1ed14f50880dd
SHA165c4dd17034d1d88617e1fb7ddfe0746bb369ac8
SHA256864d88619a255122eccdea3f1d7634409df0c5e31bded6f310a4184d1fc6e36d
SHA512c52792a239c4009755c6aecb8c65d5cbfdb2ccac14692aedb8c7047469cdd655e66f574e8326e5fff44c78444ff661491c9f826ac32879f5139d85dac8067314
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\7377a32f-c2dc-4ab6-9bb8-c3a4315c4bc9
Filesize671B
MD5901d19b5adfbdeadac36c90581731bcc
SHA1adf3b2a6273a024522484cc49eba66a9a1fa1b04
SHA2560b1e90f100fd0ee8052e12b31bc9311727de8231c407e6ab2a84d7271e863ba9
SHA5123deeaaf6541501577631af8a5ef0a205605b55a79ee148f24d57ccce40209250c8db8bb277724473f35c155fd8b6dfee06a867f99d546d9e845d54c951170d50
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\be7816c7-d769-45fc-8af4-879e346531b3
Filesize982B
MD5d19362457e1bce882b659c3957e204a3
SHA16361637e9f1e81b31384c6fed7e4d9144430685c
SHA25643b1575fd8093afd4f7f2af1c68d71436ca20b2c8da57cd4cb36a26769835017
SHA5127e6b58b36e8ca27803433cd7fdf35cce53d8f764f8bc0974ed8b91cd973c8da20c2d5afb6a80e8f527064167d2a701ab6835fa8618ff37c8fb4f272e822db87e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\feefb3fe-8ef4-4192-9557-edd806b9c409
Filesize27KB
MD56fe1bab605a8f6850a754a320057d0c7
SHA1123171db916c49c0877fac00cacc0c25781a9875
SHA2567a3d8b288de2abbcaa543d37325e72f36188719aae3d9e24af91115b0eb76bbe
SHA5122074f4aeebe1407090b895ca99dbe89fe4fc2276a014529fafbe9cc74bea7e62777c22045b21e47b30f251aece9de6aeb0c2c6c2fab249922e363da66ec84f07
-
Filesize
10KB
MD53c76366c58ed7d5b086fa79bebef26cc
SHA1c9441cc74faf507d8503ecb8fe4c985911d41f04
SHA2568416112f82a9e06d629aeb60281e4ebdfaf55aace5fab3679d97e6af50a0267e
SHA5129e076c0dce9f559c04aff0e7e2c834a92036719ab8092e3a4027b81bae4caf709b5c37f4b49caa38ff3a64c6c5c999d62fcfd1f1683c79d1d35fbd725197b8e0
-
Filesize
10KB
MD57664f002bdcca63b4cec5970f81a13f2
SHA1524a6ec91d6bffb8b8278b989d3cf7163a88687b
SHA25640b79e5fd59e4c869ae3bf4d5ebf8599f2f09e2f7c8ba878256adb5f5b8bf87b
SHA512f062f8244b2df4f694d451e343b608ff1d08c4358805bd0c535417aee6ee2ce8401636c0c558bb063879077d88e5bdd015eea790e8ba7376714c53ee09ec3a79
-
Filesize
144KB
MD5cc36e2a5a3c64941a79c31ca320e9797
SHA150c8f5db809cfec84735c9f4dcd6b55d53dfd9f5
SHA2566fec179c363190199c1dcdf822be4d6b1f5c4895ebc7148a8fc9fa9512eeade8
SHA512fcea6d62dc047e40182dc4ff1e0522ca935f9aeefdb1517957977bc5d9ac654285a973261401f3b98abf1f6ed62638b9e31306fd7aaeb67214ca42dfc2888af0
-
Filesize
1.0MB
MD5971b0519b1c0461db6700610e5e9ca8e
SHA19a262218310f976aaf837e54b4842e53e73be088
SHA25647cf75570c1eca775b2dd1823233d7c40924d3a8d93e0e78c943219cf391d023
SHA512d234a9c5a1da8415cd4d2626797197039f2537e98f8f43d155f815a7867876cbc1bf466be58677c79a9199ea47d146a174998d21ef0aebc29a4b0443f8857cb9