Analysis
-
max time kernel
96s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-02-2025 01:05
Static task
static1
Behavioral task
behavioral1
Sample
2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe
Resource
win7-20240903-en
General
-
Target
2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe
-
Size
9.5MB
-
MD5
1b2cb2ec4b1c1ad891257c1943447a30
-
SHA1
4ce1ef3c337925e97aa6964e691d70c87aee11cb
-
SHA256
250f6a4dd40a9ad48e66f006c9ab24aa165322180b94a954ccfa55e02d4b8266
-
SHA512
0ba75b54cfa0623cc6d225c2490a3254f169c8d27a2a64866ff3e201298826ac9466c77ee2c7b1c89fb660c2696a1911a22079390a62fb7ddbdd6e9583365e0b
-
SSDEEP
196608:V78cEXTRiA3JjtvqiAxhv9sg1tKCTpYAQEWrqufezvGWUJ/h:VocYRiIt07vJYZEW2uGz+WUJ/h
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Signatures
-
Modifies firewall policy service 3 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe -
Sality family
-
UAC bypass 3 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe -
Windows security bypass 2 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe -
Executes dropped EXE 3 IoCs
pid Process 4020 lite_installer.exe 3276 seederexe.exe 17180 sender.exe -
Loads dropped DLL 9 IoCs
pid Process 5032 MsiExec.exe 5032 MsiExec.exe 5032 MsiExec.exe 5032 MsiExec.exe 5032 MsiExec.exe 5032 MsiExec.exe 5032 MsiExec.exe 5032 MsiExec.exe 716 MsiExec.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Windows security modification 2 TTPs 7 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 23 2188 msiexec.exe 25 2188 msiexec.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\B: 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe File opened (read-only) \??\P: 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe File opened (read-only) \??\Z: 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\E: 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe File opened (read-only) \??\L: 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe File opened (read-only) \??\O: 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe File opened (read-only) \??\Q: 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe File opened (read-only) \??\T: 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\R: 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\H: 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe File opened (read-only) \??\M: 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe File opened (read-only) \??\S: 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\J: 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\Y: 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\A: 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe File opened (read-only) \??\G: 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe File opened (read-only) \??\V: 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe File opened (read-only) \??\W: 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe File opened (read-only) \??\X: 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe File opened (read-only) \??\I: 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe File opened (read-only) \??\K: 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe File opened (read-only) \??\N: 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe File opened (read-only) \??\U: 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe File opened (read-only) \??\R: msiexec.exe -
resource yara_rule behavioral2/memory/4120-3-0x0000000002BC0000-0x0000000003C4E000-memory.dmp upx behavioral2/memory/4120-8-0x0000000002BC0000-0x0000000003C4E000-memory.dmp upx behavioral2/memory/4120-14-0x0000000002BC0000-0x0000000003C4E000-memory.dmp upx behavioral2/memory/4120-13-0x0000000002BC0000-0x0000000003C4E000-memory.dmp upx behavioral2/memory/4120-9-0x0000000002BC0000-0x0000000003C4E000-memory.dmp upx behavioral2/memory/4120-7-0x0000000002BC0000-0x0000000003C4E000-memory.dmp upx behavioral2/memory/4120-0-0x0000000002BC0000-0x0000000003C4E000-memory.dmp upx behavioral2/memory/4120-26-0x0000000002BC0000-0x0000000003C4E000-memory.dmp upx behavioral2/memory/4120-25-0x0000000002BC0000-0x0000000003C4E000-memory.dmp upx behavioral2/memory/4120-27-0x0000000002BC0000-0x0000000003C4E000-memory.dmp upx behavioral2/memory/4120-61-0x0000000002BC0000-0x0000000003C4E000-memory.dmp upx behavioral2/memory/4120-62-0x0000000002BC0000-0x0000000003C4E000-memory.dmp upx behavioral2/memory/4120-102-0x0000000002BC0000-0x0000000003C4E000-memory.dmp upx behavioral2/memory/4120-230-0x0000000002BC0000-0x0000000003C4E000-memory.dmp upx behavioral2/memory/4120-220-0x0000000002BC0000-0x0000000003C4E000-memory.dmp upx behavioral2/memory/4120-4777-0x0000000002BC0000-0x0000000003C4E000-memory.dmp upx behavioral2/memory/4120-8837-0x0000000002BC0000-0x0000000003C4E000-memory.dmp upx behavioral2/memory/4120-8856-0x0000000002BC0000-0x0000000003C4E000-memory.dmp upx behavioral2/memory/4120-8859-0x0000000002BC0000-0x0000000003C4E000-memory.dmp upx -
Drops file in Windows directory 17 IoCs
description ioc Process File opened for modification C:\Windows\SYSTEM.INI 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe File created C:\Windows\Installer\e57a5b6.msi msiexec.exe File opened for modification C:\Windows\Installer\e57a5b6.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIA9C0.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIA9E0.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIA971.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIAA00.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIAA7F.tmp msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSIA941.tmp msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Installer\SourceHash{5B964E0E-B9A3-4276-9ED9-4D5A5720747A} msiexec.exe File opened for modification C:\Windows\Installer\MSIA8F2.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSIAA21.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIAABF.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIAAD0.tmp msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sender.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lite_installer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language seederexe.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Microsoft\Internet Explorer\Main seederexe.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Microsoft\Internet Explorer\SearchScopes seederexe.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached seederexe.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{E88DCCE0-B7B3-11D1-A9F0-00AA0060FA31} {000214E6-0000-0000-C000-000000000046} 0xFFFF = 01000000000000002b51fe3b3378db01 seederexe.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\26\52C64B7E msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26 msiexec.exe -
Modifies system certificate store 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD\Blob = 0f00000001000000200000005229ba15b31b0c6f4cca89c2985177974327d1b689a3b935a0bd975532af22ab090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b06010505070308530000000100000040000000303e301f06092b06010401a032010130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c00b000000010000003000000047006c006f00620061006c005300690067006e00200052006f006f00740020004300410020002d002000520033000000620000000100000020000000cbb522d7b7f127ad6a0113865bdf1cd4102e7d0759af635a7cf4720dc963c53b1400000001000000140000008ff04b7fa82e4524ae4d50fa639a8bdee2dd1bbc1d000000010000001000000001728e1ecf7a9d86fb3cec8948aba953030000000100000014000000d69b561148f01c77c54578c10926df5b856976ad2000000001000000630300003082035f30820247a003020102020b04000000000121585308a2300d06092a864886f70d01010b0500304c3120301e060355040b1317476c6f62616c5369676e20526f6f74204341202d20523331133011060355040a130a476c6f62616c5369676e311330110603550403130a476c6f62616c5369676e301e170d3039303331383130303030305a170d3239303331383130303030305a304c3120301e060355040b1317476c6f62616c5369676e20526f6f74204341202d20523331133011060355040a130a476c6f62616c5369676e311330110603550403130a476c6f62616c5369676e30820122300d06092a864886f70d01010105000382010f003082010a0282010100cc2576907906782216f5c083b684ca289efd057611c5ad8872fc460243c7b28a9d045f24cb2e4be1608246e152ab0c8147706cdd64d1ebf52ca30f823d0c2bae97d7b614861079bb3b1380778c08e149d26a622f1f5efa9668df892795389f06d73ec9cb26590d73deb0c8e9260e8315c6ef5b8bd20460ca49a628f6693bf6cbc82891e59d8a615737ac7414dc74e03aee722f2e9cfbd0bbbff53d00e10633e8822bae53a63a16738cdd410e203ac0b4a7a1e9b24f902e3260e957cbb904926868e538266075b29f77ff9114efae2049fcad401548d1023161195eb897efad77b7649a7abf5fc113ef9b62fb0d6ce0546916a903da6ee983937176c6698582170203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e041604148ff04b7fa82e4524ae4d50fa639a8bdee2dd1bbc300d06092a864886f70d01010b050003820101004b40dbc050aafec80ceff796544549bb96000941acb3138686280733ca6be674b9ba002daea40ad3f5f1f10f8abf73674a83c7447b78e0af6e6c6f03298e333945c38ee4b9576caafc1296ec53c62de4246cb99463fbdc536867563e83b8cf3521c3c968fecedac253aacc908ae9f05d468c95dd7a58281a2f1ddecd0037418fed446dd75328977ef367041e15d78a96b4d3de4c27a44c1b737376f41799c21f7a0ee32d08ad0a1c2cff3cab550e0f917e36ebc35749bee12e2d7c608bc3415113239dcef7326b9401a899e72c331f3a3b25d28640ce3b2c8678c9612f14baeedb556fdf84ee05094dbd28d872ced36250651eeb92978331d9b3b5ca47583f5f 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD\Blob = 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 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD\Blob = 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 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD\Blob = 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 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe 2188 msiexec.exe 2188 msiexec.exe 4020 lite_installer.exe 4020 lite_installer.exe 17180 sender.exe 17180 sender.exe 17180 sender.exe 17180 sender.exe 4020 lite_installer.exe 4020 lite_installer.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Token: SeDebugPrivilege 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Token: SeDebugPrivilege 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Token: SeDebugPrivilege 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Token: SeDebugPrivilege 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Token: SeDebugPrivilege 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Token: SeDebugPrivilege 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Token: SeDebugPrivilege 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Token: SeDebugPrivilege 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Token: SeDebugPrivilege 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Token: SeDebugPrivilege 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Token: SeDebugPrivilege 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Token: SeDebugPrivilege 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Token: SeDebugPrivilege 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Token: SeDebugPrivilege 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Token: SeDebugPrivilege 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Token: SeDebugPrivilege 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Token: SeDebugPrivilege 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Token: SeDebugPrivilege 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Token: SeDebugPrivilege 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Token: SeDebugPrivilege 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Token: SeDebugPrivilege 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Token: SeDebugPrivilege 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Token: SeDebugPrivilege 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Token: SeDebugPrivilege 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Token: SeDebugPrivilege 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Token: SeDebugPrivilege 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Token: SeDebugPrivilege 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Token: SeDebugPrivilege 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Token: SeDebugPrivilege 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Token: SeDebugPrivilege 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Token: SeDebugPrivilege 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Token: SeDebugPrivilege 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Token: SeDebugPrivilege 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Token: SeDebugPrivilege 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Token: SeDebugPrivilege 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Token: SeDebugPrivilege 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Token: SeDebugPrivilege 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Token: SeDebugPrivilege 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Token: SeDebugPrivilege 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Token: SeDebugPrivilege 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Token: SeDebugPrivilege 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Token: SeDebugPrivilege 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Token: SeDebugPrivilege 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Token: SeDebugPrivilege 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Token: SeDebugPrivilege 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Token: SeDebugPrivilege 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Token: SeDebugPrivilege 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Token: SeDebugPrivilege 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Token: SeDebugPrivilege 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Token: SeDebugPrivilege 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Token: SeDebugPrivilege 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Token: SeDebugPrivilege 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Token: SeDebugPrivilege 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Token: SeDebugPrivilege 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Token: SeDebugPrivilege 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Token: SeDebugPrivilege 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Token: SeDebugPrivilege 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Token: SeDebugPrivilege 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Token: SeDebugPrivilege 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Token: SeDebugPrivilege 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Token: SeDebugPrivilege 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Token: SeDebugPrivilege 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe Token: SeDebugPrivilege 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 4120 wrote to memory of 768 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe 8 PID 4120 wrote to memory of 772 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe 9 PID 4120 wrote to memory of 384 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe 13 PID 4120 wrote to memory of 2508 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe 43 PID 4120 wrote to memory of 2544 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe 44 PID 4120 wrote to memory of 2708 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe 47 PID 4120 wrote to memory of 3484 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe 56 PID 4120 wrote to memory of 3628 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe 57 PID 4120 wrote to memory of 3824 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe 58 PID 4120 wrote to memory of 3916 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe 59 PID 4120 wrote to memory of 3980 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe 60 PID 4120 wrote to memory of 4060 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe 61 PID 4120 wrote to memory of 3012 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe 62 PID 4120 wrote to memory of 1740 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe 75 PID 4120 wrote to memory of 3552 4120 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe 76 PID 2188 wrote to memory of 5032 2188 msiexec.exe 84 PID 2188 wrote to memory of 5032 2188 msiexec.exe 84 PID 2188 wrote to memory of 5032 2188 msiexec.exe 84 PID 5032 wrote to memory of 4020 5032 MsiExec.exe 85 PID 5032 wrote to memory of 4020 5032 MsiExec.exe 85 PID 5032 wrote to memory of 4020 5032 MsiExec.exe 85 PID 2188 wrote to memory of 716 2188 msiexec.exe 87 PID 2188 wrote to memory of 716 2188 msiexec.exe 87 PID 2188 wrote to memory of 716 2188 msiexec.exe 87 PID 716 wrote to memory of 3276 716 MsiExec.exe 88 PID 716 wrote to memory of 3276 716 MsiExec.exe 88 PID 716 wrote to memory of 3276 716 MsiExec.exe 88 PID 3276 wrote to memory of 17180 3276 seederexe.exe 89 PID 3276 wrote to memory of 17180 3276 seederexe.exe 89 PID 3276 wrote to memory of 17180 3276 seederexe.exe 89 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe
Processes
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:768
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:772
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵PID:384
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2508
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2544
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2708
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3484
-
C:\Users\Admin\AppData\Local\Temp\2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe"C:\Users\Admin\AppData\Local\Temp\2025-02-06_1b2cb2ec4b1c1ad891257c1943447a30_hawkeye_luca-stealer_magniber.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4120
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3628
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3824
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3916
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3980
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:4060
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3012
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵PID:1740
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3552
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding FD263DEE725F5BADE6AEF3CC4A8E25702⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Users\Admin\AppData\Local\Temp\56E024B3-164B-466C-8EEF-56366A142272\lite_installer.exe"C:\Users\Admin\AppData\Local\Temp\56E024B3-164B-466C-8EEF-56366A142272\lite_installer.exe" --use-user-default-locale --silent --cumtom-welcome-page=https://browser.yandex.ru/promo/welcome_com/5/3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4020
-
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 20AC6DB603618ED005083ADB41A9EB8F E Global\MSI00002⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:716 -
C:\Users\Admin\AppData\Local\Temp\889A37AE-1146-47A2-98F5-1F7F005573F8\seederexe.exe"C:\Users\Admin\AppData\Local\Temp\889A37AE-1146-47A2-98F5-1F7F005573F8\seederexe.exe" "--yqs=" "--yhp=" "--ilight=" "--locale=us" "--browser=" "--browser_default=" "--yabm=" "--loglevel=trace" "--ess=" "--clids=C:\Users\Admin\AppData\Local\Temp\clids-yasearch.xml" "--sender=C:\Users\Admin\AppData\Local\Temp\B562E39C-EF87-462F-AEBA-3D6C10E9E5BD\sender.exe" "--is_elevated=yes" "--ui_level=5"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Users\Admin\AppData\Local\Temp\B562E39C-EF87-462F-AEBA-3D6C10E9E5BD\sender.exeC:\Users\Admin\AppData\Local\Temp\B562E39C-EF87-462F-AEBA-3D6C10E9E5BD\sender.exe --send "/status.xml?clid=2255393&uuid=9dd8a1a8-e430-47b5-9297-89c96c678b58&vnt=Windows 10x64&file-no=8%0A15%0A25%0A38%0A45%0A57%0A59%0A102%0A106%0A108%0A111%0A125%0A129%0A"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:17180
-
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
7Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
591B
MD51502f49e3454c3b959de850f87c9df06
SHA11b2d8076eeaf305dc782ba2027d3ee2a7943631e
SHA256175a460a2410a576e1653a44de6eb18cc739585e165a41f35d0f51af5001e9dd
SHA512d8ab494e0a78ce50e273e296b567f478cb4e9e97bf8b9666b00b23a85a74ab03dc32c38058ff0bed25a6e6823007f0f769753215199da84a57c1e1708106b636
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0DA515F703BB9B49479E8697ADB0B955_A026C9CD7BA14377D055F4A2325D4501
Filesize1KB
MD5b5c77f589f8a2e34b8198cd40deafeba
SHA1178bd02ee96a2e846a9eb4091f36b36415e61c33
SHA256bb5e2ed52f7fcf25088e153cf4c00f56ccd23353c6e4d865a5fe7f4442b5fe02
SHA512e6bfd2b99b8cfae9113939eef5537afd05bf975d5d159ad12e6b76a5844bd82058edd059e77be5731bae0e65d42417300ab2e400928f8b1aa90bba801c01fcba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\769F85394FB15C375FF89A7488274D5B_22252D7CC6CD0EA80FCE3FF30A53AFB2
Filesize5B
MD55bfa51f3a417b98e7443eca90fc94703
SHA18c015d80b8a23f780bdd215dc842b0f5551f63bd
SHA256bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128
SHA5124cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399
-
Filesize
8KB
MD5ef742b46ba1e5b67c2c1bc9c60de08a0
SHA1259f87376b46365c3488ed1d29b7856e650598a1
SHA2560f2cd52a46c8d23d17680c5cf6d088c4d9d3b9650177a6acef042447109b49a9
SHA512b053c8076d75de5e7a37fab4c33167eaec9278c37cce6ee2536f818a18ca341c90fa8ea88590a05b112b1dda2f5d81874c1a7c65e52c9c563e743f2b4834988f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B039FEA45CB4CC4BBACFC013C7C55604_4BB72A60CF9C652B353353202101C0E4
Filesize1KB
MD52175c892a15a84d8d494874f9a2ef590
SHA1781625f5011b039d335780c84e095cd0556b73a5
SHA25699dc9ed272c99e919c54786173a4cf7f96613ed06b5b6800e67bec1cd4eb83c6
SHA51222c143c01858c88bb7bc38682a70cdb244607d72a64cd79e2f80792440d1b00bb861012e5d5c871bb10b177a22d9f8e5d724f74c18047cf3a649c9d51713e131
-
Filesize
1KB
MD52ffbdb98df2a2b022a48adeb94a3af50
SHA16c86923b5c5832bb102f041cb7d38db397074f12
SHA256dd12c5733bc4b682e1da6353c8c27650f53d11a8ada8fd8a2d06f23cecae5ebd
SHA512a5f29661ac78ea205dd945fcc53e015152277426af4bcce688231ca1a564dc49144b2953409651737733fec72e9042468c780917543c007d7de74ed44058dbfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0DA515F703BB9B49479E8697ADB0B955_A026C9CD7BA14377D055F4A2325D4501
Filesize508B
MD51ba4d933798bfe0c83bdd85f8ca496dc
SHA1fc194f7f4c57a670da19738bce566bfe037d0eab
SHA25682c686d0e4bcdce1c04db3d00094b7a712012861dc04d5062abd03e0c740b0d6
SHA5128f6fb2d29f62b95e2b2c5868bab4fad848462fe2aed9c49308ad15560e2feb6c770b91d0d958f8fa00ee08262d1f775460eb31569a38104dfedfa4f569c6aefd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\769F85394FB15C375FF89A7488274D5B_22252D7CC6CD0EA80FCE3FF30A53AFB2
Filesize436B
MD5cf1bd8e47619485c59fa2f2a38f48d2f
SHA14ee49b197be2aba74fc5711191de74f743019f88
SHA256b4c4384c3961dbda6e93958e179620be0baded9d5373f5436adeaa189bf22b80
SHA512a127a47432e248275839bd5d956dfbbbaebcc671e75604f0a16b53c855b0e3ec0dfb800fac4804e1ddc3cd23713826005973707dfd3c6941a5abfab7f593402b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8E55FEB142F566DFBD0ED964FAB94545
Filesize210B
MD5003c9a0a277a97e648efb4a4f13de7c9
SHA1f9d9566a3bb863fb0ab95abb8ef534f6feb1289a
SHA256c270135e6e8d62abc8225594f2a037fdf3cfcadd5276ae66efe922667e0ff595
SHA512d9642460f4efcf6897b04d3894725edd81fd8f26ec1c7a70d07e207dcdac4a46c317a0d2330b1c245e99a7a4c6593c0fd340c6a30bbc44b18aaf5e841cf7f23c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B039FEA45CB4CC4BBACFC013C7C55604_4BB72A60CF9C652B353353202101C0E4
Filesize502B
MD58d58d7a24ab348ebfaa6f0427038a6db
SHA1fa63ce4e5b66da075087fb28b3a44bcda18ddc80
SHA2562f20c38f364c41440617d9e1ab34f94c5af25b002004b5f2dc43056ef6611afa
SHA512972498f31fee0ab078fa576f96c20746e8dbaa2870588567f0233c1dc8699e4c83407721956ba09311629234043f7b9ac0ed377cec335ae3c116ac0657df0541
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B0B1E3C3B1330A269DBEE4BA6313E7B4
Filesize208B
MD535efc2661ab93b89a538bd6c87931a35
SHA1170f25df60832e527e019161ed03f040ec5b4d02
SHA256e35906450e2dc014e9a5a8916b020ac913ebbae1565bdedc29165d37b3dbe7c3
SHA5124816a1d6203ba6fb19783e27ce9aa853b924afee584652a0cca31814cf82e78c495a430c3b2b612bc1e09f9a06d445cffbb55237806c6e39ed481861ec1dbbfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DDA81A73291E20E6ACF6CACA76D5C942_4EA93225B46C4B45501FF0DDE9E306D0
Filesize440B
MD5353c02b618df024dfc68f57c3e00f862
SHA183901a172d1c0be5cb719a277f04b184d24edb61
SHA256049d6c8986d0d4ea6961340c1ef6f04c274521cd4a3fdca6ba3b853cd0271528
SHA512982a37fb768753b40ba5c6a957ccbdc22c9ed2a5d868eaa5abad969427d46625a758a26fc9c3d079bd3545dc472fecc57d06e9597ac627d2b5f22e2503718e76
-
Filesize
415KB
MD54958fe818ee0910209de2482bceed571
SHA1c687e280b374c25b17a7f70e8c78f0ab331857bc
SHA2563317ab61f7fbd98199f961ff8b3b68e310c12b6a76312819daed873d172054d4
SHA512b54d4727200d9c473b3b2fde613a7ace8220aaa7ac52e0e29ae39aa22bd05c15fabb47b119b2085f81bbc864100fd78bfe2d74a1c122a80d143be17c6eb25cd8
-
Filesize
7.4MB
MD5f4a72fa8bd9c0583bfa4e1e5a9b2780e
SHA100ef9ebc448f345a26598ea68ff4b5737d0d9fbb
SHA256b4a72919d83b22ad06aca95fc8603e3b00f5804f5cc3f53dbd1c6e16ff2b8bf9
SHA5129a27b6a0245987496ae17ebb3610d231245594db4a1c4fdf19ec004cf7bfe5a67246946c6d8d441824609bb2d6fee1287688ec21c6177d4394e8f7c9d82f5034
-
Filesize
264KB
MD5eb796e1048dd306d7ef2d09189b98bc2
SHA1c2a6ee261e26619bea43e53a51407ccc6a9e0778
SHA256b8dbc06ff7b0e10451a773e054337854b957be6650d5839b27f92706c8f75aa3
SHA51226375f5e039e51db7f990f6e7183aabf9cfea48c6f5e25bea588f26ea9a5e7a704485584eaab9f465111158952a07b9a87943be7986e0c0abca26e850909d2eb
-
Filesize
35KB
MD5f3565827485e05bc92a5042e0a07841e
SHA17be3f19692e3024b83b707e0b9e9a9dbef22fc6b
SHA256de82f174564b4e3d1567c71888812e4adc04025b052c17eacb2ab56e5eb407f9
SHA512adf3eb118493d95a044971ab2789cf994770f974dc225d1a1101a460149fae91ea6df3b65c1f2b6e7cf49d13dfa2f0fe1c5024a4446ab3986bb6b8da2286c4e3
-
Filesize
1KB
MD55a40649cf7f6923e1e00e67a8e5fc6c8
SHA1fc849b64b31f2b3d955f0cb205db6921eacc1b53
SHA2566d432ba7096090837f9533a33a686c846ad67aed8ecc43af7ce8af42649cd51a
SHA5120fc42a2cc61528b14478f4b9ae098ea90e6b05ddbe10f3a6cdd6326d0d8e6185b49d2b8143b76a9f329bdc277cf02b54d98f374edd65df68a1ffc41e1c817786
-
Filesize
688KB
MD5ab6d42f949df8d7e6a48c07e9b0d86e0
SHA11830399574b1973e2272e5dcc368c4c10dbbe06b
SHA256205ebf52c47b42fa0ad1a734a1d882d96b567e15a32b19bdb907562db8ea09e2
SHA5126c4f9bb726384c87b6523e08339f7821ad4ec8717b26db902ca51df74eb89b46e4ded1504a131683b07b2bba3e6e911a549a8a83b2aad3971047c0fe315a1ad5
-
Filesize
5KB
MD5856242624386f56874a3f3e71d7993f4
SHA196d3199c5eebb0d48c944050fbc753535ee09801
SHA256d86ed80d2a9e4e1af843a991a6553a2fefd5433b2144be0cfb63a2f18deb86be
SHA51276d440fe2ed535677a1d249b289463bfedfc5d2afc0e269e4593bb113393f165856c07117735cf3e5a230b5d04a61c7126df24a466594d8c27b47b2047834a09
-
Filesize
1.7MB
MD5e68cea8c6d4b16641f30dd930a952ebb
SHA17e8c4b51e6e56f35a2983ab6cb121341aeda565c
SHA256a7f3f788323a12158d66f341c4711d71fc2244a2b07a68fb8df4baec0ff76f35
SHA51296351e36a4c5020ed464b96b72bb3063db819981440bde7c6c3a50f7fe470e1d70f0350ec7c4bcd4808fcabe2ddfbdebfc7039ae2248c1455e2245f53ce44ec0
-
Filesize
560B
MD5bb86a574d808f235e346aa71aba2ef2f
SHA137171e01f066fcd21ceb0b4a3961c55a8491dc55
SHA256b5a25aa7d1f28ad3fe60d91ef0e3dd4b4352dcacd0215e2d8e6ba45394e27750
SHA51240112649f82243cc6bee9a276229c868ce8e09881ae9698fda2a35cbf946d7db90ee3c05585907183052821a5e774e90f85a41381f6da4b980230e84826fc3bc
-
Filesize
42.1MB
MD5bf952b53408934f1d48596008f252b8d
SHA1758d76532fdb48c4aaf09a24922333c4e1de0d01
SHA2562183a97932f51d5b247646985b4e667d8be45f18731c418479bbd7743c825686
SHA512a510a96e17090ada1a107e0f6d4819787652ab3d38cd17237f255c736817c7cfcb3fd5cf25f56d5693f4923375b2ab9548e9215070e252aae25c3528b2186d99
-
Filesize
597B
MD5b4b89b203968f4fb1b7850fd05a94094
SHA191aec65c34241053d2e49431739929c038d7d881
SHA256cc6c2d3f348e5b0b548b3d2e8ad2db90700962b8a8dc4851feb94fe339d07e44
SHA512570976aed5e0bde0e535e464d0c649d14815cb5c9f8cf12fead489e6faa041efc5f1e7c9f5b03889f3d6b9c8a0069f7c744e0c8fef46b2b858889d527a379148
-
Filesize
9.1MB
MD591eb14f38b109168410a2413c8e8ec02
SHA1716f778fb0ee3da11c215e3278afd071411cc7d8
SHA25652d09e30ad5a0c2bf880fe5dde2da9efc237fa55ced7feed2baf3e91b322ef8d
SHA512183b691bb6c59e284a88412bb5408d6d67724d1a4afff0fe1eb7d3c07132d3d3d06225f16ce085721687ff7209429aad3871f907077d3c33231161226d39b521
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\43mkyhds.Admin\places.sqlite-20250206010541.134303.backup
Filesize68KB
MD558b4f36e4874cbc6a0a930e91ffb2c89
SHA1207138ddac715a55c24babb609fb1a480658f3f6
SHA25669d959aa7616101ea0d194cbb3afa08047ea7a9d169ca72a9d375f7e96125e48
SHA512cd6b989135fa8d7951606e1ff1285fe3f2ac2859414a4c88b3b7c71e02c765988775ce60d4e382183528d55cffdfd9fb08be1e9b96f692ad50ba473a9f84edee
-
Filesize
1KB
MD53adec702d4472e3252ca8b58af62247c
SHA135d1d2f90b80dca80ad398f411c93fe8aef07435
SHA2562b167248e8136c4d45c2c46e2bff6fb5e5137dd4dfdccde998599be2df2e9335
SHA5127562e093d16ee6305c1bb143a3f5d60dafe8b5de74952709abc68a0c353b65416bf78b1fa1a6720331615898848c1464a7758c5dfe78f8098f77fbfa924784c0
-
Filesize
313B
MD5af006f1bcc57b11c3478be8babc036a8
SHA1c3bb4fa8c905565ca6a1f218e39fe7494910891e
SHA256ed6a32e11cc99728771989b01f5ae813de80c46a59d3dc68c23a4671a343cb8c
SHA5123d20689b0f39b414349c505be607e6bfc1f33ac401cf62a32f36f7114e4a486552f3e74661e90db29402bb85866944e9f8f31baba9605aa0c6def621511a26af
-
Filesize
38B
MD5c1fcf69c518a284901c8a59334c72299
SHA1318ea9f1849ce3ecb1caedece571064275826c9c
SHA25696fb10f560bb8cbc66d33e523cc3158ab33649ceb773faf8803693107d21e12a
SHA512e2b6dab0496eb269645f6e7932e14b92b2d23d38133677f1e1636937d783a228f01d8affa92830a5c42e9fed53271d848eaa170e64ac8fb2da838b9e6259c382
-
Filesize
171KB
MD5cb48b56d733e4e923d368674b02b4459
SHA192362e400cc53c2729d3d97a753c2ef24cacf614
SHA2563e3bcad00d145302e91c37c763144a37e694430b430527a440cc46c700c33f21
SHA512aa89d1e61a318751f10a88802ad4713c7b708e8074acc0a2b80c4e763f53bcfbf712b27049ccf53c2f94a18be9ded082ef8206804b63195aac1e97c44cf97489
-
Filesize
190KB
MD5351e5c03e84f43ef17ecac2b77b8f7e1
SHA14d71bcb5cc3ff04add17245f9e2846398fecceb7
SHA2565a1e53a4295f93005f2188d1bba6d61710193102cb5bd144e487c018988bb1bc
SHA512eabcea3966fa320055e320b271b68dcb32df5af934cf43ca2dec76b2f255ffb781816739a92470a125b802a4e9cc7e907f581a5268b3745e84e3bf29a385dbd6
-
Filesize
202KB
MD5d773d9bd091e712df7560f576da53de8
SHA1165cfbdce1811883360112441f7237b287cf0691
SHA256e0db1804cf53ed4819ed70cb35c67680ce1a77573efded86e6dac81010ce55e7
SHA51215a956090f8756a6bfdbe191fda36739b1107eada62c6cd3058218beb417bdbd2ea82be9b055f7f6eb8017394b330daff2e9824dbc9c4f137bead8e2ac0574cd