Analysis

  • max time kernel
    148s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    14-12-2024 01:26

General

  • Target

    786cacdf01a6f995fa366ec96f869e36aea02b478426595de4d72ce297b92312.exe

  • Size

    3.2MB

  • MD5

    7229bce5ce94ad8c3efdac6116ca0dfd

  • SHA1

    bab536edb7b176deedc34f51bca00786358a9238

  • SHA256

    786cacdf01a6f995fa366ec96f869e36aea02b478426595de4d72ce297b92312

  • SHA512

    147165e60b94781f32180d41107d81504cf6c8a08a7b235c0680af1708447341ab6cb42e4d8ba310b4425d30bb4961f91da1801f45285f32974ccd9f5a419f4b

  • SSDEEP

    49152:CB2DsthgCxRK8k9rmlS2nRqGXqiR4h5inlI:FsthgCxRK8k9rmfRqGMelI

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
  • Renames multiple (8139) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 8 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 24 IoCs
  • Identifies Wine through registry keys 2 TTPs 4 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 44 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 2 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 19 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 6 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Runs ping.exe 1 TTPs 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 51 IoCs
  • Suspicious use of FindShellTrayWindow 21 IoCs
  • Suspicious use of SendNotifyMessage 19 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Views/modifies file attributes 1 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\786cacdf01a6f995fa366ec96f869e36aea02b478426595de4d72ce297b92312.exe
    "C:\Users\Admin\AppData\Local\Temp\786cacdf01a6f995fa366ec96f869e36aea02b478426595de4d72ce297b92312.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2512
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2804
      • C:\Users\Admin\AppData\Local\Temp\1014759001\LoaderClient.exe
        "C:\Users\Admin\AppData\Local\Temp\1014759001\LoaderClient.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2028
        • C:\Users\Admin\AppData\Local\Temp\1014759001\LoaderClient.exe
          "C:\Users\Admin\AppData\Local\Temp\1014759001\LoaderClient.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:2136
      • C:\Users\Admin\AppData\Local\Temp\1014798001\4ZD5C3i.exe
        "C:\Users\Admin\AppData\Local\Temp\1014798001\4ZD5C3i.exe"
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:692
      • C:\Users\Admin\AppData\Local\Temp\1014844001\BlueMail.exe
        "C:\Users\Admin\AppData\Local\Temp\1014844001\BlueMail.exe"
        3⤵
        • Drops startup file
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2948
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2948 -s 616
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:6588
      • C:\Users\Admin\AppData\Local\Temp\1015004001\25c5e9a9b1.exe
        "C:\Users\Admin\AppData\Local\Temp\1015004001\25c5e9a9b1.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:10744
        • C:\Windows\system32\cmd.exe
          cmd /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"
          4⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:3536
          • C:\Windows\system32\mode.com
            mode 65,10
            5⤵
              PID:4620
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e file.zip -p24291711423417250691697322505 -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:5016
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_7.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:6284
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_6.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:7172
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_5.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:9212
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_4.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:9508
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_3.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:10164
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_2.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:10720
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_1.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:11592
            • C:\Windows\system32\attrib.exe
              attrib +H "in.exe"
              5⤵
              • Views/modifies file attributes
              PID:4936
            • C:\Users\Admin\AppData\Local\Temp\main\in.exe
              "in.exe"
              5⤵
              • Executes dropped EXE
              PID:6020
              • C:\Windows\system32\attrib.exe
                attrib +H +S C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                6⤵
                • Views/modifies file attributes
                PID:2464
              • C:\Windows\system32\attrib.exe
                attrib +H C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                6⤵
                • Views/modifies file attributes
                PID:1540
              • C:\Windows\system32\schtasks.exe
                schtasks /f /CREATE /TN "Intel_PTT_EK_Recertification" /TR "C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe" /SC MINUTE
                6⤵
                • Scheduled Task/Job: Scheduled Task
                PID:2424
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell ping 127.0.0.1; del in.exe
                6⤵
                • System Network Configuration Discovery: Internet Connection Discovery
                • Suspicious use of AdjustPrivilegeToken
                PID:1892
                • C:\Windows\system32\PING.EXE
                  "C:\Windows\system32\PING.EXE" 127.0.0.1
                  7⤵
                  • System Network Configuration Discovery: Internet Connection Discovery
                  • Runs ping.exe
                  PID:6128
        • C:\Users\Admin\AppData\Local\Temp\1015008001\35320edb97.exe
          "C:\Users\Admin\AppData\Local\Temp\1015008001\35320edb97.exe"
          3⤵
          • Executes dropped EXE
          PID:10264
        • C:\Users\Admin\AppData\Local\Temp\1015009001\770a59b4e0.exe
          "C:\Users\Admin\AppData\Local\Temp\1015009001\770a59b4e0.exe"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          • Modifies system certificate store
          PID:12488
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\1015009001\770a59b4e0.exe" & rd /s /q "C:\ProgramData\3W47QQ9ZUA1V" & exit
            4⤵
            • System Location Discovery: System Language Discovery
            PID:6624
            • C:\Windows\SysWOW64\timeout.exe
              timeout /t 10
              5⤵
              • System Location Discovery: System Language Discovery
              • Delays execution with timeout.exe
              PID:6708
        • C:\Users\Admin\AppData\Local\Temp\1015010001\dfcba3e368.exe
          "C:\Users\Admin\AppData\Local\Temp\1015010001\dfcba3e368.exe"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:5892
        • C:\Users\Admin\AppData\Local\Temp\1015011001\67a6d8b5fe.exe
          "C:\Users\Admin\AppData\Local\Temp\1015011001\67a6d8b5fe.exe"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:6260
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM firefox.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:6512
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM chrome.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:6792
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM msedge.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:7040
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM opera.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:7100
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM brave.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:7180
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
            4⤵
              PID:7316
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                5⤵
                • Checks processor information in registry
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                PID:7340
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="7340.0.1293919197\856008352" -parentBuildID 20221007134813 -prefsHandle 1280 -prefMapHandle 1272 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e66afa03-670b-402f-a4d0-b008068b2e67} 7340 "\\.\pipe\gecko-crash-server-pipe.7340" 1356 14309158 gpu
                  6⤵
                    PID:10696
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="7340.1.1673597786\1889277098" -parentBuildID 20221007134813 -prefsHandle 1540 -prefMapHandle 1536 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d65ae701-1990-4347-8f13-9be186ff24f4} 7340 "\\.\pipe\gecko-crash-server-pipe.7340" 1552 f3ec258 socket
                    6⤵
                      PID:7724
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="7340.2.1071181324\1107485150" -childID 1 -isForBrowser -prefsHandle 1968 -prefMapHandle 1964 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 596 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {96e1eced-2b41-40d8-acd4-fa9edec60a64} 7340 "\\.\pipe\gecko-crash-server-pipe.7340" 1980 185cba58 tab
                      6⤵
                        PID:1836
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="7340.3.1117416103\42621549" -childID 2 -isForBrowser -prefsHandle 2944 -prefMapHandle 2940 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 596 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {751dacdf-5cdd-4410-a2c4-6cbdbcbe372d} 7340 "\\.\pipe\gecko-crash-server-pipe.7340" 2956 e5d258 tab
                        6⤵
                          PID:8500
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="7340.4.1276141177\1322132039" -childID 3 -isForBrowser -prefsHandle 3696 -prefMapHandle 3736 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 596 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {92a6e882-0abe-4e8e-90bd-bea906b6c88a} 7340 "\\.\pipe\gecko-crash-server-pipe.7340" 3760 1eb87c58 tab
                          6⤵
                            PID:8704
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="7340.5.560925512\416189645" -childID 4 -isForBrowser -prefsHandle 3860 -prefMapHandle 3864 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 596 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {29f265ce-776c-4d50-99cd-5884e2b6dba4} 7340 "\\.\pipe\gecko-crash-server-pipe.7340" 3848 1ede3258 tab
                            6⤵
                              PID:8748
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="7340.6.1580011467\1775016410" -childID 5 -isForBrowser -prefsHandle 4028 -prefMapHandle 4032 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 596 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {84a9eb71-036b-4f54-af7d-beeeb043114e} 7340 "\\.\pipe\gecko-crash-server-pipe.7340" 4016 1ede1a58 tab
                              6⤵
                                PID:8732
                        • C:\Users\Admin\AppData\Local\Temp\1015012001\79dca634f6.exe
                          "C:\Users\Admin\AppData\Local\Temp\1015012001\79dca634f6.exe"
                          3⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          PID:6832
                        • C:\Users\Admin\AppData\Local\Temp\1015013001\c166404a17.exe
                          "C:\Users\Admin\AppData\Local\Temp\1015013001\c166404a17.exe"
                          3⤵
                          • Modifies Windows Defender Real-time Protection settings
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Windows security modification
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          • Suspicious use of AdjustPrivilegeToken
                          PID:7268
                    • C:\Windows\system32\vssvc.exe
                      C:\Windows\system32\vssvc.exe
                      1⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2272
                    • C:\Windows\system32\taskeng.exe
                      taskeng.exe {7D842BA0-B48A-4FB9-9D26-6AB7E2FF0131} S-1-5-21-312935884-697965778-3955649944-1000:MXQFNXLT\Admin:Interactive:[1]
                      1⤵
                      • Loads dropped DLL
                      PID:6028
                      • C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                        C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                        2⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        PID:1544
                        • C:\Windows\explorer.exe
                          explorer.exe
                          3⤵
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2180
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          powershell ping 127.1.10.1; del Intel_PTT_EK_Recertification.exe
                          3⤵
                          • Drops file in System32 directory
                          • System Network Configuration Discovery: Internet Connection Discovery
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3216
                          • C:\Windows\system32\PING.EXE
                            "C:\Windows\system32\PING.EXE" 127.1.10.1
                            4⤵
                            • System Network Configuration Discovery: Internet Connection Discovery
                            • Runs ping.exe
                            PID:3092
                      • C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                        C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                        2⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        PID:10412
                        • C:\Windows\explorer.exe
                          explorer.exe
                          3⤵
                          • Suspicious use of AdjustPrivilegeToken
                          PID:11408
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          powershell ping 127.1.10.1; del Intel_PTT_EK_Recertification.exe
                          3⤵
                          • Drops file in System32 directory
                          • System Network Configuration Discovery: Internet Connection Discovery
                          • Suspicious use of AdjustPrivilegeToken
                          PID:10900
                          • C:\Windows\system32\PING.EXE
                            "C:\Windows\system32\PING.EXE" 127.1.10.1
                            4⤵
                            • System Network Configuration Discovery: Internet Connection Discovery
                            • Runs ping.exe
                            PID:11596

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Recovery\README.TXT

                      Filesize

                      533B

                      MD5

                      81d185495b4e6430a87dfd37789bb872

                      SHA1

                      b5da653f81a548c74205c7ae3d19f30af1a14271

                      SHA256

                      838d654b9cb0360d8b3bb767db8fc1954fc41ba0a56fc34688aad9b50f5ddb40

                      SHA512

                      1106c9c2245cbd44effb42e4e1365eb796d3b2390b011fb97205550bf183b097c489194aa001f97f949e9d1ed1c970eea6cbb0477da47511e5bc18e88bf2dfa5

                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8B2B9A00839EED1DFDCCC3BFC2F5DF12

                      Filesize

                      1KB

                      MD5

                      67e486b2f148a3fca863728242b6273e

                      SHA1

                      452a84c183d7ea5b7c015b597e94af8eef66d44a

                      SHA256

                      facaf1c3a4bf232abce19a2d534e495b0d3adc7dbe3797d336249aa6f70adcfb

                      SHA512

                      d3a37da3bb10a9736dc03e8b2b49baceef5d73c026e2077b8ebc1b786f2c9b2f807e0aa13a5866cf3b3cafd2bc506242ef139c423eaffb050bbb87773e53881e

                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B46811C17859FFB409CF0E904A4AA8F8

                      Filesize

                      436B

                      MD5

                      971c514f84bba0785f80aa1c23edfd79

                      SHA1

                      732acea710a87530c6b08ecdf32a110d254a54c8

                      SHA256

                      f157ed17fcaf8837fa82f8b69973848c9b10a02636848f995698212a08f31895

                      SHA512

                      43dc1425d80e170c645a3e3bb56da8c3acd31bd637329e9e37094ac346ac85434df4edcdbefc05ae00aea33a80a88e2af695997a495611217fe6706075a63c58

                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

                      Filesize

                      1KB

                      MD5

                      a266bb7dcc38a562631361bbf61dd11b

                      SHA1

                      3b1efd3a66ea28b16697394703a72ca340a05bd5

                      SHA256

                      df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

                      SHA512

                      0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12

                      Filesize

                      174B

                      MD5

                      e7be14c4780bab2792bcb5fbb1089c75

                      SHA1

                      fbb0e0535f06a84d765480720b034bd38eabde2d

                      SHA256

                      db3acaa5489ea477d1e228d279d20cf5b710d9458272217632a3d9e9cf78ab69

                      SHA512

                      606e1e5fa3c6b1e53b8317f9e7d4c8aa0744f104b2470d222c87a1f4304e85fc515d999675e128ef10b9da7e9ee17076f2e8c22d7c6abb7541e0ed01806e2070

                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8

                      Filesize

                      170B

                      MD5

                      ea77c8253f1aa7c1af41d64a3a0b1fec

                      SHA1

                      9f671024b89e4f677af126f1699208eb80bbab68

                      SHA256

                      0c72daa53630a7a1bfceb05071b5b5bbbdc28c4170355bc2b1ea7103a816dd3c

                      SHA512

                      11e1814c4a94eef746f26f3ee59520d94eee0c07df19b822737e0e335038aa5a9ae88992ba5ef505c58a5c5bd472311a543a44e34c3d79918691167cac4c1fd8

                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

                      Filesize

                      242B

                      MD5

                      6725617fc37513484b1b96205366c1f4

                      SHA1

                      87d3287bff899a20812797cf9e14eaf7a60e0735

                      SHA256

                      60aa83554fdaffbce6e92ecd84bd999a36f9f5e2ac12e608c41deef621620549

                      SHA512

                      5228df17500af64c71f4678ef7c865b2582dae1fac1e943ed313bd24db86941009486f81e1f3a4f2b6a0f5e22e17d8e1f238c01559f1bf73223dde18da63c28d

                    • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\1bogwdvw.default-release\activity-stream.discovery_stream.json.tmp

                      Filesize

                      32KB

                      MD5

                      b365fd0566030b1923435b904d790e6e

                      SHA1

                      81c80130481e94ede46fc9ab6997e4e86fb5b196

                      SHA256

                      6a5f47e9e583c5b5b818427f9a59bd8ff56595442424f383c032367ea1495b97

                      SHA512

                      85ebeb41afa4b0d7cbf402641a98fc0a4774d04e73ec16169945ce634696ce92a81f1834567ba4b50ebba7f9a7dfe9bc0a3aa00ef64b3d18456ceb5ac8479269

                    • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\1bogwdvw.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                      Filesize

                      15KB

                      MD5

                      96c542dec016d9ec1ecc4dddfcbaac66

                      SHA1

                      6199f7648bb744efa58acf7b96fee85d938389e4

                      SHA256

                      7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                      SHA512

                      cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                    • C:\Users\Admin\AppData\Local\Temp\1014798001\4ZD5C3i.exe

                      Filesize

                      1.1MB

                      MD5

                      42a8588cc82773cd223c42f8fe4be91a

                      SHA1

                      e2ed3cda00140ecd445f5f742729d34f2c452c8c

                      SHA256

                      d4521c34f489f4a6065dea15634df9bb700c84741f476bde1084d9cdfb373a7b

                      SHA512

                      681e4b155ce1015723469bd819618b292844aa00f7dab447d9557e244792efcef5614f753283efe9dd76ea77b838af78a3e69008c380482a4412b1cea75c535d

                    • C:\Users\Admin\AppData\Local\Temp\1014844001\BlueMail.exe

                      Filesize

                      1.1MB

                      MD5

                      d39986c91ee9d1291e85711894112178

                      SHA1

                      4e7926c5a6e837d4570427d324a151f7b39be88f

                      SHA256

                      654a1585788a10801ec1ee583fe7cb1cb33d6d83d9a270ac03de4b3a03cb4c39

                      SHA512

                      8c81bd154fe8ebccb2e15b97344110efc6e464828cb373c2b5c22f85b3eace3bbe9ed7a35e3039ff0d4b1c6c56e2bd44f559cdc515c599e2bf8cb322f8b64aad

                    • C:\Users\Admin\AppData\Local\Temp\1015004001\25c5e9a9b1.exe

                      Filesize

                      4.2MB

                      MD5

                      3a425626cbd40345f5b8dddd6b2b9efa

                      SHA1

                      7b50e108e293e54c15dce816552356f424eea97a

                      SHA256

                      ba9212d2d5cd6df5eb7933fb37c1b72a648974c1730bf5c32439987558f8e8b1

                      SHA512

                      a7538c6b7e17c35f053721308b8d6dc53a90e79930ff4ed5cffecaa97f4d0fbc5f9e8b59f1383d8f0699c8d4f1331f226af71d40325022d10b885606a72fe668

                    • C:\Users\Admin\AppData\Local\Temp\1015008001\35320edb97.exe

                      Filesize

                      710KB

                      MD5

                      28e568616a7b792cac1726deb77d9039

                      SHA1

                      39890a418fb391b823ed5084533e2e24dff021e1

                      SHA256

                      9597798f7789adc29fbe97707b1bd8ca913c4d5861b0ad4fdd6b913af7c7a8e2

                      SHA512

                      85048799e6d2756f1d6af77f34e6a1f454c48f2f43042927845931b7ecff2e5de45f864627a3d4aa061252401225bbb6c2caa8532320ccbe401e97c9c79ac8e5

                    • C:\Users\Admin\AppData\Local\Temp\1015009001\770a59b4e0.exe

                      Filesize

                      384KB

                      MD5

                      dfd5f78a711fa92337010ecc028470b4

                      SHA1

                      1a389091178f2be8ce486cd860de16263f8e902e

                      SHA256

                      da96f2eb74e60de791961ef3800c36a5e12202fe97ae5d2fcfc1fe404bc13c0d

                      SHA512

                      a3673074919039a2dc854b0f91d1e1a69724056594e33559741f53594e0f6e61e3d99ec664d541b17f09ffdebc2de1b042eec19ca8477fac86359c703f8c9656

                    • C:\Users\Admin\AppData\Local\Temp\1015010001\dfcba3e368.exe

                      Filesize

                      2.5MB

                      MD5

                      2a78ce9f3872f5e591d643459cabe476

                      SHA1

                      9ac947dfc71a868bc9c2eb2bd78dfb433067682e

                      SHA256

                      21a2ac44acd7a640735870eebfd04b8dc57bc66877cb5be3b929299e86a43dae

                      SHA512

                      03e2cd8161a1394ee535a2ea7d197791ab715d69a02ffab98121ec5ac8150d2b17a9a32a59307042c4bbeffad7425b55efa047651de6ed39277dba80711454f9

                    • C:\Users\Admin\AppData\Local\Temp\1015011001\67a6d8b5fe.exe

                      Filesize

                      950KB

                      MD5

                      11c71e4326671919c83861f2897df287

                      SHA1

                      b380acf7b8343982b002453393eaa07b94d0d8bf

                      SHA256

                      d9c1728f686d75b93b32f24e1cd05dd54bb0dd3a4f132a3e1e3d298c3926370c

                      SHA512

                      e238b1eadb143603983025bb055b1517167ac2e880e2b801856ee604a37e3777122ae4f227a71a1dfca28d25b891341b277f4ff59064cffe45e83a4fce234101

                    • C:\Users\Admin\AppData\Local\Temp\1015012001\79dca634f6.exe

                      Filesize

                      1.8MB

                      MD5

                      9c8a1ba80cd36dfc4e4b54d2cbe67999

                      SHA1

                      85d700c3fff1a9aec14c95fab4f64300196fa32d

                      SHA256

                      160874e741d4322c6849320fcbde2d9b43e396de399296a6fa10b7bc05b32968

                      SHA512

                      baec776c752801985e9ce46bad1841ccc6fd138bb8ebd42c8c230762562297a31067e67823200946ae33623ec7c8cba722fd972843423d1f70faf79162132e80

                    • C:\Users\Admin\AppData\Local\Temp\1015013001\c166404a17.exe

                      Filesize

                      2.7MB

                      MD5

                      8797e02dfddd6ae6c1adea2431d9a977

                      SHA1

                      1988952b166387992b76e4a873d21ce3220f4958

                      SHA256

                      66d1bd3eca15caca33696b2bfbea542d46f4fe5b20db0670d4abdd3c0f10d4f9

                      SHA512

                      0b42ad1565062ce9077102c5a61eb2d67c674bf49e50bd36f7d85e025d43cef0f47f79ceac1c4ac51fa9312bcbe494024ce50e6cc7a35276d3e9312881e0bb30

                    • C:\Users\Admin\AppData\Local\Temp\Cab1FE0.tmp

                      Filesize

                      70KB

                      MD5

                      49aebf8cbd62d92ac215b2923fb1b9f5

                      SHA1

                      1723be06719828dda65ad804298d0431f6aff976

                      SHA256

                      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                      SHA512

                      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                    • C:\Users\Admin\AppData\Local\Temp\Tar5FBE.tmp

                      Filesize

                      181KB

                      MD5

                      4ea6026cf93ec6338144661bf1202cd1

                      SHA1

                      a1dec9044f750ad887935a01430bf49322fbdcb7

                      SHA256

                      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                      SHA512

                      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                    • C:\Users\Admin\AppData\Local\Temp\_MEI20282\python310.dll

                      Filesize

                      4.3MB

                      MD5

                      c80b5cb43e5fe7948c3562c1fff1254e

                      SHA1

                      f73cb1fb9445c96ecd56b984a1822e502e71ab9d

                      SHA256

                      058925e4bbfcb460a3c00ec824b8390583baef0c780a7c7ff01d43d9eec45f20

                      SHA512

                      faa97a9d5d2a0bf78123f19f8657c24921b907268938c26f79e1df6d667f7bee564259a3a11022e8629996406cda9fa00434bb2b1de3e10b9bddc59708dbad81

                    • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

                      Filesize

                      1.6MB

                      MD5

                      72491c7b87a7c2dd350b727444f13bb4

                      SHA1

                      1e9338d56db7ded386878eab7bb44b8934ab1bc7

                      SHA256

                      34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

                      SHA512

                      583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

                    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

                      Filesize

                      458KB

                      MD5

                      619f7135621b50fd1900ff24aade1524

                      SHA1

                      6c7ea8bbd435163ae3945cbef30ef6b9872a4591

                      SHA256

                      344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

                      SHA512

                      2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

                    • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_1.zip

                      Filesize

                      1.7MB

                      MD5

                      5659eba6a774f9d5322f249ad989114a

                      SHA1

                      4bfb12aa98a1dc2206baa0ac611877b815810e4c

                      SHA256

                      e04346fee15c3f98387a3641e0bba2e555a5a9b0200e4b9256b1b77094069ae4

                      SHA512

                      f93abf2787b1e06ce999a0cbc67dc787b791a58f9ce20af5587b2060d663f26be9f648d116d9ca279af39299ea5d38e3c86271297e47c1438102ca28fce8edc4

                    • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_2.zip

                      Filesize

                      1.7MB

                      MD5

                      5404286ec7853897b3ba00adf824d6c1

                      SHA1

                      39e543e08b34311b82f6e909e1e67e2f4afec551

                      SHA256

                      ec94a6666a3103ba6be60b92e843075a2d7fe7d30fa41099c3f3b1e2a5eba266

                      SHA512

                      c4b78298c42148d393feea6c3941c48def7c92ef0e6baac99144b083937d0a80d3c15bd9a0bf40daa60919968b120d62999fa61af320e507f7e99fbfe9b9ef30

                    • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_3.zip

                      Filesize

                      1.7MB

                      MD5

                      5eb39ba3698c99891a6b6eb036cfb653

                      SHA1

                      d2f1cdd59669f006a2f1aa9214aeed48bc88c06e

                      SHA256

                      e77f5e03ae140dda27d73e1ffe43f7911e006a108cf51cbd0e05d73aa92da7c2

                      SHA512

                      6c4ca20e88d49256ed9cabec0d1f2b00dfcf3d1603b5c95d158d4438c9f1e58495f8dfa200dbe7f49b5b0dd57886517eb3b98c4190484548720dad4b3db6069e

                    • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_4.zip

                      Filesize

                      1.7MB

                      MD5

                      7187cc2643affab4ca29d92251c96dee

                      SHA1

                      ab0a4de90a14551834e12bb2c8c6b9ee517acaf4

                      SHA256

                      c7e92a1af295307fb92ad534e05fba879a7cf6716f93aefca0ebfcb8cee7a830

                      SHA512

                      27985d317a5c844871ffb2527d04aa50ef7442b2f00d69d5ab6bbb85cd7be1d7057ffd3151d0896f05603677c2f7361ed021eac921e012d74da049ef6949e3a3

                    • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_5.zip

                      Filesize

                      1.7MB

                      MD5

                      b7d1e04629bec112923446fda5391731

                      SHA1

                      814055286f963ddaa5bf3019821cb8a565b56cb8

                      SHA256

                      4da77d4ee30ad0cd56cd620f4e9dc4016244ace015c5b4b43f8f37dd8e3a8789

                      SHA512

                      79fc3606b0fe6a1e31a2ecacc96623caf236bf2be692dadab6ea8ffa4af4231d782094a63b76631068364ac9b6a872b02f1e080636eba40ed019c2949a8e28db

                    • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_6.zip

                      Filesize

                      1.7MB

                      MD5

                      0dc4014facf82aa027904c1be1d403c1

                      SHA1

                      5e6d6c020bfc2e6f24f3d237946b0103fe9b1831

                      SHA256

                      a29ddd29958c64e0af1a848409e97401307277bb6f11777b1cfb0404a6226de7

                      SHA512

                      cbeead189918657cc81e844ed9673ee8f743aed29ad9948e90afdfbecacc9c764fbdbfb92e8c8ceb5ae47cee52e833e386a304db0572c7130d1a54fd9c2cc028

                    • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_7.zip

                      Filesize

                      3.3MB

                      MD5

                      cea368fc334a9aec1ecff4b15612e5b0

                      SHA1

                      493d23f72731bb570d904014ffdacbba2334ce26

                      SHA256

                      07e38cad68b0cdbea62f55f9bc6ee80545c2e1a39983baa222e8af788f028541

                      SHA512

                      bed35a1cc56f32e0109ea5a02578489682a990b5cefa58d7cf778815254af9849e731031e824adba07c86c8425df58a1967ac84ce004c62e316a2e51a75c8748

                    • C:\Users\Admin\AppData\Local\Temp\main\file.bin

                      Filesize

                      3.3MB

                      MD5

                      045b0a3d5be6f10ddf19ae6d92dfdd70

                      SHA1

                      0387715b6681d7097d372cd0005b664f76c933c7

                      SHA256

                      94b392e94fa47d1b9b7ae6a29527727268cc2e3484e818c23608f8835bc1104d

                      SHA512

                      58255a755531791b888ffd9b663cc678c63d5caa932260e9546b1b10a8d54208334725c14529116b067bcf5a5e02da85e015a3bed80092b7698a43dab0168c7b

                    • C:\Users\Admin\AppData\Local\Temp\main\main.bat

                      Filesize

                      440B

                      MD5

                      3626532127e3066df98e34c3d56a1869

                      SHA1

                      5fa7102f02615afde4efd4ed091744e842c63f78

                      SHA256

                      2a0e18ef585db0802269b8c1ddccb95ce4c0bac747e207ee6131dee989788bca

                      SHA512

                      dcce66d6e24d5a4a352874144871cd73c327e04c1b50764399457d8d70a9515f5bc0a650232763bf34d4830bab70ee4539646e7625cfe5336a870e311043b2bd

                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6OIWHBP8J3BEYMR8LF9Z.temp

                      Filesize

                      7KB

                      MD5

                      0395c1c732ad1ab18c83f219d2ed8e84

                      SHA1

                      afba2f5714e3aa028b6763b8c3be2139145f4c83

                      SHA256

                      ce7d038fd569e799b4818356e5b294b94d456a397e6cd10f38e2086a8c92e4a0

                      SHA512

                      3cf975d1c22e30c298c2c4374af9c93dfd3dc88b6aab5bd8646c9e38ef7e347bfc25cc0f9deb3dcc2ff74b7b51d969a2cec72fce5f02eaab09af3f2ac425ae67

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1bogwdvw.default-release\datareporting\glean\db\data.safe.bin

                      Filesize

                      9KB

                      MD5

                      e8cead5315a5fcf871d3362716a7a941

                      SHA1

                      d82337e9ff059fc0430834711477563e4c3a7b1d

                      SHA256

                      4e5b7b27c98a0b05054590f6d4055651fc26f01d6fb12af8f6c31653471c2e2d

                      SHA512

                      daf866c8008934b5f5b8b0e1d47c186b7fa4cf4352a5b2daa4d92fce8628fe0b5d360173b87778a6c4b4a2953acbe946ae687c7f9fa72fd9bba33dd0012203c1

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1bogwdvw.default-release\datareporting\glean\pending_pings\900a95bb-cad3-4e6d-964c-2c208f0b9688

                      Filesize

                      733B

                      MD5

                      58d5028c38c52d8de72220deb4edacba

                      SHA1

                      e4c7e28e3f7514036800101e074a4699068ce465

                      SHA256

                      c8cad1fef888c2b687a43584f4ab9682dfc8a50a8794d82d8b577dd5c5e5bbc0

                      SHA512

                      7fe0976adc51f4b58185344945768de3fb99c236c84be3132d9494efec0967f8f9c24d25c38477e39111adfd45ca04471a1b223fa8dde1af68b34d2e6e9fc4cd

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1bogwdvw.default-release\prefs-1.js

                      Filesize

                      6KB

                      MD5

                      585c410d334f6a42858cc6d0ec7a338e

                      SHA1

                      f8206a7ebb2c63d22a46f0356c609687f346a2fa

                      SHA256

                      c5ff1bef546fdb093f2a0c463e6019280ff4ea314d3de64c930851d9f7030800

                      SHA512

                      a09f3a86672ce0fa243cd84c9efe3a27bb5e30ee26a92bf7671e8ac74fc4e152e221e686b5d035f7288ccf83f70488d65b5f207fbdc321a7a1591216685f1493

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1bogwdvw.default-release\prefs-1.js

                      Filesize

                      6KB

                      MD5

                      89a6d1e0b8cfe8a399ded70706bf6842

                      SHA1

                      c5766a3e92440511cb68215dafb5e9495cd03fd5

                      SHA256

                      4017155696acfc63f81d91bac239544aa77e32bd63e9700c2add9fad303e791e

                      SHA512

                      59aaadadcfdd3734f2c171396208832625ce37cdde2ac67e58529af5b7234b904525a3ca59762bac2020b57cfac8cc6ab829f1e651dc288ace4d0ffcd4f9cd8d

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1bogwdvw.default-release\prefs.js

                      Filesize

                      6KB

                      MD5

                      18574932afd49167c90fa4241dcd0590

                      SHA1

                      20b48c3baf4182534e570a563c830f38ada5cd24

                      SHA256

                      778cfd37a6e1f495665ddae4293812066573e6e3a69a6d1ed9eb65fb09dbb626

                      SHA512

                      6177cec14d4f460dac0b25ec4d655c29b4f803896e8a1cac6ed363cdecac8cd0c72fe1b9b85ea2e60a3fc6f18898aa3850c6fb4b5bc2dc3f6720702dc658ee4b

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1bogwdvw.default-release\sessionstore-backups\recovery.jsonlz4

                      Filesize

                      4KB

                      MD5

                      d60e24d37a9004ef8a1d7f5f8f9d7b73

                      SHA1

                      798078c6fce6ec7133127988995faf225b680090

                      SHA256

                      a741a4f831ff0d46d268102b2e8b727995bfb576364e29d8226401a765663181

                      SHA512

                      144dcf571285fd5c6a5523d8d273832741975129879c457136242ca8ebaf041848fde9baf16b46b114ea87a9ede2732465df6e7c6149f183f06b675240ccf6ed

                    • \Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                      Filesize

                      3.2MB

                      MD5

                      7229bce5ce94ad8c3efdac6116ca0dfd

                      SHA1

                      bab536edb7b176deedc34f51bca00786358a9238

                      SHA256

                      786cacdf01a6f995fa366ec96f869e36aea02b478426595de4d72ce297b92312

                      SHA512

                      147165e60b94781f32180d41107d81504cf6c8a08a7b235c0680af1708447341ab6cb42e4d8ba310b4425d30bb4961f91da1801f45285f32974ccd9f5a419f4b

                    • memory/1544-18921-0x000000013F110000-0x000000013F5A0000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/1544-18898-0x000000013F110000-0x000000013F5A0000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/1892-14900-0x0000000002910000-0x0000000002918000-memory.dmp

                      Filesize

                      32KB

                    • memory/1892-14440-0x000000001B510000-0x000000001B7F2000-memory.dmp

                      Filesize

                      2.9MB

                    • memory/2512-17-0x0000000000870000-0x0000000000BB0000-memory.dmp

                      Filesize

                      3.2MB

                    • memory/2512-18-0x0000000000871000-0x00000000008D9000-memory.dmp

                      Filesize

                      416KB

                    • memory/2512-1-0x00000000774E0000-0x00000000774E2000-memory.dmp

                      Filesize

                      8KB

                    • memory/2512-5-0x0000000000870000-0x0000000000BB0000-memory.dmp

                      Filesize

                      3.2MB

                    • memory/2512-2-0x0000000000871000-0x00000000008D9000-memory.dmp

                      Filesize

                      416KB

                    • memory/2512-0-0x0000000000870000-0x0000000000BB0000-memory.dmp

                      Filesize

                      3.2MB

                    • memory/2512-14-0x00000000067D0000-0x0000000006B10000-memory.dmp

                      Filesize

                      3.2MB

                    • memory/2512-3-0x0000000000870000-0x0000000000BB0000-memory.dmp

                      Filesize

                      3.2MB

                    • memory/2804-464-0x0000000000C20000-0x0000000000F60000-memory.dmp

                      Filesize

                      3.2MB

                    • memory/2804-15-0x0000000000C20000-0x0000000000F60000-memory.dmp

                      Filesize

                      3.2MB

                    • memory/2804-39-0x0000000000C20000-0x0000000000F60000-memory.dmp

                      Filesize

                      3.2MB

                    • memory/2804-19025-0x0000000006B70000-0x0000000007226000-memory.dmp

                      Filesize

                      6.7MB

                    • memory/2804-19-0x0000000000C21000-0x0000000000C89000-memory.dmp

                      Filesize

                      416KB

                    • memory/2804-20-0x0000000000C20000-0x0000000000F60000-memory.dmp

                      Filesize

                      3.2MB

                    • memory/2804-22-0x0000000000C20000-0x0000000000F60000-memory.dmp

                      Filesize

                      3.2MB

                    • memory/2804-23-0x0000000000C20000-0x0000000000F60000-memory.dmp

                      Filesize

                      3.2MB

                    • memory/2804-37-0x0000000000C20000-0x0000000000F60000-memory.dmp

                      Filesize

                      3.2MB

                    • memory/2804-19110-0x0000000006B70000-0x0000000007226000-memory.dmp

                      Filesize

                      6.7MB

                    • memory/2804-40-0x0000000000C20000-0x0000000000F60000-memory.dmp

                      Filesize

                      3.2MB

                    • memory/2804-19043-0x0000000006370000-0x0000000006624000-memory.dmp

                      Filesize

                      2.7MB

                    • memory/2804-19042-0x0000000006370000-0x0000000006624000-memory.dmp

                      Filesize

                      2.7MB

                    • memory/2804-38-0x0000000000C21000-0x0000000000C89000-memory.dmp

                      Filesize

                      416KB

                    • memory/2948-1982-0x0000000002230000-0x000000000227C000-memory.dmp

                      Filesize

                      304KB

                    • memory/2948-18961-0x0000000005020000-0x0000000005074000-memory.dmp

                      Filesize

                      336KB

                    • memory/2948-798-0x00000000047A0000-0x00000000048B2000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/2948-802-0x00000000047A0000-0x00000000048B2000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/2948-806-0x00000000047A0000-0x00000000048B2000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/2948-812-0x00000000047A0000-0x00000000048B2000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/2948-814-0x00000000047A0000-0x00000000048B2000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/2948-816-0x00000000047A0000-0x00000000048B2000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/2948-818-0x00000000047A0000-0x00000000048B2000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/2948-820-0x00000000047A0000-0x00000000048B2000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/2948-824-0x00000000047A0000-0x00000000048B2000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/2948-467-0x0000000000D00000-0x0000000000E26000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/2948-590-0x00000000047A0000-0x00000000048B8000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/2948-770-0x00000000047A0000-0x00000000048B2000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/2948-774-0x00000000047A0000-0x00000000048B2000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/2948-826-0x00000000047A0000-0x00000000048B2000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/2948-828-0x00000000047A0000-0x00000000048B2000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/2948-804-0x00000000047A0000-0x00000000048B2000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/2948-822-0x00000000047A0000-0x00000000048B2000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/2948-811-0x00000000047A0000-0x00000000048B2000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/2948-808-0x00000000047A0000-0x00000000048B2000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/2948-780-0x00000000047A0000-0x00000000048B2000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/2948-782-0x00000000047A0000-0x00000000048B2000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/2948-800-0x00000000047A0000-0x00000000048B2000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/2948-786-0x00000000047A0000-0x00000000048B2000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/2948-796-0x00000000047A0000-0x00000000048B2000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/2948-794-0x00000000047A0000-0x00000000048B2000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/2948-788-0x00000000047A0000-0x00000000048B2000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/2948-784-0x00000000047A0000-0x00000000048B2000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/2948-792-0x00000000047A0000-0x00000000048B2000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/2948-1980-0x0000000004F70000-0x0000000004FFA000-memory.dmp

                      Filesize

                      552KB

                    • memory/2948-790-0x00000000047A0000-0x00000000048B2000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/2948-769-0x00000000047A0000-0x00000000048B2000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/2948-778-0x00000000047A0000-0x00000000048B2000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/2948-776-0x00000000047A0000-0x00000000048B2000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/2948-772-0x00000000047A0000-0x00000000048B2000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/3216-18926-0x000000001B640000-0x000000001B922000-memory.dmp

                      Filesize

                      2.9MB

                    • memory/3216-18927-0x00000000026E0000-0x00000000026E8000-memory.dmp

                      Filesize

                      32KB

                    • memory/3536-13446-0x000000013F570000-0x000000013FA00000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/3536-18887-0x000000013F570000-0x000000013FA00000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/3536-13447-0x000000013F570000-0x000000013FA00000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/6020-13448-0x000000013F570000-0x000000013FA00000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/6020-13478-0x000000013F570000-0x000000013FA00000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/6028-19294-0x000000013FD90000-0x0000000140220000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/6028-18885-0x000000013F110000-0x000000013F5A0000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/6028-18886-0x000000013F110000-0x000000013F5A0000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/6028-19266-0x000000013FD90000-0x0000000140220000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/6832-19026-0x0000000001180000-0x0000000001836000-memory.dmp

                      Filesize

                      6.7MB

                    • memory/6832-19028-0x0000000001180000-0x0000000001836000-memory.dmp

                      Filesize

                      6.7MB

                    • memory/7268-19047-0x00000000002E0000-0x0000000000594000-memory.dmp

                      Filesize

                      2.7MB

                    • memory/7268-19232-0x00000000002E0000-0x0000000000594000-memory.dmp

                      Filesize

                      2.7MB

                    • memory/7268-19227-0x00000000002E0000-0x0000000000594000-memory.dmp

                      Filesize

                      2.7MB

                    • memory/7268-19046-0x00000000002E0000-0x0000000000594000-memory.dmp

                      Filesize

                      2.7MB

                    • memory/7268-19044-0x00000000002E0000-0x0000000000594000-memory.dmp

                      Filesize

                      2.7MB

                    • memory/10412-19268-0x000000013FD90000-0x0000000140220000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/10412-19278-0x000000013FD90000-0x0000000140220000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/10900-19283-0x000000001B6F0000-0x000000001B9D2000-memory.dmp

                      Filesize

                      2.9MB

                    • memory/10900-19284-0x00000000026E0000-0x00000000026E8000-memory.dmp

                      Filesize

                      32KB