Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-12-2024 02:01
Static task
static1
Behavioral task
behavioral1
Sample
003b43813ec5522429efc587a873871a2d6fc14c4c9c6008a7d27bce0920db19.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
003b43813ec5522429efc587a873871a2d6fc14c4c9c6008a7d27bce0920db19.exe
Resource
win10v2004-20241007-en
General
-
Target
003b43813ec5522429efc587a873871a2d6fc14c4c9c6008a7d27bce0920db19.exe
-
Size
2.9MB
-
MD5
4072633a022e6587009b5ca189ff4613
-
SHA1
d54d3cf0878186b3b8230f1f0b8188bf1bcd738e
-
SHA256
003b43813ec5522429efc587a873871a2d6fc14c4c9c6008a7d27bce0920db19
-
SHA512
136ebcb816217cecb81f5b521b7102d54eb17f4f0685ab003e7013cbff75e7074ee93a086f847c5a0f9f0c3f2eb8c5c5706b07fe119182c86d2007699a98f700
-
SSDEEP
49152:1gK4zTjzmIGvbESuW1QoEi9YJlYAWA9XMv3MaDUyHAHE:p4zTGBvoSuW1Qof9lAWA9Xw3Ma4E
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
cryptbot
http://home.fivetk5vt.top/hLfzXsaqNtoEGyaUtOMJ1734
Extracted
gurcu
https://api.telegram.org/bot7807236140:AAF-i5R6XuCUIDX7jhwiW3NW21ELWWQOTo0/sendMessag
Extracted
lumma
https://atten-supporse.biz/api
Signatures
-
Amadey family
-
Cryptbot family
-
Gurcu family
-
Lumma family
-
Stealc family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
description pid Process procid_target PID 1064 created 2992 1064 f1ccc838b7.exe 49 PID 1152 created 2992 1152 e4fb9eea06.exe 49 -
Enumerates VirtualBox registry keys 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF f9a1663aa0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF 3ce44914fa.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 21 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f9a1663aa0.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a761802d89.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 003b43813ec5522429efc587a873871a2d6fc14c4c9c6008a7d27bce0920db19.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ VR6f3vF.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a6cbb48ec5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 55f0980ec3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ cd14ca0381.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ EQMX5TA4TNGMQ0VA.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6NSGV4IHEWPLB4H2J0WJ.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 26b9f48cd6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3ce44914fa.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ANEDNjf.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7b6ad6f8df.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e4fb9eea06.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 98bf9fdbc8.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f1ccc838b7.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1404 powershell.exe 1888 powershell.exe 1728 powershell.exe 3320 powershell.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\DRIVERS\SETD02C.tmp rundll32.exe File created C:\Windows\system32\DRIVERS\SETD02C.tmp rundll32.exe File opened for modification C:\Windows\system32\DRIVERS\revoflt.sys rundll32.exe -
Checks BIOS information in registry 2 TTPs 40 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 003b43813ec5522429efc587a873871a2d6fc14c4c9c6008a7d27bce0920db19.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 26b9f48cd6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3ce44914fa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion EQMX5TA4TNGMQ0VA.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a6cbb48ec5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f1ccc838b7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cd14ca0381.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cd14ca0381.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion EQMX5TA4TNGMQ0VA.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion VR6f3vF.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7b6ad6f8df.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e4fb9eea06.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 003b43813ec5522429efc587a873871a2d6fc14c4c9c6008a7d27bce0920db19.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ANEDNjf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 55f0980ec3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f1ccc838b7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a761802d89.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3ce44914fa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ANEDNjf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a761802d89.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e4fb9eea06.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 98bf9fdbc8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion VR6f3vF.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 55f0980ec3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f9a1663aa0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 98bf9fdbc8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 26b9f48cd6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a6cbb48ec5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7b6ad6f8df.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f9a1663aa0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 8 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 26b9f48cd6.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation axplong.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation kf5cl0F.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation ruplp.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation b79b7334f9.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation a5b9dd0dd1.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 003b43813ec5522429efc587a873871a2d6fc14c4c9c6008a7d27bce0920db19.exe -
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 52 IoCs
pid Process 3464 skotes.exe 2300 Cq6Id6x.exe 3332 Cq6Id6x.exe 3196 x0qQ2DH.exe 3436 NordVPNSetup.exe 632 NordVPNSetup.tmp 4568 26b9f48cd6.exe 4476 skotes.exe 3792 axplong.exe 3776 VR6f3vF.exe 880 kf5cl0F.exe 1460 trunk.exe 3120 ANEDNjf.exe 3452 trunk.exe 4436 a6cbb48ec5.exe 4468 ruplp.exe 1200 RevoUninPro.exe 652 abb3167a83744d578a58ca833199e0a1.exe 1064 f1ccc838b7.exe 5024 b79b7334f9.exe 1324 55f0980ec3.exe 3872 RevoUninPro.exe 4876 ruplp.exe 2612 7z.exe 1772 7z.exe 1360 7z.exe 2984 7z.exe 2948 7z.exe 2212 7z.exe 4660 7z.exe 564 7z.exe 4592 in.exe 4804 7b6ad6f8df.exe 2612 f9a1663aa0.exe 4872 a761802d89.exe 456 a5b9dd0dd1.exe 1152 e4fb9eea06.exe 100 15347554b3.exe 1752 axplong.exe 4856 skotes.exe 5016 15347554b3.exe 1208 Intel_PTT_EK_Recertification.exe 3124 082624a2b97441d89a53d996c4d086d7.exe 4864 6f2ee0f6e5.exe 3656 3ce44914fa.exe 4536 16b3378aab.exe 1568 16b3378aab.exe 1036 cd14ca0381.exe 1404 98bf9fdbc8.exe 2128 abd820d511.exe 4536 EQMX5TA4TNGMQ0VA.exe 5492 6NSGV4IHEWPLB4H2J0WJ.exe -
Identifies Wine through registry keys 2 TTPs 21 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine e4fb9eea06.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 3ce44914fa.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 26b9f48cd6.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine a6cbb48ec5.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine f1ccc838b7.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine f9a1663aa0.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine cd14ca0381.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 98bf9fdbc8.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine VR6f3vF.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine EQMX5TA4TNGMQ0VA.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 55f0980ec3.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 7b6ad6f8df.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine a761802d89.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 6NSGV4IHEWPLB4H2J0WJ.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 003b43813ec5522429efc587a873871a2d6fc14c4c9c6008a7d27bce0920db19.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine ANEDNjf.exe -
Loads dropped DLL 55 IoCs
pid Process 632 NordVPNSetup.tmp 632 NordVPNSetup.tmp 632 NordVPNSetup.tmp 632 NordVPNSetup.tmp 3452 trunk.exe 3452 trunk.exe 3452 trunk.exe 3452 trunk.exe 3452 trunk.exe 3452 trunk.exe 3452 trunk.exe 3452 trunk.exe 3452 trunk.exe 3452 trunk.exe 3452 trunk.exe 3452 trunk.exe 3452 trunk.exe 3452 trunk.exe 3452 trunk.exe 3452 trunk.exe 3452 trunk.exe 3452 trunk.exe 3452 trunk.exe 3452 trunk.exe 3452 trunk.exe 3452 trunk.exe 3452 trunk.exe 3452 trunk.exe 3452 trunk.exe 3452 trunk.exe 3452 trunk.exe 3452 trunk.exe 3452 trunk.exe 3452 trunk.exe 3452 trunk.exe 3452 trunk.exe 3452 trunk.exe 3452 trunk.exe 3452 trunk.exe 3452 trunk.exe 3452 trunk.exe 3452 trunk.exe 3452 trunk.exe 3452 trunk.exe 3452 trunk.exe 3452 trunk.exe 1736 regsvr32.exe 2612 7z.exe 1772 7z.exe 1360 7z.exe 2984 7z.exe 2948 7z.exe 2212 7z.exe 4660 7z.exe 564 7z.exe -
Modifies system executable filetype association 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\ContextMenuHandlers\RUShellExt regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\ContextMenuHandlers\RUShellExt\ = "{2C5515DC-2A7E-4BFD-B813-CACC2B685EB7}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\RUShellExt regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\RUShellExt\ = "{2C5515DC-2A7E-4BFD-B813-CACC2B685EB7}" regsvr32.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\55f0980ec3.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007330001\\55f0980ec3.exe" axplong.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cd14ca0381.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1017262001\\cd14ca0381.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\98bf9fdbc8.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1017263001\\98bf9fdbc8.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\abd820d511.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1017264001\\abd820d511.exe" skotes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\GrpConv = "grpconv -o" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\a6cbb48ec5.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007328001\\a6cbb48ec5.exe" axplong.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 120 raw.githubusercontent.com 121 raw.githubusercontent.com 185 raw.githubusercontent.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 67 ip-api.com -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000300000001e59d-1042.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 25 IoCs
pid Process 2824 003b43813ec5522429efc587a873871a2d6fc14c4c9c6008a7d27bce0920db19.exe 3464 skotes.exe 4568 26b9f48cd6.exe 4476 skotes.exe 3792 axplong.exe 3776 VR6f3vF.exe 3120 ANEDNjf.exe 4436 a6cbb48ec5.exe 652 abb3167a83744d578a58ca833199e0a1.exe 1064 f1ccc838b7.exe 652 abb3167a83744d578a58ca833199e0a1.exe 1324 55f0980ec3.exe 4804 7b6ad6f8df.exe 2612 f9a1663aa0.exe 4872 a761802d89.exe 1152 e4fb9eea06.exe 1752 axplong.exe 4856 skotes.exe 3124 082624a2b97441d89a53d996c4d086d7.exe 3124 082624a2b97441d89a53d996c4d086d7.exe 3656 3ce44914fa.exe 3124 082624a2b97441d89a53d996c4d086d7.exe 1036 cd14ca0381.exe 1404 98bf9fdbc8.exe 4536 EQMX5TA4TNGMQ0VA.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2300 set thread context of 3332 2300 Cq6Id6x.exe 93 PID 100 set thread context of 5016 100 15347554b3.exe 168 PID 1208 set thread context of 2464 1208 Intel_PTT_EK_Recertification.exe 170 PID 4536 set thread context of 1568 4536 16b3378aab.exe 179 -
resource yara_rule behavioral2/memory/4592-729-0x00007FF6E5F70000-0x00007FF6E6400000-memory.dmp upx behavioral2/memory/4592-732-0x00007FF6E5F70000-0x00007FF6E6400000-memory.dmp upx behavioral2/memory/1208-921-0x00007FF759960000-0x00007FF759DF0000-memory.dmp upx behavioral2/memory/1208-935-0x00007FF759960000-0x00007FF759DF0000-memory.dmp upx -
Drops file in Program Files directory 63 IoCs
description ioc Process File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-FGAGM.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-S9OF0.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\is-76UPH.tmp NordVPNSetup.tmp File opened for modification C:\Program Files\VS Revo Group\Revo Uninstaller Pro\RevoCmd.exe NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-RK5F9.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-HFSTK.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-3HF2S.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-SR9RN.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-H033Q.tmp NordVPNSetup.tmp File opened for modification C:\Program Files\VS Revo Group\Revo Uninstaller Pro\unins000.dat NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-A96P5.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-PSGOL.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-1RCI9.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-1DDN5.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-3FLO7.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-KV8DI.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-U5JFP.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-LQ2PP.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-CQ921.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-SKJNP.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-JUUE3.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-CLI54.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-JOMGA.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-Q88BC.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-CAPP3.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\is-14DTJ.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-MQML2.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-GNB14.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\is-U0AJ1.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-1GKC8.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\is-NNO9N.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\is-N3UJT.tmp NordVPNSetup.tmp File opened for modification C:\Program Files\VS Revo Group\Revo Uninstaller Pro\RevoUninPro.exe NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-U8COR.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-GHOJK.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-DSB5D.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-RVUD8.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-LH1N4.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\is-4C5JF.tmp NordVPNSetup.tmp File opened for modification C:\Program Files\VS Revo Group\Revo Uninstaller Pro\RUExt.dll NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-JIKTP.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\unins000.dat NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-UB1BO.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-6RJVB.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-JPM62.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-95F0I.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-TMCUT.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-1MQQV.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-S8UD1.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-086N9.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-DLM9A.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\is-QLK13.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-FA7TE.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-2TS1M.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\is-RE9OK.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\is-ARQL6.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-7MNGE.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\is-PGDK3.tmp NordVPNSetup.tmp File opened for modification C:\Program Files\VS Revo Group\Revo Uninstaller Pro\ruplp.exe NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-4PB72.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-TN60K.tmp NordVPNSetup.tmp File opened for modification C:\Program Files\VS Revo Group\Revo Uninstaller Pro\RevoAppBar.exe NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-4R8MQ.tmp NordVPNSetup.tmp -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 003b43813ec5522429efc587a873871a2d6fc14c4c9c6008a7d27bce0920db19.exe File created C:\Windows\Tasks\axplong.job 26b9f48cd6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 3984 1064 WerFault.exe 120 3632 1152 WerFault.exe 158 -
System Location Discovery: System Language Discovery 1 TTPs 49 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cq6Id6x.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cd14ca0381.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ruplp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 15347554b3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6NSGV4IHEWPLB4H2J0WJ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a761802d89.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 98bf9fdbc8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language abd820d511.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 26b9f48cd6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kf5cl0F.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f1ccc838b7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 15347554b3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 082624a2b97441d89a53d996c4d086d7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 16b3378aab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cq6Id6x.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b79b7334f9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 16b3378aab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3ce44914fa.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage abd820d511.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NordVPNSetup.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e4fb9eea06.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language x0qQ2DH.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NordVPNSetup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EQMX5TA4TNGMQ0VA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6f2ee0f6e5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VR6f3vF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language abb3167a83744d578a58ca833199e0a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ruplp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7b6ad6f8df.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 55f0980ec3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f9a1663aa0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a5b9dd0dd1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language abd820d511.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 003b43813ec5522429efc587a873871a2d6fc14c4c9c6008a7d27bce0920db19.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ANEDNjf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a6cbb48ec5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1436 powershell.exe 4816 PING.EXE 1200 powershell.exe 3584 PING.EXE -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 runonce.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz runonce.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS x0qQ2DH.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName x0qQ2DH.exe -
Kills process with taskkill 5 IoCs
pid Process 3608 taskkill.exe 3032 taskkill.exe 1200 taskkill.exe 4436 taskkill.exe 3752 taskkill.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{FB562550-BBE6-4298-861A-5C0A6562C272}\Shell\Open NordVPNSetup.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\RevoUninstallerPro.ruel\shell\open NordVPNSetup.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\ContextMenuHandlers\RUShellExt\ = "{2C5515DC-2A7E-4BFD-B813-CACC2B685EB7}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{37B86290-9C1A-453F-BFA7-CB6EC9CEC00F} ruplp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DD72B942-27D2-4A3C-9353-FA0441FBABA0}\LocalServer32 ruplp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{FB562550-BBE6-4298-861A-5C0A6562C272}\Shell\Open\command NordVPNSetup.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2C5515DC-2A7E-4BFD-B813-CACC2B685EB7}\InprocServer32\ = "C:\\Program Files\\VS Revo Group\\Revo Uninstaller Pro\\RUExt.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{58DF91C9-795D-4356-9568-7F149ED299B4}\ = "ILicProtectorEXE510" ruplp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DD72B942-27D2-4A3C-9353-FA0441FBABA0}\Version ruplp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DD72B942-27D2-4A3C-9353-FA0441FBABA0}\TypeLib\ = "{37B86290-9C1A-453F-BFA7-CB6EC9CEC00F}" ruplp.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{FB562550-BBE6-4298-861A-5C0A6562C272}\DefaultIcon NordVPNSetup.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{37B86290-9C1A-453F-BFA7-CB6EC9CEC00F}\5.1\0\win32 ruplp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{58DF91C9-795D-4356-9568-7F149ED299B4}\ProxyStubClsid32 ruplp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{58DF91C9-795D-4356-9568-7F149ED299B4}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" ruplp.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\RevoUninstallerPro.ruel\shell\open\command NordVPNSetup.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2C5515DC-2A7E-4BFD-B813-CACC2B685EB7}\ = "RUShellExt Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DD72B942-27D2-4A3C-9353-FA0441FBABA0}\Version\ = "5.1" ruplp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{FB562550-BBE6-4298-861A-5C0A6562C272}\InfoTip = "Uninstall, Remove Programs, Clear Web Browsers Tracks, Control Automatically Started Applications" NordVPNSetup.tmp Key created \REGISTRY\MACHINE\Software\Classes\RevoUninstallerPro.ruel\shell\open\command NordVPNSetup.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\RevoUninstallerPro.ruel\shell NordVPNSetup.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\RUShellExt regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{37B86290-9C1A-453F-BFA7-CB6EC9CEC00F}\5.1\0\win32\ = "C:\\Program Files\\VS Revo Group\\Revo Uninstaller Pro\\ruplp.exe" ruplp.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\.ruel NordVPNSetup.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\RevoUninstallerPro.ruel NordVPNSetup.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\RevoUninstallerPro.ruel\shell\open\command\ = "C:\\Program Files\\VS Revo Group\\Revo Uninstaller Pro\\RevoUninPro.exe /implog \"%1\"" NordVPNSetup.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{37B86290-9C1A-453F-BFA7-CB6EC9CEC00F}\5.1 ruplp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{37B86290-9C1A-453F-BFA7-CB6EC9CEC00F}\5.1\0 ruplp.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\RevoUninstallerPro.ruel NordVPNSetup.tmp Key created \REGISTRY\MACHINE\Software\Classes\RevoUninstallerPro.ruel\DefaultIcon NordVPNSetup.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\RevoUninstallerPro.ruel\DefaultIcon\ = "C:\\Program Files\\VS Revo Group\\Revo Uninstaller Pro\\RevoUninPro.exe,0" NordVPNSetup.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2C5515DC-2A7E-4BFD-B813-CACC2B685EB7} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2C5515DC-2A7E-4BFD-B813-CACC2B685EB7}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\ContextMenuHandlers\RUShellExt regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Msi.Package\shellex\ContextMenuHandlers\RUShellExt regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DD72B942-27D2-4A3C-9353-FA0441FBABA0}\TypeLib ruplp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\RevoUninstallerPro.ruel\shell\open\command NordVPNSetup.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{37B86290-9C1A-453F-BFA7-CB6EC9CEC00F}\5.1\HELPDIR\ = "C:\\Program Files\\VS Revo Group\\Revo Uninstaller Pro\\" ruplp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{58DF91C9-795D-4356-9568-7F149ED299B4} ruplp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{58DF91C9-795D-4356-9568-7F149ED299B4}\TypeLib\Version = "5.1" ruplp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\LicProtector.LicProtectorEXE510 ruplp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{FB562550-BBE6-4298-861A-5C0A6562C272}\Shell NordVPNSetup.tmp Key created \REGISTRY\MACHINE\Software\Classes\.ruel NordVPNSetup.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{37B86290-9C1A-453F-BFA7-CB6EC9CEC00F}\5.1\HELPDIR ruplp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{58DF91C9-795D-4356-9568-7F149ED299B4}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" ruplp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\LicProtector.LicProtectorEXE510\ = "LicProtector Object" ruplp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Msi.Package\shellex\ContextMenuHandlers\RUShellExt\ = "{2C5515DC-2A7E-4BFD-B813-CACC2B685EB7}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\RUShellExt\ = "{2C5515DC-2A7E-4BFD-B813-CACC2B685EB7}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\ContextMenuHandlers\RUShellExt regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{FB562550-BBE6-4298-861A-5C0A6562C272}\ = "Revo Uninstaller Pro" NordVPNSetup.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{FB562550-BBE6-4298-861A-5C0A6562C272}\DefaultIcon\ = "C:\\Program Files\\VS Revo Group\\Revo Uninstaller Pro\\RevoUninPro.exe,0" NordVPNSetup.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{1D928D64-60D3-4FAC-B810-C4D9D8A680CF} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\RUExt.DLL regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\RUExt.DLL\AppID = "{1D928D64-60D3-4FAC-B810-C4D9D8A680CF}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{58DF91C9-795D-4356-9568-7F149ED299B4} ruplp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{58DF91C9-795D-4356-9568-7F149ED299B4}\TypeLib\ = "{37B86290-9C1A-453F-BFA7-CB6EC9CEC00F}" ruplp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\LicProtector.LicProtectorEXE510\Clsid ruplp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DD72B942-27D2-4A3C-9353-FA0441FBABA0}\ProgID\ = "LicProtector.LicProtectorEXE510" ruplp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{FB562550-BBE6-4298-861A-5C0A6562C272}\ShellFolder\Attributes = "48" NordVPNSetup.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\RevoUninstallerPro.ruel\DefaultIcon NordVPNSetup.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{58DF91C9-795D-4356-9568-7F149ED299B4}\ProxyStubClsid32 ruplp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DD72B942-27D2-4A3C-9353-FA0441FBABA0}\LocalServer32\ = "C:\\PROGRA~1\\VSREVO~1\\REVOUN~1\\ruplp.exe" ruplp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DD72B942-27D2-4A3C-9353-FA0441FBABA0}\ProgID ruplp.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings firefox.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ruel\ = "RevoUninstallerPro.ruel" NordVPNSetup.tmp -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 4816 PING.EXE 3584 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4856 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2824 003b43813ec5522429efc587a873871a2d6fc14c4c9c6008a7d27bce0920db19.exe 2824 003b43813ec5522429efc587a873871a2d6fc14c4c9c6008a7d27bce0920db19.exe 3464 skotes.exe 3464 skotes.exe 3196 x0qQ2DH.exe 3196 x0qQ2DH.exe 632 NordVPNSetup.tmp 632 NordVPNSetup.tmp 3196 x0qQ2DH.exe 3196 x0qQ2DH.exe 3196 x0qQ2DH.exe 3196 x0qQ2DH.exe 3196 x0qQ2DH.exe 3196 x0qQ2DH.exe 3196 x0qQ2DH.exe 4568 26b9f48cd6.exe 4568 26b9f48cd6.exe 4476 skotes.exe 4476 skotes.exe 3792 axplong.exe 3792 axplong.exe 3776 VR6f3vF.exe 3776 VR6f3vF.exe 880 kf5cl0F.exe 1404 powershell.exe 1404 powershell.exe 632 NordVPNSetup.tmp 632 NordVPNSetup.tmp 3776 VR6f3vF.exe 3776 VR6f3vF.exe 3776 VR6f3vF.exe 3776 VR6f3vF.exe 1888 powershell.exe 1888 powershell.exe 3120 ANEDNjf.exe 3120 ANEDNjf.exe 4436 a6cbb48ec5.exe 4436 a6cbb48ec5.exe 1064 f1ccc838b7.exe 1064 f1ccc838b7.exe 3120 ANEDNjf.exe 3120 ANEDNjf.exe 3120 ANEDNjf.exe 3120 ANEDNjf.exe 1064 f1ccc838b7.exe 1064 f1ccc838b7.exe 1064 f1ccc838b7.exe 1064 f1ccc838b7.exe 1736 svchost.exe 1736 svchost.exe 1736 svchost.exe 1736 svchost.exe 1324 55f0980ec3.exe 1324 55f0980ec3.exe 652 abb3167a83744d578a58ca833199e0a1.exe 652 abb3167a83744d578a58ca833199e0a1.exe 652 abb3167a83744d578a58ca833199e0a1.exe 652 abb3167a83744d578a58ca833199e0a1.exe 1436 powershell.exe 1436 powershell.exe 1436 powershell.exe 4804 7b6ad6f8df.exe 4804 7b6ad6f8df.exe 2612 f9a1663aa0.exe -
Suspicious use of AdjustPrivilegeToken 52 IoCs
description pid Process Token: SeDebugPrivilege 2300 Cq6Id6x.exe Token: SeDebugPrivilege 880 kf5cl0F.exe Token: SeDebugPrivilege 1404 powershell.exe Token: SeDebugPrivilege 1888 powershell.exe Token: SeDebugPrivilege 3452 trunk.exe Token: SeRestorePrivilege 2612 7z.exe Token: 35 2612 7z.exe Token: SeSecurityPrivilege 2612 7z.exe Token: SeSecurityPrivilege 2612 7z.exe Token: SeRestorePrivilege 1772 7z.exe Token: 35 1772 7z.exe Token: SeSecurityPrivilege 1772 7z.exe Token: SeSecurityPrivilege 1772 7z.exe Token: SeRestorePrivilege 1360 7z.exe Token: 35 1360 7z.exe Token: SeSecurityPrivilege 1360 7z.exe Token: SeSecurityPrivilege 1360 7z.exe Token: SeRestorePrivilege 2984 7z.exe Token: 35 2984 7z.exe Token: SeSecurityPrivilege 2984 7z.exe Token: SeSecurityPrivilege 2984 7z.exe Token: SeRestorePrivilege 2948 7z.exe Token: 35 2948 7z.exe Token: SeSecurityPrivilege 2948 7z.exe Token: SeSecurityPrivilege 2948 7z.exe Token: SeRestorePrivilege 2212 7z.exe Token: 35 2212 7z.exe Token: SeSecurityPrivilege 2212 7z.exe Token: SeSecurityPrivilege 2212 7z.exe Token: SeRestorePrivilege 4660 7z.exe Token: 35 4660 7z.exe Token: SeSecurityPrivilege 4660 7z.exe Token: SeSecurityPrivilege 4660 7z.exe Token: SeRestorePrivilege 564 7z.exe Token: 35 564 7z.exe Token: SeSecurityPrivilege 564 7z.exe Token: SeSecurityPrivilege 564 7z.exe Token: SeDebugPrivilege 1436 powershell.exe Token: SeDebugPrivilege 456 a5b9dd0dd1.exe Token: SeDebugPrivilege 1728 powershell.exe Token: SeDebugPrivilege 3320 powershell.exe Token: SeLockMemoryPrivilege 2464 explorer.exe Token: SeDebugPrivilege 1200 powershell.exe Token: SeDebugPrivilege 4864 6f2ee0f6e5.exe Token: SeDebugPrivilege 3752 taskkill.exe Token: SeDebugPrivilege 3608 taskkill.exe Token: SeDebugPrivilege 3032 taskkill.exe Token: SeDebugPrivilege 1200 taskkill.exe Token: SeDebugPrivilege 4436 taskkill.exe Token: SeDebugPrivilege 4264 firefox.exe Token: SeDebugPrivilege 4264 firefox.exe Token: SeDebugPrivilege 4536 EQMX5TA4TNGMQ0VA.exe -
Suspicious use of FindShellTrayWindow 32 IoCs
pid Process 2824 003b43813ec5522429efc587a873871a2d6fc14c4c9c6008a7d27bce0920db19.exe 632 NordVPNSetup.tmp 2128 abd820d511.exe 2128 abd820d511.exe 2128 abd820d511.exe 2128 abd820d511.exe 2128 abd820d511.exe 2128 abd820d511.exe 2128 abd820d511.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 2128 abd820d511.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 2128 abd820d511.exe -
Suspicious use of SendNotifyMessage 29 IoCs
pid Process 2128 abd820d511.exe 2128 abd820d511.exe 2128 abd820d511.exe 2128 abd820d511.exe 2128 abd820d511.exe 2128 abd820d511.exe 2128 abd820d511.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 2128 abd820d511.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 2128 abd820d511.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 1200 RevoUninPro.exe 1200 RevoUninPro.exe 652 abb3167a83744d578a58ca833199e0a1.exe 3872 RevoUninPro.exe 3872 RevoUninPro.exe 3872 RevoUninPro.exe 3872 RevoUninPro.exe 3124 082624a2b97441d89a53d996c4d086d7.exe 4264 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2824 wrote to memory of 3464 2824 003b43813ec5522429efc587a873871a2d6fc14c4c9c6008a7d27bce0920db19.exe 82 PID 2824 wrote to memory of 3464 2824 003b43813ec5522429efc587a873871a2d6fc14c4c9c6008a7d27bce0920db19.exe 82 PID 2824 wrote to memory of 3464 2824 003b43813ec5522429efc587a873871a2d6fc14c4c9c6008a7d27bce0920db19.exe 82 PID 3464 wrote to memory of 2300 3464 skotes.exe 88 PID 3464 wrote to memory of 2300 3464 skotes.exe 88 PID 3464 wrote to memory of 2300 3464 skotes.exe 88 PID 2300 wrote to memory of 3332 2300 Cq6Id6x.exe 93 PID 2300 wrote to memory of 3332 2300 Cq6Id6x.exe 93 PID 2300 wrote to memory of 3332 2300 Cq6Id6x.exe 93 PID 2300 wrote to memory of 3332 2300 Cq6Id6x.exe 93 PID 2300 wrote to memory of 3332 2300 Cq6Id6x.exe 93 PID 2300 wrote to memory of 3332 2300 Cq6Id6x.exe 93 PID 2300 wrote to memory of 3332 2300 Cq6Id6x.exe 93 PID 2300 wrote to memory of 3332 2300 Cq6Id6x.exe 93 PID 2300 wrote to memory of 3332 2300 Cq6Id6x.exe 93 PID 3464 wrote to memory of 3196 3464 skotes.exe 94 PID 3464 wrote to memory of 3196 3464 skotes.exe 94 PID 3464 wrote to memory of 3196 3464 skotes.exe 94 PID 3196 wrote to memory of 3436 3196 x0qQ2DH.exe 95 PID 3196 wrote to memory of 3436 3196 x0qQ2DH.exe 95 PID 3196 wrote to memory of 3436 3196 x0qQ2DH.exe 95 PID 3436 wrote to memory of 632 3436 NordVPNSetup.exe 96 PID 3436 wrote to memory of 632 3436 NordVPNSetup.exe 96 PID 3436 wrote to memory of 632 3436 NordVPNSetup.exe 96 PID 3464 wrote to memory of 4568 3464 skotes.exe 97 PID 3464 wrote to memory of 4568 3464 skotes.exe 97 PID 3464 wrote to memory of 4568 3464 skotes.exe 97 PID 4568 wrote to memory of 3792 4568 26b9f48cd6.exe 99 PID 4568 wrote to memory of 3792 4568 26b9f48cd6.exe 99 PID 4568 wrote to memory of 3792 4568 26b9f48cd6.exe 99 PID 3464 wrote to memory of 3776 3464 skotes.exe 100 PID 3464 wrote to memory of 3776 3464 skotes.exe 100 PID 3464 wrote to memory of 3776 3464 skotes.exe 100 PID 3464 wrote to memory of 880 3464 skotes.exe 101 PID 3464 wrote to memory of 880 3464 skotes.exe 101 PID 3464 wrote to memory of 880 3464 skotes.exe 101 PID 880 wrote to memory of 1404 880 kf5cl0F.exe 103 PID 880 wrote to memory of 1404 880 kf5cl0F.exe 103 PID 880 wrote to memory of 1404 880 kf5cl0F.exe 103 PID 880 wrote to memory of 1888 880 kf5cl0F.exe 105 PID 880 wrote to memory of 1888 880 kf5cl0F.exe 105 PID 880 wrote to memory of 1888 880 kf5cl0F.exe 105 PID 3792 wrote to memory of 1460 3792 axplong.exe 107 PID 3792 wrote to memory of 1460 3792 axplong.exe 107 PID 3464 wrote to memory of 3120 3464 skotes.exe 109 PID 3464 wrote to memory of 3120 3464 skotes.exe 109 PID 3464 wrote to memory of 3120 3464 skotes.exe 109 PID 1460 wrote to memory of 3452 1460 trunk.exe 110 PID 1460 wrote to memory of 3452 1460 trunk.exe 110 PID 632 wrote to memory of 4428 632 NordVPNSetup.tmp 111 PID 632 wrote to memory of 4428 632 NordVPNSetup.tmp 111 PID 4428 wrote to memory of 3600 4428 rundll32.exe 112 PID 4428 wrote to memory of 3600 4428 rundll32.exe 112 PID 3600 wrote to memory of 812 3600 runonce.exe 114 PID 3600 wrote to memory of 812 3600 runonce.exe 114 PID 3792 wrote to memory of 4436 3792 axplong.exe 115 PID 3792 wrote to memory of 4436 3792 axplong.exe 115 PID 3792 wrote to memory of 4436 3792 axplong.exe 115 PID 632 wrote to memory of 1736 632 NordVPNSetup.tmp 121 PID 632 wrote to memory of 1736 632 NordVPNSetup.tmp 121 PID 632 wrote to memory of 4468 632 NordVPNSetup.tmp 117 PID 632 wrote to memory of 4468 632 NordVPNSetup.tmp 117 PID 632 wrote to memory of 4468 632 NordVPNSetup.tmp 117 PID 632 wrote to memory of 1200 632 NordVPNSetup.tmp 118 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 3 IoCs
pid Process 3196 attrib.exe 4628 attrib.exe 100 attrib.exe
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2992
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\System32\svchost.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1736
-
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\System32\svchost.exe"2⤵
- System Location Discovery: System Language Discovery
PID:968
-
-
C:\Users\Admin\AppData\Local\Temp\003b43813ec5522429efc587a873871a2d6fc14c4c9c6008a7d27bce0920db19.exe"C:\Users\Admin\AppData\Local\Temp\003b43813ec5522429efc587a873871a2d6fc14c4c9c6008a7d27bce0920db19.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Users\Admin\AppData\Local\Temp\1016920001\Cq6Id6x.exe"C:\Users\Admin\AppData\Local\Temp\1016920001\Cq6Id6x.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\1016920001\Cq6Id6x.exe"C:\Users\Admin\AppData\Local\Temp\1016920001\Cq6Id6x.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3332
-
-
-
C:\Users\Admin\AppData\Local\Temp\1016945001\x0qQ2DH.exe"C:\Users\Admin\AppData\Local\Temp\1016945001\x0qQ2DH.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Users\Admin\AppData\Local\Temp\NordVPNSetup.exe"C:\Users\Admin\AppData\Local\Temp\NordVPNSetup.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Users\Admin\AppData\Local\Temp\is-8FIPI.tmp\NordVPNSetup.tmp"C:\Users\Admin\AppData\Local\Temp\is-8FIPI.tmp\NordVPNSetup.tmp" /SL5="$B02BA,15409387,73728,C:\Users\Admin\AppData\Local\Temp\NordVPNSetup.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Windows\system32\rundll32.exe"rundll32.exe " SETUPAPI.DLL,InstallHinfSection DefaultInstall 132 C:\Program Files\VS Revo Group\Revo Uninstaller Pro\revoflt.inf6⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Windows\system32\runonce.exe"C:\Windows\system32\runonce.exe" -r7⤵
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Windows\System32\grpconv.exe"C:\Windows\System32\grpconv.exe" -o8⤵PID:812
-
-
-
-
C:\Windows\system32\regsvr32.exe"regsvr32" "C:\Program Files\VS Revo Group\Revo Uninstaller Pro\RUExt.dll" /s6⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Modifies registry class
PID:1736
-
-
C:\Program Files\VS Revo Group\Revo Uninstaller Pro\ruplp.exe"C:\Program Files\VS Revo Group\Revo Uninstaller Pro\ruplp.exe" /regserver /NOREDIRECT6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4468
-
-
C:\Program Files\VS Revo Group\Revo Uninstaller Pro\RevoUninPro.exe"C:\Program Files\VS Revo Group\Revo Uninstaller Pro\RevoUninPro.exe" /bc6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1200
-
-
C:\Program Files\VS Revo Group\Revo Uninstaller Pro\RevoUninPro.exe"C:\Program Files\VS Revo Group\Revo Uninstaller Pro\RevoUninPro.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3872
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1016974001\26b9f48cd6.exe"C:\Users\Admin\AppData\Local\Temp\1016974001\26b9f48cd6.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3792 -
C:\Users\Admin\AppData\Local\Temp\1007054001\trunk.exe"C:\Users\Admin\AppData\Local\Temp\1007054001\trunk.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Users\Admin\AppData\Local\Temp\onefile_1460_133790473965482242\trunk.exeC:\Users\Admin\AppData\Local\Temp\1007054001\trunk.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:3452
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007328001\a6cbb48ec5.exe"C:\Users\Admin\AppData\Local\Temp\1007328001\a6cbb48ec5.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4436
-
-
C:\Users\Admin\AppData\Local\Temp\1007329001\f1ccc838b7.exe"C:\Users\Admin\AppData\Local\Temp\1007329001\f1ccc838b7.exe"5⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1064 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1064 -s 5686⤵
- Program crash
PID:3984
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007330001\55f0980ec3.exe"C:\Users\Admin\AppData\Local\Temp\1007330001\55f0980ec3.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1324
-
-
C:\Users\Admin\AppData\Local\Temp\1007331001\f9a1663aa0.exe"C:\Users\Admin\AppData\Local\Temp\1007331001\f9a1663aa0.exe"5⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2612
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1017019001\VR6f3vF.exe"C:\Users\Admin\AppData\Local\Temp\1017019001\VR6f3vF.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3776
-
-
C:\Users\Admin\AppData\Local\Temp\1017024001\kf5cl0F.exe"C:\Users\Admin\AppData\Local\Temp\1017024001\kf5cl0F.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath "C:\xnvlqie"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1404
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1888
-
-
C:\xnvlqie\abb3167a83744d578a58ca833199e0a1.exe"C:\xnvlqie\abb3167a83744d578a58ca833199e0a1.exe"4⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:652
-
-
-
C:\Users\Admin\AppData\Local\Temp\1017027001\ANEDNjf.exe"C:\Users\Admin\AppData\Local\Temp\1017027001\ANEDNjf.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3120
-
-
C:\Users\Admin\AppData\Local\Temp\1017253001\b79b7334f9.exe"C:\Users\Admin\AppData\Local\Temp\1017253001\b79b7334f9.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5024 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"4⤵PID:4496
-
C:\Windows\system32\mode.commode 65,105⤵PID:2124
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e file.zip -p24291711423417250691697322505 -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2612
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_7.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1772
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_6.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1360
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_5.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2984
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_4.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2948
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_3.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2212
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_2.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:4660
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_1.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:564
-
-
C:\Windows\system32\attrib.exeattrib +H "in.exe"5⤵
- Views/modifies file attributes
PID:4628
-
-
C:\Users\Admin\AppData\Local\Temp\main\in.exe"in.exe"5⤵
- Executes dropped EXE
PID:4592 -
C:\Windows\SYSTEM32\attrib.exeattrib +H +S C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe6⤵
- Views/modifies file attributes
PID:3196
-
-
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe6⤵
- Views/modifies file attributes
PID:100
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /f /CREATE /TN "Intel_PTT_EK_Recertification" /TR "C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe" /SC MINUTE6⤵
- Scheduled Task/Job: Scheduled Task
PID:4856
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell ping 127.0.0.1; del in.exe6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1436 -
C:\Windows\system32\PING.EXE"C:\Windows\system32\PING.EXE" 127.0.0.17⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4816
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1017254001\7b6ad6f8df.exe"C:\Users\Admin\AppData\Local\Temp\1017254001\7b6ad6f8df.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4804
-
-
C:\Users\Admin\AppData\Local\Temp\1017255001\a761802d89.exe"C:\Users\Admin\AppData\Local\Temp\1017255001\a761802d89.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:4872
-
-
C:\Users\Admin\AppData\Local\Temp\1017256001\a5b9dd0dd1.exe"C:\Users\Admin\AppData\Local\Temp\1017256001\a5b9dd0dd1.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:456 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath "C:\olpcapn"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1728
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3320
-
-
C:\olpcapn\082624a2b97441d89a53d996c4d086d7.exe"C:\olpcapn\082624a2b97441d89a53d996c4d086d7.exe"4⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3124
-
-
-
C:\Users\Admin\AppData\Local\Temp\1017257001\e4fb9eea06.exe"C:\Users\Admin\AppData\Local\Temp\1017257001\e4fb9eea06.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1152 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1152 -s 5284⤵
- Program crash
PID:3632
-
-
-
C:\Users\Admin\AppData\Local\Temp\1017258001\15347554b3.exe"C:\Users\Admin\AppData\Local\Temp\1017258001\15347554b3.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:100 -
C:\Users\Admin\AppData\Local\Temp\1017258001\15347554b3.exe"C:\Users\Admin\AppData\Local\Temp\1017258001\15347554b3.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5016
-
-
-
C:\Users\Admin\AppData\Local\Temp\1017259001\6f2ee0f6e5.exe"C:\Users\Admin\AppData\Local\Temp\1017259001\6f2ee0f6e5.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4864
-
-
C:\Users\Admin\AppData\Local\Temp\1017260001\3ce44914fa.exe"C:\Users\Admin\AppData\Local\Temp\1017260001\3ce44914fa.exe"3⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3656
-
-
C:\Users\Admin\AppData\Local\Temp\1017261001\16b3378aab.exe"C:\Users\Admin\AppData\Local\Temp\1017261001\16b3378aab.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4536 -
C:\Users\Admin\AppData\Local\Temp\1017261001\16b3378aab.exe"C:\Users\Admin\AppData\Local\Temp\1017261001\16b3378aab.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1568
-
-
-
C:\Users\Admin\AppData\Local\Temp\1017262001\cd14ca0381.exe"C:\Users\Admin\AppData\Local\Temp\1017262001\cd14ca0381.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1036 -
C:\Users\Admin\AppData\Local\Temp\EQMX5TA4TNGMQ0VA.exe"C:\Users\Admin\AppData\Local\Temp\EQMX5TA4TNGMQ0VA.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4536
-
-
C:\Users\Admin\AppData\Local\Temp\6NSGV4IHEWPLB4H2J0WJ.exe"C:\Users\Admin\AppData\Local\Temp\6NSGV4IHEWPLB4H2J0WJ.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Identifies Wine through registry keys
- System Location Discovery: System Language Discovery
PID:5492
-
-
-
C:\Users\Admin\AppData\Local\Temp\1017263001\98bf9fdbc8.exe"C:\Users\Admin\AppData\Local\Temp\1017263001\98bf9fdbc8.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1404
-
-
C:\Users\Admin\AppData\Local\Temp\1017264001\abd820d511.exe"C:\Users\Admin\AppData\Local\Temp\1017264001\abd820d511.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2128 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3752
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3608
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3032
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1200
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4436
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:4508
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4264 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2028 -parentBuildID 20240401114208 -prefsHandle 1964 -prefMapHandle 1956 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {3da2cad7-a107-4342-b395-c318ba8e8e37} 4264 "\\.\pipe\gecko-crash-server-pipe.4264" gpu6⤵PID:5080
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2460 -parentBuildID 20240401114208 -prefsHandle 2440 -prefMapHandle 2436 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {90481e03-5929-4019-8fcf-bcd112852687} 4264 "\\.\pipe\gecko-crash-server-pipe.4264" socket6⤵PID:4064
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3084 -childID 1 -isForBrowser -prefsHandle 3088 -prefMapHandle 2840 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cbb4624b-ff6c-4c8c-84c9-65d054297cd2} 4264 "\\.\pipe\gecko-crash-server-pipe.4264" tab6⤵PID:2664
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4052 -childID 2 -isForBrowser -prefsHandle 4044 -prefMapHandle 2804 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9351a68f-3b38-40b1-9b4d-fc68fabd2f2c} 4264 "\\.\pipe\gecko-crash-server-pipe.4264" tab6⤵PID:5128
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4768 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4684 -prefMapHandle 4744 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5fae96df-f25a-48b3-8c18-48d22261afbb} 4264 "\\.\pipe\gecko-crash-server-pipe.4264" utility6⤵
- Checks processor information in registry
PID:6000
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5160 -childID 3 -isForBrowser -prefsHandle 5152 -prefMapHandle 3972 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f8783bc5-16ef-4ee7-b317-05a46b715860} 4264 "\\.\pipe\gecko-crash-server-pipe.4264" tab6⤵PID:5504
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5380 -childID 4 -isForBrowser -prefsHandle 5300 -prefMapHandle 5304 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1aa2b233-0457-4e7d-afd7-6d1b881db067} 4264 "\\.\pipe\gecko-crash-server-pipe.4264" tab6⤵PID:5484
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5584 -childID 5 -isForBrowser -prefsHandle 5504 -prefMapHandle 5512 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {48a211b6-0a73-4881-a7d1-02676e4d0618} 4264 "\\.\pipe\gecko-crash-server-pipe.4264" tab6⤵PID:5464
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1017265001\5512e62a6a.exe"C:\Users\Admin\AppData\Local\Temp\1017265001\5512e62a6a.exe"3⤵PID:448
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1064 -ip 10641⤵PID:1360
-
C:\PROGRA~1\VSREVO~1\REVOUN~1\ruplp.exeC:\PROGRA~1\VSREVO~1\REVOUN~1\ruplp.exe -Embedding1⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4876
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1152 -ip 11521⤵PID:4804
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1752
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4856
-
C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exeC:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1208 -
C:\Windows\explorer.exeexplorer.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2464
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell ping 127.1.10.1; del Intel_PTT_EK_Recertification.exe2⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1200 -
C:\Windows\system32\PING.EXE"C:\Windows\system32\PING.EXE" 127.1.10.13⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3584
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
2Change Default File Association
1Component Object Model Hijacking
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
2Change Default File Association
1Component Object Model Hijacking
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Virtualization/Sandbox Evasion
3Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
4Credentials In Files
4Discovery
Browser Information Discovery
1Query Registry
9Remote System Discovery
1System Information Discovery
5System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24.2MB
MD5c8c368988a2a4c2a953b7db4bca47961
SHA15acc29b51284146a9ff7b1587c3d89416e66acdf
SHA256f680e0fe00a48f6e3d079c1572682d6664f476b119745d73cb852baba58cc683
SHA5125fdef1f4e3b471910fe2b12f6f6aa8bfad3f2a9c80954843085c79139823a88e0c7d921b7c01dda56871800afc20de4739682c02e9fa6a94715c64207a671b30
-
Filesize
617B
MD585306571e7ae6002dd2a0fb3042b7472
SHA1c897ab7434b118a8ec1fe25205903f5ec8f71241
SHA25640c98b01052cd95102701b71b4fbe0eda48537435898c413239f5f888a614253
SHA5120e9853dab46fd5f6f9eea44377d3802e9cc2fff7ba2f9b45c7c8fc37b860ad9c3c4beb6e1572c87964e06144504210e29038cb03e00c7e7af6ad32e6e995c76a
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
528KB
MD5de54529ab7a1ab85fe8e93e0bc886c9c
SHA13c57492f873782a8afe05588ed3a5e55cace9f8a
SHA256fd69fc5c212db1b52af1e9c09a5f8c71daf415b41ee7f8575357293922986ba5
SHA512641e28fe598826c917f48ba15895ead064e51359dcb6006c1aecba978e1ce111b593869cd0ac66d4e8e3068700c4012bd195cd1176642d58acd1a21cb9c85855
-
Filesize
18KB
MD5fa6d6bdf571e456298c805ca378a437f
SHA13a229a7fb3e318cd5fea20b7886be3ad91af259e
SHA256d9274db34a3482c21197ac5dc17c54bc0dfcdf8e2eca2130064b703150b66557
SHA5127e6514c68e15a8f07c9f4c28de1a251ba3cf723f4ececb20a1581b223beca51fc19abc5050d75bd8fb9ab8f22b19ab975f1e2140d2759afb5a4e50a35cbae1f0
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
10.2MB
MD5d3b39a6b63c3822be6f8af9b3813bbad
SHA100b020e5a1c05442612f2cec7950c2814b59b1b6
SHA256786f1331a0618485b31ba763911b14fcec691bf9897bee8f42680076092b7a2f
SHA512a5c7504b29798fdabf610cf65716ec1d7745956f470d86de12a52b3c8731f858764fdf78647e50b3111622e7e65f05f82cd258b98c1a0f45ef7fdc088647d4ff
-
Filesize
2.8MB
MD579d73f0973da38285b0e0a83fa7ef5d0
SHA118692d3c66779517481c1868e39a8ed62f3af7fd
SHA256554bde2e706bad2908fc0534a58e7cfa7e099edc754a46717f738616da146131
SHA512471ba9cd38f5126e79a52baa70e5bb169dd09b7b05b7a56da8dc6da28c0a6e579d2962b575ac4ca83695d8a60a07457d974e2d79d4e7506cb4769a7ff87ca270
-
Filesize
1.9MB
MD5d6070b7d0ec34e67a998dbe217c6c746
SHA164e771f2bcb20e9ccc89c8b4a9cf1b36e431d491
SHA25610b27d9cb387fa4ac371de8767d5204925ca4da9c490ea8e2491b1a60c49fd85
SHA51252bc768f8654cef43e62abfdba30878313aea5893d80759c633d84ce01c701b05e6f24c995f3a2568ab16ca69e6c1223b7e39c74c509fd6607bfa5e9418784f3
-
Filesize
2.9MB
MD590c7e768e9ccc60d7259f30b23571419
SHA106aa4afabe34974704b73757888f6605711115dc
SHA256fa51ea713353ed850b8b06c9ea95fd37ab6c07668711aaec94d97c5e8cf2eceb
SHA5120861209fb9b11a1da355b6e0a1cb9e69840e8aae638ad744638c37039f037da2f1781ac556bdf988a2f269f84bda8348d4cceb1a8aef8e7b5bcf8b70910c0033
-
Filesize
4.3MB
MD5aa1d9bfcb4fee4ff65cf6209fbc83204
SHA13334182b3bf48e928683a9c0a87d25ea57e8d70b
SHA256dc645ba585c2d41ec553cefd46bd3dab212882cb07097905f9ed071e8882b161
SHA512aec316f0ea02349b57a5e75a972edf70b8aea705a7c74f67452a5840834fca0cf70c3d099ca003bab73a25186e6f03298ea68440a03216fb40ece74b82f71d68
-
Filesize
3.1MB
MD5f9b9f98592292b5cbf59c7a60e9ebaee
SHA159cc872fd0a11b259cc5b70893f35e9b5a7c8cbb
SHA2565688e9e0becc622c573af2a1af4ee0676ef3907e38a9258a7801b46b7ad64665
SHA512f27e4a96173aeb064f47d44ff445b1e15f6d4f39a4ad711c019bb29692caea56eb910970d22bc13ac5c57a256d71e77b12aa60c8405335a239781c57cb0eaf8e
-
Filesize
17.6MB
MD53c224e3fc892719dc1e302378e533579
SHA10a65062e1426a95bfeca355398b6fdc4912fb6b1
SHA25664cc7f7906fe1ebf0b6977892abd9aa36f5e525cb241964c3986ee9e1a18312d
SHA512554a26e9654eccce831e4adcee49d5e2507956935e562b134a86f332d867debfcd1f64fdb88fccb2e1eee810975d565dbc6ea1376516817ee38765e4bd733a49
-
Filesize
80KB
MD5a8390acfa222308d09d5472c39abfc10
SHA1dfc5143335be9b8e55fe719f93674472a8158055
SHA256df6ddc7719486fbaf8e8bee1363912e0c97d9cb02bed533f4a23c7bfcdec926f
SHA512534c8fbfd0f41f766b48b2e2697f4b9c8a2c5d9c4b2a2afff8feafee434adb9350175b51128ac1425354c85f09477b8e4944ba3639a2d169824c0683545c351e
-
Filesize
2.8MB
MD52f60050effd03559ebc5a3ef6fdc5d03
SHA1cc924f25728e2e9b8509f6ed547686a3e29f94be
SHA256999e0fc991ee2027fa0aa7b92fe8b6612a0eec5bbd9fa169c036862aed2ce3f7
SHA512348ec438b1d775b3d3ec51142be39538c47f004c081a1745d5f13544f37f272fc7eca05bc8c6553925e2ea3ed4d44d988597d9bdf52a85548f6e09ae04ac57db
-
Filesize
1.8MB
MD5ff279f4e5b1c6fbda804d2437c2dbdc8
SHA12feb3762c877a5ae3ca60eeebc37003ad0844245
SHA256e115298ab160da9c7a998e4ae0b72333f64b207da165134ca45eb997a000d378
SHA512c7a8bbcb122b2c7b57c8b678c5eed075ee5e7c355afbf86238282d2d3458019da1a8523520e1a1c631cd01b555f7df340545fd1e44ad678dc97c40b23428f967
-
Filesize
21KB
MD514becdf1e2402e9aa6c2be0e6167041e
SHA172cbbae6878f5e06060a0038b25ede93b445f0df
SHA2567a769963165063758f15f6e0cece25c9d13072f67fa0d3c25a03a5104fe0783a
SHA51216b837615505f352e134afd9d8655c9cabfa5bfcfbee2c0c34f2d7d9588aa71f875e4e5feb8cdf0f7bacc00f7c1ca8dabd3b3d92afc99abf705c05c78e298b4a
-
Filesize
1.8MB
MD525fb9c54265bbacc7a055174479f0b70
SHA14af069a2ec874703a7e29023d23a1ada491b584e
SHA256552f8be2c6b2208a89c728f68488930c661b3a06c35a20d133ef7d3c63a86b9c
SHA5127dfd9e0f3fa2d68a6ce8c952e3b755559db73bb7a06c95ad6ed8ac16dedb49be8b8337afc07c9c682f0c4be9db291a551286353e2e2b624223487dc1c8b54668
-
Filesize
4.2MB
MD53a425626cbd40345f5b8dddd6b2b9efa
SHA17b50e108e293e54c15dce816552356f424eea97a
SHA256ba9212d2d5cd6df5eb7933fb37c1b72a648974c1730bf5c32439987558f8e8b1
SHA512a7538c6b7e17c35f053721308b8d6dc53a90e79930ff4ed5cffecaa97f4d0fbc5f9e8b59f1383d8f0699c8d4f1331f226af71d40325022d10b885606a72fe668
-
Filesize
4.3MB
MD5d6cfec5f8c250d92d751030c95d46aec
SHA170439cf2611f97c84af487c44b88703d004a2bca
SHA2560200c5657794ccc0916aae772004b7f72a793b77dc807b51b2f88e597813f611
SHA512a939f9af174d37e3d32d0794b1f14110deffd7847b884a79b5fd300bcc7c30ce285f6dbbc41ad6ab5bd237bb6353efb7ddee903a8ec155a10840dec8c25d9bbb
-
Filesize
747KB
MD58a9cb17c0224a01bd34b46495983c50a
SHA100296ea6a56f6e10a0f1450a20c5fb329b8856c1
SHA2563d51b9523b387859bc0d94246dfb216cfa82f9d650c8d11be11ed67f70e7440b
SHA5121472e4670f469c43227b965984ecc223a526f6284363d8e08a3b5b55e602ccce62df4bc49939ee5bd7df7b0c26e20da896b084eccab767f8728e6bf14d71c840
-
Filesize
3.1MB
MD5c00a67d527ef38dc6f49d0ad7f13b393
SHA17b8f2de130ab5e4e59c3c2f4a071bda831ac219d
SHA25612226ccae8c807641241ba5178d853aad38984eefb0c0c4d65abc4da3f9787c3
SHA5129286d267b167cba01e55e68c8c5582f903bed0dd8bc4135eb528ef6814e60e7d4dda2b3611e13efb56aa993635fbab218b0885daf5daea6043061d8384af40ca
-
Filesize
758KB
MD5afd936e441bf5cbdb858e96833cc6ed3
SHA13491edd8c7caf9ae169e21fb58bccd29d95aefef
SHA256c6491d7a6d70c7c51baca7436464667b4894e4989fa7c5e05068dde4699e1cbf
SHA512928c15a1eda602b2a66a53734f3f563ab9626882104e30ee2bf5106cfd6e08ec54f96e3063f1ab89bf13be2c8822a8419f5d8ee0a3583a4c479785226051a325
-
Filesize
1.7MB
MD5a24f5d2fe8d5d6e3c811f6fedff8e605
SHA14995de2e17b464729ca860743af58574b6b3343b
SHA256ccebeeae14eec854a62b3d8a896c44af46957208427324d5819fb828b0dd64f5
SHA512feae70419ddc924760c7057d50267aa4a988c88371fe0b0d3cb48f86a6ed134443c39f7766c3e72d7f98cef3557bd30ac4749431dbdf7cafb0664009a147ec36
-
Filesize
950KB
MD55e10cd3b6e6e8d90290cb0249243b486
SHA1143c4cd03751b271722ee2a62011326fc84b6b15
SHA256a32634a27aa716060ee631f6ccb3c6f2ea71f94838b124024bb22e5fc5330650
SHA512c8a2779a5a5c1b050434ab8c75975aa1ef1ea3a5383a54a401d69dcbdbc0fa12026d5ec8fccd5f975ed47db8bcfff77be683a02dfb989ef5dae88be698d911b1
-
Filesize
1.7MB
MD55ee16489ab5a0d6cf49a20e9fdae3681
SHA1b531e0dd6cf1ec02f0bebf334e0a8ca286a12cf3
SHA25685e590af5f8e19dd85fd3471dcffb1ea1fa0f6cc3084ef50c6b44f02244e1075
SHA512e923a07668fc965eed5adc066cb1991ce8517bd633348da37f7ae32c46624ef29d3d9d8145bbcad9b2112304387a8b348fe37deb700c384b0185595f64a48bfe
-
Filesize
15.0MB
MD500fad648745710b9c4d16c4830416d80
SHA1fafb219fe26e065cc11d4c12a4960447509b2a84
SHA256e4561ffd0993938234d207ce56d5fe775c4ddb704f7be63003026d43eae0a337
SHA51221e7b3965d1f54eb671b46e272161a426dd8a4151208b154c7fbf144725c38d593d513fb6f77cd1cef4df651266fc235a76023102b5fdc85cc8cc67da6ded847
-
Filesize
81KB
MD569801d1a0809c52db984602ca2653541
SHA10f6e77086f049a7c12880829de051dcbe3d66764
SHA25667aca001d36f2fce6d88dbf46863f60c0b291395b6777c22b642198f98184ba3
SHA5125fce77dd567c046feb5a13baf55fdd8112798818d852dfecc752dac87680ce0b89edfbfbdab32404cf471b70453a33f33488d3104cd82f4e0b94290e83eae7bb
-
Filesize
774KB
MD54ff168aaa6a1d68e7957175c8513f3a2
SHA1782f886709febc8c7cebcec4d92c66c4d5dbcf57
SHA2562e4d35b681a172d3298caf7dc670451be7a8ba27c26446efc67470742497a950
SHA512c372b759b8c7817f2cbb78eccc5a42fa80bdd8d549965bd925a97c3eebdce0335fbfec3995430064dead0f4db68ebb0134eb686a0be195630c49f84b468113e3
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2.9MB
MD54072633a022e6587009b5ca189ff4613
SHA1d54d3cf0878186b3b8230f1f0b8188bf1bcd738e
SHA256003b43813ec5522429efc587a873871a2d6fc14c4c9c6008a7d27bce0920db19
SHA512136ebcb816217cecb81f5b521b7102d54eb17f4f0685ab003e7013cbff75e7074ee93a086f847c5a0f9f0c3f2eb8c5c5706b07fe119182c86d2007699a98f700
-
Filesize
920KB
MD5ce14f23d9bfc00a3cc5ceb06a25030e7
SHA1c63991558fb7c45555a1c4e53151bdb518b15eec
SHA2565bd02d57433581efc6e14f6aefa4d1b5a52051f2ca269bde439b50658fa0bc39
SHA5126497e85f1009b26fe68317a695467505e6f75270f07308ee7c321abe9b08b7ae563598b11b44629051759f321a39ec7595c0c6e48b9778146ee7f42096ff88ce
-
Filesize
41KB
MD548f30e9b874607f974a289c4b9366eac
SHA1665bc7dd97777c2b28034b4fe9e67aef918638e6
SHA25636fc3878d46bb626808d005d048b06e047f099ea55e06630e5ca3f770e9d2001
SHA512b6920c6a3eb231cc7c4ec856f4c1c4244c81828ac8ef755f396d327a9e41c3f26fdea8c7f8ae1df8d9d48dd7840090bb19bcb2f653f84b958cb84cd6e901cc65
-
Filesize
5KB
MD59a4195984907c6c86e8f9f3c699c929a
SHA14ab99e6e19653e1843c87c9aea071e5e3baef8e8
SHA256a4c727202170101f55249b0867b24dc8a6ad3098af43c5c2dea7a683f34509bf
SHA51290dc881faa1b7cfd4e00130f22c433b1558f3a53090edf039a92250f7bb0a1bff213afa16b189f4c314a27658b229a434f2cb0eede1f412768888dc7639a0b9f
-
Filesize
51KB
MD5e5064949166150e855113e66df1abc38
SHA1d24f57301f4d4f3b48081e4c8744e9fc031676f7
SHA256e73cf0ce497baf7d5b8180143b91a2f42de1d87480cf3f38271f0f2f97aa4080
SHA512fc3749f2453d8eb7e9b9dc325951543c1640ca1d15ee547c9da117451a10fa5e1605b3a7e783558291ed67d460a712aed938a07681e99a1f203d5f14ae081086
-
Filesize
4KB
MD50ee914c6f0bb93996c75941e1ad629c6
SHA112e2cb05506ee3e82046c41510f39a258a5e5549
SHA2564dc09bac0613590f1fac8771d18af5be25a1e1cb8fdbf4031aa364f3057e74a2
SHA512a899519e78125c69dc40f7e371310516cf8faa69e3b3ff747e0ddf461f34e50a9ff331ab53b4d07bb45465039e8eba2ee4684b3ee56987977ae8c7721751f5f9
-
Filesize
6KB
MD54ff75f505fddcc6a9ae62216446205d9
SHA1efe32d504ce72f32e92dcf01aa2752b04d81a342
SHA256a4c86fc4836ac728d7bd96e7915090fd59521a9e74f1d06ef8e5a47c8695fd81
SHA512ba0469851438212d19906d6da8c4ae95ff1c0711a095d9f21f13530a6b8b21c3acbb0ff55edb8a35b41c1a9a342f5d3421c00ba395bc13bb1ef5902b979ce824
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
22KB
MD5ab35386487b343e3e82dbd2671ff9dab
SHA103591d07aea3309b631a7d3a6e20a92653e199b8
SHA256c3729545522fcff70db61046c0efd962df047d40e3b5ccd2272866540fc872b2
SHA512b67d7384c769b2b1fdd3363fc3b47d300c2ea4d37334acfd774cf29169c0a504ba813dc3ecbda5b71a3f924110a77a363906b16a87b4b1432748557567d1cf09
-
Filesize
37KB
MD567965a5957a61867d661f05ae1f4773e
SHA1f14c0a4f154dc685bb7c65b2d804a02a0fb2360d
SHA256450b9b0ba25bf068afbc2b23d252585a19e282939bf38326384ea9112dfd0105
SHA512c6942818b9026dc5db2d62999d32cf99fe7289f79a28b8345af17acf9d13b2229a5e917a48ff1f6d59715bdbcb00c1625e0302abcfe10ca7e0475762e0a3f41b
-
Filesize
4KB
MD586bee4a15a777e236f1636b57a37b047
SHA17c93de14c61603a0573719de1ffa86b7226c0dae
SHA25617e6f0e88a231e25c1de67a0d4ae308284f407dea77ff8b3ce363b770c5ba8f1
SHA512af3ebe043048c6dc683408f22e647609d0423fd2fa55cba5d981f978fb1123fd9d5cfca147168d4ff437a09f699fd5d5c1a14b50d66ed4bcae4485adcf0ab8b7
-
Filesize
4KB
MD5f5486535c71cd199e6c1f3dc43a8943e
SHA1366a454cfab4821747d069c2c5de687b84e49323
SHA256ee5c535dc8f819b31346e1723db1a5aab6bda94ff57c2477e1291fd4f7841bb8
SHA512ab2bf66480260064075e655746eabd32ea71e1f9b232c03ecb67999825418177c033b224b0f5f5b269d1b86428134e6bf7389c1729a591103d4b74b7497e67b1
-
Filesize
39KB
MD51ea948aad25ddd347d9b80bef6df9779
SHA10be971e67a6c3b1297e572d97c14f74b05dafed3
SHA25630eb67bdd71d3a359819a72990029269672d52f597a2d1084d838caae91a6488
SHA512f2cc5dce9754622f5a40c1ca20b4f00ac01197b8401fd4bd888bfdd296a43ca91a3ca261d0e9e01ee51591666d2852e34cee80badadcb77511b8a7ae72630545
-
Filesize
2KB
MD56e57cda7a4a20382c6033d2458bd676c
SHA15524b66fa844db104ce6173f7aa0de625f53a408
SHA2562b9fb591c534ff41765b9b4eaee88e121501b78cb3bce3bd768c68838a363e5b
SHA512f33de6f8897e9a756a2d3c86fdb75549b475e7185a8aa4b8d1462a59e2eedc8b48d2acfbef4347584ba23d71cd7aeb0856e737c07f4f82379aab40fe6860974a
-
Filesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628
-
Filesize
174KB
MD590f080c53a2b7e23a5efd5fd3806f352
SHA1e3b339533bc906688b4d885bdc29626fbb9df2fe
SHA256fa5e6fe9545f83704f78316e27446a0026fbebb9c0c3c63faed73a12d89784d4
SHA5124b9b8899052c1e34675985088d39fe7c95bfd1bbce6fd5cbac8b1e61eda2fbb253eef21f8a5362ea624e8b1696f1e46c366835025aabcb7aa66c1e6709aab58a
-
Filesize
36KB
MD5827615eee937880862e2f26548b91e83
SHA1186346b816a9de1ba69e51042faf36f47d768b6c
SHA25673b7ee3156ef63d6eb7df9900ef3d200a276df61a70d08bd96f5906c39a3ac32
SHA51245114caf2b4a7678e6b1e64d84b118fb3437232b4c0add345ddb6fbda87cebd7b5adad11899bdcd95ddfe83fdc3944a93674ca3d1b5f643a2963fbe709e44fb8
-
Filesize
5.0MB
MD5123ad0908c76ccba4789c084f7a6b8d0
SHA186de58289c8200ed8c1fc51d5f00e38e32c1aad5
SHA2564e5d5d20d6d31e72ab341c81e97b89e514326c4c861b48638243bdf0918cfa43
SHA51280fae0533ba9a2f5fa7806e86f0db8b6aab32620dde33b70a3596938b529f3822856de75bddb1b06721f8556ec139d784bc0bb9c8da0d391df2c20a80d33cb04
-
Filesize
6.6MB
MD5166cc2f997cba5fc011820e6b46e8ea7
SHA1d6179213afea084f02566ea190202c752286ca1f
SHA256c045b57348c21f5f810bae60654ae39490846b487378e917595f1f95438f9546
SHA51249d9d4df3d7ef5737e947a56e48505a2212e05fdbcd7b83d689639728639b7fd3be39506d7cfcb7563576ebee879fd305370fdb203909ed9b522b894dd87aacb
-
Filesize
30KB
MD57c14c7bc02e47d5c8158383cb7e14124
SHA15ee9e5968e7b5ce9e4c53a303dac9fc8faf98df3
SHA25600bd8bb6dec8c291ec14c8ddfb2209d85f96db02c7a3c39903803384ff3a65e5
SHA512af70cbdd882b923013cb47545633b1147ce45c547b8202d7555043cfa77c1deee8a51a2bc5f93db4e3b9cbf7818f625ca8e3b367bffc534e26d35f475351a77c
-
Filesize
18.0MB
MD586ddf66d8651d0baa1cc13d6f8c18dc1
SHA1ee15109134300e555085811f4060048e245269f9
SHA256ee045dffee8b48356106a2105803b73776b73bf7462d364b1f82540fcf72f4cf
SHA512385fce7ded01cba93f842a1b698b78e3eb1d73833c282669ebe6bea22ec6c4957b179325614f17ecb7c7357051fb7381e011cf2ebc0f5ca2f24414f0e23a0c6c
-
Filesize
116KB
MD5be8dbe2dc77ebe7f88f910c61aec691a
SHA1a19f08bb2b1c1de5bb61daf9f2304531321e0e40
SHA2564d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83
SHA5120da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin
Filesize6KB
MD5fc9bf40e45f8f2fa5b4bdc1158a4e183
SHA10c009d825fc87d05def90c45b7200ea9a491e7c1
SHA256df6b9ca3bb52e8e9d7c7ebd8228e512ff6cc72fc98ecbdfa118cdfcccce432eb
SHA51244b22f4b03a13e9343c81f640c0c2e827ee5481c870877107e2eef5be2456687f95c1978abcab826352ff17460b64fed46def70d689f4ab58efc6b369bb5bac1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin
Filesize7KB
MD53ed3a2e6182a040e35355d14c94da3a8
SHA1987043cbd672b9065eb2a066e794e856bce92bac
SHA25651bda67dcf634ddd2fedc6f84d7cba72b20bcbff5d0b98556bbe0aae4fe7f010
SHA512383eb06c61b42ff55c9f9fae3c4bbefd1ceb36add0c58a0e21d87f16cfd27b6d6e63bdec996c7b70226343dd0f7f27fc95cd5bbe80f1bd8e68e3b3706492f444
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize21KB
MD5010358b421d4bcdac135455bcffc016c
SHA1cb79e3a0a612108dd3c9de5675ef1a60900cf45d
SHA256b14587df3ec53534c807feb74b08b7cd509ebbc78b78a26d00f86f40e88fb1eb
SHA512e39cd69b654e2836e59e9a9b6e8f60b466c8075fe50bde757419329e87ed9fd25249927b82a9546bfafc37d34c87bf493e2423a6eff9505bcfc2513cd3659889
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\2d4e0dcf-3cd3-408b-b488-e1d40fbccd65
Filesize659B
MD57b88c1db4a7d33bc7fc792675497dc63
SHA180b0ddfcdae4217cde3963cee05ede4d7bfc35e2
SHA256ff2297799016fa9030158c6d1f67d0adcd4aa99b9c4826786b329df7201277ab
SHA512925bbf8185e4f79ddc64e6138f4894c38d298ea9d0558234964768eac62a7aa15fbb2f4cc42e32f064fac901a43e76af7b1ac9e6dd0a4c29c4b0661ed20f8140
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\da7de50e-c2ff-44b5-b242-6635b12a9213
Filesize982B
MD5cd74045431a1847c4461f5a62ef366e3
SHA112599346991805dcd2ed0be3ff039d9320471729
SHA256d03035226ad67552f5ad3f6ea30059c6bda7e0784db837e3ac2d10d7f02380ad
SHA51278e2adaf22166575f204de4514f4b472d95b05c0b9c7c7d22e21d1c5cb2c10bd9c93708b4c10e52642043d4bec50c5d7b4e8d56c26e6a60c43c5b51611b41bec
-
Filesize
10KB
MD59c7027f7c2b9187c0759c9ec74fb1add
SHA17bba5ec48b2d45259ed809b2e26a3b48d90f8041
SHA25653f9489f562a301770e4a49036cc4383334237c6471ef3a2e85179bb280f75ce
SHA5125539aa69887184eec9a7ad0b50c4045599f59e41ad181a8696c7920a206a3e075980c6c7bc64d3d245796ac714b6e3e17673371189bbd3c780573099ea537cef
-
Filesize
37KB
MD5ec8e58e6b58b4fcde77431cda3a24c0e
SHA1ebb474009b2a2fbce648adff4b8b797fcd00c997
SHA25625667717bf4691957f07a6363585e2c7eaf22e5fd7229bf32c91ea59ef4a2edd
SHA512e2c667ebe97973ff27c1edf3e45ebf7950bc8d7aad1126da25290a2f590b21808654694cbe6a0ad1d3649566ec7645eb6b3379c7d7c0a650d5381a69e9cdade4
-
Filesize
1.2MB
MD5577cd52217da6d7163cea46bb01c107f
SHA182b31cc52c538238e63bdfc22d1ea306ea0b852a
SHA256139762e396fb930400fab8faab80cb679abbe642144261cba24973fb23bcd728
SHA5128abad4eaf2a302dfd9ead058e8c14d996437975730125c46d034a71028921ff36ff5d157ad3671e328ac667ec8095db19fa14a9e8eaaf1a7738aa3d0120b5474