Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-12-2024 05:49
Static task
static1
Behavioral task
behavioral1
Sample
e5b32ba4f7b2f54f95d3856220aa252c6122116e16916133d20a9f38ca9e4c7b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e5b32ba4f7b2f54f95d3856220aa252c6122116e16916133d20a9f38ca9e4c7b.exe
Resource
win10v2004-20241007-en
General
-
Target
e5b32ba4f7b2f54f95d3856220aa252c6122116e16916133d20a9f38ca9e4c7b.exe
-
Size
2.9MB
-
MD5
0f299dff09ef0812a445f45f955ce8b2
-
SHA1
08479f8270aefa0c901f42131a8c805577689de1
-
SHA256
e5b32ba4f7b2f54f95d3856220aa252c6122116e16916133d20a9f38ca9e4c7b
-
SHA512
2539b8d7516e5230e70aa20dcac3d712b38c6d7a13b923ae88ad8c52b20e70ae715f8f64232c4153486d943569eba6a2abff5e3ce6c21b25b3c5852544ebda04
-
SSDEEP
49152:18GUOiFKP0FB56S2xmkHdcd7grPT/VL6Gx2NNmP3s:1p0FB56jx5c5gXNGG1P3s
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
cryptbot
Extracted
lumma
Extracted
gurcu
https://api.telegram.org/bot7807236140:AAF-i5R6XuCUIDX7jhwiW3NW21ELWWQOTo0/sendMessag
Signatures
-
Amadey family
-
Cryptbot family
-
Gurcu family
-
Lumma family
-
Stealc family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
description pid Process procid_target PID 3508 created 2528 3508 f96ac37a02.exe 44 PID 5684 created 2528 5684 0c8a3305f3.exe 44 -
Enumerates VirtualBox registry keys 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF f8b402920a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF 6b8af85641.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 26 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1caef51f04.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e3d8370f09.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ VR6f3vF.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ANEDNjf.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 35072b2673.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6b8af85641.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7151625490.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 99cebb8945.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ J2IL0OJJ2DHY0C60X1BTBTCG06Y.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f96ac37a02.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 69821db333.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f8b402920a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 51d17e6280.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1efaf74ff2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0c8a3305f3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e5b32ba4f7b2f54f95d3856220aa252c6122116e16916133d20a9f38ca9e4c7b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ R1VBSFOWCU46FXRS1D4KIFJ.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0d4fd6ecc0.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4324 powershell.exe 5620 powershell.exe 3516 powershell.exe 4436 powershell.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\DRIVERS\SETEAD8.tmp rundll32.exe File created C:\Windows\system32\DRIVERS\SETEAD8.tmp rundll32.exe File opened for modification C:\Windows\system32\DRIVERS\revoflt.sys rundll32.exe -
Checks BIOS information in registry 2 TTPs 52 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f8b402920a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1efaf74ff2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e5b32ba4f7b2f54f95d3856220aa252c6122116e16916133d20a9f38ca9e4c7b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 69821db333.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1efaf74ff2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1caef51f04.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e3d8370f09.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 51d17e6280.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0d4fd6ecc0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion R1VBSFOWCU46FXRS1D4KIFJ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6b8af85641.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0c8a3305f3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7151625490.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f96ac37a02.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 51d17e6280.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0d4fd6ecc0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7151625490.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e3d8370f09.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f96ac37a02.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 35072b2673.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion R1VBSFOWCU46FXRS1D4KIFJ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion VR6f3vF.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 35072b2673.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1caef51f04.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion J2IL0OJJ2DHY0C60X1BTBTCG06Y.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e5b32ba4f7b2f54f95d3856220aa252c6122116e16916133d20a9f38ca9e4c7b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f8b402920a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ANEDNjf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion VR6f3vF.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ANEDNjf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6b8af85641.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 99cebb8945.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 99cebb8945.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 69821db333.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0c8a3305f3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion J2IL0OJJ2DHY0C60X1BTBTCG06Y.exe -
Checks computer location settings 2 TTPs 8 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 1cdc491584.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 9a0d5361e9.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation e5b32ba4f7b2f54f95d3856220aa252c6122116e16916133d20a9f38ca9e4c7b.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation axplong.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 69821db333.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation kf5cl0F.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation ruplp.exe -
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 62 IoCs
pid Process 4536 axplong.exe 4532 e3d8370f09.exe 3508 f96ac37a02.exe 1960 69821db333.exe 2588 skotes.exe 3724 axplong.exe 4320 skotes.exe 3448 f8b402920a.exe 2888 Cq6Id6x.exe 448 x0qQ2DH.exe 2392 NordVPNSetup.exe 4092 NordVPNSetup.tmp 844 Cq6Id6x.exe 3240 51d17e6280.exe 5060 VR6f3vF.exe 4964 kf5cl0F.exe 3724 ANEDNjf.exe 1528 zudFSfy.exe 2460 fa26dcb24d2741e8a650f4e95e8ea499.exe 4320 axplong.exe 4032 skotes.exe 820 kz8ZdyP.exe 2944 ruplp.exe 216 3b75ee8e4e.exe 3688 RevoUninPro.exe 4960 593e2602e0.exe 3700 593e2602e0.exe 1316 593e2602e0.exe 4068 zudFSfy.exe 4824 zudFSfy.exe 5672 1efaf74ff2.exe 4280 RevoUninPro.exe 2484 ruplp.exe 5932 kz8ZdyP.exe 3616 35072b2673.exe 5028 6b8af85641.exe 3312 1cdc491584.exe 6852 3b75ee8e4e.exe 5684 0c8a3305f3.exe 1684 51c47f6e8d.exe 632 51c47f6e8d.exe 5424 17375bbd762a4d92a51e80f42c15db49.exe 5816 7151625490.exe 3760 9a0d5361e9.exe 6340 7z.exe 6520 7z.exe 7124 7z.exe 6308 7z.exe 6668 7z.exe 6716 7z.exe 7164 7z.exe 6408 7z.exe 6048 in.exe 6036 1caef51f04.exe 4816 99cebb8945.exe 3752 axplong.exe 4232 skotes.exe 5692 c74a109d97.exe 5912 Intel_PTT_EK_Recertification.exe 7024 J2IL0OJJ2DHY0C60X1BTBTCG06Y.exe 6056 0d4fd6ecc0.exe 6808 R1VBSFOWCU46FXRS1D4KIFJ.exe -
Identifies Wine through registry keys 2 TTPs 26 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine e5b32ba4f7b2f54f95d3856220aa252c6122116e16916133d20a9f38ca9e4c7b.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 69821db333.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 1caef51f04.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine VR6f3vF.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine J2IL0OJJ2DHY0C60X1BTBTCG06Y.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 6b8af85641.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 0c8a3305f3.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine f96ac37a02.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine f8b402920a.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 51d17e6280.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 1efaf74ff2.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 7151625490.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 99cebb8945.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine R1VBSFOWCU46FXRS1D4KIFJ.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine e3d8370f09.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine ANEDNjf.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 35072b2673.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 0d4fd6ecc0.exe -
Loads dropped DLL 13 IoCs
pid Process 4092 NordVPNSetup.tmp 4092 NordVPNSetup.tmp 4092 NordVPNSetup.tmp 4092 NordVPNSetup.tmp 1072 regsvr32.exe 6340 7z.exe 6520 7z.exe 7124 7z.exe 6308 7z.exe 6668 7z.exe 6716 7z.exe 7164 7z.exe 6408 7z.exe -
Modifies system executable filetype association 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\RUShellExt\ = "{2C5515DC-2A7E-4BFD-B813-CACC2B685EB7}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\ContextMenuHandlers\RUShellExt regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\ContextMenuHandlers\RUShellExt\ = "{2C5515DC-2A7E-4BFD-B813-CACC2B685EB7}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\RUShellExt regsvr32.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e3d8370f09.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007364001\\e3d8370f09.exe" axplong.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\69821db333.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007366001\\69821db333.exe" axplong.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\GrpConv = "grpconv -o" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\1caef51f04.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1017384001\\1caef51f04.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\99cebb8945.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1017385001\\99cebb8945.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\c74a109d97.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1017386001\\c74a109d97.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 138 raw.githubusercontent.com 231 raw.githubusercontent.com 137 raw.githubusercontent.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 53 ip-api.com -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000300000001e762-5158.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 30 IoCs
pid Process 2636 e5b32ba4f7b2f54f95d3856220aa252c6122116e16916133d20a9f38ca9e4c7b.exe 4536 axplong.exe 4532 e3d8370f09.exe 3508 f96ac37a02.exe 1960 69821db333.exe 2588 skotes.exe 4320 skotes.exe 3724 axplong.exe 3448 f8b402920a.exe 3240 51d17e6280.exe 5060 VR6f3vF.exe 3724 ANEDNjf.exe 2460 fa26dcb24d2741e8a650f4e95e8ea499.exe 4320 axplong.exe 4032 skotes.exe 2460 fa26dcb24d2741e8a650f4e95e8ea499.exe 5672 1efaf74ff2.exe 3616 35072b2673.exe 5028 6b8af85641.exe 5684 0c8a3305f3.exe 5424 17375bbd762a4d92a51e80f42c15db49.exe 5816 7151625490.exe 5424 17375bbd762a4d92a51e80f42c15db49.exe 6036 1caef51f04.exe 4816 99cebb8945.exe 3752 axplong.exe 4232 skotes.exe 7024 J2IL0OJJ2DHY0C60X1BTBTCG06Y.exe 6056 0d4fd6ecc0.exe 6808 R1VBSFOWCU46FXRS1D4KIFJ.exe -
Suspicious use of SetThreadContext 7 IoCs
description pid Process procid_target PID 2888 set thread context of 844 2888 Cq6Id6x.exe 107 PID 4960 set thread context of 1316 4960 593e2602e0.exe 133 PID 1528 set thread context of 4824 1528 zudFSfy.exe 135 PID 820 set thread context of 5932 820 kz8ZdyP.exe 139 PID 216 set thread context of 6852 216 3b75ee8e4e.exe 144 PID 1684 set thread context of 632 1684 51c47f6e8d.exe 155 PID 5912 set thread context of 4048 5912 Intel_PTT_EK_Recertification.exe 187 -
Drops file in Program Files directory 63 IoCs
description ioc Process File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\unins000.dat NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-SM6C7.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-6SA1T.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\is-G61GN.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-GC3ER.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\is-ARN6A.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\is-F9A3O.tmp NordVPNSetup.tmp File opened for modification C:\Program Files\VS Revo Group\Revo Uninstaller Pro\RevoUninPro.exe NordVPNSetup.tmp File opened for modification C:\Program Files\VS Revo Group\Revo Uninstaller Pro\RUExt.dll NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-7PLCC.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-3L2DF.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\is-K7A70.tmp NordVPNSetup.tmp File opened for modification C:\Program Files\VS Revo Group\Revo Uninstaller Pro\ruplp.exe NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-5B3E3.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-CUTRJ.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-V7L2C.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-J28RN.tmp NordVPNSetup.tmp File opened for modification C:\Program Files\VS Revo Group\Revo Uninstaller Pro\RevoCmd.exe NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-1N13F.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-L4P5H.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-HFM7P.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-TDU1H.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-K8BRH.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-QV580.tmp NordVPNSetup.tmp File opened for modification C:\Program Files\VS Revo Group\Revo Uninstaller Pro\unins000.dat NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-JCH1P.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-FBI11.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\is-QAPG3.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-8G5GA.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-FM9SE.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-B3QC2.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-3P1OF.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-DBB2I.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-KB60U.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-8G2VT.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-TJG0N.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\is-8GEEI.tmp NordVPNSetup.tmp File opened for modification C:\Program Files\VS Revo Group\Revo Uninstaller Pro\RevoAppBar.exe NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-9DPAH.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-OG8RJ.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\is-CVO4L.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\is-RUBC5.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-2ST54.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-7CH7L.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-O04F2.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\is-C0E87.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-A42U7.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-N5I2L.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-VN3S1.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-8RGHN.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-E6RLJ.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\is-2FFPV.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-LBDR4.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-J31GF.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-KRE06.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-OLHSF.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-FCCA5.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-82183.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-NO6US.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-KCOSQ.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-RKV4Q.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-DCJFT.tmp NordVPNSetup.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-IT29I.tmp NordVPNSetup.tmp -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\axplong.job e5b32ba4f7b2f54f95d3856220aa252c6122116e16916133d20a9f38ca9e4c7b.exe File created C:\Windows\Tasks\skotes.job 69821db333.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 3064 3508 WerFault.exe 84 6352 5684 WerFault.exe 145 -
System Location Discovery: System Language Discovery 1 TTPs 56 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e3d8370f09.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6b8af85641.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0c8a3305f3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0d4fd6ecc0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language R1VBSFOWCU46FXRS1D4KIFJ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kz8ZdyP.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1cdc491584.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1caef51f04.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 99cebb8945.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ruplp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e5b32ba4f7b2f54f95d3856220aa252c6122116e16916133d20a9f38ca9e4c7b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f96ac37a02.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 51d17e6280.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ANEDNjf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 593e2602e0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 51c47f6e8d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NordVPNSetup.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fa26dcb24d2741e8a650f4e95e8ea499.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3b75ee8e4e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language J2IL0OJJ2DHY0C60X1BTBTCG06Y.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language x0qQ2DH.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language c74a109d97.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kf5cl0F.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zudFSfy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 17375bbd762a4d92a51e80f42c15db49.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ruplp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3b75ee8e4e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NordVPNSetup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VR6f3vF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 35072b2673.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cq6Id6x.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1efaf74ff2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 51c47f6e8d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9a0d5361e9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cq6Id6x.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kz8ZdyP.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7151625490.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c74a109d97.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 69821db333.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f8b402920a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zudFSfy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage c74a109d97.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 593e2602e0.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 6752 powershell.exe 6316 PING.EXE 6472 powershell.exe 6876 PING.EXE -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 runonce.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz runonce.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName x0qQ2DH.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS x0qQ2DH.exe -
Kills process with taskkill 5 IoCs
pid Process 5804 taskkill.exe 4664 taskkill.exe 3092 taskkill.exe 6540 taskkill.exe 5608 taskkill.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DD72B942-27D2-4A3C-9353-FA0441FBABA0}\TypeLib ruplp.exe Key created \REGISTRY\MACHINE\Software\Classes\RevoUninstallerPro.ruel\shell\open\command NordVPNSetup.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\ContextMenuHandlers\RUShellExt\ = "{2C5515DC-2A7E-4BFD-B813-CACC2B685EB7}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{37B86290-9C1A-453F-BFA7-CB6EC9CEC00F} ruplp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DD72B942-27D2-4A3C-9353-FA0441FBABA0}\ProgID\ = "LicProtector.LicProtectorEXE510" ruplp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\RUExt.DLL regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{58DF91C9-795D-4356-9568-7F149ED299B4} ruplp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{58DF91C9-795D-4356-9568-7F149ED299B4}\TypeLib\Version = "5.1" ruplp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{FB562550-BBE6-4298-861A-5C0A6562C272}\InfoTip = "Uninstall, Remove Programs, Clear Web Browsers Tracks, Control Automatically Started Applications" NordVPNSetup.tmp Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{FB562550-BBE6-4298-861A-5C0A6562C272}\DefaultIcon NordVPNSetup.tmp Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{FB562550-BBE6-4298-861A-5C0A6562C272}\ShellFolder\Attributes = "48" NordVPNSetup.tmp Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\.ruel NordVPNSetup.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\RUExt.DLL\AppID = "{1D928D64-60D3-4FAC-B810-C4D9D8A680CF}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2C5515DC-2A7E-4BFD-B813-CACC2B685EB7}\ = "RUShellExt Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2C5515DC-2A7E-4BFD-B813-CACC2B685EB7}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\RUShellExt regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{FB562550-BBE6-4298-861A-5C0A6562C272}\ = "Revo Uninstaller Pro" NordVPNSetup.tmp Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{FB562550-BBE6-4298-861A-5C0A6562C272}\Shell\Open\command NordVPNSetup.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\RevoUninstallerPro.ruel NordVPNSetup.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\RevoUninstallerPro.ruel\shell NordVPNSetup.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{37B86290-9C1A-453F-BFA7-CB6EC9CEC00F}\5.1\FLAGS\ = "0" ruplp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{58DF91C9-795D-4356-9568-7F149ED299B4}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" ruplp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\LicProtector.LicProtectorEXE510\Clsid ruplp.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings firefox.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{58DF91C9-795D-4356-9568-7F149ED299B4}\ = "ILicProtectorEXE510" ruplp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DD72B942-27D2-4A3C-9353-FA0441FBABA0}\Version ruplp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DD72B942-27D2-4A3C-9353-FA0441FBABA0}\TypeLib\ = "{37B86290-9C1A-453F-BFA7-CB6EC9CEC00F}" ruplp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2C5515DC-2A7E-4BFD-B813-CACC2B685EB7}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Msi.Package\shellex\ContextMenuHandlers\RUShellExt regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{37B86290-9C1A-453F-BFA7-CB6EC9CEC00F}\5.1\FLAGS ruplp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{37B86290-9C1A-453F-BFA7-CB6EC9CEC00F}\5.1\0 ruplp.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\RevoUninstallerPro.ruel\shell\open NordVPNSetup.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DD72B942-27D2-4A3C-9353-FA0441FBABA0}\ProgID ruplp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{37B86290-9C1A-453F-BFA7-CB6EC9CEC00F}\5.1\HELPDIR ruplp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{FB562550-BBE6-4298-861A-5C0A6562C272}\Shell\Open\command\ = "C:\\Program Files\\VS Revo Group\\Revo Uninstaller Pro\\RevoUninPro.exe" NordVPNSetup.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ruel\ = "RevoUninstallerPro.ruel" NordVPNSetup.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{1D928D64-60D3-4FAC-B810-C4D9D8A680CF}\ = "RUExt" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2C5515DC-2A7E-4BFD-B813-CACC2B685EB7} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{FB562550-BBE6-4298-861A-5C0A6562C272}\DefaultIcon\ = "C:\\Program Files\\VS Revo Group\\Revo Uninstaller Pro\\RevoUninPro.exe,0" NordVPNSetup.tmp Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{FB562550-BBE6-4298-861A-5C0A6562C272}\ShellFolder NordVPNSetup.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DD72B942-27D2-4A3C-9353-FA0441FBABA0} ruplp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\LicProtector.LicProtectorEXE510 ruplp.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\RevoUninstallerPro.ruel NordVPNSetup.tmp Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\RevoUninstallerPro.ruel\shell NordVPNSetup.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{58DF91C9-795D-4356-9568-7F149ED299B4}\TypeLib\ = "{37B86290-9C1A-453F-BFA7-CB6EC9CEC00F}" ruplp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\LicProtector.LicProtectorEXE510\ = "LicProtector Object" ruplp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2C5515DC-2A7E-4BFD-B813-CACC2B685EB7}\InprocServer32\ = "C:\\Program Files\\VS Revo Group\\Revo Uninstaller Pro\\RUExt.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Msi.Package\shellex\ContextMenuHandlers\RUShellExt\ = "{2C5515DC-2A7E-4BFD-B813-CACC2B685EB7}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{58DF91C9-795D-4356-9568-7F149ED299B4}\ProxyStubClsid32 ruplp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{58DF91C9-795D-4356-9568-7F149ED299B4}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" ruplp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{FB562550-BBE6-4298-861A-5C0A6562C272}\{305CA226-D286-468e-B848-2B2E8E697B74} 2 = "8" NordVPNSetup.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{FB562550-BBE6-4298-861A-5C0A6562C272} NordVPNSetup.tmp Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\RevoUninstallerPro.ruel\DefaultIcon NordVPNSetup.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\RevoUninstallerPro.ruel\shell\open\command NordVPNSetup.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{58DF91C9-795D-4356-9568-7F149ED299B4}\TypeLib ruplp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{58DF91C9-795D-4356-9568-7F149ED299B4}\TypeLib\Version = "5.1" ruplp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DD72B942-27D2-4A3C-9353-FA0441FBABA0}\LocalServer32\ = "C:\\PROGRA~1\\VSREVO~1\\REVOUN~1\\ruplp.exe" ruplp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\LicProtector.LicProtectorEXE510\Clsid\ = "{DD72B942-27D2-4A3C-9353-FA0441FBABA0}" ruplp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{FB562550-BBE6-4298-861A-5C0A6562C272}\Shell\Open NordVPNSetup.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\RevoUninstallerPro.ruel\DefaultIcon\ = "C:\\Program Files\\VS Revo Group\\Revo Uninstaller Pro\\RevoUninPro.exe,0" NordVPNSetup.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{37B86290-9C1A-453F-BFA7-CB6EC9CEC00F}\5.1\ = "LicProtector Library" ruplp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{37B86290-9C1A-453F-BFA7-CB6EC9CEC00F}\5.1\0\win32\ = "C:\\Program Files\\VS Revo Group\\Revo Uninstaller Pro\\ruplp.exe" ruplp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{58DF91C9-795D-4356-9568-7F149ED299B4} ruplp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{FB562550-BBE6-4298-861A-5C0A6562C272}\Shell NordVPNSetup.tmp -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 6316 PING.EXE 6876 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 6488 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2636 e5b32ba4f7b2f54f95d3856220aa252c6122116e16916133d20a9f38ca9e4c7b.exe 2636 e5b32ba4f7b2f54f95d3856220aa252c6122116e16916133d20a9f38ca9e4c7b.exe 4536 axplong.exe 4536 axplong.exe 4532 e3d8370f09.exe 4532 e3d8370f09.exe 3508 f96ac37a02.exe 3508 f96ac37a02.exe 3508 f96ac37a02.exe 3508 f96ac37a02.exe 3508 f96ac37a02.exe 3508 f96ac37a02.exe 3768 svchost.exe 3768 svchost.exe 3768 svchost.exe 3768 svchost.exe 1960 69821db333.exe 1960 69821db333.exe 2588 skotes.exe 2588 skotes.exe 4320 skotes.exe 4320 skotes.exe 3724 axplong.exe 3724 axplong.exe 3448 f8b402920a.exe 3448 f8b402920a.exe 3448 f8b402920a.exe 3448 f8b402920a.exe 3448 f8b402920a.exe 3448 f8b402920a.exe 3448 f8b402920a.exe 3448 f8b402920a.exe 3448 f8b402920a.exe 3448 f8b402920a.exe 448 x0qQ2DH.exe 448 x0qQ2DH.exe 448 x0qQ2DH.exe 448 x0qQ2DH.exe 448 x0qQ2DH.exe 448 x0qQ2DH.exe 448 x0qQ2DH.exe 448 x0qQ2DH.exe 448 x0qQ2DH.exe 4092 NordVPNSetup.tmp 4092 NordVPNSetup.tmp 3240 51d17e6280.exe 3240 51d17e6280.exe 5060 VR6f3vF.exe 5060 VR6f3vF.exe 4964 kf5cl0F.exe 5060 VR6f3vF.exe 5060 VR6f3vF.exe 5060 VR6f3vF.exe 5060 VR6f3vF.exe 4436 powershell.exe 4436 powershell.exe 4436 powershell.exe 3724 ANEDNjf.exe 3724 ANEDNjf.exe 4324 powershell.exe 4324 powershell.exe 4324 powershell.exe 4092 NordVPNSetup.tmp 4092 NordVPNSetup.tmp -
Suspicious use of AdjustPrivilegeToken 51 IoCs
description pid Process Token: SeDebugPrivilege 2888 Cq6Id6x.exe Token: SeDebugPrivilege 4964 kf5cl0F.exe Token: SeDebugPrivilege 4436 powershell.exe Token: SeDebugPrivilege 4324 powershell.exe Token: SeDebugPrivilege 216 3b75ee8e4e.exe Token: SeDebugPrivilege 1528 zudFSfy.exe Token: SeDebugPrivilege 4824 zudFSfy.exe Token: SeDebugPrivilege 5932 kz8ZdyP.exe Token: SeDebugPrivilege 3312 1cdc491584.exe Token: SeDebugPrivilege 5620 powershell.exe Token: SeDebugPrivilege 3516 powershell.exe Token: SeRestorePrivilege 6340 7z.exe Token: 35 6340 7z.exe Token: SeSecurityPrivilege 6340 7z.exe Token: SeSecurityPrivilege 6340 7z.exe Token: SeRestorePrivilege 6520 7z.exe Token: 35 6520 7z.exe Token: SeSecurityPrivilege 6520 7z.exe Token: SeSecurityPrivilege 6520 7z.exe Token: SeRestorePrivilege 7124 7z.exe Token: 35 7124 7z.exe Token: SeSecurityPrivilege 7124 7z.exe Token: SeSecurityPrivilege 7124 7z.exe Token: SeRestorePrivilege 6308 7z.exe Token: 35 6308 7z.exe Token: SeSecurityPrivilege 6308 7z.exe Token: SeSecurityPrivilege 6308 7z.exe Token: SeRestorePrivilege 6668 7z.exe Token: 35 6668 7z.exe Token: SeSecurityPrivilege 6668 7z.exe Token: SeSecurityPrivilege 6668 7z.exe Token: SeRestorePrivilege 6716 7z.exe Token: 35 6716 7z.exe Token: SeSecurityPrivilege 6716 7z.exe Token: SeSecurityPrivilege 6716 7z.exe Token: SeRestorePrivilege 7164 7z.exe Token: 35 7164 7z.exe Token: SeSecurityPrivilege 7164 7z.exe Token: SeSecurityPrivilege 7164 7z.exe Token: SeRestorePrivilege 6408 7z.exe Token: 35 6408 7z.exe Token: SeSecurityPrivilege 6408 7z.exe Token: SeSecurityPrivilege 6408 7z.exe Token: SeDebugPrivilege 6752 powershell.exe Token: SeLockMemoryPrivilege 4048 explorer.exe Token: SeDebugPrivilege 6540 taskkill.exe Token: SeDebugPrivilege 6472 powershell.exe Token: SeDebugPrivilege 5608 taskkill.exe Token: SeDebugPrivilege 5804 taskkill.exe Token: SeDebugPrivilege 4664 taskkill.exe Token: SeDebugPrivilege 3092 taskkill.exe -
Suspicious use of FindShellTrayWindow 31 IoCs
pid Process 2636 e5b32ba4f7b2f54f95d3856220aa252c6122116e16916133d20a9f38ca9e4c7b.exe 4092 NordVPNSetup.tmp 5692 c74a109d97.exe 5692 c74a109d97.exe 5692 c74a109d97.exe 5692 c74a109d97.exe 5692 c74a109d97.exe 5692 c74a109d97.exe 5692 c74a109d97.exe 5692 c74a109d97.exe 6196 firefox.exe 6196 firefox.exe 6196 firefox.exe 6196 firefox.exe 6196 firefox.exe 6196 firefox.exe 6196 firefox.exe 6196 firefox.exe 6196 firefox.exe 6196 firefox.exe 6196 firefox.exe 6196 firefox.exe 6196 firefox.exe 6196 firefox.exe 6196 firefox.exe 6196 firefox.exe 6196 firefox.exe 6196 firefox.exe 6196 firefox.exe 6196 firefox.exe 6196 firefox.exe -
Suspicious use of SendNotifyMessage 28 IoCs
pid Process 5692 c74a109d97.exe 5692 c74a109d97.exe 5692 c74a109d97.exe 5692 c74a109d97.exe 5692 c74a109d97.exe 5692 c74a109d97.exe 5692 c74a109d97.exe 5692 c74a109d97.exe 6196 firefox.exe 6196 firefox.exe 6196 firefox.exe 6196 firefox.exe 6196 firefox.exe 6196 firefox.exe 6196 firefox.exe 6196 firefox.exe 6196 firefox.exe 6196 firefox.exe 6196 firefox.exe 6196 firefox.exe 6196 firefox.exe 6196 firefox.exe 6196 firefox.exe 6196 firefox.exe 6196 firefox.exe 6196 firefox.exe 6196 firefox.exe 6196 firefox.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 2460 fa26dcb24d2741e8a650f4e95e8ea499.exe 3688 RevoUninPro.exe 3688 RevoUninPro.exe 4280 RevoUninPro.exe 4280 RevoUninPro.exe 4280 RevoUninPro.exe 4280 RevoUninPro.exe 5424 17375bbd762a4d92a51e80f42c15db49.exe 6196 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2636 wrote to memory of 4536 2636 e5b32ba4f7b2f54f95d3856220aa252c6122116e16916133d20a9f38ca9e4c7b.exe 82 PID 2636 wrote to memory of 4536 2636 e5b32ba4f7b2f54f95d3856220aa252c6122116e16916133d20a9f38ca9e4c7b.exe 82 PID 2636 wrote to memory of 4536 2636 e5b32ba4f7b2f54f95d3856220aa252c6122116e16916133d20a9f38ca9e4c7b.exe 82 PID 4536 wrote to memory of 4532 4536 axplong.exe 83 PID 4536 wrote to memory of 4532 4536 axplong.exe 83 PID 4536 wrote to memory of 4532 4536 axplong.exe 83 PID 4536 wrote to memory of 3508 4536 axplong.exe 84 PID 4536 wrote to memory of 3508 4536 axplong.exe 84 PID 4536 wrote to memory of 3508 4536 axplong.exe 84 PID 3508 wrote to memory of 3768 3508 f96ac37a02.exe 88 PID 3508 wrote to memory of 3768 3508 f96ac37a02.exe 88 PID 3508 wrote to memory of 3768 3508 f96ac37a02.exe 88 PID 3508 wrote to memory of 3768 3508 f96ac37a02.exe 88 PID 3508 wrote to memory of 3768 3508 f96ac37a02.exe 88 PID 4536 wrote to memory of 1960 4536 axplong.exe 93 PID 4536 wrote to memory of 1960 4536 axplong.exe 93 PID 4536 wrote to memory of 1960 4536 axplong.exe 93 PID 1960 wrote to memory of 2588 1960 69821db333.exe 95 PID 1960 wrote to memory of 2588 1960 69821db333.exe 95 PID 1960 wrote to memory of 2588 1960 69821db333.exe 95 PID 4536 wrote to memory of 3448 4536 axplong.exe 100 PID 4536 wrote to memory of 3448 4536 axplong.exe 100 PID 4536 wrote to memory of 3448 4536 axplong.exe 100 PID 2588 wrote to memory of 2888 2588 skotes.exe 101 PID 2588 wrote to memory of 2888 2588 skotes.exe 101 PID 2588 wrote to memory of 2888 2588 skotes.exe 101 PID 2588 wrote to memory of 448 2588 skotes.exe 104 PID 2588 wrote to memory of 448 2588 skotes.exe 104 PID 2588 wrote to memory of 448 2588 skotes.exe 104 PID 448 wrote to memory of 2392 448 x0qQ2DH.exe 105 PID 448 wrote to memory of 2392 448 x0qQ2DH.exe 105 PID 448 wrote to memory of 2392 448 x0qQ2DH.exe 105 PID 2392 wrote to memory of 4092 2392 NordVPNSetup.exe 106 PID 2392 wrote to memory of 4092 2392 NordVPNSetup.exe 106 PID 2392 wrote to memory of 4092 2392 NordVPNSetup.exe 106 PID 2888 wrote to memory of 844 2888 Cq6Id6x.exe 107 PID 2888 wrote to memory of 844 2888 Cq6Id6x.exe 107 PID 2888 wrote to memory of 844 2888 Cq6Id6x.exe 107 PID 2588 wrote to memory of 3240 2588 skotes.exe 108 PID 2588 wrote to memory of 3240 2588 skotes.exe 108 PID 2588 wrote to memory of 3240 2588 skotes.exe 108 PID 2888 wrote to memory of 844 2888 Cq6Id6x.exe 107 PID 2888 wrote to memory of 844 2888 Cq6Id6x.exe 107 PID 2888 wrote to memory of 844 2888 Cq6Id6x.exe 107 PID 2888 wrote to memory of 844 2888 Cq6Id6x.exe 107 PID 2888 wrote to memory of 844 2888 Cq6Id6x.exe 107 PID 2888 wrote to memory of 844 2888 Cq6Id6x.exe 107 PID 2588 wrote to memory of 5060 2588 skotes.exe 109 PID 2588 wrote to memory of 5060 2588 skotes.exe 109 PID 2588 wrote to memory of 5060 2588 skotes.exe 109 PID 2588 wrote to memory of 4964 2588 skotes.exe 110 PID 2588 wrote to memory of 4964 2588 skotes.exe 110 PID 2588 wrote to memory of 4964 2588 skotes.exe 110 PID 4964 wrote to memory of 4436 4964 kf5cl0F.exe 112 PID 4964 wrote to memory of 4436 4964 kf5cl0F.exe 112 PID 4964 wrote to memory of 4436 4964 kf5cl0F.exe 112 PID 2588 wrote to memory of 3724 2588 skotes.exe 114 PID 2588 wrote to memory of 3724 2588 skotes.exe 114 PID 2588 wrote to memory of 3724 2588 skotes.exe 114 PID 4964 wrote to memory of 4324 4964 kf5cl0F.exe 115 PID 4964 wrote to memory of 4324 4964 kf5cl0F.exe 115 PID 4964 wrote to memory of 4324 4964 kf5cl0F.exe 115 PID 2588 wrote to memory of 1528 2588 skotes.exe 117 PID 2588 wrote to memory of 1528 2588 skotes.exe 117 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 3 IoCs
pid Process 1868 attrib.exe 5452 attrib.exe 5524 attrib.exe
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2528
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\System32\svchost.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3768
-
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\System32\svchost.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4944
-
-
C:\Users\Admin\AppData\Local\Temp\e5b32ba4f7b2f54f95d3856220aa252c6122116e16916133d20a9f38ca9e4c7b.exe"C:\Users\Admin\AppData\Local\Temp\e5b32ba4f7b2f54f95d3856220aa252c6122116e16916133d20a9f38ca9e4c7b.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Users\Admin\AppData\Local\Temp\1007364001\e3d8370f09.exe"C:\Users\Admin\AppData\Local\Temp\1007364001\e3d8370f09.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4532
-
-
C:\Users\Admin\AppData\Local\Temp\1007365001\f96ac37a02.exe"C:\Users\Admin\AppData\Local\Temp\1007365001\f96ac37a02.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3508 -s 5684⤵
- Program crash
PID:3064
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007366001\69821db333.exe"C:\Users\Admin\AppData\Local\Temp\1007366001\69821db333.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\1016920001\Cq6Id6x.exe"C:\Users\Admin\AppData\Local\Temp\1016920001\Cq6Id6x.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\1016920001\Cq6Id6x.exe"C:\Users\Admin\AppData\Local\Temp\1016920001\Cq6Id6x.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:844
-
-
-
C:\Users\Admin\AppData\Local\Temp\1016945001\x0qQ2DH.exe"C:\Users\Admin\AppData\Local\Temp\1016945001\x0qQ2DH.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Users\Admin\AppData\Local\Temp\NordVPNSetup.exe"C:\Users\Admin\AppData\Local\Temp\NordVPNSetup.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\is-I1UFF.tmp\NordVPNSetup.tmp"C:\Users\Admin\AppData\Local\Temp\is-I1UFF.tmp\NordVPNSetup.tmp" /SL5="$D0044,15409387,73728,C:\Users\Admin\AppData\Local\Temp\NordVPNSetup.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:4092 -
C:\Windows\system32\rundll32.exe"rundll32.exe " SETUPAPI.DLL,InstallHinfSection DefaultInstall 132 C:\Program Files\VS Revo Group\Revo Uninstaller Pro\revoflt.inf8⤵
- Drops file in Drivers directory
- Adds Run key to start application
PID:4280 -
C:\Windows\system32\runonce.exe"C:\Windows\system32\runonce.exe" -r9⤵
- Checks processor information in registry
PID:4876 -
C:\Windows\System32\grpconv.exe"C:\Windows\System32\grpconv.exe" -o10⤵PID:4404
-
-
-
-
C:\Windows\system32\regsvr32.exe"regsvr32" "C:\Program Files\VS Revo Group\Revo Uninstaller Pro\RUExt.dll" /s8⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Modifies registry class
PID:1072
-
-
C:\Program Files\VS Revo Group\Revo Uninstaller Pro\ruplp.exe"C:\Program Files\VS Revo Group\Revo Uninstaller Pro\ruplp.exe" /regserver /NOREDIRECT8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2944
-
-
C:\Program Files\VS Revo Group\Revo Uninstaller Pro\RevoUninPro.exe"C:\Program Files\VS Revo Group\Revo Uninstaller Pro\RevoUninPro.exe" /bc8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3688
-
-
C:\Program Files\VS Revo Group\Revo Uninstaller Pro\RevoUninPro.exe"C:\Program Files\VS Revo Group\Revo Uninstaller Pro\RevoUninPro.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4280
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1016974001\51d17e6280.exe"C:\Users\Admin\AppData\Local\Temp\1016974001\51d17e6280.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3240
-
-
C:\Users\Admin\AppData\Local\Temp\1017019001\VR6f3vF.exe"C:\Users\Admin\AppData\Local\Temp\1017019001\VR6f3vF.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5060
-
-
C:\Users\Admin\AppData\Local\Temp\1017024001\kf5cl0F.exe"C:\Users\Admin\AppData\Local\Temp\1017024001\kf5cl0F.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath "C:\mqpukgyy"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4436
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4324
-
-
C:\mqpukgyy\fa26dcb24d2741e8a650f4e95e8ea499.exe"C:\mqpukgyy\fa26dcb24d2741e8a650f4e95e8ea499.exe"6⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2460
-
-
-
C:\Users\Admin\AppData\Local\Temp\1017027001\ANEDNjf.exe"C:\Users\Admin\AppData\Local\Temp\1017027001\ANEDNjf.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3724
-
-
C:\Users\Admin\AppData\Local\Temp\1017319001\zudFSfy.exe"C:\Users\Admin\AppData\Local\Temp\1017319001\zudFSfy.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\1017319001\zudFSfy.exe"C:\Users\Admin\AppData\Local\Temp\1017319001\zudFSfy.exe"6⤵
- Executes dropped EXE
PID:4068
-
-
C:\Users\Admin\AppData\Local\Temp\1017319001\zudFSfy.exe"C:\Users\Admin\AppData\Local\Temp\1017319001\zudFSfy.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4824
-
-
-
C:\Users\Admin\AppData\Local\Temp\1017321001\kz8ZdyP.exe"C:\Users\Admin\AppData\Local\Temp\1017321001\kz8ZdyP.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:820 -
C:\Users\Admin\AppData\Local\Temp\1017321001\kz8ZdyP.exe"C:\Users\Admin\AppData\Local\Temp\1017321001\kz8ZdyP.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5932
-
-
-
C:\Users\Admin\AppData\Local\Temp\1017374001\3b75ee8e4e.exe"C:\Users\Admin\AppData\Local\Temp\1017374001\3b75ee8e4e.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:216 -
C:\Users\Admin\AppData\Local\Temp\1017374001\3b75ee8e4e.exe"C:\Users\Admin\AppData\Local\Temp\1017374001\3b75ee8e4e.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6852
-
-
-
C:\Users\Admin\AppData\Local\Temp\1017375001\593e2602e0.exe"C:\Users\Admin\AppData\Local\Temp\1017375001\593e2602e0.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\1017375001\593e2602e0.exe"C:\Users\Admin\AppData\Local\Temp\1017375001\593e2602e0.exe"6⤵
- Executes dropped EXE
PID:3700
-
-
C:\Users\Admin\AppData\Local\Temp\1017375001\593e2602e0.exe"C:\Users\Admin\AppData\Local\Temp\1017375001\593e2602e0.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1316
-
-
-
C:\Users\Admin\AppData\Local\Temp\1017376001\1efaf74ff2.exe"C:\Users\Admin\AppData\Local\Temp\1017376001\1efaf74ff2.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5672
-
-
C:\Users\Admin\AppData\Local\Temp\1017377001\35072b2673.exe"C:\Users\Admin\AppData\Local\Temp\1017377001\35072b2673.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3616
-
-
C:\Users\Admin\AppData\Local\Temp\1017378001\6b8af85641.exe"C:\Users\Admin\AppData\Local\Temp\1017378001\6b8af85641.exe"5⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5028
-
-
C:\Users\Admin\AppData\Local\Temp\1017379001\1cdc491584.exe"C:\Users\Admin\AppData\Local\Temp\1017379001\1cdc491584.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3312 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath "C:\dnhhgdr"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5620
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3516
-
-
C:\dnhhgdr\17375bbd762a4d92a51e80f42c15db49.exe"C:\dnhhgdr\17375bbd762a4d92a51e80f42c15db49.exe"6⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5424
-
-
-
C:\Users\Admin\AppData\Local\Temp\1017380001\0c8a3305f3.exe"C:\Users\Admin\AppData\Local\Temp\1017380001\0c8a3305f3.exe"5⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5684 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5684 -s 5686⤵
- Program crash
PID:6352
-
-
-
C:\Users\Admin\AppData\Local\Temp\1017381001\51c47f6e8d.exe"C:\Users\Admin\AppData\Local\Temp\1017381001\51c47f6e8d.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\1017381001\51c47f6e8d.exe"C:\Users\Admin\AppData\Local\Temp\1017381001\51c47f6e8d.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:632
-
-
-
C:\Users\Admin\AppData\Local\Temp\1017382001\7151625490.exe"C:\Users\Admin\AppData\Local\Temp\1017382001\7151625490.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5816
-
-
C:\Users\Admin\AppData\Local\Temp\1017383001\9a0d5361e9.exe"C:\Users\Admin\AppData\Local\Temp\1017383001\9a0d5361e9.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3760 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"6⤵PID:5308
-
C:\Windows\system32\mode.commode 65,107⤵PID:4700
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e file.zip -p24291711423417250691697322505 -oextracted7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:6340
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_7.zip -oextracted7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:6520
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_6.zip -oextracted7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:7124
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_5.zip -oextracted7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:6308
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_4.zip -oextracted7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:6668
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_3.zip -oextracted7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:6716
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_2.zip -oextracted7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:7164
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_1.zip -oextracted7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:6408
-
-
C:\Windows\system32\attrib.exeattrib +H "in.exe"7⤵
- Views/modifies file attributes
PID:1868
-
-
C:\Users\Admin\AppData\Local\Temp\main\in.exe"in.exe"7⤵
- Executes dropped EXE
PID:6048 -
C:\Windows\SYSTEM32\attrib.exeattrib +H +S C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe8⤵
- Views/modifies file attributes
PID:5452
-
-
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe8⤵
- Views/modifies file attributes
PID:5524
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /f /CREATE /TN "Intel_PTT_EK_Recertification" /TR "C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe" /SC MINUTE8⤵
- Scheduled Task/Job: Scheduled Task
PID:6488
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell ping 127.0.0.1; del in.exe8⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of AdjustPrivilegeToken
PID:6752 -
C:\Windows\system32\PING.EXE"C:\Windows\system32\PING.EXE" 127.0.0.19⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:6316
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1017384001\1caef51f04.exe"C:\Users\Admin\AppData\Local\Temp\1017384001\1caef51f04.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:6036 -
C:\Users\Admin\AppData\Local\Temp\J2IL0OJJ2DHY0C60X1BTBTCG06Y.exe"C:\Users\Admin\AppData\Local\Temp\J2IL0OJJ2DHY0C60X1BTBTCG06Y.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:7024
-
-
C:\Users\Admin\AppData\Local\Temp\R1VBSFOWCU46FXRS1D4KIFJ.exe"C:\Users\Admin\AppData\Local\Temp\R1VBSFOWCU46FXRS1D4KIFJ.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:6808
-
-
-
C:\Users\Admin\AppData\Local\Temp\1017385001\99cebb8945.exe"C:\Users\Admin\AppData\Local\Temp\1017385001\99cebb8945.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:4816
-
-
C:\Users\Admin\AppData\Local\Temp\1017386001\c74a109d97.exe"C:\Users\Admin\AppData\Local\Temp\1017386001\c74a109d97.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5692 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6540
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5608
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5804
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4664
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3092
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking6⤵PID:644
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking7⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:6196 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1976 -parentBuildID 20240401114208 -prefsHandle 1892 -prefMapHandle 1884 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {93cebf48-efe7-41bf-abc4-8e37318cc0e6} 6196 "\\.\pipe\gecko-crash-server-pipe.6196" gpu8⤵PID:2664
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2436 -parentBuildID 20240401114208 -prefsHandle 2428 -prefMapHandle 2416 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {878bf957-dba1-4fb1-9de6-02b587999b32} 6196 "\\.\pipe\gecko-crash-server-pipe.6196" socket8⤵PID:5872
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2960 -childID 1 -isForBrowser -prefsHandle 2952 -prefMapHandle 2676 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1216 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {59de6977-9617-4e84-893d-47d6ffdfe4e3} 6196 "\\.\pipe\gecko-crash-server-pipe.6196" tab8⤵PID:4532
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4180 -childID 2 -isForBrowser -prefsHandle 4200 -prefMapHandle 4196 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1216 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {dab604e5-2199-433a-8f79-eef3b11d6f3c} 6196 "\\.\pipe\gecko-crash-server-pipe.6196" tab8⤵PID:4700
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4876 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4856 -prefMapHandle 4552 -prefsLen 33301 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0836dfb8-11c3-4ca1-8376-6048c08b3d26} 6196 "\\.\pipe\gecko-crash-server-pipe.6196" utility8⤵PID:1268
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5244 -childID 3 -isForBrowser -prefsHandle 5240 -prefMapHandle 5160 -prefsLen 27097 -prefMapSize 244658 -jsInitHandle 1216 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ce39d6eb-0f1c-4210-b214-20161d67621c} 6196 "\\.\pipe\gecko-crash-server-pipe.6196" tab8⤵PID:6820
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5376 -childID 4 -isForBrowser -prefsHandle 5384 -prefMapHandle 5388 -prefsLen 27097 -prefMapSize 244658 -jsInitHandle 1216 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8ab36475-e4b2-47c4-9cb5-bbe35f8a996c} 6196 "\\.\pipe\gecko-crash-server-pipe.6196" tab8⤵PID:6460
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5580 -childID 5 -isForBrowser -prefsHandle 5660 -prefMapHandle 5656 -prefsLen 27097 -prefMapSize 244658 -jsInitHandle 1216 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {419a12df-2155-4d6f-940f-8ecee748b3a3} 6196 "\\.\pipe\gecko-crash-server-pipe.6196" tab8⤵PID:6572
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1017387001\0d4fd6ecc0.exe"C:\Users\Admin\AppData\Local\Temp\1017387001\0d4fd6ecc0.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:6056
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007367001\f8b402920a.exe"C:\Users\Admin\AppData\Local\Temp\1007367001\f8b402920a.exe"3⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3448
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3508 -ip 35081⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4320
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3724
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4320
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4032
-
C:\PROGRA~1\VSREVO~1\REVOUN~1\ruplp.exeC:\PROGRA~1\VSREVO~1\REVOUN~1\ruplp.exe -Embedding1⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2484
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 5684 -ip 56841⤵PID:5184
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4232
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3752
-
C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exeC:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5912 -
C:\Windows\explorer.exeexplorer.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4048
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell ping 127.1.10.1; del Intel_PTT_EK_Recertification.exe2⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of AdjustPrivilegeToken
PID:6472 -
C:\Windows\system32\PING.EXE"C:\Windows\system32\PING.EXE" 127.1.10.13⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:6876
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
2Change Default File Association
1Component Object Model Hijacking
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
2Change Default File Association
1Component Object Model Hijacking
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Virtualization/Sandbox Evasion
3Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
4Credentials In Files
4Discovery
Browser Information Discovery
1Query Registry
9Remote System Discovery
1System Information Discovery
5System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
187KB
MD58b9964e06195fd375d126b424e236f03
SHA16f1741cfeb9fb70c34857dbba3e063c88c3c32fa
SHA256bda04b693bfdea86a7a3b47f2e4ceae9cd9475c4e81b0aa73b70fd244a65f70f
SHA512741019523b4c5f4ef9a7952172309b2d304a84cbd98fff99a719105cc1938157edb1691554a21b9dcd2b523c0f1ab0d37879deefc3b2fa5579c0d8c76cade483
-
Filesize
24.2MB
MD5c8c368988a2a4c2a953b7db4bca47961
SHA15acc29b51284146a9ff7b1587c3d89416e66acdf
SHA256f680e0fe00a48f6e3d079c1572682d6664f476b119745d73cb852baba58cc683
SHA5125fdef1f4e3b471910fe2b12f6f6aa8bfad3f2a9c80954843085c79139823a88e0c7d921b7c01dda56871800afc20de4739682c02e9fa6a94715c64207a671b30
-
Filesize
123KB
MD500d7babcb1fca39669a305acc4e6bc4e
SHA1caa71de90128acf6e8d812e02aa8ba4622bf8454
SHA256f0f1890de8a60f87297d6de21146977060a3b5d82e09523bced0c238e94f5d2e
SHA5129f1348f6ee7325b7d3381865bda4d71807da45c941c3b40c7671df04a6558832dfd03f25f5664250b43b641117d7d3d7c71f7e81b747cbc559fc5b8169033f66
-
Filesize
132KB
MD50a56b7e703bd3ed03ebaff0d1ce37be1
SHA11629651f20c63bad9b92f7a21f66a095f7ab8fc1
SHA256b7727c9c2cedcef3808b677814640e3e4b486517bf66f512c543ef8d0b3a0a21
SHA5129dcae642eb17514e87c7798881f501bba75d39f6addfb08f795caa6ad229bade02a16b29a54e718d608778cfbae69ea8f864e61e6908bbc7598b09aaa6ce64e1
-
Filesize
2KB
MD5edc78deb34de240c787b1011161e9a4e
SHA12d31275530dce33d3bc329991c8ad59e1b303577
SHA25669569b4b111035cd35186da239d8241cf96350f6bb296210368ebc570fa2162b
SHA512e55eefcc39b7353ef11a778910400c5c85cab9657bb350840988cbbf556dc343a9c1803442643c9255c149f8d93a5c2d2e6c3bea244f67c895e635eaec0a0f7b
-
Filesize
9.6MB
MD5216b49b7eb7be44d7ed7367f3725285f
SHA1cf0776ecbc163c738fd43767bedcc2a67acef423
SHA256c6d97857b3b9f26c8e93d7b6e6481f93a16db75cbf9d1756cb29fba0fd9e240e
SHA512060fb76d91bee1b421f133cae17726a68adc97ddce76a67196d10e735e216d032bee939c905b847c50f29e859dca43cdf1b19e4ae349e00efe88147224d665cb
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD58f5625a734fde505594d03785e67b095
SHA159fc39d504b4b21790374baa5b49c4dd5aadd036
SHA2567792396ad5bd0b9a67a8c4286d5f176ed55bdb2ed8d421164c647432c63f24d9
SHA512f992488ec76d462e35adb2f3538576845640249047f60321f3d648e206cecc5222e1353030a0579e5a820c79823d53b08d94cf2d2e8f1d243ee4fcebb50da415
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\85mw8mk9.default-release\activity-stream.discovery_stream.json
Filesize26KB
MD57fe65429777ce3d4c6dc0cb7e06a7891
SHA11c94298240106e9d99e221ef9401f01ad21fe4bc
SHA25605a32778d106f56226db97e8204868a68a1d2383790cfb955e75c21927b11bfe
SHA512f42c66433bc0b4e83330ad6983af13b1bc03ce72c1870e7a0be70263ef026e4e589d1e14e0a2acde8801c23df50d566658e8659d499f39db10b1673401241c92
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\85mw8mk9.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
2.8MB
MD537bc9fc38023802a67c6b8902a8bd890
SHA1a31726802dece6ee4d91dec9eab23b057bd00efe
SHA256708e04b3f2d37c3cb32b2f88962676ba939525b124a757236ea3174b5b2eee74
SHA5126443fe14f8e0b75d124c5fd070870bced30f339e4718c7ec2fa875284ef7e0d46945ba17a32517b13f4e814a33cdafeabcd114b579311c20e4b374243bf2fdc5
-
Filesize
1.9MB
MD5c29eb2d3c39a0a808f1910e0e222ac94
SHA17270457cd535c48825b4328b9124985e7bf95be1
SHA2560f5afd165ede6d66b0a86c84b534afcf9ac51c46b43c023f632aa0bf4f087819
SHA5124affdc6c38038f269a51144bb22ee844918ac708e85f1c152911b0d5b82241cde79f26fd366127a0cd7cc96ecb9ac88a8b0d90677162b6f5d5e87d68b666f118
-
Filesize
2.8MB
MD58d64f1d7ace873c2aa994c6b8ded6ae7
SHA1b1fcba92c6a6180211b8e3dcd54acf041cd0fc44
SHA2564355db0995121456108e7d7630b8400f8fa6546576cdfdde15fb2a69fa616044
SHA5121e9913350667af65e81798187d81164d2057a910982d3fce42bde56b41c19a1c83fb6951778a04ccb670e6c73370a52867ef6321784fc0b67bff78061e8707ab
-
Filesize
4.3MB
MD58cd346fc831e7d59ebab0de045018b84
SHA165ecbe74b5e512c9b00dbb0d041ac1f812f3cbb5
SHA256ca2b0a34c077e6e81cde2626da1aca4de3f52190747d4f66636a0a8397e158c5
SHA5126708a808b9300845e5852f25a380abf1ce807d96695256793c7a80ebc08307f21a6ba38bc0d73c2897c46ad2828f80717ad2f79c585c658324c7b887bf797912
-
Filesize
3.1MB
MD5f9b9f98592292b5cbf59c7a60e9ebaee
SHA159cc872fd0a11b259cc5b70893f35e9b5a7c8cbb
SHA2565688e9e0becc622c573af2a1af4ee0676ef3907e38a9258a7801b46b7ad64665
SHA512f27e4a96173aeb064f47d44ff445b1e15f6d4f39a4ad711c019bb29692caea56eb910970d22bc13ac5c57a256d71e77b12aa60c8405335a239781c57cb0eaf8e
-
Filesize
17.6MB
MD53c224e3fc892719dc1e302378e533579
SHA10a65062e1426a95bfeca355398b6fdc4912fb6b1
SHA25664cc7f7906fe1ebf0b6977892abd9aa36f5e525cb241964c3986ee9e1a18312d
SHA512554a26e9654eccce831e4adcee49d5e2507956935e562b134a86f332d867debfcd1f64fdb88fccb2e1eee810975d565dbc6ea1376516817ee38765e4bd733a49
-
Filesize
2.9MB
MD5c3ee35c8b65f7b15a8941b2dee05835e
SHA162a6c389a94fff3eb70a308b29aa7ca8444dfcc2
SHA2567799197bff28707544d1c92e81250479de08e605210d39ec4b395a89e9489ccb
SHA512cce2363ac083c3929839a430e0219c28da3b2d805edbb059e5c40a00ed659b9337635dadc9db86acc86993945533c4661fcaf637a22ab349306d69221b0d8789
-
Filesize
1.8MB
MD5ff279f4e5b1c6fbda804d2437c2dbdc8
SHA12feb3762c877a5ae3ca60eeebc37003ad0844245
SHA256e115298ab160da9c7a998e4ae0b72333f64b207da165134ca45eb997a000d378
SHA512c7a8bbcb122b2c7b57c8b678c5eed075ee5e7c355afbf86238282d2d3458019da1a8523520e1a1c631cd01b555f7df340545fd1e44ad678dc97c40b23428f967
-
Filesize
21KB
MD514becdf1e2402e9aa6c2be0e6167041e
SHA172cbbae6878f5e06060a0038b25ede93b445f0df
SHA2567a769963165063758f15f6e0cece25c9d13072f67fa0d3c25a03a5104fe0783a
SHA51216b837615505f352e134afd9d8655c9cabfa5bfcfbee2c0c34f2d7d9588aa71f875e4e5feb8cdf0f7bacc00f7c1ca8dabd3b3d92afc99abf705c05c78e298b4a
-
Filesize
1.8MB
MD525fb9c54265bbacc7a055174479f0b70
SHA14af069a2ec874703a7e29023d23a1ada491b584e
SHA256552f8be2c6b2208a89c728f68488930c661b3a06c35a20d133ef7d3c63a86b9c
SHA5127dfd9e0f3fa2d68a6ce8c952e3b755559db73bb7a06c95ad6ed8ac16dedb49be8b8337afc07c9c682f0c4be9db291a551286353e2e2b624223487dc1c8b54668
-
Filesize
1.1MB
MD5ef08a45833a7d881c90ded1952f96cb4
SHA1f04aeeb63a1409bd916558d2c40fab8a5ed8168b
SHA25633c236dc81af2a47d595731d6fa47269b2874b281152530fdffdda9cbeb3b501
SHA51274e84f710c90121527f06d453e9286910f2e8b6ac09d2aeb4ab1f0ead23ea9b410c5d1074d8bc759bc3e766b5bc77d156756c7df093ba94093107393290ced97
-
Filesize
1.1MB
MD568c0e4eefd4c6a76cff542ef57a49ca2
SHA18aa521628b89f3ce539269229834da2a87060e76
SHA2564e417fd6cce7dbff53412a820f4813d01da0e7f20e7615220aaa1372cc59db83
SHA512d722432cdf836269ed3a6e181dd02c6e49d719ca9d84aa5582447d480f43ccc0f79f2d9a9191171d21ec2ea3306a97c60a0aff6707fa3ca9e81e957bf8aad283
-
Filesize
3.1MB
MD5c00a67d527ef38dc6f49d0ad7f13b393
SHA17b8f2de130ab5e4e59c3c2f4a071bda831ac219d
SHA25612226ccae8c807641241ba5178d853aad38984eefb0c0c4d65abc4da3f9787c3
SHA5129286d267b167cba01e55e68c8c5582f903bed0dd8bc4135eb528ef6814e60e7d4dda2b3611e13efb56aa993635fbab218b0885daf5daea6043061d8384af40ca
-
Filesize
758KB
MD5afd936e441bf5cbdb858e96833cc6ed3
SHA13491edd8c7caf9ae169e21fb58bccd29d95aefef
SHA256c6491d7a6d70c7c51baca7436464667b4894e4989fa7c5e05068dde4699e1cbf
SHA512928c15a1eda602b2a66a53734f3f563ab9626882104e30ee2bf5106cfd6e08ec54f96e3063f1ab89bf13be2c8822a8419f5d8ee0a3583a4c479785226051a325
-
Filesize
4.2MB
MD5899d588f2750275f89657f3331e56c5d
SHA190282eec54f7d4068114d5e4a5ac42957d1babff
SHA25646b7885c9b1863d30a35105d3284c460bda9904f0deaa2705371927c4a3084bf
SHA51201e169a484f198aece35fe242abe1c750cd5075885c49eca561ee63db7a9edc00a902795c124d377d67e627f56535da90ebe5cc3bf9d1d2f3483424fe3ec2acf
-
Filesize
747KB
MD58a9cb17c0224a01bd34b46495983c50a
SHA100296ea6a56f6e10a0f1450a20c5fb329b8856c1
SHA2563d51b9523b387859bc0d94246dfb216cfa82f9d650c8d11be11ed67f70e7440b
SHA5121472e4670f469c43227b965984ecc223a526f6284363d8e08a3b5b55e602ccce62df4bc49939ee5bd7df7b0c26e20da896b084eccab767f8728e6bf14d71c840
-
Filesize
4.2MB
MD53a425626cbd40345f5b8dddd6b2b9efa
SHA17b50e108e293e54c15dce816552356f424eea97a
SHA256ba9212d2d5cd6df5eb7933fb37c1b72a648974c1730bf5c32439987558f8e8b1
SHA512a7538c6b7e17c35f053721308b8d6dc53a90e79930ff4ed5cffecaa97f4d0fbc5f9e8b59f1383d8f0699c8d4f1331f226af71d40325022d10b885606a72fe668
-
Filesize
1.8MB
MD575a3f7dd4f1946ba3b6908c11fc97b60
SHA10ca7014bffadc5f05553366c0407540cabbf940c
SHA2561a0c403a7f94e7e1592cd2568b66f9dd23efa77b7dd8b783200d226a8d0c0e10
SHA512f4bb1713c33c78bbc7e9a4b9173e1327adc325b3da7ebdcdcf05b192f93c68c493b2fbb8ba5f8a78430261afc915461a40dfe2ce90a70904193643157a8109f4
-
Filesize
950KB
MD5945996569823aeef595820a5fb2e6990
SHA19ecabc7eba594b4e53b5e9469f2ea0ce104d30b0
SHA2563c7f4833371953bed399f88946ce57a08cf2615425983df595bcbcec1dc1f5db
SHA5128d0fe62b284de59d5414a9943ad97a5a32adf44847e4eb48882783dc52c1e48ccf51654981529d17e41cb45bb8f1c81d2f8bfa29dfc3b070f487b5cb41cf4d92
-
Filesize
1.7MB
MD52d0d6335887bc79a41c06f85a76e0011
SHA168c7848a94ede332ce9b8fc01d79e6e2f9e9c5da
SHA256e29954c79b53a37b023e3474653eebf343493976e920cb8adecda16027fbdbc5
SHA51230e265316867df8da75088e3d933d61e513ce2754a1da2565dea7791dd0b349b70c6e16b3331940bc0277369a1db303794101cc7cbbfd4cbc2ca8d916407921b
-
Filesize
2.9MB
MD50f299dff09ef0812a445f45f955ce8b2
SHA108479f8270aefa0c901f42131a8c805577689de1
SHA256e5b32ba4f7b2f54f95d3856220aa252c6122116e16916133d20a9f38ca9e4c7b
SHA5122539b8d7516e5230e70aa20dcac3d712b38c6d7a13b923ae88ad8c52b20e70ae715f8f64232c4153486d943569eba6a2abff5e3ce6c21b25b3c5852544ebda04
-
Filesize
15.0MB
MD500fad648745710b9c4d16c4830416d80
SHA1fafb219fe26e065cc11d4c12a4960447509b2a84
SHA256e4561ffd0993938234d207ce56d5fe775c4ddb704f7be63003026d43eae0a337
SHA51221e7b3965d1f54eb671b46e272161a426dd8a4151208b154c7fbf144725c38d593d513fb6f77cd1cef4df651266fc235a76023102b5fdc85cc8cc67da6ded847
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
22KB
MD5ab35386487b343e3e82dbd2671ff9dab
SHA103591d07aea3309b631a7d3a6e20a92653e199b8
SHA256c3729545522fcff70db61046c0efd962df047d40e3b5ccd2272866540fc872b2
SHA512b67d7384c769b2b1fdd3363fc3b47d300c2ea4d37334acfd774cf29169c0a504ba813dc3ecbda5b71a3f924110a77a363906b16a87b4b1432748557567d1cf09
-
Filesize
37KB
MD567965a5957a61867d661f05ae1f4773e
SHA1f14c0a4f154dc685bb7c65b2d804a02a0fb2360d
SHA256450b9b0ba25bf068afbc2b23d252585a19e282939bf38326384ea9112dfd0105
SHA512c6942818b9026dc5db2d62999d32cf99fe7289f79a28b8345af17acf9d13b2229a5e917a48ff1f6d59715bdbcb00c1625e0302abcfe10ca7e0475762e0a3f41b
-
Filesize
39KB
MD51ea948aad25ddd347d9b80bef6df9779
SHA10be971e67a6c3b1297e572d97c14f74b05dafed3
SHA25630eb67bdd71d3a359819a72990029269672d52f597a2d1084d838caae91a6488
SHA512f2cc5dce9754622f5a40c1ca20b4f00ac01197b8401fd4bd888bfdd296a43ca91a3ca261d0e9e01ee51591666d2852e34cee80badadcb77511b8a7ae72630545
-
Filesize
920KB
MD5ce14f23d9bfc00a3cc5ceb06a25030e7
SHA1c63991558fb7c45555a1c4e53151bdb518b15eec
SHA2565bd02d57433581efc6e14f6aefa4d1b5a52051f2ca269bde439b50658fa0bc39
SHA5126497e85f1009b26fe68317a695467505e6f75270f07308ee7c321abe9b08b7ae563598b11b44629051759f321a39ec7595c0c6e48b9778146ee7f42096ff88ce
-
Filesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\AlternateServices.bin
Filesize8KB
MD59358051d0fe14c92ba4edc7da0acf80b
SHA10e474b2b97b06e83ac992eaa297381f23eec6c31
SHA2569a7568c936dbd5c839edfe516f397b88ce8b6681fd9b8ba6e381169ed0da5d1c
SHA5129e08bd307e0ad26d82ccedcc224c15e0bc28175ae507afb8394b25e936db28592e5805d4634973baf30fce4a0de314d4458ba01ce64ffb08e7c63d15f6b588ba
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5465670c413f8e2f111607824a23f24fe
SHA1d9b5ce35fcb9f60c9fd2e42c59c02330154e6c80
SHA2566461c8081ca2c23fb1182a953e7cd2763b2c41dba90ab6c1a9b5839d1bc7ebb3
SHA5123c5b42ad307c3190668d3cec820b648698a0a3e7cbac6b0b24e7ea68d21a1a84453a7c467989e94b366f7785d407355a1de847b10465253772969c2f19f0ea57
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5cb3fbd8510aca2d7d3397032d122d6d5
SHA1c6ba9fc4481c950a3587f6441ecdf07628b4c3f8
SHA2569beb3f04c818c7ed06753ab1651aa9a0db95e14a41d68bd95da8d1ced8b9690c
SHA512cc32c5b1b8feb7a00b6f18e9acbdb51e8bfccb5964c7f9bad313829a00896c0f273b4ecbdc866371574cfe89b47344b8b87704ad15725126b94e55887957d102
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD55bfdd8e2ee80491819ca620aefb17c75
SHA1e74e6e8c6f0942e640cc6b6e924e41c4b76967d4
SHA256db8cb5fc8e763ac38f9af882fc3c4cce96978793098f69c013bf270d275a41de
SHA512343b59bc27be51748c89d0e5c9333c42186ff296620ad1db8fefe5a0f2a3e1d1ad1e0778386fc2ac8b68c5c9df7ba16a4443d444045fb30b0fd89b73476c595f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\pending_pings\54408ef6-250b-4dcd-92e9-5024c1d0a25d
Filesize671B
MD58fbea25111f74991851dbfcbe67ed5e3
SHA19d561a566b2120685052c66b22a54daeffce9c91
SHA256813aba03f5c3f888a8461fcdf88e1716440c9e3d746dc1c237197c673b39ac6e
SHA5122f720c24bc3a43fb18abe88c5b3b28c38afe7ac31a4ba47af7a1c15d6be75b184baf359e57717796c41ed0648f90fc5cd1132f51899f9191cbe5a79090a5257a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\pending_pings\efe66e7e-629c-451e-85e0-4fd67a73de11
Filesize982B
MD589028aaf13b4c3d5f5f51614944aa6ae
SHA1c8ea2da64427d8d6072e3749ded37359004206f3
SHA256552490e1b2803ecbb63ae67d8cce89a69e52931ac6ee5c8da103f18c56ce0476
SHA512414cab3dc03ed03150e54a205dee6734649d92e7ab10b5a4ba2b862cbcde30d4c7a671203c634796a4b7ee56cb6a44ad2e6595d78e3a924d8fd86c93c3521c1f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\pending_pings\fd0ba9a5-aca0-455c-ae7a-cc9a9b10c546
Filesize24KB
MD5705cbe40c08db36c2ea60f0058effc90
SHA1dd74c8d982a4947a278db111ef8ec95f09ed8296
SHA2569635234429568916258a286ad2d04c2218880c5df181bd06ee1eab0454da8367
SHA5125c37befdac6b18b8e22008da3c7ef23a2f89823e46aca77648ad131c11e86a81575d9e64413dcf77128aaa586bbe340e8ccd79394ffc6b1ef47d88836c5c66e4
-
Filesize
11KB
MD592d6649fa8312412b8ae05f7398a3b4a
SHA1ed0a54121eaa7ede59d500e314758de20379e7c4
SHA256fdb0f64ec2463b53bbf4a3186e30efdbd6ff5288d164342b39ba76661db73901
SHA512c2745bcf3933c3a4b7321bb5429be6f6c0e833d7bb7a515a3fd1be9d241b3fa09fe81005747c20107dfbba799d518e666d9e654b6ade67a918c988652982ea44
-
Filesize
37KB
MD5ec8e58e6b58b4fcde77431cda3a24c0e
SHA1ebb474009b2a2fbce648adff4b8b797fcd00c997
SHA25625667717bf4691957f07a6363585e2c7eaf22e5fd7229bf32c91ea59ef4a2edd
SHA512e2c667ebe97973ff27c1edf3e45ebf7950bc8d7aad1126da25290a2f590b21808654694cbe6a0ad1d3649566ec7645eb6b3379c7d7c0a650d5381a69e9cdade4
-
Filesize
1.2MB
MD5577cd52217da6d7163cea46bb01c107f
SHA182b31cc52c538238e63bdfc22d1ea306ea0b852a
SHA256139762e396fb930400fab8faab80cb679abbe642144261cba24973fb23bcd728
SHA5128abad4eaf2a302dfd9ead058e8c14d996437975730125c46d034a71028921ff36ff5d157ad3671e328ac667ec8095db19fa14a9e8eaaf1a7738aa3d0120b5474