Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-12-2024 21:36
Static task
static1
Behavioral task
behavioral1
Sample
ee345cc2cd2f5b3fac54696becaa1a36647d13be5253f0105ca991d94fabb308.exe
Resource
win10v2004-20241007-en
General
-
Target
ee345cc2cd2f5b3fac54696becaa1a36647d13be5253f0105ca991d94fabb308.exe
-
Size
6.8MB
-
MD5
a944e1f63497778efa017dc81f0f2f30
-
SHA1
df366747863a9bb5bed6a2e98c4a5e62008b3f3f
-
SHA256
ee345cc2cd2f5b3fac54696becaa1a36647d13be5253f0105ca991d94fabb308
-
SHA512
d3f38d4dd5cae8ed847ebddfbdafaf9209d6e1c207681d02191f4a41e948c0b22abe0819e6159431d0319663f6135db74f2e1cd79d3d768325ac1b86eee93b23
-
SSDEEP
98304:M6ClMm0FnX+sFHy4Fxq9vrzA58HdC1DDv/EDOHaE22+qIXBpiJv3byv1INWOeDTY:soFnXvs4wvrz6YdocDWa4UEedIN4/Y
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
cryptbot
Extracted
gurcu
https://api.telegram.org/bot7855878545:AAEEMUvgpX9jTAxlDd2gM_Sbv2jbI6-5_0o/sendMessage?chat_id=7427009775
Signatures
-
Amadey family
-
Cryptbot family
-
Detect Vidar Stealer 3 IoCs
resource yara_rule behavioral1/files/0x0002000000021ed4-236.dat family_vidar_v7 behavioral1/memory/2388-241-0x0000000000400000-0x0000000000639000-memory.dmp family_vidar_v7 behavioral1/memory/2388-350-0x0000000000400000-0x0000000000639000-memory.dmp family_vidar_v7 -
Gcleaner family
-
Gurcu family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 9dd1640576.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4O600z.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4O600z.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4O600z.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4O600z.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 9dd1640576.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 9dd1640576.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4O600z.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4O600z.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 9dd1640576.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 9dd1640576.exe -
Stealc family
-
Vidar family
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF d65e7408dc.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 14 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 53a5c40740.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9dd1640576.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1O25b9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2z0329.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 094bc8a5b6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d65e7408dc.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3D95S.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4O600z.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3c8c17be4a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ceb1cad6e5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 28bdd65290.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4336 powershell.exe 1500 powershell.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 28 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1O25b9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 53a5c40740.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1O25b9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4O600z.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ceb1cad6e5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9dd1640576.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9dd1640576.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2z0329.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d65e7408dc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 28bdd65290.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4O600z.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3c8c17be4a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 094bc8a5b6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2z0329.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 094bc8a5b6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d65e7408dc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 53a5c40740.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 28bdd65290.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3D95S.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3D95S.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3c8c17be4a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ceb1cad6e5.exe -
Checks computer location settings 2 TTPs 7 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation b8e7ac21ec724d25b10590e179dcdf9d.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 385ff12f6b3649e991924161f5b88d51.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 4ad9240699.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 2467e4038c.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 1O25b9.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 71f01ccb16.exe -
Executes dropped EXE 42 IoCs
pid Process 5024 h4B09.exe 4008 y6a03.exe 5004 1O25b9.exe 3120 skotes.exe 2036 2z0329.exe 3380 hYW0tgm.exe 3320 murrgHN.exe 2908 murrgHN.exe 1944 murrgHN.exe 4600 skotes.exe 1704 d65e7408dc.exe 4524 08cb3ca239.exe 3428 3D95S.exe 1036 71f01ccb16.exe 4460 4O600z.exe 2388 385ff12f6b3649e991924161f5b88d51.exe 4176 b8e7ac21ec724d25b10590e179dcdf9d.exe 2288 3c8c17be4a.exe 1552 3afb10bbec.exe 2152 ee40f5a15a.exe 1128 ee40f5a15a.exe 2804 53a5c40740.exe 4576 ceb1cad6e5.exe 728 28bdd65290.exe 5024 679bfe38ee.exe 1060 9dd1640576.exe 6080 skotes.exe 6448 094bc8a5b6.exe 6840 4ad9240699.exe 6980 Gxtuum.exe 5164 2467e4038c.exe 5372 7z.exe 5492 7z.exe 5588 7z.exe 5640 7z.exe 5356 7z.exe 5732 7z.exe 5864 3b7b50f881.exe 6012 7z.exe 6044 7z.exe 6096 in.exe 628 graph.exe -
Identifies Wine through registry keys 2 TTPs 14 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 3D95S.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 4O600z.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 28bdd65290.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 1O25b9.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 2z0329.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 53a5c40740.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine ceb1cad6e5.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 9dd1640576.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine d65e7408dc.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 3c8c17be4a.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 094bc8a5b6.exe -
Loads dropped DLL 8 IoCs
pid Process 5372 7z.exe 5492 7z.exe 5588 7z.exe 5640 7z.exe 5356 7z.exe 5732 7z.exe 6012 7z.exe 6044 7z.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4O600z.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4O600z.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 9dd1640576.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\28bdd65290.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1019686001\\28bdd65290.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\679bfe38ee.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1019687001\\679bfe38ee.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\9dd1640576.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1019688001\\9dd1640576.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Graph = "C:\\Program Files\\Windows Media Player\\graph\\graph.exe" 3b7b50f881.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ee345cc2cd2f5b3fac54696becaa1a36647d13be5253f0105ca991d94fabb308.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" h4B09.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y6a03.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceb1cad6e5.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1019685001\\ceb1cad6e5.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
flow ioc 100 raw.githubusercontent.com 101 raw.githubusercontent.com 102 raw.githubusercontent.com 305 drive.google.com 306 drive.google.com -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 342 ipinfo.io 343 ipinfo.io -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0007000000023dc7-704.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 14 IoCs
pid Process 5004 1O25b9.exe 3120 skotes.exe 2036 2z0329.exe 4600 skotes.exe 1704 d65e7408dc.exe 3428 3D95S.exe 4460 4O600z.exe 2288 3c8c17be4a.exe 2804 53a5c40740.exe 4576 ceb1cad6e5.exe 728 28bdd65290.exe 1060 9dd1640576.exe 6080 skotes.exe 6448 094bc8a5b6.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3320 set thread context of 1944 3320 murrgHN.exe 101 PID 2152 set thread context of 1128 2152 ee40f5a15a.exe 152 -
resource yara_rule behavioral1/memory/6096-1668-0x00007FF70B220000-0x00007FF70B6B0000-memory.dmp upx behavioral1/memory/6096-1666-0x00007FF70B220000-0x00007FF70B6B0000-memory.dmp upx -
Drops file in Program Files directory 5 IoCs
description ioc Process File created C:\Program Files\Windows Media Player\1w4lv5IzuEVOMa3sjCc6orj2dWPvJoK5f 3b7b50f881.exe File created C:\Program Files\Windows Media Player\1w4lv5IzuEVOMa3sjCc6orj2dWPvJoK5fzip 3b7b50f881.exe File created C:\Program Files\Windows Media Player\graph\graph.exe 3b7b50f881.exe File opened for modification C:\Program Files\Windows Media Player\1w4lv5IzuEVOMa3sjCc6orj2dWPvJoK5fzip 3b7b50f881.exe File opened for modification C:\Program Files\Windows Media Player\1w4lv5IzuEVOMa3sjCc6orj2dWPvJoK5f 3b7b50f881.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1O25b9.exe File created C:\Windows\Tasks\Gxtuum.job 4ad9240699.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 4988 3320 WerFault.exe 98 6692 6448 WerFault.exe 189 5600 2804 WerFault.exe 160 -
System Location Discovery: System Language Discovery 1 TTPs 39 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language h4B09.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ceb1cad6e5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 679bfe38ee.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1O25b9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2z0329.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language murrgHN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 385ff12f6b3649e991924161f5b88d51.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ee40f5a15a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 28bdd65290.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 679bfe38ee.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9dd1640576.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 08cb3ca239.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3D95S.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3c8c17be4a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3afb10bbec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 71f01ccb16.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2467e4038c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4ad9240699.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hYW0tgm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language murrgHN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4O600z.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ee40f5a15a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 679bfe38ee.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 094bc8a5b6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ee345cc2cd2f5b3fac54696becaa1a36647d13be5253f0105ca991d94fabb308.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y6a03.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d65e7408dc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 53a5c40740.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2428 powershell.exe 6336 PING.EXE -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 385ff12f6b3649e991924161f5b88d51.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 385ff12f6b3649e991924161f5b88d51.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3496 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Kills process with taskkill 5 IoCs
pid Process 1104 taskkill.exe 4004 taskkill.exe 4408 taskkill.exe 3428 taskkill.exe 4564 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings firefox.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 6336 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 768 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5004 1O25b9.exe 5004 1O25b9.exe 3120 skotes.exe 3120 skotes.exe 2036 2z0329.exe 2036 2z0329.exe 4600 skotes.exe 4600 skotes.exe 1704 d65e7408dc.exe 1704 d65e7408dc.exe 1704 d65e7408dc.exe 1704 d65e7408dc.exe 1704 d65e7408dc.exe 1704 d65e7408dc.exe 1704 d65e7408dc.exe 1704 d65e7408dc.exe 1704 d65e7408dc.exe 1704 d65e7408dc.exe 4524 08cb3ca239.exe 4524 08cb3ca239.exe 3428 3D95S.exe 3428 3D95S.exe 1036 71f01ccb16.exe 1036 71f01ccb16.exe 4460 4O600z.exe 4460 4O600z.exe 4336 powershell.exe 4336 powershell.exe 4336 powershell.exe 4524 08cb3ca239.exe 4460 4O600z.exe 4460 4O600z.exe 4460 4O600z.exe 1500 powershell.exe 1500 powershell.exe 1500 powershell.exe 2288 3c8c17be4a.exe 2288 3c8c17be4a.exe 2388 385ff12f6b3649e991924161f5b88d51.exe 2388 385ff12f6b3649e991924161f5b88d51.exe 3280 msedge.exe 3280 msedge.exe 1004 msedge.exe 1004 msedge.exe 4292 identity_helper.exe 4292 identity_helper.exe 2804 53a5c40740.exe 2804 53a5c40740.exe 4576 ceb1cad6e5.exe 4576 ceb1cad6e5.exe 728 28bdd65290.exe 728 28bdd65290.exe 5024 679bfe38ee.exe 5024 679bfe38ee.exe 1060 9dd1640576.exe 1060 9dd1640576.exe 1060 9dd1640576.exe 1060 9dd1640576.exe 1060 9dd1640576.exe 5024 679bfe38ee.exe 5024 679bfe38ee.exe 6080 skotes.exe 6080 skotes.exe 6448 094bc8a5b6.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeDebugPrivilege 1036 71f01ccb16.exe Token: SeDebugPrivilege 4336 powershell.exe Token: SeDebugPrivilege 4460 4O600z.exe Token: SeDebugPrivilege 1500 powershell.exe Token: SeDebugPrivilege 4176 b8e7ac21ec724d25b10590e179dcdf9d.exe Token: SeDebugPrivilege 1104 taskkill.exe Token: SeDebugPrivilege 4004 taskkill.exe Token: SeDebugPrivilege 4408 taskkill.exe Token: SeDebugPrivilege 3428 taskkill.exe Token: SeDebugPrivilege 4564 taskkill.exe Token: SeDebugPrivilege 4956 firefox.exe Token: SeDebugPrivilege 4956 firefox.exe Token: SeDebugPrivilege 1060 9dd1640576.exe Token: SeRestorePrivilege 5372 7z.exe Token: 35 5372 7z.exe Token: SeSecurityPrivilege 5372 7z.exe Token: SeSecurityPrivilege 5372 7z.exe Token: SeRestorePrivilege 5492 7z.exe Token: 35 5492 7z.exe Token: SeSecurityPrivilege 5492 7z.exe Token: SeSecurityPrivilege 5492 7z.exe Token: SeRestorePrivilege 5588 7z.exe Token: 35 5588 7z.exe Token: SeSecurityPrivilege 5588 7z.exe Token: SeSecurityPrivilege 5588 7z.exe Token: SeRestorePrivilege 5640 7z.exe Token: 35 5640 7z.exe Token: SeSecurityPrivilege 5640 7z.exe Token: SeSecurityPrivilege 5640 7z.exe Token: SeRestorePrivilege 5356 7z.exe Token: 35 5356 7z.exe Token: SeSecurityPrivilege 5356 7z.exe Token: SeSecurityPrivilege 5356 7z.exe Token: SeRestorePrivilege 5732 7z.exe Token: 35 5732 7z.exe Token: SeSecurityPrivilege 5732 7z.exe Token: SeSecurityPrivilege 5732 7z.exe Token: SeRestorePrivilege 6012 7z.exe Token: 35 6012 7z.exe Token: SeSecurityPrivilege 6012 7z.exe Token: SeSecurityPrivilege 6012 7z.exe Token: SeRestorePrivilege 6044 7z.exe Token: 35 6044 7z.exe Token: SeSecurityPrivilege 6044 7z.exe Token: SeSecurityPrivilege 6044 7z.exe Token: SeDebugPrivilege 2428 powershell.exe -
Suspicious use of FindShellTrayWindow 59 IoCs
pid Process 5004 1O25b9.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 5024 679bfe38ee.exe 5024 679bfe38ee.exe 5024 679bfe38ee.exe 5024 679bfe38ee.exe 5024 679bfe38ee.exe 5024 679bfe38ee.exe 5024 679bfe38ee.exe 5024 679bfe38ee.exe 5024 679bfe38ee.exe 4956 firefox.exe 4956 firefox.exe 4956 firefox.exe 4956 firefox.exe 4956 firefox.exe 4956 firefox.exe 4956 firefox.exe 4956 firefox.exe 4956 firefox.exe 4956 firefox.exe 4956 firefox.exe 4956 firefox.exe 4956 firefox.exe 4956 firefox.exe 4956 firefox.exe 4956 firefox.exe 4956 firefox.exe 4956 firefox.exe 4956 firefox.exe 4956 firefox.exe 4956 firefox.exe 5024 679bfe38ee.exe 5024 679bfe38ee.exe 5024 679bfe38ee.exe -
Suspicious use of SendNotifyMessage 56 IoCs
pid Process 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 5024 679bfe38ee.exe 5024 679bfe38ee.exe 5024 679bfe38ee.exe 5024 679bfe38ee.exe 5024 679bfe38ee.exe 5024 679bfe38ee.exe 5024 679bfe38ee.exe 5024 679bfe38ee.exe 5024 679bfe38ee.exe 4956 firefox.exe 4956 firefox.exe 4956 firefox.exe 4956 firefox.exe 4956 firefox.exe 4956 firefox.exe 4956 firefox.exe 4956 firefox.exe 4956 firefox.exe 4956 firefox.exe 4956 firefox.exe 4956 firefox.exe 4956 firefox.exe 4956 firefox.exe 4956 firefox.exe 4956 firefox.exe 4956 firefox.exe 4956 firefox.exe 4956 firefox.exe 4956 firefox.exe 5024 679bfe38ee.exe 5024 679bfe38ee.exe 5024 679bfe38ee.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4956 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1360 wrote to memory of 5024 1360 ee345cc2cd2f5b3fac54696becaa1a36647d13be5253f0105ca991d94fabb308.exe 83 PID 1360 wrote to memory of 5024 1360 ee345cc2cd2f5b3fac54696becaa1a36647d13be5253f0105ca991d94fabb308.exe 83 PID 1360 wrote to memory of 5024 1360 ee345cc2cd2f5b3fac54696becaa1a36647d13be5253f0105ca991d94fabb308.exe 83 PID 5024 wrote to memory of 4008 5024 h4B09.exe 84 PID 5024 wrote to memory of 4008 5024 h4B09.exe 84 PID 5024 wrote to memory of 4008 5024 h4B09.exe 84 PID 4008 wrote to memory of 5004 4008 y6a03.exe 85 PID 4008 wrote to memory of 5004 4008 y6a03.exe 85 PID 4008 wrote to memory of 5004 4008 y6a03.exe 85 PID 5004 wrote to memory of 3120 5004 1O25b9.exe 86 PID 5004 wrote to memory of 3120 5004 1O25b9.exe 86 PID 5004 wrote to memory of 3120 5004 1O25b9.exe 86 PID 4008 wrote to memory of 2036 4008 y6a03.exe 87 PID 4008 wrote to memory of 2036 4008 y6a03.exe 87 PID 4008 wrote to memory of 2036 4008 y6a03.exe 87 PID 3120 wrote to memory of 3380 3120 skotes.exe 89 PID 3120 wrote to memory of 3380 3120 skotes.exe 89 PID 3120 wrote to memory of 3380 3120 skotes.exe 89 PID 3120 wrote to memory of 3320 3120 skotes.exe 98 PID 3120 wrote to memory of 3320 3120 skotes.exe 98 PID 3120 wrote to memory of 3320 3120 skotes.exe 98 PID 3320 wrote to memory of 2908 3320 murrgHN.exe 100 PID 3320 wrote to memory of 2908 3320 murrgHN.exe 100 PID 3320 wrote to memory of 2908 3320 murrgHN.exe 100 PID 3320 wrote to memory of 1944 3320 murrgHN.exe 101 PID 3320 wrote to memory of 1944 3320 murrgHN.exe 101 PID 3320 wrote to memory of 1944 3320 murrgHN.exe 101 PID 3320 wrote to memory of 1944 3320 murrgHN.exe 101 PID 3320 wrote to memory of 1944 3320 murrgHN.exe 101 PID 3320 wrote to memory of 1944 3320 murrgHN.exe 101 PID 3320 wrote to memory of 1944 3320 murrgHN.exe 101 PID 3320 wrote to memory of 1944 3320 murrgHN.exe 101 PID 3320 wrote to memory of 1944 3320 murrgHN.exe 101 PID 3320 wrote to memory of 1944 3320 murrgHN.exe 101 PID 3120 wrote to memory of 1704 3120 skotes.exe 113 PID 3120 wrote to memory of 1704 3120 skotes.exe 113 PID 3120 wrote to memory of 1704 3120 skotes.exe 113 PID 3120 wrote to memory of 4524 3120 skotes.exe 114 PID 3120 wrote to memory of 4524 3120 skotes.exe 114 PID 3120 wrote to memory of 4524 3120 skotes.exe 114 PID 5024 wrote to memory of 3428 5024 h4B09.exe 115 PID 5024 wrote to memory of 3428 5024 h4B09.exe 115 PID 5024 wrote to memory of 3428 5024 h4B09.exe 115 PID 3120 wrote to memory of 1036 3120 skotes.exe 116 PID 3120 wrote to memory of 1036 3120 skotes.exe 116 PID 3120 wrote to memory of 1036 3120 skotes.exe 116 PID 1360 wrote to memory of 4460 1360 ee345cc2cd2f5b3fac54696becaa1a36647d13be5253f0105ca991d94fabb308.exe 118 PID 1360 wrote to memory of 4460 1360 ee345cc2cd2f5b3fac54696becaa1a36647d13be5253f0105ca991d94fabb308.exe 118 PID 1360 wrote to memory of 4460 1360 ee345cc2cd2f5b3fac54696becaa1a36647d13be5253f0105ca991d94fabb308.exe 118 PID 1036 wrote to memory of 4336 1036 71f01ccb16.exe 119 PID 1036 wrote to memory of 4336 1036 71f01ccb16.exe 119 PID 1036 wrote to memory of 4336 1036 71f01ccb16.exe 119 PID 1036 wrote to memory of 1500 1036 71f01ccb16.exe 122 PID 1036 wrote to memory of 1500 1036 71f01ccb16.exe 122 PID 1036 wrote to memory of 1500 1036 71f01ccb16.exe 122 PID 1036 wrote to memory of 2388 1036 71f01ccb16.exe 125 PID 1036 wrote to memory of 2388 1036 71f01ccb16.exe 125 PID 1036 wrote to memory of 2388 1036 71f01ccb16.exe 125 PID 1036 wrote to memory of 4176 1036 71f01ccb16.exe 126 PID 1036 wrote to memory of 4176 1036 71f01ccb16.exe 126 PID 3120 wrote to memory of 2288 3120 skotes.exe 127 PID 3120 wrote to memory of 2288 3120 skotes.exe 127 PID 3120 wrote to memory of 2288 3120 skotes.exe 127 PID 4176 wrote to memory of 1004 4176 b8e7ac21ec724d25b10590e179dcdf9d.exe 130 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 3 IoCs
pid Process 6076 attrib.exe 1984 attrib.exe 3876 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee345cc2cd2f5b3fac54696becaa1a36647d13be5253f0105ca991d94fabb308.exe"C:\Users\Admin\AppData\Local\Temp\ee345cc2cd2f5b3fac54696becaa1a36647d13be5253f0105ca991d94fabb308.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\h4B09.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\h4B09.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y6a03.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y6a03.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1O25b9.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1O25b9.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Users\Admin\AppData\Local\Temp\1019563001\hYW0tgm.exe"C:\Users\Admin\AppData\Local\Temp\1019563001\hYW0tgm.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3380
-
-
C:\Users\Admin\AppData\Local\Temp\1019610001\murrgHN.exe"C:\Users\Admin\AppData\Local\Temp\1019610001\murrgHN.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Users\Admin\AppData\Local\Temp\1019610001\murrgHN.exe"C:\Users\Admin\AppData\Local\Temp\1019610001\murrgHN.exe"7⤵
- Executes dropped EXE
PID:2908
-
-
C:\Users\Admin\AppData\Local\Temp\1019610001\murrgHN.exe"C:\Users\Admin\AppData\Local\Temp\1019610001\murrgHN.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1944
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3320 -s 5927⤵
- Program crash
PID:4988
-
-
-
C:\Users\Admin\AppData\Local\Temp\1019678001\d65e7408dc.exe"C:\Users\Admin\AppData\Local\Temp\1019678001\d65e7408dc.exe"6⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1704
-
-
C:\Users\Admin\AppData\Local\Temp\1019679001\08cb3ca239.exe"C:\Users\Admin\AppData\Local\Temp\1019679001\08cb3ca239.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4524
-
-
C:\Users\Admin\AppData\Local\Temp\1019680001\71f01ccb16.exe"C:\Users\Admin\AppData\Local\Temp\1019680001\71f01ccb16.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath "C:\bknbdgz"7⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4336
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData"7⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1500
-
-
C:\bknbdgz\385ff12f6b3649e991924161f5b88d51.exe"C:\bknbdgz\385ff12f6b3649e991924161f5b88d51.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2388 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\bknbdgz\385ff12f6b3649e991924161f5b88d51.exe" & rd /s /q "C:\ProgramData\N7GVKFKNOP8Y" & exit8⤵
- System Location Discovery: System Language Discovery
PID:3508 -
C:\Windows\SysWOW64\timeout.exetimeout /t 109⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:3496
-
-
-
-
C:\bknbdgz\b8e7ac21ec724d25b10590e179dcdf9d.exe"C:\bknbdgz\b8e7ac21ec724d25b10590e179dcdf9d.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://apps.microsoft.com/store/detail/9MSZ40SLW145?ocid=&referrer=psi8⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1004 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7ffbe1ab46f8,0x7ffbe1ab4708,0x7ffbe1ab47189⤵PID:2868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1960,11524521193657069478,10286266452474061805,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1956 /prefetch:29⤵PID:1564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1960,11524521193657069478,10286266452474061805,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 /prefetch:39⤵
- Suspicious behavior: EnumeratesProcesses
PID:3280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1960,11524521193657069478,10286266452474061805,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2972 /prefetch:89⤵PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,11524521193657069478,10286266452474061805,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:19⤵PID:4748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,11524521193657069478,10286266452474061805,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:19⤵PID:1504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1960,11524521193657069478,10286266452474061805,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5276 /prefetch:89⤵PID:4252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1960,11524521193657069478,10286266452474061805,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5276 /prefetch:89⤵
- Suspicious behavior: EnumeratesProcesses
PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,11524521193657069478,10286266452474061805,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5296 /prefetch:19⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,11524521193657069478,10286266452474061805,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5312 /prefetch:19⤵PID:1072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,11524521193657069478,10286266452474061805,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5728 /prefetch:19⤵PID:3432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,11524521193657069478,10286266452474061805,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5736 /prefetch:19⤵PID:1492
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1019681001\3c8c17be4a.exe"C:\Users\Admin\AppData\Local\Temp\1019681001\3c8c17be4a.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2288
-
-
C:\Users\Admin\AppData\Local\Temp\1019682001\3afb10bbec.exe"C:\Users\Admin\AppData\Local\Temp\1019682001\3afb10bbec.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1552
-
-
C:\Users\Admin\AppData\Local\Temp\1019683001\ee40f5a15a.exe"C:\Users\Admin\AppData\Local\Temp\1019683001\ee40f5a15a.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\1019683001\ee40f5a15a.exe"C:\Users\Admin\AppData\Local\Temp\1019683001\ee40f5a15a.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1128
-
-
-
C:\Users\Admin\AppData\Local\Temp\1019684001\53a5c40740.exe"C:\Users\Admin\AppData\Local\Temp\1019684001\53a5c40740.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2804 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2804 -s 7767⤵
- Program crash
PID:5600
-
-
-
C:\Users\Admin\AppData\Local\Temp\1019685001\ceb1cad6e5.exe"C:\Users\Admin\AppData\Local\Temp\1019685001\ceb1cad6e5.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4576
-
-
C:\Users\Admin\AppData\Local\Temp\1019686001\28bdd65290.exe"C:\Users\Admin\AppData\Local\Temp\1019686001\28bdd65290.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:728
-
-
C:\Users\Admin\AppData\Local\Temp\1019687001\679bfe38ee.exe"C:\Users\Admin\AppData\Local\Temp\1019687001\679bfe38ee.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5024 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1104
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4004
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4408
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3428
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4564
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵PID:4576
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4956 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2008 -parentBuildID 20240401114208 -prefsHandle 1924 -prefMapHandle 1896 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e6026533-829a-40ab-9532-cf907837a37f} 4956 "\\.\pipe\gecko-crash-server-pipe.4956" gpu9⤵PID:2036
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2428 -parentBuildID 20240401114208 -prefsHandle 2420 -prefMapHandle 2408 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {eb6911cb-692d-4f11-ac80-2e7652499ad3} 4956 "\\.\pipe\gecko-crash-server-pipe.4956" socket9⤵PID:5020
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2824 -childID 1 -isForBrowser -prefsHandle 2964 -prefMapHandle 3044 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1392 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {51b96c51-3f9b-4d5e-8ef3-bb55a4fee238} 4956 "\\.\pipe\gecko-crash-server-pipe.4956" tab9⤵PID:4412
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3920 -childID 2 -isForBrowser -prefsHandle 3408 -prefMapHandle 3016 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1392 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e1e5352f-cd25-4dfb-97e8-d4aa27b6e058} 4956 "\\.\pipe\gecko-crash-server-pipe.4956" tab9⤵PID:3544
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4560 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4584 -prefMapHandle 4588 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ff737247-354e-49b0-8b6b-78dc65131cba} 4956 "\\.\pipe\gecko-crash-server-pipe.4956" utility9⤵
- Checks processor information in registry
PID:6600
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5184 -childID 3 -isForBrowser -prefsHandle 5176 -prefMapHandle 5172 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1392 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {02cc41cf-e7bd-44f6-8731-e6976e280aee} 4956 "\\.\pipe\gecko-crash-server-pipe.4956" tab9⤵PID:548
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5340 -childID 4 -isForBrowser -prefsHandle 5416 -prefMapHandle 5412 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1392 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f4435c4f-7ab9-4fa0-bfef-72c5e4d016bf} 4956 "\\.\pipe\gecko-crash-server-pipe.4956" tab9⤵PID:372
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5528 -childID 5 -isForBrowser -prefsHandle 5532 -prefMapHandle 5536 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1392 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {515b17be-77ad-4d7d-978e-a89e6e7aa087} 4956 "\\.\pipe\gecko-crash-server-pipe.4956" tab9⤵PID:5176
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1019688001\9dd1640576.exe"C:\Users\Admin\AppData\Local\Temp\1019688001\9dd1640576.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1060
-
-
C:\Users\Admin\AppData\Local\Temp\1019689001\094bc8a5b6.exe"C:\Users\Admin\AppData\Local\Temp\1019689001\094bc8a5b6.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:6448 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6448 -s 15367⤵
- Program crash
PID:6692
-
-
-
C:\Users\Admin\AppData\Local\Temp\1019690001\4ad9240699.exe"C:\Users\Admin\AppData\Local\Temp\1019690001\4ad9240699.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:6840 -
C:\Users\Admin\AppData\Local\Temp\e458d263c0\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\e458d263c0\Gxtuum.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6980
-
-
-
C:\Users\Admin\AppData\Local\Temp\1019691001\2467e4038c.exe"C:\Users\Admin\AppData\Local\Temp\1019691001\2467e4038c.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5164 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"7⤵PID:5320
-
C:\Windows\system32\mode.commode 65,108⤵PID:5404
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e file.zip -p24291711423417250691697322505 -oextracted8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:5372
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_7.zip -oextracted8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:5492
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_6.zip -oextracted8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:5588
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_5.zip -oextracted8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:5640
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_4.zip -oextracted8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:5356
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_3.zip -oextracted8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:5732
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_2.zip -oextracted8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:6012
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_1.zip -oextracted8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:6044
-
-
C:\Windows\system32\attrib.exeattrib +H "in.exe"8⤵
- Views/modifies file attributes
PID:6076
-
-
C:\Users\Admin\AppData\Local\Temp\main\in.exe"in.exe"8⤵
- Executes dropped EXE
PID:6096 -
C:\Windows\SYSTEM32\attrib.exeattrib +H +S C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe9⤵
- Views/modifies file attributes
PID:3876
-
-
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe9⤵
- Views/modifies file attributes
PID:1984
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /f /CREATE /TN "Intel_PTT_EK_Recertification" /TR "C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe" /SC MINUTE9⤵
- Scheduled Task/Job: Scheduled Task
PID:768
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell ping 127.0.0.1; del in.exe9⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2428 -
C:\Windows\system32\PING.EXE"C:\Windows\system32\PING.EXE" 127.0.0.110⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:6336
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1019692001\3b7b50f881.exe"C:\Users\Admin\AppData\Local\Temp\1019692001\3b7b50f881.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
PID:5864 -
C:\Program Files\Windows Media Player\graph\graph.exe"C:\Program Files\Windows Media Player\graph\graph.exe"7⤵
- Executes dropped EXE
PID:628
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2z0329.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2z0329.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2036
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3D95S.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3D95S.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3428
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4O600z.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4O600z.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4460
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3320 -ip 33201⤵PID:2892
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4600
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4996
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2268
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 6448 -ip 64481⤵PID:6656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2804 -ip 28041⤵PID:5560
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Discovery
Browser Information Discovery
1Query Registry
9Remote System Discovery
1System Information Discovery
5System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5a879cd5d01fbac64d0ea88574173682c
SHA18a8eff9f773be5bedb56fb16472d7cd81f0e0e3e
SHA2564020e1535c46ed3a367bf24a9d34b01a50fd11e593c75aeb98307c158ab86c1d
SHA51230780046bb5c0a669aa5663da4cb049407f098715d76bd0c1db3f799fc4422d14ad0c0439fdee5448512569a7c7d314dcc028c7d3ba41321af14e37d67c4ef11
-
Filesize
5KB
MD50d948326aafce6af690259dfd3d1955f
SHA1ac64747ddf850ea04ad1891c851a9a083b1effae
SHA256fb905b376123fcb7666025059fc4ef1d42bc8b9a34fb20fdaeca0679c9178311
SHA51202c32ab371d17d02fa38ec16adc309aaaacc0f0eddbb71cd7c65306d020e9a3fc82b14eb9edd696bb8cd60eaef081354f23e048ff62bd5ede287cf8bbf02e2b3
-
Filesize
6KB
MD5f985d83d2bf7c4db0b767e6db41670a9
SHA1821281b59d2531de6947253f54b46bd263795e3b
SHA2562df85ee85cff731d3ed3a0d63755898e2488391342e8d208e388fbb7a4dbae21
SHA51202aa085c56a85acab3fcf7671d0aee1bdb6f1903b23ad4d6c63bd86fad38d733e293ee539e9a920d760c85aa86418a8cbc829992ca6f8199047e7300adf6d77e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\a0a74304db73132d4bc12ef9404aa74f9fdeda56\dd2057e3-918e-4b95-aef4-fb443ea872ae\index-dir\the-real-index
Filesize72B
MD57adbf716a12c4c2caf2443b1ef2c7ecc
SHA14182cada61cee99126d0bf3d304be9547b74ad3e
SHA25629b0f474d153bcb267d72e3c2ea8d4a5b17bc7fb9134a5f9131bd899726075b9
SHA512443ab7a18fb9031884be7c4f65f3649a951fd52e556739cb7d63870cf22bbdbdeb43f8ce09cc62f3889b5319a5c9e31b9dfbeadffebff1a2707e0a67346151eb
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\a0a74304db73132d4bc12ef9404aa74f9fdeda56\dd2057e3-918e-4b95-aef4-fb443ea872ae\index-dir\the-real-index~RFe593f13.TMP
Filesize48B
MD5abd4e77fd0a05273c99c9458b5c8277c
SHA1fc74263054b223a7649784064bb72a78fa13a807
SHA256e1e5b690a2dac4d074bae6b34f437c96cec9ae0b9b90719fd4be34f6faebe235
SHA512d201f3e4453a204480d303e35d4ede7a1f82fb717f5683be567a4b67bc0b6d4376629c8617c307e393f544551c08276206e9a2ef1093874060c513a50cfac342
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\a0a74304db73132d4bc12ef9404aa74f9fdeda56\index.txt
Filesize109B
MD54ec8e5f0666f6837b226b7d82e9a8e91
SHA12b9eb2c14ec7adfa093b4f6fc7b1cbe8c30b8c3e
SHA256a3b823c7278060c6674483415032ca80d4141674f4c87e84a6536266b09c60a9
SHA512b7947de2ac947a17d86b1afa988e663c17d04d6df51b15101b748338b124e6d62eee5778c0f484e8c02ac2a745249b7bbe7af879fa002c472466b513483e85d3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\a0a74304db73132d4bc12ef9404aa74f9fdeda56\index.txt
Filesize204B
MD5bc5e382e4d15cafd5dc792e3f29e56b8
SHA1065ef2604d325e71c20cab6dccca33f88a5158ae
SHA2569787207faf9699fb96713cb92e0067b9dbba24c8a3ff3befa44aaf98daa4d8a0
SHA5120729f017f34a6567496719be642fa87fac4614109dd4dc242b6f20b4f62bd54668b10d00707806c8731a544f4895f3e7c3fcd03025251c7fd912d2c6d027faae
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5b3e75ddf192f9b89db9311bcebefadd2
SHA1a46e1be674d500dd62deca0d3ee4249eb352510f
SHA256035fc05d2c22f5a71490a9116ce527b8db54b26bb58e78a8dc97658ca537e095
SHA51260592ae4ed01cc7242911608649087bf872da30e569dcd8c6f637c9ea1fb4249c41a4c45a70d3431cdbefe9505781a8e9c2d081e983e77a514ff6687c4c39ca9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe593eb5.TMP
Filesize48B
MD544d391be9a36733fc22fb78e7efb830c
SHA1ab8212c78184c2f5eecf34ace90a8fdfe85da322
SHA256c270c6a9718943c458fc811f419134749dcf1ac7ef98fdafa3635dc365c5d9ab
SHA51267345cef3073af8ff31369411a4e65289c9639d76c0341884814ce924361fe2f0fa6eb563539b84bb5c181d49ed825be27da02e42b2d42987f0c4a367b564257
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD538b76e879c5c3f32c527564eda02780b
SHA14bf522dd2e99d6ec433d74be11c7ed224a71e3a7
SHA256073a56fed10fd6033112a6a419cff6db5be12e4ad0a30c647175eccaca1d6b3a
SHA51289b882575f4179c9f268c943cd92e504410bd4e8f0dcb57c915f35e271caa5e38cc7e9e6e48d343095d52c6b476121ab8ebbada80a57e2c3021c48ee833863bc
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
18KB
MD5db6bad627a9ff03fe117da208a114a00
SHA17971e444884b9ede73be21532edb87e6b75f14f7
SHA25607f85dc3d203b9153c6b88d93982219564a577b54224c98e1f698e33b335d078
SHA512f7432f5020e2b79fe185d7d13b546676141e56a52aa9e8f7a3159a7d72b7578a9eac4bb7899b7dfe81bcd8d0f27567e38f6e24c495e6a0f26783f80d0d3a3c04
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\g9per00b.default-release\activity-stream.discovery_stream.json
Filesize19KB
MD5b66caf17285c531fb18b773273d6179d
SHA17f7e8b373c0837b025290e5885c85343b94f33ba
SHA2568c2bf9b4ee4f9a0ad020b476015fbedd91dc12c26ea7407c8c3a70ab71a2b540
SHA5127e9e5257bd0c0bc88394d4c819e9053854caa5f4994a228278b42c9765737a3e9f46aacd008041c2d38784b2e0862d3ceeef66c532424c73bf7c17a4c5008b31
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\g9per00b.default-release\cache2\entries\6653BC7BE242C21AA1988A4A42D1DEDA18231C31
Filesize13KB
MD5a89894bff18dbaa209094618f402b46b
SHA1aaa60c31d151e4a358a61796d06529bcf2cd55fe
SHA2565747dc57314122c512f79ed2d6e6b5a4ee2d6a1a766da395b07425cafd2f4515
SHA512de381b2502c269623d77e2a1a721a30f9ba8d6b872395bc5334ceb488b2bdddf9ed749176be81a8af3fdbc6ef4c09556dc7388f42a3822f77394a02da367e70d
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\g9per00b.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD5d6695676dcaf29d975beb4b4206a13d1
SHA165d14bf80535b413e90ac8eb70d73379f3416e7a
SHA25651708c7c23774b340a74206f2db6a994b6bd2193bdcd50eacf39b9806bf07644
SHA512002ce4ec77bf681f04e68e8678d1d059e69de8f0f8c9168b302384aa39c15a63d33775a93c8027f7434ea771daaa9159d279f4d4e64505a59849cd60370859f4
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\g9per00b.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
295KB
MD5b251cf9e14aa07b1a2e506ad4ee0028c
SHA13bafd765233c9bc50ba3945446b4153d6f10a41a
SHA256be4ae482b0ca161f7d52dcfecc38e55af4b0a0342b0c1b854329da4f42b6c1cb
SHA512660313d8286535b3acab03c8894d069d7fcb65eb4b5e75026529a096c2337cd68d8a291abf78f612d75b5aec2a413e0936eb16c8c1a94bfda0568dd41312c2c7
-
Filesize
543KB
MD54f36d38adf1aa27764e834263b790397
SHA1c38cd4f1bc7762951225d35e06578b8bd91606d5
SHA256d6a9fcd0a2fccd03908113ac2febc012c36cd007c30ff2e8903e3dd26e189bbd
SHA51276d100555bb8a3ef8529b4dcb9391696b440e5b349f38c36ee1fb1ad8a46aa9289b805511d91597ceaa8dccf8fe64c6130111dcfe09cab0651428c83bd0bce23
-
Filesize
4.3MB
MD5339948cf14bfed6a4e1cd717beeb9fff
SHA15579437dde79a533dd625fb7fb1ccdb6226e3364
SHA2566eb9cd9fe518bd6649b3db9de8478d7e8570fa22272b111a76c491749e049994
SHA512483ee1fcd7ac2262e90feb4bf38a7a11a4f76a77d577cda49fb0e6ddf30db36f33819af2dced92d7af156fc25132878cd2b69fe4e210698562990e80ff1f4733
-
Filesize
1.3MB
MD5669ed3665495a4a52029ff680ec8eba9
SHA17785e285365a141e307931ca4c4ef00b7ecc8986
SHA2562d2d405409b128eea72a496ccff0ed56f9ed87ee2564ae4815b4b116d4fb74d6
SHA512bedc8f7c1894fc64cdd00ebc58b434b7d931e52c198a0fa55f16f4e3d44a7dc4643eaa78ec55a43cc360571345cd71d91a64037a135663e72eed334fe77a21e6
-
Filesize
21KB
MD504f57c6fb2b2cd8dcc4b38e4a93d4366
SHA161770495aa18d480f70b654d1f57998e5bd8c885
SHA25651e4d0cbc184b8abfa6d84e219317cf81bd542286a7cc602c87eb703a39627c2
SHA51253f95e98a5eca472ed6b1dfd6fecd1e28ea66967a1b3aa109fe911dbb935f1abf327438d4b2fe72cf7a0201281e9f56f4548f965b96e3916b9142257627e6ccd
-
Filesize
4.2MB
MD50ff2001aeabb55d9ac0bfeb28c577633
SHA1e5f37210806ae7b9cacd40a52dc1e20ceea5b89b
SHA256dc1e0f683dabb770d3b77040889f5a189e6e5de7040a9625f688a8c240624d3a
SHA512936cdfc268ec50b7c4df7d53ccbc45a8626a6c52869a1c5a1e0f944f8ab051700e53e0466c328e123e6797c865a329186bfaaba1d075d69c250f72e2f7326d54
-
Filesize
2.5MB
MD587330f1877c33a5a6203c49075223b16
SHA155b64ee8b2d1302581ab1978e9588191e4e62f81
SHA25698f2344ed45ff0464769e5b006bf0e831dc3834f0534a23339bb703e50db17e0
SHA5127c747d3edb04e4e71dce7efa33f5944a191896574fee5227316739a83d423936a523df12f925ee9b460cce23b49271f549c1ee5d77b50a7d7c6e3f31ba120c8f
-
Filesize
758KB
MD5afd936e441bf5cbdb858e96833cc6ed3
SHA13491edd8c7caf9ae169e21fb58bccd29d95aefef
SHA256c6491d7a6d70c7c51baca7436464667b4894e4989fa7c5e05068dde4699e1cbf
SHA512928c15a1eda602b2a66a53734f3f563ab9626882104e30ee2bf5106cfd6e08ec54f96e3063f1ab89bf13be2c8822a8419f5d8ee0a3583a4c479785226051a325
-
Filesize
1.9MB
MD587448823dab50a9edd9f481b99aca4ee
SHA12711209da94d4e33d7a6636fe1a797fba552002c
SHA2564c813bff7644e8b3db0c1f15db3eae43ba2ca5badf089ec028607c888164e539
SHA51237085c98ca976ef91631cc7d6b81bfcbf64f72443205d1df2a35105a504878b0795d45057a3c82a1cbddf0895d11dba9ffc234fb13aff14eb2def33ea449bf43
-
Filesize
1.8MB
MD51c76387d2784b116b9f532b8b0a48c8b
SHA19b977e6b1404a5e4f1b3f3254a1c025fa996ab0d
SHA256ec07d0613f3d6cf3ba318445c88e2cc77c06065cdf8a1f61a402236c0687f1d9
SHA5120fcf85db4a716b7f2da97304c70b0f7bed88d6fe448be5bff6d657df8f87cd6b57b007484017128a8c4b28c61ad5352949dba774f67d6afe8b94e701019fcaa9
-
Filesize
2.7MB
MD55f8d93018394ecd9f599aa2c10147a5f
SHA12d8e3a0d25f83fd723861b5d6cca4e1ca98ac3eb
SHA256681176f836e4a1921854c9aa2ae0fc6929b850c589beb81ccb45be4b355f2044
SHA51266a5d018dec2b2353f0048113ced96e55870d78b9253b0704f625e9003293c60e03de56cf534613ece08f183701226b4f71a7ff3adafe3128e79fcadcc1359eb
-
Filesize
944KB
MD5c62f6307b430705a222d91251c64a3fd
SHA12e02770695aa07c45ccdc17160f7d57588d938e7
SHA256bf00151c4e9ccb994891b277adca7ffb6dbb5f1e8704c9f877fabdf81653912b
SHA512698a75e35b8466252357c46ac7089ce1d52289320a125c7f431a0befa80752cc5a75dc2d959935e0a9baa61848913801fb1d24e4cebe857c7754b7ae676bada6
-
Filesize
2.6MB
MD5c682c12739cbb53b85334e649cf0b772
SHA1d80e059a1162d937a09a3823022e749d5d7cdff8
SHA25628ee82a1695d62f46ce43ee4ebd525806cdb508ed5f68dfe07113bd58b2587e3
SHA512937d7d84b5af30d1788e958e8893195ad2e8abd6d9640d2343c5e9da199cee67199b824a10965a20b6a77e61844fc6c0bb9d887630b7f6433364671ee507c6dc
-
Filesize
1.8MB
MD515709eba2afaf7cc0a86ce0abf8e53f1
SHA1238ebf0d386ecf0e56d0ddb60faca0ea61939bb6
SHA25610bff40a9d960d0be3cc81b074a748764d7871208f324de26d365b1f8ea3935a
SHA51265edefa20f0bb35bee837951ccd427b94a18528c6e84de222b1aa0af380135491bb29a049009f77e66fcd2abe5376a831d98e39055e1042ccee889321b96e8e9
-
Filesize
429KB
MD551ff79b406cb223dd49dd4c947ec97b0
SHA1b9b0253480a1b6cbdd673383320fecae5efb3dce
SHA2562e3a5dfa44d59681a60d78b8b08a1af3878d8e270c02d7e31a0876a85eb42a7e
SHA512c2b8d15b0dc1b0846f39ce007be2deb41d5b6ae76af90d618f29da8691ed987c42f3c270f0ea7f4d10cbd2d3877118f4133803c9c965b6ff236ff8cfafd9367c
-
Filesize
4.2MB
MD53a425626cbd40345f5b8dddd6b2b9efa
SHA17b50e108e293e54c15dce816552356f424eea97a
SHA256ba9212d2d5cd6df5eb7933fb37c1b72a648974c1730bf5c32439987558f8e8b1
SHA512a7538c6b7e17c35f053721308b8d6dc53a90e79930ff4ed5cffecaa97f4d0fbc5f9e8b59f1383d8f0699c8d4f1331f226af71d40325022d10b885606a72fe668
-
Filesize
591KB
MD53567cb15156760b2f111512ffdbc1451
SHA12fdb1f235fc5a9a32477dab4220ece5fda1539d4
SHA2560285d3a6c1ca2e3a993491c44e9cf2d33dbec0fb85fdbf48989a4e3b14b37630
SHA512e7a31b016417218387a4702e525d33dd4fe496557539b2ab173cec0cb92052c750cfc4b3e7f02f3c66ac23f19a0c8a4eb6c9d2b590a5e9faeb525e517bc877ba
-
Filesize
2.7MB
MD56fb1f8ddd32d36f37f57f99dcf7002d3
SHA1b5895ff71c5e11add33f95c9a2d63bf6a1b3e616
SHA25639bb2fcc4c936abdf4b7dbe6f763d7b04bc4def2896ebfb6a43de4e9d8755eed
SHA512d5b12a3281ffbaebd24842b3d6a2e0ac083fadbd63a7e6fec78a83d53f4bea11fc8107ce4e3484a9c1f0b578e2ad581025935f619fd6c80c5274802a799f5e0d
-
Filesize
5.3MB
MD52ed76c2af72ac1b9edb2847bdc5ebff7
SHA16169b477dc223d2cb8d8f19e20e04bee9e38a700
SHA256ad53fe95e76c5028e6b8bae73045183a48a815a6fce1f051cb035f0841d1bc53
SHA512041e91cf181d906bbd796899490df9d391d29a940151eb3f2c80a96e0fbe6030db69cf477dde3b6bbb546d75d04c276871212742f66ecf48df8761de172a9c32
-
Filesize
2.8MB
MD597dab65220334cfd17d462ce425588af
SHA1faec1845571a3da9ef65f4f8125eebc0d64b87cd
SHA2560ac8efcc206f2d7397ecc128aa3108e6ab3cd581e5d68348daf21edc77dc8053
SHA512e4af99f91c81590a4fcd54584441769c3abe6fd45882c14094852a933244944ddd7639475ba1ae3b5c1e80c9fbd5d2d0b35faab6ab91d2b6fcba1669667dfb8d
-
Filesize
3.6MB
MD522c000306696e2386692660ed6c712bb
SHA120680a1f826efe015b49362fe8d7c9652f7538a9
SHA256e9a9f17249d7dd6aee2482ed7718e658c6cd1257b7741293eb4302803a4c8181
SHA512a0d3b6f6db406fe8c7d7fb6cebd1fc957a2565bfc182ecfdf84c39462a637eb8918fbe3386118a061eb5040dec1c492484c5a34c7180711d44c62762425d6214
-
Filesize
2.9MB
MD5375e153f654df2bfdb976c882b45f7ee
SHA13cfb6520e5738940933a67b55c604342f9524cac
SHA2567e3f4addd4c62ae1a2f9aa96c4f38993817c1299500af0ac75a500c42a05c3c0
SHA5127256dca53420886d81863fc80d5aa4cb3b6d97f089d3f43ea55b12cbb52608533c26a7b38edd2deb5a191ad06aa26ef9f563f6b48f3722d5c875646a9f4de2d5
-
Filesize
1.8MB
MD5ebc8ee2571051c972257a5a46feff86f
SHA19ea7d00344c07d9ad2c75e9dae5204fdb1851c68
SHA256c4396fe392517c74d80dd64ca396bc344f5197bf3116a040f4f67d7cf49f6e54
SHA5125c504ab8b5e03c320bb3940ccc449bada9846b1db608e4d299404f1b92ba0b4a2431cd80ca59f3fd95787d487b61fc02e71caffb7798e69ae124770242c6601a
-
Filesize
1KB
MD5a10f31fa140f2608ff150125f3687920
SHA1ec411cc7005aaa8e3775cf105fcd4e1239f8ed4b
SHA25628c871238311d40287c51dc09aee6510cac5306329981777071600b1112286c6
SHA512cf915fb34cd5ecfbd6b25171d6e0d3d09af2597edf29f9f24fa474685d4c5ec9bc742ade9f29abac457dd645ee955b1914a635c90af77c519d2ada895e7ecf12
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\AlternateServices.bin
Filesize10KB
MD580cbc7928d9850ab8e1b63b243255ab1
SHA1fb5b11fa7ae1b08b03324f2f7bb080b1d9efa941
SHA256e7cf1fd1c0cbbf5f2e9c134f760f925e213f0b4652612edd5395b15ced61ff46
SHA512c07984ed9248b30e86c87cc89527cbccda92131eada39b9c8e5b4289e805376d5edc6c7f713d0dd8909fb1fd0f084d3e3541d771fc9a4303ba10e10f2a6784e3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.bin
Filesize23KB
MD56bff2863965e151decdd90b77c51c08b
SHA1b26f6e3b454cce62f34881447243171d25eab6dc
SHA256ce04a13e9616bc419cde235dae281ede64f3328fbeb50cbc8641bad106e708a9
SHA51299594352f5c69e10acc8196bcbe169e3eba753e18f9bcd103fdc705ad303b50f9152712a2db1288394f99be94a6b3b9f81cf3b731093f4f1e378c99c4acbdf5b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.bin
Filesize5KB
MD5c2f8f6906f17e5774ef6794aed1a51b7
SHA18714308a282ca33d433b5c3d894ecc64539e6c9c
SHA2565c5b2bfc93c3263ad53693d7be2523fabae5a526d943319c965d4c3e12edf3b9
SHA5125e69375738641709ba9194a69a0401b86f2d8f2c56d652080d4b7518fc6924796b3656117d8a4e25563083ecbef1c57461a7bdce1cc33c10a6ea49e2f3aabc79
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.bin
Filesize14KB
MD554da39707ff9b4da535eea11234dc453
SHA1cb62743b453e346f8113c1d94bf097a0b3379943
SHA256ba49307d55f6c09374438a505e606db659bf2d24111497589631da5e4392d2ac
SHA5125f7b2503f6947e7db71c8785415189218c43244e635dc674b3516552c2b3ebe95e9e29a993a83c8e553801258277024db68de93ec0bf186a5621017b81702719
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.bin
Filesize15KB
MD544f81721884d7dcddcdab258e09e3df9
SHA1f8207877cf8dc52c8d74c584269d4b482feb9233
SHA256a9ca84ac1e1e400190bfcf56e12a6e0bb1e655160ffce8d978e91d72dc4c3a60
SHA512b5b9b328ba618f8db4613f1f1b934f2d111cde343d272c869d2d6ee945fc9b6877c6947a0751c1652d988a1da77c828528448f02329317931c4381911363b62b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5d048874b1420f770c96887d932137eaa
SHA147bbdbdabbec8c0e7d690b5454a6f788e1b7bebe
SHA256de7de05fc2a6695c8e7549c892d2df5939464ee886e2519e2df33a313ea8094c
SHA512181d2e75d305303d4debb6deab236938d3b53dd723a086c951887872bd0a9729b9ad65bf68da76256ca1f2717afabf9a4c85052f6fb217060830ab29a997f57e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5299e00b3afa762d29fe2eb206139365d
SHA16a1dfbde4bdbed7d1598f3e21312abb7f915c5ce
SHA2562ed3aa7a94b980040708beeaf6e801d992e21ee28d5d69786d0d67e30d6d95ff
SHA512765fee58bb218b7d5216feca5232192fbaa7774233fbea6a7014b9bb31dede270bb6edfae38001d5452575990cb9df11a3c4b136e21305f5bf30ea1c8b20efdb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD50bb0d0ac28465a6aa5ce469e1ec0b734
SHA1cb86723b07864f1f11886aa1a34479ec8b1ea7cd
SHA2566158005609a2a7649d363e481ae1eb361b81464b8d48d65ac64dcb2756aa32e9
SHA512fd9ba63d182ce152ad135842e5664bc96480515869a2151afa489254383e5f742cf2f7c6da83a5d0fbc0a3e1f16c36fd3126c07b60d435caa2d40dd5b0105a9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD539a2bfa24a4c1af09b196929a0b1fa44
SHA1bf9a6994dc95896d417bf1627f2623e09094c82f
SHA2560dc4b3616e25ae694518099c50c8db34b9a9ecca9c3c53a9927c52dcae793ecb
SHA5124dfef1d7549198ba831b274e57c2c8177cff63666c3a0c2249eed18a41d1e57e653c6b96b3ad2c6986ef159f819f14729fff10477295a2f9f73a85f77ff3252e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5ef053d5f927401bb5657f66c29b3e231
SHA16212bc4d327b4661175e5d306f75e576146ed8cd
SHA256408199e6dd81cb3b71088f0035b441ccd6edffc9a5ce9a6f4cb925283b9bc60c
SHA512d7dc272c5ac6d87bee8e8bc06eaecbce4e19a7158649581d5fd3e0255a0bab8c6dfa9c1003385728993beecb66175fd722ac82ecc0d7243611cd914ece5cea79
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\pending_pings\638f21b0-8b28-4fdc-95f1-d74d67bde805
Filesize982B
MD5a171573ba0cd990afeab8d4e8c67b2f3
SHA1959480574c9810e551c53c1c5e9acc9f4975d15a
SHA256898fded9d262220ff9877f7655b20249c147f20442759255e650380ca70f0d1d
SHA512591e1dfc1b974947751a51898dac373a90d080e8febfbce1a3aef33bd1a702e89f0008910c44242e2d7c1e5c11ee7307e015b0363fd4757be091c0eb5c6cd6d4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\pending_pings\d6e768a8-7c61-4a03-b1d6-5cde16f12f51
Filesize671B
MD5e362ed7703bc335a3bc984dc55ab2baa
SHA1d7e8730447ccf8fb3a1971499fd15b58d7ecfcc3
SHA256832f49aa0419ea258c4e653d2ef1d60671ec6ad9bc4b465aa29fc09a295bb1a2
SHA512a2df42224474e89f08f1113acd980808cdec30546079df54f30be2928a0b93589e2b6459b272e6c9c4f8778f3413766209473ffe47ec45be6dc37909b8bf6b92
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\pending_pings\fe35b890-0c53-40f9-bd20-e38df85b8eaa
Filesize25KB
MD5b56f64f4c6d30ee1e0bf72fa329fb817
SHA1cd365abe7ff190eb4a40ba17b66d5addf4f89701
SHA256093b9764fc93edb778a2c352c1fe4b482025893ecdd4ce81f7639140497b7f50
SHA5126029819be5921d4627237dc22cbcf13303d045ecc95aed7131941561189bb9c714de2b79034afd71696ef17249345663789368857a006ace7315843045ef44d6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
15KB
MD5cb520b491e86f4528d1241d4caef46bb
SHA1b187c3e83b2a3be15456380fb9104af407f288d5
SHA2563b235b5de5ed042488e709ea436c2dba1e781785a1c6aa37641db7a500a922d3
SHA5124b7406dfa93324adf9c9b38e2f3bed289d9d67a90dfa2fbecadb8f455982a67d8a8e3876caa312b5fc7ed6fc3806d2ecb87a279e0a6edcee5f524f95ea218805
-
Filesize
10KB
MD5a659c55f28fa7e1836376a1385b6fa8a
SHA1abea3ab3285c5d99fb227fc6b1080b3787fdba9b
SHA2562da33bfa7c0d20ef8d2e07d0b61d380216b6abc67a888893c6610c74f1d510d1
SHA5126a77121c2079e37eef418e0b7f78313589770b8b5b85ae6ae468c756773e6a8f34cad8b92b1b26d6f6f64d27331c9ebdf592ad6302eb24d6728b4c7562815e99
-
Filesize
11KB
MD5dbad3ddebc512e896d1ca85bdbaa51a1
SHA1c00117e0c5f3ab7dbf5579b899c496f6a7cb78c1
SHA256f4c6888448bb919ec6877bc6cb2b79f15cd205ed36914278e5f38dec425ab97b
SHA51219ea908bcecef113552952fbb0f486e484c10753d2287b110be18a969548dcc0f453087f9a08689b86c877fcc94576b3f0c834f2819c1324755b1d134bd6cde7
-
Filesize
11KB
MD5d89d434db04e4da71ee21783d5fb02bb
SHA10b5b66314992a8c8167bf62ab5a9699bde97472b
SHA25606f5609385e0d3c0d16211a5968f0df08bdc85e9f51279a45490310870c5d991
SHA512c203f29734aa8300458d6ff370cce9fc03e2e49ea32bbca76f666ae38f543ae521d8a674a2b2e15074b2bc2d7f1459f549ee5bdb502b9dd354d1fcbd76fa4079
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize2.1MB
MD5befaff1dd98ff2ca88ca4693e083f664
SHA1e5898798312dc56799eebd53884cb709f9e91598
SHA256e2be0468789c7d1898e9231be79c0ec033fc261a28078f536a9befdf25784dfc
SHA5121dec8213d08ddfa3df8503ab4e1027dd3588bb1a62b76360ff6a9d5ef9d80f213c9e1af35df1544da4c7375aa0cf133835ec734adad5b712bf1af0f3a21acc58
-
Filesize
144KB
MD5cc36e2a5a3c64941a79c31ca320e9797
SHA150c8f5db809cfec84735c9f4dcd6b55d53dfd9f5
SHA2566fec179c363190199c1dcdf822be4d6b1f5c4895ebc7148a8fc9fa9512eeade8
SHA512fcea6d62dc047e40182dc4ff1e0522ca935f9aeefdb1517957977bc5d9ac654285a973261401f3b98abf1f6ed62638b9e31306fd7aaeb67214ca42dfc2888af0
-
Filesize
1.0MB
MD5971b0519b1c0461db6700610e5e9ca8e
SHA19a262218310f976aaf837e54b4842e53e73be088
SHA25647cf75570c1eca775b2dd1823233d7c40924d3a8d93e0e78c943219cf391d023
SHA512d234a9c5a1da8415cd4d2626797197039f2537e98f8f43d155f815a7867876cbc1bf466be58677c79a9199ea47d146a174998d21ef0aebc29a4b0443f8857cb9