Analysis
-
max time kernel
142s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-12-2024 02:12
Static task
static1
General
-
Target
file.exe
-
Size
2.9MB
-
MD5
3799f4f2cfc27184ce70913f4ec3a8be
-
SHA1
4424871cdfd4f9b4fb1039049a75844401a7c358
-
SHA256
f95df3026cf4edcc3d334bfc20d188de06ea4e4497e94c63504b2b783dc3e55e
-
SHA512
f38b986c639eb2c676e0ecd9316cea437934550d772f5494e2589626e826a5d23954398c3e4eb4584594e5e6cbea28ffe195bea27d2674f1a8119ca14ee869a0
-
SSDEEP
49152:HPwL/gU97fpS9iZXovvQyWVkeRJFm0w7KwKz:vwLY47fpkyYvv7sbP
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Detect Vidar Stealer 7 IoCs
resource yara_rule behavioral2/files/0x0009000000023ce7-287.dat family_vidar_v7 behavioral2/memory/4656-292-0x0000000000400000-0x0000000000639000-memory.dmp family_vidar_v7 behavioral2/memory/4656-382-0x0000000000400000-0x0000000000639000-memory.dmp family_vidar_v7 behavioral2/memory/3272-1215-0x0000000004670000-0x00000000048A9000-memory.dmp family_vidar_v7 behavioral2/memory/3272-1214-0x0000000004670000-0x00000000048A9000-memory.dmp family_vidar_v7 behavioral2/memory/3272-1216-0x0000000004670000-0x00000000048A9000-memory.dmp family_vidar_v7 behavioral2/memory/3272-1217-0x0000000004670000-0x00000000048A9000-memory.dmp family_vidar_v7 -
Gcleaner family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" ce6b19a271.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" ce6b19a271.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" ce6b19a271.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection ce6b19a271.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" ce6b19a271.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" ce6b19a271.exe -
Stealc family
-
Vidar family
-
Xmrig family
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF ade80cf79c.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b320a517b3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ce6b19a271.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1b1549a0d7.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 38ae04300a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0a920b9fa4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ade80cf79c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 716547c2a3.exe -
XMRig Miner payload 10 IoCs
resource yara_rule behavioral2/memory/5236-1058-0x0000000140000000-0x0000000140770000-memory.dmp xmrig behavioral2/memory/5236-1059-0x0000000140000000-0x0000000140770000-memory.dmp xmrig behavioral2/memory/5236-1060-0x0000000140000000-0x0000000140770000-memory.dmp xmrig behavioral2/memory/5236-1061-0x0000000140000000-0x0000000140770000-memory.dmp xmrig behavioral2/memory/5236-1062-0x0000000140000000-0x0000000140770000-memory.dmp xmrig behavioral2/memory/5236-1063-0x0000000140000000-0x0000000140770000-memory.dmp xmrig behavioral2/memory/5236-1064-0x0000000140000000-0x0000000140770000-memory.dmp xmrig behavioral2/memory/5236-1066-0x0000000140000000-0x0000000140770000-memory.dmp xmrig behavioral2/memory/5236-1068-0x0000000140000000-0x0000000140770000-memory.dmp xmrig behavioral2/memory/5236-1072-0x0000000140000000-0x0000000140770000-memory.dmp xmrig -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 5000 powershell.exe 3996 powershell.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 22 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1b1549a0d7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 38ae04300a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ce6b19a271.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b320a517b3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ade80cf79c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0a920b9fa4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 716547c2a3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b320a517b3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1b1549a0d7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 38ae04300a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0a920b9fa4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ade80cf79c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 716547c2a3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ce6b19a271.exe -
Checks computer location settings 2 TTPs 8 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation e4de9639c0.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 3adabb77e5c24427832595ffdb82d433.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation c3f26e2efb8a49ebb765651366a4dc8c.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 97906711fe.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation Dry.com Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation file.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 8866be2ee2.exe -
Executes dropped EXE 34 IoCs
pid Process 2248 skotes.exe 4512 ade80cf79c.exe 1464 a287a5a4b9.exe 2084 8866be2ee2.exe 2688 7z.exe 2188 7z.exe 2324 e4de9639c0.exe 2292 7z.exe 2784 7z.exe 2364 7z.exe 1944 7z.exe 2060 7z.exe 208 7z.exe 1300 in.exe 2060 716547c2a3.exe 4656 c3f26e2efb8a49ebb765651366a4dc8c.exe 2768 3adabb77e5c24427832595ffdb82d433.exe 4456 b320a517b3.exe 2948 1b1549a0d7.exe 5992 38ae04300a.exe 5856 b9e4a5752e.exe 5792 ce6b19a271.exe 3056 skotes.exe 228 Intel_PTT_EK_Recertification.exe 4460 0a920b9fa4.exe 5868 76672d74e8.exe 3252 76672d74e8.exe 2784 97906711fe.exe 3272 Dry.com 5496 119a3a67c9.exe 924 119a3a67c9.exe 4284 119a3a67c9.exe 6340 skotes.exe 6196 Intel_PTT_EK_Recertification.exe -
Identifies Wine through registry keys 2 TTPs 11 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine file.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 38ae04300a.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 0a920b9fa4.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine ade80cf79c.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 716547c2a3.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine b320a517b3.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 1b1549a0d7.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine ce6b19a271.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe -
Loads dropped DLL 8 IoCs
pid Process 2688 7z.exe 2188 7z.exe 2292 7z.exe 2784 7z.exe 2364 7z.exe 1944 7z.exe 2060 7z.exe 208 7z.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features ce6b19a271.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" ce6b19a271.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ce6b19a271.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1019034001\\ce6b19a271.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\1b1549a0d7.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1019031001\\1b1549a0d7.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\38ae04300a.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1019032001\\38ae04300a.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b9e4a5752e.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1019033001\\b9e4a5752e.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 67 raw.githubusercontent.com 69 raw.githubusercontent.com 70 raw.githubusercontent.com -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000023dbd-660.dat autoit_exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 2952 tasklist.exe 2372 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
pid Process 2652 file.exe 2248 skotes.exe 4512 ade80cf79c.exe 2060 716547c2a3.exe 4456 b320a517b3.exe 2948 1b1549a0d7.exe 5992 38ae04300a.exe 5792 ce6b19a271.exe 3056 skotes.exe 4460 0a920b9fa4.exe 6340 skotes.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 228 set thread context of 5236 228 Intel_PTT_EK_Recertification.exe 175 PID 5868 set thread context of 3252 5868 76672d74e8.exe 182 PID 5496 set thread context of 4284 5496 119a3a67c9.exe 204 PID 6196 set thread context of 6536 6196 Intel_PTT_EK_Recertification.exe 207 -
resource yara_rule behavioral2/files/0x0007000000023ce9-178.dat upx behavioral2/memory/1300-181-0x00007FF7768D0000-0x00007FF776D60000-memory.dmp upx behavioral2/memory/228-1056-0x00007FF7EC260000-0x00007FF7EC6F0000-memory.dmp upx behavioral2/memory/228-1070-0x00007FF7EC260000-0x00007FF7EC6F0000-memory.dmp upx behavioral2/memory/6196-3418-0x00007FF7EC260000-0x00007FF7EC6F0000-memory.dmp upx -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\CommunityProduction 97906711fe.exe File opened for modification C:\Windows\ExtractNicholas 97906711fe.exe File created C:\Windows\Tasks\skotes.job file.exe File opened for modification C:\Windows\MpForgotten 97906711fe.exe File opened for modification C:\Windows\TabletAction 97906711fe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5800 4456 WerFault.exe 126 -
System Location Discovery: System Language Discovery 1 TTPs 42 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a287a5a4b9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language b9e4a5752e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dry.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8866be2ee2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c3f26e2efb8a49ebb765651366a4dc8c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1b1549a0d7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0a920b9fa4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 716547c2a3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 119a3a67c9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ade80cf79c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ce6b19a271.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 76672d74e8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b320a517b3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 38ae04300a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b9e4a5752e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 76672d74e8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 119a3a67c9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e4de9639c0.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage b9e4a5752e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 97906711fe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 6 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4364 powershell.exe 3056 PING.EXE 2728 powershell.exe 2056 PING.EXE 7308 powershell.exe 7460 PING.EXE -
Checks processor information in registry 2 TTPs 12 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Dry.com Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString c3f26e2efb8a49ebb765651366a4dc8c.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Dry.com Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 c3f26e2efb8a49ebb765651366a4dc8c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 3944 timeout.exe 4676 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Kills process with taskkill 5 IoCs
pid Process 412 taskkill.exe 5896 taskkill.exe 5972 taskkill.exe 6064 taskkill.exe 6136 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings firefox.exe -
Runs ping.exe 1 TTPs 3 IoCs
pid Process 3056 PING.EXE 2056 PING.EXE 7460 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2808 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2652 file.exe 2652 file.exe 2248 skotes.exe 2248 skotes.exe 4512 ade80cf79c.exe 4512 ade80cf79c.exe 4512 ade80cf79c.exe 4512 ade80cf79c.exe 4512 ade80cf79c.exe 4512 ade80cf79c.exe 4512 ade80cf79c.exe 4512 ade80cf79c.exe 4512 ade80cf79c.exe 4512 ade80cf79c.exe 1464 a287a5a4b9.exe 1464 a287a5a4b9.exe 1464 a287a5a4b9.exe 2324 e4de9639c0.exe 2324 e4de9639c0.exe 4364 powershell.exe 4364 powershell.exe 4364 powershell.exe 5000 powershell.exe 5000 powershell.exe 5000 powershell.exe 3996 powershell.exe 3996 powershell.exe 2060 716547c2a3.exe 2060 716547c2a3.exe 4456 b320a517b3.exe 4456 b320a517b3.exe 4656 c3f26e2efb8a49ebb765651366a4dc8c.exe 4656 c3f26e2efb8a49ebb765651366a4dc8c.exe 912 msedge.exe 912 msedge.exe 3548 msedge.exe 3548 msedge.exe 2948 1b1549a0d7.exe 2948 1b1549a0d7.exe 5160 identity_helper.exe 5160 identity_helper.exe 5992 38ae04300a.exe 5992 38ae04300a.exe 5856 b9e4a5752e.exe 5856 b9e4a5752e.exe 5792 ce6b19a271.exe 5792 ce6b19a271.exe 5856 b9e4a5752e.exe 5856 b9e4a5752e.exe 5792 ce6b19a271.exe 5792 ce6b19a271.exe 5792 ce6b19a271.exe 3056 skotes.exe 3056 skotes.exe 228 Intel_PTT_EK_Recertification.exe 2728 powershell.exe 2728 powershell.exe 2728 powershell.exe 4460 0a920b9fa4.exe 4460 0a920b9fa4.exe 3272 Dry.com 3272 Dry.com 3272 Dry.com 3272 Dry.com -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe -
Suspicious use of AdjustPrivilegeToken 53 IoCs
description pid Process Token: SeRestorePrivilege 2688 7z.exe Token: 35 2688 7z.exe Token: SeSecurityPrivilege 2688 7z.exe Token: SeSecurityPrivilege 2688 7z.exe Token: SeRestorePrivilege 2188 7z.exe Token: 35 2188 7z.exe Token: SeSecurityPrivilege 2188 7z.exe Token: SeSecurityPrivilege 2188 7z.exe Token: SeRestorePrivilege 2292 7z.exe Token: 35 2292 7z.exe Token: SeSecurityPrivilege 2292 7z.exe Token: SeSecurityPrivilege 2292 7z.exe Token: SeRestorePrivilege 2784 7z.exe Token: 35 2784 7z.exe Token: SeSecurityPrivilege 2784 7z.exe Token: SeSecurityPrivilege 2784 7z.exe Token: SeRestorePrivilege 2364 7z.exe Token: 35 2364 7z.exe Token: SeSecurityPrivilege 2364 7z.exe Token: SeSecurityPrivilege 2364 7z.exe Token: SeRestorePrivilege 1944 7z.exe Token: 35 1944 7z.exe Token: SeSecurityPrivilege 1944 7z.exe Token: SeSecurityPrivilege 1944 7z.exe Token: SeRestorePrivilege 2060 7z.exe Token: 35 2060 7z.exe Token: SeSecurityPrivilege 2060 7z.exe Token: SeSecurityPrivilege 2060 7z.exe Token: SeRestorePrivilege 208 7z.exe Token: 35 208 7z.exe Token: SeSecurityPrivilege 208 7z.exe Token: SeSecurityPrivilege 208 7z.exe Token: SeDebugPrivilege 2324 e4de9639c0.exe Token: SeDebugPrivilege 4364 powershell.exe Token: SeDebugPrivilege 5000 powershell.exe Token: SeDebugPrivilege 3996 powershell.exe Token: SeDebugPrivilege 2768 3adabb77e5c24427832595ffdb82d433.exe Token: SeDebugPrivilege 412 taskkill.exe Token: SeDebugPrivilege 5896 taskkill.exe Token: SeDebugPrivilege 5972 taskkill.exe Token: SeDebugPrivilege 6064 taskkill.exe Token: SeDebugPrivilege 6136 taskkill.exe Token: SeDebugPrivilege 5552 firefox.exe Token: SeDebugPrivilege 5552 firefox.exe Token: SeDebugPrivilege 5792 ce6b19a271.exe Token: SeLockMemoryPrivilege 5236 explorer.exe Token: SeDebugPrivilege 2728 powershell.exe Token: SeDebugPrivilege 2952 tasklist.exe Token: SeDebugPrivilege 2372 tasklist.exe Token: SeDebugPrivilege 5496 119a3a67c9.exe Token: SeDebugPrivilege 4284 119a3a67c9.exe Token: SeLockMemoryPrivilege 6536 explorer.exe Token: SeDebugPrivilege 7308 powershell.exe -
Suspicious use of FindShellTrayWindow 61 IoCs
pid Process 2652 file.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 5856 b9e4a5752e.exe 5856 b9e4a5752e.exe 5856 b9e4a5752e.exe 5856 b9e4a5752e.exe 5856 b9e4a5752e.exe 5856 b9e4a5752e.exe 5856 b9e4a5752e.exe 5552 firefox.exe 5552 firefox.exe 5552 firefox.exe 5552 firefox.exe 5552 firefox.exe 5552 firefox.exe 5552 firefox.exe 5552 firefox.exe 5552 firefox.exe 5552 firefox.exe 5552 firefox.exe 5552 firefox.exe 5552 firefox.exe 5552 firefox.exe 5552 firefox.exe 5552 firefox.exe 5552 firefox.exe 5552 firefox.exe 5552 firefox.exe 5552 firefox.exe 5552 firefox.exe 5856 b9e4a5752e.exe 5856 b9e4a5752e.exe 5856 b9e4a5752e.exe 5856 b9e4a5752e.exe 3272 Dry.com 3272 Dry.com 3272 Dry.com -
Suspicious use of SendNotifyMessage 58 IoCs
pid Process 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 5856 b9e4a5752e.exe 5856 b9e4a5752e.exe 5856 b9e4a5752e.exe 5856 b9e4a5752e.exe 5856 b9e4a5752e.exe 5856 b9e4a5752e.exe 5856 b9e4a5752e.exe 5552 firefox.exe 5552 firefox.exe 5552 firefox.exe 5552 firefox.exe 5552 firefox.exe 5552 firefox.exe 5552 firefox.exe 5552 firefox.exe 5552 firefox.exe 5552 firefox.exe 5552 firefox.exe 5552 firefox.exe 5552 firefox.exe 5552 firefox.exe 5552 firefox.exe 5552 firefox.exe 5552 firefox.exe 5552 firefox.exe 5552 firefox.exe 5552 firefox.exe 5856 b9e4a5752e.exe 5856 b9e4a5752e.exe 5856 b9e4a5752e.exe 5856 b9e4a5752e.exe 3272 Dry.com 3272 Dry.com 3272 Dry.com -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5552 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2652 wrote to memory of 2248 2652 file.exe 82 PID 2652 wrote to memory of 2248 2652 file.exe 82 PID 2652 wrote to memory of 2248 2652 file.exe 82 PID 2248 wrote to memory of 4512 2248 skotes.exe 87 PID 2248 wrote to memory of 4512 2248 skotes.exe 87 PID 2248 wrote to memory of 4512 2248 skotes.exe 87 PID 2248 wrote to memory of 1464 2248 skotes.exe 89 PID 2248 wrote to memory of 1464 2248 skotes.exe 89 PID 2248 wrote to memory of 1464 2248 skotes.exe 89 PID 2248 wrote to memory of 2084 2248 skotes.exe 92 PID 2248 wrote to memory of 2084 2248 skotes.exe 92 PID 2248 wrote to memory of 2084 2248 skotes.exe 92 PID 2084 wrote to memory of 3740 2084 8866be2ee2.exe 93 PID 2084 wrote to memory of 3740 2084 8866be2ee2.exe 93 PID 3740 wrote to memory of 5032 3740 cmd.exe 95 PID 3740 wrote to memory of 5032 3740 cmd.exe 95 PID 3740 wrote to memory of 2688 3740 cmd.exe 96 PID 3740 wrote to memory of 2688 3740 cmd.exe 96 PID 3740 wrote to memory of 2188 3740 cmd.exe 97 PID 3740 wrote to memory of 2188 3740 cmd.exe 97 PID 2248 wrote to memory of 2324 2248 skotes.exe 98 PID 2248 wrote to memory of 2324 2248 skotes.exe 98 PID 2248 wrote to memory of 2324 2248 skotes.exe 98 PID 3740 wrote to memory of 2292 3740 cmd.exe 100 PID 3740 wrote to memory of 2292 3740 cmd.exe 100 PID 3740 wrote to memory of 2784 3740 cmd.exe 101 PID 3740 wrote to memory of 2784 3740 cmd.exe 101 PID 3740 wrote to memory of 2364 3740 cmd.exe 102 PID 3740 wrote to memory of 2364 3740 cmd.exe 102 PID 3740 wrote to memory of 1944 3740 cmd.exe 103 PID 3740 wrote to memory of 1944 3740 cmd.exe 103 PID 3740 wrote to memory of 2060 3740 cmd.exe 104 PID 3740 wrote to memory of 2060 3740 cmd.exe 104 PID 3740 wrote to memory of 208 3740 cmd.exe 105 PID 3740 wrote to memory of 208 3740 cmd.exe 105 PID 3740 wrote to memory of 4560 3740 cmd.exe 106 PID 3740 wrote to memory of 4560 3740 cmd.exe 106 PID 3740 wrote to memory of 1300 3740 cmd.exe 107 PID 3740 wrote to memory of 1300 3740 cmd.exe 107 PID 1300 wrote to memory of 2948 1300 in.exe 108 PID 1300 wrote to memory of 2948 1300 in.exe 108 PID 1300 wrote to memory of 1848 1300 in.exe 109 PID 1300 wrote to memory of 1848 1300 in.exe 109 PID 1300 wrote to memory of 2808 1300 in.exe 110 PID 1300 wrote to memory of 2808 1300 in.exe 110 PID 1300 wrote to memory of 4364 1300 in.exe 111 PID 1300 wrote to memory of 4364 1300 in.exe 111 PID 4364 wrote to memory of 3056 4364 powershell.exe 116 PID 4364 wrote to memory of 3056 4364 powershell.exe 116 PID 2324 wrote to memory of 5000 2324 e4de9639c0.exe 117 PID 2324 wrote to memory of 5000 2324 e4de9639c0.exe 117 PID 2324 wrote to memory of 5000 2324 e4de9639c0.exe 117 PID 2324 wrote to memory of 3996 2324 e4de9639c0.exe 119 PID 2324 wrote to memory of 3996 2324 e4de9639c0.exe 119 PID 2324 wrote to memory of 3996 2324 e4de9639c0.exe 119 PID 2248 wrote to memory of 2060 2248 skotes.exe 122 PID 2248 wrote to memory of 2060 2248 skotes.exe 122 PID 2248 wrote to memory of 2060 2248 skotes.exe 122 PID 2324 wrote to memory of 4656 2324 e4de9639c0.exe 123 PID 2324 wrote to memory of 4656 2324 e4de9639c0.exe 123 PID 2324 wrote to memory of 4656 2324 e4de9639c0.exe 123 PID 2324 wrote to memory of 2768 2324 e4de9639c0.exe 124 PID 2324 wrote to memory of 2768 2324 e4de9639c0.exe 124 PID 2248 wrote to memory of 4456 2248 skotes.exe 126 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 3 IoCs
pid Process 1848 attrib.exe 2948 attrib.exe 4560 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\1019025001\ade80cf79c.exe"C:\Users\Admin\AppData\Local\Temp\1019025001\ade80cf79c.exe"3⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4512
-
-
C:\Users\Admin\AppData\Local\Temp\1019026001\a287a5a4b9.exe"C:\Users\Admin\AppData\Local\Temp\1019026001\a287a5a4b9.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1464
-
-
C:\Users\Admin\AppData\Local\Temp\1019027001\8866be2ee2.exe"C:\Users\Admin\AppData\Local\Temp\1019027001\8866be2ee2.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"4⤵
- Suspicious use of WriteProcessMemory
PID:3740 -
C:\Windows\system32\mode.commode 65,105⤵PID:5032
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e file.zip -p24291711423417250691697322505 -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2688
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_7.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2188
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_6.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2292
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_5.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2784
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_4.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2364
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_3.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1944
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_2.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2060
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_1.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:208
-
-
C:\Windows\system32\attrib.exeattrib +H "in.exe"5⤵
- Views/modifies file attributes
PID:4560
-
-
C:\Users\Admin\AppData\Local\Temp\main\in.exe"in.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Windows\SYSTEM32\attrib.exeattrib +H +S C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe6⤵
- Views/modifies file attributes
PID:2948
-
-
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe6⤵
- Views/modifies file attributes
PID:1848
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /f /CREATE /TN "Intel_PTT_EK_Recertification" /TR "C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe" /SC MINUTE6⤵
- Scheduled Task/Job: Scheduled Task
PID:2808
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell ping 127.0.0.1; del in.exe6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Windows\system32\PING.EXE"C:\Windows\system32\PING.EXE" 127.0.0.17⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3056
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1019028001\e4de9639c0.exe"C:\Users\Admin\AppData\Local\Temp\1019028001\e4de9639c0.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath "C:\ehknrx"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5000
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3996
-
-
C:\ehknrx\c3f26e2efb8a49ebb765651366a4dc8c.exe"C:\ehknrx\c3f26e2efb8a49ebb765651366a4dc8c.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4656 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\ehknrx\c3f26e2efb8a49ebb765651366a4dc8c.exe" & rd /s /q "C:\ProgramData\689H4O89RQIM" & exit5⤵
- System Location Discovery: System Language Discovery
PID:468 -
C:\Windows\SysWOW64\timeout.exetimeout /t 106⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:3944
-
-
-
-
C:\ehknrx\3adabb77e5c24427832595ffdb82d433.exe"C:\ehknrx\3adabb77e5c24427832595ffdb82d433.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2768 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://apps.microsoft.com/store/detail/9MSZ40SLW145?ocid=&referrer=psi5⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3548 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd308746f8,0x7ffd30874708,0x7ffd308747186⤵PID:2392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,18264414327894472155,12794028122600100734,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:26⤵PID:1160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,18264414327894472155,12794028122600100734,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:36⤵
- Suspicious behavior: EnumeratesProcesses
PID:912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,18264414327894472155,12794028122600100734,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2724 /prefetch:86⤵PID:824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,18264414327894472155,12794028122600100734,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:16⤵PID:1448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,18264414327894472155,12794028122600100734,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:16⤵PID:228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,18264414327894472155,12794028122600100734,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5292 /prefetch:86⤵PID:1592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,18264414327894472155,12794028122600100734,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5292 /prefetch:86⤵
- Suspicious behavior: EnumeratesProcesses
PID:5160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,18264414327894472155,12794028122600100734,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5376 /prefetch:16⤵PID:5172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,18264414327894472155,12794028122600100734,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:16⤵PID:5180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,18264414327894472155,12794028122600100734,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5592 /prefetch:16⤵PID:5632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,18264414327894472155,12794028122600100734,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4120 /prefetch:16⤵PID:5640
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1019029001\716547c2a3.exe"C:\Users\Admin\AppData\Local\Temp\1019029001\716547c2a3.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2060
-
-
C:\Users\Admin\AppData\Local\Temp\1019030001\b320a517b3.exe"C:\Users\Admin\AppData\Local\Temp\1019030001\b320a517b3.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4456 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4456 -s 6444⤵
- Program crash
PID:5800
-
-
-
C:\Users\Admin\AppData\Local\Temp\1019031001\1b1549a0d7.exe"C:\Users\Admin\AppData\Local\Temp\1019031001\1b1549a0d7.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2948
-
-
C:\Users\Admin\AppData\Local\Temp\1019032001\38ae04300a.exe"C:\Users\Admin\AppData\Local\Temp\1019032001\38ae04300a.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5992
-
-
C:\Users\Admin\AppData\Local\Temp\1019033001\b9e4a5752e.exe"C:\Users\Admin\AppData\Local\Temp\1019033001\b9e4a5752e.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5856 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:412
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5896
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5972
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6064
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6136
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:5536
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:5552 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2032 -parentBuildID 20240401114208 -prefsHandle 1960 -prefMapHandle 1952 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {888f0300-cfa7-447f-b759-c9a89c18e1b0} 5552 "\\.\pipe\gecko-crash-server-pipe.5552" gpu6⤵PID:5788
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2468 -parentBuildID 20240401114208 -prefsHandle 2444 -prefMapHandle 2440 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3833f186-79e3-4c10-a8ab-eab79693c031} 5552 "\\.\pipe\gecko-crash-server-pipe.5552" socket6⤵PID:5348
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3192 -childID 1 -isForBrowser -prefsHandle 3388 -prefMapHandle 3464 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1264 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {31320c59-4578-4144-94a9-c96dcfaa110d} 5552 "\\.\pipe\gecko-crash-server-pipe.5552" tab6⤵PID:5948
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3876 -childID 2 -isForBrowser -prefsHandle 3416 -prefMapHandle 3412 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1264 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {67517997-2f6d-4b91-99b1-bcade0537b04} 5552 "\\.\pipe\gecko-crash-server-pipe.5552" tab6⤵PID:3996
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4308 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4320 -prefMapHandle 4312 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ab76425d-5205-46c6-8c69-de2d6b72547e} 5552 "\\.\pipe\gecko-crash-server-pipe.5552" utility6⤵
- Checks processor information in registry
PID:5660
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5780 -childID 3 -isForBrowser -prefsHandle 5776 -prefMapHandle 5772 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1264 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6bcd189e-2580-477a-b91e-b8a04d129476} 5552 "\\.\pipe\gecko-crash-server-pipe.5552" tab6⤵PID:5852
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5960 -childID 4 -isForBrowser -prefsHandle 5880 -prefMapHandle 5884 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1264 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {63d9d582-67cb-4874-ba18-a44e3e0eff13} 5552 "\\.\pipe\gecko-crash-server-pipe.5552" tab6⤵PID:5344
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6080 -childID 5 -isForBrowser -prefsHandle 6088 -prefMapHandle 6092 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1264 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {400fbab8-e8ed-4e46-a5b1-389e1790a816} 5552 "\\.\pipe\gecko-crash-server-pipe.5552" tab6⤵PID:5884
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1019034001\ce6b19a271.exe"C:\Users\Admin\AppData\Local\Temp\1019034001\ce6b19a271.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5792
-
-
C:\Users\Admin\AppData\Local\Temp\1019035001\0a920b9fa4.exe"C:\Users\Admin\AppData\Local\Temp\1019035001\0a920b9fa4.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4460
-
-
C:\Users\Admin\AppData\Local\Temp\1019036001\76672d74e8.exe"C:\Users\Admin\AppData\Local\Temp\1019036001\76672d74e8.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5868 -
C:\Users\Admin\AppData\Local\Temp\1019036001\76672d74e8.exe"C:\Users\Admin\AppData\Local\Temp\1019036001\76672d74e8.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3252
-
-
-
C:\Users\Admin\AppData\Local\Temp\1019037001\97906711fe.exe"C:\Users\Admin\AppData\Local\Temp\1019037001\97906711fe.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2784 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c move App App.cmd & App.cmd4⤵
- System Location Discovery: System Language Discovery
PID:5752 -
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2952
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"5⤵
- System Location Discovery: System Language Discovery
PID:1216
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2372
-
-
C:\Windows\SysWOW64\findstr.exefindstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"5⤵
- System Location Discovery: System Language Discovery
PID:664
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 2453475⤵
- System Location Discovery: System Language Discovery
PID:4328
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "profiles" Organizing5⤵
- System Location Discovery: System Language Discovery
PID:3648
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Judy + ..\Sheets + ..\Another + ..\Wanting b5⤵
- System Location Discovery: System Language Discovery
PID:3124
-
-
C:\Users\Admin\AppData\Local\Temp\245347\Dry.comDry.com b5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3272 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\245347\Dry.com" & rd /s /q "C:\ProgramData\GDT0R9H4EU37" & exit6⤵
- System Location Discovery: System Language Discovery
PID:1656 -
C:\Windows\SysWOW64\timeout.exetimeout /t 107⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4676
-
-
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 55⤵
- System Location Discovery: System Language Discovery
PID:4472
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1019038001\119a3a67c9.exe"C:\Users\Admin\AppData\Local\Temp\1019038001\119a3a67c9.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5496 -
C:\Users\Admin\AppData\Local\Temp\1019038001\119a3a67c9.exe"C:\Users\Admin\AppData\Local\Temp\1019038001\119a3a67c9.exe"4⤵
- Executes dropped EXE
PID:924
-
-
C:\Users\Admin\AppData\Local\Temp\1019038001\119a3a67c9.exe"C:\Users\Admin\AppData\Local\Temp\1019038001\119a3a67c9.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4284
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1644
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2148
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3056
-
C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exeC:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:228 -
C:\Windows\explorer.exeexplorer.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:5236
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell ping 127.1.10.1; del Intel_PTT_EK_Recertification.exe2⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2728 -
C:\Windows\system32\PING.EXE"C:\Windows\system32\PING.EXE" 127.1.10.13⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2056
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4456 -ip 44561⤵PID:5780
-
C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exeC:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:6196 -
C:\Windows\explorer.exeexplorer.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:6536
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell ping 127.1.10.1; del Intel_PTT_EK_Recertification.exe2⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of AdjustPrivilegeToken
PID:7308 -
C:\Windows\system32\PING.EXE"C:\Windows\system32\PING.EXE" 127.1.10.13⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:7460
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6340
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
3Discovery
Browser Information Discovery
1Process Discovery
1Query Registry
9Remote System Discovery
1System Information Discovery
5System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
Filesize
152B
MD5a0486d6f8406d852dd805b66ff467692
SHA177ba1f63142e86b21c951b808f4bc5d8ed89b571
SHA256c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be
SHA512065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a
-
Filesize
152B
MD5dc058ebc0f8181946a312f0be99ed79c
SHA10c6f376ed8f2d4c275336048c7c9ef9edf18bff0
SHA256378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a
SHA51236e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa
-
Filesize
6KB
MD5b9ce6074046f07121f486310f2545c51
SHA1ad740f35ec28d87aee2dfb6bc5818e9ac234a48b
SHA2564624e03fe1ad1bb51490e53e8ddf371ce0d26ad1cb2ee9d2c2b434511b9a454d
SHA5129b3faba314182b079089865993b44433196bd8669aaf0b741c02573d07b933540902f9a54a44a454a547042bcd4b5b34bb13f19f7c10a0ebdb1d49c2ed591d25
-
Filesize
5KB
MD59dd6d3db1958b0a2bc70f82cbd1f7f19
SHA16bd5ee0fca2d11ba15286101f6db231cf9c200c0
SHA2564b5862e8387e1d4b334a1e60165cc288fcad4b45a1d3a39fa05deadf68923320
SHA5127d8c27398a285728e2f14d97bddb8a1901e3ddb421a5ca404671bac9e9489c920234cbe0bda6e00a1b8742d29f4e43d88d3e6a21f14f4f44bd1a00422b23841d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\a0a74304db73132d4bc12ef9404aa74f9fdeda56\index.txt
Filesize109B
MD551a4fc5336cbfb2b944f8aefeb2b91bc
SHA143c7a4a05e875140c632b930131bdd8dcf090004
SHA25669087fd8f24177259ffce09858bd1abe2d71273e79722e7cae2b44a1b7c050a8
SHA5124aaefe9d73484c981e72f1063a060cc9a75740292da6786c4220992ce96058f4da30d58223a66ea4389914e4f9187bd7128f0f58935426ed4d3e441c7c96a203
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\a0a74304db73132d4bc12ef9404aa74f9fdeda56\index.txt
Filesize204B
MD58c4ace874fc54554395006fd494bce2c
SHA16ec460ac6ae19d5de389dcbee2ce6ea4985cf6df
SHA256d411fa3e1005d51188e05f3a122b050cc4e6315be26c1bc9e2ac2f6155de204b
SHA512c46b378607ae1624ce5a476c3b5491c9f90ed47b93b6a40d07ffa137260359e826d192c084c11b606ab61aba910c38804682a7f49c2a7486902bac6e7cefd7dd
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD558b3cbc7be52e4d03a5fae0489101887
SHA1ff9f388e3cdae5906d55551bac800417d80c41b3
SHA2568ef412817b70342eacb9258398e584bf3c69bfbaf44b930dba9de420c3a08caa
SHA512b5781be4be253b3e6296a0bbc66720f4d1da98bfed0192b2bad0d93827b13a78a4d203a295ad6b97a9eccf96b6c74c1c008d30424a7aa087bdf336c73617a0c6
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
9KB
MD567d2ba539194bc075611a933c0b71a9c
SHA1d28a94e6a89aeb7ac4cce99681ad4bd82c5d2ebe
SHA2563c6d259422f7b96d3923e1c9375f9b442f1298391c2ba4cf9194646a315e48d6
SHA512c61e613a14c953cdb46e45c8d0084f52e7b6f71d9dc0321ef82410249eee9d6c6df9d9f975965d42365d93b03669038fe7f8a01e907630945396d5ead5dcae27
-
Filesize
18KB
MD5254b2a36c635eaec418d0fb85d3c8741
SHA16ee27e9298d1774dfd1e33af6f630d9123067d6c
SHA256b77e7537f95005ac889c05915d74e42422545f4db48c5409a7b30e46f48b0c14
SHA512b33ca7e6b8cc73cc89f3a2ebd69667ddc41abbf255b7c9dbcde32d8a248ecfd0508096b3aef3b87409cdf26f56d167bbda8d568fa025fdb09155a67cb1d31392
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\activity-stream.discovery_stream.json
Filesize24KB
MD5d5d031dddf047df4e47819baea659aa6
SHA12e2957a255897e096f307af544db91fbfdabc8ce
SHA2567bc543282edb0de12619d345f35ab2e3313470db8521334cf82b2ba73585ca91
SHA5120be0b947ca7a2979088d7530f2906e5084f9c1e60eb1a70141e4f2c26459f7bc8a18b7a27f17602c4e10372f9ee54b28528c03f58ebcdccd2b27eab43625daf7
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
612B
MD5e3eb0a1df437f3f97a64aca5952c8ea0
SHA17dd71afcfb14e105e80b0c0d7fce370a28a41f0a
SHA25638ffd4972ae513a0c79a8be4573403edcd709f0f572105362b08ff50cf6de521
SHA51243573b0cbaac6e2e1646e6217d2d10c40ad10b9db1f4492d6740545e793c891b5e39283a082896c0392b88eb319dfa9392421b1c89c094c9ce9f31b53d37ebaf
-
Filesize
4.3MB
MD5af683c74f40c689194acc25f6a9dffec
SHA1b3f7fd19a91ed79dcbefb82ff38d644301287bc0
SHA256ed7428ff275baf08ad7e20db9f514302495927a744613abdb77aeed0a0add3c9
SHA512bc5058bca0feeddc41dd798257991f7788ce183489ad11eef9e008c0da4a2b78bdeecf4bed86571a20ecfd23c41e7f87cad577cccad804f36dbb5c5c309c852f
-
Filesize
1.3MB
MD5669ed3665495a4a52029ff680ec8eba9
SHA17785e285365a141e307931ca4c4ef00b7ecc8986
SHA2562d2d405409b128eea72a496ccff0ed56f9ed87ee2564ae4815b4b116d4fb74d6
SHA512bedc8f7c1894fc64cdd00ebc58b434b7d931e52c198a0fa55f16f4e3d44a7dc4643eaa78ec55a43cc360571345cd71d91a64037a135663e72eed334fe77a21e6
-
Filesize
4.2MB
MD53a425626cbd40345f5b8dddd6b2b9efa
SHA17b50e108e293e54c15dce816552356f424eea97a
SHA256ba9212d2d5cd6df5eb7933fb37c1b72a648974c1730bf5c32439987558f8e8b1
SHA512a7538c6b7e17c35f053721308b8d6dc53a90e79930ff4ed5cffecaa97f4d0fbc5f9e8b59f1383d8f0699c8d4f1331f226af71d40325022d10b885606a72fe668
-
Filesize
21KB
MD504f57c6fb2b2cd8dcc4b38e4a93d4366
SHA161770495aa18d480f70b654d1f57998e5bd8c885
SHA25651e4d0cbc184b8abfa6d84e219317cf81bd542286a7cc602c87eb703a39627c2
SHA51253f95e98a5eca472ed6b1dfd6fecd1e28ea66967a1b3aa109fe911dbb935f1abf327438d4b2fe72cf7a0201281e9f56f4548f965b96e3916b9142257627e6ccd
-
Filesize
4.3MB
MD56d3d9db92d0303c635e5ee37927af3d0
SHA12503576f28631d418c634a20ee4debad8b93cf40
SHA2568b09cd26504c9b2e50c6a82a63cd41f25ef88b5d144708ebd444fef16721f4e4
SHA512249a3f1fc17ab61b9e90e985ac292ceabb80ab8ddd360b9231e125c88816a8672397c56dd03d935d81dc748296c93f3bc99bb8c45b1a816084726839954c9eaa
-
Filesize
1.8MB
MD58a1ae39fd06f240834ee7731e4470d2f
SHA1ceca8f3ca15649d9109dd3cdb5bf990478606fba
SHA256ad388620d15362f0dbd39dc6ffd7e8622155d79d36061e6ee0159158df0a4ad8
SHA512fe9d0db82058f55fabe9281e02435603c33af38c9fad5a0a6b2289ad0883d251d20cd7649ac8a97fdee30994aa77a97d69e30d7bbd3ea4080160e2504ecbcd51
-
Filesize
1.7MB
MD5c20d4e11e1046a5665d427bb4f6de39e
SHA17de8606d46b0b756d63d6adc2d906b8752cda9a5
SHA256486d1f0393573819c605e951cf677fbe4f7176b0313467f2e1716077f56c36c1
SHA512df671d80e8d17b502208c1bde7ddbf13d51bcc99f314ecafb21086c7fc8f3b70f9ca5c6b8b23721cb77da3171d0c68c59bc7f032d79da1f1ee53f5f1f5598fbd
-
Filesize
2.7MB
MD56149acb6d658fe29407a8ab94d3a0784
SHA18dda8f399536348199633f110a0c1bd46f3ca683
SHA2566e339b0795d670e0d4c8ce7fa99444538dfbe76fc5889b3d121f3d843d7dbe8c
SHA512bd9c4e5dfd3dbaf310631e75157719c823fe2718870707eedc184ee2f4e9e0bf0fda8de0fba5df0067988883914cd9387d730e7b5ccb58573cc2766ef06ffa2a
-
Filesize
946KB
MD5fb1bfbb2b0fa71f93befd137becd031b
SHA1067e74e608761765408f511db0ea7927ad898d9a
SHA256d8b3ec82006b92576468332476e7a0d0ab6666780169bbdccd3523cd04702b18
SHA5128ff15cd4d17f3ae176d664e1691f328f2571218038213573da62c1df99d9f127850008b833f45dc924b4b2cb9b9752115809500270e02060fd4de4b82c172d06
-
Filesize
2.7MB
MD5fe5bd55db7c14a3864ce057f8738ae39
SHA1c13d0a62dc8f834fdaa9e780e9258ed2f1a58eed
SHA2567d9e4af11845e1a8490a2a0d5d71670ebc3fa21b0a8f16656661396a9053cf2e
SHA512e586a3429335357307deab56ec16618935b152b1ecb5c016b29ee1f96d89456cc8805069afc63ca84da458261befe67c5204c7acd18eac5bd3d49e5c641d326c
-
Filesize
1.8MB
MD527c1f96d7e1b72b6817b6efeff037f90
SHA12972cc112fc7e20cbf5952abe07407b8c1fbb2a2
SHA256aec3ec473de321d123e939985579227ee62b53b3b3edb7ab96e2a66c17e9696d
SHA5129a31dc9945889d35aea8710df2f42806c72c422b7b5f4aa8acba6986cbd9ea6a49181a41a50ee21ccbed86cbff87c98a742e681ac3f6a87e2bd4436c9112eb32
-
Filesize
758KB
MD5afd936e441bf5cbdb858e96833cc6ed3
SHA13491edd8c7caf9ae169e21fb58bccd29d95aefef
SHA256c6491d7a6d70c7c51baca7436464667b4894e4989fa7c5e05068dde4699e1cbf
SHA512928c15a1eda602b2a66a53734f3f563ab9626882104e30ee2bf5106cfd6e08ec54f96e3063f1ab89bf13be2c8822a8419f5d8ee0a3583a4c479785226051a325
-
Filesize
842KB
MD58eb4f92605e35c57a42b0917c221d65c
SHA10e64d77ef1b917b3afe512b49710250c71369175
SHA256b57d78d93f74f7ae840ab03d3fda4f22a24ad35afcf9a53128cf82a92a67a085
SHA5124cc5db426c8de3d7afdcfa26440d5bd9a885f5148e4307b8d04c5d56c96672d5c82ed9989bf346ce7aecea07d980735c46a930b885f824ba53738ac76dbb05bf
-
Filesize
1.1MB
MD5ef08a45833a7d881c90ded1952f96cb4
SHA1f04aeeb63a1409bd916558d2c40fab8a5ed8168b
SHA25633c236dc81af2a47d595731d6fa47269b2874b281152530fdffdda9cbeb3b501
SHA51274e84f710c90121527f06d453e9286910f2e8b6ac09d2aeb4ab1f0ead23ea9b410c5d1074d8bc759bc3e766b5bc77d156756c7df093ba94093107393290ced97
-
Filesize
1KB
MD5a10f31fa140f2608ff150125f3687920
SHA1ec411cc7005aaa8e3775cf105fcd4e1239f8ed4b
SHA25628c871238311d40287c51dc09aee6510cac5306329981777071600b1112286c6
SHA512cf915fb34cd5ecfbd6b25171d6e0d3d09af2597edf29f9f24fa474685d4c5ec9bc742ade9f29abac457dd645ee955b1914a635c90af77c519d2ada895e7ecf12
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2.9MB
MD53799f4f2cfc27184ce70913f4ec3a8be
SHA14424871cdfd4f9b4fb1039049a75844401a7c358
SHA256f95df3026cf4edcc3d334bfc20d188de06ea4e4497e94c63504b2b783dc3e55e
SHA512f38b986c639eb2c676e0ecd9316cea437934550d772f5494e2589626e826a5d23954398c3e4eb4584594e5e6cbea28ffe195bea27d2674f1a8119ca14ee869a0
-
Filesize
1.6MB
MD572491c7b87a7c2dd350b727444f13bb4
SHA11e9338d56db7ded386878eab7bb44b8934ab1bc7
SHA25634ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891
SHA512583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511
-
Filesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628
-
Filesize
2.2MB
MD5579a63bebccbacab8f14132f9fc31b89
SHA1fca8a51077d352741a9c1ff8a493064ef5052f27
SHA2560ac3504d5fa0460cae3c0fd9c4b628e1a65547a60563e6d1f006d17d5a6354b0
SHA5124a58ca0f392187a483b9ef652b6e8b2e60d01daa5d331549df9f359d2c0a181e975cf9df79552e3474b9d77f8e37a1cf23725f32d4cdbe4885e257a7625f7b1f
-
Filesize
1.7MB
MD55659eba6a774f9d5322f249ad989114a
SHA14bfb12aa98a1dc2206baa0ac611877b815810e4c
SHA256e04346fee15c3f98387a3641e0bba2e555a5a9b0200e4b9256b1b77094069ae4
SHA512f93abf2787b1e06ce999a0cbc67dc787b791a58f9ce20af5587b2060d663f26be9f648d116d9ca279af39299ea5d38e3c86271297e47c1438102ca28fce8edc4
-
Filesize
1.7MB
MD55404286ec7853897b3ba00adf824d6c1
SHA139e543e08b34311b82f6e909e1e67e2f4afec551
SHA256ec94a6666a3103ba6be60b92e843075a2d7fe7d30fa41099c3f3b1e2a5eba266
SHA512c4b78298c42148d393feea6c3941c48def7c92ef0e6baac99144b083937d0a80d3c15bd9a0bf40daa60919968b120d62999fa61af320e507f7e99fbfe9b9ef30
-
Filesize
1.7MB
MD55eb39ba3698c99891a6b6eb036cfb653
SHA1d2f1cdd59669f006a2f1aa9214aeed48bc88c06e
SHA256e77f5e03ae140dda27d73e1ffe43f7911e006a108cf51cbd0e05d73aa92da7c2
SHA5126c4ca20e88d49256ed9cabec0d1f2b00dfcf3d1603b5c95d158d4438c9f1e58495f8dfa200dbe7f49b5b0dd57886517eb3b98c4190484548720dad4b3db6069e
-
Filesize
1.7MB
MD57187cc2643affab4ca29d92251c96dee
SHA1ab0a4de90a14551834e12bb2c8c6b9ee517acaf4
SHA256c7e92a1af295307fb92ad534e05fba879a7cf6716f93aefca0ebfcb8cee7a830
SHA51227985d317a5c844871ffb2527d04aa50ef7442b2f00d69d5ab6bbb85cd7be1d7057ffd3151d0896f05603677c2f7361ed021eac921e012d74da049ef6949e3a3
-
Filesize
1.7MB
MD5b7d1e04629bec112923446fda5391731
SHA1814055286f963ddaa5bf3019821cb8a565b56cb8
SHA2564da77d4ee30ad0cd56cd620f4e9dc4016244ace015c5b4b43f8f37dd8e3a8789
SHA51279fc3606b0fe6a1e31a2ecacc96623caf236bf2be692dadab6ea8ffa4af4231d782094a63b76631068364ac9b6a872b02f1e080636eba40ed019c2949a8e28db
-
Filesize
1.7MB
MD50dc4014facf82aa027904c1be1d403c1
SHA15e6d6c020bfc2e6f24f3d237946b0103fe9b1831
SHA256a29ddd29958c64e0af1a848409e97401307277bb6f11777b1cfb0404a6226de7
SHA512cbeead189918657cc81e844ed9673ee8f743aed29ad9948e90afdfbecacc9c764fbdbfb92e8c8ceb5ae47cee52e833e386a304db0572c7130d1a54fd9c2cc028
-
Filesize
3.3MB
MD5cea368fc334a9aec1ecff4b15612e5b0
SHA1493d23f72731bb570d904014ffdacbba2334ce26
SHA25607e38cad68b0cdbea62f55f9bc6ee80545c2e1a39983baa222e8af788f028541
SHA512bed35a1cc56f32e0109ea5a02578489682a990b5cefa58d7cf778815254af9849e731031e824adba07c86c8425df58a1967ac84ce004c62e316a2e51a75c8748
-
Filesize
3.3MB
MD5045b0a3d5be6f10ddf19ae6d92dfdd70
SHA10387715b6681d7097d372cd0005b664f76c933c7
SHA25694b392e94fa47d1b9b7ae6a29527727268cc2e3484e818c23608f8835bc1104d
SHA51258255a755531791b888ffd9b663cc678c63d5caa932260e9546b1b10a8d54208334725c14529116b067bcf5a5e02da85e015a3bed80092b7698a43dab0168c7b
-
Filesize
1.7MB
MD583d75087c9bf6e4f07c36e550731ccde
SHA1d5ff596961cce5f03f842cfd8f27dde6f124e3ae
SHA25646db3164bebffc61c201fe1e086bffe129ddfed575e6d839ddb4f9622963fb3f
SHA512044e1f5507e92715ce9df8bb802e83157237a2f96f39bac3b6a444175f1160c4d82f41a0bcecf5feaf1c919272ed7929baef929a8c3f07deecebc44b0435164a
-
Filesize
440B
MD53626532127e3066df98e34c3d56a1869
SHA15fa7102f02615afde4efd4ed091744e842c63f78
SHA2562a0e18ef585db0802269b8c1ddccb95ce4c0bac747e207ee6131dee989788bca
SHA512dcce66d6e24d5a4a352874144871cd73c327e04c1b50764399457d8d70a9515f5bc0a650232763bf34d4830bab70ee4539646e7625cfe5336a870e311043b2bd
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\AlternateServices.bin
Filesize18KB
MD5c9a2a982e6666b41b90f6d4fbf859957
SHA153c836ed3e5f6354c076d007577f0beaa69b1f46
SHA256774d1baf10ce5e671a850ca7375c8f2f97f54ba25bf072efbbeb67333c4b8c08
SHA51294f202d46441411385e5425618406b08cf32b9e432aed3d131d8b7e76e38aa57d4cea3e007d7d95e6dfa21292e41dacc714f83333779ed6043c86b1a13f73479
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\AlternateServices.bin
Filesize6KB
MD519c9ccdeaa510e89bb6a6d4b5e2aa0bc
SHA110bd353b771cb3c7fe9d07244c2de01dc45da0d9
SHA256376a30d03d0edba8f4e127e7d6ce1424c6e6b72572b0c290f5a7c1d0a3a9809e
SHA512470992a0facec429647ba4bb12915717b527a9295aea75ac18181c63593926b8f2b76a1d24822f314202819eab9fe36dc80f4afd9394f92ebf2344f4265bcd36
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\AlternateServices.bin
Filesize10KB
MD5e5c2696550f2500d25acafffcf6f9eba
SHA13b74f3d66f42275299a3e363d600da0cda7d2f67
SHA25641e13b244083d6229e06c1a8ad57c5ad1da5c1cc8d2b86788195bcc9cb0a7dde
SHA512a18c3923496b301c9a19486e4b272b2f985030d19ee9fdcd1d28133cd912c386e9aa02e3fea4649311001c9c4723f4920c96aa2638d94924662659d327bd6efb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp
Filesize21KB
MD53fbbf06ffbb05c40da21d110210a9aac
SHA11e4e665bf9be8ea3bfb5f5b218e02cc24b43c1bc
SHA2566ff5be680f7182d3f4a334da67dedfdab60adde66cb9352850a6715745b58fe5
SHA5122d6097d5fa2dde5b4137ebf7f12f5d861827d5f966a23c87c92f036a29de665abdd4f33bb025b642ebf42cbad79d65da58a16cfbc0a9fe0e72c6b3e7860e1597
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD5fbde6fa84ff360c080ebbab5a7209bc0
SHA12d6ada5dc19d0b894065d95d1afe0b8c1a65bbf1
SHA2560bca67f575fff8bc879480ce8baea8c3fab688aae50d64050173d462d02e94db
SHA5129263c3b08fcb2890ceb1bd9c89fcde319a7603a510f2722d0aa330c558adef48b8ffb0780a7f989429fe9356f84ac88161437a5690b54c153ef1991c8423867c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD548d0eb145d7d1ec8a2276beb248c8b24
SHA1e647ebf6e7f7dfa59ee26792b059b4664094f0dc
SHA2566fde9250cd18e9ff14446adabc0e4b736c0394fcc9a1ea7c90211ed939de9637
SHA512b09e79911d2bf6cade6be3a1b85924761428657fe7ac0849c7ad6dc76c1d8b35373942f61bd095024fb1874e70f91fc2484bbe8ea1c70b45da3512116cd63966
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\30323c42-c2bb-4ee9-90ce-775e7760da48
Filesize982B
MD55e3feb429c2ae96213702c1ef7d6186d
SHA1c54f72c0864b3898d2d4a65be12383a85ce20634
SHA256ad621a886b0e632ea7f0df6320ed8bb00a528ce79efcdb0ca55f6e0f848efc32
SHA512404ffbaea47085c27a5e7b5545801c6b236c016043c8076a9fd32b20cf02a2a814e0971264c5201b6c44b7c8d7be80ba10aea329fb935dd329b33b43417c4100
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\e061a0d8-4c53-43d1-83d3-c775a7b350cb
Filesize659B
MD5baf9ae4b0b6d9fb5a3b84ff7743d75e0
SHA1eb7095517bcfff78ac73baa9cb2603cff25bb886
SHA256a94d2f60952a3be5078b87c4ed702e2e14ac6035758d061de160008aabf2419c
SHA512286344f7a7c6098d1eff3b38edffc0dd5a0a1aa820923481d40105901b6b9fb0d65b5573b5ee32a108567cb322629471ef4afa478284987a31fc85c17c6a17b0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
11KB
MD5281894c7102ac0e4059afdfa6f46168e
SHA13f5deaaadbd60aca1b811ee720bef05b412d912c
SHA2564804490e8ab95859933e082f87147712db6aef8694126d6c647f4b2d9b5bed03
SHA5123160c23853f0c8b2abca136c5a9e63b7f6e98820b151e42f2c54c1f6b4de32e45637d014dabbe6314caa60a4044a074744784f3a25c8e07af158872adfa63dee
-
Filesize
11KB
MD534e318a78a4e9235b08f743d36599186
SHA1d0a47fd810d916ba2934583d8484979dfe651d6b
SHA2561912431a4b840be2acc39f071b31da7fcdf2a3502647cf9eb798d182aa1b8489
SHA512b856e76e1f229c65ef99da02d3f9339ce6fb5a33ed391e1d8928134c4663ed3bb353f3684ff39c5806d3c9d298fa536059effa7b652c7a4d3cadb9e5bbb36045
-
Filesize
10KB
MD5f091917b94a407241cb19fc450c6f491
SHA1c198f48006c0befa11c7802a25356ac101849db2
SHA2562c2cf0a9e63b714c19a16e97c0e2e0e8d993b9024c953a6070e46ff4fb599b9d
SHA512b4d05cd9eaaac48ba13678f2743a5f8f3e6fc695f11a3f9dfe9c17dcb37d85199ee551eeb8c86f08a6e34d376ea18b92e4110970fc3d80d2c01c28038bf7b567
-
Filesize
1.0MB
MD5971b0519b1c0461db6700610e5e9ca8e
SHA19a262218310f976aaf837e54b4842e53e73be088
SHA25647cf75570c1eca775b2dd1823233d7c40924d3a8d93e0e78c943219cf391d023
SHA512d234a9c5a1da8415cd4d2626797197039f2537e98f8f43d155f815a7867876cbc1bf466be58677c79a9199ea47d146a174998d21ef0aebc29a4b0443f8857cb9
-
Filesize
144KB
MD5cc36e2a5a3c64941a79c31ca320e9797
SHA150c8f5db809cfec84735c9f4dcd6b55d53dfd9f5
SHA2566fec179c363190199c1dcdf822be4d6b1f5c4895ebc7148a8fc9fa9512eeade8
SHA512fcea6d62dc047e40182dc4ff1e0522ca935f9aeefdb1517957977bc5d9ac654285a973261401f3b98abf1f6ed62638b9e31306fd7aaeb67214ca42dfc2888af0