Analysis
-
max time kernel
120s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2024 15:26
Static task
static1
Behavioral task
behavioral1
Sample
8370e88ac5befe61ac995afffad27892681dc44a854a50a028a977cdc945f1fcN.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
8370e88ac5befe61ac995afffad27892681dc44a854a50a028a977cdc945f1fcN.exe
Resource
win10v2004-20241007-en
General
-
Target
8370e88ac5befe61ac995afffad27892681dc44a854a50a028a977cdc945f1fcN.exe
-
Size
2.9MB
-
MD5
5bcc85cf578615240ebb1808bb7a05c0
-
SHA1
271e542f554ea879dbffc67a83262ce63dfa5a22
-
SHA256
8370e88ac5befe61ac995afffad27892681dc44a854a50a028a977cdc945f1fc
-
SHA512
f675e2fbc5e86cb8d649016b24bfbe343416ce71012d257670f4d18d1bafea26658aace3ea9c2fa014b3dd8bd81030b8182fa16d601f02920c1171bb3597d715
-
SSDEEP
49152:7+aAxr1Ly/YE4/nOllylqGrpegcw3jCB+4oi:7+aAxRNElylqGrpegDs+4oi
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://pollution-raker.cyou/api
https://hosue-billowy.cyou/api
https://ripe-blade.cyou/api
https://smash-boiling.cyou/api
https://supporse-comment.cyou/api
https://greywe-snotty.cyou/api
https://steppriflej.xyz/api
https://sendypaster.xyz/api
https://cuddlyready.xyz/api
Extracted
cryptbot
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Cryptbot family
-
Gcleaner family
-
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 5dc852c8de.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 5dc852c8de.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 5dc852c8de.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 5dc852c8de.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 5dc852c8de.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 5dc852c8de.exe -
NetSupport
NetSupport is a remote access tool sold as a legitimate system administration software.
-
Netsupport family
-
Stealc family
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF 619e140bce.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5dc852c8de.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4cbb0b5dd0.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8370e88ac5befe61ac995afffad27892681dc44a854a50a028a977cdc945f1fcN.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 619e140bce.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ecc8d83cc9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 19cf9e75a5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 36f2b11c63.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3a12e9051c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 22 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4cbb0b5dd0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8370e88ac5befe61ac995afffad27892681dc44a854a50a028a977cdc945f1fcN.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ecc8d83cc9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 19cf9e75a5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 19cf9e75a5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 36f2b11c63.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5dc852c8de.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5dc852c8de.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4cbb0b5dd0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8370e88ac5befe61ac995afffad27892681dc44a854a50a028a977cdc945f1fcN.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ecc8d83cc9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 619e140bce.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 619e140bce.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3a12e9051c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3a12e9051c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 36f2b11c63.exe -
Checks computer location settings 2 TTPs 7 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 90ee94e1df.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 8d7e1cb185.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 39437bb677.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation ef115d73f2.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 8370e88ac5befe61ac995afffad27892681dc44a854a50a028a977cdc945f1fcN.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation SurveillanceWalls.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 38 IoCs
pid Process 3756 skotes.exe 1688 SurveillanceWalls.exe 2876 O8FeZRE.exe 4412 Sale.com 464 90ee94e1df.exe 4452 FuturreApp.exe 1476 7bxDRZV.exe 3016 905b8634af.exe 808 8d7e1cb185.exe 4056 28a108414e.exe 860 28a108414e.exe 416 619e140bce.exe 3764 Sale.com 4180 ecc8d83cc9.exe 4056 19cf9e75a5.exe 1816 3a12e9051c.exe 3280 36f2b11c63.exe 876 3c9fd2d9c7.exe 3588 skotes.exe 4824 5dc852c8de.exe 3532 8cae34b486.exe 5632 4cbb0b5dd0.exe 1232 39437bb677.exe 2580 7z.exe 3812 7z.exe 3612 7z.exe 5824 7z.exe 3720 7z.exe 2096 7z.exe 856 7z.exe 3940 7z.exe 2092 in.exe 2736 ef115d73f2.exe 5180 476f7080ac.exe 968 Laptops.com 2092 graph.exe 4284 skotes.exe 4600 Intel_PTT_EK_Recertification.exe -
Identifies Wine through registry keys 2 TTPs 11 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 19cf9e75a5.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 36f2b11c63.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 5dc852c8de.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 619e140bce.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine ecc8d83cc9.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 3a12e9051c.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 4cbb0b5dd0.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 8370e88ac5befe61ac995afffad27892681dc44a854a50a028a977cdc945f1fcN.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe -
Loads dropped DLL 14 IoCs
pid Process 4452 FuturreApp.exe 4452 FuturreApp.exe 4452 FuturreApp.exe 4452 FuturreApp.exe 4452 FuturreApp.exe 4452 FuturreApp.exe 2580 7z.exe 3812 7z.exe 3612 7z.exe 5824 7z.exe 3720 7z.exe 2096 7z.exe 856 7z.exe 3940 7z.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 5dc852c8de.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 5dc852c8de.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\36f2b11c63.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1020247001\\36f2b11c63.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\3c9fd2d9c7.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1020248001\\3c9fd2d9c7.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5dc852c8de.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1020249001\\5dc852c8de.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Graph = "C:\\Program Files\\Windows Media Player\\graph\\graph.exe" 476f7080ac.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\3a12e9051c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1020246001\\3a12e9051c.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 16 bitbucket.org 17 bitbucket.org 259 drive.google.com 260 drive.google.com -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 273 ipinfo.io 272 ipinfo.io -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000023c7c-391.dat autoit_exe -
Enumerates processes with tasklist 1 TTPs 6 IoCs
pid Process 1248 tasklist.exe 4004 tasklist.exe 228 tasklist.exe 3596 tasklist.exe 4904 tasklist.exe 4068 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
pid Process 2064 8370e88ac5befe61ac995afffad27892681dc44a854a50a028a977cdc945f1fcN.exe 3756 skotes.exe 416 619e140bce.exe 4180 ecc8d83cc9.exe 4056 19cf9e75a5.exe 1816 3a12e9051c.exe 3280 36f2b11c63.exe 3588 skotes.exe 4824 5dc852c8de.exe 5632 4cbb0b5dd0.exe 4284 skotes.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4056 set thread context of 860 4056 28a108414e.exe 114 PID 4600 set thread context of 4872 4600 Intel_PTT_EK_Recertification.exe 201 -
resource yara_rule behavioral2/memory/2092-987-0x00007FF6FDAA0000-0x00007FF6FDF30000-memory.dmp upx behavioral2/memory/2092-990-0x00007FF6FDAA0000-0x00007FF6FDF30000-memory.dmp upx behavioral2/memory/4600-1705-0x00007FF736C20000-0x00007FF7370B0000-memory.dmp upx behavioral2/memory/4600-1719-0x00007FF736C20000-0x00007FF7370B0000-memory.dmp upx -
Drops file in Program Files directory 5 IoCs
description ioc Process File created C:\Program Files\Windows Media Player\1w4lv5IzuEVOMa3sjCc6orj2dWPvJoK5f 476f7080ac.exe File created C:\Program Files\Windows Media Player\1w4lv5IzuEVOMa3sjCc6orj2dWPvJoK5fzip 476f7080ac.exe File created C:\Program Files\Windows Media Player\graph\graph.exe 476f7080ac.exe File opened for modification C:\Program Files\Windows Media Player\1w4lv5IzuEVOMa3sjCc6orj2dWPvJoK5fzip 476f7080ac.exe File opened for modification C:\Program Files\Windows Media Player\1w4lv5IzuEVOMa3sjCc6orj2dWPvJoK5f 476f7080ac.exe -
Drops file in Windows directory 24 IoCs
description ioc Process File opened for modification C:\Windows\GradVitamins SurveillanceWalls.exe File opened for modification C:\Windows\ScienceCom SurveillanceWalls.exe File opened for modification C:\Windows\RenewableProgramme SurveillanceWalls.exe File opened for modification C:\Windows\SodiumLegend SurveillanceWalls.exe File opened for modification C:\Windows\KrugerPowers 8d7e1cb185.exe File opened for modification C:\Windows\RingsAnything ef115d73f2.exe File opened for modification C:\Windows\CouplesWizard ef115d73f2.exe File created C:\Windows\Tasks\skotes.job 8370e88ac5befe61ac995afffad27892681dc44a854a50a028a977cdc945f1fcN.exe File opened for modification C:\Windows\KrugerPowers SurveillanceWalls.exe File opened for modification C:\Windows\FarmingDesignation SurveillanceWalls.exe File opened for modification C:\Windows\OmissionsEmerald SurveillanceWalls.exe File opened for modification C:\Windows\BaconTicket SurveillanceWalls.exe File opened for modification C:\Windows\GradVitamins 8d7e1cb185.exe File opened for modification C:\Windows\FarmingDesignation 8d7e1cb185.exe File opened for modification C:\Windows\EmiratesHeads ef115d73f2.exe File opened for modification C:\Windows\BuildAid ef115d73f2.exe File opened for modification C:\Windows\BuzzDisorders ef115d73f2.exe File opened for modification C:\Windows\RenewableProgramme 8d7e1cb185.exe File opened for modification C:\Windows\SodiumLegend 8d7e1cb185.exe File opened for modification C:\Windows\YuBad ef115d73f2.exe File opened for modification C:\Windows\ScienceCom 8d7e1cb185.exe File opened for modification C:\Windows\OmissionsEmerald 8d7e1cb185.exe File opened for modification C:\Windows\BaconTicket 8d7e1cb185.exe File opened for modification C:\Windows\SimsCoastal ef115d73f2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 5472 5632 WerFault.exe 154 5044 4180 WerFault.exe 126 -
System Location Discovery: System Language Discovery 1 TTPs 58 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sale.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3c9fd2d9c7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5dc852c8de.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SurveillanceWalls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3a12e9051c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8cae34b486.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 39437bb677.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language O8FeZRE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 3c9fd2d9c7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 28a108414e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sale.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 905b8634af.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 28a108414e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 36f2b11c63.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 90ee94e1df.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ecc8d83cc9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FuturreApp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8d7e1cb185.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4cbb0b5dd0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ef115d73f2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 19cf9e75a5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 619e140bce.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8370e88ac5befe61ac995afffad27892681dc44a854a50a028a977cdc945f1fcN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Laptops.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 3c9fd2d9c7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 3 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 5008 powershell.exe 1320 PING.EXE 1756 powershell.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 5020 taskkill.exe 4568 taskkill.exe 1944 taskkill.exe 472 taskkill.exe 3768 taskkill.exe -
Modifies registry class 7 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\CLSID\{BCF64D67-842B-48CA-BC9B-9F2E7D03973B}\InprocServer32 Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\CLSID\{BCF64D67-842B-48CA-BC9B-9F2E7D03973B}\InprocServer32\ = "C:\\ProgramData\\cb610983-a645-42a3-969d-3737b1a6cce5\\cb610983-a645-42a3-969d-3737b1a6cce5.dll" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\CLSID\{BCF64D67-842B-48CA-BC9B-9F2E7D03973B}\InprocServer32\ThreadingModel = "Both" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\CLSID\{BCF64D67-842B-48CA-BC9B-9F2E7D03973B} Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\CLSID\{BCF64D67-842B-48CA-BC9B-9F2E7D03973B}\AppID = 01240000000000000063623631303938332d613634352d343261332d393639642d33373337623161366363653526000000000000007b42434636344436372d383432422d343843412d424339422d3946324537443033393733427d240000000000000038336432656535632d343932362d346565332d613037372d6131353636306131346563330b0000000000000031302e3132372e312e3631080000000000000048676e627762677722000000000000006f735f76657273696f6e5f31302e305f6275696c645f6e756d6265725f31393034310300000000000000342e38240000000000000030303030303030302d303030302d303030302d303030302d303030303030303030303030 Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\CLSID\{BCF64D67-842B-48CA-BC9B-9F2E7D03973B}\ = "c62b262a-3c9c-4ac9-bbd4-fdc64cf0516f" Explorer.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1320 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 764 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2064 8370e88ac5befe61ac995afffad27892681dc44a854a50a028a977cdc945f1fcN.exe 2064 8370e88ac5befe61ac995afffad27892681dc44a854a50a028a977cdc945f1fcN.exe 3756 skotes.exe 3756 skotes.exe 4412 Sale.com 4412 Sale.com 4412 Sale.com 4412 Sale.com 4412 Sale.com 4412 Sale.com 416 619e140bce.exe 416 619e140bce.exe 416 619e140bce.exe 416 619e140bce.exe 416 619e140bce.exe 416 619e140bce.exe 416 619e140bce.exe 416 619e140bce.exe 416 619e140bce.exe 416 619e140bce.exe 3764 Sale.com 3764 Sale.com 3764 Sale.com 3764 Sale.com 3764 Sale.com 3764 Sale.com 4180 ecc8d83cc9.exe 4180 ecc8d83cc9.exe 4056 19cf9e75a5.exe 4056 19cf9e75a5.exe 1816 3a12e9051c.exe 1816 3a12e9051c.exe 3280 36f2b11c63.exe 3280 36f2b11c63.exe 3588 skotes.exe 3588 skotes.exe 876 3c9fd2d9c7.exe 876 3c9fd2d9c7.exe 4824 5dc852c8de.exe 4824 5dc852c8de.exe 4824 5dc852c8de.exe 4824 5dc852c8de.exe 4824 5dc852c8de.exe 876 3c9fd2d9c7.exe 876 3c9fd2d9c7.exe 5632 4cbb0b5dd0.exe 5632 4cbb0b5dd0.exe 1476 7bxDRZV.exe 1476 7bxDRZV.exe 5008 powershell.exe 5008 powershell.exe 5008 powershell.exe 5180 476f7080ac.exe 5180 476f7080ac.exe 5180 476f7080ac.exe 5180 476f7080ac.exe 968 Laptops.com 968 Laptops.com 968 Laptops.com 968 Laptops.com 968 Laptops.com 968 Laptops.com 2092 graph.exe 2092 graph.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1248 tasklist.exe Token: SeDebugPrivilege 4004 tasklist.exe Token: SeSecurityPrivilege 4452 FuturreApp.exe Token: SeDebugPrivilege 228 tasklist.exe Token: SeDebugPrivilege 3596 tasklist.exe Token: SeDebugPrivilege 472 taskkill.exe Token: SeDebugPrivilege 3768 taskkill.exe Token: SeDebugPrivilege 5020 taskkill.exe Token: SeDebugPrivilege 4568 taskkill.exe Token: SeDebugPrivilege 4824 5dc852c8de.exe Token: SeDebugPrivilege 1944 taskkill.exe Token: SeDebugPrivilege 3692 firefox.exe Token: SeDebugPrivilege 3692 firefox.exe Token: SeRestorePrivilege 2580 7z.exe Token: 35 2580 7z.exe Token: SeSecurityPrivilege 2580 7z.exe Token: SeSecurityPrivilege 2580 7z.exe Token: SeRestorePrivilege 3812 7z.exe Token: 35 3812 7z.exe Token: SeSecurityPrivilege 3812 7z.exe Token: SeSecurityPrivilege 3812 7z.exe Token: SeRestorePrivilege 3612 7z.exe Token: 35 3612 7z.exe Token: SeSecurityPrivilege 3612 7z.exe Token: SeSecurityPrivilege 3612 7z.exe Token: SeRestorePrivilege 5824 7z.exe Token: 35 5824 7z.exe Token: SeSecurityPrivilege 5824 7z.exe Token: SeSecurityPrivilege 5824 7z.exe Token: SeRestorePrivilege 3720 7z.exe Token: 35 3720 7z.exe Token: SeSecurityPrivilege 3720 7z.exe Token: SeSecurityPrivilege 3720 7z.exe Token: SeRestorePrivilege 2096 7z.exe Token: 35 2096 7z.exe Token: SeSecurityPrivilege 2096 7z.exe Token: SeSecurityPrivilege 2096 7z.exe Token: SeRestorePrivilege 856 7z.exe Token: 35 856 7z.exe Token: SeSecurityPrivilege 856 7z.exe Token: SeSecurityPrivilege 856 7z.exe Token: SeRestorePrivilege 3940 7z.exe Token: 35 3940 7z.exe Token: SeSecurityPrivilege 3940 7z.exe Token: SeSecurityPrivilege 3940 7z.exe Token: SeShutdownPrivilege 3548 Explorer.EXE Token: SeCreatePagefilePrivilege 3548 Explorer.EXE Token: SeShutdownPrivilege 3548 Explorer.EXE Token: SeCreatePagefilePrivilege 3548 Explorer.EXE Token: SeShutdownPrivilege 3548 Explorer.EXE Token: SeCreatePagefilePrivilege 3548 Explorer.EXE Token: SeDebugPrivilege 5008 powershell.exe Token: SeShutdownPrivilege 3548 Explorer.EXE Token: SeCreatePagefilePrivilege 3548 Explorer.EXE Token: SeShutdownPrivilege 3548 Explorer.EXE Token: SeCreatePagefilePrivilege 3548 Explorer.EXE Token: SeShutdownPrivilege 3548 Explorer.EXE Token: SeCreatePagefilePrivilege 3548 Explorer.EXE Token: SeDebugPrivilege 4904 tasklist.exe Token: SeDebugPrivilege 4068 tasklist.exe Token: SeShutdownPrivilege 3548 Explorer.EXE Token: SeCreatePagefilePrivilege 3548 Explorer.EXE Token: SeShutdownPrivilege 3548 Explorer.EXE Token: SeCreatePagefilePrivilege 3548 Explorer.EXE -
Suspicious use of FindShellTrayWindow 51 IoCs
pid Process 2064 8370e88ac5befe61ac995afffad27892681dc44a854a50a028a977cdc945f1fcN.exe 4412 Sale.com 4412 Sale.com 4412 Sale.com 4452 FuturreApp.exe 3764 Sale.com 3764 Sale.com 3764 Sale.com 876 3c9fd2d9c7.exe 876 3c9fd2d9c7.exe 876 3c9fd2d9c7.exe 876 3c9fd2d9c7.exe 876 3c9fd2d9c7.exe 876 3c9fd2d9c7.exe 876 3c9fd2d9c7.exe 876 3c9fd2d9c7.exe 876 3c9fd2d9c7.exe 876 3c9fd2d9c7.exe 876 3c9fd2d9c7.exe 876 3c9fd2d9c7.exe 3692 firefox.exe 3692 firefox.exe 3692 firefox.exe 3692 firefox.exe 3692 firefox.exe 3692 firefox.exe 3692 firefox.exe 3692 firefox.exe 3692 firefox.exe 3692 firefox.exe 3692 firefox.exe 3692 firefox.exe 3692 firefox.exe 3692 firefox.exe 3692 firefox.exe 3692 firefox.exe 3692 firefox.exe 3692 firefox.exe 3692 firefox.exe 3692 firefox.exe 3692 firefox.exe 876 3c9fd2d9c7.exe 876 3c9fd2d9c7.exe 876 3c9fd2d9c7.exe 968 Laptops.com 3548 Explorer.EXE 3548 Explorer.EXE 968 Laptops.com 968 Laptops.com 3548 Explorer.EXE 3548 Explorer.EXE -
Suspicious use of SendNotifyMessage 44 IoCs
pid Process 4412 Sale.com 4412 Sale.com 4412 Sale.com 3764 Sale.com 3764 Sale.com 3764 Sale.com 876 3c9fd2d9c7.exe 876 3c9fd2d9c7.exe 876 3c9fd2d9c7.exe 876 3c9fd2d9c7.exe 876 3c9fd2d9c7.exe 876 3c9fd2d9c7.exe 876 3c9fd2d9c7.exe 876 3c9fd2d9c7.exe 876 3c9fd2d9c7.exe 876 3c9fd2d9c7.exe 876 3c9fd2d9c7.exe 876 3c9fd2d9c7.exe 3692 firefox.exe 3692 firefox.exe 3692 firefox.exe 3692 firefox.exe 3692 firefox.exe 3692 firefox.exe 3692 firefox.exe 3692 firefox.exe 3692 firefox.exe 3692 firefox.exe 3692 firefox.exe 3692 firefox.exe 3692 firefox.exe 3692 firefox.exe 3692 firefox.exe 3692 firefox.exe 3692 firefox.exe 3692 firefox.exe 3692 firefox.exe 3692 firefox.exe 876 3c9fd2d9c7.exe 876 3c9fd2d9c7.exe 876 3c9fd2d9c7.exe 968 Laptops.com 968 Laptops.com 968 Laptops.com -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3692 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2064 wrote to memory of 3756 2064 8370e88ac5befe61ac995afffad27892681dc44a854a50a028a977cdc945f1fcN.exe 82 PID 2064 wrote to memory of 3756 2064 8370e88ac5befe61ac995afffad27892681dc44a854a50a028a977cdc945f1fcN.exe 82 PID 2064 wrote to memory of 3756 2064 8370e88ac5befe61ac995afffad27892681dc44a854a50a028a977cdc945f1fcN.exe 82 PID 3756 wrote to memory of 1688 3756 skotes.exe 83 PID 3756 wrote to memory of 1688 3756 skotes.exe 83 PID 3756 wrote to memory of 1688 3756 skotes.exe 83 PID 1688 wrote to memory of 1860 1688 SurveillanceWalls.exe 84 PID 1688 wrote to memory of 1860 1688 SurveillanceWalls.exe 84 PID 1688 wrote to memory of 1860 1688 SurveillanceWalls.exe 84 PID 1860 wrote to memory of 1248 1860 cmd.exe 86 PID 1860 wrote to memory of 1248 1860 cmd.exe 86 PID 1860 wrote to memory of 1248 1860 cmd.exe 86 PID 1860 wrote to memory of 1820 1860 cmd.exe 87 PID 1860 wrote to memory of 1820 1860 cmd.exe 87 PID 1860 wrote to memory of 1820 1860 cmd.exe 87 PID 1860 wrote to memory of 4004 1860 cmd.exe 89 PID 1860 wrote to memory of 4004 1860 cmd.exe 89 PID 1860 wrote to memory of 4004 1860 cmd.exe 89 PID 1860 wrote to memory of 5008 1860 cmd.exe 90 PID 1860 wrote to memory of 5008 1860 cmd.exe 90 PID 1860 wrote to memory of 5008 1860 cmd.exe 90 PID 1860 wrote to memory of 1684 1860 cmd.exe 91 PID 1860 wrote to memory of 1684 1860 cmd.exe 91 PID 1860 wrote to memory of 1684 1860 cmd.exe 91 PID 1860 wrote to memory of 476 1860 cmd.exe 92 PID 1860 wrote to memory of 476 1860 cmd.exe 92 PID 1860 wrote to memory of 476 1860 cmd.exe 92 PID 3756 wrote to memory of 2876 3756 skotes.exe 93 PID 3756 wrote to memory of 2876 3756 skotes.exe 93 PID 3756 wrote to memory of 2876 3756 skotes.exe 93 PID 1860 wrote to memory of 4180 1860 cmd.exe 94 PID 1860 wrote to memory of 4180 1860 cmd.exe 94 PID 1860 wrote to memory of 4180 1860 cmd.exe 94 PID 1860 wrote to memory of 4412 1860 cmd.exe 95 PID 1860 wrote to memory of 4412 1860 cmd.exe 95 PID 1860 wrote to memory of 4412 1860 cmd.exe 95 PID 1860 wrote to memory of 932 1860 cmd.exe 96 PID 1860 wrote to memory of 932 1860 cmd.exe 96 PID 1860 wrote to memory of 932 1860 cmd.exe 96 PID 3756 wrote to memory of 464 3756 skotes.exe 100 PID 3756 wrote to memory of 464 3756 skotes.exe 100 PID 3756 wrote to memory of 464 3756 skotes.exe 100 PID 464 wrote to memory of 4452 464 90ee94e1df.exe 101 PID 464 wrote to memory of 4452 464 90ee94e1df.exe 101 PID 464 wrote to memory of 4452 464 90ee94e1df.exe 101 PID 3756 wrote to memory of 1476 3756 skotes.exe 104 PID 3756 wrote to memory of 1476 3756 skotes.exe 104 PID 3756 wrote to memory of 3016 3756 skotes.exe 107 PID 3756 wrote to memory of 3016 3756 skotes.exe 107 PID 3756 wrote to memory of 3016 3756 skotes.exe 107 PID 3756 wrote to memory of 808 3756 skotes.exe 108 PID 3756 wrote to memory of 808 3756 skotes.exe 108 PID 3756 wrote to memory of 808 3756 skotes.exe 108 PID 808 wrote to memory of 2272 808 8d7e1cb185.exe 109 PID 808 wrote to memory of 2272 808 8d7e1cb185.exe 109 PID 808 wrote to memory of 2272 808 8d7e1cb185.exe 109 PID 3756 wrote to memory of 4056 3756 skotes.exe 112 PID 3756 wrote to memory of 4056 3756 skotes.exe 112 PID 3756 wrote to memory of 4056 3756 skotes.exe 112 PID 4056 wrote to memory of 860 4056 28a108414e.exe 114 PID 4056 wrote to memory of 860 4056 28a108414e.exe 114 PID 4056 wrote to memory of 860 4056 28a108414e.exe 114 PID 4056 wrote to memory of 860 4056 28a108414e.exe 114 PID 4056 wrote to memory of 860 4056 28a108414e.exe 114 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 3 IoCs
pid Process 2876 attrib.exe 4180 attrib.exe 1496 attrib.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3548 -
C:\Users\Admin\AppData\Local\Temp\8370e88ac5befe61ac995afffad27892681dc44a854a50a028a977cdc945f1fcN.exe"C:\Users\Admin\AppData\Local\Temp\8370e88ac5befe61ac995afffad27892681dc44a854a50a028a977cdc945f1fcN.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Users\Admin\AppData\Local\Temp\1020057001\SurveillanceWalls.exe"C:\Users\Admin\AppData\Local\Temp\1020057001\SurveillanceWalls.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c move Campbell Campbell.cmd & Campbell.cmd5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Windows\SysWOW64\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1248
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"6⤵
- System Location Discovery: System Language Discovery
PID:1820
-
-
C:\Windows\SysWOW64\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4004
-
-
C:\Windows\SysWOW64\findstr.exefindstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"6⤵
- System Location Discovery: System Language Discovery
PID:5008
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 3708216⤵
- System Location Discovery: System Language Discovery
PID:1684
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "Anchor" Veterinary6⤵
- System Location Discovery: System Language Discovery
PID:476
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Genre + ..\Mj + ..\Discs + ..\Receiving + ..\Mysterious + ..\Aka w6⤵
- System Location Discovery: System Language Discovery
PID:4180
-
-
C:\Users\Admin\AppData\Local\Temp\370821\Sale.comSale.com w6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4412
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 56⤵
- System Location Discovery: System Language Discovery
PID:932
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1020068001\O8FeZRE.exe"C:\Users\Admin\AppData\Local\Temp\1020068001\O8FeZRE.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2876
-
-
C:\Users\Admin\AppData\Local\Temp\1020155001\90ee94e1df.exe"C:\Users\Admin\AppData\Local\Temp\1020155001\90ee94e1df.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Users\Public\Netstat\FuturreApp.exe"C:\Users\Public\Netstat\FuturreApp.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4452
-
-
-
C:\Users\Admin\AppData\Local\Temp\1020227001\7bxDRZV.exe"C:\Users\Admin\AppData\Local\Temp\1020227001\7bxDRZV.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1476
-
-
C:\Users\Admin\AppData\Local\Temp\1020240001\905b8634af.exe"C:\Users\Admin\AppData\Local\Temp\1020240001\905b8634af.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3016
-
-
C:\Users\Admin\AppData\Local\Temp\1020241001\8d7e1cb185.exe"C:\Users\Admin\AppData\Local\Temp\1020241001\8d7e1cb185.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c move Campbell Campbell.cmd & Campbell.cmd5⤵
- System Location Discovery: System Language Discovery
PID:2272 -
C:\Windows\SysWOW64\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:228
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"6⤵
- System Location Discovery: System Language Discovery
PID:232
-
-
C:\Windows\SysWOW64\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3596
-
-
C:\Windows\SysWOW64\findstr.exefindstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"6⤵
- System Location Discovery: System Language Discovery
PID:1000
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 3708216⤵
- System Location Discovery: System Language Discovery
PID:4168
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "Anchor" Veterinary6⤵
- System Location Discovery: System Language Discovery
PID:3768
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Genre + ..\Mj + ..\Discs + ..\Receiving + ..\Mysterious + ..\Aka w6⤵
- System Location Discovery: System Language Discovery
PID:3296
-
-
C:\Users\Admin\AppData\Local\Temp\370821\Sale.comSale.com w6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3764
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 56⤵
- System Location Discovery: System Language Discovery
PID:4104
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1020242001\28a108414e.exe"C:\Users\Admin\AppData\Local\Temp\1020242001\28a108414e.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Users\Admin\AppData\Local\Temp\1020242001\28a108414e.exe"C:\Users\Admin\AppData\Local\Temp\1020242001\28a108414e.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:860
-
-
-
C:\Users\Admin\AppData\Local\Temp\1020243001\619e140bce.exe"C:\Users\Admin\AppData\Local\Temp\1020243001\619e140bce.exe"4⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:416
-
-
C:\Users\Admin\AppData\Local\Temp\1020244001\ecc8d83cc9.exe"C:\Users\Admin\AppData\Local\Temp\1020244001\ecc8d83cc9.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4180 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4180 -s 6485⤵
- Program crash
PID:5044
-
-
-
C:\Users\Admin\AppData\Local\Temp\1020245001\19cf9e75a5.exe"C:\Users\Admin\AppData\Local\Temp\1020245001\19cf9e75a5.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4056
-
-
C:\Users\Admin\AppData\Local\Temp\1020246001\3a12e9051c.exe"C:\Users\Admin\AppData\Local\Temp\1020246001\3a12e9051c.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1816
-
-
C:\Users\Admin\AppData\Local\Temp\1020247001\36f2b11c63.exe"C:\Users\Admin\AppData\Local\Temp\1020247001\36f2b11c63.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3280
-
-
C:\Users\Admin\AppData\Local\Temp\1020248001\3c9fd2d9c7.exe"C:\Users\Admin\AppData\Local\Temp\1020248001\3c9fd2d9c7.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:876 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:472
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3768
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5020
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4568
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1944
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking5⤵PID:2120
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking6⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3692 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1948 -parentBuildID 20240401114208 -prefsHandle 1888 -prefMapHandle 1880 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c687345f-5ad6-46e9-a236-3fc60cb1265b} 3692 "\\.\pipe\gecko-crash-server-pipe.3692" gpu7⤵PID:3244
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2448 -parentBuildID 20240401114208 -prefsHandle 2440 -prefMapHandle 2436 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6ed2da62-ee48-4391-a19b-f68b7b6c638f} 3692 "\\.\pipe\gecko-crash-server-pipe.3692" socket7⤵PID:1688
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3068 -childID 1 -isForBrowser -prefsHandle 3028 -prefMapHandle 3104 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {aa866968-22a3-4e7e-b841-f45752288fab} 3692 "\\.\pipe\gecko-crash-server-pipe.3692" tab7⤵PID:2608
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3784 -childID 2 -isForBrowser -prefsHandle 3776 -prefMapHandle 3736 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ccd905ea-4cee-4466-8b92-864a2f9694e4} 3692 "\\.\pipe\gecko-crash-server-pipe.3692" tab7⤵PID:1812
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4552 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4488 -prefMapHandle 4520 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6051d54e-0258-4106-ae07-5ed3d147a874} 3692 "\\.\pipe\gecko-crash-server-pipe.3692" utility7⤵
- Checks processor information in registry
PID:5784
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5112 -childID 3 -isForBrowser -prefsHandle 5104 -prefMapHandle 5100 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e393eb1e-1cf9-45f1-bfcf-3daf927e1d7a} 3692 "\\.\pipe\gecko-crash-server-pipe.3692" tab7⤵PID:6124
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5248 -childID 4 -isForBrowser -prefsHandle 5256 -prefMapHandle 5260 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cca12d3d-1e8a-49f5-9404-2d48f51d3dd7} 3692 "\\.\pipe\gecko-crash-server-pipe.3692" tab7⤵PID:6136
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5568 -childID 5 -isForBrowser -prefsHandle 5584 -prefMapHandle 5580 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a9571a4a-ce03-4eb8-85ea-386a281b68c4} 3692 "\\.\pipe\gecko-crash-server-pipe.3692" tab7⤵PID:5088
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1020249001\5dc852c8de.exe"C:\Users\Admin\AppData\Local\Temp\1020249001\5dc852c8de.exe"4⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4824
-
-
C:\Users\Admin\AppData\Local\Temp\1020250001\8cae34b486.exe"C:\Users\Admin\AppData\Local\Temp\1020250001\8cae34b486.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3532
-
-
C:\Users\Admin\AppData\Local\Temp\1020251001\4cbb0b5dd0.exe"C:\Users\Admin\AppData\Local\Temp\1020251001\4cbb0b5dd0.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5632 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5632 -s 14005⤵
- Program crash
PID:5472
-
-
-
C:\Users\Admin\AppData\Local\Temp\1020252001\39437bb677.exe"C:\Users\Admin\AppData\Local\Temp\1020252001\39437bb677.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1232 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"5⤵PID:5516
-
C:\Windows\system32\mode.commode 65,106⤵PID:3076
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e file.zip -p24291711423417250691697322505 -oextracted6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2580
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_7.zip -oextracted6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:3812
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_6.zip -oextracted6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:3612
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_5.zip -oextracted6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:5824
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_4.zip -oextracted6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:3720
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_3.zip -oextracted6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2096
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_2.zip -oextracted6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:856
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_1.zip -oextracted6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:3940
-
-
C:\Windows\system32\attrib.exeattrib +H "in.exe"6⤵
- Views/modifies file attributes
PID:4180
-
-
C:\Users\Admin\AppData\Local\Temp\main\in.exe"in.exe"6⤵
- Executes dropped EXE
PID:2092 -
C:\Windows\SYSTEM32\attrib.exeattrib +H +S C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe7⤵
- Views/modifies file attributes
PID:2876
-
-
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe7⤵
- Views/modifies file attributes
PID:1496
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /f /CREATE /TN "Intel_PTT_EK_Recertification" /TR "C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe" /SC MINUTE7⤵
- Scheduled Task/Job: Scheduled Task
PID:764
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell ping 127.0.0.1; del in.exe7⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5008 -
C:\Windows\system32\PING.EXE"C:\Windows\system32\PING.EXE" 127.0.0.18⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1320
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1020253001\ef115d73f2.exe"C:\Users\Admin\AppData\Local\Temp\1020253001\ef115d73f2.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2736 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy Podcasts Podcasts.cmd & Podcasts.cmd5⤵
- System Location Discovery: System Language Discovery
PID:1920 -
C:\Windows\SysWOW64\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4904
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"6⤵
- System Location Discovery: System Language Discovery
PID:4636
-
-
C:\Windows\SysWOW64\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4068
-
-
C:\Windows\SysWOW64\findstr.exefindstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"6⤵
- System Location Discovery: System Language Discovery
PID:456
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 991236⤵
- System Location Discovery: System Language Discovery
PID:5324
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "follow" Traveller6⤵
- System Location Discovery: System Language Discovery
PID:6020
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Sky + ..\Images + ..\Similarly + ..\Mp + ..\Investigators + ..\Accompanying + ..\Provincial J6⤵
- System Location Discovery: System Language Discovery
PID:3448
-
-
C:\Users\Admin\AppData\Local\Temp\99123\Laptops.comLaptops.com J6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:968
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 56⤵
- System Location Discovery: System Language Discovery
PID:5872
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1020254001\476f7080ac.exe"C:\Users\Admin\AppData\Local\Temp\1020254001\476f7080ac.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:5180 -
C:\Program Files\Windows Media Player\graph\graph.exe"C:\Program Files\Windows Media Player\graph\graph.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2092
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3588
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 5632 -ip 56321⤵PID:5440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4180 -ip 41801⤵PID:5828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 5632 -ip 56321⤵PID:4152
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4284
-
C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exeC:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4600 -
C:\Windows\explorer.exeexplorer.exe2⤵PID:4872
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell ping 127.1.10.1; del Intel_PTT_EK_Recertification.exe2⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:1756
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Component Object Model Hijacking
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Component Object Model Hijacking
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Process Discovery
1Query Registry
8Remote System Discovery
1System Information Discovery
4System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\activity-stream.discovery_stream.json
Filesize18KB
MD593e9088abb490234697fcbeb64b3ffc5
SHA1641b518111c36995b2829c36cf5377055f593f15
SHA2566d05ad0231e980e5eb002a3576fb7e21cc87d0aefa671dc14389e4c5f969b3d9
SHA5122169633b862e25b114ba48f0732461956c85393c93c43be5d28ca445603c218a5589958ef2d031a895c1f0e7ed537a3cb1b5340851bd905bd82b78c74d3d1214
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
1.2MB
MD55a909c9769920208ed3d4d7279f08de5
SHA1656f447088626150e252cbf7df6f8cd0de596fa0
SHA2565f2c26e780639a76f10c549e7dea1421c4f06093c1facbf4dd8cf0a8b2fee8cb
SHA512c6038048bd09c8f704246a6ba176ea63b1c8d23f2e127600c50bac50f3032c1b751ea8e405a2fe1ea707f75f21cf6516447345a84751bc677d94874d4b91090b
-
Filesize
295KB
MD5ef9b9ffab9d91e590c6bda0280686d52
SHA1bcbdca605606f483e76ae821b7bf81ca3e1b529a
SHA2561345ad4c782c91049a16ec9f01b04bfc83a4f0e1e259cfed2b535f8ec6b75590
SHA5123b362b306ba8357ac2eecd7354799e203d42fdee849584b26ee2c4c7b2c632c64558fd84f22c1dff35957f6950e333d005a225a54bdab4b3f53812041ea6345c
-
Filesize
2.0MB
MD5e5f8753995c0b30b827aa2b17f3e1d22
SHA1b268ee165073321cb893fc6dc682adbe38af87b5
SHA256c3a4ec523039d5969745279b8909fbb82bfc999d9241e24b5cefea23a3f2c04f
SHA512dba6104720c45c3201878c515dac487b0f66522e85db56cf19b4378d4da94d38e640eb48259a6ca3fd8602b083283915bdebdc8bb57039f1cdd2fe84792ba2fa
-
Filesize
2.2MB
MD5f0389b89fc65d7c8cc98e40f1412796e
SHA17ecd48c055f89880299a3b10ee45bd522b402f05
SHA256cd6c119a7ae1dee28a0d68f136b76cd05ae3486ce47788aa77af5dc3d4a44798
SHA51211a68183ae94e34d5fdce3175aeae90193b1b02056627be7bbd81739900cc295ae01a202832cc4da88691345f4248a04ce73fc447aaceb26296541dc712384b4
-
Filesize
2.5MB
MD587330f1877c33a5a6203c49075223b16
SHA155b64ee8b2d1302581ab1978e9588191e4e62f81
SHA25698f2344ed45ff0464769e5b006bf0e831dc3834f0534a23339bb703e50db17e0
SHA5127c747d3edb04e4e71dce7efa33f5944a191896574fee5227316739a83d423936a523df12f925ee9b460cce23b49271f549c1ee5d77b50a7d7c6e3f31ba120c8f
-
Filesize
758KB
MD5afd936e441bf5cbdb858e96833cc6ed3
SHA13491edd8c7caf9ae169e21fb58bccd29d95aefef
SHA256c6491d7a6d70c7c51baca7436464667b4894e4989fa7c5e05068dde4699e1cbf
SHA512928c15a1eda602b2a66a53734f3f563ab9626882104e30ee2bf5106cfd6e08ec54f96e3063f1ab89bf13be2c8822a8419f5d8ee0a3583a4c479785226051a325
-
Filesize
4.3MB
MD510e8ef90835832169a076d05e774f142
SHA1c51471d93ba9f63141f9c31d77ec8d856d4e0e56
SHA256e0fe5fa47cd60c499a3c082fdb3a6fbfae1eb2637ac133a7ffa317c334c62735
SHA5121ec9511b56bcf1f000f006cb522659787c7a10842f3febfc5b9afe86b425285ee1bd2e182f9bf1eefcf911de3236e8dfa5dc380b7cfd64bf0f4b6aa78fc81fe9
-
Filesize
1.9MB
MD5861b745db7e76f79321206c575f97a58
SHA1dd44a9f4a25d1989c814707d5b2601ea04773b82
SHA256e509643de2b13bda23ded3f0c8ad5c2d8bf275abd5ad74b4e4232e71f432f4db
SHA512f580677341ad4e680125562cd03625529a3a93f111017cfcefd9844319c48c718f7ecb1356b2e8d772c739bb37a52bffcb6a14933a6effd1ac02ea2b76ba1a65
-
Filesize
4.3MB
MD55fcf1c70847c8d629264384d6d6c8acf
SHA1d9edad7806c30dd9b980d4705a0891339621cf7a
SHA256e78ed16dc1488e89f074a3b7f92683910d50f3849c7e94531b13cccf5eface73
SHA5125f317afdee88fadd924f2f3f3eb95226a627ccf8061357fe0a3fb7e2d8ace5da2bf5fc383038c2b191eea94a804e36611bcc2226b565955fa6e3d6f8510f4175
-
Filesize
1.8MB
MD5221c8ac3ed6f410d8b286790034f8e4e
SHA1ccc959a9b59cd3f3d3505dc2f3d8c0c3749f3bd5
SHA25635324932e2366dc2e417a8aea865d24f7362a88352b7d52438e80e30acbbbe85
SHA512ff46a974790419a30e1016610dc7f65003b3ad14e19373cba7cb72084268267578eb7cd9b4eeb540e2c3c05df41a67892781ebbdf3a75aded59da5ca0d55e629
-
Filesize
2.8MB
MD568fab06e4f20b7a872f7aa9e3ad2e76a
SHA14d552946d82b350575404c92cb799422391921e9
SHA256aa830882b145a484d6d757ade5ad9383e776f03fde938247502bd7511123bab5
SHA512dcbce64fbe36af9af032485be6a4677cdbb1dc4c8289d2847f208129e0f19e9b006843b119d1c990b5cc3449bbcef56da0a7f556570ff056ffadb1c252ca469a
-
Filesize
945KB
MD5da03f31b1c239d86aeedac211f956c3e
SHA13a57fdcdb6564e94627d2eb994d702d667ac8d11
SHA25630ca2eb5ee5ea6ba00f9132aa15e9a039055e79d9c45dc56cafe5b93edbb78e8
SHA5129855fb55f55bf078239c1ed88548e02a8f6d053170184e17414020334c76d239f9ba083008723f37172bff12f5c91764701eb3eb3ce176986217e5036c716c4a
-
Filesize
2.7MB
MD50fb966c44b9a8e6b449daed2f52abdff
SHA102a546f8166b823106bb8205d37fd103ee366356
SHA25623838ab1c4b4b708a37b7e5c6790ebfdd116dbb3b8a1acbe1b5c98254a5b4a79
SHA5120b1e022c3faed6ac958ca8596d7ab6a661e9a4993d1d0baba048bb219535644935ba878fa6ecd2e6c2d0c3137b0b685df9d3955fda0ef635e30e89bb471fcc38
-
Filesize
1.8MB
MD515709eba2afaf7cc0a86ce0abf8e53f1
SHA1238ebf0d386ecf0e56d0ddb60faca0ea61939bb6
SHA25610bff40a9d960d0be3cc81b074a748764d7871208f324de26d365b1f8ea3935a
SHA51265edefa20f0bb35bee837951ccd427b94a18528c6e84de222b1aa0af380135491bb29a049009f77e66fcd2abe5376a831d98e39055e1042ccee889321b96e8e9
-
Filesize
4.2MB
MD53a425626cbd40345f5b8dddd6b2b9efa
SHA17b50e108e293e54c15dce816552356f424eea97a
SHA256ba9212d2d5cd6df5eb7933fb37c1b72a648974c1730bf5c32439987558f8e8b1
SHA512a7538c6b7e17c35f053721308b8d6dc53a90e79930ff4ed5cffecaa97f4d0fbc5f9e8b59f1383d8f0699c8d4f1331f226af71d40325022d10b885606a72fe668
-
Filesize
1017KB
MD5af97661ca877fa1c644ead6567388945
SHA16ecb6d1a317e72a39a88f86c1f47b4e00427b8fc
SHA256f88e4323299b2af453ce04ef6f5dc55b753d9210d7e598a0085bf3c21a5a4f0a
SHA5129f99c8f1f4c343fc920146dd3c8d130d724b838a80ed2b4514172bbdfea2e5bc98fd27d42a2748cfec73a5680861bcf170c70ae9e45a2fed86ad6ec621899713
-
Filesize
591KB
MD53567cb15156760b2f111512ffdbc1451
SHA12fdb1f235fc5a9a32477dab4220ece5fda1539d4
SHA2560285d3a6c1ca2e3a993491c44e9cf2d33dbec0fb85fdbf48989a4e3b14b37630
SHA512e7a31b016417218387a4702e525d33dd4fe496557539b2ab173cec0cb92052c750cfc4b3e7f02f3c66ac23f19a0c8a4eb6c9d2b590a5e9faeb525e517bc877ba
-
Filesize
925KB
MD562d09f076e6e0240548c2f837536a46a
SHA126bdbc63af8abae9a8fb6ec0913a307ef6614cf2
SHA2561300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49
SHA51232de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f
-
Filesize
445KB
MD5d02f356cc528bf6eaa89051942a0b1be
SHA1dfecb4ae80274697f0d86e497cd566020ea23739
SHA2565ed7e1f92a6bb08458ca99fdc83236095845f5939c6b9f7e423c6db70869b95c
SHA51291ec78343e91db20edf97f39c293a5a8a45851c510ad6499c85b26738dfd9e918edda14e8710ece22d855d51d1417e722f19530ce3979e491c2b0dccb5198e57
-
Filesize
42KB
MD514422967d2c4b9a9a8a90e398b24f500
SHA17031018af43bcc5550a8b0a55680596d693334dc
SHA25693db8e88945b7de88e98a7c50d64bffa8b73c3b002c744c8d62c2eadf767cf6f
SHA5124b5795f15774a7768a42aa3a2308b9366f47b30c92babf688a67d2abeca0037b63762f3e21154212dc5c8a31bcdd69f029e849e1d4def5676a04b64e2ae90c75
-
Filesize
121KB
MD5c89fd1314a2184d5d7b4a66de377d5b2
SHA1f0ebbc2c8c6f9ebadc6ace713aec1b06f3f841e8
SHA2569d1e82e2e430b87b28867ff9745a74e53a128671e9d300f111b1904786c2f856
SHA5124b0b16e99d0cacab0b7af1d65cbf9226988752d8fa020b955bf54c634d9d64a05bb036ef590fa0d852d513621a84f4c3dc3c341aa8feffdf350dd8a5dbc75778
-
Filesize
11KB
MD5e7567ec4057933fa6e06322b7c08b72a
SHA14e733e77915c7dfb7d25e31738e9d596962d4177
SHA2561896ef25a6223f19f770da125a4b1bc7c90815ccb682ec7ca780d231a01c28b0
SHA512d8a14e5c8225ad8bdbb45317fd41588c12e9e60f1c9ff819d0d15cbc35801b82e7c7981b7dbc815666354950a7f5362fc00765f8a67c9478bd95dc5a31b12c83
-
Filesize
130KB
MD5638e7812c5e9c55c5f339cc64d197b28
SHA15ef8a953ef65ab7d0620a5d144f2c410e2a77a2f
SHA256347a3459dd74aea0a6b2f62955d1bc9bdb091bb66ca8a42274f7ebf310527fd8
SHA512194b0d8799a83210968746c4d3e364ee512669e6080c6b3d215d97c141e8ef7f09152ea524691efcd2276acb1dc158ffd484e3f595ddf2cceb690bd1996c8266
-
Filesize
112KB
MD5d9daf89d86b32df3d7da7ec1cfbf7212
SHA159e1ba3dd32168a3d79a9da2626c99c52970a53e
SHA25606f48747a4acb2ee437d03a9e8331cca5c76ee5684e118f491e4faf7799adcc4
SHA51224d26b6112417d75915f08562af53eb1bb7ddef2e89e779db52ae0f674ea8ce102984fa2628cee5588c7dc34df00a32497e49ee18f7259c51e4d1c855ab69a6c
-
Filesize
68KB
MD500646a2066d51d9790f52bae3c446c87
SHA1ebda2b25b5a46cc6d9d5494050cc4b3a0bf81984
SHA25657afab1cec987da27f5e92baa6dc21d83f8c83edf734fc590313102e75844c3a
SHA512a74c02ed1b704912a8945e60cacc892f7e832e5cf15c87632b0fd3cbf9ddd8f36b01a5ba87fd7ef87d6becbb297161bb69dc750b8dac6f952892d45cd95f46f0
-
Filesize
3KB
MD5682d77b5a6d22691a869ab4bea11ad53
SHA1f56fab8959a05c77570652f5f8e9e4103489e676
SHA256c269725998f8f5acdab6a0067457065cc9059326ee0a38ff353c2939a0190c1b
SHA512c42d04178ed59683fc4597b83496d7b3c61c1a075b4542abb491c9639531f9737d70ae4172186fd6a3450c26701d794496bd4ae0f5e50db8a3818cd78ed7fd27
-
Filesize
148KB
MD52e9e29f8ed97f2de8ebb1652bdbd545a
SHA15577d360b25daffa0af907fc5d852894b784f81d
SHA256aeb399054cff321f752d4f93143815ff1a2cc2398668c2e1110065a2c6f502f1
SHA512f4f925daf3f576441d2b7a0e250a51400b23e714d76870a640734912da783d83ac113586f121161d96d7f06eb70b8d89eb4e0524d591232b0b2a342063e8bcb6
-
Filesize
112KB
MD542fb34ddb94507c5a125bf02c2983904
SHA14e400c020121235e3de490f5cbb38c4a25e686dc
SHA256d59efea25d1e316b8a9248f52081ab14113c97603f3e90d533f4f373f743b3c7
SHA512639d90cd1cd451ebcb9e5e1c165f7eebb62b30d6bf24c596990ca40e08bce5d0b5864e7a4f0a83624c7cf9ac4ec5c1e7385f59602b206f3346554d62721cd71d
-
Filesize
88KB
MD55ce4409c4aaa9fd5a27ec4974734f1df
SHA1bf7ee5465ef96ee0186388b5b0685ad727ed9493
SHA256a401b4cd0afbaee57d8025bf4fce12583c825cbc2e3d3f308eb0627cd5bba412
SHA5121155b1c58221ba1c809d9d60cd440ebd8788dcd3169ee87bda72fb7061b1e2f849f8bc79ac7053df5de8bc7955db088df778af66900d6f303bde6d61925014e6
-
Filesize
58KB
MD5d830821fe60d6cd810fb9ec7102838f3
SHA19264b78903fa373e0a1b697cc056decc1dfafb5f
SHA25600a96ac0e8600a9fa0a00ef1f939b58be93618c4fe4e3be9d0bfab0a4a0ff57d
SHA5122a8e2bb9d599964ca112aacbb0fda37c01466898a7af5d7c8543013949b0bc6e5665402692a1072845b1a72211d350963c608a81a7c3450c19a56a948ced5d4d
-
Filesize
97KB
MD5ff77a17e4cade79760f0f8b87c857c6c
SHA1b05075d65229af0063e6e85da14ab940062818dd
SHA256cc8a9523b67f764e447cd5042751e1de77b04ffc5664e6f5c41d1c3cce0ec60d
SHA5126df97dcb14736d2f0ce9762b7246050b488e054375c78f42294119d80cacedcf53f4b3868b7a4c948dd7b1f9545b4135f5bd5ed69611424129cae63a372994d0
-
Filesize
89KB
MD5beef30c9a0c6a41985e081cd4ff23049
SHA14e09ffaf608baf3a98cd94794cb7cc23e41c3086
SHA256fc64f325cdd473adb5b7c15221f7b2773a064395612eff9ad1c76fa973a6738a
SHA512ec71cdb716b684b241a2fa2bca84cbced9aa86ba0954009dc003ef1f80640c01d49911ec6e031e9f8e8139d30bf5a77d7a79ee38f66b8fd43a6e4f957cb8e1ca
-
Filesize
19KB
MD5270e797dcc891238ecb4753b12ad9740
SHA12714eaaf585411ca91ee2ffb905d6271bfee6d9e
SHA2562b87d3a5678436374f66000bc263763f35d1662b675f004b55002cb4f473a3d0
SHA512409f2d91ea614e28a6a966cc52769bedd8786d1e655629da544d93a9d0547c8d151798f3f5010e11cd4308d58a419616dc35a4273df17afb94022a29f6f26a64
-
Filesize
71KB
MD5aa4d881ea35979e4eab13c982d3d0898
SHA1cf301086d6e43e603571762fbc7d754f0246fb74
SHA25631d85bebe7949c9b7b40af007fbbe61c8cd6c25f8e4fc7dcfe9b7dcd8a1d79e7
SHA512f64491753f2cf57b72740ca91f10c2bd677219bc89bf86d2476a8567cf83955f986a481c92d19bef9c466438af97d071686ea2fc496c5e477c900568f129b5f6
-
Filesize
61KB
MD58d5cf0056a8be7ca1485969fc23f72a5
SHA15727bc17cd958d06b1e7d52c8d38a761a1ae2bf2
SHA256bd1b00dea1cddb3345443a35ae3b71883443722edbb48016f829ac500f5f505b
SHA512b0f5fb69a565fc9690f307175c606ce9f9484bc309ac00b8a359cb6b77d19a938052ec584919a256fdb7c0b1557e155b414090b771432acb9419102f794b61ec
-
Filesize
105KB
MD52fadd2bf6f3cdc055416baa1528652e9
SHA1342d96c7ce7b431e76c15c9a7386c2a75e3dc511
SHA2568df18d17c715e689b9cb222beb699120b592464460fd407dbb14f59ccec5fdb3
SHA51208bc19703dad1441e1da8fb011c42241a4c90d8355575b7f41d465e3e84d797ecac7d6bf9af6163e6f4ef506cd98561f62d06446f861aeba2d7644beb7f6abb8
-
Filesize
62KB
MD59e4fe1f2538c08f75ae16a3e349c9ef2
SHA1559879228568b2f405400b34dfb19e59f139fa2c
SHA25622ce756672aca3a4ba015903b4c36e7667e15c73157759e5a2212e7d4e727cc0
SHA512a1f6bf183c590cc62000dddb0fea63bae2bdc30fce8ebfa24286b9fb8b2415c67b2363f739d36b32cc7b477e608397efbe45173173aa3f27ed44e9b75448b9ec
-
Filesize
2KB
MD56f07c56590cb57e03b68f9e2f994390c
SHA1aee254034b1f3394a97304c8dfbae1911440e2c0
SHA2561772cfd25c5deb74dacc6fc88aa8793a74c89a81452b27e886ca49557ba32d84
SHA5120af18e6d07c161a5088cec9a56654c9f661ac003f0e22b68b6dbfe2920bb344f4d9a1326c261957c2309bb44dcb39453630f33068a057a1a6c2960edfbd39001
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2.9MB
MD55bcc85cf578615240ebb1808bb7a05c0
SHA1271e542f554ea879dbffc67a83262ce63dfa5a22
SHA2568370e88ac5befe61ac995afffad27892681dc44a854a50a028a977cdc945f1fc
SHA512f675e2fbc5e86cb8d649016b24bfbe343416ce71012d257670f4d18d1bafea26658aace3ea9c2fa014b3dd8bd81030b8182fa16d601f02920c1171bb3597d715
-
Filesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin
Filesize17KB
MD5306306c4b45fbf9953fc2884fa32b95e
SHA18bd960b0d500fe9f83fd173ff899c3d47c0e2958
SHA256144fa27ff60eca4493c3cdbb93ac9426b42e447bbd0d08af1768cb1650754ddb
SHA5125acea4a9591d324140409a1e16f0a1fa0e9a15e802f78553a26cbdad1d43827a6418706ec7f5773950612e4db62b08d538b632082d68d07d565a4da75fcdc6ca
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin
Filesize6KB
MD51492deaabb9ab30bd6ec2265932a60bc
SHA1eb23d7a019ff400670f8eb05e19db71a8a626cf3
SHA2569426d7271ba6942ec0b497536b57e598597bd7844974b365400741d81779369e
SHA5121b122f2c20b084eb3e5aed5b2160a9ff998d6a98d1969a6bd9dbab4b598886950cb35836648c0d4690c9c8e8d072adce4869951b54fd654d8152ccfffa8f8860
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin
Filesize10KB
MD56a9f3082086d7908c07cffb66fb4045b
SHA1e2b532e2c075cacade82299eaac89875c0282201
SHA2565f7df087ffc95c1fef8a204cb4fbf30075550cd06923dd3f4f51300550ae7e53
SHA5124b01cbfeb6e8b6abb7c4facd945f9bc084f1e122b3819eb714cb90dcba8a8565c606fcc6ac58980962065fa23a72969d72474538dabd8335905d62f803ced9d0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD521641433a4ec6cc24b58e0fae3e2361b
SHA1fa60dbbd3352ab934a061ba295c39e593b3f8a67
SHA256c00ee4a5348e64dbd58330be579416e37ee3f0ef505c8dacb4eaec4b5cf5b073
SHA512c511a78d969ae1e8df2cb495960f0b00be952b072d64e1ef34db24b305cb3de7146064fd9633edf5cb421408227c0fe9950472236365dcadef4b468ca048e27e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD56b393eec1867f00ed2083d9998aca427
SHA13e32d6351ea032b42e579cea897f748e2f289c61
SHA256aa80b13eb497dee615d81d36f7fa60503bf2236f6df6138eafe9d93d4b621fd0
SHA5122752e5e5c92fc3dc63484a1ed39a632f9fc5c9b0eb9d3d884d19e801877d301ce4dfdb2d3ae9754bd3c93acd83270d306d97e82dca7b2771c457381f6b97235b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize14KB
MD5eff3daadf1e771416515b0b0ec8aa3c8
SHA1988f5993d27be874b06c2573a4fd7d62dbcea43d
SHA25631f97c05ab76a1aaecc31e7b11f0be1175945c4bfc63ac5ca72d8a498b557a43
SHA5125009d03388730e18ccc4b4bd9eea382166f248c1dc42e6547544a9663bec1f5b6725a3b804a1da65e8e27d9b4e70834a4fc5a3760eef979e5a1dad5cc56c463c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize28KB
MD54e70a6114dabd9cc586156bb8e6e530d
SHA1d26bbe2ea5ba15016a6ce0b22b64df53ec7dcb06
SHA25641787d119ef45c6f6dc30f892f19da2472de2f0725966b118d8102c826147a12
SHA512b89e467288bade3f170726c313bc91f3dc0c00b0e6c9f0002ec01f6e821491f90106cd3fb419b1df1a88038d66bd9e55030aefd2397ce988079a71f8b6801b69
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\a08f1e83-edf5-4dce-8ff1-ed2f2dbd42de
Filesize671B
MD5feff87a73f7093e3b091e9fc37fada25
SHA1aecc281647309e6339b872ee46e95e532dc45479
SHA256beb3af0af07253341a85a97299e64ccd21cff39d656964542482897367deac4e
SHA512decf402d5d6ff59dc238baca1b8bd1e9b4e21d12c5c783d03103a57a143f04c6f09ca3840aebd410d4a9b62de510b7211e135a9e29f2408fe6d162993d9709c2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\c522d6f9-8b62-48a9-83f8-cddd0096cfe7
Filesize982B
MD57664086640277321f333f58f20704c4e
SHA1374f061dce0306cbcbb4fce49c1043f351203da9
SHA2567aad9bf49e767edd79a6650eed53ee0bcd0acd9178100d51eba6742276f7db8e
SHA512114649d041b60a69f5a8df432480b9f2d05c05e79108237a18699e49c5c58e2ad2a309472755630ee218e872ef73d69805a795f76f2f8d51a3075874907aa75e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\eb7b1ff9-313e-4536-b60b-0fe9ef17f105
Filesize27KB
MD5f771873a736c054d581a2ab10dee3e9b
SHA1a9225f107b43b8d953120af672a6f7bf10394c19
SHA256f8c04536794f5210b3b53c0e6453c3a83404a5b8421004a01121612953367948
SHA5123ff2a91a6a2996d7c5307f9b4d205a38db7e1157f1f4e5b865acf11343b0644d681052e946ba33acde4168946ada032cb91bba12c00d92cd124235b9ee5a8b48
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\LICENSE.txt.tmp
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll.lib.tmp
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll.sig.tmp
Filesize1KB
MD536e5ee071a6f2f03c5d3889de80b0f0d
SHA1cf6e8ddb87660ef1ef84ae36f97548a2351ac604
SHA2566be809d16e0944386e45cf605eae0cd2cf46f111d1a6fe999fec813d2c378683
SHA51299b61896659e558a79f0e9be95286ebf01d31d13b71df6db4923406e88b3ba72584ef2b62e073b2f5e06901af2c7d1b92d3d12187fe5b4b29c9dd2678444f34e
-
Filesize
10KB
MD5e2ec6f63a52398a006651d70e1516aa7
SHA19b4998705b5c31d2df34bd6d35b5c0b29d4536ef
SHA256f1ddc76324121a997a0a47ad68331432d1cf1100cb50354e81b1f2abf1eb9346
SHA5126e405b7da8a29bffd6b032c754598e15376941df16987cdb688cae5fbfab08d641a8d3f03632de401910d7814663a197c4282050d4fb0608fd5ec5a1115326e3
-
Filesize
11KB
MD5f72391681a348197dab09571e4cdbe8d
SHA18f85c59c158eaf6fba26ff0a326dc64926a93e2a
SHA256113c17d386eeee320052ecce1f52870e48327686b05db2f6ddc2da37746634c7
SHA512d63687d89ae9cd0dcf84b85c1dab2ef2d8ea2bd714b8c7c2b5c7f89f90bbceb5f69ca058a84005425332abe2f653f020644686174af5c6f3ee7448d70cd3affb
-
Filesize
10KB
MD520b965f7c9552498cba68a5d2a3b2012
SHA19d610fa2ce5a37d877110fa44a3a99fb71b27392
SHA256557ad72052bdda230720862b9bf8a7fb76c58f71def6114db2773af2ed7600d0
SHA512f342677e8a474cc66d15ff4fa1919345c59e944dccf709d445ffdd94afd733c50bb31cd8fabdb74d0f8f76757c71ff11b62656ad2b881edf0aae4d7c052bfbad
-
Filesize
10KB
MD58125d9c2d8762dd9685881387163f1b2
SHA19eee1d5ae34be219e8f6fcf66e5369cd7967438e
SHA25649395b23920263561becdc77a2fe76c79b465e9e24052c60522dcfb8f2e61789
SHA512afdb0e5604b6448f05ff894679738c627b7bd2964dbbe4929b72fadbe63c08b9265073c5d0fd8f06b1a54f5ae8025fd134692b1c6adf45be87369184fbeb36f7
-
Filesize
11KB
MD51e1f46852f8e2a18f90685e30d843964
SHA1f70b3c476e8e80e9d96776fbd9308fd1326eb6f5
SHA256dfc98d67861d1a33eb31b97c8b9955695ecb39ce4d97104f662feed99053f97a
SHA51256a24bd651db3ff80a40a174b457761f3beb7d91f4817a135d19bdf0b428353336618115a5b48505a67b7f3ba0a3e9c24f510dd76b523500970482edca786236
-
Filesize
103KB
MD58d9709ff7d9c83bd376e01912c734f0a
SHA1e3c92713ce1d7eaa5e2b1fabeb06cdc0bb499294
SHA25649a568f8ac11173e3a0d76cff6bc1d4b9bdf2c35c6d8570177422f142dcfdbe3
SHA512042ad89ed2e15671f5df67766d11e1fa7ada8241d4513e7c8f0d77b983505d63ebfb39fefa590a2712b77d7024c04445390a8bf4999648f83dbab6b0f04eb2ee
-
Filesize
320KB
MD52d3b207c8a48148296156e5725426c7f
SHA1ad464eb7cf5c19c8a443ab5b590440b32dbc618f
SHA256edfe2b923bfb5d1088de1611401f5c35ece91581e71503a5631647ac51f7d796
SHA51255c791705993b83c9b26a8dbd545d7e149c42ee358ecece638128ee271e85b4fdbfd6fbae61d13533bf39ae752144e2cc2c5edcda955f18c37a785084db0860c
-
Filesize
755KB
MD50e37fbfa79d349d672456923ec5fbbe3
SHA14e880fc7625ccf8d9ca799d5b94ce2b1e7597335
SHA2568793353461826fbd48f25ea8b835be204b758ce7510db2af631b28850355bd18
SHA5122bea9bd528513a3c6a54beac25096ee200a4e6ccfc2a308ae9cfd1ad8738e2e2defd477d59db527a048e5e9a4fe1fc1d771701de14ef82b4dbcdc90df0387630
-
Filesize
257B
MD57067af414215ee4c50bfcd3ea43c84f0
SHA1c331d410672477844a4ca87f43a14e643c863af9
SHA2562050cc232710a2ea6a207bc78d1eac66a4042f2ee701cdfeee5de3ddcdc31d12
SHA51217b888087192bcea9f56128d0950423b1807e294d1c4f953d1bf0f5bd08e5f8e35afeee584ebf9233bfc44e0723db3661911415798159ac118c8a42aaf0b902f
-
Filesize
18KB
MD5a0b9388c5f18e27266a31f8c5765b263
SHA1906f7e94f841d464d4da144f7c858fa2160e36db
SHA256313117e723dda6ea3911faacd23f4405003fb651c73de8deff10b9eb5b4a058a
SHA5126051a0b22af135b4433474dc7c6f53fb1c06844d0a30ed596a3c6c80644df511b023e140c4878867fa2578c79695fac2eb303aea87c0ecfc15a4ad264bd0b3cd
-
Filesize
3.6MB
MD500587238d16012152c2e951a087f2cc9
SHA1c4e27a43075ce993ff6bb033360af386b2fc58ff
SHA25663aa18c32af7144156e7ee2d5ba0fa4f5872a7deb56894f6f96505cbc9afe6f8
SHA512637950a1f78d3f3d02c30a49a16e91cf3dfccc59104041876789bd7fdf9224d187209547766b91404c67319e13d1606da7cec397315495962cbf3e2ccd5f1226
-
Filesize
702B
MD5a4aa9219becdeec09159270bb041bb35
SHA12d08305017efb0a1ff7defdf66db80191ed9ccf8
SHA256277b9bcb5778cd5dc167ed75528818b06ed12f3fd427339f3085f4db8a39ed2e
SHA5124f7ce001da009fcba0c5beab572a16306d56fd91253c45d5196892142da78ec805982a4e1c136ad61471b5a951697eed76f9ee63d8b94eb64024a11e0fd0de42
-
Filesize
32KB
MD5dcde2248d19c778a41aa165866dd52d0
SHA17ec84be84fe23f0b0093b647538737e1f19ebb03
SHA2569074fd40ea6a0caa892e6361a6a4e834c2e51e6e98d1ffcda7a9a537594a6917
SHA512c5d170d420f1aeb9bcd606a282af6e8da04ae45c83d07faaacb73ff2e27f4188b09446ce508620124f6d9b447a40a23620cfb39b79f02b04bb9e513866352166