Analysis
-
max time kernel
149s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
23-12-2024 22:24
Static task
static1
Behavioral task
behavioral1
Sample
52738df9af06015dc0569c5cec905985b6e3e828bba5d45c96de83479859084c.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
52738df9af06015dc0569c5cec905985b6e3e828bba5d45c96de83479859084c.exe
Resource
win10v2004-20241007-en
General
-
Target
52738df9af06015dc0569c5cec905985b6e3e828bba5d45c96de83479859084c.exe
-
Size
2.9MB
-
MD5
150a14aee722f93553528f147ac1cfdb
-
SHA1
a05fe7ada978105e51f8931a5049668234f5379e
-
SHA256
52738df9af06015dc0569c5cec905985b6e3e828bba5d45c96de83479859084c
-
SHA512
48c4bdc1b646c8f21f67ed0eb98ff55e8d26a9349004b467caf98178e8092e21aacb0bfacecaaf4009a3fa1d339e8c36d674fb2af81c34fed6a08d8c9c88cd69
-
SSDEEP
49152:IGI5rdefRz19sIuvq2/kdz0c0ladCQ5l1HjvePKy:QdefRPs3q2/Iz0c0ladCQr1re5
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://pollution-raker.cyou/api
https://hosue-billowy.cyou/api
https://ripe-blade.cyou/api
https://smash-boiling.cyou/api
https://supporse-comment.cyou/api
https://greywe-snotty.cyou/api
https://steppriflej.xyz/api
https://sendypaster.xyz/api
Extracted
redline
1488Traffer
147.45.44.224:1912
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Gcleaner family
-
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 6a151eeb5f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 6a151eeb5f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 6a151eeb5f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 6a151eeb5f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 6a151eeb5f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 6a151eeb5f.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral1/files/0x00050000000195bb-142.dat family_redline behavioral1/memory/1504-162-0x00000000011F0000-0x0000000001242000-memory.dmp family_redline behavioral1/memory/3352-585-0x0000000000350000-0x00000000003A2000-memory.dmp family_redline -
Redline family
-
Stealc family
-
Xmrig family
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF f8c9acb5e0.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f8c9acb5e0.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ SdVB3P2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 49cd5046bf.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6f5401d6ce.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c4688ef85a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 52738df9af06015dc0569c5cec905985b6e3e828bba5d45c96de83479859084c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5007fd9db0.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3bde4c445e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6a151eeb5f.exe -
XMRig Miner payload 3 IoCs
resource yara_rule behavioral1/memory/3736-706-0x0000000140000000-0x0000000140770000-memory.dmp xmrig behavioral1/memory/3736-710-0x0000000140000000-0x0000000140770000-memory.dmp xmrig behavioral1/memory/3736-704-0x0000000140000000-0x0000000140770000-memory.dmp xmrig -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell and hide display window.
pid Process 2248 powershell.exe 3096 powershell.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 20 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6f5401d6ce.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5007fd9db0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f8c9acb5e0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6a151eeb5f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 52738df9af06015dc0569c5cec905985b6e3e828bba5d45c96de83479859084c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion SdVB3P2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 49cd5046bf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 49cd5046bf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6f5401d6ce.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3bde4c445e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 52738df9af06015dc0569c5cec905985b6e3e828bba5d45c96de83479859084c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3bde4c445e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f8c9acb5e0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion SdVB3P2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5007fd9db0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6a151eeb5f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c4688ef85a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c4688ef85a.exe -
Executes dropped EXE 35 IoCs
pid Process 2728 skotes.exe 2516 SdVB3P2.exe 2424 I0XmI2t.exe 2492 mdjw5me.exe 700 mdjw5me.exe 932 49cd5046bf.exe 1504 DJj.exe 2360 cd5488bba4.exe 2752 cd5488bba4.exe 936 6f5401d6ce.exe 1856 fff4e3aba6.exe 1996 5007fd9db0.exe 1116 7z.exe 584 3bde4c445e.exe 2920 7z.exe 3020 7z.exe 524 83ccd36190.exe 2368 7z.exe 2540 7z.exe 932 7z.exe 2292 7z.exe 912 7z.exe 2268 in.exe 540 6a151eeb5f.exe 2852 6c98084bf3.exe 3268 b1ec163c13.exe 3352 DJj.exe 3644 graph.exe 3864 f8c9acb5e0.exe 3164 c4688ef85a.exe 2036 75411c9c9c.exe 2852 Intel_PTT_EK_Recertification.exe 3524 828f3a59fd.exe 2324 828f3a59fd.exe 2844 Intel_PTT_EK_Recertification.exe -
Identifies Wine through registry keys 2 TTPs 10 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine SdVB3P2.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine 49cd5046bf.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine 6a151eeb5f.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine c4688ef85a.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine 52738df9af06015dc0569c5cec905985b6e3e828bba5d45c96de83479859084c.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine 6f5401d6ce.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine 5007fd9db0.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine 3bde4c445e.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine f8c9acb5e0.exe -
Loads dropped DLL 53 IoCs
pid Process 3056 52738df9af06015dc0569c5cec905985b6e3e828bba5d45c96de83479859084c.exe 2728 skotes.exe 2728 skotes.exe 2728 skotes.exe 2728 skotes.exe 2728 skotes.exe 2492 mdjw5me.exe 2728 skotes.exe 2728 skotes.exe 2728 skotes.exe 2728 skotes.exe 2360 cd5488bba4.exe 2728 skotes.exe 2728 skotes.exe 2728 skotes.exe 2728 skotes.exe 2728 skotes.exe 2584 cmd.exe 2728 skotes.exe 2728 skotes.exe 1116 7z.exe 2584 cmd.exe 2920 7z.exe 2584 cmd.exe 3020 7z.exe 2728 skotes.exe 2584 cmd.exe 2368 7z.exe 2584 cmd.exe 2540 7z.exe 2584 cmd.exe 932 7z.exe 2584 cmd.exe 2292 7z.exe 2584 cmd.exe 912 7z.exe 2584 cmd.exe 2584 cmd.exe 2728 skotes.exe 2728 skotes.exe 2728 skotes.exe 2728 skotes.exe 3268 b1ec163c13.exe 2728 skotes.exe 2728 skotes.exe 2728 skotes.exe 540 taskeng.exe 540 taskeng.exe 2728 skotes.exe 2728 skotes.exe 3524 828f3a59fd.exe 3164 c4688ef85a.exe 540 taskeng.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 6a151eeb5f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 6a151eeb5f.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\3bde4c445e.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1021333001\\3bde4c445e.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\83ccd36190.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1021334001\\83ccd36190.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\6a151eeb5f.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1021335001\\6a151eeb5f.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\Graph = "C:\\Program Files\\Windows Media Player\\graph\\graph.exe" b1ec163c13.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\5007fd9db0.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1021332001\\5007fd9db0.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 161 drive.google.com 162 drive.google.com -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 173 ipinfo.io 174 ipinfo.io -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000500000001a3f6-327.dat autoit_exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
pid Process 3056 52738df9af06015dc0569c5cec905985b6e3e828bba5d45c96de83479859084c.exe 2728 skotes.exe 2516 SdVB3P2.exe 932 49cd5046bf.exe 936 6f5401d6ce.exe 1996 5007fd9db0.exe 584 3bde4c445e.exe 540 6a151eeb5f.exe 3864 f8c9acb5e0.exe 3164 c4688ef85a.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 2492 set thread context of 700 2492 mdjw5me.exe 38 PID 2360 set thread context of 2752 2360 cd5488bba4.exe 43 PID 3524 set thread context of 2324 3524 828f3a59fd.exe 107 PID 2852 set thread context of 3736 2852 Intel_PTT_EK_Recertification.exe 109 PID 2844 set thread context of 2376 2844 Intel_PTT_EK_Recertification.exe 115 -
resource yara_rule behavioral1/memory/2268-364-0x000000013F600000-0x000000013FA90000-memory.dmp upx behavioral1/memory/2268-367-0x000000013F600000-0x000000013FA90000-memory.dmp upx -
Drops file in Program Files directory 5 IoCs
description ioc Process File created C:\Program Files\Windows Media Player\1w4lv5IzuEVOMa3sjCc6orj2dWPvJoK5f b1ec163c13.exe File created C:\Program Files\Windows Media Player\1w4lv5IzuEVOMa3sjCc6orj2dWPvJoK5fzip b1ec163c13.exe File created C:\Program Files\Windows Media Player\graph\graph.exe b1ec163c13.exe File opened for modification C:\Program Files\Windows Media Player\1w4lv5IzuEVOMa3sjCc6orj2dWPvJoK5fzip b1ec163c13.exe File opened for modification C:\Program Files\Windows Media Player\1w4lv5IzuEVOMa3sjCc6orj2dWPvJoK5f b1ec163c13.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 52738df9af06015dc0569c5cec905985b6e3e828bba5d45c96de83479859084c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 27 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 83ccd36190.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f8c9acb5e0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6a151eeb5f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mdjw5me.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DJj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cd5488bba4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 83ccd36190.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 83ccd36190.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SdVB3P2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 49cd5046bf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6f5401d6ce.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mdjw5me.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fff4e3aba6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5007fd9db0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c4688ef85a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cd5488bba4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 52738df9af06015dc0569c5cec905985b6e3e828bba5d45c96de83479859084c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DJj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3bde4c445e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 828f3a59fd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 828f3a59fd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 6 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 704 powershell.exe 1192 PING.EXE 3820 powershell.exe 2892 PING.EXE 2176 powershell.exe 2804 PING.EXE -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 2456 taskkill.exe 2888 taskkill.exe 1772 taskkill.exe 588 taskkill.exe 1852 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_Classes\Local Settings firefox.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 mdjw5me.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 040000000100000010000000d474de575c39b2d39c8583c5c065498a0f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a8090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703085300000001000000230000003021301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc30b00000001000000120000004400690067006900430065007200740000001d00000001000000100000008f76b981d528ad4770088245e2031b630300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc25190000000100000010000000ba4f3972e7aed9dccdc210db59da13c92000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a mdjw5me.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 b1ec163c13.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 b1ec163c13.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 mdjw5me.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 mdjw5me.exe -
Runs ping.exe 1 TTPs 3 IoCs
pid Process 1192 PING.EXE 2892 PING.EXE 2804 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2488 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3056 52738df9af06015dc0569c5cec905985b6e3e828bba5d45c96de83479859084c.exe 2728 skotes.exe 2516 SdVB3P2.exe 2248 powershell.exe 932 49cd5046bf.exe 936 6f5401d6ce.exe 1504 DJj.exe 1996 5007fd9db0.exe 584 3bde4c445e.exe 524 83ccd36190.exe 704 powershell.exe 540 6a151eeb5f.exe 540 6a151eeb5f.exe 540 6a151eeb5f.exe 524 83ccd36190.exe 3096 powershell.exe 3268 b1ec163c13.exe 3268 b1ec163c13.exe 3268 b1ec163c13.exe 3268 b1ec163c13.exe 3268 b1ec163c13.exe 3644 graph.exe 3644 graph.exe 3644 graph.exe 3352 DJj.exe 3352 DJj.exe 3352 DJj.exe 3352 DJj.exe 3352 DJj.exe 3352 DJj.exe 3864 f8c9acb5e0.exe 3352 DJj.exe 3352 DJj.exe 3352 DJj.exe 3352 DJj.exe 3352 DJj.exe 3352 DJj.exe 3352 DJj.exe 3352 DJj.exe 3352 DJj.exe 3352 DJj.exe 3644 graph.exe 3864 f8c9acb5e0.exe 3864 f8c9acb5e0.exe 3864 f8c9acb5e0.exe 3864 f8c9acb5e0.exe 3864 f8c9acb5e0.exe 3644 graph.exe 3352 DJj.exe 3644 graph.exe 3644 graph.exe 3644 graph.exe 3164 c4688ef85a.exe 3644 graph.exe 3644 graph.exe 3644 graph.exe 3644 graph.exe 3644 graph.exe 3644 graph.exe 3644 graph.exe 3644 graph.exe 3644 graph.exe 3644 graph.exe 2852 Intel_PTT_EK_Recertification.exe -
Suspicious use of AdjustPrivilegeToken 49 IoCs
description pid Process Token: SeDebugPrivilege 2248 powershell.exe Token: SeDebugPrivilege 1504 DJj.exe Token: SeRestorePrivilege 1116 7z.exe Token: 35 1116 7z.exe Token: SeSecurityPrivilege 1116 7z.exe Token: SeSecurityPrivilege 1116 7z.exe Token: SeRestorePrivilege 2920 7z.exe Token: 35 2920 7z.exe Token: SeSecurityPrivilege 2920 7z.exe Token: SeSecurityPrivilege 2920 7z.exe Token: SeRestorePrivilege 3020 7z.exe Token: 35 3020 7z.exe Token: SeSecurityPrivilege 3020 7z.exe Token: SeSecurityPrivilege 3020 7z.exe Token: SeRestorePrivilege 2368 7z.exe Token: 35 2368 7z.exe Token: SeSecurityPrivilege 2368 7z.exe Token: SeSecurityPrivilege 2368 7z.exe Token: SeDebugPrivilege 2456 taskkill.exe Token: SeRestorePrivilege 2540 7z.exe Token: 35 2540 7z.exe Token: SeSecurityPrivilege 2540 7z.exe Token: SeSecurityPrivilege 2540 7z.exe Token: SeRestorePrivilege 932 7z.exe Token: 35 932 7z.exe Token: SeSecurityPrivilege 932 7z.exe Token: SeSecurityPrivilege 932 7z.exe Token: SeRestorePrivilege 2292 7z.exe Token: 35 2292 7z.exe Token: SeSecurityPrivilege 2292 7z.exe Token: SeSecurityPrivilege 2292 7z.exe Token: SeRestorePrivilege 912 7z.exe Token: 35 912 7z.exe Token: SeSecurityPrivilege 912 7z.exe Token: SeSecurityPrivilege 912 7z.exe Token: SeDebugPrivilege 1772 taskkill.exe Token: SeDebugPrivilege 704 powershell.exe Token: SeDebugPrivilege 2888 taskkill.exe Token: SeDebugPrivilege 588 taskkill.exe Token: SeDebugPrivilege 540 6a151eeb5f.exe Token: SeDebugPrivilege 1852 taskkill.exe Token: SeDebugPrivilege 2596 firefox.exe Token: SeDebugPrivilege 2596 firefox.exe Token: SeDebugPrivilege 3096 powershell.exe Token: SeDebugPrivilege 3352 DJj.exe Token: SeDebugPrivilege 3820 powershell.exe Token: SeLockMemoryPrivilege 3736 explorer.exe Token: SeLockMemoryPrivilege 2376 explorer.exe Token: SeDebugPrivilege 2176 powershell.exe -
Suspicious use of FindShellTrayWindow 21 IoCs
pid Process 3056 52738df9af06015dc0569c5cec905985b6e3e828bba5d45c96de83479859084c.exe 524 83ccd36190.exe 524 83ccd36190.exe 524 83ccd36190.exe 524 83ccd36190.exe 524 83ccd36190.exe 524 83ccd36190.exe 524 83ccd36190.exe 524 83ccd36190.exe 524 83ccd36190.exe 524 83ccd36190.exe 524 83ccd36190.exe 524 83ccd36190.exe 524 83ccd36190.exe 524 83ccd36190.exe 2596 firefox.exe 2596 firefox.exe 2596 firefox.exe 2596 firefox.exe 524 83ccd36190.exe 524 83ccd36190.exe -
Suspicious use of SendNotifyMessage 19 IoCs
pid Process 524 83ccd36190.exe 524 83ccd36190.exe 524 83ccd36190.exe 524 83ccd36190.exe 524 83ccd36190.exe 524 83ccd36190.exe 524 83ccd36190.exe 524 83ccd36190.exe 524 83ccd36190.exe 524 83ccd36190.exe 524 83ccd36190.exe 524 83ccd36190.exe 524 83ccd36190.exe 524 83ccd36190.exe 2596 firefox.exe 2596 firefox.exe 2596 firefox.exe 524 83ccd36190.exe 524 83ccd36190.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3056 wrote to memory of 2728 3056 52738df9af06015dc0569c5cec905985b6e3e828bba5d45c96de83479859084c.exe 30 PID 3056 wrote to memory of 2728 3056 52738df9af06015dc0569c5cec905985b6e3e828bba5d45c96de83479859084c.exe 30 PID 3056 wrote to memory of 2728 3056 52738df9af06015dc0569c5cec905985b6e3e828bba5d45c96de83479859084c.exe 30 PID 3056 wrote to memory of 2728 3056 52738df9af06015dc0569c5cec905985b6e3e828bba5d45c96de83479859084c.exe 30 PID 2728 wrote to memory of 2516 2728 skotes.exe 32 PID 2728 wrote to memory of 2516 2728 skotes.exe 32 PID 2728 wrote to memory of 2516 2728 skotes.exe 32 PID 2728 wrote to memory of 2516 2728 skotes.exe 32 PID 2728 wrote to memory of 2424 2728 skotes.exe 33 PID 2728 wrote to memory of 2424 2728 skotes.exe 33 PID 2728 wrote to memory of 2424 2728 skotes.exe 33 PID 2728 wrote to memory of 2424 2728 skotes.exe 33 PID 2728 wrote to memory of 2492 2728 skotes.exe 34 PID 2728 wrote to memory of 2492 2728 skotes.exe 34 PID 2728 wrote to memory of 2492 2728 skotes.exe 34 PID 2728 wrote to memory of 2492 2728 skotes.exe 34 PID 2424 wrote to memory of 2248 2424 I0XmI2t.exe 35 PID 2424 wrote to memory of 2248 2424 I0XmI2t.exe 35 PID 2424 wrote to memory of 2248 2424 I0XmI2t.exe 35 PID 2492 wrote to memory of 700 2492 mdjw5me.exe 38 PID 2492 wrote to memory of 700 2492 mdjw5me.exe 38 PID 2492 wrote to memory of 700 2492 mdjw5me.exe 38 PID 2492 wrote to memory of 700 2492 mdjw5me.exe 38 PID 2492 wrote to memory of 700 2492 mdjw5me.exe 38 PID 2492 wrote to memory of 700 2492 mdjw5me.exe 38 PID 2492 wrote to memory of 700 2492 mdjw5me.exe 38 PID 2492 wrote to memory of 700 2492 mdjw5me.exe 38 PID 2492 wrote to memory of 700 2492 mdjw5me.exe 38 PID 2492 wrote to memory of 700 2492 mdjw5me.exe 38 PID 2728 wrote to memory of 932 2728 skotes.exe 39 PID 2728 wrote to memory of 932 2728 skotes.exe 39 PID 2728 wrote to memory of 932 2728 skotes.exe 39 PID 2728 wrote to memory of 932 2728 skotes.exe 39 PID 2424 wrote to memory of 1504 2424 I0XmI2t.exe 40 PID 2424 wrote to memory of 1504 2424 I0XmI2t.exe 40 PID 2424 wrote to memory of 1504 2424 I0XmI2t.exe 40 PID 2424 wrote to memory of 1504 2424 I0XmI2t.exe 40 PID 2728 wrote to memory of 2360 2728 skotes.exe 41 PID 2728 wrote to memory of 2360 2728 skotes.exe 41 PID 2728 wrote to memory of 2360 2728 skotes.exe 41 PID 2728 wrote to memory of 2360 2728 skotes.exe 41 PID 2360 wrote to memory of 2752 2360 cd5488bba4.exe 43 PID 2360 wrote to memory of 2752 2360 cd5488bba4.exe 43 PID 2360 wrote to memory of 2752 2360 cd5488bba4.exe 43 PID 2360 wrote to memory of 2752 2360 cd5488bba4.exe 43 PID 2360 wrote to memory of 2752 2360 cd5488bba4.exe 43 PID 2360 wrote to memory of 2752 2360 cd5488bba4.exe 43 PID 2360 wrote to memory of 2752 2360 cd5488bba4.exe 43 PID 2360 wrote to memory of 2752 2360 cd5488bba4.exe 43 PID 2360 wrote to memory of 2752 2360 cd5488bba4.exe 43 PID 2360 wrote to memory of 2752 2360 cd5488bba4.exe 43 PID 2728 wrote to memory of 936 2728 skotes.exe 44 PID 2728 wrote to memory of 936 2728 skotes.exe 44 PID 2728 wrote to memory of 936 2728 skotes.exe 44 PID 2728 wrote to memory of 936 2728 skotes.exe 44 PID 2728 wrote to memory of 1856 2728 skotes.exe 46 PID 2728 wrote to memory of 1856 2728 skotes.exe 46 PID 2728 wrote to memory of 1856 2728 skotes.exe 46 PID 2728 wrote to memory of 1856 2728 skotes.exe 46 PID 2728 wrote to memory of 1996 2728 skotes.exe 47 PID 2728 wrote to memory of 1996 2728 skotes.exe 47 PID 2728 wrote to memory of 1996 2728 skotes.exe 47 PID 2728 wrote to memory of 1996 2728 skotes.exe 47 PID 1856 wrote to memory of 2584 1856 fff4e3aba6.exe 48 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 3 IoCs
pid Process 1644 attrib.exe 1356 attrib.exe 2152 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\52738df9af06015dc0569c5cec905985b6e3e828bba5d45c96de83479859084c.exe"C:\Users\Admin\AppData\Local\Temp\52738df9af06015dc0569c5cec905985b6e3e828bba5d45c96de83479859084c.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\1020416001\SdVB3P2.exe"C:\Users\Admin\AppData\Local\Temp\1020416001\SdVB3P2.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2516
-
-
C:\Users\Admin\AppData\Local\Temp\1020826001\I0XmI2t.exe"C:\Users\Admin\AppData\Local\Temp\1020826001\I0XmI2t.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -WindowStyle Hidden -EncodedCommand QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgACcAQwA6AFwAVQBzAGUAcgBzAFwAQQBkAG0AaQBuAFwAQQBwAHAARABhAHQAYQBcAFIAbwBhAG0AaQBuAGcAXAB4AHcAMwBkAGsAMgBlAHUAMQB4AG8AQwBPAFgAVwBSAEMAUQBEACcA4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2248
-
-
C:\Users\Admin\AppData\Roaming\xw3dk2eu1xoCOXWRCQD\DJj.exe"C:\Users\Admin\AppData\Roaming\xw3dk2eu1xoCOXWRCQD\DJj.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1504
-
-
-
C:\Users\Admin\AppData\Local\Temp\1020934001\mdjw5me.exe"C:\Users\Admin\AppData\Local\Temp\1020934001\mdjw5me.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\1020934001\mdjw5me.exe"C:\Users\Admin\AppData\Local\Temp\1020934001\mdjw5me.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies system certificate store
PID:700
-
-
-
C:\Users\Admin\AppData\Local\Temp\1021325001\49cd5046bf.exe"C:\Users\Admin\AppData\Local\Temp\1021325001\49cd5046bf.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:932
-
-
C:\Users\Admin\AppData\Local\Temp\1021329001\cd5488bba4.exe"C:\Users\Admin\AppData\Local\Temp\1021329001\cd5488bba4.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\1021329001\cd5488bba4.exe"C:\Users\Admin\AppData\Local\Temp\1021329001\cd5488bba4.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2752
-
-
-
C:\Users\Admin\AppData\Local\Temp\1021330001\6f5401d6ce.exe"C:\Users\Admin\AppData\Local\Temp\1021330001\6f5401d6ce.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:936
-
-
C:\Users\Admin\AppData\Local\Temp\1021331001\fff4e3aba6.exe"C:\Users\Admin\AppData\Local\Temp\1021331001\fff4e3aba6.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"4⤵
- Loads dropped DLL
PID:2584 -
C:\Windows\system32\mode.commode 65,105⤵PID:2188
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e file.zip -p24291711423417250691697322505 -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1116
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_7.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2920
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_6.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:3020
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_5.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2368
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_4.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2540
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_3.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:932
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_2.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2292
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_1.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:912
-
-
C:\Windows\system32\attrib.exeattrib +H "in.exe"5⤵
- Views/modifies file attributes
PID:1644
-
-
C:\Users\Admin\AppData\Local\Temp\main\in.exe"in.exe"5⤵
- Executes dropped EXE
PID:2268 -
C:\Windows\system32\attrib.exeattrib +H +S C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe6⤵
- Views/modifies file attributes
PID:2152
-
-
C:\Windows\system32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe6⤵
- Views/modifies file attributes
PID:1356
-
-
C:\Windows\system32\schtasks.exeschtasks /f /CREATE /TN "Intel_PTT_EK_Recertification" /TR "C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe" /SC MINUTE6⤵
- Scheduled Task/Job: Scheduled Task
PID:2488
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell ping 127.0.0.1; del in.exe6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:704 -
C:\Windows\system32\PING.EXE"C:\Windows\system32\PING.EXE" 127.0.0.17⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1192
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1021332001\5007fd9db0.exe"C:\Users\Admin\AppData\Local\Temp\1021332001\5007fd9db0.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1996
-
-
C:\Users\Admin\AppData\Local\Temp\1021333001\3bde4c445e.exe"C:\Users\Admin\AppData\Local\Temp\1021333001\3bde4c445e.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:584
-
-
C:\Users\Admin\AppData\Local\Temp\1021334001\83ccd36190.exe"C:\Users\Admin\AppData\Local\Temp\1021334001\83ccd36190.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:524 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2456
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1772
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2888
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:588
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1852
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:3064
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2596 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2596.0.2090168831\1374193389" -parentBuildID 20221007134813 -prefsHandle 1224 -prefMapHandle 1216 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {6cb9fcea-f384-484b-bc09-fcb1899eb730} 2596 "\\.\pipe\gecko-crash-server-pipe.2596" 1324 103f4158 gpu6⤵PID:3028
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2596.1.1609469668\2000938894" -parentBuildID 20221007134813 -prefsHandle 1492 -prefMapHandle 1488 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {662c04d8-57a5-4dd2-bd18-0137ea9b088b} 2596 "\\.\pipe\gecko-crash-server-pipe.2596" 1504 e74258 socket6⤵PID:2844
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2596.2.84455501\634614460" -childID 1 -isForBrowser -prefsHandle 2196 -prefMapHandle 2212 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 836 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {eaaa0f4a-991c-435d-a24c-ac5822575e13} 2596 "\\.\pipe\gecko-crash-server-pipe.2596" 2188 1a489258 tab6⤵PID:2292
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2596.3.1241233329\1868836498" -childID 2 -isForBrowser -prefsHandle 2928 -prefMapHandle 2920 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 836 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8548d78c-85c4-4ae0-9bc7-bf274f1ebd5a} 2596 "\\.\pipe\gecko-crash-server-pipe.2596" 2940 1cc17e58 tab6⤵PID:2828
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2596.4.774689707\98206817" -childID 3 -isForBrowser -prefsHandle 3896 -prefMapHandle 3892 -prefsLen 26531 -prefMapSize 233444 -jsInitHandle 836 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {94a72119-3871-4e5f-b7cc-adc6aa87bdbb} 2596 "\\.\pipe\gecko-crash-server-pipe.2596" 3908 1f7ec858 tab6⤵PID:568
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2596.5.1214285484\266473613" -childID 4 -isForBrowser -prefsHandle 4016 -prefMapHandle 4020 -prefsLen 26531 -prefMapSize 233444 -jsInitHandle 836 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {fe8046b6-6e42-49af-9df3-b245721941c4} 2596 "\\.\pipe\gecko-crash-server-pipe.2596" 4004 2121f458 tab6⤵PID:2008
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2596.6.1889201694\43204567" -childID 5 -isForBrowser -prefsHandle 4132 -prefMapHandle 4136 -prefsLen 26531 -prefMapSize 233444 -jsInitHandle 836 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8d5af3bb-5eab-4389-9517-f639d7f0901d} 2596 "\\.\pipe\gecko-crash-server-pipe.2596" 4120 2121e258 tab6⤵PID:1716
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1021335001\6a151eeb5f.exe"C:\Users\Admin\AppData\Local\Temp\1021335001\6a151eeb5f.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:540
-
-
C:\Users\Admin\AppData\Local\Temp\1021336001\6c98084bf3.exe"C:\Users\Admin\AppData\Local\Temp\1021336001\6c98084bf3.exe"3⤵
- Executes dropped EXE
PID:2852 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -WindowStyle Hidden -EncodedCommand QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgACcAQwA6AFwAVQBzAGUAcgBzAFwAQQBkAG0AaQBuAFwAQQBwAHAARABhAHQAYQBcAFIAbwBhAG0AaQBuAGcAXABlAGUAbQB0AGIAMwBpADIANABkAHIAUwBIAFUARwBWAFMATgBHACcA4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3096
-
-
C:\Users\Admin\AppData\Roaming\eemtb3i24drSHUGVSNG\DJj.exe"C:\Users\Admin\AppData\Roaming\eemtb3i24drSHUGVSNG\DJj.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3352
-
-
-
C:\Users\Admin\AppData\Local\Temp\1021337001\b1ec163c13.exe"C:\Users\Admin\AppData\Local\Temp\1021337001\b1ec163c13.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:3268 -
C:\Program Files\Windows Media Player\graph\graph.exe"C:\Program Files\Windows Media Player\graph\graph.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3644
-
-
-
C:\Users\Admin\AppData\Local\Temp\1021338001\f8c9acb5e0.exe"C:\Users\Admin\AppData\Local\Temp\1021338001\f8c9acb5e0.exe"3⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3864
-
-
C:\Users\Admin\AppData\Local\Temp\1021339001\c4688ef85a.exe"C:\Users\Admin\AppData\Local\Temp\1021339001\c4688ef85a.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3164
-
-
C:\Users\Admin\AppData\Local\Temp\1021340001\75411c9c9c.exe"C:\Users\Admin\AppData\Local\Temp\1021340001\75411c9c9c.exe"3⤵
- Executes dropped EXE
PID:2036
-
-
C:\Users\Admin\AppData\Local\Temp\1021341001\828f3a59fd.exe"C:\Users\Admin\AppData\Local\Temp\1021341001\828f3a59fd.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3524 -
C:\Users\Admin\AppData\Local\Temp\1021341001\828f3a59fd.exe"C:\Users\Admin\AppData\Local\Temp\1021341001\828f3a59fd.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2324
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {EFE74B54-44AA-4528-B01C-70648906E188} S-1-5-21-3692679935-4019334568-335155002-1000:BCXRJFKE\Admin:Interactive:[1]1⤵
- Loads dropped DLL
PID:540 -
C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exeC:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2852 -
C:\Windows\explorer.exeexplorer.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3736
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell ping 127.1.10.1; del Intel_PTT_EK_Recertification.exe3⤵
- Drops file in System32 directory
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3820 -
C:\Windows\system32\PING.EXE"C:\Windows\system32\PING.EXE" 127.1.10.14⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2892
-
-
-
-
C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exeC:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2844 -
C:\Windows\explorer.exeexplorer.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2376
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell ping 127.1.10.1; del Intel_PTT_EK_Recertification.exe3⤵
- Drops file in System32 directory
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2176 -
C:\Windows\system32\PING.EXE"C:\Windows\system32\PING.EXE" 127.1.10.14⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2804
-
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
2Disable or Modify Tools
2Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8P9TO0C6\download[1].htm
Filesize1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bhzluvd5.default-release\activity-stream.discovery_stream.json.tmp
Filesize23KB
MD50af280ede69e416f4353bcb6395e99a8
SHA11b3fb10dc6b9ec4e5f3598f6b5c9b800a9c06b25
SHA2569c46017607a9b01be9020a46d911447d863ba649717b902c55f1580a37975323
SHA5129de06e0e27e631b84819ed12b945a1210e4bd4965afb710761fd85c8583deb65e59336f5a46baa7ddd7f67081b124e26ace8e1ac1c3a44ddc43a3abe31462a54
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bhzluvd5.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
1.8MB
MD58a0feb447f024f32d1ee001a56d7ee23
SHA139086a8133462fbbdbaad4a313789d216497e68a
SHA256b474d829617220d8d949fa58a39d9eafde02ec488f0c7a4330950fefed66bd86
SHA51209efc757b29341d91d08619e8924b5cbb3acd73f2fe13b1aa21327c4133721102110b17f6717b09e703d1137d4266ab6e563f85bd34e98a1ee03b1b50e7ddbec
-
Filesize
2.9MB
MD575ca34215f6e3916c51c0af34fc17284
SHA13726ba089194df9221b1eed520d62e452d74d509
SHA2564d2340448332a51ceafe2cb2562b2441590eff605b7fc0478001ad103f495955
SHA51251a8285cd0c989ca4a659fb84f401f81e92bcc9a2b03f3f55da565bc2a9b6fefb115ddb0009d675e265e391c65fb4defc6326037b70b03eb6ed1364f1d7dc679
-
Filesize
520KB
MD581b5e34627858d87520f219c18cc5c7f
SHA1f2a58e0cfd375756c799112180deb3770cc55cf8
SHA25600297db7c9f2087e3c55b655df030155eedadd141ec2d31e47ff53aa82c43cc7
SHA512ceb2bdf9a1396c637bf946592661e816446df56e1ba46275aef10b09e8db385c78f39825153c1b74b37bb7750ba5a7a5afc82bf25b1a19a322fd8eae010eec08
-
Filesize
562KB
MD563c8c11ca850435d9b5ec2ea41e50c22
SHA109a92f137462216a052f2a819ce110a0ac2f4022
SHA25689f58c08d1ccdc0aa645f11fb84de4c8a1ee328fd8a847aca63523291465a3a4
SHA512abdb139e86a3268c4d2bb5581c804219eeefc992e1dab87b3eb059db24015c849ce64d16ed0745df43dc8ac7ae49dcd5fd5660e65924752e669deafa6bbaa803
-
Filesize
1.8MB
MD515709eba2afaf7cc0a86ce0abf8e53f1
SHA1238ebf0d386ecf0e56d0ddb60faca0ea61939bb6
SHA25610bff40a9d960d0be3cc81b074a748764d7871208f324de26d365b1f8ea3935a
SHA51265edefa20f0bb35bee837951ccd427b94a18528c6e84de222b1aa0af380135491bb29a049009f77e66fcd2abe5376a831d98e39055e1042ccee889321b96e8e9
-
Filesize
4.2MB
MD53a425626cbd40345f5b8dddd6b2b9efa
SHA17b50e108e293e54c15dce816552356f424eea97a
SHA256ba9212d2d5cd6df5eb7933fb37c1b72a648974c1730bf5c32439987558f8e8b1
SHA512a7538c6b7e17c35f053721308b8d6dc53a90e79930ff4ed5cffecaa97f4d0fbc5f9e8b59f1383d8f0699c8d4f1331f226af71d40325022d10b885606a72fe668
-
Filesize
1.7MB
MD59836a7092f4e042596449c941b6a266a
SHA1dd920676bae1326313226d3f0aa90fee8cea211f
SHA2561c7c9a3880458aaae1e4d98699602fff30b49c18ba586f6dc153b3def4f20668
SHA51211519e0d2849d3cc4e8391e50044f0aa74ad278d30d6243c1aa3397487b6e16401fa38a5e4b70f3f57702c4d5657437e60f3fcddd2ed7614d93f8576a74518d7
-
Filesize
2.8MB
MD594b6fb853890025932da40460a6b1442
SHA1f02ba57613297cef29e716d6b57cb1812c59c57f
SHA2566eb1e816ac328d3f57ead1e3706c4592d6202a553fc809808f6a7fde1d29a98d
SHA5129f04f2c30479be62b68db16f21244b0f28033f448a0fe9cb7f1d7daee9c3045f82baabd933c1bfc9fe6511298962e06e6b4c9d23365be5ad154cc1d90d6d7846
-
Filesize
946KB
MD5561a7131a3ea1d1cf0dcf85ac4b4c73e
SHA1145cc8690213ec88e7cff85224687db176df8420
SHA25633d2c23c0cb7a85766b1da848d51657e0b990417e9734b635285dbbd114e0731
SHA512f336b2cf70a02e552b2fdecba820b4546a78e71a8e5452ca1b6b9b9bbe080741d3d2715883bffddf14211bae61dbbd4b8e0f8de2238d849062b6568ad27aae20
-
Filesize
2.7MB
MD50ae41be0f598507c39e6a2db6ba41dfb
SHA12afab0e9f9927dc6ddd9e8a122e6add09e863feb
SHA2565b87e1f3701c17765ccdb6a09a47b3a56aab3e1d053f022c2c0af3d339699af5
SHA512bdaf545a49c4a10bcf56702c6cb1f521286b7b692e1dc79c5f75da05a6fb631784e1e072bff49de6a5892afaa96acea04150e33f46f53e2f8b7b365f348824a5
-
Filesize
591KB
MD53567cb15156760b2f111512ffdbc1451
SHA12fdb1f235fc5a9a32477dab4220ece5fda1539d4
SHA2560285d3a6c1ca2e3a993491c44e9cf2d33dbec0fb85fdbf48989a4e3b14b37630
SHA512e7a31b016417218387a4702e525d33dd4fe496557539b2ab173cec0cb92052c750cfc4b3e7f02f3c66ac23f19a0c8a4eb6c9d2b590a5e9faeb525e517bc877ba
-
Filesize
4.2MB
MD5b2cf79370b6c115f2f5f44372fc917b0
SHA1ab92465543a7e36348ac93de665f7d89149a6ff3
SHA2569e81d28cfca40a37cc19537bcacea75f9c578840b138dd8c254e20aaca418ee2
SHA512d515f34ce1e16afa3f019bd0c8f66a340592343c170da19b7f8a0bc2f57afc685f6370e9d112d10e3b3adc8daecd3197df454ae8e241f399e073aefee9389708
-
Filesize
1.8MB
MD5e7ec13990da9efcc5afae3f49d5ccde0
SHA137d78027c740fa3a6d7e70e15215e30337d2cd4b
SHA256f3c3053569ed6d214eda4c527ba7a4c1412a3176a60aa7ca32aef039bb99af97
SHA512ef4fa2e363e31e1029d61c08bbc901a017f12d8aedcb0691e52d33973bcf39347b1415660e8eadb0c33c925f1e82865b5bb35addf35143f22dbf41f156b6aa8c
-
Filesize
2.5MB
MD587330f1877c33a5a6203c49075223b16
SHA155b64ee8b2d1302581ab1978e9588191e4e62f81
SHA25698f2344ed45ff0464769e5b006bf0e831dc3834f0534a23339bb703e50db17e0
SHA5127c747d3edb04e4e71dce7efa33f5944a191896574fee5227316739a83d423936a523df12f925ee9b460cce23b49271f549c1ee5d77b50a7d7c6e3f31ba120c8f
-
Filesize
528KB
MD59ab250b0dc1d156e2d123d277eb4d132
SHA13b434ff78208c10f570dfe686455fd3094f3dd48
SHA25649bfa0b1c3553208e59b6b881a58c94bb4aa3d09e51c3f510f207b7b24675864
SHA512a30fb204b556b0decd7fab56a44e62356c7102bc8146b2dfd88e6545dea7574e043a3254035b7514ee0c686a726b8f5ba99bcd91e8c2c7f39c105e2724080ef0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
1.6MB
MD572491c7b87a7c2dd350b727444f13bb4
SHA11e9338d56db7ded386878eab7bb44b8934ab1bc7
SHA25634ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891
SHA512583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511
-
Filesize
1.7MB
MD5b7d1e04629bec112923446fda5391731
SHA1814055286f963ddaa5bf3019821cb8a565b56cb8
SHA2564da77d4ee30ad0cd56cd620f4e9dc4016244ace015c5b4b43f8f37dd8e3a8789
SHA51279fc3606b0fe6a1e31a2ecacc96623caf236bf2be692dadab6ea8ffa4af4231d782094a63b76631068364ac9b6a872b02f1e080636eba40ed019c2949a8e28db
-
Filesize
1.7MB
MD50dc4014facf82aa027904c1be1d403c1
SHA15e6d6c020bfc2e6f24f3d237946b0103fe9b1831
SHA256a29ddd29958c64e0af1a848409e97401307277bb6f11777b1cfb0404a6226de7
SHA512cbeead189918657cc81e844ed9673ee8f743aed29ad9948e90afdfbecacc9c764fbdbfb92e8c8ceb5ae47cee52e833e386a304db0572c7130d1a54fd9c2cc028
-
Filesize
3.3MB
MD5cea368fc334a9aec1ecff4b15612e5b0
SHA1493d23f72731bb570d904014ffdacbba2334ce26
SHA25607e38cad68b0cdbea62f55f9bc6ee80545c2e1a39983baa222e8af788f028541
SHA512bed35a1cc56f32e0109ea5a02578489682a990b5cefa58d7cf778815254af9849e731031e824adba07c86c8425df58a1967ac84ce004c62e316a2e51a75c8748
-
Filesize
3.3MB
MD5045b0a3d5be6f10ddf19ae6d92dfdd70
SHA10387715b6681d7097d372cd0005b664f76c933c7
SHA25694b392e94fa47d1b9b7ae6a29527727268cc2e3484e818c23608f8835bc1104d
SHA51258255a755531791b888ffd9b663cc678c63d5caa932260e9546b1b10a8d54208334725c14529116b067bcf5a5e02da85e015a3bed80092b7698a43dab0168c7b
-
Filesize
440B
MD53626532127e3066df98e34c3d56a1869
SHA15fa7102f02615afde4efd4ed091744e842c63f78
SHA2562a0e18ef585db0802269b8c1ddccb95ce4c0bac747e207ee6131dee989788bca
SHA512dcce66d6e24d5a4a352874144871cd73c327e04c1b50764399457d8d70a9515f5bc0a650232763bf34d4830bab70ee4539646e7625cfe5336a870e311043b2bd
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\UNYCMUJRZP9P08K506MT.temp
Filesize7KB
MD5c68d931636b7e22003288276d500c327
SHA162b88a4d8ed4248b5ad760a14593574f054c68a4
SHA256303efbda377d525cce71105132ab3ecbffc069bcaf321785fdbe094d41150d02
SHA51247cee2e33b9a2ba6e21787df75af791a3de00342c2a2590a3bff6d8afeeb0e87841c5e8f7d96cfcf198be63e83fa0bf1ec85b5d1ae9e5211c5ff4ca2b09552ae
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD5a8c45e731e1c06d6438265f0fb82508a
SHA144c2b332e1564036550e62b52c2c8a698cc5f468
SHA2560defb65ed5104127646faf0747c247efd0af086a6d0dd03e6ce8d2a8e2667b84
SHA5129a9a2c6272e20a3b4bac9664a4bcce3dea3aac05727848b7dedb1f8aca7892eb1dfa78ac36eadf93c760287a5eac9dbe4a6c6caee1f99acbb7008ccdec3a8383
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\datareporting\glean\pending_pings\162feb14-2031-4b0d-9557-7994fcd5e813
Filesize745B
MD5c4fc2e6e1ac4fdee44c55ec685d1db1c
SHA18edd0c63948d866f00101ab4494c8e93266e68ee
SHA256a27af9a65cc78babc49ac9455eb0932712269c692173bcc72631dba4e3b5d4f7
SHA5129c792c9e9524e03b45bbba61b36b641e8d10931eba6d79a5ca6916684f0569df432e00fd2c55dc613f46e8645ec90697532ad7d25b8a891189c1e79b06cdc3a9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\datareporting\glean\pending_pings\f615be7f-da20-486b-963a-e26d67fcc810
Filesize10KB
MD542dc5a0c236d8b13ebb494cfce991e7c
SHA18957ff0f1b79c3b6f37282ba5f71a9c9ca57a6c1
SHA2562de9002f1800132e714f8656b533a49c547c79c0b4cf09fcb8b4bd206565b152
SHA512eaa175b520e8db736a59525faf98cbf781d7319510298c0abe9acae44fe91ac4fea94d0c9b201a2f9b50a0f2f1b2192acf779f34ab6cff92f8d6bdf8f19765f6
-
Filesize
6KB
MD5db35c3c8f1199793e64ca3677b6459d7
SHA1ef2b58e0f2f013136cdbe1cf63c336b65f03427f
SHA25652bb3fa156c2bfe6f1b24838d4daf9b7215aba471fae95c22f97a14c44801483
SHA5127f78b583a28c7a449495d9667408cc7798c829570410ea2fee0221fb5d5be2aa66eadce2d608a470d1e11766d3023b2e963eb825458409522265ae6d483b2870
-
Filesize
6KB
MD515d54db1d01314e01d60e3b3575bb36f
SHA182ea6dd0786d9ac15206f61187ea5867ce91d65d
SHA256a9d7b7a55e777c3996e815f030749d537f06050af5aa6a6b7eb05ee177833f4f
SHA512c6b5940a69ef50bc695d362c447b718b16c32b983f9b5406399704cfc09d0ae78b38c20b8764bf3ef75e0fcdc8470102060ab985c17a7878e5b0b8a18c5104be
-
Filesize
300KB
MD595b7a7cbc0aff0215004c5a56ea5952c
SHA1a1fb08b02975ec4869bcaf387d09d0abcced27e9
SHA256e9aa0b4540115b3dcec3af70b6de27e54e4a0fa96d1d3cb33bac121d804c1d61
SHA51297ac66de88cac709e37d59c8a388c18d69aa3422d275be3e28b92e87167bcd87a310125e7dca593fe1b66d2f826cb2e22b64d51eac07dc94981dcd123e906961
-
Filesize
2.9MB
MD5150a14aee722f93553528f147ac1cfdb
SHA1a05fe7ada978105e51f8931a5049668234f5379e
SHA25652738df9af06015dc0569c5cec905985b6e3e828bba5d45c96de83479859084c
SHA51248c4bdc1b646c8f21f67ed0eb98ff55e8d26a9349004b467caf98178e8092e21aacb0bfacecaaf4009a3fa1d339e8c36d674fb2af81c34fed6a08d8c9c88cd69
-
Filesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628